Tải bản đầy đủ (.pdf) (79 trang)

Behavioral intention to use mobile stock trading evidence from vietnams securities investors

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.46 MB, 79 trang )

UNIVERSITY OF ECONOMICS HO CHI MINH CITY
International School of Business
------------------------------

NGUYEN PHUC BINH

BEHAVIORAL INTENTION TO USE
MOBILE STOCK TRADING:
EVIDENCE FROM VIETNAM’S
SECURITIES INVESTORS

MASTER OF BUSINESS (Honours)

Ho Chi Minh City – 2015


UNIVERSITY OF ECONOMICS HO CHI MINH CITY
International School of Business
------------------------------

Nguyen Phuc Binh

BEHAVIORAL INTENTION TO USE
MOBILE STOCK TRADING:
EVIDENCE FROM VIETNAM’S
SECURITIES INVESTORS

ID: 22130010

MASTER OF BUSINESS (Honours)
SUPERVISOR: Dr. TRAN PHUONG THAO



Ho Chi Minh City – 2015


i
ACKNOWLEDGMENTS
Firstly, I would like to express my deepest appreciation to my supervisor Dr. Tran
Phuong Thao for her professional guidance, valuable advices, continuous
encouragement, and support that made this thesis possible.
I would like to extend deep senses of gratitude to Prof. Nguyen Dinh Tho, Dr. Tran Ha
Minh Quan, and lecturers who have taught and transferred me valuable knowledge and
experiences during my time at the International School of Business, special thanks to
all of my dear friends in Mbus4 class who gave me useful materials, responses and
experiences to conduct this study.
I would also like to express my grateful thanks to my managers, my friends, and my
colleagues who participated in filling the questionnaires and/or helped send the
questionnaires to their peers; to securities investors, and provided valuable information
and comments for this study.
Personally, I wish to express my deep gratitude to my colleagues and friends working
at Vietcombank Fund Management (VCBF); Saigon Securities Inc. (SSI); VNDirect
Securities Corporation (VND); Hochiminh City Securities Corporation (HSC);
Maybank Kim Eng Securities Limited; Mirae Asset Wealth Management Securities
(VN) JSC, and Vietcapital Securities Corporation (VCSC).
Ho Chi Minh City, Vietnam,
January 27, 2016

Nguyen Phuc Binh


ii

ABSTRACT
The purpose of this study is to investigate the determinants of securities investors’
behavioral intention towards using mobile stock trading. Based on a modified UTAUT
(Unified Theory of Acceptance and Use of Technology) with multi-facet perceived
risks and privacy concerns, a comprehensive research model was proposed. An
empirical survey with a valid sample of 244 securities investors was conducted in
Vietnam to test the research model. The analysis results of SEM indicated that three
enablers of adopting mobile stock trading in Vietnam are UTAUT constructs (i.e.,
performance expectancy, effort expectancy and social influence), and the inhibitors are
the perceptions of risk (i.e. security risk, economic risk) and privacy concerns. This
implies that to facilitate the behavioral intention to use mobile stock trading, securities
firms need to consider securities investors’ technological perceptions, risk perceptions
of this type of trading, and concerns on the disclosure of personal information upon
logging in the application. The findings of this study not only have important
implications for mobile commerce research, but also provide insights for securities
firms and developers of mobile stock trading systems.
Keywords: mobile stock trading (m-trading), UTAUT, security risk, economic risk,
privacy concerns, behavioral intention to use.


iii
TABLE OF CONTENTS
ACKNOWLEDGMETS ............................................................................................. i
ABSTRACT. .............................................................................................................. ii
TABLE OF CONTENT............................................................................................iii
LIST OF FIGURES ................................................................................................... v
LIST OF TABLES .................................................................................................... vi
LIST OF ABBREVIATIONS .................................................................................. vii
CHAPTER 1: INTRODUCTION ............................................................................. 1
1.1. Background of the study...................................................................................... 1

1.2. Research gap. ...................................................................................................... 2
1.3. Research objectives and research questions ......................................................... 4
1.4. Research methodology and research scope .......................................................... 4
1.5. Research structure ............................................................................................... 5
CHAPTER 2: LITERATURE REVIEW& HYPOTHESES DEVELOPMENT .... 6
2.1. Theoretical background ....................................................................................... 6
2.1.1. Unified Theory of Acceptance and Use of Technology (UTAUT) ....................... 6
2.1.2. The extended UTAUT. ....................................................................................... 7
2.2. Behavioral intention, risk perceptions and privacy concern. ................................ 8
2.2.1. Behavioral Intention. ........................................................................................ 8
2.2.2. Risk Perception. ................................................................................................ 9
2.2.3. Privacy Concern. .............................................................................................. 9
2.3.

Hypotheses Development................................................................................ 10

2.3.1. Hypotheses Derived From UTAUT.................................................................. 11
2.3.2. Hypotheses Derived From Risk Perceptions .................................................... 12
2.3.3. Hypotheses Derived From Privacy Concern.................................................... 13
2.4. Conceptual model.............................................................................................. 15
2.5. Chapter summary. ............................................................................................. 15
CHAPTER 3: METHODOLOGY .......................................................................... 16
3.1. Research design................................................................................................. 16
3.1.1. Research process ............................................................................................ 16


iv
3.1.2. Measurement scales. ....................................................................................... 17
3.2. Measurement refinement.…. ............................................................................. 20
3.3. Sample. ............................................................................................................. 21

3.4. Data analysis and interpretation. ........................................................................ 22
3.4.1. Reliability measure ......................................................................................... 22
3.4.2. Validity measure by EFA (Exploratory Factor Analysis). ................................ 22
3.4.3. CFA & SEM .................................................................................................... 23
3.5. Pilot test. ........................................................................................................... 23
3.5.1. Cronbach’s Alpha. .......................................................................................... 23
3.5.2. Exploratory factor analysis. ............................................................................ 24
3.6. Chapter summary. ............................................................................................. 26
CHAPTER 4: RESEARCH FINDINGS ................................................................. 27
4.1. Data description. ............................................................................................... 27
4.2. Confirmatory factor analysis (CFA). ................................................................. 28
4.2.1. Saturated model. ............................................................................................. 28
4.2.2. Composite reliability and variance extracted. ................................................. 29
4.3. The structural equation model analysis (SEM). ................................................. 29
4.4. Discussion. ........................................................................................................ 32
4.4.1. UTAUT constructs. ......................................................................................... 32
4.4.2. Perceived risks. ............................................................................................... 33
4.4.3. Privacy concerns............................................................................................. 34
4.5. Chapter summary. ............................................................................................. 35
CHAPTER 5: CONCLUSION, IMPLICATION& LIMITATIONS .................... 36
5.1. Key findings. ..................................................................................................... 36
5.2. Managerial Implications. ................................................................................... 38
5.2.1. UTAUT constructs. ......................................................................................... 38
5.2.2. Perceived risks. ............................................................................................... 40
5.2.3. Privacy concerns............................................................................................. 40
5.3. Research contribution. ....................................................................................... 41
5.4. Limitation and further study. ............................................................................. 42
REFERENCE…....................................................................................................... 44



v
APPENDICES
Appendix A: List of in-depth interview participants................................................... 52
Appendix B: In-depth interview’s refinement measurement scale. ............................. 53
Appendix C: Questionnaire (English Version). .......................................................... 58
Appendix D: Questionnaire (Vietnamese Version). ................................................... 61
Appendix E: Discriptive Statistics.............................................................................. 64
Appendix F: CFA results. .......................................................................................... 65
Appendix G: In-depth interview for “security risk” and “privacy concerns”. ............. 66


vi
LIST OF FIGURES
Figure

Name

Page

2.1

The UTAUT model

7

2.2

Basically generalized UTAUT model of extant researches

8


2.3

Basically generalized extended UTAUT model of extant researches

8

2.4

Conceptual framework model

15

Research process

17

4.1

The saturated model (standardized)

28

4.2

SEM & path analysis

30

4.3


The research results estimated by SEM

31

3


vii
LIST OF TABLES
Table

Name

Page

3.1

Final measurement scales

20

3.2

Cronbach’s Alpha test

23

3.3


EFA – KMO and Bartlett’s Test

25

3.4

EFA – Total Variance Explained

25

3.5

EFA – Pattern matrix

25

4.1

Descriptive Statistics

27

4.2

The results for reliability and variance extracted test

29

4.2


Summary of results of testing hypotheses by SEM

32


viii
LIST OF ABBREVIATIONS
No.

Abbreviation

Name

1

PE

Performance expectancy

3

EE

Effort expectancy

4

SI

Social influence


5

SR

Security risk

6

FR

Functional risk

7

ER

Economic risk

8

PC

Privacy concern

9

BI

Behavioral intention


10

ICT

Information communication technology

11

UTAUT

Unified theory of acceptance and use of technology

12

TAM

Technology acceptance model

13

TFSA

Toronto Financial Services Alliance

14

SEM

Structural Equation Model


15

EFA

Exploratory Factors Analysis

16

CFA

Comfirmatory Factors Analysis

17

PDAs

Personal Digital Assistants

18

PC

Personal Computer

19

MOIT

Ministry of Industry & Trade


20

M-Trading

Mobile Stock Trading


1
CHAPTER 1: INTRODUCTION
1.1. Research Background
“Information technology is not the cause of the changes we are living through. But
without new information and communication technologies none of what is changing our lives
would be possible” (Castells, 1999, p.2). In the most recent decades, we have witnessed
mobile technology, an important and most innovated component information communication
technology (ICT), has achieved a virtual revolution. It has transformed a pure means of
communication through a full set of mobile services in finance, shopping, payment, social
networking, remote diagnostics, tourism, and etc., which added billions of dollars to the
world economy. Therefore, bringing new technologies to improve life and business
performance seems not new at all (Chong et al., 2010). Actually, mobile technology has
helped many financial institutions in various economic sectors with many opportunities to
reach new and potential markets, and customers. The development of mobile applications has
provided financial service providers with new channels of reaching their customers and in
turn its customers have more chance to access their financial information than ever before
(TFSA, 2013). One of the outstanding advantages of mobile technology is its ability to give
users instant, new, and useful information at appropriate time regardless of locations (Liang
& Yeh, 2009). Without being so, mobile commerce will lose its significant economic value.
As mobile-commerce uninterruptedly grows, brick-and-mortar or online financial services
will be demanded to be available in mobile devices by the consumers (TFSA, 2013).
Typically, securities trading, a component of financial service has also been sharply

changed since first taking shape in the world due to the widespread adoption of ICT. Since
introduced in 1995, online trading which is a newly innovated mode of securities trading has
increased dramatically (Li, Lee & Cude, 2002). Upon implementation of online trading, no
longer do securities investors need to get out of their houses to the trading floors located at
busy streets in big cities thanks to the Internet-based trading systems that covered every
corner of the world. Online securities trading opened a new chapter in the establishment and
development of global securities market, and it is expected to continue being a valued choice
for investors (American Banker, as cited in Li et al., 2002). Online trading (i.e. website-based
trading and mobile-based trading) as a substitute to the traditional trading (i.e. direct trading
at floors, phone-based trading) has unique characteristics which help the investors handle
their portfolio without or less being contingent on brokers as well as preserve the personal
privacy. Online trading helps brokerage firms reduce costs by eliminating human interaction


2
(Bakos et al., 2000). With online trading, buying or selling securities is only a single click on
a computer mouse (Li et al., 2002).
Although the Vietnamese financial market in general; and specifically the securities
market have not been significantly developed, it was categorized as an attractive emerging
market. Obviously, more and more foreign prominent financial institutions such as Citibank,
HSBC, ANZ bank, Commonwealth bank, Bank of Tokyo, Franklin Templeton, Blackhorse,
AIG, Prudential, Manulife, …. have made entry in Vietnam market and have found success.
This proves the true potential of the Vietnam’s financial market. In the integration with
global playground, the Vietnamese financial institutions have been also adopting and
developing online services for years. Currently there is a very limited number of financial
institutions in Vietnam (only banks develop mobile banking and securities brokerage firms
develop mobile securities trading) conducting their services on the basis of mobile
technology. There are some reasons that people believe in the wide and rapid adoption of
mobile commerce in Vietnam. According to MOIT (2014), Vietnam is in the group of
countries having high rate of mobile purchase, and the potential for mobile shopping has been

realized and has great opportunities for growth. Ngo et al. (2015) indicated that researches
into mobile shopping in Vietnam too few to profoundly understand the determinants of usage
adoption.
Despite the benefits of mobile technology in contemporary finance, there are potential
risks in association with financial transactions via mobile devices, such as hacking, misusage,
and privacy concerns. Those disadvantages of mobile devices that are vulnerable to lose
consumers’ money and prestige are why the usage of e-finance (i.e. e-banking and electronic
securities trading) has not widely adopted yet. That is why behavioral intention to use mobile
technology, the antecedent of actual usage, in financial service is widely studied over the
world recently in tandem with the striking development of smart-phones and its applications.
1.2. Research gap
Since Vietnam is still in search of its solution for the future of cashless payments
(Internation Finance Corporate, 2014), mobile securities trading (hereinafter referred to as
“M-Trading”) as same as other types of mobile and electronic commerce in Vietnam is still in
its infancy (Ngo et al., 2015). Indeed, since 2008, as encouraged by Vietnamese government,
all of Vietnam’s securities firms develop its own website, in which website-based trading is
always available for the investors to execute their trading orders. Some well-known securities
firms (i.e. Saigon Securities Inc., Hochiminh City Securities Corp., VNDirect Securities


3
Corp., FPT Securities Corp., MB Securities Corp., VPbank Securities Corp., BaoViet
Securities Corp., etc), even developed smart-phone-based application for its clients to
conduct securities trading everywhere. However, there are some limitations while carrying
out mobile-based transactions due to its nature (Tai & Ku, 2013) as well as careful
consideration of customers with regard to the risk assessment (Zhou, 2012), thus only few
Vietnamese securities investors actually use M-Trading. In other words, the questions on
rationales of securities investors willing or reluctant to use M-Trading and factors influencing
their behavioral intention to use M-Trading in Vietnam have received increasing concerns of
researchers.

In the literature, many prior studies on ICT’s adoption in financial industry has been
conducted up to now such as internet banking (Wang & Shan, 2012; Chong et al., 2010; Kim
et al., 2007; Laforet & Li, 2005), mobile banking (Yu, 2012; Aboelmaged & Gebba, 2013),
internet securities trading (Teo et al. 2004, Ramayah et al. 2009, Singh et al. 2010), online
securities trading (Abroud, Choong & Muthaiya, 2010); M-Trading (Tai & Ku, 2013).
Remarkably, in Vietnam’s context, there have been also many researches online banking
(Chong et al., 2010); e-banking (Nguyen Duy Thanh & Cao Hao Thi, 2011; Nguyen et al.,
2014); e-payment (Nguyen & Lin, 2011), mobile transfer of money (Le Van Huy & Tran
Nguyen Phuong Minh, 2011); mobile-learning (Ngo & Gwangyong, 2014), personal internet
banking (Hoang, 2015), mobile payment (Pham & Liu, 2015), mobile shopping (Ngo et al.,
2015), but only few on e-trading of securities were conducted.
Because Vietnamese investors' behavioral intention to use M-Trading have not been
well indicated, which factors deter or encourage their adoption remain unknown, a better
understanding of their behavioral intention would have great practical implications, not only
for brokerage firms seeking to manage more effectively the implementation of M-Trading
and improve their services, but also for the authorities of the Vietnam’s State Securities
Commission that would have proper policies on administering securities market. Obviously,
understanding why securities investors are willing or reluctant to use M-Trading by
developing and empirically examining a comprehensive model of securities investors’
behavioral intention to use M-Trading is strongly needed.
In Vietnam, M-Trading as other types of mobile commerce is defined as conducting
transactions using mobile devices such as smart phones, tablets, PDAs (Personal Digital
Assistants), and other mobile devices (except for laptops). As same as Internet shopping, it
requires Internet access. In this study, the theoretical background of the research is developed
with the concept of literature review of the unified theory of acceptance and use of
technology (UTAUT) that combines key constructs from Technology Acceptance Model


4
(TAM). Recently, the UTAUT model or extended UTAUT model have successfully

employed to explain behavioral intention to usemobile securities trading (Tai & Ku, 2013),
users’ intention and behavior of mobile banking (Yu, 2012), and intention to use internet
banking (Yee et al., 2015). Therefore, to fulfill the gap in the context of Vietnam, this study is
about to employ extended UTAUT model (Venkatesh et al., 2003) liaised with multi-facet
perceived risks (Tai & Ku, 2013) and privacy concerns (Zhou, 2012) to investigate the
influential level of these factors on Vietnamese’s behavioral intention to use M-Trading.
1.3. Research objectives and research questions
The objective of this study is to investigate the factors influencing securities investors’
behavioral intention. Particularly, the study aims at answering the following questions:
Question 1: which factors based on the modified UTAUT model influence securities
investors’ behavioral intention to use M-Trading in Vietnam?
Question 2: Which factors of perceived risks influence securities investors’ behavioral
intention to use M-Trading in Vietnam?
Question 3: Whether do the privacy concerns affect securities investors’ behavioral
intention to use M-Trading in Vietnam or not?
1.4. Research methodology and research scope
This study uses questionnaires to collect data. The survey is originally developed in
English and then translated into Vietnamese. In-depth interviews are then conducted with
eight people in order to modify the Vietnamese version of the questionnaire before the survey
is implemented in mass. The next step is analyzing the collecting data. The data of this
research is processed using SPSS software with three main stages. First, Cronbach’s Alpha is
used to test the reliability of the measurement scale. Then, the validityof the measurement
scale will be checked by Exploratory Factor Analysis (EFA). Finally, structural equation
model (SEM) and path analysis are employed as the main method for investigating the
relationships among factors in the research model. Ho Chi Minh City is the largest city and
the metropolitan area in Vietnam. It is also the economic center of Vietnam and accounts for
a large proportion of the economy of Vietnam. Moreover, Ho Chi Minh City has been chosen
to conduct the survey for this study since it is one of the biggest cities in Vietnam in which
the largest securities exchange of Vietnam is located (Ho Chi Minh City Securities Exchange
– HOSE). The research’s subjects are Vietnamese individual securities investors with the age

range above 18 years old. They might either be used to use internet securities trading, and or
internet/mobile banking service, or never use any e-financial services because the study’s
goal is to find out the behavioral intention to use M-Trading instead of actual use. Moreover,


5
since investigating the behavioral intention, potential investors at the same age level will be
also invited to participate.
1.5. Research Structure
The research is divided into five chapters.
The first chapter introduces about background, research problems, research questions,
research purpose, scope of research and research structures.
The second chapter covers literature review of the previous research and shows
hypotheses, as well as the conceptual model of the research.
The third chapter presents the research process, sampling size, measurement scale,
main survey, and data analysis method.
The fourth chapter concentrates on preparation data, descriptive data, assessment
measurement scale and hypotheses testing.
The fifth chapter points out research overview, research findings, managerial
implications, research limitations and directions for future research.


6
CHAPTER 2: LITERATURE REVIEW & HYPOTHESES DEVELOPMENT
The chapter 2 is to present the theories associated with behavioral intention to use
mobile technology, the acceptance of mobile-based financial services and the models testing
the adoption of mobile technology over the world. Moreover, a conceptual model is built
resulting from the hypotheses generating from extant literature, simultaneously, its constructs
and relationship hypothesized among these constructs are also discussed.
2.1. Theoretical background

Studies on ICT users’ acceptance and use have been conducted extensively because
ICT have been in wide usage, and several models originated from different theoretical
disciplines (i.e. psychology, sociology and information systems) have been developed to
explain the acceptance and usage. One stream developed on motivational model has focused
on how extrinsic and intrinsic motivations influence the acceptance (Davis et al., 1992).
Another stream based on TAM model to explore the role of perceived usefulness and
perceived ease of use on usage intentions and actual usage (Davis, 1989). Venkatesh et al.
(2003) indicated that the UTAUT model is able to explain sixty nine percent of intention to
use ICT (technology acceptance) while other previous model explained approximately forty
percent of technology acceptance. Since UTAUT is a comprehensive model which has been
adopted by several previous studies to successfully predict users’ usage intention
toward e-commerce, e-financial services, an extended UTAUT (incorporating financial risk,
economic risk, functional risk, and privacy concerns) serves as a robust basis for doing the
same in Vietnam context.
2.1.1. Unified Theory of Acceptance and Use of Technology (UTAUT)
UTAUT is developed by Venkatesh et al. (2003) to integrate eight theories, which
include the technology acceptance model (TAM), innovation diffusion theory (IDT), the
motivational model, the theory of reasoned action (TRA), the theory of planned behavior
(TPB), a model combining the TAM and TPB, the model of PC utilization and social
cognitive theory. UTAUT proposes that four constructs including performance expectancy,
effort expectancy, social influence, and facilitating conditions affect user adoption of an ICT.
The theory postulates that four core constructs – performance expectancy, effort expectancy,
social influence, and facilitating conditions – are direct determinants of ICT behavioral
intention and ultimately behavior (Venkatesh et al., 2003).
Performance expectancy is similar to perceived usefulness and relative advantage. The
construct of performance expectancy is aggregated from five performance-related constructs:
perceived usefulness, extrinsic motivation, job-fit, relative advantage and outcome


7

expectations. Effort expectancy is similar to perceived ease of use and complexity. It is
similar to constructs included in previous models or theories, namely, perceived ease of use,
complexity, and ease of use. Social influence is similar to subjective norm. This construct
proposes that people’s ICT acceptance behavior is affected by if they believe others expect
them to be willing or reluctant to a certain behavior. Facilitating conditions are similar to
perceived behavioral control. In UTAUT, facilitating conditions are integrated thirty two
factors used in eight competing models into five constructs and empirically identified that
behavioral intention and facilitating conditions were two direct determinants of adoption
behavior. This construct reflects that users need to be equipped with mobile internet
knowledge in order to use ICT system. Without owning these knowledge and resources, they
cannot adopt ICT system.

Performance
Expectancy
Effort
Expectancy

Behavioral
Intention

Social
Influence

Use
Behavior

Facilitating
Conditions

Gender


Age

Experience

Voluntariness
of Use

Figure 2.1: the UTAUT model (Venkatesh et al., 2003)
2.1.2. The extended UTAUT
The UTAUT model without modification cannot be applied to the research on user’s
acceptance of mobile commerce since all ICT adoption theories or models, including
UTAUT, were developed for PC and/or fixed line Internet systems/applications. Since 2003,
among many studies citing UTAUT, very few employ all if its constructs (Williams et al.,
2011). Extant researches have used extended UTAUT to explain user adoption in online
securitiesing in the financial market (Wang & Yang, 2005), internet banking (Yee et al.,
2015; El-Qirem, 2013; Yu, 2012), in health information technology (Kijsanayotin et al.,
2009), in digital library (Nov & Ye, 2009), and in e-government services (Suha & Anne,
2008). Further, the UTAUT has also been employed to examine user adoption of mobile


8
services, such as mobile banking (Yu, 2012), mobile wallet (Shin, 2009), mobile payment
(Kim et al., 2009), and mobile technologies (Park et al., 2007). These studies mainly focused
on employing the UTAUT or revising UTAUT by combining TAM’s construct, or by adding
up a few independent variables as the role of enabler of intention adoption.

Reactions to use ICT

Intention to use ICT


Actual use of ICT

Figure 2.2: Basically generalized model of extant researches
However, other than most previous studies employing UTAUT only adopted a single
construct to evaluate users’ risk perceptions, Zhou (2012) examined location-based services
usage from the perspectives of UTAUT and perceived risk, privacy concerns and trust. Tai &
Ku (2013) investigated the determinants of securities investors’ intention towards using
mobile securities trading by developing an extended UTAUT model incorporating symmetry
axis of which usage intention influenced by UTAUT’s constructs and perceived risks.
Positive Effects to use
mobile-based services

Usage Intention of
mobile-based services

Negative effects to use
mobile-based services

Demographics
Figure 2.3: Basically generalized extended UTAUT model of extant researches
Since (extended) UTAUT is a comprehensive model which has been adopted by
several previous studies to successfully predict users’ usage intention toward mobilebased service, but very few studies were implemented as the same manner in Vietnam. An
extended UTAUT (incorporating enablers as performance expectancy, effort expectancy, and
social influence; and inhibitors such as financial risk, economic risk, functional risk, and
privacy concerns) will serve as a robust basis for an empirically testing the behavioral
intention to use M-Trading in Vietnam.
2.2. Behavioral intention, risk perceptions and privacy concerns
2.2.1. Behavioral Intention
Ajzen (1991) argues that ‘‘Intentions are assumed to capture the motivational factors

that influence a behavior. They are indications of how hard people are willing to try, of how
much of an effort they are planning to exert in order to perform the behavior’’ (p. 181). It is
similar to attitude towards behavior (TRA, TPB, DTPB) and extrinsic and intrinsic
motivation (MM) derived from previous models or theories. Usage intention to adopt/accept
ICT system measures an individual’s relative strength of intention to perform a behavior
(Fishbein & Ajzen, 1975). It indicates a person’s motivation to perform a specific behavior,


9
and is viewed as the antecedent of actual behavior. Consistent to all models portraying from
psychological theories, which argue that individual behavior is predictable and influenced by
individual intention, UTAUT argued and demonstrated usage intention to have significant
influence on ICT usage (Venkatesh et al., 2003; Venkatesh & Zhang, 2010).
2.2.2. Risk Perception
Concerning the acceptance of mobile-based mode in financial services, Tai & Ku
(2013) indicated that risk perceptionsare important determinant of behavioral intention.
Perceived risks are usually considered as one of the potential barriers (Chen, 2008; Luo et al.,
2010; Hsu et al., 2011). Noticeably, mobile users see risk in prospect uncertainty arising from
data input errors, software failures, connection loss, and privacy loss (Mallat et al., 2008;
Cruz et al., 2010; Koenig-Lewis et al., 2010). M-Trading is a variant of mobile-based
financial service, of which while using, the users are required to sign up with certain
information. Hence, there is an anticipated risk of exposure to opportunistic hackers who can
access their trading accounts, delete data or make unauthorized trades. As a result, investors
may elect to forgo the potential benefits of using M-Trading.
Many previous researches have found that the intention to use mobile-based financial
services is influenced by users’ perception of risk. For instance, Mallat (2007) indicated that
perceived risk is the main obstacle of the adoption mobile payment sytems. Futher, Mallat et
al. (2008) found that perceived risk is a key determinant of using mobile ticketing service.
Consistent to Mallat (2007) and Mallat et al. (2008), Cruz et al. (2010) and Koenig-Lewis et
al. (2010) indentified high perceived risk as a key inhibitor of mobile banking.

In the perspective of mobile-based financial services, users perceive risk from several
facets, the most common of which are security risk, economic risk, and functional risk (Cruz
et al., 2010; Koenig-Lewis et al., 2010; Wessels & Drennan, 2010). Perceived security risk
of mobile financial services lies in the perception of potential harm due to electronic
fraud or hacker attacks. Perceived economic risk arises from the perception of possible
economic loss due to transaction error or faulty operation. Perceived functional risk lies
in the perception of possible lack of service reliability or accessibility.
2.2.3. Privacy concerns
Information privacy refers to the claim of ICT’s users to determine for themselves
when, how, and to what extent their information is communicated to others (Malhotra et al.,
2004), and privacy information concernsexhibit ICT users’ concern on what extent their
personal information to be disclosed (Li, 2011). Due to the differences in culture, regulatory
laws, past experiences, and personal characteristics, ICT’susers exhibit dissimilar degrees of
concerns on information privacy (Malhotra et al., 2004). The users with high levels of


10
privacy concerns believe that service providers generally tend to behave opportunistically
with their personal information. Therefore, in response to a request from securities firms for
personal information, the securities traders will likely to refuse to provide personal
information (Dinev & Hart, 2006) and/or to provide incorrect personal information (Teo et
al., 2004). From the UTAUT perspective, privacy concerns are viewed as usage inhibitors
(Bansal et al., 2010). Besides, Malhotra et al. (2004) indicated that privacy concerns of
Internet users including collection, control, and awareness in addition to the general concern
and specific concern proposed by Li (2011). Previous researches evidenced that privacy
concerns significantly influences perceived risk (Zhou, 2012, Junglas et al., 2008, Bansal et
al., 2010). Moreover, privacy concerns has significant effects on user adoption of instant
messaging (Lowry et al., 2011); web-based healthcare services (Bansal et al., 2010);
electronic health records (Angst & Agarwal, 2009); software firewalls (Kumar et al., 2008);
and ubiquitous commerce (Sheng et al., 2008).

2.3. Hypothesis development
Venkatesh et al.’s (2003) UTAUT is adopted as a primary theoretical framework to
examine securities investors’ acceptance of M-Trading. However, since the M-Trading
context differs in some ways from the traditional ICT context, not any single constructs of
UTAUT may fit the specific M-Trading’s context. Hence, it is necessary to integrate the risk
perceptions into the extended UTAUT model to propose our research model. Because MTrading in Vietnam is still in its infancy, as the matter of fact, there is very limited number of
securities investors having actually used this mobile application. Therefore, this study
considers behavioral intention to use M-Trading as a dependent variable, and excludes from
the proposed model two constructs pertaining to UTAUT, i.e. use behavior and experience.
The developer of UTAUT model also stated that “facilitating conditions” construct
becomes non-significant in predicting intention when both “performance expectancy”
construct and “effort expectancy” construct exist in the research model. Furthermore,
facilitating conditions reflect that users have ability and resources necessary to use MTrading (Venkatesh et al. 2003). This means securities traders need to be equipped with
mobile internet knowledge in order to use M-Trading, and need to pay communication fees
and service fees associated with that usage (Zhou, 2012). However, in the real settings of
Vietnam, only few securities investors have used M-Trading and brokerage firms are
providing its clients with this application on the fee-free basis, so facilitating conditions,
which is the antecedent of use behavior and has no significant association with behavioral
intention, is excluded from the research model. Besides, since this study is to investigate M-


11
Trading’s adoption in a voluntary usage context, the UTAUT’s moderating variable
“voluntariness” is also not included.
Extant researches on mobile-based financial services usage behavior have had
findings which showed that user’s concerns about risk issues are key determinants for the
adoption (Tai & Ku, 2013; Laukkanen & Kiviniemi, 2010; Luo et al., 2010). Perceived risk
is

regarded


as

a

person’s

awareness

of

prospective

uncertainty and

adverse

consequences of engaging in a given activity (Forsythe et al., 2006; Littler & Melanthiou,
2006; Bland et al., 2007 ; Im et al., 2008). In spite of perceiving the benefit of a given
service, people’s intention to adopt the service may be hesitant due to their perceived risks
with respect to service’s usage. M-Trading’s platform is an ICT artifact composed of mobile
Internet, mobile devices and mobile systems, so upon implementing a securities transactions
through mobile devices, some negative results including increased data entry errors;
electronic data interception and unstable wireless connections may be occurred while not
being found in other traditional formats. Securities investors’ intention to use M-Trading may
be impeded resulted from their perceptions of the risks.
Many previous studies employing UTAUT model found that privacy concerns
strongly impacts on perceived risk in general. While finding M-Trading’s adoption in
Taiwan, Tai & Ku (2013) specified perceived risks as security risk; economic risk; and
functional risk, and included in UTAUT model but failed to explore the relationship amongst

privacy concerns and these three types of risks. This research tries to fill the gap. Taking the
context in which M-Trading occurs into account, this study incorporates perceived risks and
privacy concerns of which influences the perceptions of risk, into UTAUT model to produce
a more precise explanation of the antecedent of securities investors’ adoption or resistance of
M-Trading.
2.3.1. Hypotheses Derived From UTAUT
In this study, behavioral intention is an endogenous variable. In M-Trading’s context,
this construct is conceptualized as the extents to which securities investors believe that MTrading will improve their transaction performance. Performance expectancy is defined as
the extent to which an individual believes that usage of certain ICT system will help improve
their performance (Venkatesh et al., 2003). Performance expectancy is the instrumental value
of using M-Trading such as the improvement of trading efficiency, the increment of
convenience in trading. Such benefits will influence the behavioral intention to use MTrading. Thus, the following hypothesis is proposed:
Hypothesis 1: Securities investors with high performance expectancy for M-Trading
will have greater behavioral intention to use it.


12
Effort expectancy is defined as the extent to which individuals believe that learning to
use a certain ICT system will not require significant effort (Venkatesh et al., 2003). Effort
expectancy of using M-Trading is the users’ evaluation of how much effort is required to
learn how to use and engage with the system. Therefore, behavioral intention to use MTrading is anticipated to increase if the investors believe that M-Trading is easy to handle.
Extant studies have broadly found that effort expectancy for using an ICT system is a
significant antecedent of behavior intention to use the ICT system (Venkatesh & Morris,
2000; Wang et al., 2009; Deng et al., 2011). Thus, the following hypothesis is proposed:
Hypothesis 2: Securities investors with high effort expectancy for M-Trading will
have greater behavioral intention to use it.
Social influence is defined as the degree to which an individual perceives that its
important peers expect his/her to employ a certain ICT system (Venkatesh et al., 2003).
Social influence is conceptualized as the extent in that securities investors are encouraged to
use M-Trading by their peers. Since M-Trading is still too new to be popularly used in

Vietnam, the users are only expected to be influenced by their peers’ perceptions of the
quality and capabilities of M-Trading. Moreover, usage intention indicates that users will
follow their experience, preference and external environment to collect information, evaluate
alternatives, and make usage decision (Zeithaml, 1988; Dodds et al., 1991). Prior studies have
found that social influence is an important predictor of usage intention to use a certain
information system (Baron et al. 2006; Wang et al. 2009). It is expected that people’s
behavioral intention to use a given ICT-based service is influenced by their peers’ opinion of
that service (Karahanna et al. 1999; Venkatesh & Davis, 2000). Thus, the following
hypothesis is proposed:
Hypothesis 3: Securities investors who perceive a high degree of positive social
influence (i.e., supportive of M-Trading) from their peers will have a greater behavioral
intention to use M-Trading.
2.3.2. Hypotheses Derived From Risk Perceptions
Tai & Ku (2013) proved three-facet perceived risks (i.e. security risk, economic risk,
and functional risk) positively influence behavioral intention to use M-Trading, and Dai et al.
(2014) also indicated multi-dimensional perceptions of risk are among the most critical
variables in the study of online shopping. In this study, security risk, economic risk, and
functional risk are investigated its effects on behavioral intention to use M-Trading in
Vietnam.
Security risk is securities traders’ perception of prospective harm caused by electronic
fraud or hacker attacks while using M-Trading. Security risk is found the main obstacle to the


13
adoption of mobile financial services and has been suggested being the greatest challenge to
the mobile financial service provider (Luarn & Lin, 2005; Misra & Wickamasinghe, 2004;
Mallat et al., 2008). Miyazaki & Fernandez (2001) identified security risk (i.e. potential
fraud, misrepresentation) as a key concern for Internet users. Previous researches have
indicated that many people believe that they are susceptible to identity theft while using
mobile financial services (Mallat, 2007; Wessels & Drennan, 2010). Thus, the following

hypothesis is proposed:
Hypothesis 4: Securities traders perceiving high security risk in M-Trading will have
less behavioral intention to use it.
Economic risk is investors’ perception of the possibility of economic loss due to
transaction error or incorrect operation when using M-Trading. Extant researchers found that
people resists using financially mobile-based services (Koenig-Lewis et al., 2010; Wessels &
Drennan, 2010; Hsu et al., 2011). Other than the traditional trading channels such as websitebased and telephone-based securities trading, while using M-Trading, data entry via small
touch screen with limited display resolution may bring about input errors and typos easily
made and difficult to detect. In addition, if using other formats, the investors or their
securities-brokers can manually verify the accuracy of the transaction information, in
contrast, rarely is such safeguards available in M-Trading system, leading to feelings of
uncertainty and fear. Thus, the following hypothesis is proposed:
Hypothesis 5: Securities investors who perceive a high economic risk for M-Trading
will have less behavioral intention to use it.
Functional risk is securities investors’ perceived possibility of service unavailability
or malfunction. Many researchers found that many people forgo using mobile financial
services due to concerns for such failures. Shen et al. (2010) and Wessels & Drennan (2010)
found that many people are frightened that there would have occurrence of a failure of
service systems or disconnection from the mobile Internet while conducting financial
transactions via mobile devices. Moreover, many resisters of system usage tend to suppose
that mobile devices, mobile operating systems and networks are intrinsically unstable and
worry that transactions may be interrupted, ceased, or delayed (Mallat et al., 2008; Cruz et
al., 2010; Koenig-Lewis et al., 2010). Thus, the following hypothesis is proposed:
Hypothesis 6: Securities investors who perceive a high functional risk for M-Trading
will have less behavioral intention to use it.
2.3.3. Hypotheses Derived From Privacy Concerns
Upon using M-Trading, users’ personal information (i.e., username, pass-code,
location, verified code, account number) needs signing up to log in the system. This



14
disclosure may arouse investors’ concern about their privacy. They may worry about their
mobile-based application developers’ practice on information collection, storage and usage.
For instance, the securities traders are doubtful about their personal information being shared
with other third parties without their prior approval or knowledge by the service providers,
and may be anxious about the potential losses associated with information disclosure, such as
information leakage and sales. Due to this concern, securities traders’ behavioral intention to
use M-Trading may be impeded. Extant researches (Bansal et al., 2010, Sheng et al., 2008,
Miyazaki & Fernandez, 2001) indicated this negative relationship between privacy concerns
and ICT’s behavioral intention. Hence, the following hypothesis is proposed:
Hypothesis 7: Securities investors with high privacy concerns in M-Trading will have
less behavioral intention to use M-Trading.
Noticeably, privacy concerns and security risk are indicated as two clearly distinct
constructs (Miyazaki &Fernandez, 2001; Román 2007; Román &Cuestas 2008, Riquelmi &
Román, 2014). However, there exists interactive influence on each other (Belanger et al.
2002, as cited in Riquelmi & Román, 2014; Schlosser et al. 2006; Hu et al. 2010). For
example, a high concern for personal information privacy would directly produce negative
attitudes toward the security of smart-phone application, and the securities investors who lack
knowledge about online security and the third party security identification would worry about
disclosing personal information during the process of mobile-based trading. Miyazaki &
Fernandez (2001) concluded that both privacy concerns and security risk are the major
obstacles in the development of online shopping. Accordingly, the following hypothesis is
proposed:
Hypothesis 8: Privacy concernsare positively correlated to security risk.
In addition, Malhotra et al. (2004) indicated that Internet users with a high degree of
information privacy concerns are likely to be high perceptions of risk. Nepomuceno et al.
(2012) indicated that the perceptions of risk are increased by privacy concerns when North
American households conduct purchases in an online environment. Other previous researches
have also indicated the effect of privacy concerns on perceived risks (Zhou, 2012; Eastlick et
al., 2006; Bansal et al., 2010). Thus, the following two hypotheses about multi-facet

perceived risks are proposed:
Hypothesis 9: Privacy concerns are positively correlated to economic risk.
Hypothesis 10: Privacy concerns are positively correlated to functional risk.
2.4. Conceptual model
Based on the hypotheses above, the below research model (Figure 2.4) is proposed
and evaluated empirically in M-Trading’s settings.


15
Privacy
Concerns
Performance
Expectancy

H7-

H1+

H4-

Effort
Expectancy

Social
Influence

H2+

H3+


Behavioral
Intention to use
M-Trading

Security
Risk

H8+

Economic
Risk

H9+

Functional
Risk

H10+

H5-

H6
-

Figure 2.4: Conceptual Model
2.5. Chapter summary
This chapter presents theoretical background of each concept in the model. Based on
discussion of literature review, behavioral intention to use M-Trading is affected by seven
factors, these are: performance expectancy, effort expectancy, social influence, security risk,
economic risk, functional risk and privacy concerns. Such factors are selected to build the

model because their relationship has already tested by many previous researchers through
their studies. Hence, there are ten hypotheses proposed for this research. The next chapter
will discuss methodology that used to analyze the data and test hypotheses of the research
model.


×