Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users

Cybercrime is a pervasive threat for today’s Internet-dependent society. While the real extent and economic impact is hard to quantify, scientists and officials agree that cybercrime is a huge and still growing problem. A substantial fraction of cybercrime’s overall costs to society can be traced to indirect opportunity costs, resulting from unused online services. This paper presents a theoretically derived model that utilizes technology acceptance research and insights from Criminology to identify factors that reduce Internet users’ intention to use online services. We hypothesize that avoidance of online banking, online shopping and online social networking is increased by prior cybercrime victimization and media reports. The effects are mediated by perceived risk of cybercrime and moderated by the user’s confidence online. We test our hypotheses using a structural equation modeling analysis of a representative pan-European sample. Our empirical results confirm the ∗Corresponding author.

[1]  Eric T. G. Wang,et al.  Understanding customers' repeat purchase intentions in B2C e‐commerce: the roles of utilitarian value, hedonic value and perceived risk , 2014, Inf. Syst. J..

[2]  Qing Hu,et al.  User behaviour towards protective information technologies: the role of national cultural differences , 2009, Inf. Syst. J..

[3]  Mike Z. Yao,et al.  Predicting Self-Protections of Online Privacy , 2008, Cyberpsychology Behav. Soc. Netw..

[4]  S. Finney Nonnormal and categorical data in structural equation modeling , 2013 .

[5]  Ross J. Anderson,et al.  The Economics of Online Crime , 2009 .

[6]  Yong-Hui Li,et al.  Applying Theory of Perceived Risk and Technology Acceptance Model in the Online Shopping Channel , 2009 .

[7]  Jonathan Jackson,et al.  Revisiting Risk Sensitivity in the Fear of Crime , 2011 .

[8]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[9]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[10]  Tyler Moore,et al.  How do consumers react to cybercrime? , 2012, 2012 eCrime Researchers Summit.

[11]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[12]  Xianggui Qu,et al.  Multivariate Data Analysis , 2007, Technometrics.

[13]  Ohbyung Kwon,et al.  An empirical study of the factors affecting social network service use , 2010, Comput. Hum. Behav..

[14]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[15]  B. Muthén,et al.  Robust inference using weighted least squares and quadratic estimating equations in latent variable modeling with categorical and continuous outcomes , 1997 .

[16]  L. Roberts,et al.  Applying the Theory of Planned Behaviour to predicting online safety behaviour , 2013 .

[17]  Erik Brynjolfsson,et al.  The Contribution of Information Technology to Consumer Welfare , 1996, Inf. Syst. Res..

[18]  María-del-Carmen Alarcón-del-Amo,et al.  Adoption of social networking sites by Italian , 2013, Information Systems and e-Business Management.

[19]  Vincent S. Lai,et al.  Literature derived reference models for the adoption of online shopping , 2005, Inf. Manag..

[20]  Yongbing Jiao,et al.  A Study of the Impact of Social Media Characteristics on Customer Adoption Intention of Social Media , 2013 .

[21]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[22]  Anthony D. Miyazaki,et al.  Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility , 2010 .

[23]  Kevin Grant,et al.  Big TAM in Oman: Exploring the promise of on-line banking, its adoption by customers and the challenges of banking in Oman , 2012, Int. J. Inf. Manag..

[24]  Wesley G. Skogan,et al.  The Impact of Victimization on Fear , 1987 .

[25]  S. Tan Strategies for reducing consumers’ risk aversion in Internet shopping , 1999 .

[26]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[27]  W. H. Rodgers Consumer behavior as risk taking; a new model and new hypotheses. , 1969 .

[28]  Khaled M. S. Faqih,et al.  Integrating perceived risk and trust with technology acceptance model: An empirical assessment of customers' acceptance of online shopping in Jordan , 2011, 2011 International Conference on Research and Innovation in Information Systems.

[29]  Tom R. Tyler,et al.  Assessing the Risk of Crime Victimization: The Integration of Personal Victimization Experience and Socially Transmitted Information , 1984 .

[30]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[31]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[32]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[33]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[34]  Daniel Battu,et al.  Measuring the Information Society (11 October 2012) - ITU , 2016 .

[35]  A. Wåhlberg,et al.  Risk perception and the media , 2000 .

[36]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[37]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .

[38]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[39]  Marijn Scholte,et al.  Fear of Crime and Feelings of Unsafety in European Countries: Macro and Micro Explanations in Cross-National Perspective , 2013 .

[40]  K. Ferraro,et al.  The Measurement of Fear of Crime , 1987 .

[41]  Hsiu-Fen Lin,et al.  Understanding Behavioral Intention to Participate in Virtual Communities , 2006, Cyberpsychology Behav. Soc. Netw..

[42]  Erik Brynjolfsson,et al.  Consumer Surplus in the Digital Economy: Estimating the Value of Increased Product Variety at Online Booksellers , 2003, Manag. Sci..

[43]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[44]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[45]  Kenneth Saban,et al.  A Critical Look at the Impact of Cybercrime on Consumer Internet Behavior , 2002 .

[46]  Dong-Hee Shin,et al.  Applying the Technology Acceptance Model and Flow Theory to Cyworld User Behavior: Implication of the Web2.0 User Acceptance , 2008, Cyberpsychology Behav. Soc. Netw..

[47]  T. C. Edwin Cheng,et al.  Adoption of internet banking: An empirical study in Hong Kong , 2006, Decis. Support Syst..

[48]  Tobias Kretschmer,et al.  ICT and productivity: conclusions from the empirical literature , 2013, Inf. Econ. Policy.

[49]  B. Byrne,et al.  Testing for the equivalence of factor covariance and mean structures: The issue of partial measurement invariance. , 1989 .

[50]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[51]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[52]  Edmund F. McGarrell,et al.  Neighborhood disorder, integration, and the fear of crime , 1997 .

[53]  Cormac Herley,et al.  Sex, Lies and Cyber-Crime Surveys , 2011, WEIS.

[54]  Laura M. Stapleton,et al.  An Assessment of Practical Solutions for Structural Equation Modeling with Complex Sample Data , 2006 .

[55]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[56]  Lina Zhou,et al.  ONLINE SHOPPING ACCEPTANCE MODEL — A CRITICAL SURVEY OF CONSUMER FACTORS IN ONLINE SHOPPING , 2007 .

[57]  Ming-Chi Lee,et al.  Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , 2009, Electron. Commer. Res. Appl..

[58]  A. Soares,et al.  Examining the Technology Acceptance Model in the Adoption of Social Ne tworks , 2011 .

[59]  Nils Urbach,et al.  Structural Equation Modeling in Information Systems Research Using Partial Least Squares , 2010 .

[60]  C. Keane Victimization and fear: Assessing the role of offender and offence , 1995 .

[61]  Ingoo Han,et al.  Effect of trust on customer acceptance of Internet banking , 2002, Electron. Commer. Res. Appl..

[62]  Marc Gertz,et al.  FEAR, TV NEWS, AND THE REALITY OF CRIME* , 2000 .

[63]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[64]  Tiago Oliveira,et al.  Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application , 2014, Int. J. Inf. Manag..

[65]  Roger E. Millsap,et al.  Assessing Factorial Invariance in Ordered-Categorical Measures , 2004 .

[66]  H. Zandhessami,et al.  Determinants of user acceptance of internet banking: An empirical study , 2014 .

[67]  George H. Polychronopoulos,et al.  An extension of TAM model with IDT and security/privacy risk in the adoption of internet banking services in Greece , 2012 .

[68]  Tihomir Asparouhov,et al.  Sampling Weights in Latent Variable Modeling , 2005 .

[69]  Izak Benbasat,et al.  Integrating Diffusion of Innovations and Theory of Reasoned Action models to predict utilization of information technology by end-users , 1996 .

[70]  David C. May,et al.  AN EMPIRICAL ASSESSMENT OF THE “THREAT OF VICTIMIZATION:” CONSIDERING FEAR OF CRIME, PERCEIVED RISK, AVOIDANCE, AND DEFENSIVE BEHAVIORS , 2007 .

[71]  A. Liska,et al.  Fear of Crime and Constrained Behavior Specifying and Estimating a Reciprocal Effects Model , 1988 .

[72]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[73]  Linda Heath,et al.  Mass Media and Fear of Crime , 1996 .

[74]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[75]  Hamed Qahri Saremi,et al.  Factors Affecting Internet Banking Pre-usage Expectation Formation , 2013, 2013 46th Hawaii International Conference on System Sciences.

[76]  Javier Huerta Bravo,et al.  DIGITAL AGENDA FOR EUROPE , 2011 .

[77]  I. Ajzen The theory of planned behavior , 1991 .

[78]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[79]  Yair Amichai-Hamburger,et al.  The impact of the Internet on the social lives of users: A representative sample from 13 countries , 2011, Comput. Hum. Behav..

[80]  Alan D. Smith,et al.  Cybercriminal impacts on online business and consumer confidence , 2004, Online Inf. Rev..

[81]  M. S. Cunningham The Major Dimensions of Perceived Risk , 1967 .

[82]  A. Liska,et al.  Feeling Safe by Comparison: Crime in the Newspapers , 1990 .

[83]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[84]  Ingoo Han,et al.  E of trust on customer acceptance of Internet banking , 2002 .

[85]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[86]  C. Hale,et al.  Fear of Crime: A Review of the Literature1 , 1996 .

[87]  Phillip W. Braddy,et al.  Power and sensitivity of alternative fit indices in tests of measurement invariance. , 2008, The Journal of applied psychology.

[88]  Paul Hunton,et al.  The growing phenomenon of crime and the internet: A cybercrime execution and analysis model , 2009, Comput. Law Secur. Rev..

[89]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[90]  Payam Hanafizadeh,et al.  A systematic review of Internet banking adoption , 2014, Telematics Informatics.

[91]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[92]  Marianne Junger,et al.  Trends in violent crime: a comparison between police statistics and victimization surveys , 2002 .

[93]  Allison T. Chappell,et al.  Fear of Crime Revisited: Examining the Direct and Indirect Effects of Disorder, Risk Perception, and Social Capital , 2011 .

[94]  Gordon R. Foxall,et al.  Technology acceptance: a meta‐analysis of the TAM: Part 1 , 2007 .

[95]  Hsi-Peng Lu,et al.  Why people use social networking sites: An empirical study integrating network externalities and motivation theory , 2011, Comput. Hum. Behav..

[96]  R. Sickles,et al.  An International Comparison of Technology Adoption and Efficiency: A Dynamic Panel Model , 1999 .

[97]  M. Marmot,et al.  Association between fear of crime and mental health and physical functioning. , 2007, American journal of public health.

[98]  D. Straub,et al.  A CRITICAL LOOK AT THE USE OF PLS-SEM IN MISQ , 2012 .