ArticlePDF Available

Use of mobile wallet among consumers: underlining the role of task-technology fit and network externalities

Authors:
  • P P Savani University
  • V. M. Patel Institute Of Management, Ganpat University, Mehsana, Gujarat, India.

Abstract and Figures

Research on mobile payments is emerging as a separate research area in information systems. Previous literature indicates that existing theoretical models do not extend the empirical inquiry into technology fitment domain to understand the user behaviour better. Integration of users’ requirement of technology, with network externalities, risk, trust, and promotion, was done to check mobile wallet usage of Gujarat’s users. To empirically test the hypothesised model, a total of 500 samples were collected using online and offline structured survey. Structural equation modelling technique was performed. The findings of the study indicate that all the hypotheses were supported and it has theoretical and managerial implications.
Content may be subject to copyright.
544
I
nt. J. Business Information Systems, Vol. 37, No. 4, 2021
Copyright © 2021 Inderscience Enterprises Ltd.
Use of mobile wallet among consumers:
underlining the role of task-technology fit
and network externalities
Chinmay Baxi*
Faculty of Management Studies,
V.M. Patel Institute of Management,
Ganpat University,
Email: chinmay.baxi@gmail.com
*Corresponding author
Jayesh D. Patel
V.M. Patel Institute of Management,
Ganpat University, India
Email: Jayesh.patel@ganpatuniversity.ac.in
Email: jayesh.jd@gmail.com
Abstract: Research on mobile payments is emerging as a separate research
area in information systems. Previous literature indicates that existing
theoretical models do not extend the empirical inquiry into technology fitment
domain to understand the user behaviour better. Integration of users’
requirement of technology, with network externalities, risk, trust, and
promotion, was done to check mobile wallet usage of Gujarat’s users. To
empirically test the hypothesised model, a total of 500 samples were collected
using online and offline structured survey. Structural equation modelling
technique was performed. The findings of the study indicate that all the
hypotheses were supported and it has theoretical and managerial implications.
Keywords: mobile wallet; network externality; structural equation modelling;
SEM; task-technology fit; TTF.
Reference to this paper should be made as follows: Baxi, C. and Patel, J.D.
(2021) ‘Use of mobile wallet among consumers: underlining the role of
task-technology fit and network externalities’, Int. J. Business Information
Systems, Vol. 37, No. 4, pp.544–563.
Biographical notes: Chinmay Baxi is a Research scholar at Ganpat University,
V.M. Patel Institute of Management Studies, Faculty of Management Studies.
He is an Assistant Professor at V.M. Patel College of Management Studies,
Gujarat India. His research domain is information system and technology
adoption.
Jayesh D. Patel is an Associate Professor at Ganpat University, V.M. Patel
Institute of Management, MBA Department, Gujarat, India. He has published
research papers in the Journal of Cleaner Production, Marketing Intelligence
and Planning, and other reputed journal in the domain of marketing. He is a
recipient of ‘Journal of Service Management: 2015 Highly Commended
Award’ by Emerald Literati Network. He is an ad-hoc reviewer of JBR, JJRCs,
MIP, IJoEM, JCP, and APJML (Emerald Publishing).
Use of mobile wallet among consumers 545
1 Introduction
In the recent past, the payment mechanism has changed from coins to paper money to
plastic cards (Shah et al., 2016). The digital payment system is making the big wave for
the retail market and especially the mobile wallet has gained attention more in all
economies (Kumar and Venkatesan, 2019). Mobile wallet is a technology which resides
in the mobile phone or PDA of a user, which enable users to make the payment as an
alternative to the conventional payment method (Kumar et al., 2019). Penetration of
mobile phone has increased the availability of ‘mobile wallet’ among users. Such
penetration has increased the number of players who can provide mobile wallet services
to consumers.
As per the report from CIOL.com, “Wallet365.com was considered to the first mobile
wallet of India.” Wallet365.com was launch in the year 2006. As on today, approximately
more than 50 mobile wallet service providers are available in India. Increased number of
mobile wallet service providers is one of the indicators, which shows that the adoption of
a mobile wallet is increasing and mobile wallet industry is on the path of achieving its
‘critical mass’ becoming cashless (Venkatraman, 2008). Despite the growing pace of
mobile wallet adoption, does adoption has boosted the usage of the mobile wallet or what
are the factors which drive the usage of mobile wallet are the key research questions.
In the literature of technology adoption from an information systems perspective,
three theories are widely used to check the adoption drivers. These theories are TAM,
UTAUT and IS success. These theories emphasised in adoption, not on the use of
technology. Mobile wallet is a facility which falls under voluntary user, in a similar
context UTAUT was empirically tested and affirm the applicability of UTAUT in the
voluntary environment (Maity et al., 2019). In order to check the use of technology, a
task-technology fit (TTF)-based theoretical model is used along with other constructs
from different theoretical models (Klopping and McKinney, 2004; Shih and Chen, 2011;
Parkes, 2013). Mobile wallet adoption is in the process of reaching its critical mass,
therefore it is important to integrate and theorised network externalities construct with
TTF.
Use behaviour is the central point of research across information systems researchers.
Studied conducted to check the behaviour intention which influences the use behaviour
indicated that, behaviour intention should lead to use behaviour (Fishman et al., 2012).
Earlier studies of technology adoption largely check the behaviour intention to adopt
technology, as there are intended toward knowing driving factors for technology adoption
(David, 1989). Simply, behaviour intention can be a driving factor toward that
individual’s actual behaviour (Shin, 2009). It is argued that the intention to use a system
can largely explain a portion of a user’s actual system usage (Venkatesh et al., 2003).
Due to the growing popularity of mobile wallet, it is very interesting to understand
the effect of user networks using network externalities (Lin and Bhattacherjee, 2008) on
the use behaviour. Considering IS adoption behaviour, user network plays a critical role
in driving the adoption forward. However, the extent that IS researches has paid the
attention to network externalities and its size is under investigation (Sarkar and Khare,
2018; Grover and Kar, 2018). Therefore, the purpose of the study is to investigate the
extent of influence of TTF and network externalities on mobile wallet use behaviour.
The remaining part of the paper organised as follows. The research background,
theoretical foundation, and hypothesis development is presented in Section 2, and
546 C. Baxi and J.D. Patel
research methodology is presented in Section 3 followed by data analysis using structural
equation modelling (SEM) (Section 4). Discussion, implications, and limitations are
presented in Section 5 and Section 6.
2 Research background and theoretical foundation
With an increased number of technologies available to perform the task create the
confusion and may not provide desired results to the individual. Aligning the technology
with the task required ‘fitment’ between technology and task, which generate desired
output. Existing literature provided empirical validation of how such fitment affects the
performance of the individual (Lu and Yang, 2014; Tam and Oliveira, 2016).
2.1 Task-technology fit
TTF is referred to as a match between users’ task needs of technology and the available
functionality of the technology. TTF application focuses on the outcome of individual
performance which attributed to the actual use of technology. Goodhue and Thompson
(1995) opined that users will use that technology which suffices their requirement to
carry out their task efficiently and generate the desired output. Actual use of information
system greatly depends on the fitment between task and technology (Goodhue and
Thompson, 1995; Oliveira et al., 2014). On dimensionality perspective, Parkes (2013)
explained that TTF considers two dimensions: task characteristics and technical
characteristics which create task-technology fitment having an impact on utilisation and
performance of individuals.
According to Osang (2015), fitment between TTF is one of the key success factors
which predict the use behaviour. “Utilization is a complex outcome, based on many other
factors besides fit (such as habit, social norms, and other situational factors), the fit model
can benefit from the addition of this richer understanding of utilization and its impact on
performance” [Goodhue and Thompson, (1995), p.5]. Limited view of TTF restricted the
predictive ability of theoretical models which explain the use of technology (Lu et al.,
2014).
TTF was tested for e-commerce adoption among undergraduate students of the USA
to increase the explanatory power of the model which has a specific impact on the ease
of use (Klopping and McKinney, 2004). TTF influenced the use of location-based
information system, and also the performance of users (Junglas and Watson, 2008).
Balance fit between the user’s task and technology has a positive impact on performance
and imbalance fit between task and technology will have a negative impact on
performance (Parkes, 2013). TTF was integrated with TAM to check the m-commerce,
the study found that TTF positively influences the behaviour intention to adopt
m-commerce (Alqatan et al., 2017) is one of the in mobile application context, Alqatan
et al. (2019) integrated TTF with acceptance of m-commerce application used by tourism
firms. Similarly, it was believed that performance expectancy of mobile wallet use is
significantly influenced by TTF. Based on this, it is hypothesised that:
H1 TTF influence use behaviour of mobile wallet consumers.
Use of mobile wallet among consumers 547
2.2 Network externalities
Theory of network externalities proposed by Katz and Shapiro (1985) was originally
rooted in economics and social sciences. This variable was tested widely in marketing
and information systems literature. Network externalities capture how consumers get an
advantage when the adoption of product or behaviour under consideration is increased
from a few users to masses. Considering the wide penetration potential, companies are
more motivated to provide new features, functionality and value-added services. Mobile
wallet is one such service or behaviour which is in the process of reaching the mass of
people, and therefore this variable received great attention to include in understanding
behavioural formation.
Kats and Shapiro (1985) operationalised network externalities as a combination of
referent network size and perceived complementary of that product and services,
capturing direct and indirect mode of measurement. Direct network externalities derived
value form the number of users who consume the same product or service. Indirect
network externalities derived the value to consumer from the adoption of compatible
product or services by the consumer. Srinivasan et al. (2004) have said that network
externality plays an increasingly important role in the economy, and it has significant
implications on the firm’s marketing strategies. The finding of study contributes to
building the new dimension of in theory of marketing strategy. The literature of
marketing consistently found that network externality can alter the consumer behaviour
(Economides, 1996; Strader et al., 2007; Zho and Lu, 2011; Qasim and Abu-Shanab,
2016).
The literature further indicated that network externalities impact market structure
(Frels et al., 2003). The literature on information systems has empirically tested
network externalities to examine behaviour intention and user behaviour. An empirical
investigation of inter-organisational blogs argued that network externalities affect user
adoption and use of technology (Wattal et al., 2010). A study conducted to check the
instant messaging behaviour used network externalities as a core construct and found
significant predictability in behaviour intention of users (Lin and Bhattacherjee, 2008).
Denmark-based Carton et al. (2012) study concluded that network externalities play a
major role for users to adopt online payment. Strader et al. (2007) examined the use of
behaviour of consumer for electronic communication. A recent study conducted to check
the user satisfaction for using a mobile application and found that network externalities
have a significant influence on over the user’s perceived benefit (Hong et al., 2017).
Research conducted in China measuring the usage intention and user satisfaction for
mobile internet messaging has found that network externalities influence the usage
intention significantly (Kim et al., 2017). Based on the above mention literature, we are
proposing:
H2 Network externalities influence the use behaviour of mobile wallet consumers.
2.3 Trust
In the literature, trust has been defined from multiple perspectives (Lee and Kim, 1999).
A general understanding of trust is when people show faith or belief in others and adopt
trusting stand toward others (McKnight and Chervany, 2001). Disposition of trust is
people’s general tendency to trust someone is an indication of his/her personality trait
548 C. Baxi and J.D. Patel
(Hsiao et al., 2010) when they have higher confidence, reliability, and integrity among
themselves (Morgan and Hunt, 1994). Trust also played a central role in exchanging
relationships involving unknown risks (Jarvenpaa et al., 1999; Gefen et al., 2003).
According to Alzaidi and Qamar (2018), trust is a significant factor for mobile banking
adoption.
In the domain of information systems, trust has been widely studied construct (Mayer
et al., 1995). Trust is significantly associated with the consumer’s intention to adopt
mobile banking and mobile commerce (Lee and Dawes,, 2005; Kim and Jones, 2009). A
study conducted to check the behaviour intention to adopt e-commerce in the B2C
segment has found that the trust holds 34%–37% variance of consumer intention to
purchase a product online (Gefen et al., 2003). Trust became an inherent factor for
mobile banking users as mobile banking has an inherent element of risk (Kim and
Hwang, 2012; Nor and Pearson, 2007).
Trust was further investigated by various researchers from various contexts (Teo
et al., 2012; Chandra et al., 2010). Perceived trust in the payment systems critically
impacts the behaviour intention to adopt mobile payment (Teo et al., 2015; Yang et al.,
2015). For mobile payment services, trust was the most important predictor of behaviour
intention (Thatcher and Patel, 2011; Zhou, 2014).
A study conducted to check Vietnamese consumer’s behavioural intention to use
mobile payment has to use two most prominent theoretical modal TAM and TPB. The
researcher has added the trust construct into the conceptual model to check weather trust
influence the behaviour intention or not. The study has found that perceived trust is the
strongest influence on behaviour intention to adopt mobile payment (Cao et al., 2016;
Shaw, 2014; Chatterjee and Bolar, 2019; Chopra, 2019). In fact, Matemba and Li (2018)
showed that trust was a key predictor of willingness and use of consumers for WeChat
Wallet – people to people services. Based on the above mention literature, we are
proposing that:
H3 Trust influences the use of behaviour of mobile wallet consumers.
2.4 Risk
Risk measures the beliefs of the uncertainty regarding possible negative consequences.
Risk in online transaction context is feeling insecurity in making payment. It is a
multi-dimensional construct, there are five types of risk which are identified on the
domain mobile banking context (Chen, 2013). The risk associated with a product or
service has gained significance in consumer research on innovations (Mitchell, 1999;
Lim, 2003; Schierz et al., 2010). Security-related concern is one of the factors which
negatively effect the adoption of mobile banking (Alzaidi and Qamar, 2018). Privacy
related concerns are one of the major factors among users of electronic users. Electronic
services are characteristically more challenging to use thus perceived as more risky
(Mitchell, 1999; Gefen et al., 2003). Mobile payment is involved in the financial
transaction so consumers feel the risk of making a loss or losing money while making a
digital transaction (Bauer et al., 2005). A study conducted by Lu et al. (2011) found that
risk has a negative impact on user behaviour. Similar findings were reported in various
studies conducted in China, Brazil and Bangkok (Cruz et al., 2010; Sripalawat
et al., 2011; Yao and Zhong, 2011) reported by Thakur and Srivastava (2014). Specific to
Use of mobile wallet among consumers 549
m-wallet, the risk was also found to be negatively related to use behaviour (Singh et al.,
In press). Based on the above mention literature, we are proposing:
H4 Risk negatively influences use behaviour of mobile wallet consumers.
2.5 Promotion
Over the last few years, promotion construct is being studied extensively, which suggests
that promotion has a positive impact on behaviour intention to use the product or service.
Kotler (2009, p.661) defined promotion as “a diverse collection of incentive tools,
mostly, short-term, designed to stimulated the quicker and greater purchase of particular
product/service by consumers.” In marketing literature, cash-based promotion and
product-base promotion were the main approaches to stimulate behaviour (Chen et al.,
2012). The mobile wallet provides the cash-based promotional offer as it is related to the
financial transaction of the consumer. A study conducted to understand consumer
behaviour in web-based commerce found that promotion plays an influential role in
consumer behaviour (Koufaris et al., 2001). The similar study argued that consumer
purchases a product because of promotional offers on that product (Koufaris et al., 2011).
The promotion also influenced the buying behaviour of consumer across all gender and
all age group (Chen et al., 2012). Based on the above mention literature, we are
proposing:
H5 Promotion influence use behaviour of mobile wallet consumers.
Based on the above discussion, a research model was proposed consisting use behaviour
as the dependent variable and TTF, network externalities, trust, risk and promotion as
independent variables (Figure 1).
Figure 1 Research model
H
5
H
4
H
3
H
2
H
1
Use
behaviour
Task-technology
fit
Network
externalities
Risk
Trust
Promotion
550 C. Baxi and J.D. Patel
3 Research methodology
3.1 Instrument development process
Ideal sample for this study was consumers who have installed the mobile wallet. The
scale items for the construct TTF was adopted from TTF construct we adopted from
Klopping and McKinney (2004), and Larsen et al. (2009). The scale of user behaviour
was adopted from studies of Venkatesh and Bala (2008) and Venkatesh et al. (2012).
Scale for network externalities were adopted from Lin and Lu (2011) and Kim et al.
(2017). Items from the trust construct were adopted from Gefen et al. (2003) and Wang et
al. (2015) studies. All items of risk were adopted from Featherman and Pavlou (2003)
and Martins et al. (2014). All items for promotion construct were adopted from Yoo et al.
(2000). Sequence and wording of items were changed to capture contextually of study.
All items were measured on five-point Likert-type scale ranging from 1 to 5, where 1 is
‘strongly disagree’ and 5 ‘strongly agreeing’. There were four demographic questions
(age, gender, education and occupation) included in this structured questionnaire. Age
was measured in years. Gender was measured on a nominal scale where 1 represented
male and 2 represent female. Behaviour intention responses were captured on an actual
basis. A pilot study was carried out to among 20 users to get the input from the
respondents. Changes sought after the pilot study was amended in the instrument for the
analysis sample.
Table 1 Sample characteristics (n = 450)
Variable Frequency Percentage (%)
Gender
Male 257 57
Female 193 43
Age (years)
18–24 299 66
26–34 93 21
35–40 35 8
Above 41 23 5
Education
Up to schooling 135 30
Graduation 161 36
Postgraduation and above 154 34
Occupation
Student 311 69
Government service 28 6
Private service 62 14
Business 26 6
Self-employed 20 4
Pensioner and others 3 1
Use of mobile wallet among consumers 551
3.2 Sample selection
Data were collected through an online and offline survey in the state of Gujarat. After
removing the missing values from the respondents using series mean analysis, a total of
450 usable samples were obtained for further analysis. The overall response rate was well
within the acceptance range for both techniques (Zikmund et al., 2017). Table 1
demonstrated the sample composition used in this study. There were 435 female
respondents and 57 were male respondents. Age wise, 66% of the respondents (n = 299)
were between the age group of 18–24 years, and 21% were between the age group of 26–
34 years. Overall, all the participants were between 18 and 56 years of age. Considering
the education of respondent, 30% of respondents opted to school education, 36% of
respondents were graduates, and the remaining 34% of the respondents were
postgraduates. Occupation wise, 69% respondents were students, 14% of respondents
working in the private sector, 6% were government employee, 6% had their own business
and remaining and 5% were self-employed.
4 Data analysis
According to Oliveria et al. (2016), SEM is a technique for estimating causal relations
applying a combination of statistical data and qualitative causal hypothesis. Earlier
researchers have recognised the potential of SEM in distinguishing measurement and
structural models, and taking measurement error into consideration (Henseler et al.,
2009). AMOS version 20 was used to perform SEM as it gives multiple indicators of
latent variables (Schierz et al., 2010). The statistical tool SPSS 22.0 was used to evaluate
the reliability and validity of the study construct. By using the confirmatory factor
analysis (CFA), effective questionnaire items were chosen for their strong reliability and
validity in this study.
4.1 Reliability and validity
To assess the reliability of the scale, it was important to compute Cronbach’s coefficient
alpha and the computed values were all above 0.7, showing the reliable measurement of
scales in the instrument. Further to assess the validity of the construct, CFA was carried
out on TTF, network externalities, promotion, and trust, risk and use behaviour to check
convergent and discriminant validity. Table 2 indicated the result of reliability and
convergent validity. Standardised loading of all the variables was significant (p < 0.05)
and above 0.5. The average variance extracted values of each construct were above 0.5
and composite reliabilities were above 0.7 that indicates the establishment of construct
validity (Fornell and Larcker, 1981). Table 3 indicates that the square root of AVE values
shown in diagonal were more than inter-construct correlations. This was evidence
showing discriminant validity was established (Fornell and Larcker, 1981).
CFA was carried out to check the validity of the measurement model. In each stage,
the maximum likelihood estimation (MLE) method was employed (Byrne, 2001). All the
indicators of model were having acceptable values (χ2 = 1,214.60, χ2 / df = 2.525,
df = 481, p < 0.001, GFI = 0.861, AGFI = 0.838, TLI = 0.907, CFI = 0.915 and RMSEA
= 0.058) (Han et al., 2011). We established quality and adequacy of measurement
552 C. Baxi and J.D. Patel
through CFA by ensuring reliability, convergent and discriminant validity, the causal
relationships in the structural model were further tested through path modelling.
Table 2 Scale reliabilities
Variables Items Standardised estimates
Cronbach
α
CR AVE
Task-technology
fit
TTF5 0.73 0.89 0.90 0.56
TTF6 0.69
TTF7 0.74
TTF8 0.81
TTF9 0.81
TTF10 0.77
TTF11 0.67
Network
externalities
NE2 0.73 0.80 0.80 0.51
NE3 0.75
NE4 0.70
NE5 0.67
Promotion PRO1 0.71 0.88 0.88 0.60
PRO2 0.86
PRO3 0.87
PRO4 0.82
PRO5 0.59
Trust TR1 0.80 0.83 0.89 0.57
TR2 0.84
TR3 0.87
TR4 0.73
TR5 0.67
TR6 0.54
Risk RI1 0.71 0.86 0.91 0.59
RI2 0.80
RI3 0.80
RI4 0.81
RI5 0.79
RI6 0.69
RI7 0.70
User behaviour UB1 0.76 0.89 0.89 0.66
UB2 0.84
UB3 0.86
UB4 0.79
Use of mobile wallet among consumers 553
Table 3 Discriminant validity of scales
Construct UB PRO TTF TRUS NET_EX RISK
Use behaviour (UB) 0.815
Promotion (PRO) 0.269 0.777
Task-technology fit (TTF) 0.527 0.411 0.749
Trust (TURS) 0.494 0.343 0.612 0.753
Network externalities (NET_Ex) 0.428 0.360 0.501 0.473 0.712
Risk (RISK) –0.306 –0.070 –0.346 –0.349 –0.219 0.766
4.2 Testing of the structural model
The structural model was estimated on all independent variables (performance
expectancy, effort expectancy, facilitating condition, social influence, hedonic
motivation, TTF and cost) with use behaviour. Proposed hypothesis depicted in the
structural model (Figure 2) was tested using SEM technique in the AMOS. MLE was
used to estimate the coefficients. Standardised path coefficients were measured using
model fit indices. Model fit indices were χ2 = 1,062.62, χ2 / df = 2.237, p < 0.001,
df = 475, GFI = 0.877, AGFI = 0.855, TLI = 0.925, CFI = 0.932 and RMSEA = 0.052,
meeting the acceptable limits. This indicates that all the hypothesised structured model
has an acceptable fit (Han et al., 2011).
Figure 2 Structural model
R
2
= 0.36
NS
–0.10*
0.20*
0.17*
0.29*
Use
behaviour
Task-technology
fit
Network
externalities
Risk
Trust
Promotion
Notes: *p < 0.01.
: Significant.
: Not significant.
554 C. Baxi and J.D. Patel
The model’s explanatory power was 36% indicating that five independent variables were
able to explain 36% variation in use behaviour. TTF, network externalities, trust, and risk
were found to be statistically significant in explaining use behaviour. Table 4 outlined the
standardised coefficient estimates and concerned probability values. Findings pointed out
that relationship between TTF and use behaviour (
β
= 0.29, t = 4.545, p < 0.01), between
trust and use behaviour (
β
= 0.20, t = 3.108, p < 0.01), network externalities and use
behaviour (
β
= 0.17, t = 2.82, p < 0.01) was found positive and significant. Moreover,
the relationship between risk and use behaviour (
β
= –0.1, t = –1.964, p < 0.01) was
found negative and statistically significant. While the promotion was found to be a
non-significant predictor of use behaviour (p > 0.05).
Table 4 Standardised coefficients and t-value of model
Paths Coefficients (
β
) t-value Hypothesis supported
TTF UB (+) 0.29 4.454* Yes
Network externalities UB (+) 0.17 2.822* Yes
Trust UB (+) 0.20 3.108* Yes
Risk UB (–) –0.10 –1.964* Yes
Promotion UB (+) 0.00 –0.062 No
Note: *p < 0.05.
5 Discussion and implications of the study
This study aimed to develop the theoretical model to understand the use behaviour of
mobile wallet consumers. As mentioned by Maruping et al. (2017), theory building
process in the domain of information system required new direction by incorporating
theories from the different domain. As a part of the model development process, the TTF
model was extended by integrating network externalities, promotion, trust and risk. The
study attempted to test two dominant theories from two different domains empirically.
We have added theory of externalities which is the dominant theory of economics with
TTF by extending the studies such as Liu et al. (2014) and Yuan et al. (2019). The model
was well supported by data. The results of the study found that all these constructs (TTF,
network externalities, trust and risk) predict use behaviour for mobile wallet consumers
except promotion.
One of the major contributions of the study to IS research is extending the TTF by
providing a theoretical model which exclusively predicts use behaviour directly. Earlier
findings are restricted toward to predict the behaviour intention (citation). The second
contribution is to integrating two most important construct into the TTF and provided
modified TTF which predict the use behaviour instead of behaviour intention. The third
contribution of this paper responds to the call for a new direction for information research
(Venkatesh et al., 2016a). A general contribution is that this paper served an example of
integrating construct of other dominant streams of theories, and contributes to the
development of theory in the domain of information system. General contribution, the
model will provide a new direction to expand the TTF model as a future model to
measure the use of behaviour and it can become the dominant model in IS research.
Use of mobile wallet among consumers 555
In the domain of information system research TAM, UTAUT-based research model
has reached to its peak, considering the trend, new direction of research is required as
suggested by Venkatesh et al. (2016b), the author argues that there are eight new
dimensions in which theory building in information systems reach should focus. One of
the dimensions is to find a new construct which explains adoption and use of technology.
The second dimension was to integrate theories of other domain to expand the body of
knowledge of information system. Considering the above-mentioned argument, we have
provided a new theoretical model which provides gives direction to information systems
theory building.
The current study is consistent with the results of Tam and Oliveira (2016), who
established the relationship with TTF and use behaviour have found that it plays a
positive and important role in improving the performance of the individual. Our study
finds that mobile wallet providers need to works on understanding the task related
requirement which improve the performance of the individual (Khan et al., 2018). The
government initiative of digital India has understood the needs of consumers and
provided the needed support by launching a mobile wallet like BHIM. Users will not
use those technologies which will not improve the performance or effectiveness of
technology (Yadegaridehkordi et al., 2016).
For example Paytm and phone pay, both are the dominant player of mobile wallet,
phone pay have integrated QR code which provides convince to user to pay directly from
the users bank account, so that users do not need to worry about keeping money in the
mobile wallet and while in the case of Paytm these feature is not integrated fully.
Trust was another construct which shows a positive impact on user behaviour, similar
to earlier studies in IS research (Shaw, 2014; Chatterjee and Bolar, 2019; Chopra, 2019).
If consumers do not have any feeling of insecurity, they can trust the mobile wallet
services providers more. M-wallet companies can enhance the trust perception by
providing the correct information about their transaction on time, which increase
continuous usage of the mobile wallet.
In the current study, the risk is negatively influencing the use behaviour, as trust is
already built so the feeling of insecurity is gone. Similar findings are reported by Shaw
and Sergueeva (2019) and Dwivedi et al. (2017). Mobile wallet captures the financial,
personal and location-specific information might increase the vulnerabilities to users,
which has created a negative impact on mobile wallet use.
Network externality is one of the strongest predictors of mobile wallet adoption, it
indicates that network externalities exist in the mobile wallet use, and users can avail
more benefit of it. These findings are consistent with Kim et al. (2017), Xiao et al. (2018)
and Lepoutre and Oguntoye (2018). The direct influence of network externalities on use
behaviour can be enhanced through the perception of the availability of various options
or services. The government also can introduce many wallets to increase availability. In
fact, the size perception of network externality is enhanced by offering complementary
services through m-wallet. Recently, we can observe the impact of network among all the
mobile wallet services provider, all the service provider has adopted common QR code,
and value-added services like booking of bus, train, hotel, other services and loyalty
program. Transferring cash back benefit to existing users for adding more users to the
same mobile wallet service provider network is another example of network externalities.
Promotion construct was failed to influence the mobile wallet usage which shows
that, consumer use the mobile wallet as there is financial or product-based rewards as the
556 C. Baxi and J.D. Patel
main purpose for using mobile wallet is financial and fund transfer transaction. A
significance level of promotion construct is not within the statistical expected level but it
provides proof that promotional scheme from the service provider of mobile wallet has
not played an important role, to influence use behaviour of mobile wallet users. In other
word, mobile wallet service provider needs to make necessary changes in their existing
promotion scheme.
Result of the study provides insight into the mobile service provider in formulating
their marketing strategy which will improve the use of mobile wallet among consumer.
As the number of mobile wallet service provider increased, they can provide they can
switch from basic services to value-added services like banking and financial services,
and other services like online shopping (shopping mall from Paytm) such initiative,
which will drive the use of the mobile wallet.
6 Limitations and future scope of the study
Apart from trust and risk, very important construct called promotion and two dominant
theory which are added to have the future direction to develop the TTF model to the next
level and developed the fully comprehensive model which predict the use behaviour of
consumers rather than the behaviour intention. The first limitation of the study is the
model does not contain any moderator. The second study is restricted towards the users
of Gujarat so, the generality of the study to another context of research is an issue of
external validity. The model might have omitted a few constructs from the use behaviour
perspective. Important link to the future research is this model can become the base
model for the future research in the domain of IS which check use behaviour which links
the task and technology and adds other collaborative constructs. Future research can be
carried out by adding moderators such as demographics, habit, etc. which will improve
the explanatory power of the model.
References
Alqatan, S., Noor, N.M.M., Man, M. and Mohemad, R. (2017) ‘A theoretical discussion of factors
affecting the acceptance of m-commerce among SMTEs by integrating TTF with TAM’, Int.
J. Business information Systems, Vol. 26, No. 1, pp.66–111.
Alqatan, S., Noor, N.M.M., Man, M. and Mohemad, R. (2019) ‘An empirical study on factors
affecting the acceptance of M-commerce application among small and medium-sized tourism
enterprises by integrating TTF with TAM’, International Journal of Business Information
Systems, Vol. 31, No. 1, pp.106–135.
Alzaidi, A. and Qamar, S. (2018) ‘Factors affecting the adoption of internet banking: a systematic
literature review’, Int. J. Business Information Systems, Vol. 28, No. 1, pp.95–124.
Bauer, H.H., Hammerschmidt, M. and Falk, T. (2005) ‘Measuring the quality of e-banking portals’,
International Journal of Bank Marketing, Vol. 23, No. 2, pp.153–175.
Byrne, B.M. (2001) ‘Structural equation modeling with AMOS, EQS, and LISREL: Comparative
approaches to testing for the factorial validity of a measuring instrument’, International
Journal of Testing, Vol. 1, No. 1, pp.55–86.
Cao, T.K., Dang, P.L. and Nguyen, H.A. (2016) ‘Predicting consumer intention to use mobile
payment services: empirical evidence from Vietnam’, International Journal of Marketing
Studies, Vol. 8, No. 1, pp.117–124.
Use of mobile wallet among consumers 557
Cao, X., Yu, L., Liu, Z., Gong, M. and Adeel, L. (2018) ‘Understanding mobile payment
users’ continuance intention: a trust transfer perspective’, Internet Research, Vol. 28, No. 2,
pp.456–476 [online] https://doi.org/10.1108/IntR-11-2016-0359.
Carton, F., Hedman, J., Damsgaard, J., Tan, K.T. and McCarthy, J. (2012) ‘Framework for mobile
payments integration’, Electronic Journal of Information Systems Evaluation, Vol. 15, No. 1,
pp.14–25.
Chandra, S., Srivastava, S.C. and Theng, Y.L. (2010) ‘Evaluating the role of trust in consumer
adoption of mobile payment systems: an empirical analysis’, CAIS, Vol. 27, No. 29, p.27.
Chatterjee, D. and Bolar, K. (2019) ‘Determinants of mobile wallet intentions to use: the mental
cost perspective’, International Journal of Human-Computer Interaction, Vol. 35, No. 10,
pp.859–869.
Chen, C. (2013) ‘Perceived risk, usage frequency of mobile banking services’, Managing Service
Quality: An International Journal, Vol. 23, No. 5, pp.410–436.
Chen, H.C., Chiou, C.Y., Yeh, C.Y. and Lai, H.L. (2012) ‘A study of the enhancement of service
quality and satisfaction by Taiwan MICE Service Project’, Procedia-Social and Behavioral
Sciences, Vol. 40, pp.382–388.
Chopra, K. (2019) ‘M-wallet technology acceptance by street vendors in India’, in Proceedings of
the 2nd International Conference on Data Engineering and Communication Technology,
Springer, Singapore, pp.175–182.
Dwivedi, Y.K., Rana, N.P., Janssen, M., Lal, B., Williams, M.D. and Clement, M. (2017)
‘An empirical validation of a unified model of electronic government adoption (UMEGA)’,
Government Information Quarterly, Vol. 34, No. 2, pp.211–230.
Economides, N. (1996) ‘The economics of networks’, International Journal of Industrial
Organization, Vol. 14, No. 6, pp.673–699.
Featherman, M.S. and Pavlou, P.A. (2003) ‘Predicting e-services adoption: a perceived risk facets
perspective’, International Journal of Human-Computer Studies, Vol. 59, No. 4, pp.451–474.
Fishman, E., Washington, S. and Haworth, N.L. (2012) ‘Understanding the fear of bicycle riding in
Australia’, Journal of the Australasian College of Road Safety, Vol. 23, No. 3, pp.19–27.
Fornell, C. and Larcker, D.F. (1981) Structural Equation Models with Unobservable Variables and
Measurement Error: Algebra and Statistics.
Frels, J.K., Shervani, T. and Srivastava, R.K. (2003) ‘The integrated networks model: explaining
resource allocations in network markets’, Journal of Marketing, Vol. 67, No. 1, pp.29–45.
Gefen, D., Karahanna, E. and Straub, D.W. (2003) ‘Trust and TAM in online shopping:
an integrated model’, MIS Quarterly, Vol. 27, No. 1, p.51, DOI: 10.2307/30036519.
Goodhue, D.L. and Thompson, R.L. (1995) ‘Task-technology fit and individual performance’, MIS
Quarterly, Vol. 19, No. 2, pp.213–236.
Grover, P. and Kar, A.K. (2018) ‘User engagement for mobile payment service providers –
introducing the social media engagement model’, Journal of Retailing and Consumer
Services.
Han, H., Lee, S. and Lee, C.K. (2011) ‘Extending the theory of planned behavior: Visa exemptions
and the traveller decision-making process’, Tourism Geographies, Vol. 13, No. 1, pp.45–74.
Henseler, J., Ringle, C.M. and Sinkovics, R.R. (2009) ‘The use of partial least squares path
modeling in international marketing’, in New Challenges to International Marketing,
pp.277–319, Emerald Group Publishing Limited.
Hong, H., Cao, M. and Wang, G.A. (2017) ‘The effects of network externalities and herding on
user satisfaction with mobile social apps’, Journal of Electronic Commerce Research, Vol. 18,
No. 1, p.18.
Hsiao, K.L., Lin, J.C-C., Wang, X.Y., Lu, H.P. and Yu, H. (2010) ‘Antecedents and consequences
of trust in online product recommendations: an empirical study in social shopping’, Online
Information Review, Vol. 34, No. 6, pp.935–953.
558 C. Baxi and J.D. Patel
Jarvenpaa, S.L., Tractinsky, N. and Saarinen, L. (1999) ‘Consumer trust in an internet store:
a cross-cultural validation’, Journal of Computer-Mediated Communication, Vol. 5, No. 2,
pp.1–33.
Junglas, I.A. and Watson, R.T. (2008) ‘Location-based services’, Communications of the ACM,
Vol. 51, No. 3, pp.65–69.
Katz, M.L. and Shapiro, C. (1985) ‘Network externalities, competition, and compatibility’,
The American Economic Review, Vol. 75, No. 3, pp.424–440.
Khan, I.U., Hameed, Z., Yu, Y., Islam, T., Sheikh, Z. and Khan, S.U. (2018) ‘Predicting the
acceptance of MOOCs in a developing country: application of task-technology fit model,
social motivation, and self-determination theory’, Telematics and Informatics, Vol. 35, No. 4,
pp.964–978.
Kim, D.J. and Hwang, Y. (2012) ‘A study of mobile internet user’s service quality perceptions
from a user’s utilitarian and hedonic value tendency perspectives’, Information Systems
Frontiers, Vol. 14, No. 2, pp.409–421.
Kim, H., Park, M., Yun, S. and Kwon, J. (2017) ‘How network externality leads to the success
of mobile instant messaging business?’, International Journal of Mobile Communications,
Vol. 15, No. 2, p.144, DOI: 10.1504/ijmc.2017.082535.
Kim, H.R., Park, M., Yun, S. and Kwon, J. (2017) ‘How network externality leads to the success of
mobile instant messaging business?’, International Journal of Mobile Communications,
Vol. 15, No. 2, pp.144–161.
Kim, S. and Jones, C. (2009) ‘Online shopping and moderating role of offline brand trust’, Direct
Marketing: An International Journal, Vol. 3, No. 4, pp.282–300.
Klopping, I.M. and McKinney, E. (2004) ‘Extending the technology acceptance model and the
task-technology fit model to consumer e-commerce’, Information Technology, Learning &
Performance Journal, Vol. 22, No. 1, pp.35–48.
Klopping, I.M. and McKinney, E. (2004) ‘Extending the technology acceptance model and the
task-technology fit model to consumer e-commerce’, Information Technology, Learning &
Performance Journal, Vol. 22, No. 1.
Kotler, P. (2009) Marketing Management: A South Asian Perspective, Pearson Education India.
Koufaris, M., Kambil, A. and LaBarbera, P.A. (2001) ‘Consumer behavior in web-based
commerce: an empirical study’, International Journal of Electronic Commerce, Vol. 6, No. 2,
pp.115–138.
Koufaris, M., Kambil, A. and LaBarbera, P.A. (2001) ‘Consumer behavior in web-based
commerce: an empirical study’, International Journal of Electronic Commerce, Vol. 6, No. 2,
pp.115–138.
Kumar, V. and Venkatesan, R. (2019) ‘Metrics and analytics in retailing’, Journal of Retailing,
special issue, Vol. 95, No. 2, p.1.
Kumar, V., Nim, N. and Sharma, A.J. of the Acad. Mark. Sci. (2019) Vol. 47, p.747,
https://doi.org/10.1007/s11747-018-0613-6.
Larsen, T.J., Sørebø, A.M. and Sørebø, Ø. (2009) ‘The role of task-technology fit as users’
motivation to continue information system use’, Computers in Human Behavior, Vol. 25,
No. 3, pp.778–784.
Lee, D.Y. and Dawes, P.L. (2005) ‘Guanxi, trust, and long-term orientation in Chinese business
markets’, Journal of International Marketing, Vol. 13, No. 2, pp.28–56.
Lee, J. and Kim, Y. (1999) ‘Effect of partnership quality on IS outsourcing success: conceptual
framework and empirical validation’, Journal of Management Information Systems, Vol. 15,
No. 4, pp.29–61, DOI: 10.1080/07421222.1999.11518221.
Lepoutre, J. and Oguntoye, A. (2018) ‘The (non-) emergence of mobile money systems in
Sub-Saharan Africa: a comparative multilevel perspective of Kenya and Nigeria’,
Technological Forecasting and Social Change, Vol. 131, pp.262–275.
Lim, N. (2003) ‘Consumers’ perceived risk: sources versus consequences’, Electronic Commerce
Research and Applications, Vol. 2, No. 3, pp.216–228.
Use of mobile wallet among consumers 559
Lin, C.P. and Bhattacherjee, A. (2008) ‘Elucidating individual intention to use interactive
information technologies: the role of network externalities’, International Journal of
Electronic Commerce, Vol. 13, No. 1, pp.85–108.
Lin, K.Y. and Lu, H.P. (2011) ‘Why people use social networking sites: an empirical study
integrating network externalities and motivation theory’, Computers in Human Behavior,
Vol. 27, No. 3, pp.1152–1161.
Lu, H.P. and Yang, Y.W. (2014) ‘Toward an understanding of the behavioral intention to use a
social networking site: an extension of task-technology fit to social-technology fit’, Computers
in Human Behavior, Vol. 34, No. 5, pp.323–332.
Lu, H.P. and Yang, Y.W. (2014) ‘Toward an understanding of the behavioral intention to use a
social networking site: an extension of task-technology fit to social-technology fit’, Computers
in Human Behavior, Vol. 34, pp.323–332.
Lu, X., Sun, J., Liu, Y., Shao, J., Ma, L., Zhang, S. et al. (2014) ‘Decorating tetrathiafulvalene
(TTF) with fluorinated phenyls through sulfur bridges: facile synthesis, properties, and
aggregation through fluorine interactions’, Chemistry – A European Journal, Vol. 20, No. 31,
pp.9650–9656, DOI: 10.1002/chem.201402327.
Lu, Y., Cao, Y., Wang, B. and Yang, S. (2011) ‘A study on factors that affect users’ behavioral
intention to transfer usage from the offline to the online channel’, Computers in Human
Behavior, Vol. 27, No. 1, pp.355–364.
Maity, M., Bagchi, K., Shah, A. and Misra, A. (2019) ‘Explaining normative behavior in
information technology use’, Information Technology & People, Vol. 32, No. 1, pp.94–117.
Martins, C., Oliveira, T. and Popovič, A. (2014) ‘Understanding the Internet banking adoption:
a unified theory of acceptance and use of technology and perceived risk application’,
International Journal of Information Management, Vol. 34, No. 1, pp.1–13.
Maruping, L.M., Bala, H., Venkatesh, V. and Brown, S.A. (2017) ‘Going beyond intention:
Integrating behavioral expectation into the unified theory of acceptance and use of
technology’, Journal of the Association for Information Science and Technology, Vol. 68,
No. 3, pp.623–637.
Matemba, E.D. and Li, G. (2018) ‘Consumers’ willingness to adopt and use WeChat wallet:
an empirical study in South Africa’, Technology in Society, Vol. 53, pp.55–68.
Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995) ‘An integrative model of organizational
trust’, Academy of Management Review, Vol. 20, No. 3, pp.709–734, DOI: 10.5465/amr.1995.
9508080335.
McKnight, D.H. and Chervany, N. (2001) ‘Trust and distrust definitions: one bite at a time’, Trust
in Cyber-Societies, pp.27–54, Springer, Berlin, Heidelberg, DOI: 10.1007/3-540-45547-7_3.
Mitchell, V.W. (1999) ‘Consumer perceived risk: conceptualisations and models’, European
Journal of Marketing, Vol. 33, Nos. 1/2, pp.163–195.
Morgan, R.M. and Hunt, S.D. (1994) ‘The commitment-trust theory of relationship marketing’,
Journal of Marketing, Vol. 58, pp.20–38.
Nor, K.M. and Pearson, J.M. (2007) ‘The influence of trust on internet banking acceptance’,
Journal of Internet Banking and Commerce, Vol. 12, No. 2, p.10.
Oliveira, T., Faria, M., Thomas, M. and Popovič, A. (2014) ‘Extending the understanding of mobile
banking adoption: when UTAUT meets TTF and ITM’, International Journal of Information
Management, Vol. 34, No. 5, pp.689–703, DOI: 10.1016/j.ijinfomgt.2014.06.004.
Oliveira, T., Thomas, M., Baptista, G. and Campos, F. (2016) ‘Mobile payment: understanding the
determinants of customer adoption and intention to recommend the technology’, Computers in
Human Behavior, Vol. 61, pp.404–414.
Osang, F.B. (2015) ‘Task technology fit and lecturers performance impacts: the technology
utilization, satisfaction and performance (TUSPEM) dimension’, International Journal of
Computer Science Issues (IJCSI), Vol. 12, No. 3, p.232.
560 C. Baxi and J.D. Patel
Parkes, A. (2013) ‘The effect of task-individual-technology fit on user attitude and performance:
an experimental investigation’, Decision Support Systems, Vol. 54, No. 2, pp.997–1009.
Qasim, H. and Abu-Shanab, E. (2016) ‘Drivers of mobile payment acceptance: the impact of
network externalities’, Information Systems Frontiers, Vol. 18, No. 5, pp.1021–1034.
Sarkar, S. and Khare, A. (2018) ‘Influence of expectation confirmation, network externalities, and
flow on use of mobile shopping apps’, International Journal of Human-Computer Interaction,
Vol. 35, No. 16, pp.1449–1460.
Schierz, P.G., Schilke, O. and Wirtz, B.W. (2010) ‘Understanding consumer acceptance of mobile
payment services: an empirical analysis’, Electronic Commerce Research and Applications,
Vol. 9, No. 3, pp.209–216.
Shah, A., Roongta, P., Jain, C., Kaushik, V. and Awadhiya, A. (2016) Digital Payments 2020: The
Making of a $500 Billion Ecosystem in India, pp.1–56, Boston Consulting Group and Google
[online] http://image-src.bcg.com/BCG_COM/BCG-Google%20Digital%20Payments
%202020-July%202016_tcm21-39245.pdf.
Shaw, N. (2014) ‘The mediating influence of trust in the adoption of the mobile wallet’, Journal of
Retailing and Consumer Services, Vol. 21, No. 4, pp.449–459.
Shaw, N. and Sergueeva, K. (2019) ‘The non-monetary benefits of mobile commerce: extending
UTAUT2 with perceived value’, International Journal of Information Management, Vol. 45,
No. 5, pp.44–55.
Shih, Y. and Chen, C. (2011) ‘The study of behavioral intention for mobile commerce:
via integrated model of TAM and TTF’, Quality & Quantity, Vol. 47, No. 2, pp.1009–1020,
DOI: 10.1007/s11135-011-9579-x.
Shin, D.H. (2009) ‘Towards an understanding of the consumer acceptance of mobile wallet’,
Computers in Human Behavior, Vol. 25, No. 6, pp.1343–1354.
Singh, N., Sinha, N. and Liébana-Cabanillas, F.J. (In press) ‘Determining factors in the adoption
and recommendation of mobile wallet services in India: analysis of the effect of
innovativeness, stress to use and social influence’, International Journal of Information
Management, Vol. 50, pp.191–205.
Srinivasan, R., Lilien, G. and Rangaswamy, A. (2004) ‘First in, first out? The effects of
network externalities on pioneer survival’, Journal of Marketing, Vol. 68, No. 1, pp.41–58,
DOI: 10.1509/jmkg.68.1.41.24026.
Strader, T., Ramaswami, S. and Houle, P. (2007) ‘Perceived network externalities and
communication technology acceptance’, European Journal of Information Systems, Vol. 16,
No. 1, pp.54–65, DOI: 10.1057/palgrave.ejis.3000657.
Tam, C. and Oliveira, T. (2016) ‘Understanding the impact of m-banking on individual
performance: DeLone & McLean and TTF perspective’, Computers in Human Behavior,
Vol. 61, pp.233–244.
Teo, A.C., Tan, G.W.H., Cheah, C.M., Ooi, K.B. and Yew, K.T. (2012) ‘Can the demographic and
subjective norms influence the adoption of mobile banking?’, International Journal of Mobile
Communications, Vol. 10, No. 6, pp.578–597.
Teo, A.C., Tan, G.W.H., Ooi, K.B. and Lin, B. (2015) ‘Why consumers adopt mobile payment? A
partial least squares structural equation modelling (PLS-SEM) approach’, International
Journal of Mobile Communications, Vol. 13, No. 5, pp.478–497.
Thakur, R. and Srivastava, M. (2014) ‘Adoption readiness, personal innovativeness, perceived risk
and usage intention across customer groups for mobile payment services in India’, Internet
Research, Vol. 24, No. 3, pp.369–392.
Thatcher, S. and Patel, P.C. (2011) ‘Demographic faultlines: a meta-analysis of the literature’,
Journal of Applied Psychology, Vol. 96, No. 6, p.1119.
Venkatesh, V. and Bala, H. (2008) ‘Technology acceptance model 3 and a research agenda on
interventions’, Decision Sciences, Vol. 39, No. 2, pp.273–315.
Use of mobile wallet among consumers 561
Venkatesh, V., Brown, S.A. and Sullivan, Y.W. (2016a) ‘Guidelines for conducting mixed-methods
research: an extension and illustration’, Journal of the Association for Information Systems,
Vol. 17, No. 7, p.2.
Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003) ‘User acceptance of information
technology: toward a unified view’, MIS Quarterly, pp.425–478.
Venkatesh, V., Thong, J.Y. and Xu, X. (2012) ‘Consumer acceptance and use of information
technology: extending the unified theory of acceptance and use of technology’, MIS Quarterly,
Vol. 36, No. 1, pp.157–178.
Venkatesh, V., Thong, J.Y. and Xu, X. (2016b) ‘Unified theory of acceptance and use of
technology: a synthesis and the road ahead’, Journal of the Association for Information
Systems, Vol. 17, No. 5, pp.328–376.
Venkatraman, S. (2008) ‘Mobile payment implementation: a reference framework’, International
Journal of Business Information Systems, Vol. 3, No. 3, pp.252–271.
Wang, S.W., Ngamsiriudom, W. and Hsieh, C.H. (2015) ‘Trust disposition, trust antecedents, trust,
and behavioral intention’, The Service Industries Journal, Vol. 35, No. 10, pp.555–572.
Wattal, S., Racherla, P. and Mandviwalla, M. (2010) ‘Network externalities and technology use:
a quantitative analysis of intraorganizational blogs’, Journal of Management Information
Systems, Vol. 27, No. 1, pp.145–174, DOI: 10.2753/mis0742-1222270107.
Xiao, L., Fu, B. and Liu, W. (2018) ‘Understanding consumer repurchase intention on O2O
platforms: an integrated model of network externalities and trust transfer theory’, Service
Business, Vol. 12, No. 4, pp.731–756.
Yadegaridehkordi, E., Iahad, N.A. and Ahmad, N. (2016) ‘Task-technology fit assessment of
cloud-based collaborative learning technologies’, International Journal of Information
Systems in the Service Sector (IJISSS), Vol. 8, No. 3, pp.58–73.
Yang, Y., Liu, Y., Li, H. and Yu, B. (2015) ‘Understanding perceived risks in mobile payment
acceptance’, Industrial Management & Data Systems, Vol. 115, No. 2, pp.253–269.
Yoo, B., Donthu, N. and Lee, S. (2000) ‘An examination of selected marketing mix elements and
brand equity’, Journal of the Academy of Marketing Science, Vol. 28, No. 2, pp.95–211.
Yuan, Y., Lai, F. and Chu, Z. (2019) ‘Continuous usage intention of internet banking: a
commitment-trust model’, Information Systems and e-Business Management, Vol. 17, No. 1,
pp.1–25.
Zhou, T. (2014) ‘Understanding the determinants of mobile payment continuance usage’, Industrial
Management & Data Systems, Vol. 114, No. 6, pp.936–948.
Zhou, T. and Lu, Y. (2011) ‘Examining mobile instant messaging user loyalty from the
perspectives of network externalities and flow experience’, Computers in Human Behavior,
Vol. 27, No. 2, pp.883–889.
Zikmund, W.G., D’Alessandro, S., Winzar, H., Lowe, B. and Babin, B. (2017) Marketing
Research: Asia-Pacific Edition, Cengage AU.
562 C. Baxi and J.D. Patel
Appendix
Promotion
Cash back is provided by mobile wallet.
The discount scheme is offered by mobile wallet.
Promotion and gift schemes are offered by mobile wallet.
Special offers are provided by mobile wallet.
Rewards are offered by mobile wallet.
Task-technology fit
I can quickly make payment at any time using a mobile wallet.
Mobile wallet services are real-time (immediate).
The mobile wallet gives a message of payment.
The mobile wallet gives a message of balance.
I can pay for mobile recharge using a mobile wallet.
I can book a movie ticket using the mobile wallet.
I can shop from mobile wallet.
I can pay for electricity, LPG, etc. bill from mobile wallet.
I can transfer money to friends/relatives using a mobile wallet.
I can transfer money from bank account to mobile wallet.
I can transfer money from mobile wallet to my bank account.
Trust
Mobile wallet provides correct information.
I can trust the mobile wallet.
Mobile wallet is reliable.
Mobile wallet is secure.
Mobile wallet is created to help the consumer.
I have installed well known the mobile wallet.
I have installed the well reputed mobile wallet.
Use of mobile wallet among consumers 563
Risk
It would be risky to use a mobile wallet.
I may lose my money If I use a mobile wallet.
I may lose my personal information If I use the mobile wallet.
I may lose my banks account details if I use the mobile wallet.
Chances of fraud will increase if I use the mobile wallet.
I might be overcharged if I use the mobile wallet.
In case of any error occurred, I may lose my money.
I am not using mobile wallet because of the risk associated with it.
Network externalities (more and more people will use)
Many people are using the mobile wallet.
In the future, more and more people will use the mobile wallet.
More than one mobile wallets are available.
In the future, few more companies will provide mobile wallet.
Currently, most of my friends have a mobile wallet.
In the future, more friends and family members will have a mobile wallet.
Use behaviour
Currently, I am using mobile wallet.
I will keep using the mobile wallet in future also.
I will suggest my friends to use the mobile wallet.
I will suggest my family members to use the mobile wallet.
... Tseng and Chang (2015) urged to investigate the effect of INSIF on BIMCOUA. INSIF has strong influence on BIMCOUA among Indians (Balakrishnan et al., 2020;Baxi and Patel, 2021), Malaysians (Yakasai and Jusoh, 2015;Jayasingh and Eze, 2010), Indonesian (Fauziah et al., 2019), Indonesian (Pratiwi, 2018) and US consumers (Im and Ha, 2013;Ha and Im, 2014;Jennings, 2014). There is a need to investigate INSIF on BIMCOUA in the Indian context (Ahmed and Sathish, 2017;Baxi and Patel, 2021;Nayal and Pandey, 2020b;Balakrishnan et al., 2020). ...
... INSIF has strong influence on BIMCOUA among Indians (Balakrishnan et al., 2020;Baxi and Patel, 2021), Malaysians (Yakasai and Jusoh, 2015;Jayasingh and Eze, 2010), Indonesian (Fauziah et al., 2019), Indonesian (Pratiwi, 2018) and US consumers (Im and Ha, 2013;Ha and Im, 2014;Jennings, 2014). There is a need to investigate INSIF on BIMCOUA in the Indian context (Ahmed and Sathish, 2017;Baxi and Patel, 2021;Nayal and Pandey, 2020b;Balakrishnan et al., 2020). The hypothesis (H3) can be framed as H3: INSIF will significantly influence BIMCOUA. ...
... PDRK has no significant impact on BIMCOUA among the US (Jennings, 2014) and Chinese (Liu et al., 2015) consumers. PDRK is an important determinant and negatively affects BIMCOUA among the USA (Im and Ha, 2015;Ha and Im, 2014), Canadian (Ladhari et al., 2022), Chinese (Tang et al., 2018) and Indian (Baxi and Patel, 2021;Pandey, 2020a, 2020b) mobile coupon users. Therefore, the hypothesis (H10) of the present study could be framed as H10: PDRK will significantly influence BIMCOUA. ...
... Tseng and Chang (2015) urged to investigate the effect of INSIF on BIMCOUA. INSIF has strong influence on BIMCOUA among Indians (Balakrishnan et al., 2020;Baxi and Patel, 2021), Malaysians (Yakasai and Jusoh, 2015;Jayasingh and Eze, 2010), Indonesian (Fauziah et al., 2019), Indonesian (Pratiwi, 2018) and US consumers (Im and Ha, 2013;Ha and Im, 2014;Jennings, 2014). There is a need to investigate INSIF on BIMCOUA in the Indian context (Ahmed and Sathish, 2017;Baxi and Patel, 2021;Nayal and Pandey, 2020b;Balakrishnan et al., 2020). ...
... INSIF has strong influence on BIMCOUA among Indians (Balakrishnan et al., 2020;Baxi and Patel, 2021), Malaysians (Yakasai and Jusoh, 2015;Jayasingh and Eze, 2010), Indonesian (Fauziah et al., 2019), Indonesian (Pratiwi, 2018) and US consumers (Im and Ha, 2013;Ha and Im, 2014;Jennings, 2014). There is a need to investigate INSIF on BIMCOUA in the Indian context (Ahmed and Sathish, 2017;Baxi and Patel, 2021;Nayal and Pandey, 2020b;Balakrishnan et al., 2020). The hypothesis (H3) can be framed as H3: INSIF will significantly influence BIMCOUA. ...
... PDRK has no significant impact on BIMCOUA among the US (Jennings, 2014) and Chinese (Liu et al., 2015) consumers. PDRK is an important determinant and negatively affects BIMCOUA among the USA (Im and Ha, 2015;Ha and Im, 2014), Canadian (Ladhari et al., 2022), Chinese (Tang et al., 2018) and Indian (Baxi and Patel, 2021;Pandey, 2020a, 2020b) mobile coupon users. Therefore, the hypothesis (H10) of the present study could be framed as H10: PDRK will significantly influence BIMCOUA. ...
... The era of personalisation, networking and digitisation, in conjunction with the growth in consumer presence in the virtual realm, is creating additional challenges for marketers (Bag et al., 2021;De Oliveira Santini et al., 2020;Rajendrakumar, 2022;Sukumaran, 2022). The continuing development of e-marketing provides possibilities for creativity, effectiveness and affordability to empower customers who have moved from autonomous media to "always active" mode through digital devices (Perez-Vega et al., 2021;Baxi and Patel, 2021;Ray et al., 2021). Therefore, it is vital for businesses to provide the required information to individuals at the right point of time and AI helps marketers achieving this (Sener et al., 2019). ...
Article
Purpose The purpose of this study is to comprehend how AI aids marketers in engaging customers and generating value for the company by way of customer engagement (CE). CE is a popular area of research for scholars and practitioners. One area of research that could have far-reaching ramifications with regard to strengthening CE is artificial intelligence (AI). Consequently, it becomes extremely important to understand how AI is helping the marketer reach customers and create value for the firm via CE. Design/methodology/approach A detailed approach using both systematic review and bibliometric analysis was used. It involved identifying key research areas, the most influential authors, studies, journals, countries and organisations. Then, a comprehensive analysis of 50 papers was carried out in the four identified clusters through co-citation analysis. Furthermore, a content analysis of 42 articles for the past six years was also conducted. Findings Emerging themes explored through cluster analysis are CE concepts and value creation, social media strategies, big data innovation and significance of AI in tertiary industry. Identified themes for content analysis are CE conceptualisation, CE behaviour in social media, CE role in value co-creation and CE via AI. Research limitations/implications CE has emerged as a topic of great interest for marketers in recent years. With the rapid growth of digital media and the spread of social media, firms are now embarking on new online strategies to promote CE (Javornik and Mandelli, 2012). In this review, the authors have thoroughly assessed multiple facets of prior research papers focused on the utilisation of AI in the context of CE. The existing research papers highlighted that AI-powered chatbots and virtual assistants offer real-time interaction capabilities, swiftly addressing inquiries, delivering assistance and navigating customers through their experiences (Cheng and Jiang, 2022; Naqvi et al. , 2023). This rapid and responsive engagement serves to enrich the customer’s overall interaction with the business. Consequently, this research can contribute to a comprehensive knowledge of how AI is assisting marketers to reach customers and create value for the firm via CE. This study also sheds light on both the attitudinal and behavioural aspects of CE on social media. While existing CE literature highlights the motivating factors driving engagement, the study underscores the significance of behavioural engagement in enhancing firm performance. It emphasises the need for researchers to understand the intricate dynamics of engagement in the context of hedonic products compared to utilitarian ones (Wongkitrungrueng and Assarut, 2020). CEs on social media assist firms in using their customers as advocates and value co-creators (Prahalad and Ramaswamy, 2004; Sawhney et al. , 2005). A few of the CE themes are conceptual in nature; hence, there is an opportunity for scholarly research in CE to examine the ways in which AI-driven platforms can effectively gather customer insights. As per the prior relationship marketing studies, it is evident that building relationships reduces customer uncertainty (Barari et al. , 2020). Therefore, by using data analysis, businesses can extract valuable insights into customer preferences and behaviour, equipping them to engage with customers more effectively. Practical implications The rapid growth of social media has enabled individuals to articulate their thoughts, opinions and emotions related to a brand, which creates a large amount of data for VCC. Meanwhile, AI has emerged as a radical way of providing value content to users. It expands on a broader concept of how software and algorithms work like human beings. Data collected from customer interactions are a major prerequisite for efficiently using AI for enhancing CE. AI not only reduces error rates but, at the same time, helps human beings in decision-making during complex situations. Owing to built-in algorithms that analyse large amounts of data, companies can inspect areas that require improvement in real time. Time and resources can also be saved by automating tasks contingent on customer responses and insights. AI enables the analysis of customer data to create highly personalised experiences. It can also forecast customer behaviour and trends, helping businesses anticipate needs and preferences. This enables proactive CE strategies, such as targeted offers or timely outreach. Furthermore, AI tools can analyse customer feedback and sentiment across various channels. This feedback can be used to make necessary improvements and address concerns promptly, ultimately fostering stronger customer relationships. AI can facilitate seamless engagement across multiple digital channels, ensuring that customers can interact with a brand through their preferred means, be it social media, email, or chat. Consequently, this research proposes that practitioners and companies can use analysis performed by AI-enabled systems on CEB, which can assist companies in exploring the extent to which each product influences CE. Understanding the importance of these attributes would assist companies in developing more memorable CE features. Originality/value This study examines how prominent CE and AI are in academic research on social media by identifying research gaps and future developments. This research provides an overview of CE research and will assist academicians, regulators and policymakers in identifying the important topics that require investigation.
... For instance, the TAM and UTAUT highlights technology adoption intention but not use of technology, but the TTF emphasises on technology use. Moreover, the TTF has been used in the context of involuntary use of technology such as work environment, integrating it with UTUAT gives it the validity it needs in the voluntary environment (Baxi and Patel, 2021). In addition, the TTF model helps us predict both current and future use of technology (Aljukhadar et al., 2014). ...
Article
Purpose The study aims to investigate the factors influencing the behavioural intention of bottom-of-the-pyramid (BOP) consumers in developing economies, such as India, to adopt mobile wallets, drawing upon the framework of the uses and gratification theory. Furthermore, the study also examines the moderating effect of gender. Design/methodology/approach To achieve the objective, primary data were collected from a sample of 220 respondents using the survey method. The reliability and validity of the survey instrument were demonstrated through confirmatory factor analysis. Subsequently, structural equation modelling (SEM) was used for hypotheses testing. Findings The study revealed that only convenience and social influence have a positive significant influence on the behavioural intention to adopt mobile wallets whereas, innovativeness, trust and compatibility have no significant relationship with behavioural intention to adopt mobile wallets among the BOP consumers. Further, gender moderates the relationship between compatibility and behavioural intention to adopt mobile wallets in India. Originality/value This study contributes to the underexplored area of research concerning the behavioural intention to adopt mobile wallets among BOP consumers in a developing economy. It introduces a novel approach by using the uses and gratifications theory to uncover the underlying motivations behind adoption behaviour.
Article
Full-text available
The purpose of the current research is to examine the influence of expectation confirmation, network externalities, and flow on word-of-mouth intention and continued use of mobile shopping apps. A structured online survey questionnaire is used to collect data from 363 users of mobile shopping apps. Structural equation modeling is used to analyze the research model. The findings reveal that indirect network externalities, i.e., perceived complementarity, influence perceived usefulness of the mobile shopping app. Users’ confirmation of expectations significantly influences perceived usefulness, satisfaction, and continuance intention to use mobile apps. Satisfaction is found to be a significant predictor of continuance intention and word-of-mouth intention. Flow influences satisfaction of users, perceived usefulness, and continuance intention. Word-of-mouth intention is found to be an important post-adoption behavioral outcome. The results provide valuable theoretical insights for academics and managerial implications for providers of mobile shopping apps.
Article
Full-text available
With the rapid explosion of the online technology, Internet Banking (IB) has been prevalent in recent years and attracts much research attention. Although intensive studies have investigated the determinants of users’ initial acceptance of IB service, much less research has further explored the continuous usage of IB service. This study focuses on the continuous IB service usage intention by examining the role of users’ psychological cognition (e.g., trust and commitment) in improving their continuous usage intention of IB service. Integrating the commitment-trust theory and the unified theory of acceptance and use of technology, we argue that besides contributive effects to continuous usage intention, psychological cognition mediates the influences of usage experiences (e.g., perceived service value, quality of alternatives, and anxiety) on continuous usage intention. This model was tested using survey data from 173 non-traditional college students who were all full-time employees with several years of working experience. The results confirm the contributive and mediating effects of trust and commitment on continuous IB service usage intention. The study contributes to the literature by highlighting the role of trust and commitment in predicting IB service continuous usage, and the findings provide useful implications for bank management in retaining online customers.
Article
Purpose The purpose of this paper is to identify a model that provides explanations for normative behavior in information technology (IT) use, and to test the model across two different types of normative behavior (i.e. green information technology (GIT), and digital piracy (DP)). Design/methodology/approach The proposed model is based on the norm activation model (NAM) and the unified theory of acceptance and use of technology model (UTAUT). A total of 374 and 360 usable responses were obtained for GIT and DP, respectively. The authors use the SEM technique in order to test the proposed model on the two sub-samples. Findings Findings from the proposed model show that DP users’ personal norm (PN) negatively impacts behavioral intention and actual behavior. These findings indicate that users of IT who indulge in DP understand that use of pirated software may not be a socially approved behavior but they still indulge in it because their PNs are not aligned with social expectations. GIT users’ PN positively impacts behavioral intention and actual behavior, and the relationship is stronger for behavioral intention than for actual behavior. Research limitations/implications The sample consists of college students and working professionals based in India who may be savvy with respect to internet use. Future work may evaluate whether the pattern of results that the authors report for normative behavior does hold across other types of normative behavior. Practical implications These findings hint at a gap between the moral compass and the final “action” taken by DP users. What managers need to do is to create awareness among their customers about the implementation of DP/GIT and help users engage in normative behavior. Originality/value This research contributes to the literature by integrating the UTAUT and the NAM to explain normative behavior of IT use. The authors propose and test a model that identifies cognitive as well as social-psychological motivations to explain normative behavior in IT use, which have been sparingly studied in extant literature, and provides a holistic understanding of the phenomenon. As such, this research contributes to the existing knowledge of understanding of normative IT behavior.
Article
Twitter is being used by mobile wallet firms for customer acquisition, relationship management, marketing and promotional purposes. This study examines service advertisement and promotional tweets by mobile wallet firm's on Twitter. For this study, timeline data of top four mobile wallet firms of India, Paytm, MobiKwik, Freecharge and Oxigen Wallet were extracted from their Twitter screen (firm generated tweets). The user generated tweets were also extracted, using the search terms as firm's name. This study proposes a Social Media Engagement model for understanding user dynamics. The study provides three interesting inputs for promotional marketing tweets, firstly, firm should post mix of the tweets with respect to content type (i.e. informational, entertainment, remuneration and social). Secondly, a periodic campaigning is needed by the firms; and lastly, firms should focus on increasing their network size. The implications of these findings can help firm's managers and marketers in planning effective social media marketing campaigns.
Article
Several issues relating to goodness of fit in structural equations are examined. The convergence and differentiation criteria, as applied by Bagozzi, are shown not to stand up under mathematical or statistical analysis. The authors argue that the choice of interpretative statistic must be based on the research objective. They demonstrate that when this is done the Fornell-Larcker testing system is internally consistent and that it conforms to the rules of correspondence for relating data to abstract variables.
Article
Relationship marketing—establishing, developing, and maintaining successful relational exchanges—constitutes a major shift in marketing theory and practice. After conceptualizing relationship marketing and discussing its ten forms, the authors (1) theorize that successful relationship marketing requires relationship commitment and trust, (2) model relationship commitment and trust as key mediating variables, (3) test this key mediating variable model using data from automobile tire retailers, and (4) compare their model with a rival that does not allow relationship commitment and trust to function as mediating variables. Given the favorable test results for the key mediating variable model, suggestions for further explicating and testing it are offered.
Article
Consumers can conduct mobile commerce via their smartphones. They can search for products and when ready, they pay and have the products delivered to their homes. By sharing personal information, they receive faster and more customized service. Because of the risk of loss of privacy, consumers need to balance their privacy concerns against the perceived value of enhanced mobile commerce. In this empirical study, the unified theory of acceptance and use of technology (UTAUT2) is modified where perceived value replaces price value to represent the value of an IT artifact that has no direct costs attributable to it. The framework is extended to include constructs from the privacy calculus. In addition, the construct of personal innovativeness is added as a moderator with the anticipation that owners of smartphones who are more personally innovative will be more willing to share information. From an empirical study of Canadian smartphone owners, the results show that perceived privacy concerns influence perceived value and that intention to use is significantly influenced by hedonic motivation and perceived value.
Article
Mobile wallet has become the predominant form of electronic commerce in many countries, and India is no exception. It is imperative to understand the behavior of users of mobile wallets as it can help service providers to attract new users and retain their existing ones. For predicting intentions to use from a mental cost perspective, this empirical study focuses on evaluating different competing models using relevant, vital constructs rooted in theories of Diffusion of Innovation, Planned Behavior, and Technology Acceptance Model and Trust. Results point to the supremacy of the Perceived Behavioral Control construct over other constructs in predicting the intentions, to use mobile wallets. Among the competing models, the best predictive model explained 50.81% of the changes in intentions to use.