Security concerns and trust in the adoption of m-commerce

Alexios Vasileiadis


Purpose – to deeply examine customers’ perception in terms of how the determinants of trust and perceived risk affect their intention to adopt mobile commerce.

Design/methodology/approach – literature review, conceptual framework, modelling method, quantitative survey methodology (questionnaire instrument).

Findings – the perception of risk in terms of privacy, m-payments, m-commerce legislation and quality of delivered products has negative effect in the intention to adopt mobile commerce, while the good online vendors’ reputation, enticing promises, good encryption security and transparency, reduce the effect of risk and increase the intention to use m-commerce. The availability of easy to understand and find policies have positive effect in the intention to use m-commerce. When customers feel free of risks and have high level of trust in the intention to use mobile commerce they actually adopt it.

Research limitation/implications –this empirical research contributed to the theory by exploring which factors influence or deter the m-commerce adoption. However, the UTAUT model, simple random sampling method and case studies on how the online vendors perform towards this topic are worth-exploring by future researchers.

Practical implications – the research results show that mobile technology manufacturers and developers should improve both software and wireless network security, online vendors should improve their online reputation, transparency, and mobile website navigation. Lawmakers should improve m-commerce legislation to better protect customers in case of dispute with online vendors.

Originality/value – previous researchers have never focused solely and in-depth on the determinants of perceived risk and trust. Moreover, this object had never been examined in the Greek Population.

Keywords: mobile commerce adoption, security concerns, trust, perceived risks

Research type: literature review, Conceptual paper, Research paper


mobile commerce adoption; security concerns; trust; perceived risks

Full Text:



Ajzen, I. 1991. The Theory of Planned Behaviour. Organizational Behaviour and human decision processes, 50: 179-211.

Amoroso, D.L.; Hunsinger, D.S. 2009. Understanding consumers’ acceptance of online purchasing. Journal of Information Technology Management, 10(1): 15-41.

Ashley, P.; Boyd, P. 2006 Quantitative and Qualitative Approaches to Research in Environmental Management. Australasian Journal of environmental management, 13(2): 70-78.

Benbasat, I. et al. 2005. Trust and adoption of online recommendation agents. Journal of the AIS, 6(3): 75-101.

Bhattacherjee, A. 2012. Social Science Research: Principles, Methods, and Practices. Florida: Global Text Project.

Bruns, N.; Grove, S.K. 1987. The practice of research, conduct, critique, and utilization. Saunders.

Challeppa, R.K.; Pavlou, P. 2002. Perceived Information Security, Financial Liability, and Consumer Trust in Electronic Commerce Transactions. Journal of Logistics Information Management, 15(5/6): 358-368.

Chari, S. et al. 2001. Security Issues in M-Commerce: A Usage-Based Taxonomy. Proceeding E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand. Berlin:Heidelberg p. 264-282.

Clarke, R. 2001. Person location and person tracking - Technologies, risks and policy implications. Information technology and People, 14(2): 206-231.

Cochran, W. G. 1977. Sampling Techniques. Canada: John Wiley & Sons.

Culnan, M.J. 1993. How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS Quarterly, 17(3): 341-363.

Davis, F. et al. 1989. User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8): 982-1003.

De Ruyter, K. et al. 2001. Customer Adoption of E-service: An Experimental Study. International Journal of Service Industry Management, 12(2): 184-207.

Fishbein, M.; Ajzen, 1975. Belief, attitude, intention, and behaviour: An Introduction to Theory and Research, Massachusetts: Addison-Wesley Pub.

Friedman, B. et al. 2000. Trust Online. Communications of the ACM, 43(12): 34-40.

Gururajan, R. 2002. New Financial Transaction Security Concerns in Mobile Commerce. Information & Security: An International Journal, 8(1): 71-86.

Holsapple, C.W.; Sasidharan, S. 2005. The dynamics of trust in online B2C e-commerce: a research model and agenda. Information Systems and E-business Management, 3(4): 377-403.

Jarvenpaa, S.L. et al. 2000. Consumer trust in an Internet store. Information Technology Management, 1(1-2): 45–71.

Joubert, J.; Belle, J.-P. 2013. The Role of Trust and Risk in Mobile Commerce Adoption within South Africa. International Journal of Business, Humanities and Technology, 3(2): 27-38.

Lewis, J.; Weigert, A.; 1985. Trust as a social reality. Social Forces, 63(4): 967-985.

Liu, Y. et al. 2006. Enabling Technologies for Wireless E-Business. Berlin: Springer Berlin Heidelberg.

Lu, J. et al, 2003 Technology acceptance model for wireless internet. Internet Research: Electronics Networking Applications and Policy, 13(3): 206-222.

Luarn, P.; Lin, H.H. 2005. Toward an understanding of the behavioral intention to use mobile banking. Computer in Human Behaviour, 21(6): 873-891.

Lundahl, U.; Skärvad, P.H. 1992. Utredningsmetodik för samhällsvetare och ekonomer, 2 edtition. Sweden: Studentlitteratur.

Mahatanankoon, P. et al. 2005. Consumer-based m-commerce: exploring consumer perception of mobile applications. Computer Standards & Interfaces, 27(4): 347-357.

Nah, F.; Davis F. 2002. HCI Research Issues in Electronic Commerce. Journal of Electronic Commerce Research, 3(1): 98-113.

Pavlou, P.A. 2003. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 3(1): 101-134

Phelps, J. et al. 2000. Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy and Marketing, 19(1):27-41

Shon, T.H.; Swatman, P.M.C. 1997. Effectiveness criteria for internet payment systems. Proceedings of “PAWEC’97”, the 1st Pacific Asia Workshop on Electronic, 7: 1-18.

Siau, K. et al. 2003. Development of a Framework for Trust in Mobile Commerce. Proceedings of the Second Annual Workshop on HCI Research in MIS. Washington:Seatle, p. 85-89

Steinfield, C. 2004. The development of location based services in mobile commerce. Heidelberg: springer publishing company.

Swaminatha, T.M.; Ghosh, A.K. 2001. Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2): 51-57.

Taylor, S.; Todd, P. 1995. Understanding Information Technology Usage: A Test of Competing Models. Information System Research, 6(2): 144-176.

Vance, A. et al. 2008. Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture. Journal of Management Information Systems, 24(4): 73-100.

Veijalainen, J. 2006. Mobile Commerce Regulatory Frameworks under Digital Convergence, Proceedings of Helsinki Mobility Roundtable, 6(55): 1-12.

Venkatesh, J.; Kumar, S.D. 2012. Evaluation of mobile payment system and its service providers. International Journal of Multidisciplinary Research, 2(4): 118-123.

Venkatesh, V.; Davis, F. 2000. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2): 186-204.

Venkatesh, V. et al. 2003. User Acceptance of Information Technology: Toward a Unified View. Management Information Systems Quarterly, 27(3): 425-478.

Wang, Y.S. et al. 2006. Predicting consumer intention to use mobile service. Information Systems Journal, 16(1): 157-179.

Joseph, D. B. et al. 2012. An Analysis of Web Privacy Policies across Industries [interactive]. Worcester Polytechnic Institute [Accessed: 2013-09-25] .

Έρευνα Χρήσης Τεχνολογιών Πληροφόρησης και Επικοινωνίας από τα νοικοκυριά [interactive]. Hellinic Statistical Authority, 2011. [Accessed: 2013-10-10].



  • There are currently no refbacks.

"Social Technologies" ISSN online 2029-7564