You are on page 1of 14

International Journal of Human–Computer Interaction

ISSN: 1044-7318 (Print) 1532-7590 (Online) Journal homepage: http://www.tandfonline.com/loi/hihc20

An Empirical Study of the Impacts of Perceived


Security and Knowledge on Continuous Intention
to Use Mobile Fintech Payment Services

Se Hun Lim, Dan J. Kim, Yeon Hur & Kunsu Park

To cite this article: Se Hun Lim, Dan J. Kim, Yeon Hur & Kunsu Park (2018): An Empirical
Study of the Impacts of Perceived Security and Knowledge on Continuous Intention to Use
Mobile Fintech Payment Services, International Journal of Human–Computer Interaction, DOI:
10.1080/10447318.2018.1507132

To link to this article: https://doi.org/10.1080/10447318.2018.1507132

Published online: 17 Aug 2018.

Submit your article to this journal

View Crossmark data

Full Terms & Conditions of access and use can be found at


http://www.tandfonline.com/action/journalInformation?journalCode=hihc20
INTERNATIONAL JOURNAL OF HUMAN–COMPUTER INTERACTION
https://doi.org/10.1080/10447318.2018.1507132

An Empirical Study of the Impacts of Perceived Security and Knowledge on


Continuous Intention to Use Mobile Fintech Payment Services
Se Hun Lima, Dan J. Kimb, Yeon Hurc, and Kunsu Parkd
a
Department of MIS, Sangji University, Wonju, Gangwon, Korea; bDepartment of Information Technology & Decision Sciences, University of North
Texas, Denton, TX, USA; cUSA School of Business, Chung-ang University, Seoul, Korea; dDepartment of Accounting, Bang College of Business,
Almaty, Kazakhstan

ABSTRACT
Financial technology (Fintech) services using emerging technology such as the Internet of Things (IoT) is
becoming more prevalent. The recent proliferation of the mobile payment sector led by innovative
mobile Fintech payment services such as Apple Pay and Samsung Pay is the most important and fastest
growing Fintech services from consumers’ perspective. Although businesses have been making efforts
to spread the use of the services, security is crucial in the diffusion of the services. Despite the
importance, the role of perceived security in continuous intention to use mobile, Fintech services has
not yet been investigated in depth. Thus, this study investigates the relationships between perceived
security, knowledge regarding the services, confirmation, perceived usefulness, and satisfaction. We
propose a research model using an extended post-acceptance model (EPAM) as a theoretical framework
in the context of Fintech services. We then validate the model using the data collected from the service
users. The analyzed results show that knowledge and perceived security in mobile Fintech services have
a significant influence on users’ confirmation and perceived usefulness. However, perceived security
does not directly influence users’ satisfaction and continual intention to use. We further find significant
relationships among confirmation, perceived usefulness, satisfaction, and continual intention to use of
the services. We discuss theoretical and practical contributions of the study.

1. Introduction various organizations, including device manufacturers, IT dis-


tributors, IT service providers, banks, and credit card
New information and communication technologies (ICT) are
companies.1
dramatically transforming human life, economic systems, and
The recent proliferation of the mobile payment sector led
society in general, into something very different from what we
by innovative mobile Fintech payment services such as Apple
used to do and think about over the last few decades (Tasca,
Pay, Samsung Pay, Kakao Pay, etc. is evidence that it is the
Aste, Pelizzon, & Perony, 2016). In recent years, many com-
most important and fastest growing sector from consumers’
panies have strengthened their customer service to meet cus-
perspective. These services, provided by non-financial organi-
tomers’ needs and satisfaction (Kim, 2012). In particular,
zations, are spreading at great speed because they allow users
companies actively utilize ICT to provide their customers
to simply entering their password, PIN number, and/or bio-
with enhanced service quality (Finn, Wang, & Frank, 2009;
metric authentications without the need to install other com-
Kim, 2012). Financial technology (Fintech) services known as
plicated add-on such as Active-X (Lim et al., 2017). Initial
Fintech is a sector of services created by combining finance
adoption of Fintech payment services is a crucial first step
and technology to provide more efficient and accessible finan-
toward the realization of the Fintech sector because its even-
cial services (Lim et al., 2017). Fintech is used in various
tual success is determined primarily by users’ continued use
industry sectors such as finance, insurance, securities, distri-
(Bhattacherjee, 2001).
bution, and e-commerce payment (Hur & Lim, 2017). The
Various financial services provide cost-effective platforms
popularity of Fintech increases as the Fourth Industrial
as an alternative to traditional financial services and enhance
Revolution has triggered a seismic shift in the financial system
user experience through easy and convenient features of ser-
(Tasca et al., 2016). In finance, for example, Fintech facilitates
vices. However, from users’ perspective, there are major
financial activities such as trading, corporate business, and
security and privacy concerns regarding the financial transac-
services provided to retail customers (Lim et al., 2017).
tion records and leakage or illegal use of their personal infor-
Currently, there are a variety of Fintech services (e.g. pay-
mation (Lim, 2016). A report by Mckinsey & Company
ments, digital banking, lending and financing, asset manage-
describes consumers’ security and privacy concerns in
ment, crowdfunding, insurance, and others) offered by

CONTACT Dan J. Kim dan.kim@unt.edu Information Technology & Decision Sciences, College of Business, University of North Texas, 1155 Union Circle,
Denton, TX 76203-5249, USA.
Color versions of one or more of the figures in the article can be found online at www.tandfonline.com/hihc.
© 2018 Taylor & Francis Group, LLC
2 S. H. LIM ET AL.

Fintech services as the greatest obstacle to their growth.2 online banking, mobile trading, etc.), while emergent
Accordingly, customers’ concerns over security and privacy Fintech services are innovative financial services provided by
may lead to a fatal problem for the services (Lee & An, 2016). non-financial organizations, such as mobile payment services
Despite this evidence, limited empirical studies have inves- (e.g. Apple Pay, Samsung Pay, Kakao Pay), crowdfunding,
tigated the role of perceived security of service satisfaction cryptocurrency, and others (Lim et al., 2017).
and behavior intention to use the Fintech services. According to the “2016 ITA FinTech Top Markets Report”
Specifically, empirical research on the influence of perceived of the US Department of Commerce’s International Trade
security on users’ post-adoption behavior in the context of Department,4 a wide variety of business organizations have
mobile Fintech payment services is still in its infancy. Thus, to been increasingly interested in Fintech services (US
explain the post-adoption process of mobile Fintech payment Department of Commerce, International Trade
services, we propose an extended post-acceptance model Administration, 2016). Business organizations in the Fintech
(EPAM) combining the expectation-confirmation theory industry can be divided into four major groups based on the
(ECT) and a post-acceptance model (PAM) proposed by applications and services they provide (Nicoletti, 2017): cus-
Oliver (1981) and Bhattacherjee (2001), respectively. Then, tomer service, financial services, compliance, and business
using EPAM as a theoretical framework, we propose a process. Customer service Fintech refers to the processes
research model to explain the persistence of mobile Fintech and services that deal with the customer at the user interface
payment services in terms of Fintech service knowledge and level as well as the backend database level. Electronic billing
perceived concerns on security and privacy from users’ per- and mobile payment technology, electronic trading and bank-
spective. Given that the use of mobile Fintech payment ser- ing, customer relationship management are examples of this
vices has become increasingly prevalent, this research service group. Financial services include applications and
provides in-depth understanding of how users’ knowledge processes for portfolio management, exchanges, assess man-
and perceived security can influence the persistence of mobile agement, and risk management. Compliance refers to meth-
Fintech payment services. The findings of the study provide ods (e.g. financial statement reporting and analysis) that
theoretical contributions and practical insights to develop business firms use to comply with external and internal reg-
customer service and marketing strategies in mobile Fintech ulations. Business processes are related to the collection of
payment services. linked activities with the objective of delivering a specific
The organization of this article is as follows. The next result, including document management, knowledge manage-
section discusses a general background of Fintech services, ment, system integration, etc. (Nicoletti, 2017).
several PAMs, and the EPAM as an overarching theoretical In this study, among various Fintech services that use
model of the study. Section 3 proposes a research model and different emerging technologies, we mainly focus on one of
hypotheses, and section 4 presents research method including the fastest growing Fintech services from consumers’ perspec-
measurement item development and data collection proce- tive—i.e., mobile Fintech payment services such as Apple Pay,
dure. Section 5 explains the results of data analysis including Samsung Pay, Kakao Pay, etc. We choose the mobile Fintech
measurement model testing and structural model testing. payment services (mobile Fintech service, hereafter) for a
Finally, Section 6 presents the findings, theoretical contribu- couple of reasons. First, the use of smartphones for mobile
tions, and practical implications of the study including limita- banking services provided by traditional financial institutions
tions and directions of future research as well. expands to various areas in more convenient ways. Recently,
the provision of emerging ICT such as IoT, by traditional
financial organizations such as banks and stock trading com-
2. Theoretical background and extended post- panies offer more enhanced financial services to their custo-
acceptance model (EPAM) mers; Mobile payment and trading services are one of the
most popular services.5 Second, non-financial organizations
Fintech services
such as Apple and Samsung have greatly contributed to the
Fintech is a set of new and innovative financial services that transformation of personal financial services using emerging
incorporate a plethora of new ICT (e.g. Internet of Things technologies such IoT, NFC, and smart devices. The IoT is a
[IoT]). Although the term is relatively new and still in the network of connected IT devices via the Internet, which share
process of being developed, it has been used in the past to information and communicate with other smart devices.
describe innovative financial services using emerging technol- Mobile Fintech services are the most user-friendly Fintech
ogies such as Blockchain, cryptocurrencies, IoT, Near field services that consumers apparently recognize and use, i.e.
communication (NFC), mobile wallets, Crowdfunding, provided by non-financial organizations (Lee, 2015).
Artificial Intelligence (AI) in financial services, and others
(Lim et al., 2017; Nicoletti, 2017). Fintech services have spread
Expected confirmation theory (ECT) and post-acceptance
as they enable companies to achieve business process innova-
model (PAM)
tion in the financial sector and provide more innovative
financial services to customers.3 Fintech services can be clas- Since the technology adoption model (TAM) proposed by
sified as two broad types: traditional Fintech services and Davis (1986; 1989), many studies have used the TAM as a
emergent Fintech services. Traditional financial services background theory in different technological contexts (e.g.
include mobile backing and asset management using IT to Davis, Bagozzi, & Warshaw, 1989; Kim, 2008; Kim, Ferrin,
support traditional services of financial organizations (e.g. & Rao, 2008, 2009; Venkatesh & Davis, 2000; Venkatesh,
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 3

Morris, Davis, & Davis, 2003). While early technology accep- behavior after they accept a technology or use a service. The
tance studies mainly focus on how to adopt new technologies mode includes confirmation, perceived usefulness, satisfac-
and promote new technology acceptance in terms of pre- tion, and persistent intention to use IS services such as
acceptance, later studies started to examine how individuals Fintech services. These attributes are important factors in
persistently accept information technology with a focus on the ECT and PAM. We further examine the impact of con-
post-adoption (e.g. Bhattacherjee, 2001; Kim et al., 2009). firmation in the use of Fintech services and the perceived
Recent studies expand the focus areas to include the differ- usefulness of Fintech security on confirmation and perceived
ence of individual acceptance behaviors in information tech- usefulness that are components of the PAM. As an extended
nology, the usefulness of emerging technologies (e.g. IoT), the part of the framework, there are factors influencing the PAM,
factors that affect the acceptance behavior, etc. (Davis et al., such as perceived security in Fintech services.
1989; Venkatesh, 2000; Venkatesh & Bala, 2008; Venkatesh &
Davis, 2000; Venkatesh et al., 2003; Yang, Lu, Gupta, Cao, &
Zhang, 2012).
ECT is a longitudinal model developed in the area of 3. Research model and hypotheses
consumer behavior (Oliver, 1981; Anderson & Sullivan, Based on the proposed EPAM as an overarching theory fra-
1993). Particularly, the model reflects the difference between mework, we propose a research model with hypotheses in the
two points before and after purchase (see Figure 1a). In other context of Fintech services. Figure 3 shows the research model
words, the ECT analyzes the relationship between pre-pur- and hypotheses. The model consists of two factors (i.e. knowl-
chase (i.e. expectation in the initial consumer product) and edge about the mobile Fintech payment service and perceived
post-purchase (i.e. perceived confirmation, perceived satisfac- security) affecting post-adoption behaviors and intentions
tion, and repurchase intention after purchasing behavior). that include confirmation, perceived usefulness, satisfaction,
Among studies on financial services (e.g. online banking) and continuous intention to use the Fintech service. In parti-
using information technology, Bhattacherjee (2001) proposes cular, this study conceptualizes perceived security of Fintech
a PAM based on the ECT model as a theoretical framework. services as a multi-dimensional factor because the security
The PAM explains the continuous acceptance process of protection mechanism of the Fintech services is necessary in
online banking services through the perception of satisfaction multiply layers including service, platform, network, and
and perceived usefulness (see Figure 1b). device. In this study, we propose the perceived security con-
Considering ECT and PAM at theoretical background, we struct as a second-order formative concept that is composed
propose an EPAM as a theoretical framework of the study (see of four first-order constructs (i.e. service security, platform
Figure 2). The proposed model explains users’ post-adoption security, network security, and device security).

Figure 1. ECT and PAM.


4 S. H. LIM ET AL.

Figure 2. Research framework.

H2d (+)
H2c (+)

Confirmation

H3a (+)

Fintech Perceived H5 (+) Continuous


H1 (+) Satisfaction
Service Security intention
Knowledge (2nd Order)
Usefulness H4b (+)

Service Platform Network Device


Security Security Security Security

Figure 3. A proposed research model.

In this study, based on the ECT and PAM, we propose the utilization of information technology (Lim, 2016). In this
relationships among knowledge, perceived security, confirma- study, the knowledge of Fintech services indicates the level
tion, usefulness, satisfaction, and continuous intention to use of knowledge on Fintech service process and utilization.
the mobile Fintech services. The post-adoption model such as According to Lim (2016), since the level of knowledge on
ECT and PAM describe factors affecting consumers’ intention personal information protection influences compliance inten-
to repurchase products or services, the model that explains tion and compliance behaviors of individuals, information
consumer psychology verified by various researchers security education is important for protecting personal infor-
(Dabolkar, Shepard, & Thorpe, 2000; Patterson, Johnson, & mation and thus securing IT services. In general, knowledge
Spreng, 1997; Spreng, MacKenzie, & Olshavsky, 1996; Swan & about individual IT services is created through experience and
Trawick, 1981). Bhattacherjee (2001) analyzes the relationship learning (Lim, 2016). For example, knowledge on mobile
among confirmation, perceived usefulness, satisfaction, and electronic payment systems positively influences the ease of
continuous intention to use in the context of online banking use of the systems (Kim, Mirusmonova, & Lee, 2010).
service users. It is worth noting that the hypotheses that relate As such, knowledge on information technology use is an
to the ECT and PAM are included in this model and analysis, important factor in promoting the use of information tech-
but are not discussed in detail because previous studies nology services. This can also apply to the area of mobile
already validated those paths. The research model articulates Fintech services. For example, the users’ knowledge on the
the hypotheses that are directly related to the new part of mobile Fintech services will make the service more reliable.
EPAM, which is the main theoretical thrust of this study. Lee (2015) emphasizes service security, platform security, net-
work security, and device security as important elements in
the ecosystem constituting the IoT. According to Hur and
Fintech service knowledge and perceived security
Lim (2017), perceived service security, platform security, net-
protection
work security, and device security are important in using IoT-
Knowledge competence in the use of IT services refers to based banking services. Based on the above discussion, this
individual knowledge concerning the understanding and study proposes the hypothesis of a positive relationship
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 5

between the knowledge on Fintech services and the perceived usefulness (H2b), their satisfaction (H2c), and
security of Fintech services. The first hypothesis is as follows. their continuous intention of the use of Fintech
services, respectively.
H1: Users’ knowledge of Fintech services is positively related to
their perceived security of the services.
Post-acceptance model
The ECM and PAM are widely used to explore user’s behavior
Perceived security protection and post-acceptance in different post-adoption contexts. ECM starts from the pre-
sumption that the two key determinants of satisfaction are the
Users’ perception of security protection is a cognitive process
extent of user confirmation and perceived usefulness after
that would affect emotional and behavioral intentions
actual use. Confirmation and satisfaction are positively asso-
(Bhattacherjee, 2001; Hur & Lim, 2017). The relationship
ciated with each other, because confirmation hints at the
among cognition, emotion, and behavioral intentions of the
realization of expected benefits from actual uses. Users’ per-
users of information technology services is continuously cir-
ceived usefulness affects their satisfaction, and satisfaction
culated, which affects the persistent and non-persistent use of
also influences continuous intention to use the relevant tech-
information technology services depending on (or in terms
nology or service. Subsequently satisfaction can positively
of) attitude changes (Bhattacherjee, 2001). In particular, the
affect users’ continuous intention to use; further it shows
subject of this study, the mobile Fintech services, is linked to
that users’ satisfaction has a significant impact on their loyalty
various processes including devices, platforms, networks that
formation in the long term.
are related to the use of ultimate financial services (Hur &
Several studies already tested and validated the relation-
Lim, 2017).
ships among confirmation, usefulness, satisfaction, and con-
The concept of users’ confirmation toward mobile Fintech tinuous intention that have been tested and validated (e.g.
services refers to the degree of agreement between ex-ante Bhattacherjee, 2001; Kim, 2012; Lee, 2010; Lim, Cho, &
expectation on the service and its actual usage experience. We Whang, 2012). In Internet banking services, the level of con-
define confirmation as the users’ subjective belief that Fintech firmation and post-adoption expectations affects the level of
services meet their expectations. Perceived usefulness refers to perceived usefulness and satisfaction of the services
how users perceive the efficiency or effectiveness of the (Bhattacherjee, 2001). Kim (2012) proves the relationship
mobile Fintech payment services. Perceived usefulness in between perceived confirmation and usefulness after com-
using Fintech service means various performance or efficiency modity purchase and also shows that consumers’ confirma-
achieved by the use of Fintech services. Satisfaction with tion after the purchase positively affects their shopping
Fintech services refers to users’ positive feelings obtained satisfaction in e-commerce. The level of perceived usefulness
through using the services. Finally, continuous intention to influences satisfaction and, in turn, affects continuous inten-
use Fintech services indicates users’ intention to continue tion to use e-Learning technology (Lee, 2010).
using the services. Mobile Fintech services generally provide an enhanced inno-
When users recognize higher level of security protec- vative performance than previous online banking services. Since
tions, security control mechanisms and/or procedures of the empirical evidence from many studies supports the relation-
their mobile Fintech services provided, it confirms their ships, we expect that the hypotheses related to ECM and PAM
expectation of that the service is stable to use. At the same are also valid in the context of mobile Fintech payment services.
time, they consider it is useful because the mobile Fintech Therefore, we propose the following hypotheses.
service meets the expectation of the stability (Hur & Lim,
2017). Perceived security (perceived service security, per- H3a/b: Users’ confirmation is positively associated with their
ceived platform security, perceived network security, and perceived usefulness (H3a) and their satisfaction (H3b)
perceived device security) in mobile Fintech services will with the services, respectively.
increase the confirmation of Fintech service users as well
as perceived usefulness. H4a/b: Users’ perceived usefulness is positively associated with
In this study, continuous intention to use mobile their satisfaction (H4a) and their continuous intention
Fintech services refers to that consumers who have the (H4b) to use the services, respectively.
experience to use a mobile Fintech service intend to con-
tinuously use the mobile Fintech service. Perceived secur- H5:User’s satisfaction is positively associated with their contin-
ity in mobile Fintech services is an important higher-level uous intention to use the services.
construct affecting satisfaction and continuous intention
to use the services. Perceived security in mobile Fintech
services can influence continuous intention to use the
4. Research method
services rather than any cognitive factors. Therefore, this
study proposes the following hypotheses. To empirically validate the proposed research model and
hypotheses, we conduct a survey using a survey questionnaire
H2a/b/c/d: Users’ perceived security protection is positively that includes measurement items for the constructs specified
associated with their confirmation (H2a), the in the proposed research model.
6 S. H. LIM ET AL.

Measurement items Data collection


The measurement items of each construct were developed or We have conducted a survey including college students
revised using the items validated from prior studies. First, we and staff members. After excluding incomplete and invalid
developed items for continuous intention to use mobile responses, a total of 149 responses from users who have
Fintech services through the modification of items reported been used any mobile Fintech payment services before
by Bhattacherjee (2001) and Kim (2012). Second, the confir- were used to validate the research model and hypotheses.
mation in the use of Fintech services refers to the users’ Table 1 summarizes the characteristics of the survey
subjective belief that Fintech services meet their expectations. respondents.
We modify the items used by Bhattacherjee (2001) to measure Although the student sample is limited in terms of
users’ confirmation in Fintech services. Third, perceived use- generalization of the research findings, there are a couple
fulness (previously perceived performance) indicates the of reasons to use student sample for this study. First, as
effectiveness and efficiency achieved through the use of the baby boomer generation ages, it is expected that the
Fintech services. We modify the items used by Bhattacherjee digital native consumers known as “Millennials” (those
(2001), Hur and Lim (2017), and Kim (2012) and measure born between 1990 and 2000) play more significant roles
perceived usefulness of Fintech services. Fourth, satisfaction in the global digital economy. According to EY FinTech
with the use of mobile Fintech services means users’ satisfac- Adoption Index 2017,6 published by EY (Ernst & Young),
tion through using Fintech services. We use the items used by digitally active consumers are the mass adopters of Fintech
Bhattacherjee (2001) and modify them to fit the situation of solutions as they expect greater use of digital technologies
this study. such as mobile digital devices, IoT, etc. Second, the age
As stressed above, it is important to understand knowl- groups that are the most likely to be attracted to Fintech
edge and security in using mobile Fintech services. solutions are correlated with those most likely to use
Knowledge of Fintech services refers to the knowledge of digital technologies. These consumers are younger (aged
technology, operations, processes, and operating principles 18–44) and more educated consumers.7 Therefore,
in Fintech services. Based on Lim (2016), Kim and although student sample has a limitation, they are major-
Garrison, (2010), and Kim et al. (2010), we develop mea- ity of Fintech users.
surement items to capture the knowledge of mobile
Fintech services. Finally, to measure the security of the
mobile Fintech services, we categorize security into service 5. Data analysis and results
security, platform security, network security, and device
security. Fintech service security refers to perceived secur- Using the empirical data collected for the study, we con-
ity in the process of using Fintech services, and platform ducted data analysis with a partial least squares (PLS)
security refers to the perceived security of a device plat- method that supports a component-based structural equa-
form for the use of IoT services. Network security refers to tion modeling (SEM) (Hair, Hult, Ringle, & Sartedt, 2013).
the perceived security of the wired and wireless network The advantages of the PLS method are that it draws
for the use of Fintech services, and device security refers analytical conclusions that are useful in the development
to the perceived security of devices in the use of mobile of the theory in the field of exploratory research and that
Fintech services. Regarding four measures of perceived it yields statistically significant conclusions even with a
security in Fintech services, we modify perceived security small sample of data (Chin & Newsted, 1999; Fornell &
measures used in Hur and Lim’s (2017) study on IoT- Bookstein, 1982; Hair et al., 2013). Specifically, we used
based banking services. In this study, aseven7-point SmartPLS 2.0 M38 software and examine the reliability
Likert scale is used for a measurement. The Likert scale and validity of research variables through a measurement
ranges from 1 (“strongly disagree”) to 7 (“strongly agree”). model analysis and the causal relationship between inde-
Appendix A summarizes the measurement items of the pendent variables and dependent variables using a struc-
study. tural model analysis.

Table 1. Sample demographics (n = 149).


Category Frequency (%) Category Frequency (%)
Gender Age
Male 100 (67.1) Under 20 25 (16.8)
Female 48 (32.2) 21 ~ 25 93 (62.4)
Not disclose 1 (0.7) Over 26 28 (18.7)
Not disclose 3 (2.0)
Education level Frequency of the services per a month
freshmen 33 (22.1) 1–2 62 (41.6)
sophomores 22 (14.8) 3–4 36 (24.2)
juniors 44 (29.5) 5–6 20 (13.4)
seniors 45 (30.2) 7–8 5 (3.4)
post-undergraduates 1 (0.7) 9–10 4 (2.7)
post-graduates 1 (0.7) More than 11 19 (12.8)
etc. 3 (2) Not disclose 1 (0.7)
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 7

Measurement model analysis factors were set as independent variables and then are ana-
lyzed. It is generally considered that there is no multicolli-
For the validity of measurement model, we checked the
nearity problem when the VIF value is over 0.5 and
appropriateness of the measurement model through content
multicollinearity is low when the tolerance value is close to
validity, reliability, convergent validity, and discriminant
1 (Mansfield & Helms, 1982). The VIF and the tolerance
validity of measurement variables (Gefen & Straub, 2005;
values in our analysis are as follows: confirmation (tolerance:
Hair et al., 2013; Hulland, 1999). First, the reliability analysis
0.202; VIF: 4.959), knowledge of Fintech services (tolerance:
of measurement variables was performed. Reliability analysis
0.817; VIF: 1.224), satisfaction (tolerance: 0.170; VIF: 5.873),
of measured variables is based on Cronbach’s Alpha (CA) and
perceived security (tolerance: 0.674; VIF: 1.483), and per-
Composite Reliability (CR) values (Fornell & Larcker, 1981;
ceived usefulness (tolerance: 0.422; VIF: 2.369). There is no
Hair, Black, Babin, Anderson, & Tatham, 2006; Nunnally &
multicollinearity problem for independent variables and
Bernstein, 1994). In general, social science research evaluates
dependent variables.
that the variables are reliable when either the CA or CR value
exceeds 0.7 (Fornell & Larcker, 1981; Nunnally & Bernstein,
1994). Another validity criterion is the average variance
extracted (AVE) value, which is considered to be reliable Structural model analysis
when the AVE value exceeds 0.5 (Fornell & Larcker, 1981; In the structural model analysis, a two-step approach was
Hair et al., 2006). As shown in Table 2, the CA and CR values used to construct perceived security variables as second-
for all variables, such as confirmation, usefulness, satisfaction, order variables and perceived service security, perceived
continuous intention to use, knowledge, and security, exceed device security, perceived network security, and perceived
more than 0.7 and all AVE values are higher than 0.5. Thus, device security are constructed as first-order variables. To
the constructs used in this study are considered to have estimate the structural path model, we selected the bootstrap
sufficient reliability and validity (Fornell & Larcker, 1981; PLS Algorithm with a value of 1000 maximum number of
Hair et al., 2006; Nunnally & Bernstein, 1994). iterations because the number of data of the study was rela-
In addition, the discriminant validity and internal validity tively small in the causality analysis of the structural model
of research variables in the measurement model are deter- (Hair et al., 2013). For the second-order factor analysis, this
mined by correlation coefficients, the comparison of the study follows the methodology used in Pavlou and Gefen
square root value of AVE, and the result of factor analysis (2005). The relationship between the second-order factor
(Hair et al., 2006, 2013). First of all, correlation coefficients and each first-order factors is formative.
among research variables were examined. Table 3 shows the The structural model analysis results are presented in
square root value of AVE and correlation coefficients and Figure 4. The results show that users’ knowledge of the ser-
Appendix B depicts the result of confirmative factor analysis. vices has a significant positive effect on perceived security
In addition, the square root values of AVE on the diagonal (β = 0.42, p < 0.001), supporting hypothesis H1. Perceived
lines for each research variable were higher than correlation security significantly affects confirmation (β = 0.46, p < 0.001)
coefficients. Overall, it can be concluded that the measure- and usefulness (β = 0.14, p < 0.01) of Fintech services; the
ment variables of this study have confirmed the validity of hypothesis H2a and H2b are supported. Unlike our expecta-
discrimination (Fornell & Larcker, 1981). tion, perceived security does not significantly influence satis-
In addition, variance inflation factor (VIF) and tolerance faction (β = 0.06, p > 0.05) and continuous intention to use
values were used to test multicollinearity problems for inde- the Fintech services (β = 0.06, p > 0.05); the hypothesis H2c
pendent variables (confirmation, knowledge of Fintech ser- and H2d are not supported, respectively. Confirmation has a
vices, usefulness, perceived security and satisfaction) and significant positive effect on both usefulness (β = 0.64,
dependent variables (continuous intention to use). In the p < 0.001) and satisfaction (β = 0.70, p < 0.001), supporting
analysis of the VIF and the tolerance, a final dependent vari- the hypothesis H3a and H3b, respectively. Perceived useful-
able was continuous intention to use and the remaining ness of the Fintech services significantly affect both

Table 2. Reliability and validity.


Items
Constructs Mean (S.D.) No. AVE Composite Reliability Cronbach Alpha Related study
Knowledge 4.03 (1.48) 4 0.82 0.95 0.93 Lim (2016), Kim, Garrison, (2010), Kim et al. (2010)
Device 4.70 (1.19) 3 0.69 0.87 0.77 Hur and Lim (2017), Lee (2015)
security
Network 4.33 (1.28) 3 0.69 0.87 0.78 Hur and Lim (2017), Lee (2015)
security
Platform 4.47 (1.26) 3 0.80 0.92 0.87 Hur and Lim (2017), Lee (2015)
security
Service 4.46 (1.22) 4 0.80 0.94 0.92 Hur and Lim (2017), Lee (2015)
security
Confirmation 5.27 (1.33) 3 0.87 0.95 0.93 Bhattacherjee (2001),
Kim (2012)
Usefulness 5.54 (1.13) 5 0.76 0.94 0.92 Bhattacherjee (2001), Kim (2012), Hur and Lim (2017)
Satisfaction 5.26 (1.31) 3 0.83 0.94 0.90 Bhattacherjee (2001)
Continuous intention to use 5.22 (1.51) 3 0.88 0.96 0.93 Bhattacherjee (2001)
8 S. H. LIM ET AL.

Table 3. Correlation.
(1) (2) (3) (4) (5) (6) (7) (8) (9)
(1) Confirmation 0.93
(2) Continuous intention to use 0.76 0.94
(3) Device security 0.45 0.40 0.83
(4) Knowledge 0.32 0.36 0.36 0.91
(5) Network security 0.37 0.37 0.70 0.36 0.83
(6) Platform security 0.36 0.30 0.63 0.37 0.75 0.89
(7) Satisfaction 0.89 0.77 0.48 0.30 0.37 0.37 0.91
(8) Service security 0.35 0.38 0.60 0.33 0.70 0.76 0.40 0.89
(9) Usefulness 0.70 0.66 0.40 0.26 0.32 0.38 0.76 0.34 0.87
Note: The bold diagonal value is the square root of AVE

0.06
(1.24)
0.06
(1.71)
Confirmation
(R2=0.21)

0.64***
(10.09)
Fintech Perceived Continuous
0.42*** Satisfaction 0.62***
intention
Service Security (R2=.84) (7.18)
Knowledge
(4.90)
(2nd Order) (R2=0.61)
Usefulness 0.16*
(R2=0.51) (1.98)

* Significant at a 0.05 level,


Service Platform Network Device
** 0.01 level, and
Security Security Security Security
*** 0.001 level

Figure 4. Results.

satisfaction (β = 0.24, p < 0.01) and continuous intention to model to explore the role of perceived security in continuous
use the services (β = 0.16, p < 0.05); the hypothesis H4a and intention to use the services, which is important for the
H4b are supported, respectively. Finally, user’s satisfaction proliferation of the services. There are several findings of the
positively affects their continuous intention to use the services study. First, the results of this study confirm that perceived
(β = 0.62, p < 0.001), supporting the hypothesis H5. security of Fintech services, the higher order construct of this
In addition, we analyzed the influence of first-order vari- study, is well formulated by four first-order factors: service
ables through additional analysis of the impact of perceived security, network security, platform security, and device
security, a second-order variable. The results show that the security. We also find evidence of the relative importance of
first-order constructs such as service security (β = 0.24, perceived service security, network security, platform security
p < 0.001), platform security (β = 0.38, p < 0.001), network on perceived security in Fintech services. We expect that the
security (β = 0.24, p < 0.001), and device security (β = 0.28, results provide a useful guideline for establishing a strategy in
p < 0.001) have a significant impact on the second-order response to the effect of perceive security on confirmation and
construct, perceived security. The R2 values represent the perceived usefulness. Therefore, service providers should
explanatory power of the dependent constructs of the research establish a diffusion strategy on the use of the services by
model. The results also show that the structural model considering the relative importance of the factors.
explains a reasonable amount of the variance in the dependent Second, as an antecedent of perceived security of the ser-
constructs; it explains 61%, 21%, 51%, and 84% of the var- vices, users’ knowledge has a significant influence on their
iance in continuous intention, confirmation, usefulness, and perceived security and in turn their perceived security has a
satisfaction, respectively. significant effect on the formation of their confirmation about
Overall, the results of structural model analysis have the services. These findings provide two important insights.
proved that the proposed research model is a suitable model Like other financial services, Fintech services are contingent
to explain users’ continuous intention to use Fintech services. on the approval of government authorities and then the
Table 4 summarized the results of hypothesis testing. receipt of a secure financial transaction certificate. Since it is
relatively new, users’ knowledge that the services are safe and
reliable is important for the proliferation of the services.
6. Discussion Therefore, the service providers need to develop marketing
Applying the Bhattacherjee’s (2001) post acceptance model strategies to enhance customer knowledge and understanding
(PAM) as a theoretical framework, we proposed a research of the services.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 9

Table 4. Result of PLS-SEM.


Hypothesis path coefficients t-statistics Results
(H1) knowledge → perceived security 0.42 4.90 *** Accepted
(H2a) perceived security → confirmation 0.46 7.24 *** Accepted
(H2b) perceived security → usefulness 0.14 2.51 * Accepted
(H2c) perceived security → satisfaction 0.06 1.71 Rejected
(H2d) perceived security → continual intention to use 0.06 1.24 Rejected
- device security → perceived security 0.24 11.71 *** Accepted
- service security → perceived security 0.38 24.18 *** Accepted
- network security → perceived security 0.24 18.97 *** Accepted
- platform security → perceived security 0.28 18.93 *** Accepted
(H3a) confirmation → usefulness 0.64 10.09 *** Accepted
(H3b) confirmation → satisfaction 0.70 9.57 *** Accepted
(H4a) usefulness → satisfaction 0.24 3.02 ** Accepted
(H4b) usefulness → continual intention to use 0.16 1.98* Accepted
(H5) satisfaction → continual intention to use 0.62 7.18 *** Accepted
Note: *, **, and *** significant at 0.05, 0.01 and 0.001 level, respectively

Third, the results show that perceived security affects use- valid in the context of Fintech services. This result provides an
fulness of the services. Since Fintech services are multi-func- evidence of the strength of PAM as a background theory to
tional financial services provided by various companies using explain the continuous usage behavior of Fintech services.
different emerging technologies such as near-field communi- Third, the study proposes the second-order perceived security
cation (NFC), radio frequency identification (RFID), IoT, as an antecedent of PAM and empirically tests the role as an
Blockchain, etc., it is crucial to consider security issues in extended part of PAM. The results show that perceived secur-
the use of Fintech services. As emphasized previously, security ity leads confirmation and perceived usefulness, which con-
protection including personal information and privacy in tributes to the literature by extending PAM through the
financial transactions is crucial prerequisite for spreading the consideration of perceived security as an antecedent.
use of Fintech services. Therefore, the service providers In regard to practical implications, the results of this
should establish strategies to enhance users’ perceived useful- study provide insights for Fintech service management
ness of the services. and marketing strategies on the key elements of security
Finally, users’ perceived security does not show a direct and privacy protection. Users are quite sensitive to secur-
effect on their satisfaction and their continuous intention to ity as they place a high value on their information and
use the services, while it has an indirect influence through privacy. For the successful diffusion of the Fintech services
confirmation and usefulness. In other words, perceived secur- as a part of online banking services, users should acknowl-
ity of the services sequentially affects confirmation, perceived edge that the services are secure and useful. Therefore, to
usefulness, and satisfaction. In turn, usefulness and satisfac- attract potential users, Fintech service providers may
tion affect continuous intention to use the services. Service advertise their services highly focusing on security and
providers should be aware that users have intention on con- privacy protection side of the services to make sure that
tinuous use when they confirm their security perceptions in the prospective users feel safe. In addition, the security
terms of service, platform, network, and devices and the issues related to Fintech services are quite comprehensive
services are useful and finally they are satisfied in the services, from a management perspective. To handle the security
in order. issues in manageable size, we recommend to categorize
them into different sub-groups using the four first-order
factors: service, platform, network, and device securities.
Theoretical and practical contributions
This study makes several theoretical and practical contribu-
Limitations and future research
tions. First, although various Fintech services have been intro-
duced in recent years and users’ perceived security of the This study has several limitations that should be addressed in
services is important, there is little evidence of the role of future research. The first limitation is related to the sample of
security in the context of Fintech services. In this study, based the study. Although most Fintech service users are younger
on the classification of system security in banking services by and highly educated individuals, currently Fintech services are
Hur and Lim (2017), we identified users’ perceived security of dispersed to various individuals including students, general
Fintech services as a new higher order construct that consists consumers, educators, professionals, and others. Students do
of four first-order factors: service security, network security, not represent all users of the services. Thus, it is cautious to
platform security, and device security. The validity of second- generalize the results of this study to overall Fintech service
order construct is empirically tested. We expect that other users. Future research should conduct a survey covering a
researchers could utilize this higher order construct for other variety of users of Fintech services.
contexts in the future. Second, this study did not take into account various situa-
Second, as a part of post acceptance model (PAM) pro- tional factors associated with the services in explaining con-
posed by Bhattacherjee (2001), this study empirically confirms tinuous intention to use. For example, some factors such as
that the relationships among confirmation, perceived useful- trust in service providers, perceived risk of Fintech transac-
ness, satisfaction, and continuous intention to use are also tion, trustworthiness of the services, and others are not
10 S. H. LIM ET AL.

considered. Therefore, future research should consider var- Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user
ious situational factors related to the services, service provi- acceptance of information technology. MIS Quarterly, 13(3), 319–340.
doi:10.2307/249008
ders, and transactions. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of
Finally, different individuals have different personal dispo- computer technology: A comparison of two theoretical models.
sition in new information technologies (Kim et al., 2008). For Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982
example, users who have high preference of new technologies Finn, A., Wang, L., & Frank, T. (2009). Attribute perceptions, customer
such as Fintech technology, they can easily accept and use the satisfaction and intention to recommend E-services. Journal of
Interactive Marketing, 23(3), 209–220. doi:10.1016/j.
new technology. Although this study proposed a comprehen-
intmar.2009.04.006
sive model on the continuous use of Fintech services, indivi- Fornell, C., & Bookstein, F. (1982). Two structural equation models:
dual tendency to continuously use the services was not LISREL and PLS applied to consumer exit-voice theory. Journal of
controlled. Future research should consider personal charac- Marketing Research, 18(1), 440–452. doi:10.2307/3151718
teristics (e.g. tendency, preference, skill, etc.) to check indivi- Fornell, C., & Larcker, D. (1981). Evaluating structural equation models
with unobservable variables and measurement error. Journal of
dual differences. Marketing Research, 18(1), 39–50. doi:10.2307/3151312
Gefen, D., & Straub, D. (2005). A practical guide to factorial validity
using PLS-Graph: Tutorial and annotated example. Communications
Notes of the Association for Information Systems, 16(1), 91–109.
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R., & Tatham, R. L.
1. Fintech service companies in Korea provide remittance services, (2006). Multivariate data analysis (6th ed.). Upper Saddle River, NJ:
payment services, financial services, and e-commerce support ser- Prentice Hall.
vices. Representative FinTech service companies include Kakao Pay Hair, J. F., Jr., Hult, G. T. M., Ringle, C. M., & Sartedt, M. (2013). A
(http://www.kakao.com/kakaopay/), a subsidiary of Kakao, and primer on partial least squares structural equation modeling (PLS-
Payco (http://www.payco.com/), a subsidiary of Naver. SEM). Thousand Oaks, California, USA: SEGE Publications, Inc.
2. https://www.mckinsey.com/industries/semiconductors/our- Hulland, J. (1999). Use of partial least squares (PLS) in strategic manage-
insights/security-in-the-internet-of-things. ment research: A review of four recent studies. Strategic Management
3. http://www.ey.com/gl/en/industries/financial-services/ey-fintech- Journal, 20(2), 195–204. doi:10.1002/(ISSN)1097-0266
adoption-index. Hur, Y., & Lim, S. H. (2017). An empirical study on the impact of the
4. U.S. Department of Commerce, International Trade perceived securities and trust to diffusion of IoT-based smart banking
Administration, 2016 ITA FinTech Top Markets Report, 2016, services: Focusing on university students. Insurance Finance Review,
pp. 1–10. (http://trade.gov/topmarkets/pdf/Financial_ 28(1), 37–65. (In Korean).
Technology_Executive_Summary.pdf). Kim, C., Mirusmonova, M., & Lee, I. (2010). An empirical examination
5. http://www.ey.com/gl/en/industries/financial-services/ey-fintech- of factors influencing the intention to use mobile payment. Computers
adoption-index. in Human Behavior, 26(3), 310–322. doi:10.1016/j.chb.2009.10.013
6. http://www.ey.com/gl/en/industries/financial-services/ey-fintech- Kim, D. J. (2008). Self-perception-based versus transference-based trust
adoption-index. determinants in computer-mediated transactions: A cross-cultural
7. https://thefinancialbrand.com/66384/fintech-digital-banking- comparison study. Journal of Management Information Systems, 24
usage-trends/. (4), 13–45. doi:10.2753/MIS0742-1222240401
8. https://www.smartpls.com/smartpls2. Kim, D. J. (2012). An investigation of the effect of online consumer trust
on expectation, satisfaction, and post-expectation. Information
Systems and E-Business Management, 10(2), 219–240. doi:10.1007/
s10257-010-0136-2
Acknowledgment Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer
decision-making model in electronic commerce: The role of trust,
The research of second author has been supported by the National
risk, and their antecedents. Decision Support Systems, 44(2), 554–
Research Foundation of Korea Grant funded by the Korean
564. doi:10.1016/j.dss.2007.07.001
Government(NRF-2017S1A3A2066149).
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, the
two wheels for successful e-commerce transactions: A longitudinal
exploration. Information Systems Research, 20(2), 237–257.
References doi:10.1287/isre.1080.0188
Kim, S., & Garrison, G. (2010). Understanding users’ behaviors regarding
Anderson, E. W., & Sullivan, M. W. (1993). The antecedents and con- supply chain technology: Determinants impacting the adoption and
sequences of customer satisfaction for firms. Marketing Science, 12(2), implementation of rfid technology in south korea. International
125–143. doi:10.1287/mksc.12.2.125 Journal Of Information Management, 30(5), 388–398.
Bhattacherjee, A. (2001). Understanding information systems continu- Lee, A. R., & An, Y. H. (2016). Fintech users’ information privacy
ance: An expectation -confirmation model. MIS Quarterly, 25(3), 351– concerns and user resistance: Investigating the interaction effect
370. doi:10.2307/3250921 with regulatory focus. Journal of the Korea Institute of
Chin, W. W., & Newsted, P. R. (1999). Structural equation modeling Information Security & Cryptology, 26(1), 209–226. (In Korean).
analysis with small samples using partial least squares. In R. H. Hoyle doi:10.13089/JKIISC.2016.26.1.209
(Ed.), Statistical strategies for small sample research (pp. 307–341). Lee, J. H. (2015). A literature review on security for internet of things in
Thousand Oaks, CA: Sage. Korea based on IoT S-P-N-D-Se ecosystem model. Journal of Security
Dabolkar, P. A., Shepard, C. D., & Thorpe, D. I. (2000). A comprehensive Engineering, 12(4), 397–414. (In Korean).
framework for service quality: An investigation of critical conceptual Lee, M.-C. (2010). Explaining and predicting users’ continuance inten-
and measurement issues through a longitudinal study. Journal of tion toward e-learning: An extension of the expectation-confirmation
Retailing, 76(2), 139–173. model. Computers & Education, 54(2), 506–516. doi:10.1016/j.
Davis, F. D. (1986). A technology acceptance model for empirically compedu.2009.09.002
testing new end-user information systems: Theory and results Lim, S. H. (2016). An investigation of the psychology of password
(Diss.). Massachusetts Institute of Technology. replacement by email users. Journal of the Korea Institute of
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 11

Information Security & Cryptology, 26(5), 1251–1258. (In Korean). Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the
doi:10.13089/JKIISC.2016.26.5.1251 technology acceptance model: Four longitudinal field studies.
Lim, S. H., Cho, N. J., & Whang, J. H. (2012). Role of familiarity and Management Science, 46(2), 186–204. doi:10.1287/
perceived behavioral control in adoption and continual use of RFID mnsc.46.2.186.11926
services. Korea Logistics Review, 22(3), 5–25. (In Korean). Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User
Lim, S. H., Park, H. J., Kim, Y. J., Ka, H. K., Lee, D. W., Jung, S. Y., & acceptance of information technology: Toward a unified view. MIS
Jung, J. S. (2017, May 10). Understanding of IoT business (1st ed.). Quarterly, 27(3), 425–478. doi:10.2307/30036540
Seoul, Korea: Chungram Book Publishing. (In Korean). Yang, S., Lu, Y., Gupta, S., Cao, Y., & Zhang, R. (2012). Mobile payment
Mansfield, E. R., & Helms, B. P. (1982). Detecting multicollinearity. The services adoption across time: An empirical study of the effects of
American Statistician, 36(3a), 158–160. behavioral beliefs, social influences, and personal traits. Computers in
Nicoletti, B. (2017). The future of FinTech: Integrating finance and tech- Human Behavior, 28(1), 129–142. doi:10.1016/j.chb.2011.08.019
nology in financial services. Cham, Switzerland: Springer.
Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.).
New York, NY: McGraw-Hill. About the Authors
Oliver, R. L. (1981). Measurement and evaluation of satisfaction pro-
cesses in retail settings. Journal of Retailing, 57(3), 25–48. Se Hun Lim is a Professor of Department of Management Information
Patterson, P. G., Johnson, L. W., & Spreng, R. A. (1997). Modeling the Systems at Sangji University. His research areas include Information
determinants of customer satisfaction for business-to-business profes- Technology applications in the field of logistics, IoT, FinTech, Brain
sional services. Journal of the Academy of Marketing Science, 25(1), 4– Computer Interface, and so on. He published papers in JCIS, IMDS,
17. doi:10.1007/BF02894505 ISM, Informatics for Health and Social Care, and so on.
Pavlou, P. A., & Gefen, D. (2005). Psychological contract violation in
Dan J. Kim is a professor of Information Technology and Decision
online marketplaces: Antecedents, consequences, and moderating
Sciences at University of North Texas. His research interests are in
role. Information Systems Research, 16(4), 372–399. doi:10.1287/
multidisciplinary areas such as information security and privacy, infor-
isre.1050.0065
mation assurance, and trust in electronic commerce. His research has
Spreng, R. A., MacKenzie, S. B., & Olshavsky, R. W. (1996). A reexami-
been published or is forthcoming in more than 150 articles in refereed
nation of the determinants of consumer satisfaction. Journal of
journals, including ISR, JMIS, JAIS, EJSI, CACM, DSS, and others.
Marketing, 60, 15–32. doi:10.2307/1251839
Swan, J. E., & Trawick, I. F. (1981). Disconfirmation of expectations Yeon Hur is a professor of School of Business at the Chung-ang
and satisfaction with a retail service. Journal of Retailing, 57(3), 49– University. He received his Ph.D., in Insurance and risk management
67. from Temple University. He published papers in Journal of Computer
Tasca, P., Aste, T., Pelizzon, L., & Perony, N. (2016). Banking beyond Information Systems, Korea Risk Management Journal, and so on. His
banks and money. AG, Switzerland: Springer International research areas include Information Technology applications in the field
Publishing. of Finance and Risk Management, Insurance Technology and others.
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating
perceived behavioral control, computer anxiety and enjoyment into Kunsu Park is an Assistant Professor of Accounting of Bang College of
the technology acceptance model. Information Systems Research, 11 Business at KIMEP University. He earned his Ph.D. in Business
(4), 342–365. doi:10.1287/isre.11.4.342.11872 Administration from the University of Hawaii at Manoa. His research
Venkatesh, V., & Bala, H. (2008). Technology Acceptance Model 3 and a focuses on corporate finance, financial markets and institutions, and
research agenda on interventions. Decision Sciences, 39(2), 273–315. financial accounting. He is also interested in the role of Fintech services
doi:10.1111/j.1540-5915.2008.00192.x in capital markets.
12 S. H. LIM ET AL.

Appendices

Appendix A. Measurement Items

Items Sources
Continuous intention CUI1. I will continuously use the mobile Fintech service. Bhattacherjee (2001), Kim (2012)
CUI2. My intention is to continue use the mobile Fintech service rather than find any alternative
means (e.g., traditional payment services).
CUI3. I would like to use the mobile Fintech service in the near future.
CUI4. If I possible, I would rather not to use the mobile Fintech services (reverse coded). (dropped)
Confirmation CON1. My experience with the mobile Fintech service was better than what I expected. Bhattacherjee (2001)
CON2. The service level provided by the mobile Fintech service was better than what I expected.
CON3. Overall, most of my expectations about the mobile Fintech service were confirmed.
Satisfaction SES1. Overall, I am satisfied with the mobile Fintech service. Bhattacherjee (2001)
SES2. Using the mobile Fintech service gives me satisfaction in financial transactions.
SES3. Using the mobile Fintech service makes financial transactions more convenient.
Usefulness PU1. the mobile Fintech service provide real-life convenience in managing personal finances. Bhattacherjee (2001), Kim (2012),
PU2. the mobile Fintech service are useful in real-life management of personal finances. Hur and Lim (2017)
PU3. In general, the mobile Fintech service provide convenience in various personal financial fields.
PU4. In general, the mobile Fintech service are fast in managing personal finances.
PU5. In general, the mobile Fintech service are accurate in managing personal finances.
Perceived Service BSS1. Payment service security is guaranteed in the use of the mobile Fintech service. Hur and Lim (2017), Lee (2015)
Security BSS2. When I use the mobile Fintech service, the payment transaction process is secure.
BSS3. When I use the mobile Fintech service, the user authentication method is secure.
BSS4. In using the mobile Fintech service, the financial transaction authentication method is safe.
Platform BPS1. In using the mobile Fintech service, the platform is secure. Hur and Lim (2017), Lee (2015)
BPS2. When I use the mobile Fintech service, the operating system is safe.
BPS3. As I use the mobile Fintech service, the platform is being maintained and repaired periodically.
Network BNS1. Wired and wireless networks are safe in the mobile Fintech service. Hur and Lim (2017), Lee (2015)
BNS2. There is no communication problem when using the mobile Fintech service.
BNS3. As I use the mobile Fintech service, I will get an immediate response when a network failure
occurs.
Device BDS1. Devices for the mobile Fintech service are secure. Hur and Lim (2017), Lee (2015)
BDS2. Devices provide sufficient performance in financial transaction support for the use of the
mobile Fintech service.
BDS3.The devices used in the mobile Fintech service were supplied by a trusted vendor certified by a
specialized vendor.
Knowledge KNOW1. I have sufficient knowledge to use the mobile Fintech service. Lim (2016) Kim, Garrison, (2010),
KNOW2. I have sufficient knowledge to handle any problems that may arise during the use of the Kim et al. (2010)
mobile Fintech service.
KNOW3. I have sufficient knowledge to process a mobile Fintech transaction
KNOW4. I am well informed about how to deal with problems caused by using the mobile Fintech
service.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 13

Appendix B. Confirmative Factor Analysis

1. 2. 3. 4. 5. 6. 7. 8. 9.
Perceived Security 1. Device BDS1 0.72
BDS2 0.88
BDS3 0.82
2. Network BNS1 0.88
BNS2 0.86
BNS3 0.80
3. Platform BPS1 0.88
BPS2 0.95
BPS3 0.89
4. Service BSS1 0.87
BSS2 0.88
BSS3 0.91
BSS4 0.92
5. Knowledge know1 0.80
know2 0.92
know3 0.92
know4 0.85
6. Confirmation CON1 0.92
CON2 0.85
CON3 0.90
7. Usefulness PU1 0.89
PU2 0.91
PU3 0.90
PU4 0.83
PU5 0.76
8. Satisfaction SES1 0.88
SES2 0.91
SES3 0.91
9. Continuous CUI1 0.94
intention CUI2 0.88
CUI3 0.95
Note: Factor loadings less than 0.5 are not presented.

You might also like