Consumers' willingness to adopt and use WeChat wallet: An empirical study in South Africa

Abstract For decades, the technology acceptance model (TAM) has been validated by studies to discern its predictive power. However, scholars have noted that the assumptions in TAM can incomprehensively address the demands of people in modern technologies. The current study, therefore, extends the capabilities of TAM to predict the acceptance levels of the people-to-people (P2P) services of the WeChat wallet in South Africa. The findings show that, in addition to the constructs in TAM, other pivotal factors that influence the behavior of South Africans to adopt WeChat wallet are trust, security, and privacy. Using the structural equation modeling tool for analysis, we found that the proposed model explains acceptable variances in the predictors: 51%, 25%, and 21% in relative advantage or perceived usefulness as used in TAM, privacy, and P2P, respectively, an evidence that may stimulate scholarly discussions in the future. These findings highlight that people in South Africa may adopt and use the WeChat wallet application if the proposed predictors are considered.

[1]  R. P. Sundarraj,et al.  Using information-systems constructs to study online- and telephone-banking technologies , 2005, Electron. Commer. Res. Appl..

[2]  H. Hasan,et al.  Toward a model for the acceptance of Internet banking in developing countries , 2005 .

[3]  Alfred Presbitero,et al.  Expatriate career intentions: Links to career adaptability and cultural intelligence , 2017 .

[4]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[5]  Dong-Hee Shin,et al.  Towards an understanding of the consumer acceptance of mobile wallet , 2009, Comput. Hum. Behav..

[6]  Xiaohui Chen,et al.  Continuance intention to use MOOCs: Integrating the technology acceptance model (TAM) and task technology fit (TTF) model , 2017, Comput. Hum. Behav..

[7]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[8]  Matthew K. O. Lee,et al.  A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..

[9]  Ejaz Ahmed,et al.  Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios , 2016, Comput. Hum. Behav..

[10]  Yong Liu,et al.  Understanding perceived risks in mobile payment acceptance , 2015, Ind. Manag. Data Syst..

[11]  R. P. McDonald,et al.  Principles and practice in reporting structural equation analyses. , 2002, Psychological methods.

[12]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[13]  Gerhard P. Hancke,et al.  Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.

[14]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[15]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[16]  R. Mason Four ethical issues of the information age , 1986 .

[17]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[18]  Kim K. P. Johnson,et al.  Consumer adoption of smart in-store technology: assessing the predictive value of attitude versus beliefs in the technology acceptance model , 2017 .

[19]  H. Harman Modern factor analysis , 1961 .

[20]  Agnes L. DeFranco,et al.  It's about time: Revisiting UTAUT2 to examine consumers’ intentions to use NFC mobile payments in hotels , 2016 .

[21]  Naresh K. Malhotra,et al.  Common Method Variance in Advertising Research: When to Be Concerned and How to Control for It , 2017 .

[22]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[23]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[24]  Hye-Young Yoon,et al.  User Acceptance of Mobile Library Applications in Academic Libraries: An Application of the Technology Acceptance Model , 2016 .

[25]  Peter Lynn,et al.  The problem of nonresponse , 2008 .

[26]  P. Bentler,et al.  Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .

[27]  Marc J. Dupuis,et al.  "I Got the Job!": An exploratory study examining the psychological factors related to status updates on facebook , 2017, Comput. Hum. Behav..

[28]  E. McKinney,et al.  Extending the Technology Acceptance Model Extending the Technology Acceptance Model and the Task and the Task-Technology Fit Model to Technology Fit Model to Consumer E Consumer E- -Commerce Commerce , 2004 .

[29]  Ming-Chi Lee,et al.  Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , 2009, Electron. Commer. Res. Appl..

[30]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[31]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[32]  Elena Karahanna,et al.  The Relative Advantage of Electronic Channels: A Multidimensional View , 2008, MIS Q..

[33]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[34]  Chiung-Ju Liang,et al.  How managers in the financial services industry ensure financial performance , 2008 .

[35]  Lin Du,et al.  Forensic analysis of WeChat on Android smartphones , 2017, Digit. Investig..

[36]  Xu Chen,et al.  Adult attachment and profile images on Chinese social networking sites: A comparative analysis of Sina Weibo and WeChat , 2017, Comput. Hum. Behav..

[37]  Henry H. Emurian,et al.  Trust in E-Commerce: Consideration of Interface Design Factors , 2005, J. Electron. Commer. Organ..

[38]  Sujeet Kumar Sharma,et al.  Structural equation model (SEM)-neural network (NN) model for predicting quality determinants of e-learning management systems , 2017, Behav. Inf. Technol..

[39]  T. C. Edwin Cheng,et al.  Adoption of internet banking: An empirical study in Hong Kong , 2006, Decis. Support Syst..

[40]  Yang Cao,et al.  Examining WeChat users' motivations, trust, attitudes, and positive word-of-mouth: Evidence from China , 2014, Comput. Hum. Behav..

[41]  P. Bentler,et al.  Comparative fit indexes in structural models. , 1990, Psychological bulletin.

[42]  Qi Kang,et al.  Applications of Mobile Social Media: WeChat Among Academic Libraries in China , 2015 .

[43]  Ankit Kesharwani,et al.  The impact of trust and perceived risk on internet banking adoption in India : An extension of technology acceptance model , 2022 .

[44]  Henry H. Emurian,et al.  An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..

[45]  B. Byrne Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[46]  Shih-Ming Pi,et al.  Factors That Affect Consumers’ Trust and Continuous Adoption of Online Financial Services , 2012 .

[47]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[48]  A. Parasuraman,et al.  The Behavioral Consequences of Service Quality , 1996 .

[49]  M. Browne,et al.  Alternative Ways of Assessing Model Fit , 1992 .

[50]  Thamaraiselvan Natarajan,et al.  Understanding the intention to use mobile shopping applications and its influence on price sensitivity , 2017 .

[51]  Juan Sánchez-Fernández,et al.  Antecedents of the adoption of the new mobile payment systems: The moderating effect of age , 2014, Comput. Hum. Behav..

[52]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[53]  Devon S. Johnson,et al.  Cognitive and affective trust in service relationships , 2005 .

[54]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[55]  Ing-Long Wu,et al.  An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study , 2005, Int. J. Hum. Comput. Stud..

[56]  Juan Sánchez-Fernández,et al.  The moderating effect of experience in the adoption of mobile payment tools in Virtual Social Networks: The m-Payment Acceptance Model in Virtual Social Networks (MPAM-VSN) , 2014, Int. J. Inf. Manag..

[57]  David Gefen,et al.  TAM or Just Plain Habit: A Look at Experienced Online Shoppers , 2003, J. Organ. End User Comput..

[58]  Mark H. Hansen,et al.  The Cognitive and Affective Antecedents of General Trust within Cooperative Organizations , 2004 .

[59]  Chin-Lung Hsu,et al.  What drives purchase intention for paid mobile apps? - An expectation confirmation model with perceived value , 2015, Electron. Commer. Res. Appl..

[60]  Eunil Park,et al.  An Integrated Adoption Model of Mobile Cloud Services: Exploration of Key Determinants and Extension of Technology Acceptance Model , 2014, Telematics Informatics.

[61]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[62]  Sumiani Yusoff,et al.  Renewable energy technology acceptance in Peninsular Malaysia , 2016 .

[63]  Patrick D. McDaniel,et al.  On lightweight mobile phone application certification , 2009, CCS.

[64]  V. Daniel R. Guide,et al.  Notes from the Editors: Redefining some methodological criteria for the journal ☆ , 2015 .

[65]  Gi Mun Kim,et al.  Understanding dynamics between initial trust and usage intentions of mobile banking , 2009, Inf. Syst. J..

[66]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[67]  Linda G. Wallace,et al.  The adoption of software measures: A technology acceptance model (TAM) perspective , 2014, Inf. Manag..

[68]  Shalini Chandra,et al.  of the Association , 2018 .

[69]  Albert H. Segars,et al.  Re-examining perceived ease of use and usefulness , 1993 .

[70]  E. Rogers Diffusion of Innovations , 1962 .

[71]  Sujeet Kumar Sharma,et al.  Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling , 2017, Information Systems Frontiers.

[72]  Harries Arizonia Ismail Intention to Use Smartphone through Perceived Compatibility, Perceived Usefulness, and Perceived Ease of Use , 2016 .

[73]  Tiago Oliveira,et al.  Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..

[74]  Chunhua Ju,et al.  Relationship strength estimation based on Wechat Friends Circle , 2017, Neurocomputing.

[75]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[76]  C. Lance,et al.  The Sources of Four Commonly Reported Cutoff Criteria , 2006 .

[77]  K. Williamson,et al.  Understanding Consumer Adoption of Internet Banking: An Interpretive Study in the Australian Banking Context , 2006 .

[78]  Tiago Oliveira,et al.  Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators , 2015, Comput. Hum. Behav..

[79]  Giovanni Mattia,et al.  The Integrated Model on Mobile Payment Acceptance (IMMPA): An empirical application to public transport , 2015 .

[80]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[81]  Mark R. Lehto,et al.  User acceptance of YouTube for procedural learning: An extension of the Technology Acceptance Model , 2013, Comput. Educ..

[82]  Stephen G. West,et al.  Structural equation models with non-normal variables: Problems and remedies , 1995 .

[83]  Nathalie T. M. Demoulin,et al.  Adoption of in-store mobile payment: Are perceived risk and convenience the only drivers? , 2016 .

[84]  Christie M. Fuller,et al.  Common methods variance detection in business research , 2016 .

[85]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[86]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[87]  Wadie Nasri,et al.  Factors affecting the adoption of Internet banking in Tunisia: An integration theory of acceptance model and theory of planned behavior , 2012 .

[88]  Himanshu Sharma,et al.  A multi-analytical approach to predict the Facebook usage in higher education , 2016, Comput. Hum. Behav..

[89]  Jen-Her Wu,et al.  What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model , 2005, Inf. Manag..

[90]  J. Hair Multivariate data analysis : a global perspective , 2010 .

[91]  In Lee,et al.  An empirical examination of factors influencing the intention to use mobile payment , 2010, Comput. Hum. Behav..

[92]  Ibrahim Arpaci,et al.  Effects of security and privacy concerns on educational use of cloud services , 2015, Comput. Hum. Behav..

[93]  I. Ajzen The theory of planned behavior , 1991 .

[94]  A. Bandura Self-efficacy mechanism in human agency , 2024, Psihologìâ ì suspìlʹstvo.