Abstract
The objective of this study is to examine the influence of privacy, security, trust, and experience on the intention to transact online. Data were obtained from questionnaires that contains a list of questions given to 65 students of S2 in Jakarta. This study uses Structural Equation Model (SEM). The results of this study that (1) Indicators of security, trust and privacy have negative significant influence to perceptions of risk, (2) trust and perceptions of risk have positive significant influence to attitudes, (3) attitudes, risk perception and experience of using internet have positive significant influence to the intention to transaction online. (4) subjective norms have negative and no significant. (5) controls the behavior of the negative and no significant influence on the intention. The result is expected to increase the knowledge and are expected to contribute in the development of e-business systems
References
Ajzen, I. (1985). "From Intentions to Actions: A Theory of Planned Behavior." Action Control: From Cognition to Behavior, J. Kuhl and J. Beckman, eds., Springer Verlag, New York, 11-39.
Ajzen, I. (1991). "The Theory of Planned Behavior." Organizational Behavior and Human Decision Processes, 50(2), 179-211.
Ajzen, I. (2002). "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior." Journal of Applied Social Psychology, 32(4), 665-683.
Anil Gurung (2006) “ Empirical Investigation of the Relationship of Privacy Security, and Trust with Behavioral Intention to transact in E-Commerce”The University Of Texas at Arlingon
Davis, F.D. 1989. Perceived useful¬ness,perceived ease of use, and user acceptance of infor¬mation technology. MIS Quar¬terly. Vol. 13 No. 3. h. 319-40.
Fox, S. 2000. Trust and privacy online: why Americans want to rewrite the rules, Pew Internet and American Life Project. available at: www.pewinternet.org
Gefen, D., Karahanna, E., and Straub, D. W. (2003). "Trust and TAM in Online Shopping: An Integrated Model." MIS Quarterly, 27(1), 51-90.
Hoffman, D.L., Novak, T.P. and Pe¬ralta, M. 1999. Building consu¬mer Trust online. Communica-tions of the ACM. Vol. 42 No. 4. h. 80-5.
Jarvenpaa, S. L., Tractinsky, N., Saarinen, L., and Vitale, M. (1999). "Consumer Trust in an internet store: a cross-cultural validation." Journal of Computer-Mediated Communication, 5(2).
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model." Information Systems Research, 15(4), 336-355.
Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995). "An Integrative Model of Organizational Trust." Academy of Management Review, 20(3), 709-734.
Miyazaki, A. D., and Fernandez, A. (2001). "Consumer Perceptions of Privacy and Security Risks for Online Shopping." Journal of Consumer Affairs, 35(1), 27-44.
Pavlou, P. A. (2002). "Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation." The Journal of Strategic Information Systems, 11(3-4), 215-243.
Pavlou, P. A., and Fygenson, M. (2006). "Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior." MIS Quarterly, 30.
Peterson, R.A, Balasubramanian, S., Bronnenberg, B.J. 1 997. Exploring the Implications of the Internet for Consumer Marketing. Journal of the Academy Marketing Science. Vol. 25 No. 4. h. 329-346.
Phelps, J., Nowak, G., and Ferrell, E. (2000). "Privacy concerns and consumer willingness to provide personal information." Journal of Public Policy & Marketing, 19(1), 27-41.
Sitkin, S. B., and Pablo, A. L. (1992). "Reconceptualizing the Determinants of Risk Behavior." Academy of Management Review, 17(1), 9-38.
Taylor, S., and Todd, P. A. (1995). "Understanding Information Technology Usage – a Test of Competing Models." Information Systems Research, 6(2), 144-176.
Venkatesh, V. and Davis, F.D. 1996. A model of the antecedents of perceived ease of use: deve lopment and test. Decision Sciences. Vol. 27 No. 3. h. 451-82.
Wijanto, Setyo Hari, 2008, “ Structural Equation Model (SEM) dengan Lisrel 8.8,Konsep dan Tutorial”, Graha Ilmu
Wang et al., 1998, “Consumer privacy concerns about internet marketing”, Communication of the ACM, Vol. 41, pp. 63-70