Information Technology Literacy and Intention to Use Fintech in Micro Business Enterprise: The Moderating Role of Perceived Security

M. Y. Dedi Haryanto, Sarsiti Sarsiti

Abstract

The Fintech phenomenon is the delivery of financial products and services via the synthesis of technological platforms and innovative business models. Intention to use Fintech for business processes largely remains unexplored in the context of Micro Small and Medium Enterprise (MSME). Responden of this study are 130 owner of MSMEs in Palembang city, one of the provincial capitals in Indonesia. Data was collected with questionair using a field survey. The method applied for data analysis was partial least squares structural equation modeling (PLS-SEM). The result show that technology literacy are not associated with and intention to use fintech. However, other result confirm that perceived security has a moderating effect on the relation between technology literacy and intention to use fintech. This is consistent with the argument that small business owner assess the security of fintech firm taking into account in adopting fintech services.

Keyword: Information technology literacy, Intension to use, Financial technology, Perceived security.

Full Text:

PDF

References

Adzkiya, Fina Auliya. 2017. “Pengaruh Orientasi Merek, Kepercayaan Dalam Membeli Online Dan Pengalaman Membeli Online Sebelumnya Terhadap Niat Pembelian Online.” Institut Agama Islam Negeri Surakarta.

Antoni. 2014. “Muslim Entrepreneurship: Membangun Muslim Peneurs Characteristics Dengan Pendekatan Knowladge Based Economy.” El-Hikam: Jurnal Pendidikan Dan Kajian Keislaman 7 (2): 325–52. http://ejournal.kopertais4.or.id/index.php/elhikam/article/view/1422%0Ahttp://ejournal.kopertais4.or.id/index.php/elhikam/article/download/1422/1021.

Aribawa, Dwitya. 2016. “Pengaruh Literasi Keuangan Terhadap Kinerja Dan Keberlangsungan UMKM Di Jawa Tengah.” Jurnal Siasat Bisnis 20 (1): 1–30. https://doi.org/10.1007/s10006-013-0431-4.

Arpaci, Ibrahim, Yasemin Yardimci Cetin, and Ozgur Turetken. 2015. “Impact of Perceived Security on Organizational Adoption of Smartphones.” Cyberpsychology, Behavior, and Social Networking 18 (10): 602–8. https://doi.org/10.1089/cyber.2015.0243.

Aweng. 2016. “Pengaruh Literasi Teknologi Informasi Perangkat Desa Terhadap Intensitas Penggunaan E-Desa.” Fakultas Ekonomi Universitas Sanata Dharma Yogyakarta. Universitas Sanata Dharma Yogyakarta. https://doi.org/https://doi.org/10.3929/ethz-b-000238666.

Badshah, W., U. Hakam, A. S. Khan, and S. Saud. 2014. “Factors Fffecting Short-Term Investment Intensions of Stock Investors in Pakistan.” Management and Administrative Sciences Review 3 (3): 464–69.

Barclay, D., C. Higgins, and R. Thompson. 1995. “The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration.” Technology Studies 2 (2): 285–309.

Burnes, B. 2004. “Kurt Lewin and the Planned Approach to Change: A Re-Appraisal.” Journal of Management Studies 41 (6): 977–1002.

Chandra, Yakob Utama, Desi Maya Kristin, Joni Suhartono, Fina Shabrina Sutarto, and Minseol Sung. 2018. “Analysis of Determinant Factors of User Acceptance of Mobile Payment System in Indonesia (A Case Study of Go-Pay Mobile Payment).” In Proceedings of 2018 International Conference on Information Management and Technology, ICIMTech 2018, 454–59. IEEE. https://doi.org/10.1109/ICIMTech.2018.8528182.

Dinlersoz, E. M., and R. Hernandez-Murillo. 2004. “The Diffusion of Electronic Business in the U.S.” St. Louis, MO.

Fishbein, M., and I. Ajzen. 1975. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Boston: Addison-Wesley Publishing Company.

Fornell, C., and D.F. Larcker. 1981. “Evaluating Structural Equation Moels with Unobservable Vaiables and Measurement Error.” Journal of Marketing Research 18 (1): 39–50. https://doi.org/http://doi.org/10.177/002224378101800104.

Hartono, Jogiyanto. 2007. Sistem Informasi Keperilakuan. Revisi. Yogyakarta: Andi Offset.

Igbaria, Magid, Nancy Zinatelli, Paul Cragg, and Angele L. M. Cavaye. 2006. “Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model.” MIS Quarterly 21 (3): 279. https://doi.org/10.2307/249498.

Introna, L. D., and D Wood. 2004. “Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems.” Surveillance & Society 2: 177–98.

Jamal, A. A. A., W. K. Ramlan, M. R. A. Karim, and Z. Osman. 2015. “The Effects of Social Influence and Financial Literacy on Savings Behavior: A Study on Students of Higher Learning Institutions in Kota Kinabalu, Sabah.” International Journal of Business and Social Science 6 (11): 110–19.

Jones, Mary C, John C Windsor, and Lucian Visinescu. 2011. “Technology Literacy Revisited: An Exploratory Assessment.” Acm Inroads 2 (2): 59–66.

Kang, Jungho. 2018. “Mobile Payment in Fintech Environment: Trends, Security Challenges, and Services.” Human-Centric Computing and Information Sciences 8 (1). https://doi.org/10.1186/s13673-018-0155-4.

Kiliyanni, A. L., and S. Sivaraman. 2016. “The Perception-Reality Gap in Financial Literacy: Evidence from the Most Literate State in India.” International Review of Economics Education 23: 47–64. https://doi.org/https://doi.org/10.1016/j.iree.2016.07.001.

Kuan, K. K., and P. Y. Chau. 2001. “A Perception-Based Model for EDI Adoption in Small Businesses Using a Technology–Organization–Environment Framework.” Information & Management 38 (8): 507–21.

Lestari, S. 2015. “Literasi Keuangan Serta Penggunaan Produk Dan Jasa Lembaga Keuangan.” Jurnal Fokus Bisnis 14 (02): 14–24.

Lewin, K. 1951. Field Theory in Social Science: Selected Theoretical Papers. New York: Harper & Row.

Lewin, K. 1964. Resolving Social Conflicts & Field Theory in Social Science. Washington, DC: American Psychological Association.

Lim, Se Hun, Dan J. Kim, Yeon Hur, and Kunsu Park. 2018. “An Empirical Study of the Impacts of Perceived Security and Knowledge on Continuous Intention to Use Mobile Fintech Payment Services.” International Journal of Human-Computer Interaction. https://doi.org/10.1080/10447318.2018.1507132.

Ling, K. C., L. T. Chai, and T. H. Piew. 2010. “The Effects of Shopping Orientations , Online Trust and Prior Online Purchase Experience toward Customers ’ Online Purchase Intention.” International Business Research 3 (3): 63–76. https://doi.org/https://doi.org/10.5539/ibr.v3n3p63.

Lusardi, A., and O. S Mitchell. 2007. “Baby Boomer Retirement Security: The Roles of Planning, Financial Literacy, and Housing Wealth.” Journal of Monetary Economics 54 (4): 205–24.

Mauludiyahwati, Septi. 2017. “Pengaruh Kepercayaan, Keamanan, Kualittas Pelayanan Dan Persepsi Risiko Menggunakan E-Commerce Terhadap Keputusan Pembelian Online.” Universitas Negeri Yogyakarta.

Mitnick, K., and W. L. Simon. 2002. The Art of Deception: Controlling the Human Element of Security. New York, NY: John Wiley & Sons.

Moskowitz, G.B. 2004. Social Cognition: Understanding Self and Others. Edited by The Guilford Press. New York.

Nunnally, J. C., and I. H. Bernstein. 1994. Psychometric Theory. 3rd ed. New York, NY: McGraw-Hill.

Nurjanah, Ervina, Agus Rusmana, and Andri Yanto. 2017. “Hubungan Literasi Digital Dengan Kualitas Penggunaan E-Resources.” Lentera Pustaka 3 (2): 117–40.

O’Cass, A., and T. Fenech. 2002. “Web Retailing Adoption: Exploring the Nature of Internet Users’ Web Retailing Behavior.” Journal of Retailing and Consumer Services 10 (2): 81–94.

Pratt, J. H. 2002. E-BIZ.COM: Strategies for Small Business Success (SBAHQ-00-C-0004). Washington, DC: Small Business Administration, U.S. Department of Commerce.

Raman, Arasu, and A. Viswanathan. 2011. “Web Services and E-Shopping Decisions: A Study on Malaysian e-Consumer.” In IJCA Special Issue on:Wireless Information Networks & Business Information System, 54–60.

Roca, Juan Carlos, Juan José García, and Juan José de la Vega. 2009. “The Importance of Perceived Trust, Security and Privacy in Online Trading Systems.” Information Management and Computer Security 17 (2): 96–113. https://doi.org/10.1108/09685220910963983.

Rose, Annette Mary. 2007. “Perceptions of Technological Literacy among Science, Technology, Engineering, and Mathematics Leaders.” Journal of Technology Education 19 (1): 35–52.

Safa, N. S., M. Sookhak, R. Von Solms, S. Furnell, N. A. Ghani, and Herawan T. 2015. “Information Security Conscious Care Behaviour Formation in Organizations”. Computers & Security.” Computers & Security 53: 65–78. https://doi.org/http://dx.doi.org/10.1016/j.cose.2015.05.012.].

Salisbury, W. David, Rodney A. Pearson, Allison W. Pearson, and David W. Miller. 2001. “Perceived Security and World Wide Web Purchase Intention.” Industrial Management & Data Systems 101 (4): 165–77. https://doi.org/10.1108/02635570110390071.

Sarstedt, M., C.M. Ringle, D. Smith, R. Reams, and J. F. Hair Jr. 2014. “Partial Leat Squares Structural Equation Modeling (PLS-SEM): A Usefill Tool of Family Bussiness Research.” Journal of Familiy Bussiness Strategy 5 (1): 105–15. https://doi.org/http://doi.org/10/1016/j.fbs.2014.10.002.

Schiffman, and Kanuk. 2007. Consumer Behaviour. 9th Edition, Upper Saddle River: Prentice-Hall.

Senge, P. 1990. The Fifth Discipline. New York: Bantan Doubleday Publishing Group Inc.

Shelley, M. C., L. E. Thrane, and S. W. Shulman. 2006. “Generational Differences in Information Technology Use and Political Involvement.” International Journal of Electronic Government Research 2 (1): 36–53.

Stewart, Harrison, and Jan Jürjens. 2017. “Data Security and Consumer Trust in FinTech Innovation in Germany.” Information and Computer Security. https://doi.org/10.1108/ICS-06-2017-0039.

Straub, D., M. Limayem, and E. Karahanna-Evaristo. 1995. “Measuring System Usage: Implications for IS Theory Testing.” Management Science 41 (8): 1328–42.

Syarifuddin. 2014. “Literasi Teknologi Informasi Dan Komunikasi.” Jurnal Penelitian Komunikasi 17 (2): 153–64.

Usniah, S., and A. Alhifni. 2017. “Karakteristik Entrepreneur Syariah Pada Usaha Mikro, Kecil, Dan Menengah (UMKM) Di Bogor.” Jurnal Syarikah 3 (1): 372–90.

Varma, Ashish. 2019. “Fintech Adoption Choices of Small Businesses: A Technology Organization Environment (TOE) Framework Study.” Accounting and Finance Research 8 (2): 86. https://doi.org/10.5430/afr.v8n2p86.

Venkatesh, V., and F. D. Davis. 2000. “A Theoritical Extension of the Technology Acceptence Model: Four Longitudinal Field Studies.” Management Science 45 (2): 186–200.

Venkatesh, Viswanath, Michael G. Morris, Gordon B. Davis, and Fred D. Davis. 2003. “User Acceptence of Information Technology: Toward a Unified View.” MIS Quarterly 27 (3): 425–78. https://doi.org/10.1006/mvre.1994.1019.

Werlinger, R., K. Hawkey, and K. Beznosov. 2009. “Anintegrated View of Human, Organizational, and Technological Challenges of IT Security Management.” Information Management & Computer Security 17: 4–19.

Whitman, M., and H. Mattord. 2009. Principles of Information Security. Boston, MA: Course Technology.

Wildayati. 2018. “Pengarun Financial Behavior Dan Literasi Keuangan Terhadap Saving Behavior.” Jurnal Elektronik REKAMAN (Riset Ekonomi Bidang Manajemen Dan Akuntansi) 2 (1): 138–48.

Wolstenholme, E. F. 2003. “Towards the Definition and Use of a Core Set of Archetypal Structures in System Dynamics.” System Dynamics Review 19 (1): 7–26.

Yusnimar. 2014. “E-Book Dan Perpustakaan Perguruan Tinggi Di Jakarta.” Al-Maktabah 13 (1): 34–39.

Refbacks

  • There are currently no refbacks.