You are on page 1of 16

Result and Discussion

Introduction

This section entails the findings and discussions. It will describe the data processing and show the

study's empirical findings. The study's data processing will describe how the data was analyzed using

demographic and finding from the application SPSS.  Following the presentation of the hypothesis

testing results, there will be a discussion of each variables' outcome.

Coding and Data Entry

The act of translating acquired information or observations into a collection of meaningful, coherent

categories is referred to as data coding. It is the process of summarizing and re-presenting facts to

create a systematic description of a recorded or observed phenomena. Data coding is necessary as the

initial step in preparing data for SPSS processing. Data collected via surveys will be coded and placed

into the database. Coding entails giving a number to the replies of the participants in order to transcribe

the data from the questionnaire and then key in the data.

Coding is required for any survey questionnaire replies that are presented in a format that cannot be

analyzed. Do the data input when the data from the questionnaire has been coded. The act of

transferring the codes from the questionnaire form to the computer is known as data entry. SPSS

software will be used to enter data into the database.

Demographic Profile of Respondents

Demographic analysis is the study of a population based on criteria such as age, ethnicity, and gender.

Demographic data refers to socioeconomic information stated statistically, such as employment,

education, income, marriage rates, birth and death rates, and so on. Demographic information gives

information about research participants and is required to determine if the persons in a given study are
a representative sample of the target population for generalization purposes. In this study,

demographic profile include gender, age, race, educational level, residential area, respondent awareness

towards e-wallet, use of e-wallet and the type of e-wallet respondent use.

Table 1 shows the frequency of demographic profiles via gender wise distribution of 372 participants. As

shown in the table, out of 372 respondents 189 were males and 183 were females. As shown in pie chart

4.1 below, the research involved 372 respondents out of which 49.2% were females and 50.8% males.

Gender
Valid Cumulative
Frequency Percent Percent Percent
Valid Female 183 49.2 49.2 49.2
MALE 189 50.8 50.8 100.0
Total 372 100.0 100.0
Table 1 Distribution of Gender Groups

Figure 4.1 Demographic Analysis by Gender Distribution

Table 2 shows the frequency of demographic profiles via race wise distribution. Out of 372 respondents

177 were Indians, 104 were Malay, 81 were Chinese, 9 were Punjabi and only 1 was Iban. As depicted in

pie chart 4.2, 47.6% respondents are Indian, 28% Malay, 21.8% Chinese, 2.4% Punjabi and 0.3% Iban.

Ethnicity
Valid Cumulative
Frequency Percent Percent Percent
Valid CHINESE 81 21.8 21.8 21.8
Iban 1 .3 .3 22.0
INDIAN 177 47.6 47.6 69.6
MALAY 104 28.0 28.0 97.6
Punjabi 9 2.4 2.4 100.0
Total 372 100.0 100.0
Table 2 Distribution of Race group

Figure 4.2 Demographic Profile via Ethnicity

The demographic distribution of respondents by their age in table 3 shows that the age group of 30 – 39

years old have the largest number of respondents out of 372 participants, i.e., 146, then 40 – 49 years

old age group with 90, 20 – 29 years old age group with 80 and the age group of 50 years old and above

have the least participants with only 56 respondents. 39.2% respondents belong to the age group of 30

– 39 years old, 24.2% belongs to the 40 – 49 years old age group, 21.5% belongs to the age group of 20 –

29 years old whereas the remaining 15.1% were 50 years old or above as shown in pie chart 4.3.

Age
Valid Cumulative
Frequency Percent Percent Percent
Valid 20 - 29 YEARS OLD 80 21.5 21.5 21.5
30 - 39 YEARS OLD 146 39.2 39.2 60.8
40 - 49 YEARS OLD 90 24.2 24.2 84.9
50 YEARS OLD AND 56 15.1 15.1 100.0
ABOVE
Total 372 100.0 100.0
Table 3 Distribution of Age Group
Figure 4.3 Demographic Analysis via Age

The result of table 4, describes that the respondents in this research with bachelor’s degree were 185

(49.7%), Master/PhD were 37 (9.9%), HSC/STPM/Matriculation/diploma were 85 (22.8%) and

primary/secondary education level were 65 (17.5%).

EDUCATION LEVEL
Valid Cumulative
Frequency Percent Percent Percent
Valid BACHELOR DEGREE 185 49.7 49.7 49.7
HSC/STPM/ 85 22.8 22.8 72.6
MATRICULATION/
DIPLOMA
MASTER / PhD 37 9.9 9.9 82.5
PRIMARY 65 17.5 17.5 100.0
/SECONDARY
Total 372 100.0 100.0
Table 4 Demographic Distribution by Education Level

As shown in table 5, the majority of the respondents belongs to the urban area contributing to the

54.3% (202 respondents) whereas 24.2% (90) respondents belong to suburban areas and the remaining

21.5% (80) participants belong to the rural residential area.

RESIDENTIAL AREA
Valid Cumulative
Frequency Percent Percent Percent
Valid RURAL 80 21.5 21.5 21.5
SUBURBAN 90 24.2 24.2 45.7
URBAN 202 54.3 54.3 100.0
AREA
Total 372 100.0 100.0
Table 5 Demographic Distribution by Residential Area

The result of table 6 depicts that out of 372, 348 respondents (93.5%) were aware of the e-wallet

applications in comparison to the 24 respondents (6.5%) who have no knowledge of e-wallet

applications.

ARE YOU AWARE OF THE E-WALLET APPS?


Valid Cumulative
Frequency Percent Percent Percent
Valid No 24 6.5 6.5 6.5
Yes 348 93.5 93.5 100.0
Total 372 100.0 100.0
Table 6 Demographic Distribution by the Awareness of E-wallet application

Majority of the respondents, i.e., 320 out of 371 (86%) were already using the e-wallet whereas 52

respondents (14%) were not using the e-wallet as depicted in the table 7.

ARE YOU CURRENTLY USING E-WALLET?


Frequenc Valid Cumulative
y Percent Percent Percent
Valid No 52 14.0 14.0 14.0
Yes 320 86.0 86.0 100.0
Total 372 100.0 100.0
Table 7 Demographic Distribution by Usage of E-Wallet

The graph 4.4 shows that the majority of the respondents use “Touch N Go” as their preferred e-wallet

with 262 (70.4%), followed by “Shopeepay” with 163 (43.8%). Then followed by “Grabpay” with 151

(40.6%), “Maybank” with 133 (35.8%), “Lazada wallet” with 97 (26.1%), “Boost” with 56 (15.1%),

“Applepay” with 53 (14.2%), “WeChat pay” with 52 (14%), “Samsung pay” with 49 (13.2%), “Bigpay”
with 45 (12.1%) and “Alipay” with 27 (7.3%) respondents. Apart from these, there are 15 respondents

(04%) in total who use none of these e-wallets.

Figure 4.4 Distribution of E-Wallet Types

Descriptive Analysis:

Descriptive statistics are short informative coefficients that describe a specific data collection, which

might represent the complete population or a subset of a population. Measures of central tendency and

measures of variability are two types of descriptive statistics (spread). The mean, median, and mode are

examples of measurements of central tendency, whereas standard deviation, variance, minimum and

maximum variables, kurtosis, and skewness are examples of measures of variability. (Hayes, 2022)

The state of the variables is described by a descriptive statistic. It is a quick explanation of the data

gathered through the distribution of questionnaires. It delivers respondents' data information. The

descriptive statistics in this study include mean, standard deviation, minimum and maximum values.

Std.
N Minimum Maximum Mean Deviation
The descriptive analysis results in table 8 show that there are no missing observations, no unlawful

The validity test is used to determine the reliability of questionnaire questions in measuring and

collecting data from respondents. If the significance, (sig) correlation number is less than 0.05 (5%), the

instrument is valid. Otherwise, if the sig is greater than 0.05 (5%), the instrument is invalid, implying that

I trust the ability of the e-wallet to protect user information and privacy
I trust the ability of the e-wallet to protect the connectivity link between
banking portals
I trust the ability of e-wallet to protect the privacy of every transaction
.936
.955
.978
.964

E-wallet app enhances the effectiveness in conducting secure


payment transactions
E-wallet app transactions are more secure and protected with multiple
security recognition
E-wallet offers security protection greater than the conventional wallet
I think that using e-wallets are perfectly safe
4.10
3.97
3.82
3.83

E-wallets keep my financial transactions safe.


I think my privacy and confidential material are guaranteed when
Table 8 Descriptive Statistics

using e-wallets
codes, and a decent dispersion of answers to each variable item.

The risk of abuse of usage information is low when using e-wallets


E-wallets ensure high-security features for the users by considering
5
5
5
5

that you authorize every transaction with a PIN or password or


E-wallets ensure protection against risk of fraud and financial loss
I find that e-wallet app can link multiple bank accounts which is
convenience for me
I find that using e-wallet app have secure transactions better than
1
1
1
1

conventional cash
I find that e-wallets have more access to making multiple payments at
one time
I find that using e-wallet app make me manage transactions more
Testing the Goodness of Measure: discreetly

the questionnaire's instrument is flawed.


I find that using e-wallet app, I'm able to track my expenditure and
372
372
372
372
372

save more
I find the e-wallet app is very favorable to me
I am able to access my e-wallet app anytime anywhere at any
Perceived Ease of Use

convenient time
Perceived Benefit

Valid N (listwise)
Perceived Trust

I am able to track my daily expenses easily with the e-wallet app


Perceived Risk

The e-wallet apps make my everyday payment and transactions easy


to manage
Learning to use an e-wallet app is easy and user-friendly
I find that e-wallet apps are convenient compared to other forms of
payment/transactions

Validity Test
I find that e-wallet apps are easy to use and saves time
I find that e- Pear 1 .8 .7 .7 .7 .7 .7 .6 .7 .6 .6 .6 .6 .6 .5 .5 .5 .6 .6 .6 .6 .6 .5 .6

wallet apps son 49 82 65 13 20 90 50 13 65 51 58 01 67 43 56 98 10 45 16 54 04 96 06

are easy to Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

use and lation

saves time Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.

(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I find that e- Pear .8 1 .8 .7 .7 .7 .7 .6 .6 .6 .6 .6 .5 .6 .5 .5 .5 .6 .6 .5 .6 .5 .6 .6

wallet apps son 49 10 79 23 58 98 14 80 74 93 21 54 34 60 42 67 23 24 84 40 88 04 15

are Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

convenient lation

compared Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
to other (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
forms of tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
payment/tra )

nsactions N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

Learning to Pear .7 .8 1 .8 .7 .7 .7 .6 .6 .6 .6 .6 .5 .6 .5 .5 .5 .6 .6 .6 .6 .5 .6 .6

use an e- son 82 10 01 42 61 60 26 78 60 98 29 41 44 68 31 93 09 28 09 62 84 02 21

wallet app Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

is easy and lation

user- Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
friendly (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
)

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

The e- Pear .7 .7 .8 1 .7 .7 .7 .6 .6 .6 .6 .6 .5 .6 .5 .5 .5 .5 .6 .5 .6 .5 .5 .5

wallet apps son 65 79 01 86 69 57 74 89 79 79 66 33 17 21 16 88 83 05 57 28 50 51 68

make my Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

everyday lation

payment Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
and (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
transaction tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
s easy to )
manage N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I am able to Pear .7 .7 .7 .7 1 .7 .7 .7 .7 .6 .6 .6 .5 .6 .5 .5 .6 .6 .5 .5 .6 .5 .5 .5

track my son 13 23 42 86 34 48 14 24 75 67 41 87 23 79 38 10 32 95 87 02 91 92 82

daily Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

expenses lation

easily with Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
the e-wallet (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
app tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I am able to Pear .7 .7 .7 .7 .7 1 .7 .6 .6 .6 .7 .6 .5 .6 .5 .5 .5 .5 .6 .5 .6 .5 .6 .6

access my son 20 58 61 69 34 48 03 20 27 00 34 46 30 49 42 66 52 31 95 26 56 09 11

e-wallet Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

app lation

anytime Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
anywhere (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
at any tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
convenient )
time N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I find the e- Pear .7 .7 .7 .7 .7 .7 1 .7 .7 .7 .7 .7 .6 .6 .5 .5 .6 .6 .6 .6 .6 .5 .6 .6

wallet app son 90 98 60 57 48 48 00 28 21 39 16 19 78 82 51 21 51 68 20 40 99 37 44

is very Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

favorable to lation

me Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I find that Pear .6 .6 .6 .6 .7 .6 .7 1 .7 .7 .6 .6 .6 .6 .6 .5 .6 .6 .5 .6 .5 .5 .5 .6

using e- son 50 14 26 74 14 03 00 83 12 57 53 21 07 22 79 64 19 78 11 86 92 97 06

wallet app, Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

I'm able to lation


track my Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.

expenditure (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

and save tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

more )

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I find that Pear .7 .6 .6 .6 .7 .6 .7 .7 1 .7 .7 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6

using e- son 13 80 78 89 24 20 28 83 66 19 70 12 70 33 15 56 61 14 24 52 63 57 35

wallet app Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

make me lation

manage Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
transaction (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
s more tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
discreetly )

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I find that e- Pear .6 .6 .6 .6 .6 .6 .7 .7 .7 1 .7 .7 .5 .6 .6 .6 .6 .6 .5 .5 .6 .6 .6 .6

wallets son 65 74 60 79 75 27 21 12 66 51 22 94 08 02 11 60 34 71 84 42 21 05 44

have more Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

access to lation

making Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
multiple (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
payments tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
at one time )

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I find that Pear .6 .6 .6 .6 .6 .7 .7 .6 .7 .7 1 .7 .6 .6 .6 .5 .6 .6 .6 .6 .6 .6 .6 .6


using e- son 51 93 98 79 67 00 39 57 19 51 33 32 79 27 98 69 63 55 42 45 27 59 87

wallet app Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

have lation

secure Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
transaction (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
s better tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
than )
convention N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
al cash 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
I find that e- Pear .6 .6 .6 .6 .6 .6 .7 .6 .6 .7 .7 1 .6 .6 .6 .6 .6 .6 .5 .5 .6 .6 .6 .6

wallet app son 58 21 29 66 41 34 16 53 70 22 33 11 54 07 29 77 65 97 86 52 06 27 37

can link Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

multiple lation

bank Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
accounts (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
which is tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
convenienc )
e for me N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

E-wallets Pear .6 .5 .5 .5 .5 .5 .6 .6 .6 .5 .6 .6 1 .6 .7 .7 .7 .7 .6 .6 .6 .6 .6 .6

ensure son 01 54 41 33 87 46 19 21 12 94 32 11 89 24 22 09 19 50 68 14 39 53 76

protection Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

against risk lation

of fraud Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
and (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
financial tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
loss )

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

E-wallets Pear .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 1 .6 .6 .6 .7 .7 .7 .7 .6 .7 .6

ensure son 67 34 44 17 23 30 78 07 70 08 79 54 89 49 78 96 48 01 01 25 80 13 96

high- Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

security lation

features for Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
the users (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
by tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
considering )

that you N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
authorize 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
every

transaction

with a PIN

or

password

or

fingerprint

scanner.
The risk of Pear .5 .5 .5 .5 .5 .5 .5 .6 .6 .6 .6 .6 .7 .6 1 .7 .7 .7 .6 .7 .6 .6 .7 .7

abuse of son 43 60 68 21 79 49 82 22 33 02 27 07 24 49 60 82 55 49 12 74 90 11 32

usage Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

information lation

is low when Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
using e- (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wallets tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I think my Pear .5 .5 .5 .5 .5 .5 .5 .5 .6 .6 .5 .6 .7 .6 .7 1 .7 .7 .6 .7 .7 .7 .7 .7

privacy and son 56 42 31 16 38 42 51 79 15 11 98 29 22 78 60 92 71 21 26 27 45 24 18

confidential Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

material are lation

guaranteed Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
when using (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e-wallets tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

E-wallets Pear .5 .5 .5 .5 .6 .5 .6 .6 .6 .6 .6 .6 .7 .6 .7 .7 1 .7 .6 .7 .7 .7 .7 .7

keep my son 98 67 93 88 10 66 21 64 56 60 69 77 09 96 82 92 93 82 35 39 46 44 29

financial Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

transaction lation

s safe. Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.

(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
)

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I think that Pear .6 .6 .6 .5 .6 .5 .6 .6 .6 .6 .6 .6 .7 .7 .7 .7 .7 1 .6 .7 .7 .7 .7 .7

using e- son 10 23 09 83 32 52 51 19 61 34 63 65 19 48 55 71 93 88 24 03 24 80 22

wallets are Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

perfectly lation

safe Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.

(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

)
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

E-wallet Pear .6 .6 .6 .6 .5 .6 .6 .5 .6 .5 .6 .5 .6 .7 .6 .6 .6 .6 1 .7 .7 .6 .7 .7

offers son 45 24 28 05 95 31 68 78 14 71 55 97 50 01 49 21 82 88 52 10 82 18 68

security Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

protection lation

greater Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
than the (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
convention tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
al wallet )

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

E-wallet Pear .6 .5 .6 .5 .5 .5 .6 .6 .6 .5 .6 .5 .6 .7 .7 .7 .7 .7 .7 1 .7 .7 .7 .7

app son 16 84 09 57 87 95 20 11 24 84 42 86 68 01 12 26 35 24 52 71 96 74 68

transaction Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

s are more lation

secure and Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
protected (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
with tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
multiple )
security N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
recognition 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

E-wallet Pear .6 .6 .6 .6 .6 .6 .6 .5 .6 .6 .6 .6 .6 .7 .6 .7 .7 .7 .7 .7 1 .7 .7 .7

app son 54 40 62 28 02 26 40 86 52 42 45 52 14 25 74 27 39 03 10 71 98 77 35

enhances Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

the lation

effectivene Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
ss in (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
conducting tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
secure )
payment N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
transaction 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
s

I trust the Pear .6 .5 .5 .5 .5 .5 .5 .5 .6 .6 .6 .6 .6 .6 .6 .7 .7 .7 .6 .7 .7 1 .7 .7

ability of e- son 04 88 84 50 91 56 99 92 63 21 27 06 39 80 90 45 46 24 82 96 98 89 79

wallet to Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

protect the lation


privacy of Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.

every (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

transaction tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I trust the Pear .5 .6 .6 .5 .5 .6 .6 .5 .6 .6 .6 .6 .6 .7 .7 .7 .7 .7 .7 .7 .7 .7 1 .7

ability of son 96 04 02 51 92 09 37 97 57 05 59 27 53 13 11 24 44 80 18 74 77 89 96

the e-wallet Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

to protect lation

the Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
connectivity (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
link tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
between )
banking N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
portals 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

I trust the Pear .6 .6 .6 .5 .5 .6 .6 .6 .6 .6 .6 .6 .6 .6 .7 .7 .7 .7 .7 .7 .7 .7 .7 1

ability of son 06 15 21 68 82 11 44 06 35 44 87 37 76 96 32 18 29 22 68 68 35 79 96

the e-wallet Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **

to protect lation

user Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
information (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
and privacy tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
Table 9 Measurement of Instrument of Validity

The validity test results are shown in Table 9 above. The validity test indicated that all instruments were

valid when comparing the Pearson product-moment correlation index with a significance level of 5%

with the crucial value, the significant value produced by the Sig. (2-tailed) of (<0.001)< 0.05.

Reliability Test

Reliability is used to assess for consistency and stability in how effectively the items measure the model

and correlate to one another. Cronbach's alpha is a reliability coefficient that measures how effectively
the items in a collection are positively connected to one another. A reliable instrument has a coefficient

of 0.60 or above. Otherwise, if the coefficient is less than 0.60, the instrument is unreliable.

Variable Cronbach's Alpha N of Items


Perceived Ease of Use .932 5
Perceived Trust .950 7
Perceived Benefit .934 6
Perceived Risk .934 6
Table 10 Measurement Instrument of Reliability

According to the findings of the reliability test table 10 above, the lowest Cronbach's alpha for the

construct is 0.932, and the maximum is 0.950. That indicates Cronbach's alpha is greater than 0.60,

implying that all constructs under consideration were reliable.

Correlation Analysis

Correlation analysis is used to assess the strength of the linear relationship between two variables that

are not assumed to be dependent or independent. The correlation coefficient has a value range of -1 to

+1. When the correlation coefficient is close to one, it indicates that the linear link between variables is

very strong, and when it is close to zero, it indicates that the relationship is weak.

Perceived Ease Perceived


of Use Benefit Perceived Trust Perceived Risk
**
Perceived Ease of Use Pearson Correlation 1 .913 .793** .772**
Sig. (2-tailed) <.001 <.001 <.001
N 372 372 372 372
Perceived Benefit Pearson Correlation .913** 1 .840** .818**
Sig. (2-tailed) <.001 <.001 <.001
N 372 372 372 372
** **
Perceived Trust Pearson Correlation .793 .840 1 .922**
Sig. (2-tailed) <.001 <.001 <.001
N 372 372 372 372
** ** **
Perceived Risk Pearson Correlation .772 .818 .922 1
Sig. (2-tailed) <.001 <.001 <.001
N 372 372 372 372
**. Correlation is significant at the 0.01 level (2-tailed).
Table 11 Correlations

The value of sig (<0.01) < 0.05 in table 11 correlation indicates that there is a linear connection between

variables. Each variable's amount of correlation varies, but all linear correlations are positive. The higher

one variable, the higher the other variables.

Multiple Linear Regression

Multiple linear regression is a regression that uses more than one independent variable to explain the

variation in the dependent variable. It allows you to objectively examine the degree and nature of the

link between the independent variable and the dependent variable: the regression coefficient reveals

the relative relevance of each independent variable in predicting the dependent variable.

You might also like