How to cite this paper
Alkhaffaf, M., Mofleh, M., Kandil, T., Almomani, H., Almajali, D & Almajali, H. (2024). Electronic payment acceptance model: A study on United Arab Emirates consumers.International Journal of Data and Network Science, 8(2), 881-892.
Refrences
Abrazhevich, D. (2001). Electronic payment systems: issues of user acceptance, in Stanford Smith, B., and Chiozza, E. (Eds), E-Work and E-Commerce, IOS Press, Amsterdam, pp. 354–360.
Alrafi, A. (2007). The technology acceptance model: a critical analysis regarding the managerial use of information and communication technology (ICT) (Doctoral dissertation, Leeds Metropolitan University).
Alshurideh, M. T., Al Kurdi, B., Masa’deh, R. E., & Salloum, S. A. (2021). The moderation effect of gender on accepting electronic payment technology: a study on United Arab Emirates consumers. Review of International Business and Strategy, 31(3), 375-396.
Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Prentice-Hall, Englewood Cliffs, NJ.
Bandura, A. (1997). Self-efficacy: The Exercise of Control, Freeman. New York, NY.
Bong, M., & Clark, R. E. (1999). Comparison between self-concept and self-efficacy in academic motivation research. Educational psychologist, 34(3), 139-153.
Bong, M., & Skaalvik, E. M. (2003). Academic self-concept and self-efficacy: How different are they? Educational psy-chology review, 15(1), 1-40.
Celik, V., & Yesilyurt, E. (2013). Attitudes to technology, perceived computer self-efficacy and computer anxiety as pre-dictors of computer supported education. Computers & Education, 60(1), 148-158.
Ceyhan, E. (2006). Computer anxiety of teacher trainees in the framework of personality variables. Computers in Human Behavior, 22(2), 207–220.
Chou, Y., Lee, C., & Chung, J. (2004). Understanding m-commerce payment systems through the analytic hierarchy pro-cess. Journal of business research, 57(12), 1423-1430.
Chua, S. L., Chen, D. T., & Wong, A. F. (1999). Computer anxiety and its correlates: a meta-analysis. Computers in human behavior, 15(5), 609–623.
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS quar-terly, 19(2), 189-211.
Cotteleer, M. J., Cotteleer, C. A., & Prochnow, A. (2007). Cutting checks: challenges and choices in B2B e-payments. Communications of the ACM, 50(6), 56-61.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theo-retical models. Management Science, 35(8), 982–1003.
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
Diamantopoulos, A., Siguaw, J. A., & Cadogan, J. W. (2008). Measuring abstract constructs in management and organiza-tional research: the case of export coordination. British Journal of Management, 19(4), 389-395.
Dory, V., Beaulieu, M., Pestiaux, D., Pouchanin, D., Gay, B., Rocher, G. and Boucher, L. (2009). The development of self-efficacy beliefs during general practice vocational training: an exploratory study. Medical Teacher, 31(1), 39-44.
Fatonah, S., Yulandari, A., & Wibowo, F. W. (2018, December). A review of e-payment system in e-commerce. In Journal of Physics: Conference Series (Vol. 1140, No. 1, p. 012033). IOP Publishing.
Flavian, C., & Guinaliu, M. (2006). Consumer trust, perceived security, and privacy policy: three basic elements of loyalty to a web site. Industrial Management and Data Systems, 106(5), 601-620.
Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Industrial management & data Systems, 106(5), 601-620.
Friedman, B., Kahn, P.H. Jr, & Howe, D.C. (2000). Trust online. Communications of the ACM, 43(12), 34–40.
Gefen, D. (2000). E-Commerce: the role of familiarity and trust. Omega: The International Journal of Management Sci-ence, 28(6), 725–737.
Gefen, D. (2003). TAM or just plain habit: a look at experienced online shoppers. Journal of Organizational and End User Computing, 15(3), 1–13.
Hair Jr, J. F., Hult, G. T. M., Ringle, C. M., Sarstedt, M., Danks, N. P., Ray, S., ... & Ray, S. (2021). An introduction to structural equation modeling. Partial least squares structural equation modeling (PLS-SEM) using R: a workbook, 1-29.
Hoffman, D.L., Novak, T.P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85.
Jarvenpaa, S.L., Tractinsky, J., & Vitale, M. (2000). Consumer trust in an internet store. Information Technology and Management, 1(1-2), 45-71.
Kalakota, R., & Whinston, A. B. (1997). Electronic commerce: a manager's guide. Addison-Wesley Professional.
Kanfer, R., & Heggestad, E. D. (1997). Motivation traits and skills: A person-centered approach to work motivation. Re-search in Organizational Behavior, 19, 1–56.
Kim, C., Tao, W., Shin, N., & Kim, K. S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic commerce research and applications, 9(1), 84-95.
Kousaridas, A., Parissis, G., & Apostolopoulos, T. (2008). An open financial services architecture based on intelligent mo-bile devices. Electronic Commerce Research and Applications, 7, 232–246.
Lee, J. H., Huh, Y. M., Jun, Y. W., Seo, J. W., Jang, J. T., Song, H. T., ... & Cheon, J. (2007). Artificially engineered mag-netic nanoparticles for ultra-sensitive molecular imaging. Nature Medicine, 13(1), 95–99.
Legris, P., Ingham, J., & Collerette, P. (2003). Why do people use information technology? A critical review of the tech-nology acceptance model. Information & Management, 40(3), 191-204.
Lim, A. S. (2008). Inter-consortia battles in mobile payments standardization. Electronic Commerce Research and Appli-cation, 7, 202–213.
Lim, B., Lee, H., & Kurnia, S. (2006). Why did an electronic payment system fail? A case study from the system provid-er's perspective. Available at: www.collecter2006.unisa.edu.au/ Paper%2011%20Benjamin%20Lim.pdf (accessed De-cember 14, 2009).
Lin, L. H., Lin, F. C., Lien, C. K., Yang, T. C., Chuang, Y. K., & Hsu, Y. W. (2023). Electronic Payment Behaviors of Con-sumers under Digital Transformation in Finance—A Case Study of Third-Party Payments. Journal of Risk and Finan-cial Management, 16(8), 346.
Linck, K., Pousttchi, K., & Wiedemann, D. G. (2006). Security issues in mobile payment from the customer viewpoint. In Proceedings of the 14th European Conference on Information Systems (ECIS, 2006), Goteborg, Schweden, 2006, 1–11.
Maddux, J. E. (Ed.). (2013). Self-efficacy, adaptation, and adjustment: Theory, research, and application. Springer Science & Business Media.
Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information systems research, 2(3), 173-191.
Mouakket, S. (2020). Investigating the role of mobile payment quality characteristics in the United Arab Emirates: impli-cations for emerging economies. International Journal of Bank Marketing, 38(7), 1465-1490.
Peha, J.M. and Khamitov, I.M. (2004). PayCash: a secure, efficient internet payment system. Electronic Commerce Re-search and Applications, 3(4), 381-388.
Shon, T. H., & Swatman, P. M. (1998). Identifying effectiveness criteria for Internet payment systems. Internet Research, 8(3), 202-218.
Stroborn, K., Heitmann, A., Leibold, K., & Frank, G. (2004). Internet payments in Germany: a classificatory framework and empirical evidence. Journal of Business Research, 57, 1431–1437.
Teoh, W. M. Y., Chong, S. C., Lin, B., & Chua, J. W. (2013). Factors affecting consumers’ perception of electronic pay-ment: an empirical analysis. Internet Research, 23(4), 465-485.
Tsiakis, T., Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers and Security, 24, 10–15.
Venkatesh, V., & Davis, F. D. (1996). A model of the antecedents of perceived ease of use: Development and test. Decision Sciences, 27(3), 451-481.
Yang, Y., Liu, Y., Li, H., & Yu, B. (2015). Understanding perceived risks in mobile payment acceptance. Industrial Man-agement & Data Systems, 115(2), 253-269.
Yousafzai, S.Y., Pallister, J.G., and Foxall, G.R. (2003), A proposed model of e-trust for electronic banking, Technovation, 23, 847-860.
Zhang, Z., & Jasimuddin, S. M. (2012). Knowledge market in organizations: incentive alignment and IT support. Industri-al management & data systems, 112(7), 1101-1122.
Zhou, T. (2011). The effect of initial trust on user adoption of mobile payment. Information Development, 27(4), 290-300.
Zimmerman, B. J. (1995). Self-efficacy and educational development. Self-efficacy in changing societies, 1(1), 202-231.
Alrafi, A. (2007). The technology acceptance model: a critical analysis regarding the managerial use of information and communication technology (ICT) (Doctoral dissertation, Leeds Metropolitan University).
Alshurideh, M. T., Al Kurdi, B., Masa’deh, R. E., & Salloum, S. A. (2021). The moderation effect of gender on accepting electronic payment technology: a study on United Arab Emirates consumers. Review of International Business and Strategy, 31(3), 375-396.
Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Prentice-Hall, Englewood Cliffs, NJ.
Bandura, A. (1997). Self-efficacy: The Exercise of Control, Freeman. New York, NY.
Bong, M., & Clark, R. E. (1999). Comparison between self-concept and self-efficacy in academic motivation research. Educational psychologist, 34(3), 139-153.
Bong, M., & Skaalvik, E. M. (2003). Academic self-concept and self-efficacy: How different are they? Educational psy-chology review, 15(1), 1-40.
Celik, V., & Yesilyurt, E. (2013). Attitudes to technology, perceived computer self-efficacy and computer anxiety as pre-dictors of computer supported education. Computers & Education, 60(1), 148-158.
Ceyhan, E. (2006). Computer anxiety of teacher trainees in the framework of personality variables. Computers in Human Behavior, 22(2), 207–220.
Chou, Y., Lee, C., & Chung, J. (2004). Understanding m-commerce payment systems through the analytic hierarchy pro-cess. Journal of business research, 57(12), 1423-1430.
Chua, S. L., Chen, D. T., & Wong, A. F. (1999). Computer anxiety and its correlates: a meta-analysis. Computers in human behavior, 15(5), 609–623.
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS quar-terly, 19(2), 189-211.
Cotteleer, M. J., Cotteleer, C. A., & Prochnow, A. (2007). Cutting checks: challenges and choices in B2B e-payments. Communications of the ACM, 50(6), 56-61.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theo-retical models. Management Science, 35(8), 982–1003.
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
Diamantopoulos, A., Siguaw, J. A., & Cadogan, J. W. (2008). Measuring abstract constructs in management and organiza-tional research: the case of export coordination. British Journal of Management, 19(4), 389-395.
Dory, V., Beaulieu, M., Pestiaux, D., Pouchanin, D., Gay, B., Rocher, G. and Boucher, L. (2009). The development of self-efficacy beliefs during general practice vocational training: an exploratory study. Medical Teacher, 31(1), 39-44.
Fatonah, S., Yulandari, A., & Wibowo, F. W. (2018, December). A review of e-payment system in e-commerce. In Journal of Physics: Conference Series (Vol. 1140, No. 1, p. 012033). IOP Publishing.
Flavian, C., & Guinaliu, M. (2006). Consumer trust, perceived security, and privacy policy: three basic elements of loyalty to a web site. Industrial Management and Data Systems, 106(5), 601-620.
Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Industrial management & data Systems, 106(5), 601-620.
Friedman, B., Kahn, P.H. Jr, & Howe, D.C. (2000). Trust online. Communications of the ACM, 43(12), 34–40.
Gefen, D. (2000). E-Commerce: the role of familiarity and trust. Omega: The International Journal of Management Sci-ence, 28(6), 725–737.
Gefen, D. (2003). TAM or just plain habit: a look at experienced online shoppers. Journal of Organizational and End User Computing, 15(3), 1–13.
Hair Jr, J. F., Hult, G. T. M., Ringle, C. M., Sarstedt, M., Danks, N. P., Ray, S., ... & Ray, S. (2021). An introduction to structural equation modeling. Partial least squares structural equation modeling (PLS-SEM) using R: a workbook, 1-29.
Hoffman, D.L., Novak, T.P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85.
Jarvenpaa, S.L., Tractinsky, J., & Vitale, M. (2000). Consumer trust in an internet store. Information Technology and Management, 1(1-2), 45-71.
Kalakota, R., & Whinston, A. B. (1997). Electronic commerce: a manager's guide. Addison-Wesley Professional.
Kanfer, R., & Heggestad, E. D. (1997). Motivation traits and skills: A person-centered approach to work motivation. Re-search in Organizational Behavior, 19, 1–56.
Kim, C., Tao, W., Shin, N., & Kim, K. S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic commerce research and applications, 9(1), 84-95.
Kousaridas, A., Parissis, G., & Apostolopoulos, T. (2008). An open financial services architecture based on intelligent mo-bile devices. Electronic Commerce Research and Applications, 7, 232–246.
Lee, J. H., Huh, Y. M., Jun, Y. W., Seo, J. W., Jang, J. T., Song, H. T., ... & Cheon, J. (2007). Artificially engineered mag-netic nanoparticles for ultra-sensitive molecular imaging. Nature Medicine, 13(1), 95–99.
Legris, P., Ingham, J., & Collerette, P. (2003). Why do people use information technology? A critical review of the tech-nology acceptance model. Information & Management, 40(3), 191-204.
Lim, A. S. (2008). Inter-consortia battles in mobile payments standardization. Electronic Commerce Research and Appli-cation, 7, 202–213.
Lim, B., Lee, H., & Kurnia, S. (2006). Why did an electronic payment system fail? A case study from the system provid-er's perspective. Available at: www.collecter2006.unisa.edu.au/ Paper%2011%20Benjamin%20Lim.pdf (accessed De-cember 14, 2009).
Lin, L. H., Lin, F. C., Lien, C. K., Yang, T. C., Chuang, Y. K., & Hsu, Y. W. (2023). Electronic Payment Behaviors of Con-sumers under Digital Transformation in Finance—A Case Study of Third-Party Payments. Journal of Risk and Finan-cial Management, 16(8), 346.
Linck, K., Pousttchi, K., & Wiedemann, D. G. (2006). Security issues in mobile payment from the customer viewpoint. In Proceedings of the 14th European Conference on Information Systems (ECIS, 2006), Goteborg, Schweden, 2006, 1–11.
Maddux, J. E. (Ed.). (2013). Self-efficacy, adaptation, and adjustment: Theory, research, and application. Springer Science & Business Media.
Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information systems research, 2(3), 173-191.
Mouakket, S. (2020). Investigating the role of mobile payment quality characteristics in the United Arab Emirates: impli-cations for emerging economies. International Journal of Bank Marketing, 38(7), 1465-1490.
Peha, J.M. and Khamitov, I.M. (2004). PayCash: a secure, efficient internet payment system. Electronic Commerce Re-search and Applications, 3(4), 381-388.
Shon, T. H., & Swatman, P. M. (1998). Identifying effectiveness criteria for Internet payment systems. Internet Research, 8(3), 202-218.
Stroborn, K., Heitmann, A., Leibold, K., & Frank, G. (2004). Internet payments in Germany: a classificatory framework and empirical evidence. Journal of Business Research, 57, 1431–1437.
Teoh, W. M. Y., Chong, S. C., Lin, B., & Chua, J. W. (2013). Factors affecting consumers’ perception of electronic pay-ment: an empirical analysis. Internet Research, 23(4), 465-485.
Tsiakis, T., Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers and Security, 24, 10–15.
Venkatesh, V., & Davis, F. D. (1996). A model of the antecedents of perceived ease of use: Development and test. Decision Sciences, 27(3), 451-481.
Yang, Y., Liu, Y., Li, H., & Yu, B. (2015). Understanding perceived risks in mobile payment acceptance. Industrial Man-agement & Data Systems, 115(2), 253-269.
Yousafzai, S.Y., Pallister, J.G., and Foxall, G.R. (2003), A proposed model of e-trust for electronic banking, Technovation, 23, 847-860.
Zhang, Z., & Jasimuddin, S. M. (2012). Knowledge market in organizations: incentive alignment and IT support. Industri-al management & data systems, 112(7), 1101-1122.
Zhou, T. (2011). The effect of initial trust on user adoption of mobile payment. Information Development, 27(4), 290-300.
Zimmerman, B. J. (1995). Self-efficacy and educational development. Self-efficacy in changing societies, 1(1), 202-231.