You are on page 1of 12

Perceived security and World Wide Web purchase

intention

W. David Salisbury
Ohio University, Athens, Ohio, USA
Rodney A. Pearson
Mississippi State University, Mississippi, USA
Allison W. Pearson
Mississippi State University, Mississippi, USA
David W. Miller
Mississippi State University, Mississippi, USA

Keywords impact of perceived Web security, perceived


Security, Shopping, Internet, Introduction ease of Web page navigation and perceived
Modelling
Internet commerce is positioned to usefulness on intent to purchase products
Abstract experience dramatic growth. International using the World Wide Web. We believe that
While Web-based consumer Data Corporation reports that Internet measurement development efforts such as
activity is poised on the brink of commerce revenues could top $1 trillion by this are critical in order to address such
dramatic growth, concerns about 2003 and that the number of Web-based phenomena as consumer Web commerce.
security have the potential to limit
this growth by arousing shopper's
shoppers worldwide should surpass 183
concerns about the Web-based million by 2003 (IDC, 1999a). Furthermore, by
channel. One key aspect to 2003, 32 million households should be Theoretical perspective
consumer participation in Web banking online via the Internet (IDC, 1999b).
commerce may be the extent to However, there are a variety of threats to Perceptions about using the World Wide Web
which they perceive risk to their for purchasing products will lead to the
sensitive information. This study
personal security (i.e. risk) when a user
shops on the World Wide Web. The popular formation of attitudes that will influence
describes the creation of a scale
to measure perceived Web press abounds with stories of credit card intent to purchase products on the World
security. We apply the scale in a information theft, personal information Wide Web. How such attitudes can lead to
causal model to investigate the breaches (Blair, 1997), and even ActiveX intent to adopt an innovation such as Web
relative impact of beliefs about shopping draws upon a variety of sources for
applications that attach themselves to online
Web shopping on intent to
banking programs to provide hackers with its operationalization (Fishbein and Ajzen,
purchase products using the World
Wide Web. Data from two samples access to an individual's bank accounts 1975; Ajzen and Fishbein, 1980; Davis 1989;
is used to develop the scale and to (CSCI, 1998). Moore and Benbasat, 1991). The most
perform the causal analysis. Our When one shops on the Web, security is a comprehensive treatment of attitude and its
findings indicate the favorable influence on behavior is found in Fishbein
concern. However, the growth of Internet
psychometric properties of the
scale, and the causal analysis commerce suggests factors other than and Ajzen (1975, Ajzen and Fishbein, 1980), in
from our sample indicates that security influence the adoption and use of their theory of reasoned action, and in
security is a greater influence on Web shopping. Drawing upon theories about Ajzen's follow on theory of planned behavior
intent to purchase using the Web innovation adoption and risk behavior, we (1985). The theory of reasoned action suggests
than is the ease and utility of that attitudes can be used to predict
believe that this phenomenon can be best
purchasing products.
understood by measuring perceptions about behavioral intentions and behaviors.
Web-based security, and then comparing Behaviors are driven by behavioral
perceived Web security with other relevant intention, which itself is the product of
constructs to assess their relative impact on attitude toward the behavior and subjective
intent to engage in Web-based purchasing. norm with respect to the behavior. Because
We first describe the theory upon which we the direct effect of subjective norm on
draw to understand web-based shopping. behavioral intent is difficult to isolate from
Because Web-based shopping is a relatively the indirect effects from attitude, Davis et al.
new phenomenon, scale development in the (1989) treatment of the theory of reasoned
area has been limited; hence we undertake action, the technology acceptance model
the development of a new scale to measure (TAM) focuses on attitude as a determinant
perceptions about World Wide Web security. of behavioral intent (Fishbein and Ajzen,
Web-based shopping may involve a trade-off 1975; Davis 1989).
between perceptions about its utility and Davis' (1989) purpose in creating TAM was:
security. Consequently we incorporate to provide an explanation of the determinants
known innovation adoption measures into of computer accepance that is in general,
Industrial Management & this particular arena and assess the relative capable of explaining user behavior across a
Data Systems broad range of end-user computing
101/4 [2001] 165±176 technologies and user populations, while at
The current issue and full text archive of this journal is available at
# MCB University Press the same time being both parsimonious and
[ISSN 0263-5577] http://www.emerald-library.com/ft
theoretically justified (p. 985).

[ 165 ]
W. David Salisbury, TAM proposes that perceived usefulness and influence intent to purchase products on the
Rodney A. Pearson, ease of use will influence an individual's World Wide Web. This is consistent with
Allison W. Pearson and intentions to utilize an information previous findings regarding the influence of
David W. Miller
Perceived security and World technology. Perceived usefulness is defined ease and utility of a particular innovation on
Wide Web purchase intention by Davis (1989) as ``the degree to which a its subsequent adoption (e.g. Adams et al.,
Industrial Management & person believes that using a particular 1992; Davis, 1989; Davis et al., 1989; Chin and
Data Systems system would enhance his job performance'' Gopal, 1995). As a consequence, we propose
101/4 [2001] 165±176 Hypotheses 1 and 2:
(p. 985). He defined ease of use as ``the degree
to which a person believes that using a H1: Perceived ease of navigation will
particular system would be free of effort'' (p. favorably influence intent to purchase
985). Researchers working within the general on the World Wide Web.
framework of TAM have predicted user H2: Perceived usefulness will favorably
intentions with regard to a variety of influence intent to purchase on the
technologies. These include electronic mail, World Wide Web.
text editors, word processing and graphics
In addition to other, more fully investigated
software (Davis, 1989; Davis et al., 1989), perceived characteristics of innovating, our
spreadsheets (Hendrickson et al., 1993), voice- third causal linkage investigates the
mail and word processors (Adams et al., 1992; influence of perceived Web security on Web
Chin and Todd, 1995), Database Management purchase intent. We define perceived Web
Systems (Szajna, 1994), and Group Support security as the extent to which one believes
Systems (Chin and Gopal, 1995). that the World Wide Web is secure for
Relevant to TAM is the users' attitudes transmitting sensitive information.
toward a particular adoption. Attitude is Perceived Web security is relevant to
based on the salient beliefs that a person has introduce to the discussion because the
about the consequences of a given behavior adoption of purchasing products on the
and his or her evaluation of those World Wide Web may involve a greater
consequences. Moore (1987), Moore and degree of risk than the adoption of other IT
Benbasat, 1991) suggests that attitude in the innovations. When one purchases products
context of IT usage deals with innovations. online, there may be a perception of risk
Consequently, he posits that attitude can be involved in transmitting sensitive
synthesized from perceived characteristics of information such as credit card numbers
innovating (Rogers, 1995). across the World Wide Web. Because of this,
There are a variety of salient beliefs about we believe that purchasing products over the
Web shopping that are relevant (Jarvenpaa World Wide Web has aspects consistent with
and Todd, 1997). Drawing from previously that of risk behavior. Risk is associated with
established characteristics of innovating, we outcome uncertainties such as lack of
believe two likely salient beliefs about knowledge about the distribution of potential
adopting an innovation such as purchasing outcomes (March, 1978), and the
products on the World Wide Web are related uncontrollability of outcome attainment
to the experience of shopping (Jarvenpaa and (Vlek and Stallen, 1980). To the extent that
Todd, 1997) on the World Wide Web, outcomes cannot be controlled and occur
specifically its perceived ease and utility. purely by chance, risk is higher than in
Consequently we adopt Davis' (1989) situations where the adopter can influence
perceived ease of use and perceived outcomes (Sitkin and Pablo, 1992). In the case
usefulness. Applied to Web shopping these of purchasing products on the World Wide
become perceived ease of navigation, or the Web, it is possible that potential adopters
degree to which navigating the World Wide may perceive that their credit card
Web is perceived to be free of effort (Davis, information may be at risk, and that they
1989), and perceived usefulness or the extent have no control over this. These perceptions
to which using the Web would enhance one's of risk are often reinforced by stories in the
shopping for products (Davis, 1989; Moore popular press about credit card and identity
and Benbasat, 1991). While the Davis theft. Further evidence for the possible
constructs were not originally developed for perception of risk in Web shopping is related
this context they are relevant, because they to the propensity of individuals to assign
tap into beliefs about the ease and utility of excessive weight to extreme outcomes even if
adopting an innovation, in this case Web the possibility of such outcomes is remote
shopping. (Kahneman and Tversky, 1979). In other
Our causal diagram is presented in Figure words, even though potential Web shopping
1. The first and second hypothesized links are adopters might not regard the risk as being
drawn from previous theory and research in all that high, the extreme risk involved with
the innovation adoption research tradition. having one's credit card stolen by a nefarious
Specifically, these linkages indicate that agent may cause potential adopters to
higher perceived ease and utility with perceive a greater risk than is actually
respect to Web shopping will favorably present. Given the likely influence of
[ 166 ]
W. David Salisbury, perceived Web security on intent to hypothesized relationships using a
Rodney A. Pearson, purchase, we propose Hypothesis 3. confirmation data set.
Allison W. Pearson and H3: Perceived Web security will favorably
David W. Miller
Perceived security and World influence intent to purchase on the
Wide Web purchase intention World Wide Web. Perceived Web security scale
Industrial Management &
Previous research (e.g. Jarvenpaa and Todd, development
Data Systems
101/4 [2001] 165±176 1997) indicates a need to address more In forming the initial set of items for
formally the relationship between perceived perceived Web security, a working definition
characteristics of Web shopping and user for perceived Web security was developed:
intentions. Consequently, it is important to The extent to which one believes that the Web
address potential Web shopping adopters' is secure for transmitting sensitive
perceptions about both the perceived utility information (e.g. credit card or social security
and the perceived risk (or inversely, the number).
security) of the World Wide Web channel for
purchasing products. However, we have To develop indicators that would reflect the
identified no previously existing instruments construct, items were created based on the
to conveniently capture this construct. As a definition of perceived Web security. This
result, we intend to develop a scale to approach led to the development of the seven
measure perceived Web security. We will original items in Table I.
first develop this scale and assess its
psychometric properties. Next, we will test Construct validity
this scale in a theoretically derived causal The initial seven perceived Web security
model to assess the relative influence of items were presented to 168 undergraduate
perceived Web security, perceived ease of students taking an introduction to computing
Web page navigation, and perceived course at a rural Southeastern US university.
usefulness on intent to purchase products The subjects completed a survey instrument
using the World Wide Web. We believe that designed to measure perceived Web security
perceived Web security in combination with and other relevant constructs as part of this
an adaptation of Davis' ease and usefulness overall research program. After eliminating
constructs (Davis, 1989) will provide greater responses due to missing items and some
understanding of what consumers take into misprinted questionnaires, 119 subjects were
account when deciding whether to shop left for analysis. Demographics on the
online. subjects are presented in Table II.
The reliability of the perceived Web
security scale was first examined by
Method
Our method consisted of three steps. First, Table I
before we could test our hypotheses, we Initial set of items to measure perceived Web
needed to develop an instrument to measure security
perceived Web security. Having developed 1 I would feel secure sending sensitive information
the perceived Web security scale, we assessed across the World Wide Web
its psychometric properties and those of the 2 The World Wide Web is a secure means through
other scales we adapted in our study using a which to send information
pilot data set. Finally, we tested our
3 I would feel totally safe providing sensitive
information about myself over the World Wide
Figure 1 Web
Hypothesized relationships 4 I would have concerns about giving out sensitive
information over the World Wide Web
5 To what extent do you believe that the World Wide
Web is a secure place to put sensitive
information?
6 I would not give out sensitive information over the
World Wide Web
7 Overall, the World Wide Web is a safe place to
transmit sensitive information
Notes: Responses for items 1,2,3,4,6 and 7 given on a
7-point Likert scale with the following anchors:
Strongly Disagree ± Strongly Agree.
Responses for item 5 were given on a 7-point Likert
scale with the following anchors: To a very little
extent ± To a very great extent. Items 4 and 6 were
reverse coded for analysis

[ 167 ]
W. David Salisbury, Table II shopping context, following Ajzen and
Rodney A. Pearson, Descriptive statistics (scale development Fishbein's (1980) suggestion. Similarly, items
Allison W. Pearson and for intention to purchase using the World
David W. Miller sample)
Perceived security and World Wide Web were adapted from Ajzen and
Wide Web purchase intention Variable Min Max Mean s.d. Fishbein (1980). Following the procedure
Industrial Management & Age 18.0 41.0 20.5 3.02 outlined in Anderson and Gerbing (1991) we
Data Systems GPA 1.0 4.0 3.02 0.608 tested measurement models for each of our
101/4 [2001] 165±176
Work experience 0 276 16.54 33.25 constructs by specifying an appropriate
(months) model in a confirmatory factor analysis using
Previous gathering 1.0 7.0 4.25 1.79 AMOS 4.0 (Arbuckle, 1999). For perceived
Previous purchasing 1.0 7.0 1.59 1.18 usefulness and perceived ease of navigation
each model was a single factor model. For
Gender M = 60; F = 57; NR = 2 purchase intent we would have performed a
single-factor confirmatory analysis, however,
specifying a single factor model in a there were only three items in this scale,
confirmatory factor analysis (CFA) using creating a situation in which this
AMOS 4.0 (Arbuckle, 1999). The use of measurement model was just identified.
structural equations modeling allows us to do Consequently, we specified a correlated 2-
this by testing a series of confirmatory factor factor model (correlating purchase intent
analyses. As opposed to components analysis, with usefulness[2]) and tested intent to
it is possible to test models that more closely purchase and usefulness simultaneously. The
resemble the hypothesized construct and its fit indices (Table V) suggested the models
relationship to other constructs (see Long, specified were appropriate for each of the
1983 for this distinction between exploratory constructs in question. Hence, all three items
and confirmatory factor analysis). Rather from purchase intent (Cronbach alpha = 0.95)
than merely specifying the number of were designated as our items for purchase
components and items to be analyzed, intent. For perceived usefulness and ease of
confirmatory factor analysis allows the navigation, the items all loaded quite highly
researcher to specify the exact relationship on their respective constructs, and the
between the common factors and the items Cronbach alphas were quite high (0.95 for
used to measure them as well as the linkages usefulness, and 0.93 for ease of navigation),
among the factors. Furthermore, various hence these items were used as presented.
overall model fit indices are obtained to Item loadings for each of the scales are found
determine how well the model explains the in Table IV.
sample data.
When tested using CFA, items 1, 2, 3, and 7 Convergent and discriminant validity
with a Cronbach alpha of 0.93 emerged as the The next step was to ensure that this subset of
``final set'' of measures for perceived Web items provided both convergent and
security (Table V). Items 4, 5, and 6 were discriminant validity. In other words, to what
omitted due to rather low factor loadings (i.e. extent do the items appear to be measuring
less than the 0.60 suggested by Bagozzi and the construct of interest and not other
Yi, 1988). All of the model fit indices (Table constructs? We performed two analyses to
III) surpass the recommended value for a assess this, following the procedures outlined
good model and therefore suggest the by Bollen (1989). First, we created a model in
measures are reflective of a single factor. which each of the constructs were modeled as
We also adapted scales, from Davis (1989) first-order, correlated factors. By looking at
and Moore and Benbasat (1991) to assess the the inter-construct correlations one can assess
perceived ease and utility of Web shopping, whether or not the items are too highly
and adoption intention (Ajzen and Fishbein, correlated. Further, the item loadings indicate
1980). The items for these scales are found in that the scales demonstrate convergent
Table IV. While a full scale development validity (i.e. the items all have loadings
effort was required for perceived Web greater than 0.60 (Bagozzi and Yi, 1988). This
security (the new scale), we thought it model is depicted in Figure 2, and the fit
worthwhile to perform a similar analysis on assessment for this model is in Table V.
each of the adapted scales (purchase intent, From Figure 2, one can readily identify
perceived ease of navigation, and perceived that the inter-construct correlations are not
usefulness). To generate the scales for unduly great (the highest is 0.67). Still, to
perceived ease of navigation and perceived statistically demonstrate that the inter-
usefulness, applicable items were drawn construct correlations are significantly
from Davis' (1989) and Moore and Benbasat's different from 1.0, we tested the constructs as
(1991) scales for ease of use and usefulness/ paired against one another to fully assess
relative advantage[1]. The selected items discriminant validity.
were modified by changing the attitude Discriminant validity is indicated if the
object to incorporate the World Wide Web correlation between constructs is not equal
[ 168 ]
W. David Salisbury, Table III
Rodney A. Pearson, Fit indices for CFA (single factor model) of perceived Web security scale
Allison W. Pearson and
David W. Miller Purchase
Perceived security and World
Wide Web purchase intention Suggested Ease of intent/
Industrial Management & Statistic value Security Usefulness navigation usefulness
Data Systems 2
4.883 0.597 7.434 31.315
101/4 [2001] 165±176
2, independence model 395.284 319.415 394.958 633.004
d.f. 2 2 2 13
d.f, independence model 6 6 6 21
2 significance p > 0.05 p = 0.087* 0.742* 0.024 0.003
2/d.f. < 5.0 2.438* 0.299* 3.717* 2.409*
RMR, (C) (Hu and Bentler, 1995) < 0.1 0.054* 0.007* 0.025* 0.051*
Goodness of fit > 0.90 0.981* 0.998* 0.969* 0.934*
AGFI > 0.80 0.907* 0.988* 0.843* 0.857*
Delta 1 (Bentler and Bonnet, 1980) > 0.90 0.988* 0.998* 0.981* 0.951*
Rho 1 (Bollen, 1986) > 0.90 0.963* 0.994* 0.944* 0.920*
Delta 2 (Bollen, 1989) > 0.90 0.993* 1.004* 0.986* 0.970*
Rho 2 (Tucker and Lewis, 1973) > 0.90 0.978* 1.013* 0.958* 0.952*
CFI (Bentler, 1990) > 0.90 0.993* 1.000* 0.986* 0.970*
RNI (McDonald and Marsh, 1990) > 0.90 0.993* 1.000* 0.986* 0.970*
Notes: * Surpass their recommended value

Table IV
Scale items (items presented here are used in all relevant analyses)
Web security ( = 0.93)
1 I would feel secure sending sensitive information across the World Wide Web ( = 0.86)
2 The World Wide Web is a secure means through which to send sensitive information ( = 0.93)
3 I would feel totally safe providing sensitive information about myself over the World Wide Web ( = 0.93)
7 Overall, the World Wide Web is a safe place to transmit sensitive information ( = 0.77)
Purchase intent ( = 0.95)
1 I would use the World Wide Web for purchasing a product ( = 0.88)
2 Using the World Wide Web for purchasing a product is something I would do ( = 0.97)
3 I could see myself using the World Wide Web to buy a product ( = 0.82)
Perceived ease of navigation ( = 0.93) (adapted from Davis, 1989)
1 Navigating pages on the World Wide Web is easy for me ( = 0.79)
2 I find my interaction with pages on the World Wide Web clear and understandable ( = 0.82)
3 It is easy for me to become skillful at navigating pages on the World Wide Web ( = 0.95)
4 Overall, I find pages on the World Wide Web easy to navigate ( = 0.92)
Perceived usefulness ( = 0.95) (adapted from Davis, 1989; Moore and Benbasat, 1991)
1 Using the World Wide Web would enable me to accomplish my tasks more quickly ( = 0.69)
2 Using the World Wide Web would make it easier for me to carry out my tasks ( = 0.87)
3 I would find the World Wide Web useful ( = 0.90)
4 Overall, I would find using the World Wide Web to be advantageous ( = 0.88)
Notes: Responses given on a seven-point Likert scale, 1 = strongly disagree, 7 = strongly agree

to 1.0 (Chin et al., 1997; Bollen, 1989). While correlation between constructs). A chi-
this is suggested in Figure 2 (by the square difference greater than 3.84 (a of 0.05)
correlations between the constructs), it can would suggest the two constructs are
also be statistically demonstrated by using a statistically different. We tested all six pairs
chi-square difference test where the chi- of constructs using this test. The results of
square measures for two analyses are this test are found in Table VI. From this we
compared. One analysis involves setting the can conclude that the correlations of all pairs
correlation between constructs at 1.0 while of constructs are significantly different from
the other allows the correlation to be freely 1.0, hence the scales are all measuring
estimated, creating a nested model (Bollen, different things.
1989). Beyond that, no other differences in the Thus, the final set of items for perceived
model specification are made for the two web security appear to demonstrate both
analyses. Thus, the difference in degrees of convergent and discriminant validity, as do
freedom between the two models is 1 (i.e. the all construct pairings tested. Next we
[ 169 ]
W. David Salisbury, assessed the nomological validity of the Figure 2
Rodney A. Pearson, perceived Web security scale by testing it in a Inter-construct correlations
Allison W. Pearson and full causal model with our hypothesized
David W. Miller
Perceived security and World relationships in a second sample. This
Wide Web purchase intention analysis is described in the next section.
Industrial Management &
Data Systems Model testing
101/4 [2001] 165±176
Having assessed our measures as to
convergent and discriminant validity using
the exploratory data set, we next analyzed the
hypothesized relationships in a causal model
using a different data set, drawn at a different
time. The data set for the confirmation
assessment was taken again at a
Southeastern US university. The items were
presented to 264 undergraduate students in
an introductory computer course as part of a
survey designed to measure perceptions
about using the World Wide Web for
shopping. After dropping responses due to
missing items, we were left with 253
respondents. Demographics are found in
Table VII.
We used this second sample to test our
hypothesized relationships in a causal model,
and also to further test the nomological
validity of the perceived Web security indicate that the model is reasonably
instrument by including an endogenous consistent with the data. All of the fit indices
construct, intent to purchase using the World are above their recommended values. The
Wide Web. Specifically, we examine whether discriminant validity among the exogenous
the perceived Web security instrument is factors is apparent since the largest
useful in predicting intention to purchase correlation is that between ease of navigation
products. Thus, beyond examining how and usefulness (0.54). The correlations
perceived web security correlates with ease between perceived Web security and ease of
of navigation and usefulness, we test a model navigation and usefulness are 0.12 and 0.14,
in which all three exogenous factors are respectively.
hypothesized to affect Web purchase In terms of our hypothesized links between
intention. the exogenous factors and web shopping
The causal diagram for the model for our intent, it can be seen that, as expected,
confirmation assessment with path loadings perceived Web security ( = 0.39) favorably
is found in Figure 3. The overall model fit influences intent to purchase products on the
indices for the confirmation data (Table VIII) Web, however the influence of both ease of
navigation ( = 0.04) and perceived
Table V usefulness ( = 0.12) was not significant.
Finally, the squared multiple correlation (R2)
Model fit indices, correlated constructs
indicates that the present model explains 19
Statistic Recommended value Obtained value per cent of the variance in intent to purchase.
Chi-square 229.473 We provide the covariance matrix in the
Chi-square, independence model 291.919 Appendix so that interested parties may
d.f. 125 replicate our analyses.
Our findings with respect to the
d.f. independence model 153
anticipated effect of ease of navigation and
2 significance p  0.05 0.00
usefulness on purchase intent were not
2/d.f. < 5.0 1.836*
supported. The estimated path coefficients
RMR, (C) (Hu and Bentler, 1995) < 0.10 0.053*
(0.04 for ease of navigation and 0.12 for
GFI > 0.90 0.835
usefulness) were not significantly different
AGFI > 0.80 0.774 from zero.
Delta-1 (Bentler and Bonnet, 1980) > 0.90 0.890
Rho-1 (Bollen, 1986) > 0.90 0.866
Delta-2 (Bollen, 1989) > 0.90 0.947*
Rho-2 (Tucker and Lewis, 1973) > 0.90 0.934*
Post-hoc analyses
CFI (Bentler, 1990) > 0.90 0.946* While our analyses are tentative, we still
RNI (McDonald and Marsh, 1990) > 0.90 0.946* believe that we should take all reasonable
precautions with respect to the statistical
Note: * Surpass their recommended value
validity of our assertions. When presenting
[ 170 ]
W. David Salisbury, structural equations modeling findings, it is the findings. A power analysis was
Rodney A. Pearson, wise to present additional analyses to more performed to see how small a parameter
Allison W. Pearson and firmly establish that the findings are not the estimate could be identified by the present
David W. Miller
Perceived security and World result of some methodological artifact (Hoyle analysis. Bootstrap analyses were performed
Wide Web purchase intention and Panter, 1995). While we were fairly to generate confidence intervals for the
Industrial Management & confident that our present findings represent parameter estimates.
Data Systems a reasonable degree of validity, we believed
101/4 [2001] 165±176
that we should investigate this more fully. Power analysis
Consequently, we performed additional One critical issue in any analysis of causal
analyses to assess the power of our tests to models is the power of these analyses.
identify small effect sizes and problems in Statistical power refers to the probability
model specification (e.g. cross-loaded items that an incorrectly specified model would be
or correlated errors). Power is in part a rejected (Chin and Newsted, 1993). In the
function of sample size, and although the present case, it was considered important to
sample in this study was fairly large, power be able to detect a given path between
is a concern. Consequently, two analyses constructs, if that path should indeed exist.
were performed to enhance the confidence in Power depends on several factors. These
include:
Table VI 1 the alpha level used to indicate statistical
Discriminant validity assessment for the paired constructs significance;
2 the effect size of the path for the correct
2 2 2 Constructs model;
Construct pairing free fixed difference distinct? 3 the number of indicators employed; and
Usefulness/security 29.315 413.879 384.564 yes 4 the alternative model used as a basis for
Usefulness/ease of navigation 34.885 279.333 244.448 yes comparison rejected (Chin and Newsted,
Usefulness/purchase intent 31.315 280.216 248.901 yes 1993).
Ease of navigation/security 30.512 420.410 389.898 yes Our concern in this case is whether or not we
Ease of navigation/purchase intent 32.662 416.557 383.895 yes used tests with sufficient power to capture
Security/purchase intent 20.912 264.288 243.376 yes potential problems with our scales or our
Note: 2 critical for all analyses is 3.84 model specification. To determine whether
the power in the present analyses was indeed
sufficient to capture a reasonably sized effect,
Table VII the procedure outlined by Saris and
Descriptive statistics (confirmation sample) Stronkhorst (1984: 205; Chin et al., 1997) was
Variable Min Max Mean s.d. applied. This approach takes the original
model tested and changes it to make an
Age 18 51 20.30 3.53
alternative model in terms of additional
GPA 0.70 4.00 2.91 0.584
model parameters (e.g. additional causal
Previous gathering 1 7 4.83 1.53
links via a structural path between
Previous purchasing 1 7 1.96 1.49
constructs of a factor loading) with specific
Gender M = 155 F = 90 NR = 8
effect size values. The alternative model is
used to generate an implied population
Table VIII covariance matrix, which is then run against
Model fit indices, confirmation data set the original model. The implied matrix is
Statistic Suggested Obtained that which would exist if the alternative
2
model were correct. If our alternative model
 149.502 were run against this implied covariance
2, baseline model 3829.258 matrix (which was created using our
d.f. 84 alternative model), a perfect fit would be
d.f. baseline model 105 obtained (i.e., chi-square equal to zero).
2 significance p  0.05 0.000 However, when we use our original model,
2/d.f. (Wheaton et al., 1977) < 5.0 1.780* which is the wrong model for the covariance
RMR (C) (Hu and Bentler, 1995) < 0.10 0.035* matrix we just derived, this will create an
GFI (Joreskog and Sorbom, 1988) > 0.90 0.928* imperfect fit. This value is a likelihood ratio
AGFI (Joreskog and Sorbom, 1988) > 0.80 0.897* value (i.e. the chi-square statistic from
-1 (Bentler and Bonnett, 1980) > 0.90 0.961* standard covariance analysis programs)
-1 (Bollen, 1986) > 0.90 0.951* approximating a noncentral chi-square
-2 (Bollen, 1989) > 0.90 0.983* distribution with degrees of freedom equal to
-2 (Tucker and Lewis, 1973) > 0.90 0.978* the number of additional parameters
CFI (Bentler, 1990) > 0.90 0.982* included to create the alternative model
RNI (McDonald and Marsh, 1990) > 0.90 0.982* (delta). Given delta, the level of alpha, and the
degrees of freedom, the power is determined
Note: * Surpass their recommended value
using the noncentral chi-square tables.
[ 171 ]
W. David Salisbury, Figure 3
Rodney A. Pearson, Path loadings from causal testing with confirmation data set
Allison W. Pearson and
David W. Miller
Perceived security and World
Wide Web purchase intention
Industrial Management &
Data Systems
101/4 [2001] 165±176

Table IX shows the results of testing the intent in our model is likely correct, since an
power of our analysis with the confirmation effect size as small as = 0.25 could have been
data set to detect three possible misspecified reliably detected. The second test
models for two specific potential problem demonstrated the ability to detect a poor
areas. The first test consisted of creating an measure that would tap into more than one
alternative causal model where a construct. This test demonstrated that a
standardized path of 0.25 from ease of measure which ``cross-loaded'' even as little
navigation to purchase intent. The model was as 0.30 would have been detected in our data
then tested for its power in detecting an set. Correlated errors between two indicators
incorrect model in which that path is can be interpreted as being influenced by an
excluded for estimation. The second test additional latent variable beyond the ones
followed a similar procedure, but in this case that were modeled, and our third test was
a standardized cross-loading of 0.30 from the intended to see if our sample contained
factor perceived usefulness to the indicator sufficient power to capture error terms
secure 4 is specified. A model was then run correlated at r = 0.30. In all three tests, the
where that loading was not included for power of the present analyses to detect a
estimation. The third test specified a misspecified model was above the generally
correlation of 0.30 between two error terms accepted level of 0.80 (Cohen, 1988). This
(those for usefulness items 1 and 2), followed indicates that we could be confident that the
by a test of the same model less that analysis in this study would enable the
detection of model misspecifications of these
specification (i.e. with the error terms
types at least 80 per cent of the time.
uncorrelated).
The three tests we performed were devised
to assess two different potential problem Bootstrap resampling of the data set
As a means of acquiring further information
areas. The first test demonstrates that the
about the significance of the parameter
zero path estimate for the structural path of
estimates in the models analyzed, we
perceived ease of navigation to purchase
employed a technique known as
bootstrapping. Bootstrapping is a resampling
Table IX procedure designed to estimate standard
Power analyses for the causal model with the confirmation data set errors, confidence intervals, and other
Model Effect size  Power statistical properties (Stine, 1989).
As a means of overcoming sample size
Ease of navigation ! purchase intent 0.25 12.127 0.936
limitations, the general approach to the
Security ! use4 0.30 44.708 0.999
bootstrap method is to let the empirical
Correlated errors 0.30 18.281 0.989
distribution of the data sample represent the
[ 172 ]
W. David Salisbury, population. A bootstrap sample is obtained about Web-based shopping. We found that
Rodney A. Pearson, by drawing N cases (typically the same increased levels of perceived Web security
Allison W. Pearson and number as the original sample size ± in this will lead to greater intent to purchase
David W. Miller
Perceived security and World case, 253) with replacement from the sample. products on the Web. These findings support
Wide Web purchase intention The bootstrap estimate is calculated on the our hypotheses, at least as it pertains to Web
Industrial Management & bootstrap sample. This procedure is repeated security and its influence on purchase intent.
Data Systems a number of times in order to calculate the The most telling finding would appear to be
101/4 [2001] 165±176
variance and confidence intervals of the that, when compared to perceptions about
bootstrap estimate. In the present case, 2,000 Web security, perceptions about the ease and
samples were drawn from the data set. utility of Web shopping would appear to be
The findings on parameter estimates diminished. While not anticipated, this is not
critical to the study findings from the especially surprising, in light of the risk
bootstrap analysis for our model are found in behavior literature. When one faces
Table X. In the models all structural paths potentially risky outcomes associated with
found to be significant in the initial model adopting an innovation, the perceived risk
were significant (p < 0.05). Consequently, may be more important in determining
greater confidence may be placed in the adoption behavior than the ease or utility of
primary findings from this study. the innovation in question. We believe that
As a final test, we performed a Bollen-Stine the integration of the risk perception
bootstrap analysis Bollen and Stine (1992) to perspective into the innovation adoption
test the null hypothesis that the model is literature may be a contribution in itself.
correct. The p-value for this test was 0.089, The finding that perceived Web security
suggesting that the model is indeed correct enhances intent to purchase is important,
for our data set. especially to practitioners who are interested
in engaging in Internet commerce. It is clear
in our sample that customers will shop on the
Discussion and conclusions World Wide Web only if they feel that their
credit card numbers and other sensitive
The conclusions drawn from the present information are safe, regardless of the
exercise can be placed in two categories: objective security of the Web site. Web page
methodological and theoretical. On the designers must take this into account and
methodological front, we have demonstrated display informational messages about the
the development of a reliable and valid measures taken to safeguard against fraud
measure to capture a critical construct to any time the customer is at a screen in which
understand Web-based shopping behaviors. they are being asked to provide sensitive
Still more effort needs to be expended to information. One example of this is how
capture other critical constructs, perhaps Amazon.com requires customers to click on a
addressing not sensitive information, but link to their secure server to finalize their
personal privacy while browsing. In purchases. This is an excellent example of
addition, more application-specific scales providing customers with greater confidence
need to be developed for further investigation that the Internet channel is a safe means to
of these phenomena. The scales we adapted shop, and thereby possibly reducing risk
from Davis (1989), while demonstrating perceptions.
excellent psychometric properties may not be One clear avenue for future efforts is the
the most appropriate in this context. Clearly issue of privacy versus security (Jarvenpaa
additional scale development is indicated. and Todd, 1997). Our scale as currently
On the theoretical front, our study makes designed captures security (i.e. one's
several contributions to the literature. First, personal information will be safe on the
we have identified three relevant constructs Internet), but there is also the issue of
that may influence intent to purchase privacy. Recently, much was made about the
products on the World Wide Web. Our initial Pentium III chip's unique identifier that
effort indicates that usefulness, ease of could be used to track individuals'
navigation, and security are salient beliefs navigation about Web pages. Another scale
that captures personal privacy while
Table X browsing would appear useful.
Bootstrap path significance of critical parameter estimates, confirmation Our study is not without limitations. First,
data (2,000 resamples) our student sample may not be
representative of the population of Web
Path Lower bound Upper bound Significance shoppers. Secondly, the responses to the
Security ! purchase intent 0.263 0.496 0.001* items may have been constrained due to the
Usefulness ! purchase intent ±0.017 0.297 0.082 subjects' lack of previous experience with
Ease of navigation ! purchase intent ±0.144 0.189 0.662 Web shopping. These concerns about
drawing from a student sample may not be as
Note: * Indicate significance at p = 0.05 relevant as in other contexts, however,
[ 173 ]
W. David Salisbury, because students do indeed purchase the This study provides many opportunities for
Rodney A. Pearson, types of products that are often most easily future research. One issue that should be
Allison W. Pearson and delivered using the World Wide Web (e.g. addressed is the constructs that were chosen.
David W. Miller
Perceived security and World books and music CD's). Indeed, when one Jarvenpaa and Todd (1997), for example,
Wide Web purchase intention looks at books in Amazon.com's Purchase suggest a wide range of possible salient
Industrial Management & Circles, over 100 universities are listed as beliefs about Web shopping. Future research
Data Systems generating sales for Amazon.com, and the should address other relevant constructs. It
101/4 [2001] 165±176
same is true for music CD's. To address the is likely that Web advertising will favorably
concern about lack of experience, leading to influence purchasing a company's products
compressed variance, first, we refer the through other avenues, not just over the
reader to our demographics, where the Web. In addition, we have not addressed the
answer to the question about previous issue of one's access to the Internet. Web-
gathering of information using the World based shopping is not especially relevant if
Wide Web was 4.83 (s.d. 1.53) on a seven point one cannot readily access the Internet.
scale, with seven indicating high experience. Finally, the measures created for this study
should undergo further refinement. It is clear
While the score for previous purchasing was
that more and different variables are needed
1.95 on a scale with seven indicating high
to fully understand Web-based shopping. It is
experience, the standard deviation was 1.49,
a relatively new phenomenon, and as such
which indicates that there is variance in the
may require additional rethinking of models
amount of experience with World Wide Web
used to explain its adoption.
shopping in our sample. As a final check to
Another avenue for research may be to
assess this concern about compressed address adoption of Web shopping within a
variance, we looked at the variances for each overall model about risk behavior (e.g. Sitkin
of the items. This analysis (Table XI) and Pablo, 1992). It is clear that for
indicates that we do have sufficient variance innovations that involve a greater degree of
in our data to identify effects. potential personal risk, other models besides
In the case of perceived usefulness and its the more traditional adoption diffusion
non-influence on intent to purchase, it is models may be appropriate.
clear that security is the driving influence in Another issue may be to assess different
purchasing products on the Web, and the demographic or geographic influences on
trade-off between this and the utility of Web Web shopping. Some studies have addressed
shopping is not perceived to be a good one. Web shopping perceptions in relatively
Still, it may be that the non-significant affluent and highly computer literate
relationship between perceived usefulness, samples (e.g. Jarvenpaa and Todd, 1997),
perceived ease of navigation and intent to while our sample was drawn from a
purchase could be because the relationship population that is predominantly rural.
between these and intent to purchase on the Would Web shopping be more or less likely to
Web is mediated by another construct, be adopted if it were necessary to drive a
perhaps an intent to gather information substantial distance to browse and purchase
on the Web. This may bear further products of interest? Further, are those more
investigation. familiar with computers, information
technology, and the Internet more or less
Table XI likely to be concerned about security? An
Item variances initial comparison of our findings and those
obtained by Jarvenpaa and Todd (1997) would
Std. indicate that this may be the case: Jarvenpaa
Item Min Max Mean dev. Variance and Todd found that the concerns about
eon1 1 7 5.70 1.44 2.08 personal risk were not as relevant to their
eon2 1 7 5.62 1.41 1.97 sample as the shopping experience. In our
eon3 1 7 5.65 1.48 2.18 sample we found the opposite, in that
eon4 1 7 5.76 1.48 2.19 shopping experience (operationalized as ease
use1 1 7 5.72 1.29 1.66 of navigation and usefulness) did not
use2 1 7 5.53 1.43 2.04 influence intent to purchase as much as did
use3 1 7 6.09 1.26 1.59 perceived security. While the difference
use4 1 7 5.98 1.34 1.80 between the research designs of the two
secure1 1 7 3.19 1.94 3.77 studies preclude drawing certain conclusions
secure2 1 7 3.06 1.84 3.39 about this, the need to investigate Web
secure3 1 7 2.92 1.87 3.51 shopping as it relates to a variety of
secure7 1 7 3.03 1.84 3.40 characteristics is clear.
While the causal model tested here is and
purch1 1 7 4.47 2.08 4.32
should be subject to further revision, the
purch2 1 7 4.34 1.99 3.96
primary goal of this paper has been met: we
purch3 1 7 4.37 1.97 3.87
have developed a scale that captures
[ 174 ]
W. David Salisbury, perceived Web security. Our scale has been J.S. (Eds.), Testing Structural Equation
Rodney A. Pearson, carefully tested and validated, and it Models, Sage, Thousand Oaks, CA, pp. 111-35.
Allison W. Pearson and provides a compact, 4-item instrument that Chin, W.W. and Gopal, A. (1995), ``Adoption
David W. Miller
Perceived security and World may be used for capturing this important intention in GSS: Relative importance of
Wide Web purchase intention construct. For theory and research to beliefs'', The Database for Advances in
Industrial Management & advance with respect to understanding Web Information Systems, Vol. 26 No. 2 and 3,
Data Systems shopping, efforts such as these must be pp. 42-64.
101/4 [2001] 165±176 Chin, W.W. and Newsted, P.R. (1993), ``On the
undertaken.
appropriate use and reporting of covariance-
Notes based structural equations models in
1 Items were eliminated for the present study information systems research: The case of
end-user computing satisfaction'', University
based on applicability to the context. For
of Calgary Working Paper No. WP 93-41.
example, for a non-work-related innovation
Chin, W.W. and Todd, P.R., (1995), ``On the use,
such as Web shopping, an item such as ``Using
usefulness, and ease of use of structural
(the innovation) would improve my
equation modeling in MIS research: a note of
performance``, was seen as not relevant, and
caution'', Management Information Systems
hence was not used.
Quarterly, Vol. 19 No. 2, pp. 237-46.
2 Perceived usefulness was used in this test to
Chin, W.W. Gopal, A. and Salisbury, W.D. (1997),
provide nough items to create an over
``Advancing the theory of adaptive
identified model.
structuration: the development of a scale to
measure faithfulness of appropriation'',
References Information Systems Research, Vol. 8 No. 4,
Adams, D.A., Nelson, R.R. and Todd, P.A. (1992), pp. 342-67.
``Perceived usefulness, ease of use and usage Cohen, J. (1988), Statistical Power Analysis for the
of information technology: A replication``,
Behavioral Sciences, Second Edition,
Management Information Systems Quarterly,
Lawrence Erlbaum, Hillsdale, NJ.
Vol. 16 No. 2, pp. 227-47.
Computer Security Canada, Inc. (1998), ``Media
Anderson, J. and Gerbing, D.W. (1991),
examples of security breaches'', available
``Predicting the performance of measures in a
online: http://www.csci.ca/breach.htm
confirmatory factor analysis with a pretest
Davis, F.D. (1989), ``Perceived usefulness,
assessment of their substantive validities'',
perceived ease of use, and user acceptance of
Journal of Applied Psychology, Vol. 76 No. 5,
information technology'', Management
pp. 732-40.
Information Systems Quarterly, Vol. 13 No. 3,
Ajzen, I. (1985), ``From intentions to actions: a
pp. 319-39.
theory of planned behavior'', in Kuhl, J. and
Davis, F.D., Bagozzi, R.P. and Warshaw, P.R.
Becaman, J. (Eds.), Action-control: From
(1989), ``User acceptance of computer
Cognition to Behavior, Springer, Heidelberg,
technology: a comparison of two theoretical
pp. 11-39.
models'', Management Science, Vol. 35 No. 8,
Ajzen, I. and Fishbein, M. (1980), Understanding
pp. 982-1003.
Attitudes and Predicting Social Behavior,
Fishbein, M. and Ajzen, I. (1975), Belief, Attitude,
Prentice-Hall, Englewood Cliffs, NJ.
Arbuckle, J. (1999), AMOS 4.0 User's Guide, Intention and Behavior: an Introduction to
SmallWaters Corporation, Chicago, IL. Theory and Research, Addison-Wesley,
Bagozzi, R.P. and Yi, Y. (1988), ``On the evaluation Reading, MA.
of structural equation models'', Journal of the Hendrickson, A.R., Massey, P.D. and Cronan, T.P.
Academy of Marketing Science, Vol. 16, (1993), ``On the test-retest reliability of
pp. 74-94. perceived usefulness and perceived ease of
Bentler, P.M. (1990), ``Comparative fit indexes in use scales'', Management Information Systems
structural models'', Psychological Bulletin, Quarterly, Vol. 17 No. 2, pp. 227-30.
Vol. 107, pp. 238-46. Hoyle, R.H. and Panter, A.T. (1995), ``Writing
Bentler, P.M. and Bonnett, D.G. (1980), about structural equations models'', in Hoyle,
``Significance tests and goodness of fit in the R.H. (Ed.), Structural Equation Modeling:
analysis of covariance structures'', Concepts, Issues, and Applications, Sage,
Psychological Bulletin, Vol. 88, pp. 588-606. Thousand Oaks, CA, pp. 158-76.
Blair, T. (1997), ``Borderless buying: the net lets Hu, L.-T., and Bentler, P.M. (1995), ``Evaluating
consumers import their own culture'', Time, model fit'', in Hoyle R.H. (Ed.), Structural
available online: http://pathfinder.com/time/ Equation Modeling: Concepts, Issues, and
magazine/199/the_arts_publ.borderless.bu.html Applications, Sage, Thousand Oaks, CA,
Bollen, K.A. (1986), ``Sample size and Bentler and pp. 76-99.
Bonnet's nonnormed fit index'', International Data Corporation (1999a), ``Internet
Psychometrika, Vol. 51, pp. 375-77. commerce will rocket to more than $1 trillion
Bollen, K.A. (1989), Structural Equations with by 2003'', available online: http://
Latent Variables, Wiley, New York, NY. www.idc.com/Data/Internet/content/
Bollen, K.A. and Stine, R.A. (1992), ``Bootstrapping NET062899PR.htm
goodness-of-fit measures in structural International Data Corporation (1999b), ``Banks
equation models'', in Bollen, K.A. and Long, cash in on the online craze'', available online:

[ 175 ]
W. David Salisbury, http://www.idc.com/Data/Internet/content/ Rogers, E.M., (1995), Diffusion of Innovations,
Rodney A. Pearson, NET060199PR.htm Fourth Edition, The Free Press, New York,
Allison W. Pearson and Jarvenpaa, S.L. and Todd, P.A. (1997), ``Consumer NY.
David W. Miller reactions to electronic shopping on the World Saris, W.E., and Stronkhorst, L.H. (1984), Causal
Perceived security and World
Wide Web purchase intention Wide Web'', International Journal of Modeling in Nonexperimental Research: An
Electronic Commerce, Vol. 1 No. 2, pp. 59-88. Introduction to the LISREL Approach,
Industrial Management &
Data Systems Joreskog, K.G. and Sorbom, D. (1988), ``LISREL 7: Sociometric Research Foundation,
101/4 [2001] 165±176 a guide to the program and applications'', Amsterdam.
SPSS Inc, Chicago, IL. Sitkin, S.B., and Pablo, A.L. (1992),
Kahneman, D. and Tversky, A. (1979), ``Prospect ``Reconceptualizing the determinants of risk
theory: an analysis of decision under risk'', behavior'', Academy of Management Review,
Econometrica, Vol. 47, pp. 263-91. Vol. 17 No. 1, pp. 9-38.
Long, J.S. (1983), Covariance Structure Models: An Stine, R.A. (1989), ``An introduction to bootstrap
Introduction to LISREL, Sage University methods: Examples and ideas'', Sociological
Paper No. 07-034, Sage, Newbury Park, CA. Methods and Research, Vol. 18, pp. 243-91.
McDonald, R.P. and Marsh, H.W. (1990), Szajna, B. (1994), ``Software evaluation and choice:
``Choosing a multivariate model: predictive validation of the technology
noncentrality and goodness of fit'', acceptance instrument'', Management
Psychological Bulletin, Vol. 107 No. 2, Information Systems Quarterly, Vol. 18 No. 4,
pp. 247-55. pp. 319-24.
March, J.G. (1978), ``Bounded rationality, Tucker, L.R. and Lewis, C. (1973), ``A reliability
ambiguity, and the engineering of choice'', coefficient for maximum likelihood factor
Bell Journal of Economics, Vol. 9, pp. 587-608. analysis'', Psychometrika, Vol. 38, pp. 1-10.
Moore, G.C. (1987), ``End user computing and Vleck, C. and Stallen, P.J. (1980), ``Rational and
office automation: a diffusion of innovations personal aspects of risk'', Acta Psychologica,
perspective'', INFOR, February, pp. 214-35. Vol. 45, pp. 273-300.
Moore, G.C. and Benbasat, I. (1991) ``Development Wheaton, B., Muthen, B., Alwin, D. and Summers
of an instrument to measure the perceptions G. (1977), ``Assessing reliability and stability
of adopting an information technology in panel models'', in Heise D. (Ed.),
innovation'', Information Systems Research, Sociological Methodology, Jossey-Bass, San
Vol. 2 No. 3, pp. 192-222. Francisco, CA, pp. 84-136.

Appendix

Table AI
Covariance matrix for confirmation data set
eon1 2.074
eon2 1.753 1.967
eon3 1.797 1.784 2.173
eon4 1.881 1.826 1.955 2.183
purch1 0.341 0.471 0.497 0.41 4.304
purch2 0.263 0.366 0.337 0.295 3.666 3.948
purch3 0.474 0.485 0.53 0.485 3.359 3.332 3.854
secure1 0.238 0.321 0.407 0.243 1.365 1.279 1.487 3.751
secure2 0.277 0.317 0.336 0.203 1.223 1.266 1.355 3.001 3.38
secure3 0.245 0.314 0.379 0.206 1.231 1.201 1.346 2.904 2.827 3.496
secure7 0.167 0.348 0.383 0.261 1.293 1.27 1.344 2.571 2.429 2.631 3.39
use1 0.863 0.907 0.918 0.906 0.51 0.296 0.439 0.278 0.221 0.172 0.23 1.655
use2 0.761 0.662 0.647 0.664 0.468 0.319 0.469 0.351 0.41 0.295 0.209 1.236 2.036
use3 0.88 0.883 0.865 0.871 0.564 0.457 0.434 0.256 0.3 0.098 0.072 1.099 1.278 1.581
use4 0.815 0.853 0.853 0.809 0.462 0.293 0.412 0.4 0.361 0.279 0.246 1.191 1.376 1.393 1.794
eon1 eon2 eon3 eon4 purch1 purch2 purch3 secure1 secure2 secure3 secure7 use1 use2 use3 use4

[ 176 ]

You might also like