Computer Science & Electrical

Computer Science & Electrical

Assessment of factors that affect users' level of trust and sense of security in E-Commerce applications

Pages: 17  ,  Volume: 9  ,  Issue: 1 , July   2018
Received: 02 Aug 2018  ,  Published: 07 August 2018
Views: 124  ,  Download: 54

Authors

# Author Name
1 Zachariah Onteri Mitaki
2 Dr. Collins Oduor Ondiek

Abstract

Electronic commerce plays a major role in any society’s socio-economic progress, and now forms a fundamental part of the way people and organizations purchase products, services and conduct business. Still, its full potential still remains unfulfilled. The realisation of its potential in in Kenya will only be achieved once existing challenges, such as lack of trust and security, are eliminated. This paper had two objectives: to assess the factors that affect users’ level of trust and sense of security in E-Commerce applications; To establish the relationship between trust and security in E-Commerce applications. The researcher applied mixed methods research; and data collection was done by using a questionnaire, followed by focus group discussion. The results point to the existence of an intricate relationship between user’s level of trust and sense of security. Further, it was deduced that lack of security affects trust levels which leads to reduced online transactions. There is need for e-commerce organizations to ensure that adequate security measures are employed in order to gain a larger market and to increase profitability.

Keywords

  • Security
  • E-Commerce
  • Trust
  • Security
  • E-Commerce Security
  • Online Transactions
  • References

    Best, J. W., & Khan, J. V. (2006). Research Methodology, Fifth Edition. New Delhi: Prentice Hall.

    Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized Trust Management. IEEE Symposium on Security and Privacy, (pp. 164-173).

    Cardinal Commerece. (2018). Cardinal Commerce. Retrieved from Cardinal Commerce Website: https://www.cardinalcommerce.com

    Chellappa, R. K. (2008). Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security. Under Submission, 1-38.

    Cheskin Research. (1999). E-Commerce trust study.

    Cheskin Research. (2000, July). Trust in the wired Americas. Retrieved from www.cheskin.com: http://www.cheskin.com/think/studies/trust2.html,

    Davis, F. (1989). Perceived usefulness, perceived ease-of-use, and user acceptance of information technologies. MIS Quarterly, 319-340.

    Dong-Her, S., Hsiu-Sen, C., Chun-Yuan, C., & Lin, B. (2004). Internet Security: Malicious E-mails Detection and Protection. Industrial Management & Data Systems, 613-623.

    Flavia´n, C., & Guinalý´, M. (2006). Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web site. Industrial Management & Data Systems, 601-620.

    Gefen, D. (2000). E-commerce: The role of farmiliarity and trust. International Journal of Management Science, 725-737.

    Grandison, T., & Sloman, M. (2000). A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials.

    Ho, C., & Wu, W. (1999). Antecedents of Customer Satisfaction on the Internet: An empirical study of online shopping . Hawaii International Conference on Systems Sciences, (pp. 1-9). Hawaii.

    Katsikas, S. K., Lopez, J., & Pernul, G. (2005). Trust, Privacy and Security in e-business: requirements and solutions. 10th Panhellenic Conference on Informatics, (pp. 548-558). Volos, Greece.

    Kothari, C. R. (2004). Research Methodology: Methods and Techniques; Second Revised Edition. Jaipur: New Age International (P) Ltd.

    Labuschagnce, L., & Eloff, J. (2002). Electronic commerce: the information security challenge. Information Management & Computer Security, 154-157.

    Lee, G., & Lin, H. (2005). Customer Perceptions of E-service Quality in Online Shopping. International Journal of Retail and Distribution Management, 161-176.

    McCauley-Bell, P., & Crumpton, L. (1998). The human factors issues in information security: what are they and do they matter? Human Factors and Ergonomics Society 42nd Annual Meeting, (pp. 439-443). Chicago.

    McKnight, D., Choudhury, V., & Kacmar, C. (2002). Developing and Validating Trust Measures for E-commerce: An Integrative Typology. Information Systems Research, 334-359.

    Morris, M. G., & Turner, J. M. (2001). Assessing users’ subjective quality of experience with the World Wide Web: an exploratory examination of temporal changes in technology acceptance. International Journal of Human-Computer Studies, 877-901.

    Park, C., & Kim, Y. (2003). Identifying Key Factors Affecting Consumer Purchase Behavior in an Online Shopping Context. International Journal of Retail & Distribution Management, 16-19.

    Solms, B. V. (2001). Information security–A multidimensional Discipline. Computers & Security, 504-508.

    Someswar, K., Sam, R., & Sridhar, N. (2002). A framework for analyzing e-commerce security. Information Management & Computer Security , 149-158.

    Statistica. (2018, May 15). Statistica. Retrieved from www.statistica.com: https://www.statista.com/

    Szulanski, G., Cappetta, R., & Jensen, R. J. (2004). When and How Trustworthiness Matters: Knowledge Transfer and the Moderating Effect of Casual Ambiguity. Journal Storage (JSTOR), 600-613.

    Turban, E. D., Viehland, D., & Lee, J. (2008). Electronic Commerce- Managerial Perspective. Pearson International Edition.

    Turner, C. W., Zavod, M., & Yurcik, W. (2001). Factors that Affect the Perception of Security and Privacy of E-Commerce Web Sites. Fourth International Conference on Electronic Commerce Research, (pp. 1-9). Dallas.

    Venkatesh, V., & Davis, F. D. (2000). Atheoretical extension of the technology acceptance model: four longitudinal field studies. Management Science. 186-204.

    Warrington, T., Abgrab, N., & Caldwell, H. (2000). Building trust to develop competitive advantage in e-business relationships. Competitiveness Review, 160-168.

    Wikipedia. (2017). Kisii, Kenya. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Kisii,_Kenya

    Wolf, G., & Pfitzmann, A. (2000). Properties of protection goals and their integration into a user interface. Computer Networks, 685-699.

    Zeithaml, V., Parasuraman, A., & Malhotra, A. (2002). Service quality delivery through web sites: A critical review of extant knowledge. Journal of the Academy of Marketing Science, 362-375.