The Drivers of a Digital Signature System Adoption: Evidence from Finance and Information System Departments
Downloads
Background: With the massive e-commerce transactions and document transfers, reliable system protection is needed. A digital signature is a tool that consists of encryption and decryption algorithms in a secret key to prevent data theft and online fraud.
Objective: This research proposes an integrated technology-organization-environment (TOE) and the unified theory of acceptance and use of technology (UTAUT) to determine the factors affecting consumer intention to adopt the digital signature system. This research uses finance and information system departments' perspectives in various industries.
Methods: The analytical method is the Structural Equation Modeling (SEM) approach using the Smart Partial Least Square statistical version 3.0 software to examine the hypothesized connections between latent variables.
Results: The results show that support from top management, size of the enterprise, and social influence have significant and positive effects on digital signature adoption. Meanwhile, user involvement and perceived simplicity have a negative effect on the adoption of a digital signature system in finance and information system departments.
Conclusion: The current research suggests that executive levels in the finance and information system departments encourage the adoption of digital signature tools in doing daily tasks to increase efficiency.
Keywords: Digital signature, consumer intention, finance and information system, structural equation modeling, TOE and UTAUT
F. F. Khizbullin, T. G. Sologub, S. V. Bulganina, T. E. Lebedeva, V. S. Novikov, and V. V. Prokhorova, "The direction of transformation of Information and Communication Technology (ICT) at the present stage of development into an electronic and information society,” Pertanika J. Soc. Sci. Humanit., vol. 25, no. 8, pp. 45–58, 2017.
S. Sumanjeet, "Emergence of payment systems in the age of electronic commerce: The state of art,” Asia Pacific J. Financ. Bank. Res., vol. 3, no. 3, pp. 18–40, 2009.
Indonesian Bank, "Laporan Akuntabilitas Tahunan Bank Indonesia 2020,” Laporan Tahunan Bank Indonesia, 2020.
D. Iskandar and Istaningsih, "The effect of safety, easy and promotion on the behavior of food e-commerce use system in the COVID-19 pandemic time,” Int. J. Manag. Stud. Soc. Sci. Res., vol. 3, no. 3, pp. 352–371, 2021.
Indonesian Cyber and Code Agency, "Laporan Hasil Monitoring Keamanan Siber Tahun 2020,” Pusat Operasi Keamanan Siber Nasional, pp. 10–13, 2020.
A. A. Nugroho, A. Winanti, and A. Surahmad, "Personal Data Protection in Indonesia: Legal Perspective,” Int. J. Multicult. Multireligious Underst., vol. 7, no. 7, pp. 183–189, 2020.
J. Zhang, "A Study on Application of Digital Signature Technology Junling Zhang Advertising College Beijing Union University,” pp. 498–501, 2010.
R. Kaur and A. Kaur, "Digital signature,” Proc. Turing 100 - Int. Conf. Comput. Sci. ICCS 2012, pp. 295–301, 2012, doi: 10.1109/ICCS.2012.25.
L. Zhang, L. Shan, and J. Wang, "Summary of digital signature,” in Lecture Notes in Electrical Engineering, 2012, vol. 137 LNEE, doi: 10.1007/978-3-642-26007-0_16.
B. Li, K. Q. Wang, and D. Zhang, "On-line signature verification for E-Finance and E-Commerce security system,” in International Conference on Machine Learning and Cybernetics, 2003, vol. 5, doi: 10.1109/icmlc.2003.1260092.
P. Shiralkar and B. S. Vijayaraman, "Digital Signature : Application Development Trends in E-Business,” J. Electron. Commer. Res., vol. 4, no. 3, 2003.
W. Fang, W. Chen, W. Zhang, J. Pei, W. Gao, and G. Wang, "Digital signature scheme for information non-repudiation in blockchain: a state of the art review,” Eurasip Journal on Wireless Communications and Networking, vol. 2020, no. 1. 2020, doi: 10.1186/s13638-020-01665-w.
I. C. Chang, H. G. Hwang, M. C. Hung, M. H. Lin, and D. C. Yen, "Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department,” Decis. Support Syst., vol. 44, no. 1, 2007, doi: 10.1016/j.dss.2007.04.006.
S. Aydin, H. Çam, and N. Alipour, "Analyzing the factors affecting the use of digital signature system with the technology acceptance model,” J. Econ. Bibliogr., vol. 5, no. 4, pp. 238–252, 2018.
K. W. Chong, Y. S. Kim, and J. Choi, "A study of factors affecting intention to adopt a cloud-based digital signature service,” Inf., vol. 12, no. 2, 2021, doi: 10.3390/info12020060.
G. Premkumar, "A meta-analysis of research on information technology implementation in small business,” J. Organ. Comput. Electron. Commer., vol. 13, no. 2, 2003, doi: 10.1207/S15327744JOCE1302_2.
F. M. H. Alatawi, Y. K. Dwivedi, M. D. Williams, and N. P. Rana, "Conceptual model for examining knowledge management system (KMS) adoption in public sector organinzations in Saudi Arabia,” tGov Work., vol. 2, 2012.
V. Venkatesh, F. D. Davis, and M. G. Morris, "Dead or alive? The development, trajectory and future of technology adoption research,” J. Assoc. Inf. Syst., vol. 8, no. 4, 2007, doi: 10.17705/1jais.00120.
H. O. Awa, O. U. Ojiabo, and L. E. Orokor, "Integrated technology-organization-environment (TOE) taxonomies for technology adoption,” J. Enterp. Inf. Manag., vol. 30, no. 6, 2017, doi: 10.1108/JEIM-03-2016-0079.
S. G. Chernyi, A. A. Ali, V. V. Veselkov, I. L. Titov, and V. Y. Budnik, "Security of electronic digital signature in maritime industry,” in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018, vol. 2018-January, doi: 10.1109/EIConRus.2018.8316861.
M. Bellare and S. K. Miner, "A forward-secure digital signature scheme,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1999, vol. 1666, doi: 10.1007/3-540-48405-1_28.
D. Landsbergen and G. Wolken, "Realizing the promise: Government information systems and the fourth generation of information technology,” Public Adm. Rev., vol. 61, no. 2, 2001, doi: 10.1111/0033-3352.00023.
M. A. Hossain and M. Quaddus, "The adoption and continued usage intention of RFID: An integrated framework,” Inf. Technol. People, vol. 24, no. 3, 2011, doi: 10.1108/09593841111158365.
H. O. Awa, O. Ukoha, and S. R. Igwe, "Revisiting technology-organization-environment (TOE) theory for enriched applicability,” Bottom Line, vol. 30, no. 1, 2017, doi: 10.1108/BL-12-2016-0044.
M. A. Fuller, A. M. Hardin, and C. L. Scott, "Diffusion of Virtual Innovation,” Data Base Adv. Inf. Syst., vol. 38, no. 4, 2007, doi: 10.1145/1314234.1314243.
J. Lee, D. Lee, J. Moon, and M. C. Park, "Factors affecting the perceived usability of the mobile web portal services: Comparing simplicity with consistency,” Inf. Technol. Manag., vol. 14, no. 1, 2013, doi: 10.1007/s10799-012-0143-8.
G. Premkumar and M. Roberts, "Adoption of new information technologies in rural small businesses,” Omega, vol. 27, no. 4, 1999, doi: 10.1016/S0305-0483(98)00071-1.
S. Khemthong and L. M. Roberts, "Adoption of Internet and Web Technology for Hotel Marketing: A Study of Hotels in Thailand,” J. Bus. Syst. Gov. Ethics, vol. 1, no. 2, 2006, doi: 10.15209/jbsge.v1i2.74.
V. Venkatesh, J. Y. L. Thong, and X. Xu, "Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology,” MIS Q. Manag. Inf. Syst., vol. 36, no. 1, 2012, doi: 10.2307/41410412.
M. H. Olson and B. Ives, "User involvement in system design: An empirical test of alternative approaches,” Inf. Manag., vol. 4, no. 4, 1981, doi: 10.1016/0378-7206(81)90059-8.
J. Grudin, "Systematic Sources of Suboptimal Interface Design in Large Product Development Organizations,” Human–Computer Interact., vol. 6, no. 2, 1991, doi: 10.1207/s15327051hci0602_3.
K. Zhu, K. Kraemer, and S. Xu, "Electronic business adoption by European firms: A cross-country assessment of the facilitators and inhibitors,” Eur. J. Inf. Syst., vol. 12, no. 4, 2003, doi: 10.1057/palgrave.ejis.3000475.
A. Jeyaraj, J. W. Rottman, and M. C. Lacity, "A review of the predictors, linkages, and biases in IT innovation adoption research,” Journal of Information Technology, vol. 21, no. 1. 2006, doi: 10.1057/palgrave.jit.2000056.
T. T. Chuang, K. Nakatani, and D. Zhou, "An exploratory study of the extent of information technology adoption in SMEs: An application of upper echelon theory,” J. Enterp. Inf. Manag., vol. 22, no. 1–2, 2009, doi: 10.1108/17410390910932821.
Y. M. Wang, Y. S. Wang, and Y. F. Yang, "Understanding the determinants of RFID adoption in the manufacturing industry,” Technol. Forecast. Soc. Change, vol. 77, no. 5, 2010, doi: 10.1016/j.techfore.2010.03.006.
D. Spinellis and V. Giannikas, "Organizational adoption of open source software,” J. Syst. Softw., vol. 85, no. 3, 2012, doi: 10.1016/j.jss.2011.09.037.
H. O. Awa, O. U. Ojiabo, and B. C. Emecheta, "Integrating TAM, TPB and TOE frameworks and expanding their characteristic constructs for e-commerce adoption by SMEs,” J. Sci. Technol. Policy Manag., vol. 6, no. 1, 2015, doi: 10.1108/JSTPM-04-2014-0012.
C.-Y. Lin and Y.-H. Ho, "An Empirical Study on the Adoption of RFID Technology for Logistics Service Providers in China,” Int. Bus. Res., vol. 2, no. 1, pp. 23–36, 2009.
R. Ramanathan, U. Ramanathan, and L. W. L. Ko, "Adoption of RFID technologies in UK logistics: Moderating roles of size, barcode experience and government support,” Expert Syst. Appl., vol. 41, no. 1, 2014, doi: 10.1016/j.eswa.2013.07.024.
S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing models,” Inf. Syst. Res., vol. 6, no. 2, 1995, doi: 10.1287/isre.6.2.144.
C. Marchionni and J. Ritchie, "Organizational factors that support the implementation of a nursing Best Practice Guideline,” J. Nurs. Manag., vol. 16, no. 3, 2008, doi: 10.1111/j.1365-2834.2007.00775.x.
S. Y. Y. Chyung, K. Roberts, I. Swanson, and A. Hankinson, "Evidence-Based Survey Design: The Use of a Midpoint on the Likert Scale,” Perform. Improv., vol. 56, no. 10, 2017, doi: 10.1002/pfi.21727.
R. Sunardi, U. Suhud, D. Purwana, and H. Hamidah, "Examining the Factors Contributing to Fintech Peer-to-peer Lending Adoption,” J. Inf. Syst. Eng. Bus. Intell., vol. 7, no. 2, 2021, doi: 10.20473/jisebi.7.2.91-101.
C. Fornell and D. F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” J. Mark. Res., vol. 18, no. 1, 1981, doi: 10.2307/3151312.
J. F. Hair, C. M. Ringle, and M. Sarstedt, "PLS-SEM: Indeed a silver bullet,” J. Mark. Theory Pract., vol. 19, no. 2, 2011, doi: 10.2753/MTP1069-6679190202.
B. Amelda, F. Alamsjah, and Elidjen, "Does the Digital Marketing Capability of Indonesian Banks Align with Digital Leadership and Technology Capabilities on Company Performance?,” CommIT J., vol. 15, no. 1, 2021, doi: 10.21512/commit.v15i1.6663.
J. Khalilzadeh, A. B. Ozturk, and A. Bilgihan, "Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry,” Comput. Human Behav., vol. 70, 2017, doi: 10.1016/j.chb.2017.01.001.
E. Ozgul, "Determinants of Simplicity Behavior: Effects on Sustainable Consumption and Life Satisfaction,” Int. J. Contemp. Econ. Adm. Sci., vol. 7, no. 3–4, 2017.
Indrawati and D. A. Putri, "Analyzing Factors Influencing Continuance Intention of E-Payment Adoption Using Modified UTAUT 2 Model,” Inf. Commun. Technol. (ICoICT), 2018 6th Int. Conf., vol. 2018, no. 5, 2018.
T. Tang, M. E. Lim, E. Mansfield, A. McLachlan, and S. D. Quan, "Clinician user involvement in the real world: Designing an electronic tool to improve interprofessional communication and collaboration in a hospital setting,” Int. J. Med. Inform., vol. 110, 2018, doi: 10.1016/j.ijmedinf.2017.11.011.
H. Y. Hsu, F. H. Liu, H. T. Tsou, and L. J. Chen, "Openness of technology adoption, top management support and service innovation: a social innovation perspective,” J. Bus. Ind. Mark., vol. 34, no. 3, 2019, doi: 10.1108/JBIM-03-2017-0068.
X. Pan, X. Pan, M. Song, B. Ai, and Y. Ming, "Blockchain technology and enterprise operational capabilities: An empirical test,” Int. J. Inf. Manage., vol. 52, 2020, doi: 10.1016/j.ijinfomgt.2019.05.002.
J. K. Park, J. Ahn, T. Thavisay, and T. Ren, "Examining the role of anxiety and social influence in multi-benefits of mobile payment service,” J. Retail. Consum. Serv., vol. 47, 2019, doi: 10.1016/j.jretconser.2018.11.015.
A. D. Beldad and S. M. Hegner, "Expanding the Technology Acceptance Model with the Inclusion of Trust, Social Influence, and Health Valuation to Determine the Predictors of German Users' Willingness to Continue using a Fitness App: A Structural Equation Modeling Approach,” Int. J. Hum. Comput. Interact., vol. 34, no. 9, 2018, doi: 10.1080/10447318.2017.1403220.
V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, "User acceptance of information technology: Toward a unified view,” MIS Q. Manag. Inf. Syst., vol. 27, no. 3, 2003, doi: 10.2307/30036540.
W. He, Z. Zhang, and W. Li, "Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic,” Int. J. Inf. Manage., vol. 57, 2021, doi: 10.1016/j.ijinfomgt.2020.102287.
Copyright (c) 2022 The Authors. Published by Universitas Airlangga.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
All accepted papers will be published under a Creative Commons Attribution 4.0 International (CC BY 4.0) License. Authors retain copyright and grant the journal right of first publication. CC-BY Licenced means lets others to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material for any purpose, even commercially).