Introduction

Consumers use different e-commerce platforms in order to buy a wide range of goods and services by conducting a variety of financial trades and transactions (Misra et al. 2022; Cavalinhos et al., 2021). These transactions necessitate the use of a user’s personal and financial information, which can be misused or employed for secondary purposes (Ermakova et al., 2014; Zhu et al., 2020). These types of misuse may affect consumer trust (Zhu et al., 2020). Reports suggest that these vulnerabilities are amplified in online businesses. According to Chawla and Kumar (2022), recent problems with e-commerce platforms include consumer fraud, unethical and unfair practices, and data exploitation. The identification of these concerns and their impact on the consumers’ trusting beliefs must be carefully investigated in order to develop consumer protection mechanisms. Consumer protection mechanisms could accordingly increase the user’s confidence and acceptance of e-commerce platforms (Choi et al., 2021). Establishing detailed security and privacy policies in an e-commerce environment can have an advantageous effect on customer trust (Rodríguez et al., 2020, Pagan et al., 2022). Implementing consumer protection mechanisms will enhance trust in e-commerce platforms, may create a competitive advantage, and influence consumers’ e-commerce intentions (Morimoto, 2022).

E-commerce has brought both convenience and the potential for fraud. According to a recent report, online purchase scams have increased to 78% in the year 2020, which is due to the surge of online purchases in India during the pandemicFootnote 1. Researchers discovered numerous frauds, such as the loss of sales, the unethical use of data, copyright breaches, and money-back concerns, which impair the consumers’ trust (Chawla and Kumar, 2022). IT ethics explains the ethical use of information technology by practicing what is moral, right, and of value (Suh and Han, 2003). If sellers are proven to be engaging in unethical and impulsive actions, consumers are less likely to share their personal information on online platforms (Siciliani et al., 2019; Cuesta-Valiño et al., 2022). Studies that integrated ethics with technology usage indicated that personal information disclosure on online platforms might have consequences for both the consumer and the retailer, which has the potential to influence consumer purchasing behavior (Fue Zeng et al., 2022). There are incidents where consumers and retailers have experienced data breaches. The past research indicates that a lack of trust may be attributable to a breach of ethical principles, a lack of assurance, and transparency from vendors (Hajli, 2019; Rosillo-Díaz et al., 2020; Raza et al., 2022). However, consumers still found themselves frequently sharing their information despite their reservations about disclosure. (Pantano et al., 2021; Sheth, 2020). It is, therefore, critical to understand the factors that affect the consumers’ beliefs that lead to privacy paradoxes.

The concept of privacy implies that an individual’s confidentiality is protected when an information exchange complies with the privacy rules of a context. These norms comprise of the type of information, who will be able to see and utilize the information, and the information transmission principles (Nissenbaum and Daniel, 2009). According to the exploitation theory, consumers are more likely to become victims of online fraud due to their lack of comprehension and understanding of online commerce privacy mechanisms (Yoon and Occena, 2015). According to the research, numerous technologies, such as third-party certificates, digital signatures, and copyright policies have been utilized by firms to complete data or information integration. Studies discussed individuals’ security and privacy concerns using multi-perspective analyses and the necessity of a privacy framework with online digital communities, which are evolving with time (Suh and Han, 2003; Enaizan et al., 2020; Vieira et al., 2023). We developed a framework after reviewing the recent studies with multiple layers of security, such as awareness and confidentiality. Consumer knowledge and understanding of these dimensions are still in their nascent stages, which further slows down the adoption of e-commerce services (Siciliani et al., 2019; Alonso-Garcia et al., 2023).

The social contract and economic theories state that adoption can be improved by developing trusting beliefs (McCoubrey and White, 1999). According to Levine (2019), the social contract theory suggests that trust and cooperation between buyers and sellers are of the utmost significance, which should be stressed via the development of privacy standards and consumer protection mechanisms. A few studies also discussed how companies can increase the trusting belief, such as with the case of programmatic advertising, which involves dynamically putting adverts on websites based on user transactions. This type of advertising is growing, but it comes with the risk of exposing customer data to more sophisticated analyses (Núnez-Barriopedro et al., 2023; Gong et al., 2019). The studies suggested that companies can counteract the users’ negative perceptions by demonstrating the benefits of Internet advertising, which include personalized ads, better offers based on the users’ interests, and transparency in data processing, in addition to defining the role of legislation and policies on the programmatic ecosystem (Barretta and Fuat Fırat, 2022). The social contract theory also implies that when consumers trust an online business to handle their personal information, they regard the social contract as being more credible and are more willing to share their personal information (Kruikemeier et al., 2020). Understanding the consumers’ expectations and increasing their level of awareness regarding security concerns, privacy of information, copyrights, and data use in relation to online commerce is necessary for the development of these types of standards (Sfenrianto et al., 2018).

The economic theory similarly encourages system transparency and the necessity for consumer protection legislation in order to increase the consumers’ trust in e-commerce vendors and services (Chawla and Kumar, 2022). As a result, the theory implies that in order to conduct online transactions, buyers and sellers must enter into an ethical and legally binding agreement, which should be readable and verified by both parties (Degeling et al., 2018; Siciliani et al., 2019). As a result, the present study follows the social contract theory and the economic theory in order to influence consumer perception by creating trusting beliefs.

This study makes the following contributions, which are based on a survey of the relevant literature. First, the study evaluates consumer awareness regarding the protection of personal and financial data used on e-commerce platforms. Several studies examined privacy policies from the perspectives of policymakers, technological companies, and online business communities, and they provided an overview of these general considerations (Chawla and Kumar, 2022; Levine, 2019). How aware are consumers of these dimensions? Are their views sufficiently explored in the literature? The study deals with these questions. This study explains next the impact of the consumers’ perceptions towards various security dimensions, which include awareness about privacy protection, information confidentiality, preventing unauthorized secondary data usage, and perceived information integrity in e-commerce services on their trusting beliefs. Trust was treated in most of the past research as a single variable that included one or two security concerns along with technological or utilitarian factors (Suh and Han, 2003; Kim et al., 2008; Aeron et al., 2019). This study explored several aspects of trust, which may be influenced by numerous privacy and confidentiality aspects, which also discusses them in detail. Third, this study proposes the indirect influence of these variables on the users’ intention to use e-commerce platforms, which considers the mediating effect of trusting beliefs in the relationship. Finally, this study compares varied consumers' perceptions about privacy concerns based on their varied demographics by including the moderating effect of gender, age, and frequency of use. This study, therefore, proposes the following research objectives (RO), which are provided below.

RO1: Investigate the connection between the consumers’ perceptions of security and how those perceptions may affect their behavioral intention to use e-commerce platforms.

RO2: Examine the mediating effect of trusting beliefs between various security measures and behavioral intention to use e-commerce platforms.

RO3: Evaluate the moderating effects of the consumers’ gender, age, and frequency of e-commerce platform usage on their trusting beliefs and subsequent behavioral intention to use e-commerce platforms.

This study used structural equation modeling (SEM) for the analysis, and it found a strong impact of the consumers’ perceptions of security on their trusting beliefs by eventually driving their adoption of e-commerce services in India. This study offers a few managerial and policy implications for online commerce communities, e-commerce firms, and policymakers. It implies that e-commerce companies should focus more on protecting consumers’ privacy, educating them, and offering them control. This might be accomplished by adding a new section on its website that is devoted to data security and privacy in order to enforce trusting belief and transparency. The next section discusses the theoretical background and the gaps in the literature. Section “Theoretical background” includes the hypotheses development of the conceptual model. Sections “Methods” and “Results” explain the methodology, data analysis, and major findings, whereas sections “Discussion and implications” present the discussions, implications of the results, and the limitations of the study. Lastly, the section “Conclusion” provides the concluding remarks.

Theoretical background

The consumer’s trust formation process is complex (Hung et al., 2021). Several factors, such as consumer beliefs, attitudes, perceptions, and trust in someone or a particular trait play a significant role in regards to influencing consumers’ trusting beliefs (Kim et al., 2008). Various categories of trusting beliefs in this regard have been defined in the literature, which are related to the nature of trust (disposition to trust), trust in a situation or structure (institutional trust), and interactive trust, which is also known as interpersonal trust (Zhu et al., 2020). Recent research posits that trust is established through the act of willingly placing one’s faith in a trustee, be it an individual or an organization. To achieve this, one must take into account the trustee’s traits, accept their data usage strategies, and accept that one cannot completely control the outcomes (Zhu et al., 2020; Merhi et al., 2021; Ghouse et al., 2022). However, there are some recent studies that indicate the significant role of information clarity and inputs, such as textual descriptions and pictures created by sellers on their websites in influencing customer trust on e-commerce sites (Nghiêm-Phú and Bagul, 2020). This may indicate the seller’s willingness to make the process transparent and ethical.

Trust is not a new component when it comes to e-commerce (Bandara et al., 2020). Several theories and/or models show how different kinds of behavior affect the process of creating trusting beliefs (Leonard and Jones, 2021; Chawla and Kumar, 2022). Some studies outlined the notion of trust in critical theory that elaborates trust as a concept of fetishism by describing it as the trust that reaches the status of an independent entity that controls human perceptions. Another is reification, which is typically viewed as a set of widely accepted yet one-sided views that influence trust (Joseph-Vaidyan, 2008). The positive side of critical theory indicates rebuilding the consumers’ trust via reification or a particular ideology that influences the adoption of e-commerce platforms. The negative side subsequently summarizes the myopic approach to trust by focusing on one aspect while ignoring other aspects of trust in the process (Chen et al., 2013). Sharma and Lijuan (2014) propose that critical theory posits that the ethical performance of an e-commerce website will promote trust, leading to an improvement in consumer commitment. However, to do so, e-commerce sites must improve communication platforms that provide customers with the opportunity to share feedback, receive after-sales services, and receive support. This enhances trust. According to past researchers in the area of e-commerce platforms, trust is generally treated as a fetish (Sharma and Lijuan, 2014). Due to this, e-commerce platforms are losing their ethical properties, hindering their ability to reach their maximum potential due to a lack of confidence from end consumers (Stahl, 2006). Thus, past studies suggest focusing on various aspects of trust, considering the role of institutions (sellers), platforms, the ethical and moral nature of trust, the role of information, and its evaluation, which are important aspects of the trust formation process (Nghiêm-Phú and Bagul, 2020; Ghouse et al. 2022).

Moreover, studies that are based on a grounded theory approach draw various aspects of trust, which developed foundations of consumer trust in an e-commerce environment. For example, Kang et al. (2015) and Zhu et al. (2020) concluded that privacy protection is one of the major concerns of consumers distrusting e-commerce websites by using a grounded theory approach. It was further discussed by Merhi et al. (2021) in the context of e-commerce sites that have a high possibility of unauthorized access and secondary data concerns for end users due to the high control of e-commerce agents and a lack of transparency and awareness. This, in turn, may influence the user’s trust linked to payments and other transactions.

A lack of information on privacy guidelines and ineffective legal enforcement are the few other crucial concerns that influence a user’s behavioral intention (Kang et al., 2015; Zhu et al., 2020). This concern is enhanced by a lack of information and the readability of privacy policies, which develop the consumers’ distrust of websites (Ermakova et al., 2014). The results of the previous studies offer significant theoretical contributions, which are accordingly based on well-known theories. A few recent studies discussed the significant role of perceived security and perceived privacy in the context of e-commerce sites, indicating the importance of personal data consumption transparency on consumer perception (Dogra and Adil, 2024).

The social contract theory (SCT) draws attention towards a trust-risk framework that influences perceptions towards e-commerce platforms (Featherman and Hajli, 2016). The theory has been used in offline services and recently with respect to online services in order to understand the moral and ethical behavior in digital communities or platforms (Levine, 2019). According to SCT, there is both a positive and a negative side to the digital revolution and the rapid distribution of data on e-commerce platforms. On the one hand, it promotes a strong digital environment and an empowered, hyper-information-connected environment to boost the sharing of economic concepts. However, there are major concerns related to compromising sensitive information and disrupting the privacy of end users at the cost of sharing knowledge and information. These platforms, which were created for the benefit of users, have now been used for selfish motives (Liaropoulos, 2020). The theory suggests that to develop trusting beliefs, trustworthiness, and social cooperation, digital communities need to develop norms that are related to privacy, information integrity, and confidentiality, while displaying the use of hyper-norms, which include regularizing policies, in order to build consumer trust. Since e-commerce includes a higher level of privacy or confidentiality risk (Dogra and Adil, 2024), customers pay close attention to these aspects and regulations. In other words, according to the SCT, trusting beliefs among customers can be developed by the implementation of certain privacy or legal norms. E-commerce websites should stress privacy guidelines and display their data usage policies and legal initiatives that are in line with the customers’ beliefs and expectations, which is the opinion of Gulati et al. (2012) and Liaropoulos (2020). This increases customer intent in regards to utilizing these sites. The social contract theory is relevant in the present study, because it can be used in order to assess the users’ digital trust, which influences their choices and preferences. Moreover, the findings from the previous studies showed that SCT significantly explains a number of different types of ethical and normative beliefs of the consumers towards e-commerce privacy norms, user’s confidentiality norms, data usage norms, and other requirements (Featherman and Hajli, 2016; Levine, 2019). This provides an understanding of the digital businesses’ responsibility and cooperation that are required for building consumer trust on these types of platforms.

Security issues in e-commerce platforms were also outlined in several of the previous studies (Hou, 2019; Hajli, 2019; Chawla and Kumar, 2022). It was accordingly observed that consumers are often exploited by their contracting partners, which are e-commerce firms in this case, and there, therefore, is a need for consumer protection norms (Hou, 2019). Furthermore, previous studies suggested that consumers are considered to be the weaker party according to the exploitation theory (Poon, 2008). The argument goes that while corporations can take advantage of complexities and conditions to their advantage, customers are required to abide by the contractual terms set forth by e-commerce platforms (Ghouse et al., 2022). The prevalence of these issues is greater in online markets compared to face-to-face purchases. Furthermore, a lack of information and discrepancies in knowledge also affect the consumers’ bargaining power in e-commerce platforms (Chawla and Kumar, 2022). Consumer privacy and personal data are in need of certain security. However, the massive growth of e-commerce businesses and increased competition in recent years reject the claims of the exploitation theory, which indicates the high negotiating power of consumers in today’s digital world (Alonso-Garcia et al., 2021). According to Siciliani et al. (2019), consumers expect transparency in online processes and a strong protection framework by e-commerce firms. This is explained by ET, which promotes online market transactions and suggests strong protection and privacy laws for consumers in order to develop trust in e-commerce (Poon, 2008). Therefore, it is imperative for e-commerce companies to establish robust commercial and legal contracts and further communicate them to their customers for their awareness, which is crucial in fostering confidence between buyers and sellers (Nghiêm-Phú and Bagul, 2020; Chawla and Kumar, 2022). The current investigation discovered that consumer trusting beliefs are based on the fundamental principles of social contract theory (SCT) and ET.

Theoretical gaps related to trust in e-commerce platforms

There is an abundance of literature available on the use and adoption of e-commerce platforms or websites (Sfenrianto et al., 2018; Wei et al., 2018; Misra et al., 2020, 2022). A large variety of dimensions and antecedents of adoption were developed, and their predictive potential was evaluated in order to explain the behavioral intentions of consumers who use e-commerce sites (Suh and Han, 2003; Wei et al., 2018). The previous studies show that trust is one of the most important dimensions that affect how individuals perceive things and conduct online transactions (Sfenrianto et al., 2018; Yu et al., 2022). The activities and behavior of suppliers in an online market are highly unexpected, and they are beyond the control of consumers, which makes it extremely risky for consumers to purchase from or engage in any trade with a supplier. This leads to the avoidance of online markets for shopping (Chawla and Kumar, 2022). However, trust is found to be the most effective way of eliminating the consumers’ doubts and develop loyalty towards e-commerce (Hou, 2019; Siciliani et al. 2019). According to Zhao et al. (2020), trust is more necessary in online trades than in physical transactions, because both parties, which include buyers and suppliers, are uncertain about trades, contracts, and assurances. It is, therefore, essential to comprehend trust and the factors that influence it for the development of e-commerce. The technology acceptance model (TAM), the unified theory of acceptance and the use of technology (UTAUT), the theory of planned behavior (TPB), the theory of reasoned actions (TRA), and the expectation confirmation theory were used in pursuit of understanding how well technological and sociological components work in regards to developing trusting beliefs in an e-commerce setting the previous studies theoretical frameworks (Zhao et al., 2020; Misra et al. 2022). Despite the availability of academic literature on understanding the impact of trust on consumers’ beliefs and attitudes (Singh et al., 2020), there is a lack of this type of academic literature in the context of e-commerce (Lin and Lu, 2000; Suh and Han, 2003; Levine, 2019).

A few gaps were accordingly identified in order to streamline the current research, which are based on the current academic literature on the impact of trust on consumers’ beliefs in the context of e-commerce. First, past studies considered trust as one of the antecedents of a user’s perception along with other technological, behavioral, and social factors (Han and Li, 2020; Misra et al., 2022). The researchers included perceived trust in order to explain a single aspect of a consumer’s trust perception due to this. For example, few studies only discussed privacy concerns while using a new service or technology (Hajli, 2019; Sinha and Singh, 2019). Others discussed the ethical and moral issues that may influence trust (Aeron et al., 2019; Chawla and Kumar, 2022). Furthermore, some studies explained the consumers’ views on data misuse that affected their intention to use e-commerce (Bandara et al., 2020; Zhu et al., 2020; Agrebi et al., 2022). There are only a few studies, to the best of our knowledge, that included trust as a main variable and elaborated on various dimensions of trust, particularly in an e-commerce context. Second, most of the findings among the previous trust-based studies were found to be descriptive in nature, which generally discussed the researchers’ views, privacy policies, and awareness level, or they were literature reviews that assessed the nature and dimensions of trust (Levine, 2019; Bandara et al., 2020; Chawla and Kumar, 2022). However, a few studies suggested certain antecedents of trust or distrust, which included information quality, word of mouth, perceived readability, consumers’ regulatory expectations, transparency, and security protection (Ermakova et al., 2014; Featherman and Hajli, 2016. Moreover, these types of studies are scattered and limited to one or few dimensions. Nevertheless, the authors of the present study found the study by Suh and Han (2003) to be significant, because the authors outlined various elements of the consumers’ perceptions and awareness about security controls, such as authenticity, confidentiality, privacy, and information integrity, which influence the trust and usage of e-commerce sites. The present study is influenced by Suh and Han's (2003) (Enaizan et al., 2020) findings, and this research extends their study by adding the consumers’ perceptions about other aspects that are related to awareness about privacy and secondary data usage in an Indian context. Third, our study further contributes to the academic literature by comparing the trusting beliefs of varied consumers based on their demographics, which include gender, age, and frequency of use of e-commerce platforms. The present study offers important theoretical and practical implications because there are very few studies in this specific context (Yoon and Occena, 2015; Han and Li, 2020).

Conceptual model

Figure 1 describes the conceptual model of the study. The study proposes the direct effect of awareness about privacy protection, information confidentiality, preventing unauthorized secondary data usage, and perceived information integrity on the consumer’s trusting beliefs. The study further examines the mediating effect of trusting beliefs and the moderating effect of gender, age, and frequency of use of consumers on the proposed relationships.

Fig. 1: Determinants of consumer privacy concerns on e-commerce following social contract theory and ET.
figure 1

Awareness about privacy protection: privacy policies guided by e-commerce sites are clear and understood by the customers; perceived information confidentiality: consumers belief their personal data to be protected by e commerce website from unauthorised access, storage, or manipulation; preventive unauthorised secondary data usage: customers concern about secondary usage of their personal data without their consent; information integrity: buyer confidence that an e-service provider is competent, trustworthy, and will keep the transaction's commitment; trusting belief: trusting belief is an understanding of privacy protection policies led by the company and self-regulatory mechanisms by the customer; behavioural intention: Behavioural intention refers to a customer's inclination or readiness to engage in a specific online shopping behaviour.

Awareness about privacy protection (Awareness) and trusting beliefs (Trust)

The research on privacy has recently become an important topic in the field of information systems as a result of the expansion of personal data collecting by Internet corporations and numerous data breaches (Harborth and Pape, 2020). According to the theoretical framework of the SCT, the study posits that any misuse of the users’ information constitutes a breach of the psychological agreement between the users and the service (Hoffman et al., 1999). This breach has significant consequences because it undermines the users’ trust and influences their behavior (Malhotra and Kubowicz Malhotra, 2011). This leads to the need for privacy protection standards that ensure that the users’ personal information that is collected from online interactions can’t be shared without their knowledge and/or approval, which indicates virtual agreement among both parties (Kim et al., 2021; Alonso-Garcia et al., 2023). Studies following ET observed that privacy protection statements are one of the significant factors that influence consumer trust with websites (Esmaeilzadeh, 2020). According to the ET, a clear and transparent privacy policy increases consumers’ trust, which in turn reduces privacy concerns and significantly influences decisions. Callanan et al. (2016) stated that users with high awareness about privacy policies are found to be more inclined towards using online services. If privacy policies are clear and understood, customers feel secure entering into a virtual agreement with high trust (Bandara et al., 2020). However, privacy concerns due to a limited understanding of privacy policies might, on the other hand, have a negative impact due to a breach of the social contract. This causes individuals to respond negatively as a result of diminished levels of trust when asked for personal information in an online setting (Adhikari and Panda, 2018). The following hypothesis is proposed, which is based on the arguments above.

H1: Awareness about privacy protection has a positive impact on trusting beliefs.

Perceived information confidentiality (Confidentiality) and trusting beliefs

Perceived information confidentiality is defined as the subjective probability that consumers believe that their personal information will not be viewed, stored, or manipulated during transit or storage by inappropriate parties (Sarkar et al., 2020). According to the SCT, e-commerce platforms enable a virtual agreement between the platform and users, which has implicit and explicit terms and conditions (Malhotra and Kubowicz Malhotra, 2011). There are social and moral obligations to protect the users’ privacy and data confidentiality, which affect the users’ trust and usage of a service if breached (Callanan et al., 2016). Confidentiality breaches occur when someone controls the dissemination of information that another person wants to keep private. (Adhikari and Panda, 2018). It relates to the security aspect of private information that is stored in databases, which “restricts the information flow in terms of what is externalized and who gets to see it” (Tawalbeh et al., 2020). Research indicates that the assessment of users’ trust is significantly influenced by the level of information confidentiality (Sarkar et al., 2020). The economic theory indicates that enhancing consumer trust is widely recognized as a crucial aspect, whereas the implementation of technical protections and a heightened level of authentication assurance can contribute to its improvement (Kim et al., 2010).

Concerns for confidentiality usually occur at the stage where private data has been disclosed and stored in a database. Hattingh et al. (2015) observed a lack of perceived confidentiality as a barrier to using the service. The level of access to the consumers’ sensitive private data may influence the users’ actions. Full access may have a negative effect from a confidentiality point of view (Malhotra and Kubowicz Malhotra, 2011). On the other hand, an additional layer of security and regulatory frameworks of confidentiality may positively influence trust and enhance the users’ purchases from these websites (Tawalbeh et al., 2020). The existing literature on SCT and ET suggests that customers tend to have a greater sense of trust in the security of their personal information when measures are in place in order to prevent unauthorized access and secure sensitive data (Zhu et al., 2020). Secure information sharing is expected to have a positive impact on trust in a collaborative environment (Ghondaghsaz et al., 2022). The following hypothesis is proposed, which is based on the arguments above.

H2: Perceived information confidentiality has a positive impact on trusting beliefs

Preventing unauthorized secondary data usage (PUSDU) and trusting beliefs

Users are concerned about unauthorized access to personal information due to security vulnerabilities or a lack of data security policies (Eastin et al., 2016). The threat of secondary use or the reuse of their personal information for unrelated purposes without their knowledge is the issue that agitates customers (Chen and Liu, 2015). Secondary data usage (SDU) includes disclosing to third parties what belongs to different parties/businesses when the customer provides their personal information. An SDU also involves combining a consumer’s transaction data and other personal information in order to build a profile (Khan, 2016). The literature proves both the unauthorized sale of their private information to third parties and the misuse of their personal data as main barriers to the users’ using the service (Tawalbeh et al., 2020; Zhu et al., 2020). Studies confirmed the negative association between ambiguous privacy policy dimensions and the users’ trust, which indicates the need for a transparent policy framework in order to enhance trust in the system (Sarkar et al., 2020). According to Esmaeilzadeh (2020), a clear policy on preventing secondary data and third-party usage is likely to convince users to share the right amount of information in order to meet the needs of the providers. This is possible when the users’ trust the system to offer transparent privacy policies (ET) and agree to the terms (Kim et al., 2021).

Studies that follow the SCT explain that when users experience dishonesty, which includes the unauthorized or illegal secondary use of their personal and sensitive information, they may predict that relying on the system is not wise (Markos et al., 2023). This reduces their trust, which will lead them to remain dishonest in regards to exchanging the correct information in the future, or it may cause them to discontinue the usage of the services (Meinert et al., 2006). The customers’ decisions to transact in the world of e-commerce are influenced by data vulnerability, which provides the key mechanism in regard to preventing and eliminating potential unauthorized secondary data usage that could increase their trust (Chen and Liu, 2015). The following hypothesis is proposed based on these arguments.

H3: Preventing unauthorized secondary data usage will have a positive impact on trusting beliefs.

Information integrity and trusting beliefs

Another key concept in e-commerce security is information integrity. Integrity reflects “the buyer’s confidence that an e-service provider is knowledgeable and trustworthy and will uphold the terms of the transaction’s commitment” (Hang and Kim, 2019; Alonso-Garcia et al., 2023). Credibility, consistency, dependability, and reliability are the elements of integrity belief (Bandara et al., 2020; Özbölük and Akdoğan, 2022). SCT, which is based on a core ethical principle of privacy and security (Rinta-Kahila and Soliman, 2017), explains it by associating it with information security and commitment towards a contract. Information security is based on the three fundamental dimensions of information quality, which include integrity, availability, and confidentiality. Integrity ensures information authenticity among these (Loch et al., 1992). ET explains the concept of information integrity in a business context from a formal and legal standpoint, which pertains to the protection against unauthorized modifications or the deletion of information with a primary focus on guaranteeing the authenticity of the information (Markos et al., 2023). If firms fail with this, the ramifications of this may have a detrimental impact on the integrity and trustworthiness of the online service (Meinert et al., 2006). According to previous studies, users are more willing to trust online businesses that have strong data integrity policies. (Bandara et al., 2020; Markos et al., 2023). Information integrity, which includes information that is accurate, current, and relevant, helps in order to lower the levels of perceived ambiguity and risk that are associated with an e-commerce transaction (Meinert et al., 2006; Misra et al., 2022). According to Özbölük and Akdoğan (2022), the reliability of online sources has a significant role in regard to shaping customers’ trusting beliefs. We contend, in view of this, that information integrity and trust beliefs have a positive relationship.

H4: Information integrity has a positive impact on trusting beliefs.

Trusting beliefs and behavioral intention to use (BI)

Online trust has drawn a lot of attention in numerous consumer behavior studies, particularly in the context of SCT and ET (Siciliani et al., 2019; Markos et al., 2023). It is the product of several privacy and security aspects of service. It is imperative to comprehend the concerns that arise between service providers and users regarding privacy and to address these concerns by ensuring integrity and confidentiality, which is the social contract theory. It is additionally crucial to promote transparency within the system by establishing and validating privacy rules, which is the economic theory. This helps in regards to building trust (Chawla and Kumar, 2022), which in turn enhances consumer usage of a service (Palvia, 2009).

Trust is crucial in e-commerce because it minimizes the perceptions of risk and uncertainty and increases the likelihood that people will make purchases (Chang and Chen, 2008; Lăzăroiu et al., 2020; Özbölük and Akdoğan, 2022). Consumers are generally more vulnerable to product or service uncertainty, specifically in an online environment (Yap et al., 2021). According to prior research, trust has a negative impact on perceived risk (Kim et al., 2009; Lăzăroiu et al., 2020), but it has a favorable impact on attitudes toward online buying (Palvia, 2009). The unauthorized use of personal data, the compromise of data integrity, and the violation of information confidentiality are regarded as violations of the social contract (Xu et al., 2005). These breaches consequently have a detrimental impact on trust, which result in a state of skepticism and distrust among customers. This state of distrust poses challenges in regards to establishing online trust, and it indicates a lack of willingness to participate in the process (Head and Hassanein, 2002; Santo and Marques, 2021).

On the other hand, privacy protection policies and self-regulatory mechanisms build consumers’ trust beliefs (Xu et al., 2005), which reduce uncertainty, foster loyalty through word-of-mouth, and positively affect the consumers’ attitudes and behavioral intentions towards making online purchases (Santo and Marques, 2021). Özbölük and Akdoğan (2022) believe that the perceived trustworthiness of consumers towards source credibility has a favorable impact on consumer purchasing decisions. Creating trust in e-commerce might increase a user’s attitude and behavioral intention toward using a specific website for purchases (Raman, 2019). The customers’ trust and favorable attitude toward a certain web shop are positively correlated with their intention to use this type of web store (Raman, 2019). The following hypothesis is proposed based on these arguments.

H5: Trusting beliefs have a positive impact on behavioral intention to use.

Moderating impact of gender

The previous research witnessed that gender significantly influences the behavior of users towards privacy and security concerns that influence their usage patterns, preferences, and general web accessibility (Correa, 2016; Molinillo et al., 2021). According to the research, male users are more comfortable using ICT and managing privacy and security-related issues (Meng et al., 2021). Further, the concerns related to privacy and data confidentiality are found to be more prevalent among female users in the context of digital and electronic services (Molinillo et al., 2021). Women are shown to be less inclined than men in regard to divulge personal information, such as phone numbers and addresses (Chi and Han, 2021; Meng et al., 2021). Further, women are found to be more concerned with privacy protection behavior and the sharing of personal information than men, which indicates low awareness and low trust among women consumers towards privacy norms with online services (Hoy and Milne, 2010; Shao et al., 2019). A recent study demonstrated that both genders are willing to share the same amount of information, however, males were shown to be substantially more concerned with cyberattacks (Zwilling et al., 2022).

According to Merhi et al. (2021), trust is an important consideration in the context of electronic markets due to the inherent risk and privacy concerns associated with these platforms. User’s trust may get affected by the data breach or unauthorized issues linked with payments and other transactions. According to previous studies, male and female buyers perceive and behave differently when assessed on personal information control, which is due to the growing relevance of e-commerce and privacy protection behaviors (Ghouse et al., 2022). This may have a different influence on their trusting beliefs. According to past studies, women read privacy policies more than men, and they can have better controlled behavior (Sheehan and Hoy, 1999). In contrast, a recent investigation found that men exhibit a larger predisposition towards accepting surveillance and engaging in privacy protection measures than women, hence having high trust in more sensitive online applications like banking (Balapour et al., 2020; Merhi et al., 2021). It is further suggested that male customers possess a heightened need in regards to monitoring and place greater trust in these types of practices (Ioannou and Tussyadiah, 2021). The following hypotheses are proposed, which are based on these arguments.

H6a: The relationship between awareness about privacy protection and trusting beliefs is significantly different by gender.

H6b: The relationship between perceived information confidentiality and trusting beliefs is significantly different by gender.

H6c: The relationship between preventing unauthorized secondary data usage and trusting beliefs is significantly different by gender.

H6d: The relationship between information integrity and trusting beliefs is significantly different by gender.

H6e: The relationship between trusting beliefs and behavioral intention to use is significantly different by gender.

Moderating impact of age

Since the younger generation grew up in the digital era, they might have greater levels of faith in online resources and technology. They frequently have more experience with conducting digital transactions and disclosing personal information online (Herrando et al., 2019). As per recent studies young people’s digital interaction is increasing year after year. Social networking sites play an important part in their personal and professional interactions, and they have a high percentage of digital abilities (Herrando et al., 2019; Meng et al., 2021; Nghiêm-Phú, 2022). Younger and older age groups differ significantly in their perceptions, motivations, interests, and attitudes (Shin and Kang, 2016; Manosuthi et al., 2020; Meng et al., 2021; Untaru and Han, 2021) towards digital technology. According to Meng et al. (2021), individuals belonging to the younger demographic exhibit a notable level of self-assurance in their ability to effectively navigate a diverse range of information and communications technology (ICT) duties. Younger cohorts are found to be more proficient in various computer and internet-related tasks like office applications, active involvement in several brand communities, and a comprehensive comprehension of the complexities that are associated with online shopping (Castillo de Mesa et al., 2020). Certain research suggests that older cohorts exhibit lower levels of confidence when it comes to disseminating content and safeguarding the privacy of the content that they publish (Poon, 2008; Malik et al., 2016). The older generation is more concerned about information sharing, particularly in the context of e-banking services (Poon, 2008). Ethical principles and legal frameworks are critical in protecting information confidentiality for older individuals (Chung et al., 2016). Younger persons, on the other hand, demonstrate lower levels of anxiety in terms of privacy-related concerns, and they exhibit an elevated level of confidence with respect to posting content on social media as well as making payments in online shopping (Lissitsa and Kol, 2021). Previous studies also reported that increased Internet use and active participation in a variety of online activities, like online shopping, result in positive attitudes and higher levels of trustworthiness toward the Internet (Santo and Marques, 2021; Castillo‐Abdul et al., 2022). This is most likely due to young users being typically more engaged and active in a variety of Internet activities, such as sharing photos and videos, playing online games, sharing online shopping experiences, and participating in various forms of social networking and online forms of communication (Muscanell and Guadagno, 2012; Ghazali et al., 2016). The previous studies additionally show that younger users are more knowledgeable about privacy-related issues (Lissitsa and Kol, 2021), and they also discuss ICT-related issues and subjects with their peers (Malik et al., 2016). The following hypotheses are built on the preceding arguments:

H7a: The relationship between awareness about privacy protection and trusting beliefs is significantly different by age group.

H7b: The relationship between perceived information confidentiality and trusting beliefs is significantly different by age group.

H7c: The relationship between preventing unauthorized secondary data usage and trusting beliefs is significantly different by age group.

H7d: The relationship between perceived information integrity and trusting beliefs is significantly different by age group.

H7e: The relationship between trusting beliefs and behavioral intention to use is significantly different by age group.

Moderating impact of frequency of use

The three factors that influence the adoption of security and privacy technologies are knowledge and experience derived from frequent usage, awareness of security threats, and motivation to use security tools (Kang et al., 2015). Individuals who use digital platforms frequently are more conversant and at ease with digital technologies. The frequency of engagement in digital transactions might aid in a sense of trusting belief (Merhi et al., 2021).

The frequency of use is regarded as a behavioral variable that can be influenced by the characteristics of a platform and its perceived value (Molinillo et al., 2021). However, further studies also indicated that users’ views may evolve with time due to high use and interactions with the service (Amin et al., 2008; Aldas-Manzano et al., 2011). As people get more Internet expertise, their concerns about online information privacy may lessen. This is due to growing awareness about online privacy practices (Wu et al., 2020).

It is also demonstrated that a strong relationship exists between trust and Internet use as well as prior Internet experience (Molinillo et al., 2021). Studies also claim that the usage and familiarity with computers are both favorably correlated with their ICT self-efficacy, which in turn enhances trusting beliefs and more confidence towards privacy and data usage (Tondeur et al., 2011). Contrary to a previous study, Aldas-Manzano et al. (2011) discovered that frequent use can diminish the impact of trust on consumer behavior. This occurs because consumers may rely more on their own experiences rather than trust when perceiving benefits. According to Efe (2015), students who frequently utilize the Internet demonstrate enhanced levels of self-efficacy and comprehension of online security norms. According to Carlson and O’Cass (2011), a positive correlation exists between the frequency of Internet usage and confidence in privacy standards and the ability to use online services. More Internet-savvy users were more inclined to change their social media site privacy settings (Malik et al., 2016; Radic et al., 2022a). The more knowledgeable and frequent the Internet users are, the more concerned they are with privacy and security policy. Users who are knowledgeable about cyber and other data security challenges will devote more time to understanding data security strategies such as safeguarding personal information, refraining from visiting specific websites, and identifying fake information (Öğütçü et al., 2016). The following hypotheses are postulated based on these arguments.

H8a: The relationship between awareness about privacy protection and trusting beliefs is significantly different by frequency of use.

H8b: The relationship between perceived information confidentiality and trusting beliefs is significantly different by frequency of use.

H8c: The relationship between preventing unauthorized secondary data usage and trusting beliefs is significantly different by frequency of use.

H8d: The relationship between perceived information integrity and trusting beliefs is significantly different by frequency of use.

H8e: The relationship between trusting beliefs and behavioral intention to use is significantly different by frequency of use.

Methods

Research design

This study adopted a positivistic paradigm, which is where the researcher acts as an unbiased observer who is detached from distinguishing phenomena and is in pursuit in order to quantitatively measure reality in a society that is constantly developing and changing (Shabani, 2020). Positivism with its rigid approach is accordingly adequate for theory testing (Liyanage, 2022), because its’ tenets are grounded on the hypothetico-deductive method in order to demonstrate the truth of a priori hypotheses (Vos, 2023). Furthermore, the action research strategy was used in this research, because action research is a complex, analytical, comprehensive, contextual, and prospective synergetic approach towards problem-solving where problem solutions are respectful (Bowling, 2023). A cross-sectional time horizon was decided on because it is felicitous for studies that are attempting to comprehend the consumers’ behavior that is concealed by the ascendancy of various variables (Gupta and Singh, 2020) as a researcher's interest is related to the fixed image of a phenomenon that does not require multiple data collection (Fernandes et al., 2020). Lastly, covariance-based structural equation modeling (CB-SEM) was applied in order to evaluate the research model. CB-SEM is an augmentation of the conceptualization of the multiple regression method (Akgül, 2019), and it is an effective tool in order to assess and strengthen contemporary theories and contrasting divergent theories (Hair et al., 2017). Moreover, CB-SEM was picked over partial least squares SEM (PLS-SEM), because CB-SEM calculates model fit statistics, which is a more suitable technique for confirmatory research. Also, it provides the reliability of constructs because it does not inflate correlations between them, works well with larger sample sizes, and offers identical benefits in regards to handling non-normal data, such as PLS-SEM (Collier, 2020).

Measures for the study variables

The survey contained a mix of multi-item measures. The scale items for this study were accordingly adopted from previously validated measurement items, and they were anchored using a 7-point Likert scale, which ranged from (1) strongly disagree to (7) strongly agree. Moreover, the scale adoption that was utilized in this study meets the criteria that were set forward by Pillet et al. (2023), which includes where deliberate changes to the item phrasing were not performed. This study’s scale cognitive validity was more precisely not compromised by using the already validated scales, because the authors avoid any purposeful item wording adjustments. The scale ability in regards to generating unbiased responses was subsequently successful. Lastly, all the participants were fluent in the English language, so there were not any language issues with the questionnaire.

Awareness about privacy protection

It was proposed by Malhotra et al.’s (2004) and validated by Okazaki et al. (2020), and the three-item measure (AVE = 0.708 and CR = 0.878) evaluates the participants’ awareness about privacy protection. Furthermore, awareness about privacy protection was measured using companies seeking information online should disclose the way the data is collected, processed, and used (β = 0.924), a good consumer online privacy policy should have a clear and conspicuous disclosure (β = 0.858), and it is very important to me that I am aware and knowledgeable about how my personal information will be used (β = 0.731).

Perceived information confidentiality and risk of unauthorized secondary data usage

Perceived information confidentiality and preventing unauthorized secondary data were assessed using the eight loading items of Smith et al.’s (1996) and Malhotra et al.’s (2004) scales, which were validated by Okazaki et al. (2020) and Vimalkumar et al. (2021). Hence, perceived information confidentiality (AVE: 0.776, CR: 0.932) was measured by the following items. All communications with this site are restricted to the site and me (β = 0.884), I am convinced that this site respects the confidentiality of the transactions received from me (β = 0.919), this site uses some security controls for the confidentiality of transactions (β = 0.882), and this site checks all communications between the site and me for protection from wiretapping or eavesdropping (β = 0.836). Moreover, the risk of unauthorized secondary data usage (AVE = 0.874 and CR = 0.965) was assessed by online companies should not use personal information for any purpose unless it has been authorized by the individuals who provided information (β = 0.938) when people give personal information to an online company for some reason, the online company should never use the information for any other reason (β = 0.938), online companies should never sell the personal information in their computer databases to other companies (β = 0.940), and online companies should never share personal information with other companies unless it has been authorized by the individuals who provided the information (β = 0.924).

Information integrity and trusting beliefs

The three-item scale developed by Smith et al.’s (1996) and the five-item scale developed by Jarvenpaa et al.’s (1999) and Malhotra et al.’s (2004) were validated Merhi et al. (2019), Okazaki et al. (2020), and Vimalkumar et al. (2021), and they were utilized in this study. The participants were asked to rate their agreement with the items based on information integrity and trusting beliefs. The three-item scale that was used in order to measure information integrity (AVE = 0.809 and CR = 0.927) included online companies should take more steps to make sure that the personal information in their files is accurate (β = 0.882), online companies should have better procedures to correct errors in personal information (β = 0.889), and online companies should devote more time and effort to verifying the accuracy of the personal information in their databases (β = 0.918). Furthermore, the five items for measuring trusting beliefs (AVE = 0.760 and CR = 0.940) included online companies would be trustworthy in handling information” (β = 0.801), online companies would tell the truth and fulfill promises related to the information provided by me (β = 0.867), I trust that online companies would keep my best interests in mind when dealing with the information (β = 0.891), online companies are in general predictable and consistent regarding the usage of (the information (β = 0.903), and online companies are always honest with customers when it comes to using the information that I would provide (β = 0.892).

Behavioral intention

The four-item scale that was developed and validated by Lee et al.’s (2017) was used in this study in order to measure behavioral intention. The four items scale for measuring behavioral intention (AVE = 0.840 and CR = 0.955) included I intend to continue using this site in the future (β = 0.897), I expect my use of this site to continue in the future (β = 0.927), I will frequently use this site in the future (β = 0.923), and I will strongly recommend others to use this site (β = 0.919).

The minimization of a common method bias (CMB) of the self-administrated questionnaires was achieved by following the procedural and statistical strategies of Jordan and Troth (2020). All the respondents were knowledgeable with respect to the goal of the research and how the results would be used by looking at the procedural strategies. The questionnaire that was used was not substantial, the measurements did not extend over, the phrasing of the items was leveled cautiously, measures were adopted from divergent sources, and the questions presented were transparent and unambiguous (Jordan and Troth, 2020; Radic et al., 2022a). The aforementioned set of procedural remedies was confirmed in the recent studies by Radic et al. (2022b, 2022c) and Calder et al. (2022), so the issue of common method bias is unlikely to be of concern in this research. Furthermore, Harman’s one-factor test was applied from the statistical strategy, since Jordan and Troth (2020) highlight Harman’s one-factor test as one of the most common statistical approaches to test for CMB. Harman’s one-factor test points out problematic CMBs, which is due to the method (Fuller et al., 2016).

Data collection process and characteristics of the samples

A small pool of 50 participants, the initial respondents was selected using the personal administration method for pilot testing. The purposive sampling approach was used in combination with snowball sampling for the final sample collection. The purposive sampling is a non-probability sampling technique that provides rich data on specific phenomena within particular settings (Adu and Miles, 2023). The purposive sampling in this study accordingly provided a primary set of research participants because it permits the universality of the research population (Berget and Kvikne, 2022). The selection criterion for finding the most suitable applicants was online shoppers. The respondents were requested to send the invitation forward by using the snowball effect. Snowball sampling is another non-probability sampling technique that is often employed in context-specific studies where the participants are hard to find (Sharma, 2022). This study subsequently investigated specific consumers’ perceptions of IT ethics, which was followed by online commerce websites, so online surveys were considered appropriate. Moreover, we met the criteria for representativeness of the survey in relation to the variables that are outlined by Ochsner (2021) by adopting the purposive sampling technique because representativeness of online purposive sampling provides confidence that the researcher's findings are externally valid (Barratt and Lenton, 2015). A total of 780 responses were collected via online surveys using Google Forms links, which were sent via email, a WhatsApp group, and social media. The sample consisted of students, university staff, managers, consultants, and engineers coming from academic backgrounds that are diverse. The data was collected between August 2021 and September 2021. We removed the missing values and dishonest responses in order to ensure the authenticity of the data. Moreover, we determined whether there was a common method bias in the data via Harman’s single-factor test in order to ensure that the quality of the data was not misleading or biased. We conducted Harman’s single-factor test via SPSS 26.0. We defined all the variables as 1 single factor, and the result showed that the total variance of this factor was 36.882%, which was below the threshold criterion of 40% (Zhonglin, 2020), so the issue of a common method bias was not present in the dataset that was collected for this study. Finally, a total of 780 valid responses were used for the empirical analysis.

We used a frequency analysis in order to produce the following results, which are in response to the collected samples. 50.1% of the 780 participants who participated in the survey were male, and females accounted for 49.9%. The largest number of participants was below the age of 25, which included 56.7%. This was followed by the respondents between 25–34 years of age with 36.4%. 3.2% of participants were between 45–54 years of age, 2.9% of the participants were between 35–44 years of age, and the least number of participants were between 55 and 64 years of age, which totalled 0.89%. We found that graduates were the most numerous with 59.7% in regard to the education level, which was followed by post-graduates at 29.5%. The participants with other degrees totalled 9.4%, and the participants with a doctorate were the least with 1.4%. We found that the largest number of participants with more than 3 years of experience using the Internet totalled 82.4% in regards to the online experience of the participants. The proportion of participants with 2–3 years was 9.4%, and it was 4.4% for 1–2 years. The participants with less than one year had the least share with 3.8%. According to a Rakuten Insight survey (Statista, 2023) on online buying behavior in India that was conducted during June 2022, over 84% of consumers aged 16–44 years opted for e-commerce marketplaces, such as Shopee, Amazon, and AliExpress in order to shop online. Approximately 90% of the sample in our study is in the 18–44-year-old age category, which is somewhat close to the population. According to the Statista (2022) report, 72% of urban Internet users use the Internet on a daily basis. Nine out of ten users access the Internet at least once a week in metropolitan areas, and young users aged 16–29 are the most frequent users. This indicates that urban Indian strata have sufficient Internet exposure, which is also evident in our findings.

Results

Data quality testing using a confirmatory factor analysis

This study conducted a statistical analysis of the data sample by using both SPSS 26.0 and AMOS 26.0 programs and following Anderson and Gerbing’s (1988) two-step method. The measurement model was first developed by conducting a confirmatory factor analysis for the measurement items in this study. The measurement models were used next as the basis for developing structural equation models and testing the goodness-of-fit of the model. In addition, the variability of gender, age, and frequency of use were evaluated in the structural model for each path. The results are shown in Tables 1 and 2, and the fit indices of the measurement models exhibited satisfactory indices according to the confirmatory factor analysis (χ2 = 602.645, df = 215, χ2/df = 2.803, p < 0.01, NFI = 0.955, IFI = 0.964, CFI = 0.963, and RMSEA = 0.066). All measures had factor loading values between 0.731 and 0.938 (p < 0.01). The average variance extracted (AVE) and the composite reliability (CR) for each construct were greater than the recommended metrics of Hair et al. (2017) of 0.500 and 0.700, and the metrics range from 0.708 to 0.874 for AVE and from 0.878 to 0.965 for CR. The model can, therefore, be considered an ideal measurement model with good convergent validity and internal consistency. Furthermore, the correlation indices between each variable were lower than the √AVE value of each factor, which is illustrated in Table 1. As a result, the data of the research scales can be concluded to have excellent discriminant validity (Fornell and Larcker, 1981).

Table 1 Assessment of correlations.
Table 2 Confirmatory factor analysis evaluation.

Evaluation of the structural model and the indirect and total effects

Structural equation modeling, which was conducted using the test model, was used in order to test the goodness-of-fit and the hypotheses that were proposed by the research model. Also, the indirect effects in the model were also evaluated. This process we implemented using the AMOS 26.0 program. The results of the analysis showed that the goodness-of-fit statistics of the structural equation model exhibited well-defined indicators (χ2 = 585.317, df = 203, χ2/df = 2.883, p < 0.01, NFI = 0.975, RFI = 0.968, IFI = 0.983, TLI = 0.971, CFI = 0.982, and RMSEA = 0.049). The total variance in the data for trusting beliefs was 74.0%, and it was 79.9% for behavioral intention to use online e-commerce platforms, which indicated that the structural equation model had a satisfactory level of prediction for both trusting beliefs and behavioral intention to use. Each hypothesis in the model reflects the presence of significant effects. The relationships between awareness about privacy protection and trusting beliefs (β = 0.048* and p < 0.05), perceived information confidentiality and trusting beliefs (β = 0.473** and p < 0.01), preventing unauthorized secondary data usage and trusting beliefs (β = 0.060** and p < 0.01), perceived information integrity and trusting beliefs (β = 0.714** and p < 0.01), and trusting beliefs and behavioral intentions to use online e-commerce platforms (β = 0.713** and p < 0.01) were in particular positively significant, so Hypothesis 1, Hypothesis 2, Hypothesis 3, Hypothesis 4, and Hypothesis 5 were therefore supported.

The findings of the indirect and total effects that were tested for the structural equation model were as follows. There were indirect effects for two of the four indirect paths in total. These included perceived information confidentiality-trusting beliefs- behavioral intention to use the online e-commerce platform (β = 0.377** and p < 0.01) and perceived information integrity-trusting beliefs-behavioral intention to use the online e-commerce platform (β = 0.509** and p < 0.01). The results of the total effect showed, in contrast, that there were significant total effects of the remaining three variables on behavioral intention to use online e-commerce platforms except for awareness about privacy protection (βawareness = 0.034) and preventing unauthorized secondary data usage (βPUSDU = 0.043). Trusting beliefs (βtrust = 0.713**) had the largest total effect on behavioral intention, which was followed by perceived information integrity (βintegrity = 0.509**) and perceived information confidentiality (βconfidentiality = 0.337**). Detailed findings about the hypotheses and the indirect effects are reported in Table 3.

Table 3 Evaluation of structural model and indirect and total effect.

Comparison of the chi-square differences in regards to gender, age, and frequency of use

We divided the data into two groups according to the K-means cluster of the SPSS 26.0 program for gender, age, and frequency of use in order to examine the difference of gender, age, and frequency of use on each path of the study model. This means that gender was divided into male (n = 397) and female (n = 389), age was divided into low age group (n = 726) and high age group (n = 54), and frequency of use was divided into low frequency of use group (n = 437) and high frequency of use group (n = 343). After that, we imported the data of the three groups into the structural equation model in order to perform an invariance test to explore the differences. Nevertheless, the goodness-of-fit statistics of the three baseline models presented satisfactory results (Gender: χ2 = 963.532, df = 406, χ2/df = 2.373, p < 0.01, NFI = 0.959, RFI = 0.949, IFI = 0.976, TLI = 0.970, CFI = 0.975, RMSEA = 0.040; Age: χ2 = 964.673, df = 406, χ2/df = 2.376, p < 0.01, NFI = 0.955, RFI = 0.943, IFI = 0.971, TLI = 0.964, CFI = 0.970, RMSEA = 0.042; Frequency of use: χ2 = 979.354, df = 406, χ2/df = 2.412, p < 0.01, NFI = 0.958, RFI = 0.948, IFI = 0.975, TLI = 0.969, CFI = 0.974, and RMSEA = 0.043). However, all the hypotheses would not be significantly different depending on gender and age. For instance, gender and age were not significantly different in the research model of this study, so Hypotheses 6, which contains Hypothesis 6a, Hypothesis 6b, Hypothesis 6c, Hypothesis 6d, and Hypothesis 6e, and Hypothesis 7, which contains Hypothesis 7a, Hypothesis 7b, Hypothesis 7c, Hypothesis 7d, and Hypothesis 7e, were not supported. Also, the results of testing the frequency of use revealed significant differences in the two relationships between perceived information confidentiality and trusting beliefs (Δχ2[1] = 15.716 and p < 0.01) and preventing unauthorized secondary data usage and trusting beliefs (Δχ2[1] = 14.200 and p < 0.01). Thus, Hypothesis 8b and Hypothesis 8c were supported. More detailed outcomes of the analysis regarding the invariance test are illustrated in Tables 46.

Table 4 Assessment of comparative gender differences.
Table 5 Evaluation of age differences.
Table 6 Assessment of the moderating effect of frequency of use by using invariance test.

Discussion and implications

E-commerce platforms can be considered mercantile stores that are converted into online shop fronts for the sole purpose of trading goods and services over the Internet. Furthermore, e-commerce platforms allow various businesses to reach customers worldwide as well as execute sales and purchases that are made on the Internet. However, the e-commerce platforms represent ~1% of the worldwide retail market segment share, and 85% of that worldwide market segment share still resides in physical stores (Dabhade, 2022). It is of little wonder that in e-commerce, consumer trust plays an important role between consumers and suppliers because universal interchangeability and universal trust are the main characteristics of online value transfers (Radic et al., 2022a). Thus, there is great potential for e-commerce platforms to provide the best customer experience based on consumer trust by looking at the long-term future. The aim of this study was to consequently evaluate the mediating effect of trusting beliefs between various security measures and the behavioral intention to use e-commerce platforms. The study encompassed the following variables that included awareness about privacy protection, perceived information confidentiality, preventing unauthorized secondary data usage, information integrity, trusting beliefs, age, gender, and frequency of use in regard to measuring online shoppers’ viewpoints. The conceptual model deciphered the influencing predominance that was drawn out by the dependent variables behavioral intention to use e-commerce platforms (79.9%) and trusting beliefs (74.0%), which is consistent with the synopsized results. The aforementioned values demonstrate the conclusiveness of various variables with online shoppers’ behavioral outcomes.

Our study brought forward the relationship between awareness about privacy protection, perceived information confidentiality, preventing unauthorized secondary data usage, and information integrity with trusting beliefs in order to use e-commerce platforms in regards to the antecedents of trusting beliefs towards using e-commerce platforms. Information integrity is subsequently displayed as the most substantial antecedent (β = 0.714 and t = 19.675), which is followed by perceived information confidentiality (β = 0.473 and t = 15.747), preventing unauthorized secondary data usage (β = 0.060 and t = 2.588), and awareness about privacy protection (β = 0.048 and t = 2.024). Our research subsequently proposed the relationship between trusting beliefs and behavioral intention to use e-commerce platforms with respect to behavioral intention to use e-commerce platforms. Trusting beliefs were displayed as a robust antecedent (β = 0.713 and t = 17.442) of the behavioral intention to use e-commerce platforms.

This study’s findings exhibited that awareness about privacy protection has a robust impact on online shoppers trust beliefs towards e-commerce platforms. This is due to the fact that many countries have enforced laws on personal data protection and privacy, which brings them in line with the global data protection standards. The consumers’ awareness about privacy protection boosted the consumer's trust beliefs towards e-commerce platforms, which is vital for the modern digital economy, international financial transactions, and various online services. Moreover, as governments legally recognize online consumers’ rights and enforce legal consequences to the violators, trust beliefs towards e-commerce platforms are growing, because consumers are protected by fundamental human rights (Cheon, 2019). Perceived information confidentiality is needed because there is too much information about a person in the public domain without it, which could be a source of discomfort. The comfort level grows and the willingness of consumers to share personal details grows with it as the consumer and e-commerce platforms establish trust based on information confidentiality. The heart of every e-commerce retail strategy is the consumer data. As a result, e-commerce platforms must secure consumer information confidentiality, since strong and healthy relationships are built on trust (Goundar et al., 2021). The results of our study show that online shoppers have strong trust beliefs towards e-commerce platforms that have well-established measures in regard to protecting the consumers’ personal information, which is in relation to preventing unauthorized secondary data usage. This finding corresponds with a KPMG study that was conducted using 18,000 online consumers in 50 countries, in which 41% of the respondents outlined the paramount importance of having control of their personal data secondary usage (KPMG International, 2017). This study’s findings exhibited that information integrity has a robust impact on the consumer's trust beliefs. Consumers need to be confident that e-commerce platforms will responsibly protect their personal data, or the consumers will not provide access to it. Trust is developed once this relationship is established, and so long as the e-commerce platform continues to deliver on this trust and even exceeds, its value proposition increases and the relationship continues to grow. This is due to the fact that information integrity is one of the key attributes of trust in e-commerce (Li and Chau, 2018; Cuesta-Valiño et al., 2022). The importance of consumer trust cannot be understated, and once it’s lost, which is like with any human relationship, it’s very difficult to regain. As a result, e-commerce platforms need to be thoughtful about how they obtain consumers' data and what they do with it because consumers' trust beliefs are essential toward behavioral intention to use e-commerce platforms. Moreover, consumer trust is also the pathway regarding how e-commerce platforms obtain meaningful data, which is necessary to drive consumer loyalty (Cuesta-Valiño et al., 2022; Nghiêm-Phú, 2022).

Finally, the present study confirmed the moderating effect of frequency of use on perceived information confidentiality and preventing unauthorized secondary data usage on trusting beliefs in regards to the subject of the moderating effects. Our study results are supported by Li and Chau (2018), who argue that with a higher frequency of use, the consumers’ overall online shopping competence grows. Also, if e-commerce platforms deliver on their promise of consumers’ information confidentiality and do not misuse secondary data usage, the consumers’ confidence in the e-commerce platform flourishes, which ultimately increases the consumers trusting beliefs.

Theoretical implications

Firstly, this research aimed to test a conceptual model between the consumers’ perceptions of security and how those perceptions may affect the consumers’ behavioral intention to use e-commerce platforms. The proposed model variables were more precisely drawn from social contract and economic theories because the mediating effect of trusting beliefs between various security measures and the intention to use e-commerce platforms was examined. The proposed model accordingly explains 79.9% of the variance in the behavioral intention to use e-commerce platforms, whereas trust beliefs had robust explanatory power for an online consumer’s behavioral intention to use e-commerce platforms, which explained 74.0% of the variance.

Second, this study is an early attempt to use age, gender, and frequency of e-commerce platform usage on the consumers' trusting beliefs and subsequent behavioral intention to use e-commerce platforms. The COVID-19 pandemic boosted the growth rate of e-commerce (Misra et al., 2022), and the growing adoption of e-commerce also increases the importance of studying the moderating role of age, gender, and frequency of e-commerce platform usage while examining the potential barriers to adopt e-commerce platforms. The results of the moderating effects demonstrate the need for additional research on the frequency of e-commerce platform usage. This study could accordingly offer a base model to various upcoming studies in order to distinguish barriers in regard to the consumer’s consumers’ perceptions of security and how those perceptions may affect the consumers’ behavioral intention to use e-commerce platforms.

Third, our findings show that the various security measures are the antecedents of the consumer’s trusting beliefs, which in return have a direct positive impact on behavioral intention to use e-commerce platforms. This study sheds light on the aforementioned relationship and how e-commerce relationships based on trust beliefs could be enhanced while identifying an approach that deserves additional academic attention.

Practical implications

This study has several distinctive practical implications. First, the result of this study offers practitioners insights in regards to increasing trust in e-commerce platforms. Our findings unveiled that e-commerce platforms enhanced security features based on the protection of personal data and transparent consumer protection rules and addressed that the responsibility of personal data secondary data usage promotes the consumer’s trusting beliefs in regards to using e-commerce platforms and consumer’s engagement in economic transactions. Thus, once the aforementioned enhanced security features are met and the consumer’s trusting beliefs in regards to using e-commerce platforms are elevated, e-commerce platforms can create positive consumer experiences based on the obtained consumer data, because they have the knowledge of what their consumers like, what they don’t like, and why they are engaged with an e-commerce platform. The security features of e-commerce platforms can subsequently strengthen the positive consumer experience because consumers can harvest all the benefits of the product portfolio (Cuesta-Valino et al., 2023). Furthermore, e-commerce platforms should constantly communicate with their consumers in regard to privacy protection, information confidentiality, preventing unauthorized secondary data usage, and information integrity by answering consumer questions and addressing any concerns in order to keep the consumers engaged (Rohden et al., 2023). This way the e-commerce platforms will understand what consumers are trying to convey by demonstrating the commitment to finding answers and then sharing every part of them in order to create a trustful experience-led consumer journey.

Second, the e-commerce platforms that clearly outline their state-of-the-art data security systems, protocols, and processes that ensure that consumer data is completely safe and secure are a step closer to creating a first good impression in regards to building trust on an e-commerce surface. Various difficulties during the implementation process of customer-company relationships, such as the use of e-commerce platforms, could accordingly be mitigated by implementing better marketing-oriented processes that are based on consumers trust beliefs that can enhance values for those that are related to marketing management (Alonso-Garcia et al., 2023). Moreover, e-commerce platforms should frequently update data and post security features on their social media platforms. Hence, this way, the e-commerce platforms would provide high-quality valuable content that builds trust among their consumers.

Third, companies frequently do not disclose to customers that they are using their data in alternative ways. They acquire and analyze secondary data in order to better target potential buyers. According to our findings, trust is a critical facilitator. The more people trust a brand, the more likely they are to provide their data. Usage transparency and the protection of the consumers’ secondary data build trust. The demand for Internet privacy is increasing, so progressive businesses now view privacy as a competitive advantage. Companies should guarantee that basic contract rules drive website interactions in order to establish trust. Privacy policies should also spell out the fundamental parameters of the agreement. An e-commerce company should respect the privacy of its customers and secure it with robust encryptions and stringent standards that govern how the data is handled. Companies should be transparent when sharing personal or profile information with customers and obtain their permission before sharing it with third parties. It is suggested that these websites prioritize their effectiveness and highlight their security features in order to enhance security features and boost consumers’ trust in e-commerce platforms. They may additionally consider developing a new section on their website in regards to raising awareness about and addressing data security and privacy issues. Furthermore, these sites may use some new technologies, such as blockchain in order to improve the security of the transactions (Kim et al., 2022). A significant change in the e-commerce environment is on the horizon because consumers are progressively shopping en route via their smartphones. Thus, as consumers become more comfortable with this technology and as they increase their frequency of using smartphones for shopping, their perceived information confidentiality and preventing unauthorized secondary data usage will boost their trusting beliefs towards e-commerce platforms. e-commerce platforms that utilize new technologies can accordingly secure consumer privacy and build a culture of trust because they have the ability to protect consumer personal information online.

Limitations and future research

This study is not without limitations, but these limitations offer avenues for future research. The first limitation is the conceptual model. Our study is grounded on specific constructs based on social contract theory and economic theory. Thus, future studies should use constructs that are extracted from other theories and models and compare the results from this type of approach with the results of our study. The second limitation is the survey itself. We employed a self-administered online survey in this study. The potential self-response bias has to be subsequently acknowledged, and the generalization of the findings from this study should be taken cautiously. The survey was composed and validated by following the procedural methods set by Jordan and Troth (2020) in order to mitigate the potential impact of a self-response bias, but the independent and dependent variables did not duplicate the composition of the hypotheses. Next, our sample represents the population trends of online buying behavior in India (Statista, 2023), and the study may indicate the issue of a sampling bias. The future studies may consider the random sampling technique as an effective method for data collection to reduce the sampling bias in order to avoid this. Also, future studies may explore other groups and broaden their findings by including diverse demographic or sociographic groups. The third limitation is the study design, which was cross-sectional. Dowker et al. (2019) argue in these types of studies that the causal relationship between the variables cannot be established, group effects are not discernible, and frequencies are not determined. The future studies could employ a longitudinal study design in order to overcome this limitation of the present study. Moreover, this study limited its findings to comprehending the behavioral intentions of consumers and the significance of trusting beliefs in this context. We recommend that future research endeavors extend the current findings by examining the willingness of customers to return or continue their intention to use e-commerce platforms. Understanding the impact of trusting ideas, as well as characteristics like website engagement, user interface design, customized experiences, and others, on customers’ persistence behavior is an intriguing topic.

Conclusion

Several studies have explored customers’ attitudes toward information technologies, especially customers’ trust in e-sellers (Nghiêm-Phú, 2022). These studies emphasized understanding the evolving consumer environment and behavior toward online platforms, which need to be considered when formulating marketing strategies and building trust with such platforms (Cuesta‐Valiño et al., 2024). The study draws its findings from social contract and economic theories, indicating the role of trusting beliefs on consumer behavior towards e-commerce platforms. The study indicates various dimensions of online platform security and data-sharing policy that are expected by consumers as a part of their social contract with such platforms, and once received, they are more likely to develop trust and an intention to use their services. Every new engagement on an e-commerce platform constitutes a new data point. Thus, consumer data is the most valuable asset in e-commerce, which leads to valid concerns that the consumers’ personal information could be misused. Moreover, there are certain fears that the consumers’ personal data could be passed around like trading cards by e-commerce platforms with vested interests in order to influence the consumers’ thinking and change their habits, because the consumers’ personal information, online habits, and social media habits are exposed on e-commerce platforms. This study provides a new perspective on the importance of security features based on awareness about privacy protection, perceived information confidentiality, preventing unauthorized secondary data usage, information integrity, and trusting beliefs to use e-commerce platforms. Trust in the brand leads to gratitude and connection to the brand, which have a beneficial impact on engagement (Rohden et al., 2023; Cuesta‐Valiño et al., 2024). Literature indicates that the role of social exchange about security measures is crucial to developing trust, which in turn influences consumer behavior. The results of this study offer additional points for future research in order to further explore the importance of security features and consumers' trusting beliefs towards behavioral intention to use e-commerce platforms with the digital data genie out of the bottle.