Looking Beyond Technology: Barriers of E

advertisement
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014), pp. 65-72
http://dx.doi.org/10.14257/ijseia.2014.8.8,07
Looking Beyond Technology: Barriers of E-Commerce Privacy in
Building E-Loyalty Intention on Internet Banking
Ahmad Al-Khasawneh
Computer Information Systems Department,
Hashemite University, Zarqa, Jordan
akhasawneh@hu.edu.jo
Abstract
Privacy is considered now a key differentiator in electronic commerce, and it is vital for
building and maintaining customer’s loyalty. Since online transactions involve many
uncertainties for the customer and most of the Internet banking offers the same product as the
other competitor, it is crucial for banks to recognize the key factor that can tie their existing
customer become a loyal customer and change the web surfers into purchaser as well which
are critical to increase the business and its profits. This paper attempts to evaluate whether
privacy issues are the major obstacles to the growth of e-commerce in Jordan. A survey
conducted for the study reveals that privacy issues are major barriers to Internet banking and
e-commerce activities among consumers.
Keywords: Information and Communication Technologies (ICTs); privacy; e-commerce;
Enterprise Development
1. Introduction
A review of the top MIS journals over the past decade shows little research that has
explicitly examined the problem of technology in developing countries, which is problematic
since half of the world lives in such nations [20]. Emerging opportunities abound as some
Arab nations begin to explore technology and telecommunications connectivity as an
economic lever for national prosperity (cf., [2]; [6]; [13]; [18].
Little research has been done to examine the ICT diffusion process in emerging economies,
particularly those of the Middle East [1]. Several studies have examined the global diffusion
of the Internet from a broad perspective, including [15] econometric global Internet diffusion
model and [9] recent digest of the Global Diffusion of the Internet study series. Yet,
prominent bodies of work focusing on global Internet and eCommerce diffusion, such as [12]
CAIS special issue on globalization and eCommerce, appear to have largely overlooked the
Middle Eastern nations. The lack of research on technology usage issues in this keenly
disadvantaged region is problematic [16]. With the notable exception of Israel ([6], Goodman
& Wolcott, 1999b), the nations of the Middle East have traditionally been some of the least
technologically-enabled economies in the world [21], hence opportunities for research and
practice abound as the developing nations in the Middle East begin to explore technology and
telecommunications connectivity as an economic lever for national prosperity (cf., [1]; [2];
[6], Goodman & Wocott, 1999a; [13]; [18]. Though the literature has ready examples of
business studies of technological acceptance and application in the Middle East, there has
been little work done on the likely use and motivations for use by the consumer Internet
ISSN:1738-9984 IJSEIA
Copyright ⓒ 2014 SERSC
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
publics in these regions – probably because business use must precede commercial consumer
use of such networks in e-commerce considerations.
This research attempts to evaluate whether privacy issues are the major obstacles to the
growth of e-commerce in Jordan. Jordan, however, is a recent and shining example of a
resource-poor developing nation that has seized upon IT as a competitive differentiator to
enhance its interaction with the global business markets ([6]; [11]; [22]).
The paper is structured as follows. First, it reviews the literature on the privacy and
security issues, mainly focusing on concepts of privacy. Second, it explains the research
design, data collection protocol, and data analysis methods. Third, the findings are presented,
illustrating the incongruent interpretation of barriers of privacy. Finally, in the discussion
section, the concept of technology fears is developed and related to the case evidence.
2. Literature Review
Privacy is considered from the most important facilitator in conducting business especially
online business. People and organizations are opposed to revealing personal or business
information to others, because they are cautious from mishandling information or accessing it
illegally. But the methods and approaches of collecting information about people and
business have been developed because of customers’ desire to personally deal with them and
the high competition among online business as well [8].
Privacy refers to the characteristics and attitudes of people or any other objects like
business that are looking to keep their confidential information away from anybody else.
Other researchers defines privacy as “the interest that individuals have in sustaining a
‘personal space’, free from interference by other people and organizations” [5].
Scholars have explained four concerns associated with the privacy ([3]; & [5]):
1.
Privacy: the kind of information that is collected and held about people, and
if it is related to business or not.
2.
Accuracy: the correctness of information about people, is it correct or not?
Incorrect information will harm people.
3.
Property: the owner of information and how it can be transferred.
4.
Accessibility: the people who are authorized to access people’s personal data
and at what time and in which situation that information has to be accessed.
Other shows another viewpoint related to the privacy concerns; he makes these
concerns to customers and companies as well; “Transparency: who is collecting what
information? Security: how is information protected once it is collected by a company?
Liability: who is responsible if data are abused?” [7].
Majority of people see that privacy is a part of security, but [7] claim that they are
not the same but he acknowledges that to obtain privacy we need to have security, but
security does not guarantee our privacy. If a company has a powerful security system,
then the company joins another company to expand its business so that the two
companies will share their database leading to the exposure of our confidential
information to another company. Customer concerns about his or her privacy from four
different perspectives: the kind of information that is collected from customer, the way
that it is gathered and for what goal and purpose, the security level of gathered
information, and for how long the company gathers, uses, shares, stores and sells it to
other organizations. Therefore the company has to let customers know the type of
66
Copyright ⓒ 2014 SERSC
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
information that it gathers from them, and take their permission to collect information,
explain how the company uses the information as well as explain to the customers the
methods that the company uses in collecting information in order to preserve excellent
privacy practices for their customers [7].
Some companies breach customer’s privacy without using any powerful technology
or hackers to breach the network or computer security while they do indirectly through
loyal cards. Nowadays there are many non-reputable companies giving loyalty cards for
which the customers have to fill a specific application providing their personal
information [7].
2.1. Principles of Privacy
According to Allusse et al (2003, quoted in [8]) the Federal Commission of Commerce has
launched and founded four essential principles relating to the online people privacy:
•
Warning: each web site has to publish its privacy policy to show the types of
information that web site is going to collect and how it will be used.
•
Choice: the consumers have the ability and right to make a decision if they want
their information to be used, not just for transactions but for other purposes.
•
Access: the customers have the right to access their information and ensure that
their information that is collected by the web site is accurate.
•
Security: each web site has to own powerful security tools to guarantee the
integrity and security of the collected information.
These principles could be implemented through the web site in two ways: privacy policy
(policy statement) and privacy seal. Since, some web sites provide a document to the
customers or users which explain how they deal and interact with the personal information
that they have collected from people, such as, the methods that are used to collect, use, and
secure the information, as well as the purpose of collecting it [10].
2.2. Security and Privacy
It is essential to differentiate between privacy and security; privacy is related to the way
that companies use customers information (personal and financial), whereas security is related
to the methods that companies use in protecting and securing the information during
transmission as well as when it is stored in the database in order to mitigate the risk of abuse
of information, fraud and other unauthorized actions towards customers information.
Therefore privacy is not the same as security which is crucial in protecting customers’ privacy
from unauthorized people, who are trying to take advantage of it through many ways, like
implementing security tools at many places, using encryption and digital signature in
transferring information and firewalls and giving restricted access tools in database where the
information is stored.
3. Method and Procedure
The aim of this research is to test weather privacy policy and privacy seal compromise the
elements of warning, choice, access and security that are theoretically derived from principle
of privacy [8] as well as to evaluate whether privacy issues are the major obstacles to the
growth of e-commerce in Jordan. In this study, single case was chosen due to the fact that this
research attempted to collect detailed information and knowledge about customer privacy in
Copyright ⓒ 2014 SERSC
67
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
online banking. Samples of 500 internet users were randomly selected from various
education institutions in Jordan. A survey questionnaire was used to measure privacy issues
perception and attitude toward e-commerce and Internet banking. A survey methodology was
used to collect data of the study. In addition, demographic data such as age, gender, computer
experience and frequency of internet access were also captured. The final version of the
questionnaire was developed after issues such as ambiguity and time length to complete the
questionnaire were addressed. We designed questionnaire based on the research objectives
discussed. From 500 questionnaires distributed only 270 were collected and usable for
analysis. Existing literature were utilized and existing instruments were adapted to measure
the variables of this study to support the specification of a set of potentially strong metrics.
Respondents were asked to rate their opinion using 5-point Likert scale (1 = very important, 2
= important, 3 = neutral, 4= unimportant, 5= very unimportant) on most of the questions.
Nevertheless, questions measuring privacy intention to internet banking used a 5-point Likert
scale, rating the performance by (1 = excellent, 2 = very good, 3 = good, 4 = fair, 5 = poor),
multiple selection and close nominal measurement (1 = Yes, 2 = No). The reliability of an
instrument is most often measured by the Cronbach-alpha statistic. The Cronbach alpha value
for trust constructs is 0.903 while usability constructs is 0.921.
4. Results and Discussion
Frequency distributions were performed and found that 58% were female and 42% were
male and respondent age were in range of 20-25 years (78%) followed by 25-35 years (18 %)
of the overall total and 68% of them use the Internet daily and 70% uses the Internet banking.
4.1. Concern Over Privacy Issues
Although most of the respondent believes that using the Internet banking and shopping will
make their life easier and is more convenient. Half of them (50%) think that it is safe and
secure. The study illustrate that the customers are anxious and worried about how the online
banks collect customers’ (personal and financial information). To overcome their worries
online banks have to explain and show which ways and methods they use in collecting
customers’ information, financial and personal, through the privacy policy which appears in
the web site and every customers can see it, such as through using cookies, forms, internet
connections and other methods. The study show that customers are concerned (61%) how the
online bank interacts with their information (personal of financial). Therefore online banks
have to explain and show how the online bank interacts with this kind of information to their
customers through privacy policy, in order to increase their confidence towards their
concerns, and to increase their trust in them.
The study shows that the layout of the web site encourages customers to access and
interact with the web site (63%). So a very organized, nice, and enjoyable, designed with the
user interface systems, is very important in supporting and encouraging customers to deal
with the web site, because these things might help customers in reducing the cost of searching
and seeking for product or service which lead as a result to reduce the effort of selecting and
performing any kind of transaction. The result of this study has the same opinion with Griffith
(2001 quoted in [17]) and it claims, “Since user interface of an online store influences the
experience of consumers interacting with a retailer’s product or service offering, a welldesigned user interface system may reduce consumers’ cost of searching and the time
required for information processing”. In addition this result agrees with [19] that a powerful
web site design which helps and encourages customers to interact with it helps in obtaining
customer satisfaction in order to build and maintain the trust among customers and company.
68
Copyright ⓒ 2014 SERSC
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
Easy to read privacy policy
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Easy to read
privacy
policy
1
Figure 1. Easy to Read Privacy Policy
The study show that 79% from the whole respondents agree that the privacy policy has to
be available in the web site in order to increase the trust between customers and web site,
because through the privacy policy customers can have a look on the company policy towards
customers’ privacy. In addition privacy policy considers one of the ways that [3] declare to
customers in order to assist them in saving and securing their privacy. Thus if customers do
not find privacy policy in the web site they will be cautious about the web site and as a result
will make them away from it. Furthermore [14] agree with this result and they claim that the
privacy policy helps especially in building customers trust towards their privacy and generally
with the web site. Figure 1 illustrate that 89% of entire respondents agree that the privacy
policy has to be written easily, in order to enable every customer to read and understand it
correctly, where as 11% disagree and do not mind. This result agrees with [7] who admit that
privacy policy has to be written without difficulty and simply in order to make it perfect.
Therefore easy writing affects positively the privacy policy.
Factors encourage people to use online
banking
Preserve…
Reputation
Convenient
Series1
Secure…
Save time
0%
20%
40%
Figure 2. Factors Encourage People to Use Online Bank
In Figure 2 where it shows the factors that encourage and help customers to use online
banking. It shows that 31% of respondents who are not using online banking might use it if
the online banking helps them in saving their times. This indicates that the online bank
Copyright ⓒ 2014 SERSC
69
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
transactions have to be processed and finished quickly without any delays and any physical
behavior from customers. Furthermore convenience is another factor that supports customers
to interact with online banking, with 24% claiming that it is very important for them in order
to deal with online banking, convenience comes from easy accessing, selecting, and
performing any kind of transaction effectively and efficiently. Furthermore 26% claim that
security of transactions is very important in encouraging them to do any online transaction,
because they would need to be assured that their transactions are correctly performed.
Factors that prevent you from doing online
banking
Series1
60%
27%
Security
Privacy
1%
Procedure
Figure 3. Factors that Prevent People from Doing Online Banking
The following figure (Figure 3) shows the factors that prevent people from doing online
banking transactions; the first important one is security 60%. This result agrees with business
week (2000 quoted in [4]) which claim that 62.2% of people are willing to do online
transactions if they are convinced that the transactions are secure perfectly. Privacy concern is
the second factor that prevents people from doing online transaction, 27%, because nowadays
the result of privacy breach leads to identity theft crime where lots of people are cautious and
worried about their personal and financial information to be exposed to unauthorized people.
Finally 18% declare that the procedures of how to do online transaction could be another
factor preventing customers from undertaking online transactions.
Linear Regression analysis was used to test relationship between independent (intention to
use Internet banking) and dependent variable (online people privacy). In this analysis, the
dependent variables were the four design factors (Website warning and choice; Access and
security) and the independent variable is (intention to use internet banking). From this
analysis, the R² value can be obtained. Table 1 reports the linear regression analysis results
for the relationship of Website warning and choice Access and security constructs toward
customer online banking.
Table 1. Variables Testing
Model
Privacy Policy (Website warning and
choice) and intention to internet
banking
Privacy Seal (Access and security) and
intention to internet banking
70
R²
0.109
F Value
1.790
t
1.336
Significant
Significant
0.087
1.145
1.070
Significant
Copyright ⓒ 2014 SERSC
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
The result shows that privacy policy website design dimension was more significant with
customer online banking loyalty rather than privacy seal dimension. From this results we can
conclude that privacy policy factor has relatively more important than privacy seal factor in
building customer online loyalty in Internet banking environment. The higher respondents’
perceived privacy policy website design on Internet banking websites, the higher their
intentions to purchase and revisits from those websites. Bivariate Correlation analysis was
used to test whether privacy policy website design significantly have relationship with
customer privacy seal on website. From the analysis, privacy policy website design was
highly significance with privacy seal on the website with p value = 0.005. The findings show
that consumers’ the higher they perceived privacy policy website design on the Internet
banking, the higher their privacy seal towards the website, which will eventually affect their
attitudes toward their like hood to held commitment for certain services provides online and
positive online loyalty behaviour. In addition, their attitudes toward websites affect their
future intentions to use the same Internet banking websites rather than other Internet banks.
Privacy policy factor was found to be the important factor than privacy seal. In other words,
consumers may stay with a company’s products through the Website warning and choice that
they get from websites. In new paradigm of building relationship with customer, privacy seal
was no longer the main factor for customer’s usage of internet banking.
5. Conclusion
The study concludes that researchers need to consider the fear factor in order to achieve
effective internet banking loyalty. As the internet enables and creates new marketplace for all
kinds of business, the companies which are interested in conducting business online should be
aware of the security and privacy because they have a very positive impact on the success of
any kind of business on the internet. The companies should take into consideration many
factors when conducting business on the internet in order to be successful, for example, they
should consider that, if the company has a powerful security system it does not mean that it
preserves the privacy of the company and customers, and also trust does not mean loyalty and
vice versa. The company which has a good reputation and a brand name certainly has a
powerful privacy system. In addition, the marketing and advertising of the security and
privacy tools and functions that the company has implemented in its web site are important in
increasing their confidence towards the security. In future studies, researchers may find other
dimensions of technology fears in other contexts, using different information systems
theories.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
J.M.H. Ali, Information technology in the Middle East. Journal of Global Information Technology
Management, vol. 7, no. 1, (2004), pp. 1-4.
S. Al-Jaghouob, and C. Westrup, Jordan and ICT-led, “development: Towards a competition state?”
Information, Technology & People, vol. 16, no. 1, (2003), pp. 93-110.
M. Attaran and L. Vanlaar, “Privacy and Security on the Internet: How to Secure Your Personal Information
and Company Data”, Information Management and Computer Security, vol.7, no. 5, (1999), pp. 241-246.
R. Chellappa and P. Pavlou, “Perceived Information Security, Financial Liability and Customer Trust in
Electronic Commerce Transactions”, Logistics information management, vol. 15, no. 4/6, (2002), pp. 358368.
R. Clarke, “Introduction to Dataveillance and Information Privacy, and Definitions of Terms [Internet]”,
Available from: <http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html>,(2005).
P. Ein-Dor, Goodman, S. and Wolcott, P. The Global Diffusion of the Internet Project: The Hashemite
Kingdom of Jordan. The MOSAIC Group, http://mosiac.unomaha.edu/Jordan_1999.pdf, (2005).
A. Ghosh, (2001) “Security and Privacy for E-business”, New York, Wiley Computer Publishing.
Copyright ⓒ 2014 SERSC
71
International Journal of Software Engineering and Its Applications
Vol.8, No.8 (2014)
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
C. Gurau, A. Ranchhod and C. Gauzente, “To Legislate or Not to Legistae”: a Comparative Exploratory
Study of Privacy/Personalisation Factors Affecting French, UK and US Web Sites. Journal of Consumer
Marketing, vol. 20, no. 7, (2003), pp. 652-664.
J. K. Ho, “Global Diffusion of the Internet VIII: Maximum Resolution Dichotomy for Global Diffusion of
the Internet”, Communications of the AIS, vol. 15, (2005), pp. 797-809.
Host
Queue.
Ecommerce
Glossary
[Internet].
Available
from:
http://www.hostqueue.com/ecommerce/glossary.html>, (2005).
Info-Prod Research, Jordan Telecom launches PC@Every Home initiative, (2005) March 23.
K. L. Kraemer, J. Dedrick and J. Gibbs, “Introduction to the special volume on globalization and eCommerce”, Communications of the AIS, vol. 11, (2003), pp.1-3.
D. R. Kulchitsky, (2004), “Computerization, knowledge, and information technology initiatives in Jordan”,
Administration & Society, vol. 36, no.1, pp. 3-37.
D. Mcknight and N. Chervany, “What Trust Means in E-commerce Customer Relationships: An
Interdisciplinary Conceptual Typology”, International Journal of Electronic Commerce, vol. 6, no. 2, (2001),
pp. 35-56.
S. Mukhopadhyay, (2006), “Global diffusion of the Internet IX: Predicting global diffusion of the Internet an alternative to diffusion models”, Communications of the AIS, vol. 17, pp. 106-122.
P. Palvia, S. Palvia and J. Whitworth, “Global information technology: A meta-analysis of key issues”,
Information & Management, vol. 39, no. 5, (2002), pp. 403-414.
C. Park and Y. Kim, “Identifying Key Factors Affecting Consumer Purchase Behaviour in an Online
Shopping Context”, International Journal of Retail and Distribution Management. vol. 31, no. 6, (2003), pp.
16-29.
D. J. Paré, (2003), “Does this site deliver? B2B e-commerce services for developing countries”, The
Information Society, vol. 19, pp. 123-134.
D. Ribbink, “Comfort Your Online Customer: Quality, Trust and Loyalty on the Internet”, Managing Service
Quality, vol. 14, no. 6, (2011), pp. 446-456.
S. Sahay and C. Avgerou, (2002), “Introducing the special issue on information and communication
technologies in developing countries”, The Information Society, vol. 18, pp. 73-76.
D. W. Straub, K. D Loch and C. E. Hill, “Transfer of information technology to the Arab world: A test of
cultural influence modeling”, Journal of Global Information Management, vol. 9, no. 4, (2001), pp. 6-28.
World IT Report, New partnership in Jordan to bring new sophisticated services, (2003).
Author
Ahmad Al-Khasawneh is an Associate Professor of Computer
information system at Hashemite University and was a director of
eLearning Center. He holds the PhD and M.Sc. of information and
software systems and technology from Newcastle University,
Australia and B.S in computer and automatic control engineering.
He has involved in many presentations and workshops. Dr.
Khasawneh has 20 years of experience in ICT field and in ICT
applications and acts as technical advisor to the Royal Jordanian
Airlines director on issues related to the development of travel
industry and ICT strategy. Prior to joining the Hashemite University
of Jordan, he held several key positions with major international ICT
consultancy and solutions firms and lecturer in IT related topics at
Newcastle University, Australia. Currently, he is the dean of the
Prince Hussein Bin Abdullah II for Information Technology at
Hashemite University.
72
Copyright ⓒ 2014 SERSC
Download