References
- Anderson, R. (2001). Security engineering: A guide to building dependable distributed system. Wiley Computer Publishing, New York.
- Arvidsson, N. (2014). Consumer attitudes on mobile payment services-results from a proof-of-concept test. International Journal of Bank Marketing, 13(2), 150-170. https://doi.org/10.1108/IJBM-05-2013-0048
- Avital, M., Sawyer, S., Kraemer, K., Sambamurthy, V., Lyytinen, K., and Iacono, C. S. (2007). Data rich and data poor scholarship: Where does IS research stand? International Conference on Information Systems (ICIS) Proceedings.
- Beaudry, A., and Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493-524. https://doi.org/10.2307/25148693
- Boss, S., Galletta, D., Lowry, P. B., Moody, G. D., and Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864. https://doi.org/10.25300/MISQ/2015/39.4.5
- Chandra, S., Srivastava, S. C., and Theng, Y. L. (2010). Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis. Communications of the Association for Information Systems, 27(29), 561-588.
- Chen, L. D. (2008). A model of consumer acceptance of mobile payment. International Journal of Mobile Communications, 6(1), 32-52. https://doi.org/10.1504/IJMC.2008.015997
- Choi, H., and Jung, Y. (2019). Online users' cynical attitudes towards privacy protection: Examining privacy cynicism. Asia Pacific Journal of Information Systems, 30(3), 547-567. https://doi.org/10.14329/apjis.2020.30.3.547
- Choi, H., Jung, Y., and Choi, Y. (2019). Understanding of the fintech phenomenon in the beholder's eyes in South Korea. Asia Pacific Journal of Information Systems, 29(1), 117-143. https://doi.org/10.14329/apjis.2019.29.1.117
- Epstein, L. G. and Kopylov, I. (2005). Cognitive dissonance and choice. Working Paper, University of Rochester.
- Ernst and Young (2019). Global FinTech adoption index 2019. Retrieved from https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/banking-and-capital-markets/ey-global-fintech-adoption-index.pdf.
- Eze, U. C., Gan, G. G. G., Ademu, J., and Tella, S. A. (2008). Modelling user trust and mobile payment adoption: A conceptual framework. Communications of the IBIMA, 3(29), 224-231.
- Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement Error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104
- Gao, L., and Waechter, K. (2017). Examining the role of initial trust in user adoption of mobile payment services: An empirical investigation. Information Systems Frontiers, 19(3), 525-548. https://doi.org/10.1007/s10796-015-9611-0
- Ghosh, I., & Singh, V. (2017). Using cognitive dissonance theory to understand privacy behavior. Proceedings of the Association for Information Science and Technology, 54(1), 679-681. https://doi.org/10.1002/pra2.2017.14505401114
- Goodman, J. K., Cryder, C. E., and Cheema, A. (2013). Data collection in a flat world: The strengths and weaknesses of mechanical turk samples. Journal of Behavioral Decision Making, 26(3), 213-224. https://doi.org/10.1002/bdm.1753
- Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., and Tatham, R. L. (1998). Multivariate data analysis. Upper Saddle River, NJ: Prentice hall.
- Hasan, R., Liu, Y., Kitchen, P. J., and Rahman, M. (2019). Exploring consumer mobile payment adoption in the bottom of the pyramid context: A qualitative study. Strategic Change, 28(5), 345-353. https://doi.org/10.1002/jsc.2289
- Henseler, J., Ringle, C. M., and Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. https://doi.org/10.1007/s11747-014-0403-8
- Hoffmann, C. P., Lutz, C., and Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), Article 7.
- Jaradat, M. I. R. M., and Faqih, K. M. (2014). Investigating the moderating effects of gender and self-efficacy in the context of mobile payment adoption: A developing country perspective. International Journal of Business and Management, 9(11), 147-169.
- Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly 34(3), 549-566. https://doi.org/10.2307/25750691
- Johnston, V. L., Kiser, A., Washington, R., and Torres, R. (2018). Limitations to the rapid adoption of m-payment services: Understanding the impact of privacy risk on M-payment services. Computers in Human Behavior, 79, 111-122. https://doi.org/10.1016/j.chb.2017.10.035
- Kankanhalli, A., Lee, O. K. D., and Lim, K.H. (2011). Knowledge reuse through electronic repositories: A study in the context of customer service support. Information & Management, 48(2-3), 106-113. https://doi.org/10.1016/j.im.2011.02.002
- Kim, S., Mirusmonov, M., and Lee, I. (2010). An empirical examination of factors influencing the intention to use mobile payment. Computers in Human Behavior, 26(3), 310-322. https://doi.org/10.1016/j.chb.2009.10.013
- Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of e-Collaboration, 11(4), 1-10.
- Liang, H., and Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90. https://doi.org/10.2307/20650279
- Liebana-Cabanillas, F, Sanchez-Fernandez, J., and Munoz-Leiva, F. (2014). Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Computers in Human Behavior, 35, 464-478. https://doi.org/10.1016/j.chb.2014.03.022
- Lowry, P. B., D'Arcy, J., Hammer, B., and Moody, G. D. (2016). "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of cata collection, including mechanical turk and online panels. The Journal of Strategic Information Systems, 25(3), 232-240. https://doi.org/10.1016/j.jsis.2016.06.002
- Moon, Y. (2020). Enablers of the adoption of mobile banking: From economic-psychological-social perspectives. Asia Pacific Journal of Information Systems, 30(1), 72-93. https://doi.org/10.14329/apjis.2020.30.1.72
- Pingitore, G., Rao, V., Dwivedi, K., and Cavallaro, K. (2017). To share or not to share. Deloitte Insights, Retrieved from https://www2.deloitte.com/insights/us/en/industry/retail-distribution/sharing-personal-information-consumer-privacy-concerns.html.
- Prahalad, C. K., and Hart, S. L. (2002). Strategy and business. The Fortune at the Bottom of the Pyramid, 26, 2-14.
- R, N., and Rathi, R. (2019). Mobile payments: Comparis on of two powerhouses of the world. Retrieved from https://gomedici.com/medici_ltp_articles/5558.
- Rogers, R.W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Senicar, V., Jerman-Blazic, B., and Klobucar, T. (2003). Privacy-enhancing technologies-approaches and development. Computer Standards & Interfaces, 25, 147-158. https://doi.org/10.1016/S0920-5489(03)00003-5
- Slade, E., Willams, M., Dwivedi, Y., and Piercy, N. (2015). Exploring consumer adoption of proximity mobile payments. Journal of Strategic Marketing, 23(3), 209-223. https://doi.org/10.1080/0965254X.2014.914075
- Statista (2017). Preferred payment methods of online shoppers worldwide as of March 2017. Retrieved from-https://www.statista.com/statistics/508988/preferred-payment-methods-of-online-shoppers-worldwide/
- Steelman, Z. R., Hammer, B. I., and Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. Journal of Consumer Psychology, 23(2), 212-219.
- Syed, R., Dhillon, G., and Merrick, J. (2019). The identity management value model: A design science approach to assess value gaps on social media. Decision Sciences, 50(3), 498-536. https://doi.org/10.1111/deci.12335
- Tsai, J. Y., Egelman, S., Cranor, L., and Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254-268. https://doi.org/10.1287/isre.1090.0260
- Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444. https://doi.org/10.17705/1jais.00092
- Yang, S., Lu, Y., Gupta, S., Cao, Y., and Zhang, R. (2012). Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits. Computers in Human Behavior, 28(1), 129-142. https://doi.org/10.1016/j.chb.2011.08.019
- Zhou, T. (2013). An empirical examination of continuance intention of mobile payment services. Decision Support Systems, 54(2), 1085-1091. https://doi.org/10.1016/j.dss.2012.10.034