Determinants of intention to use e-wallet in Generation Z
DOI:
https://doi.org/10.26740/bisma.v15n1.p60-77Keywords:
E-wallet, Generation Z, Technology Acceptance Model, Perceived Security, Social InfluenceAbstract
Generation Z, as true digital natives or generations born and raised with the internet, is familiar with digital products. One digital product is an e-wallet used as an online payment method. This study aims to discover the factors that influence behavioural intention to use e-wallets in generation Z that use an e-wallet and live in Greater Jakarta. The theoretical basis of this study is the Technology Acceptance Model (TAM), where the variables involved are behavioural intention to use, perceived ease of use, and perceived usefulness, and two other factors, i.e., perceived security and social influence. A total of 245 respondents were collected by online survey and analysed with Structural Equation Modelling (SEM). This study finds that social influence affects perceived ease of use positively and significantly. Perceived ease of use influences perceived usefulness positively and significantly. Perceived ease of use and perceived usefulness positively influence behavioural intention to use. However, social influence does not influence perceived usefulness, and perceived security does not influence behavioural intention to use. This study's originality resides in its examination of reported ease of use and perceived usefulness as mediating variables of social influence on Generation Z's propensity to use e-wallets.
References
APJII. (2018). Potret Zaman Now Pengguna dan Perilaku Internet Indonesia!. Retrived June 14, 2022, from https://apjii.or.id/downfile/file/BULETINAPJIIEDISI23April2018.pdf.
APJII. (2020). Laporan survei internet APJII 2019-2020 (Q2). Retrieved June 18, 2022, from https://apjii.or.id/content/read/39/521/Laporan-Survei-Internet-APJII-2019-2020-Q2.
National Cyber and Crypto Agency. (2021). Laporan Tahunan Monitoring Keamanan Siber Tahun 2021. Retrived May 25, 2022, from https://cloud.bssn.go.id/s/Lyw8E4LxwNiJoNw.
Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52. https://doi.org/10.1016/j.ijinfomgt.2019.102063.
Bank Indonesia. (2016). Peraturan Bank Indonesia Nomor 18/40/PBI/2016 tentang Penyelenggaraan Pemrosesan Transaksi Pembayaran. Retrieved May 15, 2022, from https://www.bi.go.id/id/publikasi/peraturan/Pages/pbi_184016.aspx.
Bank Indonesia. (2019). Publikasi Laporan Perekonomian Indonesia. Retrieved May 15, 2022, from https://www.bi.go.id/id/publikasi/laporan/Pages/LPI_2019.aspx.
Bank Indonesia. (2021). The Red Book Statistics. Retrieved May 15, 2022, from https://www.bi.go.id/id/statistik/ekonomi-keuangan/red-book-statistics/Pages/the-red-book-statistics-2020.aspx.
Choi, M. J., Lee, S.-J., Lee, S. J., Rho, M. J., Kim, D.-J., & Choi, I. Y. (2021). Behavioral intention to use a smartphone usage management application between a non- problematic smartphone use group and a problematic use group. Frontiers in Psychiatry, 12, 571795. https://doi.org/10.3389/fpsyt.2021.571795.
F5 Labs. (2017). Lessons Learned from a Decade of Data Breaches. Retrieved June, 5, 2022, from https://www.f5.com/labs/articles/threat-intelligence/lessons-learned-from-a-decade-of-data-breaches-29035.
GlobalWebIndex. (2019). The Youth of the Nations: Global Trends Among Gen Z. Retrieved June 2, 2022, from https://www.gwi.com/reports/global-trends-among-gen-z.
Hair, J.F., Celsi, M. W., Money, A. H., Samouel, P., & Page, M. J. (2015). Essentials of business research methods. Taylor & Francis Group.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2018). Multivariate data analysis (Eight). Cengage.
IDADX. (2022). Indonesia anti-phishing data exchange Periode Q1 2022. Retrieved April 3, 2022, from https://idadx.id/files/Q1_2022.pdf.
Internet Crime Complain Center. (2021). Internet Crime Report. Federal Bureau of Investigation. Retrieved June 7, 2022, from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf.
IPSOS. (2019). The Evolution of the Digital Wallet: Driving the Next Wave of Growth. Retrieved April 17, 2022, from https://www.ipsos.com/sites/default/files/ct/news/documents/2020-02/ipsos_media_conference_-_e-wallet-_en_0.pdf.
Thakkar, J. J. (2020). Structural equation modelling: application for research and practice (with AMOS and R). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-15-3793-6.
V?rzaru, A. A., Bocean, C. G., Rotea, C. C., & Budic?-Iacob, A.-F. (2021). Assessing antecedents of behavioral intention to use mobile technologies in e-commerce. Electronics, 10(18), 2231. https://doi.org/10.3390/electronics10182231.
Western Governors University. (2019). Who is gen Z and how will they impact the workplace?. Retrieved April 28, 2022, from https://www.wgu.edu/blog/who-is-gen-z-how-they-impact-workplace1906.html.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Safitri Dwi Rahmadhani, Agung Darmawan Buchdadi, Muhammad Fawaiq, and Budi Agung Prasetya

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

