Abstract
Blockchain technology is rapidly emerging as one of the leading-edge technologies with various advantages that are highly applicable in various sectors. However, such benefits of blockchain also involve security and privacy concerns and could thus hinder the use of technology. Existing studies have made considerable efforts to understand the main aspects of blockchain adoption and acceptance using various theoretical models. However, studies considering users’ privacy and security concerns are considerably more scarce. To fill this important gap, we analyze factors influencing users’ intention to use blockchain regarding privacy and security concerns by bridging two theories, namely protection motivation theory (PMT) and task-technology fit (TTF) theory. Using survey data from 306 blockchain users in China, we employed structural equation modeling to empirically test our hypotheses. Results show that TTF positively impacts users’ invulnerability and self-efficacy, leading to blockchain transparency and increasing users’ intention to use the blockchain. This study provides useful theoretical and practical implications by suggesting that the relationship between TTF and PMT can serve as a theoretical background for adopting blockchain, and TTF can help business managers manage users’ security and privacy concerns.
Similar content being viewed by others
Data availability
Data available on request from the authors.
References
Aste T, Tasca P, Matteo TD (2017) Blockchain technologies: the foreseeable impact on society and industry. Computer 50(9):18–28
Queiroz MM, Fosso Wamba S (2019) Blockchain adoption challenges in supply chain: an empirical investigation of the main drivers in India and the USA. Int J Inf Manag 46:70–82
Marikyan D, Papagiannidis S, Rana OF, Ranjan R (2022) Blockchain adoption: a study of cognitive factors underpinning decision making. Comput Hum Behav 131:107207
Lian J-W, Chen C-T, Shen L-F, Chen H-M (2020) Understanding user acceptance of blockchain-based smart locker. Electron Libr 38(2):353–366
Clohessy T, Treiblmaier H, Acton T, Rogers N (2020) Antecedents of blockchain adoption: an integrative framework. Strateg Chang 29(5):501–515
Liang T-P, Kohli R, Huang H-C, Li Z-L (2021) What drives the adoption of the blockchain technology? A fit-viability perspective. J Manag Inf Syst 38(2):314–337
Taherdoost H (2022) A critical review of blockchain acceptance models—blockchain technology adoption frameworks and applications. Computers 11(2):24
AL-Ashmori A, Basri SB, Dominic PDD, Capretz LF, Muneer A, Balogun AO, Gilal AR, Ali RF (2022) Classifications of sustainable factors in blockchain adoption: a literature review and bibliometric analysis. Sustainability 14(9):5176
Gaur V, Gaiha A (2020) Building a transparent supply chain blockchain can enhance trust, efficiency, and speed. Harv Bus Rev 98(3):94–103
Vitasek K, Bayliss J, Owen L, Srivastava N (2022) How walmart canada uses blockchain to solve supply-chain challenges. Harv Bus Rev 5
Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B (2017) In Blockchain technology innovations, IEEE Technology & Engineering Management Conference (TEMSCON), 8–10 June 2017, 2017; 2017; pp 137–141
Chang S-J, Av W, Eden L (2020) From the editors: common method variance in international business research. J Int Bus Stud 41(2):174–184
Blockchains Top 5 blockchain security issues in 2022 (2022) Available online: https://101blockchains.com/blockchain-security-issues/ (Accessed 09
Degirmenci K, Barros A (2021) In How secure is blockchain? extending the protection motivation theory with trust, Proceedings of the 27th Americas Conference on Information Systems, AMCIS 2021, ; 2021; p 1301
Alazab M, Alhyari S, Awajan A, Abdallah AB (2021) Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance. Cluster Comput 24(1):83–101
Dehghani M, William Kennedy R, Mashatan A, Rese A, Karavidas D (2022) High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology. J Bus Res 149:393–411
Pawczuk L, Holdowsky J, Massey R, Hansen B (2020) From promise to reality: Deloitte’s 2020 global blockchain survey. Deloitte Consulting LLP, London, UK
Roh T, Park BI, Xiao SS (2023) Adoption of AI-enabled robo-advisors in fintech: simultaneous employment of UTAUT and the theory of reasoned action. J Electron Commer 24(1):29–47
Kamble SS, Gunasekaran A, Kumar V, Belhadi A, Foropon C (2021) A machine learning based approach for predicting blockchain adoption in supply chain. Technol Forecast Soc Change 163:120465
Albayati H, Kim SK, Rho JJ (2020) Accepting financial transactions using blockchain technology and cryptocurrency: a customer perspective approach. Tehcnol Soc 62:101320
Wong L-W, Tan GW-H, Lee V-H, Ooi K-B, Sohal A (2020) Unearthing the determinants of blockchain adoption in supply chain management. Int J Product Res 58(7):2100–2123
Hughes L, Dwivedi YK, Misra SK, Rana NP, Raghavan V, Akella V (2019) Blockchain research, practice and policy: applications, benefits, limitations, emerging research themes and research agenda. Int J Inf Manag 49:114–129
Kavanagh D, Ennis PJ (2020) Cryptocurrencies and the emergence of blockocracy. Inf Soc 36(5):290–300
Boss SR, Galletta DF, Lowry PB, Moody GD, Polak P (2015) What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Q 39(4):837–864
Boerman SC, Kruikemeier S, Zuiderveen Borgesius FJ (2021) Exploring motivations for online privacy protection behavior: insights from panel data. Commun Res 48(7):953–977
Cloarec J (2022) Privacy controls as an information source to reduce data poisoning in artificial intelligence-powered personalization. J Bus Res 152:144–153
Goodhue DL, Thompson RL (1995) Task-technology fit and individual performance. MIS Q 19(2):213–236
Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. J Psychol 91(1):93–114
Maddux JE, Rogers RW (1983) Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. J Exp Soc Psychol 19(5):469–479
Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83–95
Menard P, Bott GJ, Crossler RE (2017) User motivations in protecting information security: protection motivation theory versus self-determination theory. J Manag Inf Syst 34(4):1203–1230
Rogers RW (1983) Cognitive and psychological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo J, Petty R (eds) Social psychophysiology: a sourcebook. Guilford Press, New York, pp 153–176
Woon I, Tan G-W, Low R (2005) In A protection motivation theory approach to home wireless security, 26th International Conference on Information Systems, Las Vegas, USA, ; Las Vegas, USA, 2005; pp 367–380
Chenoweth T, Minch R, Gattiker T (2009) In Application of protection motivation theory to adoption of protective technologies, 42nd Hawaii International Conference on System Sciences, 5–8 Jan. 2009, 2009; 2009; pp 1–10
Alashoor T, Han S, Joseph RC (2017) Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: an APCO model. Commun Assoc Inf Syst 41:62–96
Crossler R, Bélanger F (2014) An extended perspective on individual security behaviors. Data Base Adv Inf Syst 45(4):51–71
Goodhue D (1988) I/S attitudes: toward theoretical and definitional clarity. ACM SIGMIS database: the DATABASE for advances. Inform Syst 19(3–4):6–15
Wang X, Wong YD, Chen T, Yuen KF (2021) Adoption of shopper-facing technologies under social distancing: a conceptualisation and an interplay between task-technology fit and technology trust. Comput Hum Behav 124:106900
Zhou T, Lu Y, Wang B (2010) Integrating TTF and UTAUT to explain mobile banking user adoption. Comput Hum Behav 26(4):760–767
Aljukhadar M, Senecal S, Nantel J (2014) Is more always better? Investigating the task-technology fit theory in an online user context. Inf Manag 51(4):391–397
Walsh C, O’Reilly P, Gleasure R, McAvoy J, O’Leary K (2021) Understanding manager resistance to blockchain systems. Eur Manag J 39(3):353–365
Luo Y, Wang G, Li Y, Ye Q (2021) Examining protection motivation and network externality perspective regarding the continued intention to use m-health apps. In Int J Environ Res Public Health, ; Vol. 18
Hsieh P-J, Lai H-M (2020) Exploring people’s intentions to use the health passbook in self-management: an extension of the technology acceptance and health behavior theoretical perspectives in health literacy. Technol Forecast Soc Change 161:120328
Lee Y, Larsen KR (2009) Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software. Eur J Inf Syst 18(2):177–187
Lee Y (2011) Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective. Decis Support Syst 50(2):361–369
Laugesen J, Hassanein K (2017) Adoption of personal health records by chronic disease patients: a research model and an empirical study. Comput Hum Behav 66:256–272
Lin T-C, Huang C-C (2008) Understanding knowledge management system usage antecedents: an integration of social cognitive theory and task technology fit. Inf Manag 45(6):410–417
Shahbaz M, Gao C, Zhai L, Shahzad F, Khan I (2021) Environmental air pollution management system: predicting user adoption behavior of big data analytics. Tehcnol Soc 64:101473
Goodhue LD (1998) Development and measurement validity of a task-technology fit instrument for user evaluations of information system. Decis Sci 29(1):105–138
Dishaw MT, Strong DM (1999) Extending the technology acceptance model with task–technology fit constructs. Inf Manag 36(1):9–21
Yen DC, Wu C-S, Cheng F-F, Huang Y-W (2010) Determinants of users’ intention to adopt wireless technology: an empirical study by integrating TTF with TAM. Comput Hum Behav 26(5):906–915
Goodhue LD (1995) Understanding user evaluations of information systems. Manag Sci 41(12):1827–1844
Roth T, Stohr A, Amend J, Fridgen G, Rieger A (2022) Blockchain as a driving force for federalism: a theory of cross-organizational task-technology fit. Int J Inf Manag forthcoming
Forbes 13 evolving and emerging uses for blockchain technology. Available online: https://www.forbes.com/sites/forbestechcouncil/2020/06/10/13-evolving-and-emerging-uses-for-blockchain-technology/?sh=50665331162e
Ahl A, Yarime M, Tanaka K, Sagawa D (2019) Review of blockchain-based distributed energy: implications for institutional development. Renew Sust Energ Rev 107:200–211
Niu B, Shen Z, Xie F (2021) The value of blockchain and agricultural supply chain parties’ participation confronting random bacteria pollution. J Clean Prod 319:128579
Larsen TJ, Sørebø AM, Sørebø Ø (2009) The role of task-technology fit as users’ motivation to continue information system use. Comput Hum Behav 25(3):778–784
Rawlins B (2008) Give the emperor a mirror: toward developing a stakeholder measurement of organizational transparency. J Public Relat Res 21(1):71–99
Klaidman S (1987) The virtuous journalist, vol 98. Oxford University Press, New York, pp 861–863
Stirton L, Lodge M (2001) Transparency mechanisms: building publicness into public services. J Law Soc 28(4):471–489
Chen Z-J, Vogel D, Wang Z-H (2016) How to satisfy citizens? Using mobile government to reengineer fair government processes. Decis Support Syst 82:47–57
Kim Y, Roh T (2022) Preparing an exhibition in the post-pandemic era: evidence from an O2O-based exhibition of B2B firms. Technol Forecast Soc Change 185:122041
Wu B, Chen X (2017) Continuance intention to use MOOCs: integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Comput Hum Behav 67:221–232
DeFranco A, Morosan C (2017) Coping with the risk of internet connectivity in hotels: perspectives from american consumers traveling internationally. Tour Manag 61:380–393
Chang V, Baudier P, Zhang H, Xu Q, Zhang J, Arami M (2020) How blockchain can impact financial services – the overview, challenges and recommendations from expert interviewees. Technol Forecast Soc Change 158:120166
Baruh L, Secinti E, Cemalcilar Z (2017) Online privacy concerns and privacy management: a meta-analytical review. J Commun 67(1):26–53
Ham C-D (2017) Exploring how consumers cope with online behavioral advertising. Iint J Advert 36(4):632–658
Ham C-D, Nelson MR (2016) The role of persuasion knowledge, assessment of benefit and harm, and third-person perception in coping with online behavioral advertising. Comput Hum Behav 62:689–702
Bandara R, Fernando M, Akter S (2021) Managing consumer privacy concerns and defensive behaviours in the digital marketplace. Eur J Mark 55(1):219–246
Wottrich VM, van Reijmersdal EA, Smit EG (2019) App users unwittingly in the spotlight: a model of privacy protection in mobile apps. J Consum Aff 53(3):1056–1083
Milne GR, Labrecque LI, Cromer C (2009) Toward an understanding of the online consumer’s risky behavior and protection practices. J Consum Aff 43(3):449–473
Bandura A (1993) Perceived self-efficacy in cognitive development and functioning. Educ Psychol 28(2):117–148
Zhang D, Zhao JL, Zhou L, Nunamaker JF Jr (2004) Can e-learning replace classroom learning? Commun ACM 47(5):75–79
McGill TJ, Klobas JE (2009) A task–technology fit view of learning management system impact. Comput Educ 52(2):496–508
Shin D-H (2010) The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact Comput 22(5):428–438
Kim K-H, Yun H (2007) Cying for me, cying for us: relational dialectics in a korean social network site. J Comput-Mediat Comm 13(1):298–318
Mou J, Shin D-H, Cohen JF (2017) Trust and risk in consumer acceptance of e-services. Electron Commer Res 17(2):255–288
Roh T, Yang YS, Xiao S, Park BI (2022) What makes consumers trust and adopt fintech? An empirical investigation in China. Electron Commer Res forthcoming
Shin D-H (2013) User experience in social commerce: in friends we trust. Behav Inf Technol 32(1):52–67
Kim Y, Wang Q, Roh T (2021) Do information and service quality affect perceived privacy protection, satisfaction, and loyalty? Evidence from a chinese O2O-based mobile shopping application. Telemat Inf 56:101483
Awaysheh A, Klassen RD (2010) The impact of supply chain structure on the use of supplier socially responsible practices. Int J Oper Prod Manag 30(12):1246–1268
Kshetri N (2018) 1 Blockchain’s roles in meeting key supply chain management objectives. Int J Inf Manag 39:80–89
Forbes This emerging tech company has put Asia’s tuna on the blockchain. Available online: https://www.forbes.com/sites/keshiahannam/2016/09/30/this-emerging-tech-company-has-put-asias-tuna-on-the-blockchain/?sh=3b3ac7192649
Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319–340
Liu N, Ye Z (2021) Empirical research on the blockchain adoption – based on TAM. Appl Econ 53(37):4263–4275
Kamble S, Gunasekaran A, Arha H (2019) Understanding the blockchain technology adoption in supply chains-indian context. Int J Product Res 57(7):2009–2033
Armstrong JS, Overton TS (1977) Estimating nonresponse bias in mail surveys. J Mark Res 14(3):396–402
Johnson RE, Rosen CC, Djurdjevic E (2011) Assessing the impact of common method variance on higher order multidimensional constructs. J Appl Soc Psychol 96(4):744–761
Podsakoff PM, MacKenzie SB, Lee J-Y, Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Soc Psychol 88(5):879–903
Malaquias RF, Hwang Y (2016) An empirical study on trust in mobile banking: a developing country perspective. Comput Hum Behav 54:453–461
Chang HH (2008) Intelligent agent’s technology characteristics applied to online auctions’ task: a combined model of TTF and TAM. Technovation 28(9):564–577
Meuter ML, Bitner MJ, Ostrom AL, Brown SW (2005) Choosing among alternative service delivery modes: an investigation of customer trial of self-service technologies. J Mark 69(2):61–83
Morgan TR, Richey RG Jr, Ellinger AE (2018) Supplier transparency: scale development and validation. Int J Logist Manag 29(3):959–984
Maruping LM, Bala H, Venkatesh V, Brown SA (2017) Going beyond intention: integrating behavioral expectation into the unified theory of acceptance and use of technology. J Assoc Inf Sci Technol 68(3):623–637
Richter NF, Cepeda-Carrion G, Roldán Salgueiro JL, Ringle CM (2016) European management research using partial least squares structural equation modeling (PLS-SEM). Eur Manag J 34(6):589–597
Venaik S, Midgley DF, Devinney TM (2005) Dual paths to performance: the impact of global pressures on MNC subsidiary conduct and performance. J Int Bus Stud 36(6):655–675
Zott C, Amit R (2008) The fit between product market strategy and business model: implications for firm performance. Strateg Manag J 29(1):1–26
Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39–50
Chin WW (1998) The partial least squares approach to structural equation modeling. Mod Methods Bus Res 295(2):295–336
Hulland J (1999) Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strateg Manag J 20(2):195–204
Henseler J, Ringle CM, Sarstedt M (2015) A new criterion for assessing discriminant validity in variance-based structural equation modeling. J Acad Mark Sci 43(1):115–135
Kline RB (2011) Principles and practice of structural equation modeling. Guilford Press, New York
Acknowledgements
This work was partially supported by Hankuk University of Foreign Studies Research Funds.
Funding
This research received no external funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Soo Jung Oh is the First author.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Oh, S.J., Xiao, S.(., Park, B.I. et al. Coping or threat? Unraveling the mechanisms enabling user acceptance of blockchain technologies. Inf Technol Manag (2023). https://doi.org/10.1007/s10799-023-00409-8
Accepted:
Published:
DOI: https://doi.org/10.1007/s10799-023-00409-8