Understanding and Predicting the Determinants of Consumers’ Acceptance and Usage of M-commerce Application: Hybrid SEM and Neural Network Approach

Odai Enaizan, Ashraf Saleh, Bilal Eneizan, Mohammad Almaaitah, Asaad Alsakarneh

Abstract


In m-commerce, privacy and security are major concerns. Existing research has examined the privacy and relationship, security, and intention to use. However, the determinants of privacy and security in mobile commerce remain largely unexplored. A study based on UTAUT2 and trust examines the factors that influence mobile commerce privacy and security. By using the approach of hybrid SEM/ANN analysis, it is possible to detect non-linear and non-compensatory relationships. According to linear and compensatory models, the absence of one determinant can be compensated for by another. The decision-making process of consumers is actually quite complex, and non-compensatory or linear models tend to simplify it. The sample is collected by using a mobile commerce application in order to gather 890 datasets on mobile commerce consumers. Findings: (1) Two determinants of M-commerce acceptance and use had an explicit and significant positive effect. Security and individual are two of these factors. (2) Privacy concerns have a severe negative impact on M-commerce acceptance and use. (3) Trust is found to partially mediate the effect on behavioral intentions of Security Factors (SCF), Privacy Factors (PRF), and Individual Factors (INF) on m-commerce in Jordan (INTENTION). According to the integrated model, m-commerce offers 71% privacy, security, and trust.

 

Doi: 10.28991/ESJ-2022-06-06-018

Full Text: PDF


Keywords


Privacy; Security; Acceptance; Mobile Commerce; Application; Neural Network Approach.

References


Sarkar, S., Chauhan, S., & Khare, A. (2020). A meta-analysis of antecedents and consequences of trust in mobile commerce. International Journal of Information Management, 50, 286–301. doi:10.1016/j.ijinfomgt.2019.08.008.

Jaffar, A. A., Ghareb, M. I., & Sharif, K. H. (2016). The Challenges of Implementing E-Commerce in Kurdistan of Iraq. Journal of University of Human Development, 2(3), 528. doi:10.21928/juhd.v2n3y2016.pp528-533.

Sahi, A. M. (2019). Analysis of the main factors affecting M-commerce adoption in Iraq. arXiv preprint arXiv:1902.06682. doi:10.48550/arXiv.1902.06682.

Chong, A. Y. L., Chan, F. T. S., & Ooi, K. B. (2012). Predicting consumer decisions to adopt mobile commerce: Cross country empirical examination between China and Malaysia. Decision Support Systems, 53(1), 34–43. doi:10.1016/j.dss.2011.12.001.

Saleh, A., Ismail, R., & Fabil, N. (2017). Evaluating Usability for Mobile Application. Proceedings of the 2017 International Conference on Software and E-Business - ICSEB 2017. doi:10.1145/3178212.3178232.

Abuaddous, H. Y., Saleh, A. M., Enaizan, O., Ghabban, F., & Al-Badareen, A. B. (2022). Automated User Experience (UX) Testing for Mobile Application: Strengths and Limitations. International Journal of Interactive Mobile Technologies, 16(4), 30–45. doi:10.3991/ijim.v16i04.26471.

Attar, R. W., Shanmugam, M., & Hajli, N. (2021). Investigating the antecedents of e-commerce satisfaction in social commerce context. British Food Journal, 123(3), 849–868. doi:10.1108/BFJ-08-2020-0755.

Hallikainen, H., & Laukkanen, T. (2018). National culture and consumer trust in e-commerce. International Journal of Information Management, 38(1), 97–106. doi:10.1016/j.ijinfomgt.2017.07.002.

O’Donnell, A., Kaner, E., Shaw, C., & Haighton, C. (2018). Primary care physicians’ attitudes to the adoption of electronic medical records: A systematic review and evidence synthesis using the clinical adoption framework 11 Medical and Health Sciences 1117 Public Health and Health Services. BMC Medical Informatics and Decision Making, 18(1). doi:10.1186/s12911-018-0703-x.

Li, Y. M., & Yeh, Y. S. (2010). Increasing trust in mobile commerce through design aesthetics. Computers in Human Behavior, 26(4), 673–684. doi:10.1016/j.chb.2010.01.004.

Ben-Assuli, O. (2015). Electronic health records, adoption, quality of care, legal and privacy issues and their implementation in emergency departments. Health Policy, 119(3), 287–297. doi:10.1016/j.healthpol.2014.11.014.

Zhang, K. Z. K., & Benyoucef, M. (2016). Consumer behavior in social commerce: A literature review. Decision Support Systems, 86, 95–108. doi:10.1016/j.dss.2016.04.001.

Enaizan, O., Eneizan, B., Almaaitah, M., Al-Radaideh, A. T., & Saleh, A. M. (2020). Effects of privacy and security on the acceptance and usage of EMR: The mediating role of trust on the basis of multiple perspectives. Informatics in Medicine Unlocked, 21, 100450. doi:10.1016/j.imu.2020.100450.

Chen, J., & Shen, X. L. (2015). Consumers’ decisions in social commerce context: An empirical investigation. Decision Support Systems, 79, 55–64. doi:10.1016/j.dss.2015.07.012.

Calzetta, E. (2012). Chaos, decoherence and quantum cosmology. Classical and Quantum Gravity, 29(14), 143001. doi:10.1088/0264-9381/29/14/143001.

Sahney, R., & Sharma, M. (2018). Electronic health records: A general overview. Current Medicine Research and Practice, 8(2), 67–70. doi:10.1016/j.cmrp.2018.03.004.

Rawwash, H., Masa’d, F., Enaizan, O., Eanizan, B., Adaileh, M. J., Saleh, A. M., & Almestarihi, R. (2020). Factors affecting Jordanian electronic banking services. Management Science Letters, 10(4), 915–922. doi:10.5267/j.msl.2019.10.004.

Leong, L. Y., Hew, T. S., Ooi, K. B., & Chong, A. Y. L. (2020). Predicting the antecedents of trust in social commerce – A hybrid structural equation modeling with neural network approach. Journal of Business Research, 110, 24–40. doi:10.1016/j.jbusres.2019.11.056.

Tkáč, M., & Verner, R. (2016). Artificial neural networks in business: Two decades of research. Applied Soft Computing Journal, 38, 788–804. doi:10.1016/j.asoc.2015.09.040.

Ilin, V., Ivetić, J., & Simić, D. (2017). Understanding the determinants of e-business adoption in ERP-enabled firms and non-ERP-enabled firms: A case study of the Western Balkan Peninsula. Technological Forecasting and Social Change, 125, 206–223. doi:10.1016/j.techfore.2017.07.025.

Mousa Jaradat, M.-I. R., & Al Rababaa, M. S. (2013). Assessing Key Factor that Influence on the Acceptance of Mobile Commerce Based on Modified UTAUT. International Journal of Business and Management, 8(23), 102. doi:10.5539/ijbm.v8n23p102.

Ndayizigamiye, P., & Khoase, R. G. (2018). Inhibitors of the adoption of e-commerce by SMMES in two South African cities. International Journal of EBusiness and EGovernment Studies, 10(1), 51–66.

Alsharif, F. F. (2013). Investigating the factors affecting on-line shopping adoption in Saudi Arabia. PhD Thesis, De Montfort University, Leicester, United Kingdom.

Rana, N. P., Barnard, D. J., Baabdullah, A. M. A., Rees, D., & Roderick, S. (2019). Exploring barriers of m-commerce adoption in SMEs in the UK: Developing a framework using ISM. International Journal of Information Management, 44, 141–153. doi:10.1016/j.ijinfomgt.2018.10.009.

Eneizan, B., Alshare, F., Enaizan, O., Al-Salaymeh, M., Almestarihi, R., & Saleh, A. (2022). Older adult’s acceptance of online shopping (digital marketing): extended UTAUT model with COVID 19 fear. Journal of Theoretical and Applied Information Technology, 100(7), 2334–2342.

Al-Khalaf, E., & Choe, P. (2020). Increasing Customer Trust towards Mobile Commerce in a Multicultural Society: A Case of Qatar. Journal of Internet Commerce, 19(1), 32–61. doi:10.1080/15332861.2019.1695179.

Cui, Y., Mou, J., Cohen, J., Liu, Y., & Kurcz, K. (2020). Understanding consumer intentions toward cross-border m-commerce usage: A psychological distance and commitment-trust perspective. Electronic Commerce Research and Applications, 39, 100920. doi:10.1016/j.elerap.2019.100920.

Kaatz, C. (2020). Retail in my pocket– replicating and extending the construct of service quality into the mobile commerce context. Journal of Retailing and Consumer Services, 53, 101983. doi:10.1016/j.jretconser.2019.101983.

Ahamad, S. S., & Pathan, A. S. K. (2019). Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification. Complex Adaptive Systems Modeling, 7(1), 1–18. doi:10.1186/s40294-019-0064-z.

Ogundoyin, S. O. (2019). A privacy-preserving certificate less two-party authenticated key exchange protocol without bilinear pairing for mobile-commerce applications. Journal of Cyber Security Technology, 3(3), 137–162. doi:10.1080/23742917.2019.1595357.

Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly: Management Information Systems, 36(1), 157–178. doi:10.2307/41410412.

Raman, A., & Don, Y. (2013). Preservice teachers’ acceptance of learning management software: An application of the UTAUT2 model. International Education Studies, 6(7), 157–164. doi:10.5539/ies.v6n7p157.

Ahadzadeh, A. S., Pahlevan Sharif, S., Ong, F. S., & Khong, K. W. (2015). Integrating Health Belief Model and Technology Acceptance Model: An investigation of health-related Internet use. Journal of Medical Internet Research, 17(2). doi:10.2196/jmir.3564.

Eneizan, B., Taamneh, M., Enaizan, O., Almaaitah, M. F., Ngah, A. H., & Alsakarneh, A. (2021). Human resources practices and job satisfaction on customer satisfaction: The mediating role of quality of customer interaction in online call center. International Journal of Data and Network Science, 5(1), 11–18. doi:10.5267/j.ijdns.2020.12.001.

Or, C. K. L., & Karsh, B. T. (2009). A Systematic Review of Patient Acceptance of Consumer Health Information Technology. Journal of the American Medical Informatics Association, 16(4), 550–560. doi:10.1197/jamia.M2888.

de Oliveira Rodrigues, D. E. F., de Assis Lopes, J., & Tavares, J. M. S. F. (2013). Manifold-Marketing: a new marketing archetype for the information age, applied to the adoption of oral contraceptives and other drugs by end-users. Lusíada. Economia e Empresa, (17), 59-80.

Rosli, K., HP Yeow, P., & Siew, E. G. (2012). Computer-assisted auditing tools acceptance using I-Toe: a new paradigm. Pacific Asia Conference on Information Systems (PACIS), 11-15 July, 2012, Ho Chi Minh City, Vietnam.

Ariaeinejad, R., & Archer, N. (2014). Importance of mobile technology in successful adoption and sustainability of a chronic disease support system. International Journal of Bioengineering and Life Sciences, 8(4), 903-908.

Alazzam, M. B., Basari, A. S. H., Sibghatullah, A. S., Doheir, M., Enaizan, O. M. A., & Mamra, A. H. K. (2015). EHRS acceptance in Jordan hospitals by UTAUT2 model: Preliminary result. Journal of Theoretical and Applied Information Technology, 78(3), 473–482.

Alalwan, A. A., Dwivedi, Y. K., & Rana, N. P. (2017). Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust. International Journal of Information Management, 37(3), 99–110. doi:10.1016/j.ijinfomgt.2017.01.002.

Saleh, A. M., Al-Badareen, A. B., & Enaizan, O. (2020). Automated user experience tool development for mobile application. International Lournal of Advanced Science and technology, 29(6), 4929-4940.

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly: Management Information Systems, 27(3), 425–478. doi:10.2307/30036540.

Cooper, J., Kelly, K. A., & Weaver, K. (2008). Attitudes, Norms, and Social Groups. Blackwell Handbook of Social Psychology: Group Processes, 259–282, Wiley, Hoboken, United States. doi:10.1002/9780470998458.ch11.

Saleh, A. M., Abuaddous, H. Y., Enaizan, O., & Ghabban, F. (2021). User experience assessment of a COVID-19 tracking mobile application (AMAN) in Jordan. Indonesian Journal of Electrical Engineering and Computer Science, 23(2), 1120–1127. doi:10.11591/ijeecs.v23.i2.pp1120-1127.

Blaise, R., Halloran, M., & Muchnick, M. (2018). Mobile Commerce Competitive Advantage: A Quantitative Study of Variables that Predict M-Commerce Purchase Intentions. Journal of Internet Commerce, 17(2), 96–114. doi:10.1080/15332861.2018.1433911.

Morosan, C., & DeFranco, A. (2016). It’s about time: Revisiting UTAUT2 to examine consumers’ intentions to use NFC mobile payments in hotels. International Journal of Hospitality Management, 53, 17–29. doi:10.1016/j.ijhm.2015.11.003.

Lankton, N. K., Wilson, E. V., & Mao, E. (2010). Antecedents and determinants of information technology habit. Information and Management, 47(5–6), 300–307. doi:10.1016/j.im.2010.06.004.

Pew Research Center (2016). The state of privacy in America. In Fact Tank. Pew Research Center. Available online: https://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/ (accessed on August 2022).

Hong, W., Chan, F. K. Y., & Thong, J. Y. L. (2021). Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective. Journal of Business Ethics, 168(3), 539–564. doi:10.1007/s10551-019-04237-1.

Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123. doi:10.1007/s10551-006-9007-7.

Hajli, N., & Lin, X. (2016). Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information. Journal of Business Ethics, 133(1), 111–123. doi:10.1007/s10551-014-2346-x.

Shaw, T. R. (2003). The Moral Intensity of Privacy: An Empirical Study of Webmasters’ Attitudes. Journal of Business Ethics, 46(4), 301–318. doi:10.1023/A:1025628530013.

Zhou, W., & Piramuthu, S. (2015). Information Relevance Model of Customized Privacy for IoT. Journal of Business Ethics, 131(1), 19–30. doi:10.1007/s10551-014-2248-y.

Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A Taxonomy and a nomological model. MIS Quarterly: Management Information Systems, 32(3), 503–529. doi:10.2307/25148854.

Enaizan, O., Zaidan, A. A., Alwi, N. H. M., Zaidan, B. B., Alsalem, M. A., Albahri, O. S., & Albahri, A. S. (2020). Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis. Health and Technology, 10(3), 795–822. doi:10.1007/s12553-018-0278-7.

Smith, M. L., Spence, R., & Rashid, A. T. (2011). Mobile phones and expanding human capabilities. Information Technologies & International Development, 7(3), 77-88.

Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. doi:10.1111/1540-4560.00067.

Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13–42. doi:10.2753/MIS0742-1222240202.

Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. Information Society, 20(5), 313–324. doi:10.1080/01972240490507956.

Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy and Marketing, 19(1), 7–19. doi:10.1509/jppm.19.1.7.16951.

Chen, G., & Kotz, D. (2000). A survey of context-aware mobile computing research. Computer Science Technical Report TR2000-381. Available online: https://digitalcommons.dartmouth.edu/cs_tr/177 (accessed on August 2022).

Sheehan, K. B. (2002). Toward a typology of internet users and online privacy concerns. Information Society, 18(1), 21–32. doi:10.1080/01972240252818207.

Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Quarterly, 30(1), 13. doi:10.2307/25148715.

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi:10.1287/isre.1040.0032.

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly: Management Information Systems, 20(2), 167–195. doi:10.2307/249477.

Kao, D. T. (2009). The impact of transaction trust on consumers’ intentions to adopt M-commerce: A cross-cultural investigation. Cyberpsychology and Behavior, 12(2), 225–229. doi:10.1089/cpb.2008.0212.

Kalakota, R., & Whinston, A. B. (1996). Frontiers of Electronic Commerce: Book Reviews. IEEE Transactions on Components, Packaging, and Manufacturing Technology: Part C, 19(2), 144. doi:10.1109/tcpmc.1996.507151.

Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building Consumer Trust Online. Communications of the ACM, 42(4), 80–85. doi:10.1145/299157.299175.

Ghosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile E- commerce. Communications of the ACM, 44(2), 51–57. doi:10.1145/359205.359227.

Zhao, S., Brumby, D. P., Chignell, M., Salvucci, D., & Goyal, S. (2013). Shared input multimodal mobile interfaces: Interaction modality effects on menu selection in single-task and dual-task environments. Interacting with Computers, 25(5), 386–403. doi:10.1093/iwc/iws021.

Zhao, W., Luo, X., & Qiu, T. (2017). Smart healthcare. Applied Sciences (Switzerland), 7(11). doi:10.3390/app7111176.

Jiaqi, Y. (2011). DEMATEL. International Conference on E-Business and E-Government (ICEE 2011), 6-8 May, 2011, Shanghai, China.

Ghani, N. A., & Sidek, Z. M. (2009). Personal information privacy protection in e-commerce. WSEAS Transactions on Information Science and Applications, 6(3), 407–416.

Al-Rahmi, W. M., Yahaya, N., Aldraiweesh, A. A., Alamri, M. M., Aljarboa, N. A., Alturki, U., & Aljeraiwi, A. A. (2019). Integrating Technology Acceptance Model with Innovation Diffusion Theory: An Empirical Investigation on Students’ Intention to Use E-Learning Systems. IEEE Access, 7, 26797–26809. doi:10.1109/ACCESS.2019.2899368.

Alam, S. S., & Yasin, N. M. (2010). the Antecedents of Online Brand Trust: Malaysian Evidence. Journal of Business Economics and Management, 11(2), 210–226. doi:10.3846/jbem.2010.10.

Abu-Shanab, E., & Ghaleb, O. (2013). Adoption of Mobile Commerce Technology: An Involvement of Trust and Risk Concerns. International Journal of Technology Diffusion, 3(2), 36–49. doi:10.4018/jtd.2012040104.

Salo, J., & Karjaluoto, H. (2007). A conceptual model of trust in the online environment. Online Information Review, 31(5), 604–621. doi:10.1108/14684520710832324.

Min, Q., Ji, S., & Qu, G. (2008). Mobile commerce user acceptance study in China: A revised UTAUT model. Tsinghua Science and Technology, 13(3), 257–264. doi:10.1016/s1007-0214(08)70042-7.

Siau, K., & Shen, Z. (2003). Building customer trust in mobile commerce. Communications of the ACM, 46(4), 91–94. doi:10.1145/641205.641211.

Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly: Management Information Systems, 35(4), 1017–1041. doi:10.2307/41409971.

Razmak, J., & Bélanger, C. (2018). Using the technology acceptance model to predict patient attitude toward personal health records in regional communities. Information Technology and People, 31(2), 306–326. doi:10.1108/ITP-07-2016-0160.

Hsu, C. L., Lee, M. R., & Su, C. H. (2013). The role of privacy protection in healthcare information systems adoption. Journal of Medical Systems, 37(5), 1–12. doi:10.1007/s10916-013-9966-z.

Dakduk, S., Santalla-Banderali, Z., & Siqueira, J. R. (2020). Acceptance of mobile commerce in low-income consumers: evidence from an emerging economy. Heliyon, 6(11), 5451. doi:10.1016/j.heliyon.2020.e05451.

Pentoś, K. (2016). The methods of extracting the contribution of variables in artificial neural network models - Comparison of inherent instability. Computers and Electronics in Agriculture, 127, 141–146. doi:10.1016/j.compag.2016.06.010.

Féraud, R., & Clérot, F. (2002). A methodology to explain neural network classification. Neural Networks, 15(2), 237–246. doi:10.1016/S0893-6080(01)00127-7.

Venugopal, V., & Baets, W. (1994). Neural Networks and Statistical Techniques in Marketing Research:: A Conceptual Comparison. Marketing Intelligence & Planning, 12(7), 30–38. doi:10.1108/02634509410065555.

de Oña, J., & Garrido, C. (2014). Extracting the contribution of independent variables in neural network models: A new approach to handle instability. Neural Computing and Applications, 25(3–4), 859–869. doi:10.1007/s00521-014-1573-5.

Sharma, S. K., Gaur, A., Saddikuti, V., & Rastogi, A. (2017). Structural equation model (SEM)-neural network (NN) model for predicting quality determinants of e-learning management systems. Behaviour and Information Technology, 36(10), 1053–1066. doi:10.1080/0144929X.2017.1340973.

Liébana-Cabanillas, F., Marinković, V., & Kalinić, Z. (2017). A SEM-neural network approach for predicting antecedents of m-commerce acceptance. International Journal of Information Management, 37(2), 14–24. doi:10.1016/j.ijinfomgt.2016.10.008.

Nzuki, D., & Mugo, D. (2014). Determinants of Electronic Health in Developing Countries. International Journal of Arts and Commerce, 3(3), 49–60.

Eneizan, B., Mohammed, A. G., Alnoor, A., Alabboodi, A. S., & Enaizan, O. (2019). Customer acceptance of mobile marketing in Jordan: An extended UTAUT2 model with trust and risk factors. International Journal of Engineering Business Management, 11, 184797901988948. doi:10.1177/1847979019889484.

Kifle, M., Payton, F. C., Mbarika, V., & Meso, P. (2010). Transfer and adoption of advanced information technology solutions in resource-poor environments: The case of telemedicine systems adoption in ethiopia. Telemedicine and E-Health, 16(3), 327–343. doi:10.1089/tmj.2009.0008.

Mansouri-Rad, P., Mahmood, M. A., Thompson, S. E., & Putnam, K. (2013). Culture matters: Factors affecting the adoption of telemedicine. Proceedings of the Annual Hawaii International Conference on System Sciences, 2515–2524. doi:10.1109/HICSS.2013.157.

Hesson, M., & Al-Ameed, H. (2007). Online security evaluation process for new e-services. Business Process Management Journal, 13(2), 223–246. doi:10.1108/14637150710740473.

Korzaan, M. L., & Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4), 15–24.

Barry, M., & Tahir Jan, M. (2018). Factors Influencing the Use of M-Commerce: An Extended Technology Acceptance Model Perspective. International Journal of Economics, Management and Accounting, 26(1), 157–183.

Alqatan, S., Noor, N. M. M., Man, M., & Mohemad, R. (2016). An empirical study on success factors to enhance customer trust for mobile commerce in small and medium-sized tourism enterprises (SMTES) in Jordan. Journal of Theoretical and Applied Information Technology, 83(3), 373–398.

Safeena, R. (2011). Customer’s Adoption of Mobile-Commerce A Study on Emerging Economy. International Journal of E-Education, e-Business, e-Management and e-Learning, 1(3), 228. doi:10.7763/ijeeee.2011.v1.36.

Al-Badareen, A. B., Saleh, A. M., Hayfa, Y. A., & Enaizan, O. (2021). In the process of software development: Available resources and applicable scenarios. Journal of Theoretical and Applied Information Technology, 99(1), 25–37.

Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood modeland individual persuasion. MIS Quarterly: Management Information Systems, 33(2), 339–370. doi:10.2307/20650295.

Acharya, N., & Sharma, A. (2022). Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model. In International Conference on Human-Computer Interaction 457-468, Springer, Cham, Switzerland. doi:10.1007/978-3-031-05563-8_28.

Rajabion, L. (2015). Critical Factors for Adoption of Mobile Commerce Services. International Journal of Business and Social Science, 6(12), 26–35.

Joubert, J., & Van Belle, J. (2013). The role of trust and risk in mobile commerce adoption within South Africa. International Journal of Business, Humanities and Technology, 3(2), 27-38.

Enaizan, O. M., Alwi, N. H., & Zaizi, N. J. (2017). Privacy and Security Concern for Electronic Medical Record Acceptance and Use: State of the Art Article Info. Journal of Advanced Science and Engineering Research, 7(2), 23–34.

Omotosho, A., & Emuoyibofarhe, J. (2015). A criticism of the current security, privacy and accountability issues in electronic health records. arXiv preprint arXiv:1501.07865. doi:10.48550/arXiv.1501.07865.


Full Text: PDF

DOI: 10.28991/ESJ-2022-06-06-018

Refbacks



Copyright (c) 2022 odai Enaizan, Ashraf Saleh, Bilal Eneizan, Mohammad Almaaitah