Determinants of intention to use e-wallet in Generation Z

Authors

  • Safitri Dwi Rahmadhani Universitas Negeri Jakarta
  • Agung Dharmawan Buchdadi Universitas Negeri Jakarta
  • Muhammad Fawaiq Universitas Negeri Jakarta
  • Budi Agung Prasetya Universitas Negeri Jakarta

DOI:

https://doi.org/10.26740/bisma.v15n1.p60-77

Keywords:

E-wallet, Generation Z, Technology Acceptance Model, Perceived Security, Social Influence

Abstract

Generation Z, as true digital natives or generations born and raised with the internet, is familiar with digital products. One digital product is an e-wallet used as an online payment method. This study aims to discover the factors that influence behavioural intention to use e-wallets in generation Z that use an e-wallet and live in Greater Jakarta. The theoretical basis of this study is the Technology Acceptance Model (TAM), where the variables involved are behavioural intention to use, perceived ease of use, and perceived usefulness, and two other factors, i.e., perceived security and social influence. A total of 245 respondents were collected by online survey and analysed with Structural Equation Modelling (SEM). This study finds that social influence affects perceived ease of use positively and significantly. Perceived ease of use influences perceived usefulness positively and significantly. Perceived ease of use and perceived usefulness positively influence behavioural intention to use. However, social influence does not influence perceived usefulness, and perceived security does not influence behavioural intention to use. This study's originality resides in its examination of reported ease of use and perceived usefulness as mediating variables of social influence on Generation Z's propensity to use e-wallets.

References

APJII. (2018). Potret Zaman Now Pengguna dan Perilaku Internet Indonesia!. Retrived June 14, 2022, from https://apjii.or.id/downfile/file/BULETINAPJIIEDISI23April2018.pdf.

APJII. (2020). Laporan survei internet APJII 2019-2020 (Q2). Retrieved June 18, 2022, from https://apjii.or.id/content/read/39/521/Laporan-Survei-Internet-APJII-2019-2020-Q2.

National Cyber and Crypto Agency. (2021). Laporan Tahunan Monitoring Keamanan Siber Tahun 2021. Retrived May 25, 2022, from https://cloud.bssn.go.id/s/Lyw8E4LxwNiJoNw.

Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52. https://doi.org/10.1016/j.ijinfomgt.2019.102063.

Bank Indonesia. (2016). Peraturan Bank Indonesia Nomor 18/40/PBI/2016 tentang Penyelenggaraan Pemrosesan Transaksi Pembayaran. Retrieved May 15, 2022, from https://www.bi.go.id/id/publikasi/peraturan/Pages/pbi_184016.aspx.

Bank Indonesia. (2019). Publikasi Laporan Perekonomian Indonesia. Retrieved May 15, 2022, from https://www.bi.go.id/id/publikasi/laporan/Pages/LPI_2019.aspx.

Bank Indonesia. (2021). The Red Book Statistics. Retrieved May 15, 2022, from https://www.bi.go.id/id/statistik/ekonomi-keuangan/red-book-statistics/Pages/the-red-book-statistics-2020.aspx.

Choi, M. J., Lee, S.-J., Lee, S. J., Rho, M. J., Kim, D.-J., & Choi, I. Y. (2021). Behavioral intention to use a smartphone usage management application between a non- problematic smartphone use group and a problematic use group. Frontiers in Psychiatry, 12, 571795. https://doi.org/10.3389/fpsyt.2021.571795.

F5 Labs. (2017). Lessons Learned from a Decade of Data Breaches. Retrieved June, 5, 2022, from https://www.f5.com/labs/articles/threat-intelligence/lessons-learned-from-a-decade-of-data-breaches-29035.

GlobalWebIndex. (2019). The Youth of the Nations: Global Trends Among Gen Z. Retrieved June 2, 2022, from https://www.gwi.com/reports/global-trends-among-gen-z.

Hair, J.F., Celsi, M. W., Money, A. H., Samouel, P., & Page, M. J. (2015). Essentials of business research methods. Taylor & Francis Group.

Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2018). Multivariate data analysis (Eight). Cengage.

IDADX. (2022). Indonesia anti-phishing data exchange Periode Q1 2022. Retrieved April 3, 2022, from https://idadx.id/files/Q1_2022.pdf.

Internet Crime Complain Center. (2021). Internet Crime Report. Federal Bureau of Investigation. Retrieved June 7, 2022, from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf.

IPSOS. (2019). The Evolution of the Digital Wallet: Driving the Next Wave of Growth. Retrieved April 17, 2022, from https://www.ipsos.com/sites/default/files/ct/news/documents/2020-02/ipsos_media_conference_-_e-wallet-_en_0.pdf.

Thakkar, J. J. (2020). Structural equation modelling: application for research and practice (with AMOS and R). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-15-3793-6.

V?rzaru, A. A., Bocean, C. G., Rotea, C. C., & Budic?-Iacob, A.-F. (2021). Assessing antecedents of behavioral intention to use mobile technologies in e-commerce. Electronics, 10(18), 2231. https://doi.org/10.3390/electronics10182231.

Western Governors University. (2019). Who is gen Z and how will they impact the workplace?. Retrieved April 28, 2022, from https://www.wgu.edu/blog/who-is-gen-z-how-they-impact-workplace1906.html.

Downloads

Published

2023-05-31

How to Cite

Rahmadhani, S. D., Buchdadi, A. D., Fawaiq, M., & Prasetya, B. A. . (2023). Determinants of intention to use e-wallet in Generation Z. BISMA (Bisnis Dan Manajemen), 15(1), 60–77. https://doi.org/10.26740/bisma.v15n1.p60-77

Issue

Section

Articles
Abstract views: 2712 , PDF Downloads: 2380