Correlation Analysis Between Factors Influencing NFC Mobile Wallet Proximity Payment and the Intention to Use

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The rapid evolution of mobile technologies and increasing diffusion of smartphones have given opportunity for innovative companies to create new payment solutions and offer value-added services to their customers. Near Field Communication (NFC) mobile payment has been emerging as a noticeable phenomenon that can enable consumers to turn their smartphones into digital wallets. Although there has been a wide coverage on mass consumer acceptance of mobile payments, lack of effort made on the study related to acceptance of NFC mobile wallet proximity payment that considers both the human and security perspectives. The purpose of this study is to identify the factors influencing the secure use of NFC mobile payment system. The study proposed an acceptance model to help in mitigating the vulnerabilities of NFC technology thus builds understanding on how to improve the uptake rate of the technology. Aconceptual model was developed considering two main dimensions containing eight independent factors, which are: Perceived Ease of Use, Perceived Usefulness, Ubiquity, Awareness, Perceived Risk, Structural Assurance, Security and Privacy, and Trust. The study conducts a survey questionnaire that involves 209 valid respondents to evaluate the proposed conceptual technology acceptance model of NFC mobile wallet proximity payment system. The result of the analysis shows that all the independent variables (Perceived Ease of Use, Perceived Usefulness, Ubiquity, Awareness, Perceived Risk, Structural Assurance, Security and Privacy, and Trust) have significant influence to the acceptance of NFC Mobile Wallet Proximity Payment in Malaysian environment. All factors are found to have positive influence on the acceptance except for Perceived Risk entailing future works to be conducted qualitatively to obtain a more in-depth meaning of the result of this study.

     

     


  • Keywords


    NFC; Mobile Wallet; Technology Acceptance; Human Perspective; Security Perspective

  • References


      [1] G. W.-H. Tan, K.-B. Ooi, S.-C. Chong, and T.-S. Hew, “NFC mobile credit card: The next frontier of mobile payment?,” Telemat. Inform., vol. 31, no. 2, pp. 292–307, May 2014.

      [2] P. De, K. Dey, V. Mankar, and S. Mukherjea, “Towards an interoperable mobile wallet service,” in Emerging Technologies for a Smarter World (CEWIT), 2013 10th International Conference and Expo on, 2013, pp. 1–6.

      [3] Alliance, “The Mobile Payments and NFC Landscape,” Smart Card Alliance Paym. Counc. White Pap., 2011.

      [4] S. Bakhtiari, A. Baraani, and M.-R. Khayyambashi, “MobiCash: A New Anonymous Mobile Payment System Implemented by Elliptic Curve Cryptography,” 2009, pp. 286–290.

      [5] G. Arcese, G. Campagna, S. Flammini, and O. Martucci, “Near Field Communication: Technology and Market Trends,” Technologies, vol. 2, no. 3, pp. 143–163, Sep. 2014.

      [6] K. Weiss, “Mobile payments, digital wallets and tunnel vision,” Biom. Technol. Today, vol. 2011, no. 9, pp. 8–9, 2011.

      [7] W. Hernandez, “Benefits of Accepting Contactless Payments,” First Data Corporation, UK, 2011.

      [8] T.-T. T. Pham and J. C. Ho, “What are the core drivers in consumer adoption of NFC-based mobile payments?: A proposed research framework,” in Management of Engineering & Technology (PICMET), 2014 Portland International Conference on, 2014, pp. 3041–3049.

      [9] A. Aljohani, “Mobile Payments with Instant Settlements,” 2014, pp. 181–185.

      [10] U. B. Ceipidor, C. M. Medaglia, A. Opromolla, V. Volpi, A. Moroni, and S. Sposato, “A Survey about User Experience Improvement in Mobile Proximity Payment,” 2012, pp. 51–56.

      [11] V. Sharmas, P. Gusain, and P. Kumar, “Near field Communication,” in Proceedings of the Conference on Advances in Communication and Control Systems-2013, 2013.

      [12] N. A. Chattha, “NFC—Vulnerabilities and defense,” in Information Assurance and Cyber Security (CIACS), 2014 Conference on, 2014, pp. 35–38.

      [13] H. Zhao and S. Muftic, “The concept of secure mobile wallet,” in Internet Security (WorldCIS), 2011 World Congress on, 2011, pp. 54–58.

      [14] T. Qasim, S. Siddiqui, and others, “Interactive shopping with mobile wallet,” in Sustainable Technologies (WCST), 2012 World Congress on, 2012, pp. 32–36.

      [15] T. Qasim, S. Siddiqui, and others, “Interactive shopping with mobile wallet,” in Sustainable Technologies (WCST), 2012 World Congress on, 2012, pp. 32–36.

      [16] M. Carr, “Mobile payment systems and services: an introduction,” in Mobile Payment Forum, 2008, pp. 1–12.

      [17] T. Halevi, D. Ma, N. Saxena, and T. Xiang, “Secure proximity detection for NFC devices based on ambient sensor data,” in Computer Security–ESORICS 2012, Springer, 2012, pp. 379–396.

      [18] H. Yan and Z. Yang, “An Empirical Examination of User Adoption Mobile Payment,” 2014, pp. 156–162.

      [19] Mobile Marketing Association, “Mobile Banking Overview (NA),” Mobile Marketing Association, 2009.

      [20] S. Negash, “Mobile Banking Adoption by Under-Banked Communities in the United States: Adapting Mobile Banking Features from Low-Income Countries,” 2011, pp. 205–209.

      [21] N. L. C. D Harrison McKnight, “What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology,” Int. J. Electron. Commer., vol. 6, no. 2, pp. 35–59, 2001.

      [22] Z. Liu, Q. Min, and S. Ji, “An Empirical Study on Mobile Banking Adoption: The Role of Trust,” 2009, pp. 7–13.

      [23] L. Yao, X. Xie, Q. Zhang, L. T. Yang, A. Y. Zomaya, and H. Jin, Eds., Advances in Services Computing, vol. 9464. Cham: Springer International Publishing, 2015.

      [24] T. Zhou and (first), “An Empirical Examination of Initial Trust in Mobile Payment,” Wirel. Pers. Commun., vol. 77, no. 2, pp. 1519–1531, Jul. 2014.

      [25] “Factors Affecting the Adoptionof Mobile Banking.pdf.” .

      [26] I. Brown, Z. Cajee, D. Davies, and S. Stroebel, “Cell phone banking: predictors of adoption in South Africa—an exploratory study,” Int. J. Inf. Manag., vol. 23, no. 5, pp. 381–394, Oct. 2003.

      [27] Y. Lu, S. Yang, P. Y. K. Chau, and Y. Cao, “Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective,” Inf. Manage., vol. 48, no. 8, pp. 393–403, Dec. 2011.

      [28] J. Benamati, M. A. Fuller, M. A. Serva, and J. Baroudi, “Clarifying the Integration of Trust and TAM in E-Commerce Environments: Implications for Systems Design and Management,” IEEE Trans. Eng. Manag., vol. 57, no. 3, pp. 380–393, Aug. 2010.

      [29] F. D. Schönbrodt and M. Perugini, “At what sample size do correlations stabilize?,” J. Res. Personal., vol. 47, no. 5, pp. 609–612, Oct. 2013.

      [30] P. Julie, “SPSS SURVIVAL MANUAL A step by step guide to data analysis using SPSS for Windows,” (Version 12), 2005.


 

View

Download

Article ID: 22931
 
DOI: 10.14419/ijet.v7i3.20.22931




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.