You are on page 1of 20

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/276913129

Self-Service Technologies and e-Services Risks


in Social Commerce Era

Article in Journal of Business Ethics · March 2015


DOI: 10.1007/s10551-015-2614-4

CITATIONS READS

2 66

2 authors, including:

Nick Hajli
Newcastle University
29 PUBLICATIONS 214 CITATIONS

SEE PROFILE

All in-text references underlined in blue are linked to publications on ResearchGate, Available from: Nick Hajli
letting you access and read them immediately. Retrieved on: 02 August 2016
J Bus Ethics
DOI 10.1007/s10551-015-2614-4

Self-Service Technologies and e-Services Risks in Social


Commerce Era
Mauricio S. Featherman1 • Nick Hajli2

Received: 30 August 2014 / Accepted: 11 March 2015


Ó Springer Science+Business Media Dordrecht 2015

Abstract Social commerce as a subset of e-commerce Keywords Social commerce era  Risk assessments 
has been emerged in part due to the popularity of social Electronic commerce  Self-service technologies  E-
networking sites. Social commerce brings new challenges services
to marketing activities. And social commerce transactions
like e-commerce transactions can be dangerous and cause
harmful losses to personal finances, time, and information Introduction
privacy. This article examines ethical issues and consumer
assessments of the risks of using an e-service and how risk Individuals are connected more than ever via the Internet,
affects consumer evaluations and usage of Internet-based but the Internet-only connections remain virtual. Unlike
services and self-service technologies. Results from two face-to-face retail transactions, the physical separation of
surveys totaling 1024 consumers indicated that as usage sellers and buyers in impersonal Internet electronic mar-
risk concerns increased, the perceived usefulness (PU) of ketplaces cause uncertainties (Marshall et al. 2012).
an e-service and intention to use it decreased. Additionally Transaction-related uncertainties remain a central issue in
as usage risk concerns increased the effect of subjective online commerce environments, especially when e-vendors
norm on PU and intention to use an e-service strengthened, are unfamiliar to the consumer. E-commerce has developed
and the effect of perceived ease of use on PU and intention but consumers still have concerns regarding ethical prac-
to use an e-service weakened. These findings advance tices of e-vendors (Roman 2007). Meanwhile consumers
theory and contribute to the foundation for future research are being bombarded with news reports of security
aimed at improving our understanding of how consumers breaches, online fraud, phishing/pharming scams, and
evaluate new e-services, new commerce systems and set- identity theft, and receive seemingly constant counsel re-
tings, and self-service technologies in the social commerce garding how to limit exposure to (or recover from) these
era. dangers. The increased disclosure and reporting of these
dangerous aspects of e-commerce are causing more con-
sumers to limit online transactions particularly in current
social commerce era where many e-commerce transactions
originate from social networking sites (Pai and Huang
2011).
& Nick Hajli Social commerce is a new stream in e-commerce which
Nick.hajli@newcastle.ac.uk
has emerged due to the popularity of social networking
Mauricio S. Featherman sites (Hajli 2015). In the current social commerce era,
mauricio@cbe.wsu.edu
consumers are increasingly using social media yet the
1
College of Business, Washington State University, Pullman, perceived risk of potential dangers and personal losses
USA remains high (Hajli and Lin 2014). For many consumers,
2
Business School, Newcastle University, the decision to make online purchases of products, ser-
Newcastle upon Tyne, UK vices, and e-service subscriptions includes an assessment

123
M. S. Featherman, N. Hajli

of potential dangers and personal losses (Park et al. 2009). Ajzen 1975) and a call (Venkatesh and Davis 2000) to
This is more challenging in social commerce era which investigate contingency factors that affect consumer
individuals are influenced by friend’s opinions, pop culture, evaluations of information systems. Improving our under-
and entertainment aspects related to shopping. As such, standing of the effects of risk in e-commerce and social
new challenges such as developing trust in social net- commerce deserves further empirical investigation for
working sites (Shin 2013) as well as credibility of e-vendor many reasons, including that the number of potentially
information (Hajli et al. 2014) along with the ever present risky e-service’s and self-service technologies thrust on
risk of personal losses have received the attention of consumers is rapidly increasing.
e-commerce scholars. This article hopes to provide a more comprehensive
Social commerce is a subset of e-commerce (Zhou et al. understanding of how consumers evaluate risky self-ser-
2013) and has emerged by the popularity of social net- vice technologies and e-services in the social commerce
working sites (Hajli 2014; Stephen and Toubia 2010). The era, and yield research insights and researcher recom-
main contribution of social commerce is to enable con- mendations that can guide the development, marketing, and
sumers to interact and support each other throughout the management of e-services and e-commerce Web sites in
purchasing cycle by sharing experience and information ways that reduce consumer risk concerns and encourage
about a product or service, such as information about past e-commerce transaction activity. We now present a brief
purchase experiences. An example of online forums and review of the constructs examined in this research. We then
communities can be a Facebook page that a company de- present a research model which is followed by two em-
velops and invites consumers to come and share their in- pirical studies. We conclude with an interpretation of our
formation and experience about a product or service. It also findings, as well as their theoretical and practical
may create challenges for the firms. One survey of 5000 implications.
consumers finds that many of the consumers are being
more cautious about entering confidential data online, are
logging into online banking accounts less frequently, are Technology Acceptance Constructs: Theoretical
refraining from paying bills online, and are even discon- Background
tinuing online banking altogether. Similarly many con-
sumers do not want to use their personal details on social Theories of social influence, technology acceptance, and
networking sites. As vendors deploy e-services and en- consumer decision making provide an array of constructs
courage consumers to use lower-cost e-service delivery potentially useful for understanding how individuals eval-
channels, a key question remains. How do consumer uate an IS for adoption. Our research focuses on the direct
assessments of the risks of using an e-service, and resultant and moderating effects of risk concerns within a network of
personal losses affect their e-service evaluations and usage well-established constructs known to influence technology
decisions? If consumers believe that e-service offerings usage decisions—subjective norm (SN), perceived ease of
carry the potential for personal losses, then less than op- use (PEOU), and perceived usefulness (PU).
timal use of e-services will occur. This research investi-
gates how consumers assess e-commerce risks and more Perceived Risk
specifically how e-services are evaluated in light of po-
tential dangers and personal losses (e.g., to finances and Consumer purchasing activities often include a subjective
time). assessment of the hazards and possible losses resultant
That consumers believe e-commerce product purchases from making a poor purchase, for example, to personal
are risky has been previously demonstrated (Park et al. finances, time, and information privacy (Featherman et al.
2001; Gefen 2002; Jarvenpaa et al. 1999; Teo and Yeong 2010). Purchases often involve risk because consumers
2003), as has the importance of generating consumer trust cannot anticipate with certainty the severity of the conse-
in e-vendors which may act to reduce consumer percep- quences of using a product or service (and thus experience
tions of risk affecting product-based e-commerce (Van der uncertainty; Cox and Rich 1964). Consumer uncertainty
Heijden et al. 2003). An assumption being perpetuated in about the severity of potential losses and the likelihood of a
this research stream is that factors which affect usage de- poor purchase resulting in these personal losses, together,
cisions exert their effect linearly, and similarly across all have been labeled perceived risk or overall perceived risk
consumer segments. This article addresses this gap in the (Dowling and Staelin 1994; Mitchell 1999; Stone and
research and answers previous calls for further investiga- Grønhaug 1993). Consumer evaluations of the risks in a
tion of perceived risk (Gefen et al. 2003), and the analysis purchasing situation are notoriously subjective often
of nonlinear relationships in evaluation-intentions models widely varying by consumer segment and purchasing
(Ajzen and Fishbein 1980; Davis et al. 1989; Fishbein and context.

123
Self-Service Technologies and e-Services Risks...

Prominent definitions of perceived risk include (i) the (the performance-based dimensions) and created separate
combination of consumer estimates of the probability that a psychological and social risk dimensions.
loss may occur as a result of the purchase, and the seriousness For the e-commerce context, Featherman and Pavlou
or importance of the loss (Cox 1967; Peter and Ryan 1976), (2003) recommend replacing the unlikely safety risk
and more recently (ii) the subjective expectation of losses (measuring threats to consumer health) with privacy risk (a
from a purchase (Stone and Grønhaug 1993). Prior research measure designed to capture consumer beliefs about the
identifies how and when consumer risk beliefs become likelihood of threats to the privacy and the confidentiality
salient (Cox and Rich 1964), their consequents (Dowling and of personal information). Prior researchers have identified
Staelin 1994; Mitchell 1994; Taylor 1974), identifies dif- the importance of privacy in Internet transactions (Cranor
ferent types of perceived risk (Cunningham 1967; Roselius et al. 2006) and place high importance on a similar con-
1971), and identifies some common risk-reduction strategies struct described as Internet users’ information privacy
(Cox and Rich 1964; Roselius 1971). concerns (IUIPCs; Malhotra et al. 2004). IUIPC examines
Consistent with the theory of reasoned action (Fish- concerns regarding the collection, control, and usage of
bein and Ajzen 1975), we theorize that when consumers personal information. Based on prior theory, our definition
evaluate a specific e-service offering, they develop a set of each facet of assessed usage risk is presented in Table 1.
of beliefs about the e-service and using the e-service. While an overall perceived risk construct has been hy-
The set of beliefs for some consumers may include risk pothesized prior empirical research typically fails to model a
beliefs focused on e-service performance problems and higher-order construct and rather individually reports the
resultant personal losses. These risk beliefs form the unique effects of each theorized facet of perceived risk. Our
basis for consumers’ assessment of an e-service’s usage research theorizes the existence of a second order overall usage
risk which influences attitudes and intentions toward risk construct whose dimensions are closely related and co-
using the e-service. Focusing on consumer’s overall vary. For example, the investment guidance of a financial
summary assessment of an e-service’s usage risks, in our consultancy service may not perform as expected (perfor-
own research, we label this evaluation consumer’s mance risk) causing personal financial losses, time lost un-
assessed usage risk. derstanding, and reevaluating the service provider. Further,
Perceived risk is theorized as being multi-dimensional resultant frustrations and ego loss (psychological risk) may
(Grewal et al. 1994; Jacoby and Kaplan 1972; Mitchell and occur with a corresponding loss of perceived social status, if
Greatorex 1993; Mitra et al. 1999; Peter and Tarpey Sr the consumer feels foolish for making a poor purchase. Finally,
1975; Shimp and Bearden 1982). Further an overall risk in the context of many financial and health-related e-services,
assessment is theorized (Dowling and Staelin 1994; Stone the threat of losses to confidential personal information is also
and Grønhaug 1993). Regarding the risk dimensions very real as the reports of stolen or compromised personally
(Cunningham 1967) was the first to envision two major identifying consumer information are common.
categories of perceived risk: performance and psychoso- In addition to inhibiting consumer services purchases,
cial. Roselius (1971) further defined six dimensions: per- perceived risk is found to motivate information-search
formance, financial, (physical) safety, opportunity/time activities from personal sources such as relatives, friends,

Table 1 Dimensions of assessed usage risk


Dimension of Definition for e-services
perceived risk

(1) Performance risk Consumer assessment of potential performance problems, malfunctioning, transaction processing errors, reliability
and/or security problems, and therefore not performing as expected
(2) Financial risk Consumer assessment of potential financial losses due to purchasing a subscription to a poorly performing e-service or
potential Internet-based fraud
(3) Privacy risk Consumer assessment of potential losses to the privacy and confidentiality of their personally identifying information
(such as name, address, and purchasing history) and that e-service usage exposes them to potential identity theft
(4) Time risk Consumer assessment of potential losses to convenience, time and effort caused by wasting time researching,
purchasing, setting up, switching to and learning how to use the e-service
(5) Psychological risk Consumer assessment of potential losses to their self-esteem, peace of mind or self-perception (ego) due to worrying,
feeling frustrated, foolish, or stressful as a result of using an e-service
(6) Social risk Consumer assessment of potential losses to their perceived status in their social group as a result of using an e-service.
The assessment of the probability that consumers believe that they will look foolish to important others

123
M. S. Featherman, N. Hajli

and perceived domain experts or from impersonal sources effort’’ (Davis et al. 1989). The salience and predictive
such as Consumer Reports (Mitchell 1999; Mitra et al. validity of PEOU, also termed effort expectancy, is well
1999). Consumers that fail to find information that reduces documented in organizational adoption settings (Venkatesh
their risk concerns typically avoid or delay the purchase. and Davis 2000; Venkatesh et al. 2003), mobile systems
Due to their many experience and credence attributes (Chung et al. 2014), intention to use ICTs (Chung et al.
(Darby and Karni 1973), these avoidance behaviors may be 2014), adoption of software measures (Wallace and Sheetz
common for e-services. E-services have experience at- 2014), and for Internet banking applications (Chau and Lai
tributes which must be experienced to be evaluated (e.g., 2003). Easier-to-use information systems can help em-
its ease of use), and credence attributes which are hard to ployees perform their jobs and attain their goals. In this
evaluate even after usage (e.g., assurances of information research, we investigate whether an e-service’s PEOU re-
privacy and transaction security). Consumers have been mains a salient predictor for those consumers that assess
found to rely more heavily on third-party judgments (both the e-services as being risky to use.
personal and impersonal) about quality when services have
experience and credence attributes (Mitra et al. 1999). Perceived Usefulness (PU)
To facilitate further research into consumer assessments of
usage risks and consumer evaluations of risky information Within IS research, an important driver of an employee’s
systems, a parsimonious, yet multi-dimensional scale of usage intention to use an IS is an assessment that it will be useful
risk is developed and its effects measured. Our research in- to the employee. Employees generally welcome new in-
vestigates to what extent consumer assessments of an e-ser- formation systems they believe are helpful and useful to
vice’s usage risk influence consumer usage of the e-service complete job tasks and attain work goals (Venkatesh et al.
exploring the different mechanisms for this influence. 2003). PU is defined as ‘‘the degree to which a person
believes that using a particular system would enhance his
Subjective Norm (SN) or her job performance’’ (Davis 1989). PU has widely used
in risk studies (Lee et al. 2014), e-services research, busi-
Since the 1930s, social–psychological studies of social in- ness ethics (Svensson et al. 2010), and world business (Lee
fluence have proceeded on the understanding that people’s et al. 2013). We investigate to what extent an e-service’s
thoughts, feelings, and actions are affected by the actual, PU is affected by consumer assessments of risk.
imagined, or implied presence of others. In particular, re-
search indicates that the informational and normative social
influences of reference groups are an important factor that Research Model and Hypothesis Development
persuasively influences consumer behavior (Bearden and
Rose 1990; Burnkrant and Cousineau 1975). In our research, we examine the interplay of consumer
Fishbein and Ajzen (1975) theorize that SN captures all perceptions of social influence, ease of use, and an
forms of social influence such as information and norma- assessment of and IS’s usefulness and usage risk. We in-
tive social influence (Burnkrant and Cousineau 1975; vestigate how these constructs interact to influence con-
Kelman 1961), combining them into an overall ‘‘normative sumer usage decisions for a potentially risky e-service. We
expectation.’’ SN is theorized to capture perceived social examine consumer assessments of an e-service’s usage
influence and pressure that is exerted directly by other in- risk; its direct effect on e-service evaluations and usage
dividuals (e.g., in conversations) or attributed to a gener- decisions, and whether it makes contingent other traditional
alized social agent (e.g., via inferences; Ajzen and Fishbein technology–acceptance relationships (see Fig. 1 below).
1980). Within IS research, SN captures the ‘‘social forces’’
experienced directly from or attributed to co-workers or Main Effects of Assessed Risk on Perceived
managers that impinge ‘‘on an individual facing the op- Usefulness and Intention to Use
portunity to adopt or reject a new system’’ (Venkatesh et al.
2003). In this research, we investigate whether the effects We claim that consumer assessments of risk influence
of SN are affected for those consumers that assess an e-service evaluations and purchases when personal losses
e-service as being risky to use. It has been shown in mar- resultant from usage create feelings of indecision conflict
keting ethics research too (Cronan and Al-Rafee 2008). (Bettman 1973), and psychological discomfort and/or anxi-
ety (Dowling and Staelin 1994; Taylor 1974). Prior services
Perceived Ease of Use (PEOU) research finds that consumers that are unable to judge a
service’s likely performance, and are found to rate its pur-
PEOU is defined as the ‘‘the degree to which a person chase as being more risky (Murray 1991). In the e-commerce
believes that using a particular system would be free of context, consumer risk assessments are also affected by

123
Self-Service Technologies and e-Services Risks...

Fig. 1 Research model

consumer apprehension regarding e-commerce security and 1961; Miniard and Cohen 1983; Park and Lessig 1977).
privacy (Hoffman et al. 1999). Higher usage risk levels Because consumers want to make informed decisions, in-
should act to worsen consumer evaluations of an e-service’s corporating the opinions of knowledgeable and credible
usefulness and also inhibit e-service usage. This has been referents. Reference groups also exert normative social
shown in other e-commerce research (Liao et al. 2010). influence. Rather than being based on underlying compli-
Research shows perceived risk also influence intention to ance effects (often salient in organizational settings) for
buy (Ha and Stoel 2009), intention to use (Yoon 2011), and consumer purchases normative social influence is believed
behavioral intention (Cheng and Chu 2013; Park and to be based on value-expressive influence (Park and Lessig
Blenkinsopp 2009). Consistent with past research on IS ac- 1977), or group identification effects (Bearden and Etzel
ceptance, which focuses on the effect of perceived risk on 1982; Bearden and Rose 1990; Kelman 1961). Individuals
product purchases (Jarvenpaa et al. 1999; Pavlou 2003; Teo that value social group membership adopt opinions and
and Yeong 2003), we hypothesize the following (see Fig. 1): behaviors that resemble these referents, to improve their
self-image, and to reaffirm their sense of identity and at-
H1 Consumers assessing higher levels of usage risk will
tachment to their social group.
(a) assess the e-service as being less useful and (b) will
We contend that when consumers feel apprehensive, and
have reduced intention to use the e-service.
become concerned about potential personal losses resultant
from e-service usage, they increasingly consider the opin-
Do Higher Risk Assessments Strengthen ions that referents have or would provide (informational
the Relationship Between Subjective Norm and PU? influence) and whether referents would purchase (or approve
the purchase of) the e-service (normative social influence).
Increases in SN have a positive effect on assessments of an The heuristic of recalling or inferring important referent’s or
ISs PU (Hartwick and Barki 1994; Venkatesh et al. 2003) reference group’s opinions is well-studied (Chaiken and
as well as employee intentions to adopt the IS (Thompson Maheswaran 1994; Eagly and Chaiken 1993), consumers
et al. 1991; Venkatesh et al. 2003). Drawing on prior social can reduce their risk by adopting the implied opinions of
influence literature, we posit that effects of social influence important referents. Related consumer behavior research
(both informational and normative) on consumer evalua- findings support the contention that consumers whom ex-
tions of an e-service’s usefulness strengthen when the perience risk in a purchase situation tend to rely more on the
e-service is assessed as being risky to use. evaluations and opinions of referents (Gemünden 1985;
Reference groups exert informational social influence. Mitra et al. 1999; Murray 1991; Roselius 1971).
When consumers assess risk in a purchase situation they Within IS research, SN is found to be a salient pre-
often recall, infer, or seek out the opinions, evaluations, adoption predictor of PU for employees adopting an or-
and actions of credible referents (Miniard and Cohen ganizational IS (Hartwick and Barki 1994; Venkatesh et al.
1983). Information gained directly or inferred from refer- 2003). Strength of this relationship is unknown for con-
ents, can be used to increase the predictability of decision sumer e-service purchases, furthermore it is unknown
outcomes, and reduce risk assessments (Dawes and Kagan whether consumer risk levels affect the SN–PU relation-
1988; Roselius 1971). Thus reference groups exert infor- ship. We propose a contingent relationship which is de-
mational social influence (Bearden and Rose 1990; Kelman picted in Figs. 1 and 2 and is tested as follows:

123
M. S. Featherman, N. Hajli

Fig. 2 Hypothesized
conditionalized relationships

H2a Higher usage risk levels strengthen the relationship suggests that consumer apprehension and anxiety related to
between SN and PU. service purchases increase when perceptions of risk in-
crease (Chaudhuri 1997; Dowling and Staelin 1994; Fis-
Do Higher Risk Assessments Strengthen cher 1970; Murray and Schlacter 1990). Similarly
the Relationship Between SN and Intention to Use? individuals are found to experience computer anxiety re-
lated to the implications of using an IS (Brown et al. 2004;
Classic social influence studies indicate that the effects of Sievert et al. 1988; Simonson et al. 1987).
social influence on decision making are strong when an When consumers attend to cognitive and emotional re-
individual experiences uncertainty (an aspect of risk; Asch actions related to their assessed riskiness of using an
1951; Deutsch and Gerard 1955). Reference groups’ in- e-service, the increased cognitive resources employed
formational and normative social influences have been should shape assessments of the cognitive effort needed to
shown to affect an individual’s purchasing behavior use the IS (its PEOU). The resource allocation perspective
(Bearden and Etzel 1982; Bearden and Rose 1990; may underlie this effect; when consumers feel anxious,
Burnkrant and Cousineau 1975; Miniard and Cohen 1983). their attention may be diverting away from the (here
Similarly, consumers who believe a service is potentially computing) task at hand to more salient negative thoughts
risky have been shown to increasingly seek out and rely (Kanfer et al. 1994). Interfering with their ability to process
upon referents’ opinions (Mitra et al. 1999) when the information (Ellis and Ashbrook 1988; Phillips et al. 1972).
purchase may lead to potential losses. PEOU evaluation cues may become less important and
Within IS research increases in SN have a positive effect therefore the normally positive effect of PEOU on system
on employee intentions to adopt an IS (Hartwick and Barki usefulness may change for consumers that focus on the
1994; Taylor and Todd 1995; Thompson et al. 1991; negative aspects of usage.
Venkatesh et al. 2003). Less is known, however, about this As an example, while consumers use e-shopping Web
relationship for volitional information systems and ser- sites such as Polo.com because they are easy to use and
vices. It also remains unknown whether the simple provide easier access to valued products (therefore causing
heuristic of relying on referent’s opinions (Eagly and consumers to perceive the Web site as useful), increasing
Chaiken 1993) is more salient as consumer risk levels in- the risk of using this technology reporting of a security
crease (as captured by higher SN effect sizes). breach at Polo Ralph Lauren (wherein confidential credit
Similar to our argument above, we believe that when card information for 180,000 customers was stolen) may
risk levels rise, social influences will more strongly affect significantly alter that relationship. While the ease of use of
e-service usage decisions. Referent opinions and behav- such an e-commerce Web site remains essentially the
ioral prescriptions (whether communicated or inferred) same, if such dangers and their assessment become salient,
should become more salient and influential as consumers PEOU is unlikely to drive increased levels of PU. This
risk levels increase, which suggests (see Figs. 1, 2): relationship is depicted in Figs. 1 and 2 and suggests the
following:
H2b Higher assessed usage risk levels strengthen the SN
to intention to use relationship. H3a Higher usage risk levels weaken the PEOU to PU
effect.
Do Higher Risk Assessments Weaken
the Relationship Between PEOU and PU? Do Higher Risk Assessments Weaken
the Relationship Between PEOU and Intention
We contend that consumer’s cognitive and emotional to Use?
concerns related to the personal losses resultant from using
an e-service reduce beliefs that the e-service is easy to use. Perceptions that an IS will be easy to learn and use
We base this contention partially on prior research which typically encourage employee intention to use that IS

123
Self-Service Technologies and e-Services Risks...

(Venkatesh et al. 2003). It is unknown; however, whether et al. 2003) (see Appendix Tables 5, 6). Following Segars
this effect changes when consumers divert attention to the and Grover (1993), we adopt a three-item definition for
risks of IS usage. Due to both cognitive and emotional ease of use. The risk assessment measure employed is a
reactions to risk (Chaudhuri 1997), the effect of an e-ser- refinement, contextualization, and extension of prior risk
vice’s PEOU on usage decisions may differ. A mood scales generated outside of the IS research context which
congruency effect (Cunningham 1988) may be invoked— often utilized single items to capture each risk dimension
wherein people act in accordance with their mood—dis- (Peter and Ryan 1976; Peter and Tarpey Sr 1975) and
torting consumers’ PEOU beliefs toward negative process therefore have questionable content validity. After re-
expectancies (Phillips et al. 1972) in concert with negative viewing prior IS-based research, the scales of perceived
reactions to usage risks. risk were deemed to lack specificity (Jarvenpaa et al. 1999;
We posit that even if a system is easy to use, if such Pavlou 2003; Pavlou and Gefen 2004), overly focus on the
usage is deemed risky, PEOU will have less of an effect on performance quality of the product being purchased online
actual usage decisions. Extending our prior example, while (Teo and Yeong 2003) or lack parsimony. Therefore prior
a consumer may believe the Polo.com e-commerce Web risk scales (Featherman and Pavlou 2003; Grewal et al.
site is easy to use (and thus drive usage to some extent); 1994; Peter and Ryan 1976; Shimp and Bearden 1982)
when the risk of using this technology increases (e.g., were refined for the current e-services context. The parsi-
gaining knowledge of security breaches at Polo Ralph mony and increased precision of a shorter instrument
Lauren), the positive impact of PEOU on purchasing ac- should enable the testing of a second-order overall usage
tivity may diminish. While the actual ease of use of Polo. risk variable to match the theorized overall perceived risk
com is unchanged, if such risky conditions are prevalent; variable (Dowling and Staelin 1994).
PEOU is unlikely to drive usage decisions. The potential Construct operationalization proceeded with the goal of
contingent nature of this relationship may help explain parsimoniously capturing the core domain of each theo-
inconsistent results for the PEOU to intent to use rela- rized dimension of usage risk. Guided by our Table 1
tionship (Gefen et al. 2000) (see Figs. 1, 2): definitions, the risk scale uses a total of 12 items to capture
the six theorized risk dimensions, specifically consumer
H3b Higher usage risk levels weaken the effect of PEOU
assessments of potential e-service performance problems
on intention to use an e-service.
(performance risk), and assessments of potential personal
losses to consumer privacy (privacy risk), time (time risk),
finances (financial risk), social status (social risk), and ego
Methodology
(psychological risk) resultant from the recognition that a
bad purchase may create losses. All items use a seven-point
Our investigation is carried out in two studies. The first study
Likert-scale.
measures consumers’ e-service evaluations after they read
A confirmatory factor analysis (CFA, using Mplus 4 and
vendor provided e-service information and trial a demon-
verified with Amos 4) is used to verify the dimensionality,
stration software simulation of an electronic bill presentment
reliability, convergent validity, and discriminant validity of
and payment service (hereafter e-bill pay service). Because
the 12-item usage risk assessment scale for the e-services
virtually all consumers have recurring monthly bills to pay,
context.
this research context should be relevant for the research
participants. The second study provides further indications
Model Testing
of these effects and differs only in that consumers viewed a
very similar but less interactive (Flash! style) demonstration
The research model’s direct relationships are tested using a
video, rather than trial the demoware. Unexpectedly the
structural equations model (SEM) approach (using Mplus
vendor changed the content of their Web site before study
and verified with Amos). In addition, the hypothesized
two was executed. To maintain brand consistency, subjects
moderated relationships of the research model are tested
evaluated the same branded e-service, even though the pre-
using latent variable interactions using Mplus’ SEM-based
sentation style of the training materials differed.
latent moderated structural equations test.

Statistical Methodology Study One

Operationalization of Variables A sample (N = 495) was drawn from the undergraduate


business population of a major university. Six percent of
Measurement of the research constructs, other than asses- the sample was using a similar e-bill pay service; therefore,
sed usage risk, utilizes pre-validated scales (Venkatesh these subjects were excluded from further analysis because

123
M. S. Featherman, N. Hajli

the study examines pre-purchase evaluations. As 96 % of unidimensional first-order factor accounts for the variance
the reduced sample (N = 467) reported they currently paid among the 12 measurement items. Model 2 hypothesizes
monthly bills by mailing paper-based checks, the sample that the measurement items are grouped into six correlated
was suitable for this study. first-order factors. Model 3 hypothesizes that a second-
In a controlled university computer laboratory, subjects order latent variable parsimoniously explains the 15 inter-
evaluated an e-billpay service. Subjects read vendor-sup- factor correlations (pattern of interactions and covariance)
plied service information (averaging 10 min) including among the six first-order factors.
privacy and security assurances, then performed an inter- Model 2’s lower v2/df ratio and higher fit indices sug-
active hands-on software trial (averaging 20 min) using gest that a multi-dimensional model comprised six corre-
vendor-provided demoware and a task sheet to encourage lated first-order factors is superior to a unidimensional first-
uniform exposure. Using a fictitious checking account, order factor model. Support is thus provided for the mul-
subjects viewed and scheduled payment for the six bills in tidimensionality of the assessed risk scale. Model 2’s
the inbox, verified check register account balances, and standardized factor loadings for each measurement item are
performed personalization, reporting, and data exporting all highly significant (p \ .001) indicating convergent va-
tasks. lidity. In addition, because the measurement items con-
verge on their respective factors and the factors are distinct
Study One Results from each other, support for discriminant validity is also
obtained (Bagozzi 1980; Tanriverdi 2005).
Psychometrics for the Usage Risk Variable Following Tanriverdi (2006), the following criteria are
used to test whether the data suggests a second-order
Coefficient a values for each risk factor of usage risk ranged structure: (1) model statistics (Witte 1994), (2) the target
from .791 to .921, and the average variance extracted (AVE) coefficient which compares the model’s v2 values (Tanaka
scores ranged from .907 to .963 (see Appendix Table 5). and Huba 1984), and (3) significance of the parameters
Together these indicants provide evidence of instrument reflecting the second-order factor loadings (Venkatraman
reliability (Nunally and Bernstein 1978). The reliability and 1990). The model’s fit indices are similar for Models 2 and
reflective nature of each first-order risk dimension scale is 3, indicating that each model fits the data well (Gefen et al.
also supported by the majority of the variance of each item 2000). Considering the high number of first-order factors,
being explained by the latent variable (Bollen 1998). the target coefficient value of .854 provides strong support
Following prior guidelines and examples in information for a second-order factor model (Tanaka and Huba 1984).
systems research (Doll et al. 1994; Segars and Grover In addition, each risk factor second-order loading is highly
1993; Tanriverdi 2005, 2006), CFA (as implemented in significant (p \ .001), reasonably well-balanced with paths
Mplus 4 and Amos 4) is used to verify the dimensionality, [.70 (see Appendix Table 5).
reliability, convergent validity, and discriminant validity of Taken together, adequate support is provided for ac-
the 12-item usage risk scale. cepting the second-order factor model, and its incorpora-
Three measurement models were compared to test the tion into the larger research model. While maintaining
scale’s dimensionality, and convergent and discriminant instrument parsimony, this scale exhibits content and
validity (see Table 2). Model 1 hypothesizes that one construct validity.

Table 2 Goodness-of-fit indices for alternative models of assessed usage risk


v2 df v2/df RMR SRMR GFI/AGFI CFI RMSEA TCI

Sample 1
Model 1: one unidimensional first-order factor 1013.6 54 18.77 .215 0.086 .724/.601 0.748 .195 (.185–.206)
Model 2: six correlated first-order factors 57.7 39 1.48 .050 .020 .980/.960 0.995 .032 (.011–.049)
Model 3: second-order model 67.5 48 1.41 .058 .023 .976/.960 0.994 .032 (.013–.047) 0.854
Sample 2
Model 1: one unidimensional first-order factor 1381.9 54 25.59 .246 .120 .703/.571 0.616 .210 (.201–.214)
Model 2: six correlated first-order factors 105.3 39 2.70 .073 .032 .970/.941 0.981 .055 (.043–.068)
Model 3: second-order model 131.8 48 2.75 .088 .041 .963/.936 0.975 .059 (.047–.071) 0.799

123
Self-Service Technologies and e-Services Risks...

Further Psychometrics not. At midlevels of risk, usage intention was predicted by


PU, PEOU (to a less extent than when risk is low), and SN.
For the remaining operationalized variables, evidence of At high levels of risk, intent to use was no longer predicted
strong internal reliability and convergent validity was by the usefulness of the e-service, but rather by PEOU and
provided as each latent factor is able to extract the majority to an increasing extent on SN.
of the total variance of each indicant (Fornell and Larcker
1981). Evidence of convergent validity is also provided by Study One Discussion
the high-item loadings (ranging from .762 to .948), stan-
dardized Cronbach’s a scores (ranging from .823 to .948) Consumer assessments of an e-service’s risks of usage
and high AVE scores (ranging from .778 to .926). The negatively influenced their evaluations of its usefulness and
correlation matrix of the latent variables (see Appendix their intent to use the e-service. Support for each hy-
Table 6) also provides strong evidence of discriminant pothesized conditional relationship was found, suggesting
validity. AVE (within-factor shared variance) scores shown that for the e-services context four technology acceptance
in the matrix diagonal were also considerably larger than relationships may be contingent on the level of usage risk
the squared correlation coefficients (r2) between variables that consumers identify. The effect of normative concerns
(Fornell and Larcker 1981). (as captured by SN) on PU and usage intentions strength-
Using the fit indice guidelines set forth by Bollen ened as a function of assessed risk. The usefulness and
(1998), and Gefen et al. (2000) suggest the research model usage intent increasing effect of the e-service’s PEOU
exhibited a good fit to the data considering the complexity weakened when risk levels increased. These empirical re-
of the overall research model (GFI = .889, AGFI = .857, sults suggest that consumers pay increased attention to
CFI = .952, RMSEA = .067 (.062–.073), SRMR = .058, normative concerns and decreased attention to an e-ser-
and v2/df = 3.112 (see Appendix Fig. 4). vice’s ease of use as risk concerns rise.
At higher risk levels consumers may have focused on
Hypothesis Testing weighing the potential losses resultant from IS usage and
the related internal search to gain perspective by recalling
Hypothesis H1 that assessed usage risk decreases the PU or inferring normative beliefs of important referents. Sup-
(b = -.181, p = .0001) and intent to use the e-service porting prior social influence research, our results suggest
(b = -.132, p = .0022) was supported. Hypothesis H2 as risk levels increase consumers increasingly factor in
that higher risk assessments strengthen the effect of SN on social influences.
PU (b = .108, p = .0346) and intention to use (b = .147,
p = .0056) was supported. The positive sign of the inter-
Study Two
action terms suggests that the SN–PU and intention to use
effects strengthened as risk assessment levels increase.
A second study was performed to provide further indica-
Hypothesis H3 that assessed usage risk weakens the effect
tions of the hypothesized effects. A second sample
of PEOU on PU (b = -.166, p = .0039) and intention to
(N = 602) selected from the same sampling population
use (b = -.127, p = .0221) was also supported. The
yielded 557 responses after screening out current e-billpay
negative sign of the interaction terms suggests that the
users. The identical setting, task, and procedure were uti-
PEOU–PU and intent to use effects weakened as assessed
lized. As mentioned, participants watched demonstration
levels of risk increase.
video rather than trial demonstration software.
As a follow-on descriptive analysis of the hypothesized
contingent relationships, a tertiary split of the sample was
performed based on level of assessed risk. The creation of Study Two Results
sub-samples enabled the hypothesized conditional rela-
tionships to be estimated at low (N = 155), mid Psychometrics
(N = 149), and high (N = 163) levels of risk. Results re-
ported in Table 4 suggest that the predictors of PU varied High factor loadings and t-values for the observed risk
depending on level of usage risk. At low levels of risk, the items and first-order factors are shown in Appendix
PEOU of the e-service strongly predicted PU, and SN ex- Table 5, again indicating strong convergent validity for the
hibited a small effect. Confirming prior interaction analysis risk assessment scale. The scales also exhibited reliability
findings at mid and high levels of risk the effect of PEOU and convergent validity (see Appendix Table 5), as Cron-
weakened and the effect of SN strengthened. The predic- bach a scores were [.72 and AVE scores were [.886
tors of usage intention also varied by risk level. When risk (Fornell and Larcker 1981). Except for the social risk first-
levels were low, EOU and PU were significant, and SN was order factor, the proportion of variance in the observed

123
M. S. Featherman, N. Hajli

items (and structural coefficients) accounted for by the PEOU on intent to use (b = -.192, p = .0023). The
corresponding latent variable was generally [50 %, indi- negative sign of the interaction terms again indicate that
cating strong common factor reliability. the effects of PEOU weakened as risk concerns increased.
Table 2 above presents the CFA derived goodness-of-fit Analysis of model effects after a tertiary split of the sample
indices for the different factor structures of the usage risk by level of assessed risk, largely mirrored previous results
scale with results again suggest the parsimonious second- (see Table 4 above). As risk concerns shifted from mid-
order factor structure acceptably fits the data. Almost 80 % level to high, the effect of the predictors of e-service use-
of the variation in the six first-order factors is explained by fulness and intent to use shifted from PEOU to SN.
the second-order overall risk factor, providing confirmatory
evidence of a higher-order overall usage risk construct
(Tanaka and Huba 1984) for the e-services context. Evi- Post-hoc Analysis
dence of strong psychometric properties for the remaining
research variables is indicated by high-item factor loadings During the follow-on analysis the assumption that risk’s
(.802–.963) and a scores (.869–.941). The research model effect is linear was also questioned. For consumers re-
was again tested with a SEM (see Appendix Fig. 4), which porting high levels of usage risk, neither criterion variable
indicated a good fit to the data [GFI = .901, AGFI = .872, was significantly affected by their risk concerns. After
CFI = .954, RMSEA = .060 (.055–.065), SRMR = .060 further probing, the effect of risk on PU and intended usage
and v2/df = 3.007] for the complex overall research model. was found to be curvilinear rather than monotonically
linear. For example, SEM-estimated effect of risk on intent
Hypothesis Testing to use for both samples 1 (bRisk = -.755, p \ .0001,
b2Risk = .381, p = .0009) and sample 2 (bRisk = -.936,
Supporting H1 higher levels of assessed risk decreased PU p \ .0001, b2Risk = .210, p = .0397) suggests a curvilinear
(b = -.434, p \ .0001) and consumer intention to use the effect. These SEM-based results were confirmed by
e-service (b = -.356, p \ .0001). The details of the hy- analyzing the partial correlation for the quadratic term,
pothesized contingent relationships are reported in Table 3 which was significant at p \ .001 (.187, .230) for both
above. Supporting H2 usage risk strengthened the effect of samples.
SN on PU (b = .152, p \ .0001) and consumer intent to Figure 3 scatter plots of the assessed risk to usage in-
use the e-service (b = .142, p = .0009). The positive sign tention effect suggest that a parabolic, concave upward
of the interaction terms again indicates that these effects slope traces this relationship. The slope changes over the
strengthened as risk levels increases. For this sample, range of the risk values, declining, leveling off, and then
higher risk levels did not weaken the effect of PEOU on PU rising. Increasing risk levels contributed to decreased
(H3a; b = -.066, p = .2692), but did weaken the effect of consumer intention to use the e-service; however, only up

Table 3 SEM-based interaction analysis of the hypothesized moderated relationships


Research model Effects Sample 1 Sample 2 Research model paths Effects Sample 1 Sample 2
paths Reg. Reg. Reg. Reg.
coefficient (p) coefficient (p) coefficient (p) coefficient (p)

H2a H2b
SN–usefulness Focal .342 (.0001) .205 (.0011) SN–intention to use Focal .516*** .403***
Risk–usefulness Moderator -.882*** -.861*** Risk–intention to use Moderator -.855*** -1.027***
Risk * SN– Interaction .108 (.0346) .152*** Risk * SN–intention to Interaction .147 (.0056) .142 (.0009)
usefulness use
H3a H3b
EOU–usefulness Focal .795*** .407*** EOU–intention to use Focal .825*** .290***
Risk–usefulness Moderator -.156 (.0268) -.535*** Risk–intention to use Moderator -.077 (ns) -.787***
Risk * PEOU– Interaction -.166 (.0039) -.066 (ns) Risk * PEOU– Interaction -.127 (.0221) -.192 (.0023)
usefulness intention to use
PEOU perceived ease of use, risk assessed usage risk, usefulness perceived usefulness, SN subjective norm
*** p \ .0001

123
Self-Service Technologies and e-Services Risks...

Table 4 Follow-up descriptive analysis of hypothesized moderated relationships


Sample 1 Sample 2
Low risk Moderate risk High risk Low risk Moderate risk High risk
(N = 155) (N = 149) (N = 163) (N = 181) (N = 182) (N = 194)

DV = intention to use
Perceived usefulness (PU) .312 (.0002) .311 (.0005) .184 (.0774) .487*** .427*** .335 (.0001)
Perceived ease of use (PEOU) .494*** .298 (.0003) .299 (.0010) .152 (.0248) .119 (.1627) -.035 (.6255)
Subjective norm (SN) .116 (.0572) .344*** .381*** .183 (.0081) .287 (.0001) .368***
R2 (%) 63.80 55.80 48.10 39.80 35.00 35.60
DV = perceived usefulness
Perceived ease of use (PEOU) .702*** .538*** .523*** .360*** .536*** .348***
Subjective norm (SN) .158 (.0129) .319*** .312 (.0001) .192 (.0134) .166 (.0242) .457***
R2 (%) 57.30 46.90 48.00 18.20 29.60 34.60
*** p \ .0001

Fig. 3 Graph of the curvilinear 8 8


effects of assessed usage risk on
7 7
criterion variables
6 6
Intention to Use

Intention to Use
5 5
4 4
3 3
2 2
1 1
0 0
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
Assessed Usage Risk Assessed Usage Risk
Sample 1 Sample 2

to a point, after which the riskiness of the e-service di- its usage risk. The stronger direct effects of assessed risk
minished in importance as an inhibitor of usage. Con- may be attributed to the vendor replacing the interactive
sumers reporting high levels of usage risk levels may be demoware with the animated demonstration video. In ad-
denying, avoiding, or suppressing their risk beliefs (and dition consumers may have had fewer cues to base their
perhaps emotional reactions) when making e-service evaluation of the e-service’s likely PEOU, which may have
evaluations and usage decisions. contributed to PEOU not being a significant predictor of
usage decisions (Dillon and Morris 1997; Gefen et al.
Study Two Discussion 2000). The effects of social influence again rose as risk
levels increased. Moderate support was found suggesting
Results confirmed the hypothesized effects of usage risk for that higher levels of usage risk weakened the PEOU–PU
the research model, context, and sampling population. As relationship, and strong support again suggests the PEOU
compared to study one, evaluations of the e-service’s to intention to use relationship is weakened as usage risk
usefulness were more strongly reduced by assessments of concerns increase.

123
M. S. Featherman, N. Hajli

General Discussion directly, affect e-service evaluations and usage decisions,


by moderating other decision criteria.
This research examined the multiple effects of consumer Hypotheses set 2 examined whether higher levels of risk
assessments of the risk of using an e-service. Using an increase the effect of social influences (as captured by SN)
original scale, usage risk effects were investigated at two on consumer usefulness evaluations and usage intentions.
levels: (1) as a direct effect on consumer evaluations of an Our rationale being that when consumers experience higher
e-service’s usefulness, and their intention to use the probabilities of severe personal losses in a purchasing si-
e-service, and (2) as a moderator of several established tuation, they more closely consider the perceived opinions
technology acceptance relationships. In this section, we and evaluations of referents, and whether important refer-
briefly summarize and explain our findings, then discuss ents would approve of their e-service usage. Findings
their derived theoretical and practical implications. suggest that both of these relationships are strengthened as
consumer risk assessments increase.
Hypotheses set 3 centered on whether consumer
Summary of Results assessments of risk decrease the effect of PEOU on an
e-service’s usefulness and usage intention. As hy-
Within the context of consumers evaluating an e-bill pay pothesized, at higher risk levels the influence of ease of use
service, support was found for the hypothesized direct and on both PU and intention to use decreased. As argued in
moderating effects of assessed usage risk. Because the our Polo.com example, if usage risks are deemed to be
sampling population represents a younger, more tech- high, the ease of which a consumer can navigate a Web site
nology-savvy market segment, reported results are con- shopping system is less likely to translate into perceptions
sidered to be conservative measures of the hypothesized of usefulness and usage behaviors.
effects, for e-services specifically, and for risky ISs in Across both studies the salient factors affecting e-ser-
general. vice usage decision making, shifted depending on level of
Hypothesis set 1 focused on measuring the extent to risk. When risk concerns were low, the traditional an-
which usage risk impedes consumer e-service evaluations tecedents PEOU and PU (and to a less extent social in-
and usage decisions. Higher risk levels linearly reduced fluences) predicted e-service usage intention. Averaging
usefulness evaluations and usage intention; however, only values across studies, when risk concerns are high, pre-
up to a point, after which the relationship reversed sug- dictors of intent to use shifted to an assessment of the social
gesting a threshold and curvilinear effect (see Fig. 3 influences affecting the usage decision, and to a much less
above). This identified curvilinear relationship suggests a extent (if at all) the PEOU and PU of the e-service. These
Pollyanna effect which occurs when individuals irra- results are convergent with prior research which suggests
tionally suppress their uncertainty and assessment of po- that vendor-provided messages become less persuasive
tential risks, dangers, and losses, rationalizing that even when consumers perceive threats and emotional tension
though likely the loss cannot happen to them (Matlin and (Eagly and Chaiken 1993) as consumers attend to the
Stang 1978; Montgomery 1989). Prior attitude research personal threats rather than to the vendor messages. This
finds a similar curvilinear relationship, a reversal of the shift in predictor salience found across both studies sug-
effect of perceived threats, at its highest levels. In this gests that usage risk is useful as a market segmentation
research, at high levels of perceived threats, individuals variable.
reduced their evaluative processing (Jepson and Chaiken
1990) exhibiting avoidance behaviors (Eagly and Chaiken
1993; Wood 2000), and worsened attitudes toward safety Contributions to Theory
products. Prior organizational decision-making research
reports a similar denial and avoidance of risk when risk We do not propose that our research model should supplant
levels are high (Allaire and Firsirotu 1989). prior e-commerce evaluations-intentions models. Rather
The data of the current study suggest a threshold and we propose that this research makes four central theoretical
Pollyanna effect. Across both studies when the risk was too contributions to marketing in social commerce era lit-
high, consumers appear to have avoided and ignored the erature. First, this research helps clarify the dimensionality
risks of e-service usage and revert to basing e-service and structure of consumer risk assessments for the e-ser-
evaluations and usage decisions on simple decision rules, vice context, by developing a theoretically driven, parsi-
such as inferring referent’s opinions. The data suggest that monious scale of consumer’s usage risk. Second, it refines
at high levels, usage risk may indirectly rather than prior findings by making the case that for the e-services

123
Self-Service Technologies and e-Services Risks...

category two core predictors (PEOU and SN) of informa- future e-commerce and social commerce research should
tion system usefulness evaluations and intended usage may employ increasingly specific measures of risk and social
be contingent on levels of usage risk. Third, the proposed influences. The findings are believed to affect many con-
contingent effect of risk can aid in the further segmenting sumer-oriented e-services and self-service technologies
of online consumers. Fourth, this research suggests that the which may be considered risky to use.
direct effects of usage risk are nonlinear and that a Our third theoretical contribution is based on identifying
Pollyanna effect may exist. Together these contributions usage risk as a consumer segmentation variable. By seg-
extend the ethical part of e-commerce literature, modeling menting consumers by their risk levels, researchers may
consumer self-service technology adoption behavior for the gain further insight into online consumer behavior (as
e-service context at a higher level of specificity. The failure found here) useful to design more specific risk-reducing
to consider possible contingencies affecting consumer strategies. Our final theoretical contribution focuses on the
e-commerce behaviors compromises the generalization of assumption that the effects of risk in e-commerce are lin-
prior research findings. ear. Prior IS research has not investigated whether the ef-
Our first theoretical contribution is related to develop- fect of risk in consumer IS evaluations and intended usage
ment and presentation of a second-order latent variable is monotonically linear or rather changes over its range of
capturing consumer’s level of assessed usage risk. In measured responses. This research suggests that the
comparison to first-order models with correlated factors, harmful effects of risk were curvilinear, reducing e-service
second-order models provide a more parsimonious and usage decisions up to a threshold, after which the usage risk
interpretable model (Chen et al. 2005) of the literature- is avoided or ignored. These findings contribute to the
based phenomenon, when an overall effect is theorized. foundation for future research related to improving our
Using a higher-order risk factor structure that reflects a understanding of how consumers evaluate potentially risky
theorized higher-order overall risk construct is of increased information technology products, information systems, and
theoretical interest, in comparison to prior research which e-services.
primarily views perceived risk as a first-order unidimen-
sional construct (e.g., Jarvenpaa et al. 1999; Pavlou 2003;
Pavlou and Gefen 2004). While the offered risk scale does Contributions to Practice
not exhaustively capture the domain of each risk dimen-
sion, it parsimoniously captures their core essence. The Uncertainties related to the security, privacy, and perfor-
provided scale can be easily incorporated into larger re- mance efficacy of e-services can increase consumer ex-
search models, perhaps enabling greater nomological in- pectations that e-service usage can result in personal losses
sight into the network of relationships among an e-vendor’s (e.g., to information privacy and finances). As more ser-
trustworthiness, consumer assessments of risk, and con- vices are rehosted as online services, the software designer
sumers’ trusting behaviors. should be cognizant of the emotional aspects of service
Our second theoretical contribution is based on the usage. Software developers responsible for redesigning
continual need to examine key theoretical relationships and physical processes and deploying them as digitized e-ser-
assumptions when extending research models to new vices (e.g., e-ticketing, e-permitting, and e-payment sys-
adoption contexts. Our research tested the assumption that tems), should recognize that their human–computer
several established technology acceptance relationships are interface (HCI) designs can contribute to or allay consumer
linear across all consumers. For the e-services context, apprehension, anxiety and risk concerns, and resultant
each tested effect was contingent on consumer assessments usage behaviors.
of risk. These results may help explain prior inconsisten- Findings derived from this investigation of how finan-
cies in the effects of SN (Karahanna et al. 1999) and PEOU cial e-services are evaluated suggests that as consumer
(Gefen et al. 2000). While PEOU is a core e-service assessments of usage risk rise, consumers base evaluations
evaluation criterion, the data suggest that when consumers and usage decisions more on referent opinions and
assess an e-service to be risky to use, consumers shift their evaluations and less on the PEOU, which is perhaps the
evaluative focus from ease of use to assessments of usage most core attribute an e-service. For consumer segments
risks and social influences. This finding is especially per- that find usage risk levels to be moderate to high, con-
tinent to financial e-services, as PEOU was found to be the sumers may be distracted from a systematic processing of
most important predictor or attitudes of an Internet banking core e-service attributes by the usage risks. In these cases,
application (Chau and Lai 2003). This finding suggests that development efforts should be channeled into improving

123
M. S. Featherman, N. Hajli

(and communicating) the privacy, security, and perfor- on level of usage risk. Future e-commerce research should
mance efficacy of e-services, and of providing images of examine whether the effects of other predictors of IS usage
credible referents using the e-service. are also made contingent by usage risk. Further it can be
Usage risk can also be interpreted and leveraged as a market argued that a limitation of this study is its investigation of
segmentation variable suggesting that different approaches to usage risk in isolation from related concepts such as vendor
e-service development and marketing are needed for different trustworthiness, and consumer trust in an e-service provi-
consumer segments depending on levels of usage risk. When der. This research began with the claim that the under-
focus groups representing a consumer segment identify an standing of assessed risk in e-commerce research is
e-service offering as being low risk, vendor communications incomplete, and that it is useful to disentangle the distinctly
should emphasize service quality, performance efficacy, and different constructs of assessed usage risk from trustwor-
interface ease of use to this market segment. Conversely for thiness and trust in order to further our understanding of
market segments that assess the e-service as risky to use the assessed usage risk. By studying usage risk in isolation, we
vendor (in addition to promoting the e-service’s privacy and have gained some insights that may help inform how future
security) vendor communications should use images of rep- research may best proceed, such as how usage risk and
resentative consumer referents (friends, colleagues, and rela- other constructs (such as vendor trustworthiness) may act
tives) endorsing and using the e-service, or integrate third- together to influence consumer attitudes and e-commerce
party reputation systems (e.g., consumerreports.org, cnet.com) activity. The current study which placed central focus on
to allow consumers to rely more on social influences. Because the effects of usage risk alone can therefore be viewed as a
results suggest that social influences are especially important useful, but limited step in furthering research in this area.
for risky IS usage decisions, consumers should especially ap-
preciate seeing representative examples of their social group Conclusion
using or advocating usage of the potentially risky e-service.
More generally, vendors of potentially risky information While consumers are given new and enjoyable social
systems and services should also clarify, amplify, and re- commerce systems to shop online, concurrently consumers
move all ambiguity regarding the usefulness of their of- are also bombarded with news reports of security breaches,
ferings. Results suggest that the usefulness of an e-service identity theft, and Internet-based fraud by increasing
reduces the harmful effects of usage risk; however, the popularity of social networking sites in social commerce
e-service’s usefulness may be of decreasing importance to era. Exposure to news reports of potential dangers and
usage decisions as risk levels rise. Therefore clarifying and personal losses add to consumer doubt, indecision, and
conveying an e-service’s usefulness to the consumer are uncertainty, which makes consumer evaluation processes
critical for multiple reasons. more complex for potentially risky services. Our investi-
Using the provided parsimonious scale of usage risk, gation of the e-services context suggests that consumers
system developers and marketers can also test different approach self-service technology usage decisions differ-
HCI designs for their risk-reducing ability. If as results ently when the self-service technology is deemed risky to
suggest, system usability becomes less important as risk use. Established research models explaining consumer
levels rise, then other aspects of the HCI must be em- evaluations and usage of self-service technology fail to
phasized to reduce perceived usage risks and encourage explicitly account for the direct and moderating effects of
adoption. Results suggest that only when consumer risk usage risk. In an era of social commerce, with changing
levels are reduced to an acceptable level can consumers technologies to better shape how consumers evaluate ser-
strongly factor in the usability of an e-service into their vices which expose the consumer to potential personal
purchase decisions. losses, this is an important omission.

Limitations and Future Research


Appendix
The effects of only two of the many proposed predictors of
IS usage intent were investigated for contingencies based See Fig. 4; Tables 5 and 6.

123
Self-Service Technologies and e-Services Risks...

Fig. 4 SEM results for the overall research model

Table 5 Psychometrics for the assessed usage risk scale


Sample 1 Sample 2
2
Item R (reliability) Item loading R2 (reliability)
loading (t) (%) (t) (%)

Performance risks
(1) The Internet is not reliable enough to enable the e-billpay service .787* 61.9 .825* 68.0
to perform correctly
(2) The e-billpay service probably probably will make mistakes and .958 (19.8) 91.8 .846 (18.2) 71.6
process my payments incorrectly
Financial risks
(1) Using an e-billpayment service would lead to a financial loss .872* 76.0 .702* 49.2
(2) My financial situation might get worse if I use an e-billpay system .862 (19.9) 74.3 .812 (13.9) 65.9
Privacy risks
(1) If you use an e-billpayment service you will lose control over the .876* 76.7 .834* 69.5
privacy of your payment information
(2) Using an e-billpayment service would lead to a loss of privacy for .781 (17.7) 61.0 .805 (15.8) 64.9
me because my personal information would be used without my
knowledge
Time risks
(1) The time lost spent setting up and learning how to use e-billpay .771* 59.4 .885* 78.3
makes them risky
(2) I would waste a lot of time switching to an e-billpay payment .828 (18.2) 68.6 .713 (15.5) 50.8
method
Psychological risks
(1) Paying bills online would make me worry about my finances .862* 74.3 .868* 75.3
(2) In comparison to receiving paper bills and mailing paper checks, I .837 (20.8) 70.0 .798 (19.9) 63.7
would lose my peace of mind using an online e-billpayment service
Social risks
(1) Using an e-billpay service would lead to a loss of status for me .957* 91.5 .928* 86.0
because my friends and relatives would think less highly of me
(2) Using the e-billpay service will harm the way others think of me .893 (28.6) 79.8 .915 (24.3) 83.7

123
M. S. Featherman, N. Hajli

Table 5 continued
Risk factor Sample 1 Sample 2
2
Standard R (reliability) Cronbach’s X (SD) Standard R2 (reliability) (%) Cronbach’s X (SD)
structure (%) a/AVE structure a/AVE
coefficient (t) coefficient (t)

Second-order factor loadings, R2 values, and descriptives for each first-order risk factor
(1) Performance risks .817* 66.8 .860, .936 3.06 (1.36) .774* 59.9 .822, .921 3.32 (1.32)
(2) Financial risk .794 (12.7) 63.0 .858, .936 2.84 (1.49) .792 (11.1) 62.7 .726, .886 3.32 (1.35)
(3) Privacy risk .818 (13.0) 66.8 .892, .907 3.64 (1.57) .694 (11.2) 48.1 .896, .910 4.24 (1.47)
(4) Time risk .869 (12.5) 75.5 .819, .920 2.59 (1.43) .709 (11.9) 50.2 .774, .903 2.70 (1.31)
(5) Psychological risk .902 (13.8) 81.4 .791, .909 3.01 (1.57) .893 (14.1) 79.7 .734, .888 3.36 (1.57)
(6) Social risk .716 (12.3) 51.2 .921, .963 2.13 (1.44) .501 (9.32) 25.1 .918, .961 1.92 (1.20)

AVE average variance extracted (square root of the average principal components extracted communality)
* A parameter fixed at 1.0. T-values for item factor loadings and factor structural coefficients are indicated in parentheses

Table 6 Correlation matrix for the latent variables


# Items a X (SD) 1 2 3 4 5

Sample 1
(1) Intention to use 3 .948 4.67 (1.66) .926
(2) Perceived usefulness 4 .923 4.95 (1.53) .704 .909
(3) Second order usage risk 12 .940 2.87 (1.21) -.334 -.363 .898
(4) Perceived ease of use 3 .923 5.25 (1.45) .661 .692 -.426 .922
(5) Subjective norm 2 .823 3.01 (1.43) .328 .245 .288 .092 .778
Sample 2
(1) Intention to use 2 .941 4.12 (1.67) .972
(2) Perceived usefulness 4 .940 4.68 (1.47) .637 .893
(3) Second order usage risk 12 .899 3.04 (1.03) -.524 -.541 .904
(4) Perceived ease of use 3 .930 5.31 (1.37) .388 .540 -.448 .940
(5) Subjective norm Maximum likelihood extract 2 .869 2.53 (1.40) .237 .127 .223 -.089 .720
AVE average variance extracted (square root of the average principal components extracted communality)
* A parameter fixed at 1.0. T-values for item factor loadings and factor structural coefficients are indicated in parentheses

References Bettman, J. R. (1973). Perceived risk and its components: A model


and empirical test. Journal of Marketing Research, 10, 184–190.
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and Bollen, K. A. (1998). Structural equation models. New York: Wiley
predicting social. In Behaviour. Englewood Cliffs, NJ: Pren- Online Library.
Brown, S. A., Fuller, R. M., & Vician, C. (2004). Who’s afraid of the
tice-Hall.
Allaire, Y., & Firsirotu, M. E. (1989). Coping with strategic virtual world? Anxiety and computer-mediated communication.
uncertainty. Sloan Management Review, 30(3), 7–16. Journal of the Association for Information Systems, 5(2), 2.
Asch, S. E. (1951). Effects of group pressure upon the modification Burnkrant, R. E., & Cousineau, A. (1975). Informational and
normative social influence in buyer behavior. Journal of
and distortion of judgments. In Groups, leadership, and men (pp.
222–236). Consumer Research, 2, 206–215.
Bagozzi, R. P. (1980). Causal modeling in marketing. New York ua: Chaiken, S., & Maheswaran, D. (1994). Heuristic processing can bias
Wiley. systematic processing: Effects of source credibility, argument
Bearden, W. O., & Etzel, M. J. (1982). Reference group influence on ambiguity, and task importance on attitude judgment. Journal of
product and brand purchase decisions. Journal of Consumer Personality and Social Psychology, 66(3), 460.
Research, 9(2), 183–194. Chau, P. Y., & Lai, V. S. (2003). An empirical investigation of the
Bearden, W. O., & Rose, R. L. (1990). Attention to social comparison determinants of user acceptance of internet banking. Journal of
information: An individual difference factor affecting consumer Organizational Computing and Electronic Commerce, 13(2),
conformity. Journal of Consumer Research, 16, 461–471. 123–145.

123
Self-Service Technologies and e-Services Risks...

Chaudhuri, A. (1997). Consumption emotion and perceived risk: A Fischer, W. F. (1970). Theories of anxiety. New York: Harper and
macro-analytic approach. Journal of Business Research, 39(2), Row.
81–92. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and
Chen, F. F., Sousa, K. H., & West, S. G. (2005). Teacher’s corner: behavior: An introduction to theory and research. Reading, MA:
Testing measurement invariance of second-order factor models. Addison-Wesley.
Structural Equation Modeling, 12(3), 471–492. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation
Cheng, P.-Y., & Chu, M.-C. (2013). Behavioral factors affecting models with unobservable variables and measurement error.
students’ intentions to enroll in business ethics courses: A Journal of Marketing Research, 18, 39–50.
comparison of the theory of planned behavior and social Gefen, D. (2002). Customer loyalty in e-commerce. Journal of the
cognitive theory using self-identity as a moderator. Journal of Association for Information Systems, 3(1), 2.
Business Ethics, 1–12. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in
Chung, S., Lee, K. Y., & Kim, K. (2014). Job performance through online shopping: An integrated model. MIS Quarterly, 27(1),
mobile enterprise systems: The role of organizational agility, 51–90.
location independence, and task characteristics. Information and Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation
Management, 51(6), 605–617. doi:10.1016/j.im.2014.05.007. modeling and regression: Guidelines for research practice.
Cox, D. F. (1967). Risk taking and information handling in consumer Communications of the Association for Information Systems,
behavior. Boston: Harvard University Press. 4(1), 7.
Cox, D. F., & Rich, S. U. (1964). Perceived risk and consumer Gemünden, H. G. (1985). Perceived risk and information search. A
decision-making: The case of telephone shopping. Journal of systematic meta-analysis of the empirical evidence. International
Marketing Research, 1, 32–39. Journal of Research in Marketing, 2(2), 79–100.
Cranor, L. F., Guduru, P., & Arjula, M. (2006). User interfaces for Grewal, D., Gotlieb, J., & Marmorstein, H. (1994). The moderating
privacy agents. ACM Transactions on Computer–Human Inter- effects of message framing and source credibility on the price–
action, 13(2), 135–178. perceived risk relationship. Journal of Consumer Research, 21,
Cronan, T., & Al-Rafee, S. (2008). Factors that influence the intention 145–153.
to pirate software and media. Journal of Business Ethics, 78(4), Ha, S., & Stoel, L. (2009). Consumer e-shopping acceptance:
527–545. doi:10.1007/s10551-007-9366-8. Antecedents in a technology acceptance model. Journal of
Cunningham, S. M. (1967). The major dimensions of perceived risk. Business Research, 62(5), 565–571.
In Risk taking and information handling in consumer behavior Hajli, N. (2014). The role of social support on relationship quality and
(pp. 82–108). Boston: Harvard University. social commerce. Technological Forecasting and Social
Cunningham, M. R. (1988). What do you do when you’re happy or Change, 87, 17–27.
blue? Mood, expectancies, and behavioral interest. Motivation Hajli, N. (2015). Social commerce constructs and consumer’s
and Emotion, 12(4), 309–331. intention to buy. International Journal of Information Manage-
Darby, M. R., & Karni, E. (1973). Free competition and the optimal ment, 35(2), 183–191. doi:10.1016/j.ijinfomgt.2014.12.005.
amount of fraud. Journal of Law and Economics, 16, 67–88. Hajli, N., & Lin, X. (2014). Exploring the security of information
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and sharing on social networking sites: The role of perceived control
user acceptance of information technology. MIS Quarterly, of information. Journal of Business Ethics,. doi:10.1007/s10551-
13(3), 319–340. 014-2346-x.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Hajli, N., Sims, J., Featherman, M., & Love, P. E. D.
acceptance of computer technology: A comparison of two (2014). Credibility of information in online communities.
theoretical models. Management Science, 35(8), 982–1003. Journal of Strategic Marketing,. doi:10.1080/0965254X.2014.
Dawes, R. M., & Kagan, J. (1988). Rational choice in an uncertain 920904.
world. New York: Harcourt Brace Jovanovich. Hartwick, J., & Barki, H. (1994). Explaining the role of user
Deutsch, M., & Gerard, H. B. (1955). A study of normative and participation in information system use. Management Science,
informational social influences upon individual judgment. The 40(4), 440–465.
Journal of Abnormal and Social Psychology, 51(3), 629. Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building
Dillon, A., & Morris, M. (1997). How user perceptions influence consumer trust online. Communications of the ACM, 42(4),
software use. IEEE Software, 14(4), 58–65. 80–85.
Doll, W. J., Xia, W., & Torkzadeh, G. (1994). A confirmatory factor Jacoby, J., & Kaplan, L. B. (1972). The components of perceived risk.
analysis of the end-user computing satisfaction instrument. MIS Advances in Consumer Research, 3(3), 382–383.
Quarterly, 18(4), 453–461. Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer
Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and trust in an internet store: A cross-cultural validation. Journal of
intended risk-handling activity. Journal of Consumer Research, Computer-Mediated Communication, 5(2), 1–6.
21(1), 119–134. Jepson, C., & Chaiken, S. (1990). Chronic issue-specific fear inhibits
Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. systematic processing of persuasive communications. Journal of
Orlando, FL: Harcourt Brace Jovanovich College Publishers. Social Behavior and Personality, 5, 61–84.
Ellis, H. C., & Ashbrook, P. W. (1988). Resource allocation model of Kanfer, R., Ackerman, P. L., Murtha, T. C., Dugdale, B., & Nelson, L.
the effects of depressed mood states on memory. In Affect, (1994). Goal setting, conditions of practice, and task perfor-
cognition and social behavior (pp. 25–43). Toronto: Hogrefe. mance: A resource allocation perspective. Journal of Applied
Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing Psychology, 79(6), 826.
online privacy risk to facilitate e-service adoption: The influence Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information
of perceived ease of use and corporate credibility. Journal of technology adoption across time: A cross-sectional comparison
Services Marketing, 24(3), 219–229. of pre-adoption and post-adoption beliefs. MIS Quarterly, 23(2),
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services 183–213.
adoption: A perceived risk facets perspective. International Kelman, H. C. (1961). Processes of opinion change. Public Opinion
Journal of Human–Computer Studies, 59(4), 451–474. Quarterly, 25(1), 57–78.

123
M. S. Featherman, N. Hajli

Lee, S.-G., Trimi, S., & Kim, C. (2013). The impact of cultural Park, N., Roman, R., Lee, S., & Chung, J. E. (2009). User acceptance
differences on technology adoption. Journal of World Business, of a digital library system in developing countries: An applica-
48(1), 20–29. tion of the Technology Acceptance Model. International Journal
Lee, C. S., Watson-Manheim, M. B., & Chudoba, K. M. (2014). of Information Management, 29(3), 196–209.
Investigating the relationship between perceived risks in com- Pavlou, P. A. (2003). Consumer acceptance of electronic commerce:
munication and ICT-enabled communicative behaviors. Infor- Integrating trust and risk with the technology acceptance model.
mation and Management, 51(6), 688–699. doi:10.1016/j.im. International Journal of Electronic Commerce, 7(3), 101–134.
2014.05.008. Pavlou, P. A., & Gefen, D. (2004). Building effective online
Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated marketplaces with institution-based trust. Information Systems
software: A contingency model integrating perceived risk with Research, 15(1), 37–59.
the theory of planned behavior. Journal of Business Ethics, Peter, J. P., & Ryan, M. J. (1976). An investigation of perceived risk
91(2), 237–252. at the brand level. Journal of Marketing Research, 8, 184–188.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ Peter, J. P., & Tarpey, L. X., Sr. (1975). A comparative analysis of
information privacy concerns (IUIPC): The construct, the scale, three consumer decision strategies. Journal of Consumer
and a causal model. Information Systems Research, 15(4), Research, 2(1), 29–37.
336–355. Phillips, B. N., Martin, R. P., & Meyers, J. (1972). Interventions in
Marshall, G. W., Moncrief, W. C., Rudd, J. M., & Lee, N. (2012). relation to anxiety in school. Anxiety: Current Trends in Theory
Revolution in sales: The impact of social media and related and Research, 2, 410–464.
technology on the selling environment. Journal of Personal Roman, S. (2007). The ethics of online retailing: A scale development
Selling and Sales Management, 32(3), 349–363. and validation from the consumers’ perspective. Journal of
Matlin, M. W., & Stang, D. J. (1978). The Pollyanna principle: Business Ethics, 72(2), 131–148.
Selectivity in language, memory, and thought. Cambridge, MA: Roselius, T. (1971). Consumer rankings of risk reduction methods.
Schenkman Publishing Company. The Journal of Marketing, 35(1), 56–61.
Miniard, P. W., & Cohen, J. B. (1983). Modeling personal and Segars, A. H., & Grover, V. (1993). Re-examining perceived ease of
normative influences on behavior. Journal of Consumer Re- use and usefulness: A confirmatory factor analysis. MIS Quar-
search, 10, 169–180. terly, 17, 517–525.
Mitchell, V.-W. (1994). 30 years of perceived risk: Some research Shimp, T. A., & Bearden, W. O. (1982). Warranty and other extrinsic
issues. In Paper presented at the proceedings of the marketing cue effects on consumers’ risk perceptions. Journal of Consumer
science conference. Research, 9, 38–46.
Mitchell, V.-W. (1999). Consumer perceived risk: Conceptualisations Shin, D.-H. (2013). User experience in social commerce: In friends
and models. European Journal of Marketing, 33(1/2), 163–195. we trust. Behaviour and Information Technology, 32(1), 52–67.
Mitchell, V.-W., & Greatorex, M. (1993). Risk perception and Sievert, M., Albritton, R. L., Roper, P., & Clayton, N. (1988).
reduction in the purchase of consumer services. Service Indus- Investigating computer anxiety in an academic library. Informa-
tries Journal, 13(4), 179–200. tion Technology and Libraries, 7(3), 243–252.
Mitra, K., Reiss, M. C., & Capella, L. M. (1999). An examination of Simonson, M. R., Maurer, M., Montag-Torardi, M., & Whitaker, M.
perceived risk, information search and behavioral intentions in (1987). Development of a standardized test of computer literacy
search, experience and credence services. Journal of Services and a computer anxiety index. Journal of Educational Comput-
Marketing, 13(3), 208–228. ing Research, 3(2), 231–247.
Montgomery, H. (1989). From cognition to action: The search for Stephen, A. T., & Toubia, O. (2010). Deriving value from social
dominance in decision making. In H. Montgomery, O. Svenson commerce networks. Journal of Marketing Research, 47(2),
(Eds.), Process and structure in human decision making (pp. 215–228. doi:10.1509/jmkr.47.2.215.
23–50). Chichester: Wiley. Stone, R. N., & Grønhaug, K. (1993). Perceived risk: Further
Murray, K. B. (1991). A test of services marketing theory: Consumer considerations for the marketing discipline. European Journal of
information acquisition activities. The Journal of Marketing, 55, Marketing, 27(3), 39–50.
10–25. Svensson, G., Wood, G., & Callaghan, M. (2010). A corporate model
Murray, K. B., & Schlacter, J. L. (1990). The impact of services of sustainable business practices: An ethical perspective. Journal
versus goods on consumers’ assessment of perceived risk and of World Business, 45(4), 336–345.
variability. Journal of the Academy of Marketing Science, 18(1), Tanaka, J. S., & Huba, G. J. (1984). Confirmatory hierarchical factor
51–65. analyses of psychological distress measures. Journal of Person-
Nunally, J. C., & Bernstein, I. H. (1978). Psychometric theory. New ality and Social Psychology, 46(3), 621.
York: McGraw-Hill. Tanriverdi, H. (2005). Information technology relatedness, knowl-
Pai, F.-Y., & Huang, K.-I. (2011). Applying the Technology edge management capability, and performance of multibusiness
Acceptance Model to the introduction of healthcare information firms. MIS Quarterly, 29(2), 311–334.
systems. Technological Forecasting and Social Change, 78(4), Tanriverdi, H. (2006). Performance effects of information technology
650–660. synergies in multibusiness firms. MIS Quarterly, 30(1), 57–77.
Park, H., & Blenkinsopp, J. (2009). Whistleblowing as planned Taylor, J. W. (1974). The role of risk in consumer behavior. The
behavior—A survey of South Korean Police Officers. Journal of Journal of Marketing, 38(2), 54–60.
Business Ethics, 85(4), 545–556. doi:10.1007/s10551-008-9788- Taylor, S., & Todd, P. A. (1995). Understanding information
y. technology usage: A test of competing models. Information
Park, J., Lee, D., & Ahn, J. (2001). Risk-focused e-commerce adoption Systems Research, 6(2), 144–176.
model: A cross-country study. Journal of Global Information Teo, T. S., & Yeong, Y. D. (2003). Assessing the consumer decision
Technology Management, 7(2), 6–30. process in the digital marketplace. Omega, 31(5), 349–363.
Park, C. W., & Lessig, V. P. (1977). Students and housewives: Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal
Differences in susceptibility to reference group influence. computing: Toward a conceptual model of utilization. MIS
Journal of Consumer Research, 4(2), 102–110. Quarterly, 15(1), 125–143.

123
Self-Service Technologies and e-Services Risks...

Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Information and Management, 51(2), 249–259. doi:10.1016/j.im.
Understanding online purchase intentions: Contributions from 2013.12.003.
technology and trust perspectives. European Journal of Infor- Witte, K. (1994). Fear control and danger control: A test of the
mation Systems, 12(1), 41–48. extended parallel process model (EPPM). Communications
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Monographs, 61(2), 113–134.
technology acceptance model: Four longitudinal field studies. Wood, W. (2000). Attitude change: Persuasion and social influence.
Management Science, 46(2), 186–204. Annual Review of Psychology, 51(1), 539–570.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). Yoon, C. (2011). Theory of planned behavior and ethics theory in
User acceptance of information technology: Toward a unified digital piracy: An integrated model. Journal of Business Ethics,
view. MIS Quarterly, 27(3), 425–478. 100(3), 405–417.
Venkatraman, N. (1990). Performance implications of strategic Zhou, L., Zhang, P., & Zimmermann, H.-D. (2013). Social commerce
coalignment: A methodological perspective. Journal of Man- research: An integrated view. Electronic Commerce Research
agement Studies, 27(1), 19–41. and Applications, 12(2), 61–68.
Wallace, L. G., & Sheetz, S. D. (2014). The adoption of software
measures: A technology acceptance model (TAM) perspective.

123

You might also like