Abstract
Cryptocurrency could redefine the interplay of Internet-connected world markets by eliminating constraints set by traditional local currencies and exchange rates. It has the potential to revolutionise digital markets through the use of duty-free trading. This study investigates the factors which influence the behavioural intention to use cryptocurrency based on the Technology Acceptance Model 3 (TAM 3) during the COVID-19 (SARS-COV-2) pandemic. Data were collected through a cross-sectional questionnaire from 357 Pakistani business-educated adults, including investors who had a rudimentary understanding of the technology and financial instruments. Partial least square (PLS)-based structural equation modeling (SEM) was used to test the developed theoretical framework based on the Technology acceptance model 3. The PLS model has explained 72.1% of what constitutes the behavioural intention to use cryptocurrency. Surprisingly, risk was not a major consideration. This might be due to the fact that the majority of respondents thought working with cryptocurrency was hazardous. Willingness to handle cryptocurrency risk, on the other hand, might be a stumbling block to acceptance. The most essential aspect of a cryptocurrency's success was the perceived usefulness. Moreover, the moderating role of experience was not substantiated in this study. However, perceived usefulness was identified as a partial mediator of subjective norm and the perceived ease to use. This study contributed to the literature through the application of TAM 3 (an extension of the technology acceptance models) to investigate the fundamental qualities a cryptocurrency should have in order to influence investor's behavioural intention to use it. These findings provide revolutionary insights for the present and future market players for investment planning and for improved cryptocurrencies development.
Keywords: cryptocurrency, behavioural intention, technology acceptance model 3 (TAM 3), COVID 19 pandemic, subjective norm, computer self-efficacy, perceived usefulness, perceived ease to use
Introduction
With a global transaction value of US$5,204 billion in 2020, the Digital Payments sector is the largest within FinTech. In 2021, the total transaction value in the Digital Payments category is expected to reach US$6.752,388 million. The overall transaction value is estimated to rise at a 12.24% annual rate (CAGR 2021–2025), culminating in a total sum of US$10,715,390 million by 2025. China has the greatest cumulative transaction value (US$2,892,494m in 2021) when compared globally (Statista Digital Market Outlook, 2021). On a daily basis, trillions of dollars are transacted on the global financial system, serving customers in billions (Tapscott and Tapscott, 2017). The annual transaction worth of Automated Clearing House system in the USA is more than forty trillion dollars, nationally representing only 20% of electronic payments (Kiviat, 2015).
In the world, the digital economy is emerging and developing rapidly, bumping all the participants in the market to bring essential variations in their activities (Mourshoudli et al., 2020). According to Patel and Shrimali (Patel and Shrimali, 2021), due to the active involvement of the middle man (mostly humans or human-operated agencies), some essential challenges, such as transparency, timeliness, traceability, security, and immutability are posed, resulting in financial loss. Virtual currency not only modernises the method of payments but can also affect the future of world currencies (Seetharaman et al., 2017).
Cryptocurrency is a sub-class of digital currency (Lee Kuo Chuen, 2015). A cryptocurrency is an essential form of digital currency because of its distinct features, unlike other digital currencies issued by organisations as centralised, monitored within a geographical region or community, or secured by fiat currency (Chuen et al., 2017). Cryptocurrency is defined by the world bank as non-fiat digital currencies which do not possess any intrinsic value, nor are secured by any primary assets, and cannot be claimed as a liability from an economic mediator (Natarajan et al., 2017).
Bitcoin as the first cryptocurrency was traded in January 2009 (Dourado and Brito, 2016). Since then, approximately 5,392 crypto-currencies are being traded with a total market capitalisation of 201 billion dollars (as of April 22, 2020). This figure is constantly rising. As of August 18, 2021, there are about 6,000 cryptocurrencies, a significant rise from just a few digital coins in 2013. Indeed, the top 20 cryptocurrencies are thought to account for roughly 90% of the overall market (Raynor de Best, 2021). Solving two long-lasting problems in computer sciences, bitcoin made cryptocurrency possible by introducing two main innovations: (1) “double-spending problem” through “peer-to-peer electronic monetary system,” and (2) “Byzantine Generals Problems” through “blockchain” (Dourado and Brito, 2016).
Satoshi Nakamoto first envisioned blockchain as a peer-to-peer digital-commodity (also known as cryptocurrency) trading system (Gupta and Sadoghi, 2021). Blockchain-based financial transactions can be distinguished into three stages: first is the initiation stage where a customer buys and sells the financial assets to access the blockchain network, second is the incorporation of stakeholders for verification of financial assets, and third is a blockchain ledger to keep records of transactions. These stages have focused on four aspects of financial transactions: the verification of assets, the transaction record maintenance, the privacy of data, and the cost of transactions (Workie and Jain, 2017).
The Federal Reserve System of the US urges improvement in the current payment system to make it secure, speedy, efficient, collaborative, and global (Federal Reserve System, 2017). Cryptocurrency has the potential of delivering these required outcomes and solving this problem at low cost with convenience (Piscini and Rosenberg, 2015). With the inauguration of bitcoin as the first cryptocurrency, world businesses and economies wanted to participate and to acquire this new financial technology. In 2010, Laszlo Hanyecz made the first transaction in bitcoin by purchasing two pizzas in exchange for 10,000 bitcoins (Bort, 2014). Nowadays, you can make payments through bitcoin in around 5,040 businesses across the world including lawyer hiring, doctor's fee claims, and car purchases (Coinmap, 2018; Usebitcoins, 2018).
The numbers of cryptocurrencies quoted in the market as purchased and sold are not definite, as nowadays, any organisation or business can generate and use its own cryptocurrency as an initial coin offering (ICO) for raising funds by using blockchain technology (Burns and Moro, 2018). The collection of ICOs are wide-ranging and its growth is increasing from year to year. In 2017, US$ 5.2 billion were collected by ICOs (Ibba et al., 2018), wherein 1,387 ICOs were issued (Fenu et al., 2018). In addition to all this, it was noticed that more than 65% of ICOs have dropped their values (Haffke and Fromberger, 2020). Therefore, the innovation and the credibility of a project proposed by a company, for which funds are raised, are the reasons behind ICOs' success (Ibba et al., 2018). The handlers' intention behind the use of cryptocurrency (bitcoin) for speculation is high as compared to financial transactions (Glaser et al., 2014). More than 50% in comparison are interested in speculative trading (Hileman and Rauchs, 2017).
By 2027, 10% of GDP will be maintained in blockchain (Shift, 2015). By 2025, the annual average growth rate will be 62.1% (Business Wire, 2017). Crypto markets have grown in the capitalisation of ~100 times which is about US$1.37 billion to US$140 billion from April 2013 to April 2020 (Coin Market Cap, 2020). As of this writing, the market value of all cryptocurrencies combined is above $2 trillion. Cryptocurrency-based loan apps and decentralised buying and selling platforms now have $65 billion in assets on their books. Over $1 billion worth of cryptocurrencies will be spent in the first quarter of 2021 (World Economic Forum, 2021). According to Coin Gecko, which analyses over 8,800 currencies, the entire market capitalisation of cryptocurrencies has already surpassed US$2.06 trillion, as the Bitcoin and other cryptocurrencies like Cardano, XRP, and Doge coin climbed on Saturday, August 14, 2021. Even during the COVID-19 Pandemic, Bitcoin climbed to US$48,152,which is its highest level since May 16, 2021 (Joanna Ossinger, 2021).
It took many years for bitcoin and other cryptocurrencies to gain popularity, but in the last few years, they have been expanding more rapidly (Madey, 2017). Cryptocurrency is becoming more widely accepted, with firms such as Microsoft, PayPal, eBay, Dell, and Expedia all accepting Bitcoin payments (Iglesias de Ussel, 2015). Experts now see blockchain technology as a viable platform for company development, particularly in high-tech, investment, and finance sectors (Vovchenko et al., 2017). Systematic Literature Review (SLR) in February 2020 anticipated that a growing number of studies on the use of cryptocurrency will be published in the near future (Lone and Naaz, 2021). Many studies have been conducted on cryptocurrencies perspectives and have been challenging cryptocurrency as a new investment opportunity (Bonneau et al., 2015; Chuen et al., 2017; Liu et al., 2019; Corbet et al., 2020; Hamakhan, 2020; Kim and Deka, 2020). However, there is still one capacity that has not been given acceptable consideration: factors affecting the use of cryptocurrency, especially in the context of Pakistan.
Nowadays, cryptocurrency generates many opportunities, such as efficient, fast, secure, collaborative, and global opportunities, and, thus, have the potential for growth in the market. Despite cryptocurrency's various opportunities, it also poses many drawbacks and problems. Firstly, Cryptocurrency has been used for money-legalising, tax dodging, illegal import transactions, extortion, and robbery of bitcoin itself (Bloomberg, 2017). This leads to the need to investigate users' knowledge about the bitcoin ecosystem with relation to confidentiality, safety, and secrecy. It was concluded that 22% of participants lost money due to self-induced faults and security gaps (Krombholz et al., 2016).
A study revealed that non-users have perceived that they are incapable of using bitcoin, have a misunderstanding about transaction privacy, and are unfamiliar with its functions (Gao et al., 2016). Secondly, a barrier in cryptocurrency development is the lack of financial and technological knowledge. In 2015, the United States conducted a study on financial knowledge and decision making measured by standard questions related to bond price, mortgage, interest rate, inflation, and risk. Respondents who were able to correctly answer all the five questions were only 14% (Lin et al., 2016). Thirdly, constraint to cryptocurrency is the risk associated with volatility in prices. A study by International Netherlands Group (ING) International Survey Mobile Banking found that, in bitcoin, 29% of European investors perceive cryptocurrencies as risky investment (Exton and Doidge, 2018). It has greater risk and price instability as compared to conventional or fiat currency. It was also revealed that cryptocurrency, especially the bitcoin blockchain, is going to illicit illegal financial transactions by using social media, big data, and enlarging bitcoin data (Turner and Irwin, 2018). Besides the volatility in cryptocurrency, like bitcoin prices, it still continues to boom on the internet. Enormous psychological thresholds on prices open due to unpredictability in cryptocurrency (Pelegrín-Borondo et al., 2015).
All this warrants investigation on the question, “what are the essential variables affecting the acceptance of cryptocurrency by the investors in emerging economies?”
In short, cryptocurrencies have potential and opportunities for growth in the emerging economies, with respect to collaborative, noticeable, effective, speedy, confidential, and safe transactions, but it also poses difficulty in using and in adaptability due to less knowledge on technological and financial activities. High volatility in prices and undefined social awareness are drawbacks of cryptocurrencies (Arias-Oliva et al., 2019). A gap in knowledge about bitcoin is due to its relatively young nature, which causes a major threat to the currency market as the value of a currency is associated with confidence in currency (Madey, 2017). Research on cryptocurrency and bitcoin greatly expands as more disciplines draw the black-chain technology to its study (Holub and Johnson, 2018). However, the innovation and complex characteristics of cryptocurrencies make its literature infrequent. TAM 3 aims to assist academics and practitioners in determining why a given technology or system may be acceptable or undesirable, along with taking appropriate actions by giving both explanation and prediction (Lai, 2017). The research was accompanied in Pakistan with a sample of university-educated adults, including investors. The motive behind selecting them is because of their financial knowledge and their elementary knowledge of computers. Moreover, business-educated adults are current and potential investors of financial instruments, most likely of cryptocurrency.
Literature Review
Investors' or Customers' Behavioural Intention to Use Cryptocurrency
In the technology acceptance literature, the phrase “intention to use” refers to a user's desire to use technology in the future. As the study's outcome variable has demonstrated itself to be a good indicator of actual technological use, the intention to use technology has been chosen (Ajzen, 1991; Turner et al., 2010). The majority of technology research takes place in an organisational setting, with the main goals of utilising the technology based on its effectiveness, efficiency, and usefulness. When investigating the desire to use technology in everyday life, both non-utilitarian and utilitarian motivations for usage must be reinforced with the technology viewpoint (Nysveen et al., 2005).
Technology-based research is a multidisciplinary field, including academics from the fields of media, sociology, and social psychology, which is the cornerstone of the uses and gratifications of the study (Blumler and Katz, 1974). The basic concept is that users look for pleasure in media and technology based on their unique “needs” or “motives” since research on usage and gratifications focuses on each user in daily life (Lin, 1996). Several utilitarian reasons linked to usefulness and simplicity of use have been discovered via investigations of uses and gratifications (Höflich and Rössler, 2001; Leung, 2001). In the case of cryptocurrencies and bitcoin, studies show that the perceived usefulness is the crucial element in the intention of whether or not to use them for electronic payments (Mendoza-Tello et al., 2018). In another cryptocurrency study, based on theory of planned behaviour (TPB), the subjective rules (social influence) and perceived behavioural control (as simple or difficult to use cryptocurrencies) are crucial (Schaupp and Festa, 2018). Individuals who see cryptocurrencies as easy to use and get favourable social influence over their use are more inclined to use them.
Bitcoin has also been investigated as a cryptocurrency. Shahzad et al. (2018) found that the perceived usefulness and perceived ease of use had a significant effect in the Chinese acceptability survey on the desire to adopt bitcoin. Multi-attribute models are frequently used to predict behavioural intention (Fishbein and Ajzen, 1977). The process through which technology becomes an integrated element of daily life is frequently described in theories. Users' perceptions of a technology's many characteristics are the subject of such models. In this literature, there are following theories that help to comprehend customers' intention to use technology.
Technology Acceptance Theories and Literature Review
The rate at which payment systems grow, according to Hoenig (1995) and Lai (2016), is the struggle between fast technical progress and the inherent barriers to the acceptance of new products or services. There is a range of suggestions to explain why people are using and wanting to use new technologies. According to the Theory of Diffusion of Innovations (DIT) (Orr, 2003) that began in 1960, diffusion is the process through which members of a social system spread an innovation over time via particular routes. The idea describes the “process of distributing an innovation to members of a social system through certain channels over the period” (Rogers, 2010, p. 5).
Technology readiness (TR) refers to people's willingness to adopt and use new technology in their personal and professional lives (Parasuraman and Colby, 2001). The Theory of Task-technology Fit (TTF) (Goodhue and Thompson, 1995) is appropriate for examining actual technology usage, particularly for testing new technology and receiving feedback. In the Theory of Reasonable Action (TRA) (Fishbein and Ajzen, 1977), a person's “performance of a certain activity is determined by his or her behavioural intention (BI), which is impacted by the person's attitude and subjective norm (SN) regarding the conduct in question” (Davis et al., 1989, p. 983). The Theory of Planned Behaviour (TPB) (Ajzen, 1991) and The Decomposed Theory of Planned Behaviour (Taylor and Todd, 1995c) described the relation of beliefs to behaviour. The two initial parts are the same as the theory of reasonable action and the third aspect is the perceived control over their actions by users. Shih and Fang (2004) examined the adoption of online banking by employing the TPB and decomposed TPB.
The Technology Acceptance Model (TAM) (Davis et al., 1989), the final version of TAM (Davis and Venkatesh, 1996), is one of the most prominent and commonly employed theories, and it addressed the user's behavioural intention to use and to adopt new technology. The Technology Acceptance Model 2 (TAM2) (Venkatesh and Davis, 2000) can be classified into three broad areas. First, it worked on psychological aspects by stimulating the TAM construct (Karahanna et al., 1999). Second, it revealed the importance of the TAM construct through theoretical support (Karahanna et al., 1999). Lastly, it extended the original TAM construct by determining an addition (Karahanna and Straub, 1999; Venkatesh, 2000; Venkatesh and Davis, 2000; Koufaris, 2002).
Technology Acceptance Model (TAM) is a model established to focus on explaining how the people or users respond toward emerging technology (Hu et al., 1999). Technology Acceptance Model 3 (TAM3) (Venkatesh and Bala, 2008) combined TAM 2 (Venkatesh and Davis, 2000) and the model of determinants of perceived ease of use (PEU) (Venkatesh, 2000). In TAM 3, to explain the users' behavioural intention to use technology, a complete network of determinants is introduced. These determinants are social influence, individual differences, system characteristics, and facilitating conditions.
In the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003), the performance expectancy, effort expectancy, social influence, and enabling circumstances are the four determinants of users' behavioural intention. In the UTAUT model, performance expectancy is made up of five comparable constructs: perceived usefulness, extrinsic incentive, job-fit, relative advantage, and result expectancies. Effort expectancy is made up of the ideas of PEU, complexity, and its extension, the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) (Venkatesh et al., 2012). This was accomplished by: (1) selecting three important dimensions from past research on both general and consumer adoption and usage of technologies; (2) altering some of the existing linkages in UTAUT's original conception; and (3) introducing new relationships consistent with the overall principles outlined by Johns (2006) and Alvesson and Kärreman (2007) on how to broaden a theory by exploiting a new context, as well as the ideas given in the TAM special issue of the Journal of the AIS (Bagozzi, 2007; Venkatesh et al., 2007) to make it more consumer friendly.
Research Model and Hypothesis Development
In this research, TAM 3 has been used to examine the relationship between variables as TAM 3 has grown so widespread that it has been mentioned in the majority of studies on user adoption of technology (Lee et al., 2003). During the past thirty years, Technology Acceptance Model (TAM) was considered to be the most applicable and dominant theory in the community of technology (Lucas Jr and Spitler, 1999; Venkatesh and Davis, 2000) dTAM has been extensively tested with many samples in various settings and has shown to be a viable and accurate model for understanding information system acceptance and usage (Mathieson, 1991; Davis and Venkatesh, 1996). Though TAM was well-received (Yang, 2005), it concentrated on the impact of users' perceptions of the technology's utility and ease on adoption intentions (Luarn and Lin, 2005; Lai and Zainal, 2015). As a result, it is advantageous for determining innovative technologies, such as the single platform E-payment System. TAM 3 shows the relationship between subjective norm (SN) on perceived usefulness (PU), computer anxiety (CA), and computer self-efficacy (CS) on perceived ease of use (PEU). The PU, PEU, and SN have a subsequent effect on behavioural intention to use (BIU), which in turn leads to use behaviour (UB). The new relationships determined in Technology Acceptance Model 3 (TAM3) are that the experience will moderate the relationship between:
Perceived ease of use (PEU), and Perceived usefulness (PU),
Computer anxiety and Perceived ease of use (PEU), and
Perceived ease of use (PEU) and Behavioural intention.
Moreover, the PU has been examined as mediator between SN and BIU, as well as PEU and BIU. Also, perceived risk and financial literacy factors, other than TAM 3 factors, are used, having a direct influence on behavioural intention to use cryptocurrency. The subjective norm is described as “the extent to which a person understands that most individuals who are significant for him think that he or she must utilise the system or not” (Fishbein and Ajzen, 1975, p. 302; Venkatesh and Davis, 2000, p. 187). Perceived usefulness is described as “to the extent that a person feels that utilising an IT improves the performance of his work” (Davis et al., 1989, p. 320). Computer self-efficacy is described as “the degree to which a person feels himself or herself has the capacity to accomplish a certain task/work utilising a computer” (Compeau and Higgins, 1995, p. 121). Computer anxiety means “the degree to which someone is concerned about, or even fears when they confront the opportunity to use computers” (Venkatesh, 2000, p. 349). Perceived ease of use is defined as “The extent to which someone thinks it is effortless to use IT” (Davis et al., 1989, p. 320). Experience is defined as a person's stream of observations, interpretations of those sensations, and consequent emotions throughout a system contact (Roto et al., 2011).
Through internalisation and identification processes, the subjective norm and image will significantly influence perceived usefulness (Venkatesh and Davis, 2000). Internalisation is described as the inclusion of the belief of a referent in the structure of his own belief (Warshaw, 1980). In a variety of circumstances, including technology adoption and others, a subjective norm is present. In addition, many researchers think that this building is important (Ramayah and Razak, 2008; Lada et al., 2009; Amin et al., 2013). Ramayah and Razak (2008) studied the influence of subjective norm and intention on the acceptance of Islamic housing by postgraduate students, and reports subjective norm has influenced on behaviour intention. Lada et al. (2009) has utilised TRA reports as a subjective norm to highlight the importance of halal products as an increasingly important market power, with a direct influence on views toward the use of halal products. Subjective norm has influenced on the acceptance of Islamic household products, according to Amin et al. (2013).
In addition, research by Park (2009); Abramson et al. (2015), and Teo (2012) revealed a substantial impact of the SN on the PU and BIU. Individual differences or general attitudes about computers and computer use are reflected by Computer Self-Efficacy and Computer Anxiety (Venkatesh and Bala, 2008). Numerous empirical studies have documented the impact of self-efficacy. Examining customers' willingness to accept a diminishing partnership in house financing, self-efficacy was revealed to be one of the important elements influencing intention by Shaikh et al. (2018b). Taylor and Todd (1995a) investigated students' intentions to use a computing resource centre and found that both self-efficacy and resource-based enabling circumstances are important predictors of behavioural control. Taylor and Todd (1995b) both reported the same finding. The confidence in one's capacity to do the intended behaviour has been shown to have a major impact on the underlying motivation of users to use electronic brokerage technology (i.e., self-efficacy) (Bhattacherjee, 2000).
The more individuals utilise computers in their everyday lives, the more people are projected to experience computer issues (Beckers and Schmidt, 2001). Computer anxiety, among other issues, can represent a major obstacle to the efficient use of computers (Simsek, 2011). To some extent, computer anxiety is defined as an emotional response. It differs from negative computer attitudes, which are based on personal opinions and feelings about computers rather than emotional responses to computer use (Sam et al., 2005). Furthermore, a high degree of computer anxiety was adversely linked to the technology learning (Harrington et al., 1990), computer resistance (Torkzadeh and Angulo, 1992; Weil and Rosen, 1995), and poor job efficiency (Heinssen Jr et al., 1987). A student has more desire to learn a technology as he/she is less confident in his or her computer skills (Zhang and Espinoza, 1998).
In developing perceptions of usefulness, consumers will continue to emphasise perceived ease of use. This argument is based on action identification theory (Vallacher and Kaufman, 1996), which presents a clear distinction between the identities of high and low activity levels. Particularly, the high-level identities of individuals are related to their aims and plans, while the low-level identities are linked to ways by which their goals and plans are achieved. For instance, a high-level identity can provide a high quality report in the context of text processing software, whereas a low-level identity can be marking keys or using a particular software function (Davis and Venkatesh, 2004). While using a computer resource centre, Taylor and Todd (1995c) examined the TAM, theory of planned behaviour (TPB), and Decomposed theory of planned behaviour (DTPB) models and discovered that perceived ease-of-use had a significant influence on perceived usefulness (Taylor and Todd, 1995c). Henderson and Divett (2003); Huynh and Le Thi (2014), and Moslehpour et al. (2018) had examined the PU as a mediator and concluded that PU has a significant mediating effect between PEU and BIU and SN and BIU.
Experience, it is hypothesised, will moderate the relation between SN and PU, CA and PEU, and PEU and PU (Venkatesh and Bala, 2008). It therefore shows that the interaction with a system is “individual” and “dynamic” (Allam and Dahlan, 2013). Whereas, Dishaw and Strong (1998), under the title Experience as a Moderating Variable in a Task-Technology Fit Model, did not support the moderating effect of experience. Two beliefs impact the intention of individuals to utilise a technology, namely, perceived usefulness and perceived ease of use. The effect of external elements on behavioural purposes (e.g., design characteristics) is mediated by theoretically perceived usefulness and ease of use. In the recent two decades, there have been important empirical evidence for TAM (e.g., Adams et al., 1992; Agarwal and Karahanna, 2000; Venkatesh et al., 2003, 2007; Karahanna et al., 2006).
Perceived usefulness refers to the fact that consumers choose a service if they believe it would improve the application of technology (Ryu, 2018). In the last 10 years, a slew of empirical studies have shown that perceived usefulness has a positive impact on users' intention (Hong and Zhu, 2006; Ng and Kwok, 2017). Considering the broader perspective, if there isn't a target degree of technology adoption or service acceptability, the product or system would not work (Amoako-Gyampah, 2007). In other words, system usefulness may be considered to represent acceptance of a specific product or purpose toward a system. Many scholars have shown a strong link between perceived ease of use and attitudes toward new technology adoption in banking studies (Akturan and Tezcan, 2012; Szopiński, 2016). When consumers employ sophisticated information systems to perform financial transactions using portable mobile devices, Riquelme et al. found that perceived usefulness had a substantial impact on users' views and readiness to embrace technology. Users are more likely to accept technology services if they believe they are convenient, pleasant, and simple to use (Riquelme and Rios, 2010). The following hypothesis was formed based on the aforementioned analysis:
H1: SN significantly influences PU.
H2: SN significantly influences BIU.
H3a: CS significantly influences PEU.
H3b: CA significantly influences PEU.
H4: PEU significantly influences PU.
H5: PU mediates the relationship between SN and BIU.
H6: PU mediats the relationship between PEU and BIU.
H7: E moderates the relationship between SN and PU.
H8: E moderates the relationship between CA and PEU.
H9: E moderates the relationship between PEU and PU.
H10: PU significantly influences BIU.
H11: PEU significantly influences BIU.
The perceived risk is the consequence of a selection that reflects the difference between its end results (Gefen et al., 2003), and the potential to which it is not safe to implement innovation (Gerrard and Cunningham, 2003). The major reasons why people fear adopting new technology are risk and uncertainty (Worthington and Edwards, 2000; Pikkarainen et al., 2004). Empirical research on factors predicting the behavioural intention by Faqih (2016) defined the risk seen as an understanding of the degree of insecurity and the potential negative importance of consuming or buying a product by the consumer. Perceived risk was utilised as a factor of the behaviour of investors or consumers to use or to adopt a product (Salisbury et al., 2001; Kannungo and Jain, 2004). Moreover, perceived risk was utilised as a predictor of the use and adoption of technology (Featherman and Pavlou, 2003).
Behavioural intention has been shown to be affected by perceived risk (Kesharwani and Bisht, 2012). The studies of Chen (2008); Yang et al. (2012), and Liébana-Cabanillas et al., 2014) emphasised the necessity of considering both perceived risk and perceived trust as a significant worry that the danger of financial loss influences whether or not payment systems are adopted. Security and privacy concerns were discovered to be key factors in risk perception (Tang et al., 2003; Christou, 2006, 2007, 2011; Tan et al., 2009). One of the three most important elements in influencing cryptocurrency acceptance is perceived risks (viability, safety risk, third-party service default risk, user error risk, risk of privacy loss, counter-party fraud risk, and danger of illegal affiliation) (Nuryyev et al., 2018). More than a few modern types of research have been studied with the aim to utilise Fintech with inconsistent outcomes and have perceived risk as a factor influencing its behaviour. In their study, security certificates are considered as an important precursor to online banking (Khan et al., 2017). The perceived risk influences mobile banking in rural locations significantly in terms of descriptions (Kishore and Sequeira, 2016). The findings revealed that the security or privacy risk has a negative impact on the intention to use internet banking (Lee, 2009).
Shaikh et al. (2018a) concluded in their studies that the perceived risk has a weak direct relation with behavioural intention to use mobile banking, but it has significant importance in the preadoption process. It has influenced other factors that, in the future, have a direct effect on the behavioural intention to adopt or use. Farah et al. (2018) found in their findings that perceived risk has no influence in Pakistan's mobile banking behavioural intention. Moreover, Moon and Hwang (2018) concluded from their findings that perceived risk has no negative effect on the behavioural intention to use crowd-funding. Mendoza-Tello et al. (2018), concerning the literature on cryptocurrencies, determined that perceived risk has no importance in clarifying the intention to adopt cryptocurrencies for electronic payments. There was no evidence of a substantial and direct link between perceived risk and behavioural intention to use (Widyanto et al., 2021). Cryptocurrencies are a developing financial technology involving potential risk. Hence, the following hypothesis has been developed:
H12: Perceived Risk negatively influences Behavioural Intention to use.
Financial knowledge is described as the understanding of important financial concepts that allow an individual to make effective and educated financial decision-making according to their ability (Stolper and Walter, 2017). Hastings et al. (2013a) described financial literacy as the ability to make appropriate use of financial resource management knowledge and skills for lifetime financial stability. As used in academic literature, financial literacy has a range of meanings: it is used for financial products (e.g., what is a bonus vs. a stock), for knowledge about financial concepts (compounding, inflation, credit scores, and diversification), mathematical abilities or the need for numeracy essential for taking financial decisions effectively, and making financial planning. Financial knowledge as a predictive factor of financial behaviour has been studied by several researchers.
Van Rooij et al. (2011) demonstrated that financial decision-making has been influenced by financial literacy. There is a problematic issue of a lack of financial literacy if it makes people incapable of optimising their own welfare or the sort of competitive pressures required to achieve market efficiency, especially if their stake is substantial. This has evident implications for society and individual welfare (Hastings et al., 2013a). Duarte and Hastings (2012); Hastings et al. (2013b) demonstrated the large number of participants in Mexico's Social Security private account system, investing their account balance with dominant financial suppliers charging excessive charges that are not offset for greater returns and add to high management costs for the whole system. Many researches have shown broad and preventable consumer financial errors by consumers, some with insignificant financial implications. In addition to the lab experiments by Choi et al. (2010), it showed that many investors, especially those with a good level of education, fail to choose fees to reduce portfolios even when costs are the sole key characteristic of investments and dispersal of fees. Other financial errors include high interest debt holdings and lower balance sheets in the credit card (Gross and Souleles, 2002), holding taxable assets into tax-deferred accounts and non-taxable or taxable assets (Barber and Odean, 2004; Bergstresser and Poterba, 2004), borrowing from a payday lender when cheaper sources of credit are available (Agarwal et al., 2009), and paying off a mortgage quicker than the amortisation schedule allows while neglecting to contribute to a matching tax-deferred savings account (Amromin et al., 2007).
Individuals with little financial understanding are less interested in investing in equities (Lusardi and Mitchell, 2014). In the assessment of their literature entitled, “the economic importance of financial literacy,” it shows that several papers determine that the more financial knowledge a person has, the more interested in participating in and acquiring equities on financial markets they are. They mention publications from the U.S. and other nations in their research. Moreover, Stolper and Walter (2017) discussed that people's behaviour toward more saving, saving planning, financial markets participation, and intellectual selection among financial instruments are all associated with greater financial knowledge. Similarly, bad financial decision making, poorer debt management, expensive credit card practises, and additional expensive loans are all associated with lower financial knowledge.
Hastings et al. (2013b) demonstrated in their literature review that decisions taken for investments in financial instruments, utilisation of credit cards, loans on a mortgage, and saving plans for retirements are influenced by financial knowledge. Relevant findings have been described by Stolper and Walter (2017), who argue that several research papers have determined that people with high financial literacy are more thoughtful in their financial decision making. Lam and Lam (2017) examined “the relationship between financial literacy and problematic online purchasing in adults” and concluded that the development of financial knowledge in the general public especially in adults has a positive influence on the existence of problematic internet shopping. Carlin et al. studies of the elements affecting technology adoption over millennia shows that life expectancy and financial literacy have important implications for technology adoption aspirations (Carlin et al., 2017). Based on the above literature findings, financial literacy has influenced the use of financial instruments and/or products, and as known that cryptocurrency is a technological financial instrument, the following hypothesis has been developed:
H13: Financial Literacy positively influences Behavioural Intention to use cryptocurrencies.
The demonstrated relations among the examined variables are based on literature analysis of related theories. Hypotheses were developed to establish a connexion between research variables. The identified variables were used to construct a connexion, which will be translated into a theoretical framework (Figure 1) in order to acquire findings from the hypothesis required for the model test.
Figure 1.
Theoretical framework.
Research Design and Methodology
According to Ghauri et al. (2020), the type of research determines how a study is designed. The nature of this study is quantitative to examine the relationship between variables. As in this study, the relationship between variables examined on the basis of previously proposed theories, models, and hypotheses, quantitative research is, therefore, suitable for this study (Cooper et al., 2006; Lateh et al., 2017). Similarly, Creswell and Creswell (2017) suggested that quantitative research design is the most effective means of evaluating hypotheses and is good for analysing the connexion between groups and rationalisation of interdependence among variables. In quantitative research, statistical approaches are used to collect data for hypothesis formation, testing, and for similar interpretation (Sathishkumar et al., 2013). The researcher used a cross-sectional questionnaire survey approach to collect data to investigate the topic of cryptocurrencies adoption in Pakistan's business institutions and the factors that contribute to it as suggested by other researchers (Veal, 2005; Hair et al., 2011; Myers, 2019).
Population and Sampling Technique
With Cryptocurrencies, known as digital currency based on blockchain technology, as indicated in the introduction, it is necessary to have a minimal degree of technical and financial expertise to comprehend the way to work with it in fundamental terms. Thus, this study focused on adults, who already graduated or are studying in business schools or universities, and investors in order to gather data as they are the most engaged, informed, and valuable current or potential investors of financial markets. The cluster area sampling technique has been used for the collection of data in this study. The main reason is that the simple random sampling technique is not convenient due to the law and order situation in the COVID-19 pandemic; it has been difficult to visit all the universities of Pakistan (Rathakrishnan et al., 2021). As a result, the survey was confined to a certain location that was chosen at random. Secondly, the university-wide enrolment list of students and faculty members is not updated on the official website of Higher Education Commission of Pakistan nor is it available at the registrar office of public business schools. Thirdly, the cluster area sampling technique is used because it is the most cost-effective and time saving technique as compared with other probability sampling techniques.
Design of Questionnaire
According to Chomeya (2010), a 7-point Likert scale is the best utilised approach for social and behavioural sciences research scaling. The Likert scale was meant to determine to what extent people agree or disagree with a given declaration (Sekaran and Bougie, 2019). The design of the questionnaire is formulated by using a 7-point Likert scale by providing more choices or options for purpose of capturing more variability in respondents' feelings and attitudes. However, a number of studies have claimed that the 7-point scale is better—one of the main reasons being that it minimises respondents' misunderstanding (Fornell, 1992; Solnet, 2006). In the current research, a 5-item scale to measure the BIU was adopted from Venkatesh and Davis (2000) and Buabeng-Andoh (2018). To measure SN, PU, and PEU, a 4-item scale adopted from the UTAUT2 by Venkatesh et al. (2012) and, recently, by Buabeng-Andoh (2018), for measuring the students' intention to adopt m-learning in Accra capital of Ghana (country in West Africa) was used. CA and CS were measured with a 4-item scale and 5-item scale, respectively (Heinssen Jr et al., 1987). A 3-item scale was used to measure the experience from Lewis and Erdinç (2017). To measure perceived risk, a 3-items scale was adopted (Arias-Oliva et al., 2019). A 3-item scale was used to measure the financial literacy in the study by Hastings et al. (2013b).
Sample Design and Data Collection
The sampling process aimed to gather data from the selected population instead of collecting data from every demographic component (Cooper et al., 2006; Zikmund et al., 2010). The PLS-SEM analysis model is used for the analyses of data collected from the sample. Hair Jr et al. (2016) suggested that, for the SEM, minimum sample size should be about 200 respondents. Therefore, the needed sample size of the present study is minimum 200. In addition, few pieces of research on universities have been carried out by selecting business graduates, academics, and investors for the study sample. Moreover, in the context of Pakistan, response rate have been shown to be 56% by Bodla et al. (2014) and 49% by Gardner (2012). In practise, a larger sample size is preferred to prevent non-response distortion (Sekaran and Bougie, 2019). For primary data collection, an online survey link was set up and shared with the respondents via contacts/acquaintances and through social media. We requested 550 respondents for the survey, yet only 357 respondents turned in their responses (a 64.9% response rate) as presented in Table 1—which is not very uncommon as discussed in the previous chapter. Lastly, because it was an online questionnaire with set parameters, there were no missing data. The profile of the respondents is presented in Table 2.
Table 1.
Response rate of the questionnaires.
| Response | Frequency/rate |
|---|---|
| No. of questionnaires | 550 |
| Questionnaires filled | 357 |
| Questionnaire not filled | 143 |
| Response rate | 64.9% |
Table 2.
Demographic profile of respondents.
| Demography | Description | No. of responses | Percentage |
|---|---|---|---|
| Gender | Male Female |
200 157 |
56.03 43.97 |
| Age (in years) | <20 20-25 26-30 More than 30 |
36 183 81 57 |
10 51.3 22.7 16 |
| Education | Bachelor Masters MS/MPhil PhD |
205 78 45 29 |
57.4 21.8 12.6 8.1 |
| Experience | None <1 1–5 6–10 |
150 77 105 25 |
42 21.6 29.4 7 |
Data Analysis
The study assesses measures for convergent and discriminant validity according to Anderson and Gerbing (1988), and then constructs composite reliability using Confirmatory Factor Analysis (CFA) and SEM, in order to cheque the path links between SN, CA, CS, PU, PEU, BIU, and Experience (E) as moderator and PU as mediator. In this work, SEMs, based on a partial least square (PLS), was utilised. PLS is a well-established approach for the estimation of the path coefficients of the structural models (Ali et al., 2014). Because latent models can be constructed using small to medium samples under non-normality, the PLS approach has grown in popularity in management and marketing research over the last decade (Chin, 1998a).
Measurement Model Results
In this study, by using four criteria (i.e., reliability indicator of the variables/items observed, reliability of the internal consistency, discriminant validity, convergent validity, and model fit evaluation), measurement model is evaluated (Henseler et al., 2009, 2014; Sarstedt et al., 2017; Hair et al., 2019). Figure 2 represents the measurement model:
Figure 2.
Structural model.
For internal consistency dependability, Hair Jr et al. (2017) suggested that Cronbach's alpha and composite reliability must be more than 0.7 and <0.95. The study revealed that all Cronbach's alpha and composite reliability values were above the threshold of 0.7, indicating that all variables have excellent internal consistency dependability. Table 3 shows the results for internal consistency reliability.
Table 3.
Indicators loadings, composite reliability, and average variance extracted of latent variables.
| Indicators | Loadings | AVE | CR | Cronbach's Alpha |
|---|---|---|---|---|
| Behavioural intention to use | 0.789 | 0.949 | 0.933 | |
| BIU1 | 0.893 | |||
| BIU2 | 0.909 | |||
| BIU3 | 0.879 | |||
| BIU4 | 0.906 | |||
| BIU5 | 0.852 | |||
| Computer anxiety | 0.654 | 0.901 | 0.869 | |
| CA1 | 0.612 | |||
| CA2 | 0.878 | |||
| CA3 | 0.951 | |||
| CA4 | 0.751 | |||
| Computer self-efficacy | 0.727 | 0.930 | 0.906 | |
| CS1 | 0.854 | |||
| CS2 | 0.876 | |||
| CS3 | 0.844 | |||
| CS4 | 0.830 | |||
| CS5 | 0.859 | |||
| Experience | 0.864 | 0.950 | 0.921 | |
| E1 | 0.915 | |||
| E2 | 0.933 | |||
| E3 | 0.940 | |||
| Financial literacy | 0.762 | 0.906 | 0.844 | |
| FL1 | 0.893 | |||
| FL2 | 0.881 | |||
| FL3 | 0.845 | |||
| Perceived ease of use | 0.826 | 0.935 | 0.895 | |
| PEU2 | 0.892 | |||
| PEU3 | 0.918 | |||
| PEU4 | 0.917 | |||
| Perceived risk | 0.804 | 0.925 | 0.878 | |
| PR1 | 0.891 | |||
| PR2 | 0.929 | |||
| PR3 | 0.870 | |||
| Perceived usefulness | 0.849 | 0.957 | 0.940 | |
| PU1 | 0.912 | |||
| PU2 | 0.921 | |||
| PU3 | 0.930 | |||
| PU4 | 0.922 | |||
| Subjective norms | 0.807 | 0.944 | 0.920 | |
| SN1 | 0.897 | |||
| SN2 | 0.912 | |||
| SN3 | 0.884 | |||
| SN4 | 0.900 |
AVE, average variance extracted; CR, composite reliability.
Convergent validity was established through factor loadings, Cronbach's Alpha, CR and AVE (Hair et al., 2014). The amount to which an item belonging to one variable represents the same concept is known as convergent validity (Fornell, 1994). When the value of AVE is 0.5 or more than 0.5, convergent validity is acceptable (Chin, 1998b; Hair et al., 2011, 2013). Table 3 indicates that the value of all item loadings exceed 0.6 (Chin, 1998a). CR values were higher than the suggested 0.7 (Hair et al., 2006) in addition, the value of AVE, which quantifies the degree of variance in the indicators explained for by the latent construct, for all the variables investigated in this study met or exceeded the minimum suggested cutoff value, indicating that convergent validity was achieved.
The discriminant validity of a measure refers to how effectively it is not a reflection of other factors (Ramayah et al., 2013). When a variable is observed to be distinct from other variables, it is said to have discriminant validity (Duarte and Raposo, 2010). The Fornell-Larcker and Heterotrait-Monotrate Ratio (HTMT) criteria were used to assess the discriminant validity of all variables in the current investigation. All variables' shared variance should not exceed their AVEs according to Fornell and Larcker (1981). HTML should preferably be <0.85 or 0.9. For the purpose of evaluating discriminant validity, this study used both criteria. Tables 4, 5 demonstrate that the square root of each construct's AVE (diagonal values) is greater than its associated correlation coefficients, suggesting sufficient discriminant validity (Fornell and Larcker, 1981).
Table 4.
Discriminant validity (Fornell-Larcker criterion).
| (Fornell-Larcker criterion) | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| BIU | CA | CS | E | FL | PEU | PR | PU | SN | |
| BIU | 0.888* | ||||||||
| CA | 0.038 | 0.808 | |||||||
| CS | 0.508 | −0.140 | 0.853 | ||||||
| E | 0.743 | 0.102 | 0.425 | 0.929 | |||||
| FL | 0.722 | −0.003 | 0.495 | 0.671 | 0.873 | ||||
| PEU | 0.747 | 0.144 | 0.467 | 0.812 | 0.609 | 0.909 | |||
| PR | 0.263 | −0.122 | 0.324 | 0.274 | 0.337 | 0.296 | 0.897 | ||
| PU | 0.758 | 0.141 | 0.488 | 0.784 | 0.572 | 0.811 | 0.261 | 0.921 | |
| SN | 0.735 | 0.105 | 0.485 | 0.753 | 0.644 | 0.737 | 0.248 | 0.784 | 0.898 |
The main diagonal displays the square root of the average variance derived from each multi-item construct.
Table 5.
Discriminant validity [Heterotrait-monotrait ratio (HTMT)].
| Heterotrait-monotrait ratio (HTMT) | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| BIU | CA | CS | E | FL | PEU | PR | PU | SN | |
| BIU | |||||||||
| CA | 0.070 | ||||||||
| CS | 0.550 | 0.161 | |||||||
| E | 0.800 | 0.101 | 0.461 | ||||||
| FL | 0.813 | 0.046 | 0.566 | 0.759 | |||||
| PEU | 0.817 | 0.147 | 0.511 | 0.894 | 0.699 | ||||
| PR | 0.289 | 0.164 | 0.361 | 0.301 | 0.388 | 0.332 | |||
| PU | 0.809 | 0.107 | 0.525 | 0.842 | 0.641 | 0.884 | 0.288 | ||
| SN | 0.792 | 0.102 | 0.526 | 0.817 | 0.730 | 0.812 | 0.274 | 0.842 | |
Furthermore, as demonstrated in Table 6, results show that the loadings on each indicator's own construct are always larger than the cross loadings with other constructs. As a consequence of the cross-loadings criteria, the results show discriminant validity between all constructs.
Table 6.
Cross loadings.
| BIU | CA | CS | E | FL | PEU | PR | PU | SN | |
|---|---|---|---|---|---|---|---|---|---|
| BIU1 | 0.893 | 0.038 | 0.423 | 0.670 | 0.700 | 0.655 | 0.233 | 0.685 | 0.665 |
| BIU2 | 0.909 | 0.059 | 0.438 | 0.639 | 0.665 | 0.625 | 0.198 | 0.659 | 0.649 |
| BIU3 | 0.879 | −0.019 | 0.472 | 0.657 | 0.618 | 0.664 | 0.289 | 0.656 | 0.679 |
| BIU4 | 0.906 | 0.089 | 0.451 | 0.697 | 0.640 | 0.712 | 0.210 | 0.678 | 0.685 |
| BIU5 | 0.852 | −0.002 | 0.476 | 0.634 | 0.579 | 0.658 | 0.240 | 0.686 | 0.588 |
| CA1 | −0.059 | 0.612 | −0.014 | −0.048 | 0.022 | −0.030 | −0.163 | −0.011 | −0.036 |
| CA2 | −0.018 | 0.878 | −0.158 | 0.057 | −0.049 | 0.079 | −0.143 | 0.049 | 0.041 |
| CA3 | 0.042 | 0.951 | −0.169 | 0.128 | 0.015 | 0.171 | −0.067 | 0.144 | 0.131 |
| CA4 | 0.036 | 0.751 | 0.004 | 0.046 | 0.003 | 0.082 | −0.160 | 0.123 | 0.065 |
| CS1 | 0.470 | −0.168 | 0.854 | 0.388 | 0.445 | 0.408 | 0.275 | 0.410 | 0.448 |
| CS2 | 0.462 | −0.171 | 0.876 | 0.386 | 0.419 | 0.457 | 0.289 | 0.454 | 0.448 |
| CS3 | 0.387 | −0.099 | 0.844 | 0.311 | 0.357 | 0.331 | 0.257 | 0.395 | 0.334 |
| CS4 | 0.394 | −0.071 | 0.830 | 0.352 | 0.456 | 0.359 | 0.299 | 0.363 | 0.407 |
| CS5 | 0.439 | −0.107 | 0.859 | 0.364 | 0.430 | 0.413 | 0.263 | 0.447 | 0.414 |
| E1 | 0.631 | 0.140 | 0.327 | 0.915 | 0.572 | 0.730 | 0.221 | 0.695 | 0.646 |
| E2 | 0.712 | 0.095 | 0.439 | 0.933 | 0.642 | 0.748 | 0.257 | 0.745 | 0.718 |
| E3 | 0.727 | 0.086 | 0.417 | 0.940 | 0.653 | 0.786 | 0.285 | 0.745 | 0.734 |
| FL1 | 0.628 | 0.016 | 0.387 | 0.600 | 0.893 | 0.565 | 0.308 | 0.518 | 0.591 |
| FL2 | 0.654 | 0.008 | 0.430 | 0.596 | 0.881 | 0.560 | 0.292 | 0.520 | 0.579 |
| FL3 | 0.608 | −0.042 | 0.482 | 0.560 | 0.845 | 0.466 | 0.282 | 0.458 | 0.516 |
| PEU2 | 0.648 | 0.175 | 0.369 | 0.709 | 0.525 | 0.892 | 0.260 | 0.746 | 0.681 |
| PEU3 | 0.710 | 0.132 | 0.471 | 0.740 | 0.561 | 0.918 | 0.288 | 0.747 | 0.677 |
| PEU4 | 0.678 | 0.121 | 0.430 | 0.766 | 0.574 | 0.917 | 0.258 | 0.718 | 0.655 |
| PR1 | 0.207 | −0.119 | 0.252 | 0.179 | 0.232 | 0.238 | 0.891 | 0.224 | 0.166 |
| PR2 | 0.258 | −0.123 | 0.315 | 0.256 | 0.302 | 0.281 | 0.929 | 0.217 | 0.218 |
| PR3 | 0.237 | −0.062 | 0.299 | 0.295 | 0.364 | 0.273 | 0.870 | 0.262 | 0.277 |
| PU1 | 0.675 | 0.147 | 0.399 | 0.725 | 0.513 | 0.732 | 0.262 | 0.912 | 0.715 |
| PU2 | 0.695 | 0.119 | 0.452 | 0.721 | 0.545 | 0.736 | 0.228 | 0.921 | 0.731 |
| PU3 | 0.699 | 0.121 | 0.491 | 0.747 | 0.560 | 0.760 | 0.247 | 0.930 | 0.740 |
| PU4 | 0.721 | 0.135 | 0.455 | 0.699 | 0.488 | 0.758 | 0.225 | 0.922 | 0.703 |
| SN1 | 0.638 | 0.086 | 0.427 | 0.695 | 0.568 | 0.670 | 0.237 | 0.678 | 0.897 |
| SN2 | 0.651 | 0.089 | 0.451 | 0.675 | 0.590 | 0.654 | 0.246 | 0.702 | 0.912 |
| SN3 | 0.631 | 0.131 | 0.413 | 0.638 | 0.563 | 0.634 | 0.221 | 0.702 | 0.884 |
| SN4 | 0.719 | 0.109 | 0.450 | 0.698 | 0.593 | 0.691 | 0.191 | 0.733 | 0.900 |
Model fit (Table 7) is assessed using two valid metrics in PLS-path modelling. Henseler et al. (2014) revealed that root mean square residual (SRMR) and goodness-of-fit (GoF) are presently employed to assess how well the proposed model fits the data (Henseler and Sarstedt, 2013). The proposed range of SRMR values is 0–1. For a well-fit model, a value less than or equal to 0.05 is advised, but a value of 0.08 is also acceptable (Hu and Bentler, 1999; Hooper et al., 2008).
Table 7.
Model fit evaluation.
| Saturated model | Estimated model | |
|---|---|---|
| SRMR | 0.048 | 0.052 |
| d_ULS | 1.345 | 1.617 |
| d_G | 0.819 | 0.829 |
| Chi-Square | 1696.024 | 1667.187 |
| NFI | 0.849 | 0.852 |
The value of the SRMR produced by PLS 3 is 0.048 structured model and 0.052 estimated model, which are considerably less than the value of 0.08. It shows that the model in question is appropriate. The normed fit index (NFI) value of almost 1 shows greater fit, according to Lohmöller (1989). The NFI is 0.849 in this research and shows that the model fits well.
Tenenhaus (2005) introduced another diagnostic tool, the goodness-of-fit index (GOF), which may similarly be used to assess model fit. According to the recommended GOF value, data corresponds perfectly with the suggested value 1 (Tenenhaus et al., 2004). For better understanding, the GOF values are split into three groups. If the figure is 0.10, the recommended model is a little amount, 0.25 is reasonable for the data, and 0.36 is a good match for the data (Wetzels et al., 2009). Table 8 shows the results of the current study's Goodness of Fit examination.
Table 8.
Goodness-of-fit (GoF) index.
| Constructs | AVE | R square |
|---|---|---|
| BIU | 0.789 | 0.721 |
| CA | 0.654 | |
| CS | 0.727 | |
| E | 0.864 | |
| FL | 0.762 | |
| PEU | 0.826 | 0.687 |
| PR | 0.804 | |
| PU | 0.849 | 0.752 |
| SN | 0.807 | |
| 0.786 | ||
| 0.72 | ||
| * | 0.5659 | |
| GOF = | 0.7523 | |
We computed a goodness-of-fit value of 0.7523 for the model employed in this investigation, indicating a very excellent model fit. According to Hoffmann and Birnbrich (2012), a cut-off value of 0.36 for GoF_ Large is a suitable match.
Structural Model
The structural model evaluates significance level of path coefficient, coefficient of determination (R2), model predictive relevance (Q2), and effect size (f2) (Shmueli et al., 2016). The statistical significance of the weights of sub constructs and the path coefficients was evaluated using a bootstrapping approach (Chin et al., 2008). The structural model's hypothesised connexions were tested after the measurement model and goodness-of-fit were evaluated. Figure 3 represents the results of structural Model.
Figure 3.
Measurement model.
The explanatory strength of the model can be assessed with R2 (Wasko and Faraj, 2005). The quality and accuracy of the model are determined by the coefficient of determination (R2) (Hair et al., 2014). The extent of variance in the dependent (endogenous) variables is caused by one or more independent (exogenous) variables (Hair et al., 2006, 2014). Chin (1998b) reported that R2 is categorised into three categories: weak (0.19), moderate (0.33), and significant (0.67). Table 9 shows the results of the coefficient of determination (R2) values.
Table 9.
Results of R2 values.
| Endogenous constructs | R square | R square adjusted |
|---|---|---|
| BIU | 0.721 | 0.717 |
| PEU | 0.687 | 0.684 |
| PU | 0.752 | 0.748 |
Perceived ease of use explained 68.6% of behavioural intention to use (R2 = 0.686). Perceived usefulness predicted 75.2% of behavioural intention to use (R2 = 0.752). Perceived usefulness and perceived ease of use, together, predicted 71.5% of behavioural intention to use (R2 = 0.715). Figure 3 also indicates the explanatory power of the predictors variable(s) on each construct is shown by the adjusted R2 values.
The f2 can be determined by eliminating predictor constructs from the path model, changes the R2 level, and demonstrates whether it is significantly impacting the criterion variable to remove a predictor construct (Chin, 1998b). Cohen's effect size (f2) is broken down into three classes: weak (0.02), moderate (0.13), and strong (0.35) (Cohen, 2013).
As mentioned in Table 10, the effect sizes for computer anxiety and computer self-efficacy are 0.027 and 0.072 on perceived ease of use viewed as weak. Subjective norm and Perceived ease to use have effect size value 0.153 and 0.151, respectively, on perceived usefulness, shown as moderate. The effect sizes for financial literacy, perceived ease of use, perceived risk, and perceived usefulness on behavioural intention to use are 0.233, 0.044, 0.002, and 0.080, respectively. Hence, following the guidelines of Cohen (2013), the effects sizes of these four exogenous latent variables on behavioural intention to use could be viewed as strong, weak, none, and moderate, respectively. According to Chin et al. (2003), even the tiniest strength of f2 should be addressed because it has its own distinct effect on the dependent variable.
Table 10.
Results of effect size (f2).
| Endogenous constructs | BIU | PEU | PU | Effect size |
|---|---|---|---|---|
| CA | 0.027 | Weak | ||
| CS | 0.072 | Weak | ||
| FL | 0.233 | Strong | ||
| PEU | 0.044 | 0.151 | Weak, Moderate | |
| PR | 0.002 | None (No Effect) | ||
| PU | 0.080 | Moderate | ||
| SN | 0.022 | 0.153 | Weak, Moderate |
The Geisser-Stone blindfolded test is often used for Q2 computation. Q2 illustrates how effectively gathered data may be empirically reformed using the model and the PLS parameters, based on the blindfolding technique. It also evaluates the performance of the model (Rigdon, 2014; Sarstedt et al., 2014). According to Sattler et al. (2010), this test was applied to endogenous variables with reflective measurements. A Q2 greater than 0 indicates that the model is predictively relevant, whereas a Q2 <0 indicates that the model is not predictively relevant (Fornell and Cha, 1993). Chin (1998b) split Q2 into three sections. The Q2 with a value of 0.02, represents the limited predictive relevance of the model. Whereas, the 0.15 and 0.35 structural model's Q2 showed medium and large predictive relevance.
As shown in Table 11, Q2 for perceived ease to use, perceived usefulness, and behavioural intention to use indicate acceptable predictive relevance.
Table 11.
Results of R2 and Q2 values.
| Endogenous constructs | R square | Q square |
|---|---|---|
| BIU | 0.721 | 0.557 |
| PEU | 0.687 | 0.559 |
| PU | 0.752 | 0.625 |
In order to find significant path coefficients, all the hypotheses of this study were investigated by using P-statistics (under 0.05) and t-statistics (above 1.96) (Preacher and Hayes, 2004; Hair et al., 2011). The path coefficients of structural relations have been calculated and the findings are illustrated in Table 12.
Table 12.
Structural estimates (Hypothesis testing).
| Hypothesis | Path relation | Path Cof. | T statistics (|O/STDEV|) | P | Decision |
|---|---|---|---|---|---|
| H1 | SN -> BIU | 0.139 | 1.977 | 0.049 | Supported |
| H2 | SN -> PU | 0.337 | 4.822 | 0.000 | Supported |
| H3a | CS -> PEU | 0.168 | 3.888 | 0.000 | Supported |
| H3b | CA -> PEU | 0.092 | 2.771 | 0.076 | Rejected |
| H4 | PEU -> PU | 0.373 | 4.938 | 0.000 | Supported |
| H10 | PU -> BIU | 0.358 | 4.910 | 0.000 | Supported |
| H11 | PEU -> BIU | 0.229 | 3.298 | 0.003 | Supported |
| H12 | PR -> BIU | −0.029 | 0.957 | 0.426 | Rejected |
| H13 | FL -> BIU | 0.388 | 6.764 | 0.000 | Supported |
The entire findings of the structural model and hypothesis testing are presented in Table 12. The findings of this study demonstrate that SN have significant influence on both BIU and PU. CS has significant influence on PEU, but CA has no influence on PEU, while PEU has significant and positive influence on PU. According to the current study finding, Perceived risk has no negative influence on behavioural intention to use. Furthermore, the data suggest that PU, PEU, and FL has significant and positive influence on behavioural intention to use.
Mediation Analysis
Bootstrapping is one of the most rigorous and robust techniques to evaluate the mediation effect, and it is gaining traction among academics (Hayes, 2009; Zhao et al., 2010). The current study used Smart PLS 3.0 to examine the influence of PU mediating variable. Both direct and indirect outputs are examined for PU resolution. There was a substantial direct relationship between SN and BIU (p = 0.049) and PEU and BIU (p = 0.003). The relationship between SN, BIU, PEU, and BIU is still significant, but it strengthens following the addition of mediating variables such as PU (p = 0.003). These results demonstrated that PU partially mediate the relationship between SN, BIU, PEU, and BIU that supports our H5 and H6 hypotheses (see Tables 13, 14).
Table 13.
SEM path coefficients of direct hypothesis.
| Hypothesis | Path relation | Path Cof. | T statistics (|O/STDEV|) | P | Decision |
|---|---|---|---|---|---|
| H1 | SN -> BIU | 0.139 | 1.977 | 0.049 | Supported |
| H11 | PEU -> BIU | 0.202 | 2.977 | 0.003 | Supported |
Table 14.
Mediation assessments of perceived usefulness (PU).
| Hypothesis | Path relation | Original sample (O) | T statistics (|O/STDEV|) | P | VAF |
|---|---|---|---|---|---|
| H5 | SN -> PU -> BIU | 0.098 | 2.976 | 0.003 | 0.413 |
| H6 | PEU -> PU -> BIU | 0.108 | 2.917 | 0.004 | 0.349 |
Moderation Analysis
According to Table 12, there is a strong association of SN and PEU with PU (p = 0.000) while CA has no association with PEU (p = 0.076). Hypothesis 7, 8, and 9 asserted that E moderates the relationship between SN and PU, CA and PEU, and CS and PEU. This study's findings revealed that there is no moderating role of experience on the relationship between SN and PU, CA and PEU, and PEU and PU (see Table 15).
Table 15.
Moderation assessments of experience.
| Hypothesis | Path relation | Path Cof. | T statistics (|O/STDEV|) | P | Decision |
|---|---|---|---|---|---|
| H7 | EModSNPU -> PU | −0.020 | 0.350 | 0.727 | Rejected |
| H8 | EModCAPEU -> PEU | 0.003 | 0.068 | 0.946 | Rejected |
| H9 | EModPEUPU -> PU | −0.051 | 0.837 | 0.403 | Rejected |
Conslusion, Theoretical, and Managerial Implications
Although many studies have been conducted on cryptocurrencies perspectives and challenges (Bonneau et al., 2015), cryptocurrency is a new investment opportunity (Chuen et al., 2017), common risk factors in cryptocurrency (Liu et al., 2019), destabilising effects of cryptocurrency cyber-criminality (Corbet et al., 2020), the effect of individual factors on user behaviour (Hamakhan, 2020), advanced applications of block-chain technology (Kim and Deka, 2020), a cross-pollination of ideas about distributed ledger technological innovation through a multidisciplinary and multi-sectoral lens: insights from the blockchain technology (Lemieux et al., 2021), etc. However, literature review reveals an area that has hardly been explored: factors influencing the investors' behavioural intention to adopt or use cryptocurrency in emerging economies. This research has been conducted as a contribution to fill this gap in the literature. Moreover, an extension of the technology acceptance model (TAM3), which is considered the most appropriate model to study the behavioural intention of users toward new technology, has been used concerning cryptocurrency. The previous studies on factors affecting cryptocurrency usage have not applied to this model to examine their variables.
This objective of this study is identifying the major determinants of cryptocurrency adoption by investors, handlers, or/and customers, which will allow present and future market players to investigate the fundamental qualities a cryptocurrency should have. The rapid rise and adoption of cryptocurrencies warrants research on the factors that influence the investment behaviour regarding their adoption so that better and enticing cryptocurrencies can be developed. The study empirically contributed to a number of known linkages between variables, which were evaluated both directly and indirectly to respond to the research gap and to achieve the relevant research objectives set forth in the introductory chapter of the present study. This research has keen-sighted the relations between the variables influencing the investors' behaviour in the adoption of cryptocurrency. All the variables studied in this study are most appropriate to the structure of the cryptocurrency. This study is expected to encourage future academics to uncover other characteristics beyond those described in this study as bitcoin has a lot of potential to be studied.
Limitations and Recommendations for Future Research
Firstly, we are concentrating on a very narrow subset of the population, namely, adults in business universities including investors, with some basic technological knowledge and Internet understanding. Despite our discussion of this choice, future research should be focused on different sectors to obtain a wider understanding of the acceptability of cryptocurrencies in society. The long-term sustainability of cryptocurrency and bitcoin mining is another concern for future studies. Intensive computational resources and significant energy consumption are necessary for the mining process, according to Krause and Tolaymat (2018), and the energy required for mining US$1 of bitcoins between 2016 and 2018 is estimated at 17 mega-joules compared to 5 mega-joules needed to mine US$1 of gold. According to this research, sustainability issues can influence the growth of cryptocurrencies. Technology and the knowledge of financial technology will continue to change shortly. In the future, a longitudinal study should, thus, track the rise of cryptocurrency acceptability and try to update the model to current conditions.
Given the current stage of technical development, both investors and customers consider running or investing in new technology assets to be highly dangerous. The perceived risk related to cryptocurrency transactions is quite high. Therefore, it should be a preliminary requirement for cryptocurrencies in the future to resolve this issue. The first “risk-free” cryptocurrencies might have a significant competitive advantage compared to the present offer. The performance of a new cryptocurrency's product and service (or current cryptocurrency innovation projects) should be prioritised as the most important element in influencing acceptance. To guarantee that potential investors perceive this value, cryptocurrency must be developed into a high-value-added service for clients, requiring significant marketing efforts. As a cryptocurrency adds value, it will be utilised more frequently. The cryptocurrency market is recommended to focus on its usefulness for investors. Moreover, all have an important effect, such as the technical know-how and technical resources required to perform cryptocurrency's operations, an investor's compatibility with technical necessities in cryptocurrency, the presence of widely agreed operating standards, as well as easy access to a support office in the event of a problem.
Conclusion
Cryptocurrency can be viewed as a viable alternative to conventional financial services, as it can be used for both transactional and speculative purpose and is aimed to be used by a wide range of people, from aspiring entrepreneurs to investors. The decentralised architecture and peer-to-peer characteristics of the blockchain technology are highly regarded for cryptocurrency adoption.
This study concludes that the technology acceptance model factors such as subjective norm, computer anxiety, computer self-efficacy, perceived usefulness, perceived ease of use, and experience (as a moderator) influence the behavioural intention of investors and business-educated people in public universities of Pakistan to use cryptocurrency. While, in the current study, moderating role of experience between subjective norm and perceived usefulness, computer anxiety and perceived ease of use, as well as perceived ease of use and perceived usefulness has not been established. Moreover, perceived risk has influenced the behavioural intention of investors and business-educated people in public universities of Pakistan to use cryptocurrency. This study has revealed that perceived risk does not negatively influence adoption of cryptocurrency, while financial literacy has a positive and significant impact on the adoption of cryptocurrency.
However, the findings of this research revealed that investors and business-educated people residing in Pakistan have intentions to invest/use cryptocurrency while ignoring the risk associated with it. The investors considered the cryptocurrency as an opportunity and related it to their productivity and effectiveness. They perceived that using cryptocurrency is free of effort, clear, and understandable.
Data Availability Statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.
Ethics Statement
Ethical review and approval was not required for the study on human participants in accordance with the local legislation and institutional requirements. Written informed consent for participation was not required for this study in accordance with the national legislation and the institutional requirements.
Author Contributions
All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.
Conflict of Interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher's Note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
- Abramson J., Dawson M., Stevens J. (2015). An examination of the prior use of e-learning within an extended technology acceptance model and the factors that influence the behavioral intention of users to use m-learning. SAGE Open 5:2158244015621114. 10.1177/2158244015621114 [DOI] [Google Scholar]
- Adams D. A., Nelson R. R., Todd P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: a replication. MIS Quart. 16, 227–247. 10.2307/249577 [DOI] [Google Scholar]
- Agarwal R., Karahanna E. (2000). Time flies when you're having fun: cognitive absorption and beliefs about information technology usage. MIS Quart. 24, 665–694. 10.2307/3250951 [DOI] [Google Scholar]
- Agarwal S., Skiba P. M., Tobacman J. (2009). Payday loans and credit cards: new liquidity and credit scoring puzzles? Am. Economic Rev. 99, 412–417. 10.1257/aer.99.2.412 [DOI] [Google Scholar]
- Ajzen I. (1991). The theory of planned behavior. Organiz. Behav. Human Decision Process. 50, 179–211. 10.1016/0749-5978(91)90020-T [DOI] [Google Scholar]
- Akturan U., Tezcan N. (2012). Mobile banking adoption of the youth market: perceptions and intentions. Mark. Intell. Plan. 30, 444–459. 10.1108/02634501211231928 [DOI] [Google Scholar]
- Ali F., Hussain K., Ragavan N. A. (2014). Memorable customer experience: examining the effects of customers experience on memories and loyalty in Malaysian resort hotels. Proc. Soc. Behav. Sci. 144, 273–279. 10.1016/j.sbspro.2014.07.296 [DOI] [Google Scholar]
- Allam A., Dahlan H. M. (2013). User experience: challenges and opportunities. J. Inform. Syst. Res. Innovat. 3, 28–36. [Google Scholar]
- Alvesson M., Kärreman D. (2007). Constructing mystery: empirical matters in theory development. Acad. Manage. Rev. 32, 1265–1281. 10.5465/amr.2007.26586822 [DOI] [Google Scholar]
- Amin H., Abdul-Rahman A.-R., Abdul-Razak D. (2013). An integrative approach for understanding Islamic home financing adoption in Malaysia. Int. J. Bank Market. 31, 544–573. 10.1108/IJBM-02-2013-0008 [DOI] [Google Scholar]
- Amoako-Gyampah K. (2007). Perceived usefulness, user involvement and behavioral intention: an empirical study of ERP implementation. Comput. Human Behav. 23, 1232–1248. 10.1016/j.chb.2004.12.002 [DOI] [Google Scholar]
- Amromin G., Huang J., Sialm C. (2007). The tradeoff between mortgage prepayments and tax-deferred retirement savings. J. Public Econom. 91, 2014–2040. 10.1016/j.jpubeco.2007.03.011 [DOI] [Google Scholar]
- Anderson J. C., Gerbing D. W. (1988). Structural equation modeling in practice: a review and recommended two-step approach. Psychol. Bull. 103:411. 10.1037/0033-2909.103.3.411 [DOI] [Google Scholar]
- Arias-Oliva M., Pelegrín-Borondo J., Matías-Clavero G. (2019). Variables influencing cryptocurrency use: a technology acceptance model in Spain. Front. Psychol. 10:475. 10.3389/fpsyg.2019.00475 [DOI] [PMC free article] [PubMed] [Google Scholar]
- Bagozzi R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. J. Assoc. Information Syst. 8:3. 10.17705/1jais.00122 [DOI] [Google Scholar]
- Barber B. M., Odean T. (2004). Are individual investors tax savvy? Evidence from retail and discount brokerage accounts. J. Public Economics 88, 419–442. 10.1016/S0047-2727(02)00217-7 [DOI] [Google Scholar]
- Beckers J. J., Schmidt H. G. (2001). The structure of computer anxiety: a six-factor model. Comput. Human Behav. 17, 35–49. 10.1016/S0747-5632(00)00036-4 [DOI] [Google Scholar]
- Bergstresser D., Poterba J. (2004). Asset allocation and asset location: household evidence from the survey of consumer finances. J. Public Economics 88, 1893–1915. 10.1016/j.jpubeco.2003.07.001 [DOI] [Google Scholar]
- Bhattacherjee A. (2000). Acceptance of e-commerce services: the case of electronic brokerages. IEEE Transact. Syst. Man Cybernetics-Part A 30, 411–420. 10.1109/3468.85243527295638 [DOI] [Google Scholar]
- Bloomberg J. (2017). Using Bitcoin or Other Cryptocurrency to Commit Crimes? Law Enforcement Is Onto You. Forbes. [Google Scholar]
- Blumler J. G., Katz E. (1974). The Uses of Mass Communications: Current Perspectives on Gratifications Research. Sage Annual Reviews of Communication Research Volume III. [Google Scholar]
- Bodla A. A., Hussain M., Chen C. (2014). Determinants of job satisfaction in academic professionals of Pakistan. Sukkur IBA J. Manage. Business 1, 20–39. 10.30537/sijmb.v1i1.75 [DOI] [Google Scholar]
- Bonneau J., Miller A., Clark J., Narayanan A., Kroll J. A., Felten E. W. (2015). Sok: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Paper presented at the 2015 IEEE symposium on security and privacy. 10.1109/SP.2015.1427295638 [DOI] [Google Scholar]
- Bort J. (2014). Is Bitcoin Pizza Day Thanks to These Two Pizzas Worth $5 Million Today. Business Insider. [Google Scholar]
- Buabeng-Andoh C. (2018). Predicting students' intention to adopt mobile learning: a combination of theory of reasoned action and technology acceptance model. J. Res. Innovative Teach. Learn. 15, 124–143. 10.1108/JRIT-03-2017-0004 [DOI] [Google Scholar]
- Burns L., Moro A. (2018). What Makes an ICO Successful? An Investigation of the Role of ICO Characteristics, Team Quality and Market Sentiment. An Investigation of the Role of ICO Characteristics, Team Quality and Market Sentiment. 10.2139/ssrn.3256512 [DOI] [Google Scholar]
- Business Wire (2017). Global Blockchain technology Market Analysis and Trends - Industry Forecast to 2025. [Google Scholar]
- Carlin B., Olafsson A., Pagel M. (2017). Fintech Adoption Across Generations: Financial Fitness in the Information Age. Working Paper Series No. 23798. Cambridge: National Bureau of Economic Research (NBER). Available online at: https://www.nber.org/system/files/working_papers/w23798/w23798.pdf
- Chen L.-,d. (2008). A model of consumer acceptance of mobile payment. Int. J. Mobile Commun. 6, 32–52. 10.1504/IJMC.2008.015997 [DOI] [Google Scholar]
- Chin W. W. (1998a). Commentary: Issues and Opinion on Structural Equation Modeling. JSTOR. [Google Scholar]
- Chin W. W. (1998b). The partial least squares approach to structural equation modeling. Modern Methods Business Res. 295, 295–336. [Google Scholar]
- Chin W. W., Marcolin B. L., Newsted P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Inform. Syst. Res. 14, 189–217. 10.1287/isre.14.2.189.16018 [DOI] [Google Scholar]
- Chin W. W., Peterson R. A., Brown S. P. (2008). Structural equation modeling in marketing: some practical reminders. J. Marketing Theory Pract. 16, 287–298. 10.2753/MTP1069-6679160402 [DOI] [Google Scholar]
- Choi J. J., Laibson D., Madrian B. C. (2010). Why does the law of one price fail? An experiment on index mutual funds. Rev Financial Stud. 23, 1405–1432. 10.1093/rfs/hhp097 [DOI] [PMC free article] [PubMed] [Google Scholar]
- Chomeya R. (2010). Quality of psychology test between Likert scale 5 and 6 points. J. Soc. Sci. 6, 399–403. 10.3844/jssp.2010.399.403 [DOI] [Google Scholar]
- Christou E. (2006). A qualitative analysis of consumer attitudes on adoption of online travel services. Tourism 54, 323–331. [Google Scholar]
- Christou E. (2007). Tourism destination brand personality: Influencing perceptions. Paper presented at the Proceedings of the 2007 ICHRIE Annual Conference and Marketplace, Dallas, Texas, USA. [Google Scholar]
- Christou E. (2011). ISTRAŽIVANJE UTJECAJA ZADOVOLJSTVA POSJETITELJA NA VJERNOST ODREÃENOJ DESTINACIJI/Exploring the impact of visitor satisfaction on loyalty towards a specific destination. Acta Turistica 23, 7–25. [Google Scholar]
- Chuen D. L. K., Guo L., Wang Y. (2017). Cryptocurrency: a new investment opportunity? J. Alternative Invest. 20, 16–40. 10.3905/jai.2018.20.3.016 [DOI] [Google Scholar]
- Cohen J. (2013). Statistical Power Analysis for the Behavioral Sciences, 3rd Edn. London: Academic Press. 10.4324/9780203771587 [DOI] [Google Scholar]
- Coin Market Cap (2020). All Cryptocurrencies. Available online at: https://coinmarketcap.com/all/views/all/ (accessed October 01, 2021).
- Coinmap (2018). Coinmap. Available online at: https://coinmap.org/welcome/ (accessed June 17, 2021).
- Compeau D. R., Higgins C. A. (1995). Application of social cognitive theory to training for computer skills. Informat. Syst. Res. 6, 118–143. 10.1287/isre.6.2.118 [DOI] [Google Scholar]
- Cooper D. R., Schindler P. S., Sun J. (2006). Business Research Methods, Vol. 9. New York, NY: Mcgraw-hill. [Google Scholar]
- Corbet S., Cumming D. J., Lucey B. M., Peat M., Vigne S. A. (2020). The destabilising effects of cryptocurrency cybercriminality. Econom. Lett. 191, 108741. 10.1016/j.econlet.2019.108741 [DOI] [Google Scholar]
- Creswell J. W., Creswell J. D. (2017). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Los Angeles, LA: Sage Publications. [Google Scholar]
- Davis F. D., Bagozzi R. P., Warshaw P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35, 982–1003. 10.1287/mnsc.35.8.982 [DOI] [Google Scholar]
- Davis F. D., Venkatesh V. (1996). A critical assessment of potential measurement biases in the technology acceptance model: three experiments. Int. J. Human-Comput. Stud. 45, 19–45. 10.1006/ijhc.1996.0040 [DOI] [Google Scholar]
- Davis F. D., Venkatesh V. (2004). Toward preprototype user acceptance testing of new information systems: implications for software project management. IEEE Trans. Eng. Manag. 51, 31–46. 10.1109/TEM.2003.82246827295638 [DOI] [Google Scholar]
- Dishaw M., Strong D. (1998). Experience as a moderating variable in a task-technology fit model, in AMCIS 1998 Proceedings, 242. [Google Scholar]
- Dourado E., Brito J. (2016). Cryptocurrency the New Palgrave Dictionary of Economics. London: Palgrave Macmillan; p. 1–9. [Google Scholar]
- Duarte F., Hastings J. S. (2012). Fettered Consumers and Sophisticated Firms: Evidence From Mexico's Privatized Social Security Market. National Bureau of Economic Research. 10.3386/w18582 [DOI] [Google Scholar]
- Duarte P. A. O., Raposo M. L. B. (2010). A PLS model to study brand preference: An application to the mobile phone market, in Handbook of Partial Least Squares, eds V. Vinzi, W. W. Chin, J. Henseler, and H. Wang (Berlin; Heidelberg: Springer; ), 449–485. 10.1007/978-3-540-32827-8_21 [DOI] [Google Scholar]
- Exton J., Doidge F. (2018). Cracking the Code on Cryptocurrency-ING Bank. ING International Survey Mobile Banking. [Google Scholar]
- Faqih K. M. (2016). An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter? J. Retailing Consumer Services 30, 140–164. 10.1016/j.jretconser.2016.01.016 [DOI] [Google Scholar]
- Farah M. F., Hasni M. J. S., Abbas A. K. (2018). Mobile-banking adoption: empirical evidence from the banking sector in Pakistan. Int. J. Bank Market. 36, 1386–1413. 10.1108/IJBM-10-2017-0215 [DOI] [Google Scholar]
- Featherman M. S., Pavlou P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. Int. J. Human-Computer Stud. 59, 451–474. 10.1016/S1071-5819(03)00111-3 [DOI] [Google Scholar]
- Federal Reserve System (2017). Strategies for Improving the U.S. Payment System Federal Reserve Next Steps in the Payments Improvement Journey. Retrieved from: https://fedpaymentsimprovement.org/wpcontent/uploads/strategies-improving-us-payment-system.pdf.
- Fenu G., Marchesi L., Marchesi M., Tonelli R. (2018). The ICO Phenomenon and Its Relationships With Ethereum Smart Contract Environment. Paper presented at the 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). 10.1109/IWBOSE.2018.8327568 [DOI] [Google Scholar]
- Fishbein M., Ajzen I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. New York, NY: Addison-Wesley. p. 177. [Google Scholar]
- Fishbein M., Ajzen I. (1977). Belief, attitude, intention, and behavior: an introduction to theory and research. Philos. Rhetor. 10, 130–132. [Google Scholar]
- Fornell C. (1992). A national customer satisfaction barometer: the Swedish experience. J. Market. 56, 6–21. 10.1177/002224299205600103 [DOI] [Google Scholar]
- Fornell C. (1994). Partial Least Squares. Advanced methods of marketing research. [Google Scholar]
- Fornell C., Cha J. (1993). Partial Least Squares (PLS). Unpublished Working Paper. Ann Arbor: University of Michigan Business School. [Google Scholar]
- Fornell C., Larcker D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res. 18, 39–50. 10.1177/002224378101800104 [DOI] [Google Scholar]
- Gao X., Clark G. D., Lindqvist J. (2016). Of two minds, multiple addresses, and one ledger: characterizing opinions, knowledge, and perceptions of BITCOIN ACROSS users and non-users, in Paper Presented at the Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (California, CF: Association for Computing Machinery; ). 10.1145/2858036.2858049 [DOI] [Google Scholar]
- Gardner S. K. (2012). “I couldn't wait to leave the toxic environment”: A mixed methods study of women faculty satisfaction and departure from one research institution. NASPA J. Women Higher Educ. 5, 71–95. 10.1515/1940-7890.1079 [DOI] [Google Scholar]
- Gefen D., Rao V. S., Tractinsky N. (2003). The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: the Need for Clarifications. Paper presented at the HICSS. [Google Scholar]
- Gerrard P., Cunningham J. B. (2003). The diffusion of internet banking among Singapore consumers. Int. J. Bank Market. 21:16–28. 10.1108/02652320310457776 [DOI] [Google Scholar]
- Ghauri P., Grønhaug K., Strange R. (2020). Research Methods in Business Studies, 5th Edn. Cambridge: Cambridge University Press. 10.1017/9781108762427 [DOI] [Google Scholar]
- Glaser F., Zimmermann K., Haferkorn M., Weber M. C., Siering M. (2014). Bitcoin-Asset or Currency? Revealing Users' Hidden Intentions. Revealing Users' Hidden Intentions. ECIS. [Google Scholar]
- Goodhue D. L., Thompson R. L. (1995). Task-technology fit and individual performance. MIS Quart. 19, 213–236. 10.2307/249689 [DOI] [Google Scholar]
- Gross D. B., Souleles N. S. (2002). Do liquidity constraints and interest rates matter for consumer behavior? Evidence from credit card data. Quart. J. Economics 117, 149–185. 10.1162/003355302753399472 [DOI] [Google Scholar]
- Gupta S., Sadoghi M. (2021). Blockchain Transaction Processing. arXiv preprint arXiv:2107.11592. [Google Scholar]
- Haffke L., Fromberger M. (2020). ICO Market Report 2019/2020–Performance Analysis of 2019's Initial Coin Offerings. Available at SSRN 3770793. 10.2139/ssrn.3770793 [DOI] [Google Scholar]
- Hair Jr J. F., Hult G. T. M., Ringle C., Sarstedt M. (2016). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM: ): Sage publications. [Google Scholar]
- Hair Jr J. F., Sarstedt M., Ringle C. M., Gudergan S. P. (2017). Advanced Issues in Partial Least Squares Structural Equation Modeling. saGe publications. [Google Scholar]
- Hair J., Black W., Babin B., Anderson R. (2014). Multivariate Data Analysis. William C. Black. 7th Edn. Harlow: Pearson Education Limited. [Google Scholar]
- Hair J. F., Black W. C., Babin B. J., Anderson R. E., Tatham R. L. (2006). Multivariate Data Analysis (Vol. 6): Pearson Prentice Hall. Upper Saddle River: NJ. [Google Scholar]
- Hair J. F., Hult G. T. M., Christian M., Ringle Marko S. (2013). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) 2. [Google Scholar]
- Hair J. F., Ringle C. M., Sarstedt M. (2011). PLSSEM: indeed a silver bullet. J. Market. Theory Pract. 19, 139–152. 10.2753/MTP1069-6679190202 [DOI] [Google Scholar]
- Hair J. F., Risher J. J., Sarstedt M., Ringle C. M. (2019). When to use and how to report the results of PLS-SEM. Eur. Business Rev. 31:2–24. 10.1108/EBR-11-2018-0203 [DOI] [Google Scholar]
- Hamakhan Y. T. M. (2020). The effect of individual factors on user behaviour and the moderating role of trust: an empirical investigation of consumers' acceptance of electronic banking in the Kurdistan Region of Iraq. Financial Innovat. 6:1–29. 10.1186/s40854-020-00206-0 [DOI] [Google Scholar]
- Harrington K. V., McElroy J. C., Morrow P. C. (1990). Computer anxiety and computer-based training: a laboratory experiment. J. Educ. Comput. Res. 6:343–58. 10.2190/34Q7-0HHF-8JDL-DR09 [DOI] [Google Scholar]
- Hastings J. S., Hortaçsu A., Syverson C. (2013a). Advertising and Competition in Privatized Social Security: The Case of Mexico. NBER Working Paper Series 18881. [Google Scholar]
- Hastings J. S., Madrian B. C., Skimmyhorn W. L. (2013b). Financial literacy, financial education, and economic outcomes. Annu. Rev. Econ. 5, 347–373. 10.1146/annurev-economics-082312-125807 [DOI] [PMC free article] [PubMed] [Google Scholar]
- Hayes A. F. (2009). Beyond Baron and Kenny: statistical mediation analysis in the new millennium. Commun. Monogr. 76, 408–420. 10.1080/03637750903310360 [DOI] [Google Scholar]
- Heinssen Jr R. K., Glass C. R., Knight L. A. (1987). Assessing computer anxiety: development and validation of the computer anxiety rating scale. Comput. Human Behavior 3, 49–59. 10.1016/0747-5632(87)90010-0 [DOI] [Google Scholar]
- Henderson R., Divett M. J. (2003). Perceived usefulness, ease of use and electronic supermarket use. Int. J. Human-Comput. Stud. 59, 383–395. 10.1016/S1071-5819(03)00079-X [DOI] [Google Scholar]
- Henseler J., Dijkstra T. K., Sarstedt M., Ringle C. M., Diamantopoulos A., Straub D. W., et al. (2014). Common beliefs and reality about PLS: comments on Rönkkö and Evermann (2013). Organiz. Res. Methods 17, 182–209. 10.1177/1094428114526928 [DOI] [Google Scholar]
- Henseler J., Ringle C. M., Sinkovics R. R. (2009). The Use of Partial Least Squares Path Modeling in International Marketing New Challenges to International Marketing. Emerald Group Publishing Limited. 10.1108/S1474-7979(2009)0000020014 [DOI] [Google Scholar]
- Henseler J., Sarstedt M. (2013). Goodness-of-fit indices for partial least squares path modeling. Computat. Statistics 28, 565–580. 10.1007/s00180-012-0317-1 [DOI] [Google Scholar]
- Hileman G., Rauchs M. (2017). 2017 Global Blockchain Benchmarking Study. Available online at: SSRN 3040224. 10.2139/ssrn.3040224 [DOI] [Google Scholar]
- Hoenig T. M. (1995). The US economy: a look ahead. Economic Rev. Federal Reserve Bank Kansas City 80, 19–19. [Google Scholar]
- Hoffmann A. O., Birnbrich C. (2012). The impact of fraud prevention on bank-customer relationships: an empirical investigation in retail banking. Int. J. Bank Market. 30, 390–407. 10.1108/02652321211247435 [DOI] [Google Scholar]
- Höflich J. R., Rössler P. (2001). Mobile schriftliche Kommunikation–oder: E-Mail für das Handy. Die Bedeutung elektronischer Kurznachrichten (Short Message Service) am Beispiel jugendlicher Handynutzer. MandK Medien Kommunikationsw. 49, 437–461. 10.5771/1615-634x-2001-4-43720113525 [DOI] [Google Scholar]
- Holub M., Johnson J. (2018). Bitcoin research across disciplines. Informat. Soc. 34, 114–126. 10.1080/01972243.2017.1414094 [DOI] [Google Scholar]
- Hong W., Zhu K. (2006). Migrating to internet-based e-commerce: factors affecting e-commerce adoption and migration at the firm level. Information Manag. 43, 204–221. 10.1016/j.im.2005.06.003 [DOI] [Google Scholar]
- Hooper D., Coughlan J., Mullen M. (2008). Evaluating model fit: a synthesis of the structural equation modelling literature, in Paper Presented at the 7th European Conference on Research Methodology for Business and Management Studies (London: Regent College; ). [Google Scholar]
- Hu L., Bentler P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equat. Model. 6, 1–55. 10.1080/10705519909540118 [DOI] [Google Scholar]
- Hu P. J., Chau P. Y., Sheng O. R. L., Tam K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine technology. J. Manag. Informat. Syst. 16, 91–112. 10.1080/07421222.1999.11518247 [DOI] [Google Scholar]
- Huynh Q. L., Le Thi T. L. (2014). The mediating role of the perceived usefulness in the acceptance of e-learning. Int. J. Humanities Soc. Sci. Invention 3, 37–42. [Google Scholar]
- Ibba S., Pinna A., Baralla G., Marchesi M. (2018). ICOs overview: should investors choose an ICO developed with the lean startup methodology?, in Paper Presented at the International Conference on Agile Software Development. Porto: Association for Computing Machinery. 10.1007/978-3-319-91602-6_21 [DOI] [Google Scholar]
- Iglesias de Ussel J. (2015). Bitcoin: A New Way to Understand Payment Systems. Massachusetts Institute of Technology. [Google Scholar]
- Joanna Ossinger (2021). Crypto Market Retakes $2 Trillion Market Cap Amid Bitcoin Gains. [Google Scholar]
- Johns G. (2006). The essential impact of context on organizational behavior. Acad. Manage. Rev. 31, 386–408. 10.5465/amr.2006.20208687 [DOI] [Google Scholar]
- Kannungo S., Jain V. (2004). Relationship between risk and intention to purchase in an online context: role of gender and product category. ECIS 2004 Proceedings. 95. Available online at: https://aisel.aisnet.org/ecis2004/95
- Karahanna E., Agarwal R., Angst C. M. (2006). Reconceptualizing compatibility beliefs in technology acceptance research. MIS Quart. 30, 781–804. 10.2307/25148754 [DOI] [Google Scholar]
- Karahanna E., Straub D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information Manage. 35, 237–250. 10.1016/S0378-7206(98)00096-2 [DOI] [Google Scholar]
- Karahanna E., Straub D. W., Chervany N. L. (1999). Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quart. 23, 183–213. 10.2307/249751 [DOI] [Google Scholar]
- Kesharwani A., Bisht S. S. (2012). The impact of trust and perceived risk on internet banking adoption in India: an extension of technology acceptance model. Int. J. Bank Market. 30, 303–322. 10.1108/02652321211236923 [DOI] [Google Scholar]
- Khan I. U., Hameed Z., Khan S. U. (2017). Understanding online banking adoption in a developing country: UTAUT2 with cultural moderators. J. Global Inform. Manage. 25, 43–65. 10.4018/JGIM.2017010103 [DOI] [Google Scholar]
- Kim S., Deka G. C. (2020). Advanced Applications of Blockchain Technology, 1st Edn. New York, NY: Springer. 10.1007/978-981-13-8775-3 [DOI] [Google Scholar]
- Kishore S. K., Sequeira A. H. (2016). An empirical investigation on mobile banking service adoption in rural Karnataka. Sage Open 6:2158244016633731. 10.1177/2158244016633731 [DOI] [Google Scholar]
- Kiviat T. I. (2015). Beyond bitcoin: issues in regulating blockchain tranactions. Duke LJ 65:569. [Google Scholar]
- Koufaris M. (2002). Applying the technology acceptance model and flow theory to online consumer behavior. Informat. Systems Res. 13, 205–223. 10.1287/isre.13.2.205.83 [DOI] [Google Scholar]
- Krause M. J., Tolaymat T. (2018). Quantification of energy and carbon costs for mining cryptocurrencies. Nat. Sustain. 1, 711–718. 10.1038/s41893-018-0152-7 [DOI] [Google Scholar]
- Krombholz K., Judmayer A., Gusenbauer M., Weippl E. (2016). The Other Side of the Coin: User Experiences With Bitcoin Security and Privacy. Paper presented at the International conference on financial cryptography and data security. [Google Scholar]
- Lada S., Tanakinjal G. H., Amin H. (2009). Predicting intention to choose halal products using theory of reasoned action. Int. J. Islamic Middle Eastern Finance Manage. 2, 66–76. 10.1108/17538390910946276 [DOI] [Google Scholar]
- Lai P. (2016). Design and Security impact on consumers' intention to use single platform E-payment. Interdiscipl. Inform. Sci. 22, 111–122. 10.4036/iis.2016.R.05 [DOI] [Google Scholar]
- Lai P., Zainal A. (2015). Consumers' intention to use a single platform e-payment system: a study among Malaysian internet and mobile banking users. J. Int. Bank. Commerce 20, 1–13. [Google Scholar]
- Lai P. C. (2017). The literature review of technology adoption models and theories for the novelty technology. J. Informat. Syst. Tech. Manage. 14, 21–38. 10.4301/S1807-17752017000100002 [DOI] [Google Scholar]
- Lam L. T., Lam M. K. (2017). The association between financial literacy and Problematic Internet Shopping in a multinational sample. Addictive Behav. Rep. 6, 123–127. 10.1016/j.abrep.2017.10.002 [DOI] [PMC free article] [PubMed] [Google Scholar]
- Lateh N. H. M., Shamsudin S., Singh M. K. S., Said S. M. (2017). Is receptive vocabulary knowledge a predictor for english as a second language learners' level of speaking performance? Adv. Sci. Lett. 23, 2907–2910. 10.1166/asl.2017.760118421121 [DOI] [Google Scholar]
- Lee Kuo Chuen D. (2015). Handbook of Digital Currency. Amsterdam: Elsevier. p. 315. [Google Scholar]
- Lee M.-C. (2009). Factors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Res. Appl. 8, 130–141. 10.1016/j.elerap.2008.11.006 [DOI] [Google Scholar]
- Lee Y., Kozar K. A., Larsen K. R. (2003). The technology acceptance model: past, present, and future. Commun. Assoc. Inform. Syst. 12:50. 10.17705/1CAIS.01250 [DOI] [Google Scholar]
- Lemieux V. L., Mashatan A., Safavi-Naini R., Clark J. (2021). A cross-pollination of ideas about distributed ledger technological innovation through a multidisciplinary and multisectoral lens: insights from the blockchain technology symposium'21. Tech. Innovation Manage. Rev. 11, 58–66. 10.22215/timreview/14451445 [DOI] [Google Scholar]
- Leung L. (2001). College student motives for chatting on ICQ. New Media Soc. 3, 483–500. 10.1177/14614440122226209 [DOI] [Google Scholar]
- Lewis J. R., Erdinç O. (2017). User experience rating scales with 7, 11, or 101 points: Does it matter? J. Usability Stud. 12, 73–91. Available online at: https://uxpajournal.org/user-experience-rating-scales-points/ [Google Scholar]
- Liébana-Cabanillas F., Sánchez-Fernández J., Muñoz-Leiva F. (2014). Antecedents of the adoption of the new mobile payment systems: the moderating effect of age. Comput. Human Behav. 35, 464–478. 10.1016/j.chb.2014.03.022 [DOI] [Google Scholar]
- Lin C. A. (1996). Standpoint: looking back: the contribution of Blumler and Katz's uses of mass communication to communication research. J. Broadcast. Electr. Media 40, 574–581. 10.1080/08838159609364379 [DOI] [Google Scholar]
- Lin J. T., Bumcrot C., Ulicny T., Lusardi A., Mottola G., Kieffer C., et al. (2016). Financial Capability in the United States 2016. Washington, DC: FINRA Investor Education Foundation. [Google Scholar]
- Liu Y., Tsyvinski A., Wu X. (2019). Common Risk Factors in Cryptocurrency. Working Paper Series No. 25882. Cambridge: National Bureau of Economic Research. Available online at: https://www.nber.org/system/files/working_papers/w25882/w25882.pdf [Google Scholar]
- Lohmöller J. (1989). Latent Variable Path Modeling With Partial Least Squares. Heidelberg: Physica-Verlag. 10.1007/978-3-642-52512-4 [DOI] [Google Scholar]
- Lone A. H., Naaz R. (2021). Applicability of Blockchain smart contracts in securing Internet and IoT: a systematic literature review. Comput. Sci. Rev. 39:100360. 10.1016/j.cosrev.2020.100360 [DOI] [Google Scholar]
- Luarn P., Lin H.-H. (2005). Toward an understanding of the behavioral intention to use mobile banking. Comput. Human Behav. 21, 873–891. 10.1016/j.chb.2004.03.003 [DOI] [Google Scholar]
- Lucas Jr H. C., Spitler V. (1999). Technology use and performance: a field study of broker workstations. Decision Sci. 30, 291–311. 10.1111/j.1540-5915.1999.tb01611.x [DOI] [Google Scholar]
- Lusardi A., Mitchell O. S. (2014). The economic importance of financial literacy: theory and evidence. J. Economic Literature 52, 5–44. 10.1257/jel.52.1.5 [DOI] [PMC free article] [PubMed] [Google Scholar]
- Madey R. S. (2017). A Study of the History of Cryptocurrency and Associated Risks and Threats. Utica College. [Google Scholar]
- Mathieson K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Informat. Syst. Res. 2, 173–191. 10.1287/isre.2.3.173 [DOI] [Google Scholar]
- Mendoza-Tello J. C., Mora H., Pujol-López F. A., Lytras M. D. (2018). Social commerce as a driver to enhance trust and intention to use cryptocurrencies for electronic payments. IEEE Access 6, 50737–50751. 10.1109/ACCESS.2018.286935927295638 [DOI] [Google Scholar]
- Moon Y., Hwang J. (2018). Crowdfunding as an alternative means for funding sustainable appropriate technology: acceptance determinants of backers. Sustainability 10:1456. 10.3390/su10051456 [DOI] [Google Scholar]
- Moslehpour M., Pham V. K., Wong W.-K., Bilgiçli I. (2018). E-purchase intention of Taiwanese consumers: sustainable mediation of perceived usefulness and perceived ease of use. Sustainability 10:234. 10.3390/su10010234 [DOI] [Google Scholar]
- Mourshoudli F., Bykanova N., Evdokimov D. (2020). Digitalization of the banking environment: formation of effective bank ecosystems, in Economic Social Development: Book of Proceedings (Azerbaijan: Varazdin Development and Entrepreneurship Agency; ), 905–914. [Google Scholar]
- Myers M. D. (2019). Qualitative Research in Business and Management. Sage. [Google Scholar]
- Natarajan H., Krause S. K., Gradstein H. L. (2017). Distributed Ledger Technology (DLT) and Blockchain. World Bank Group. 10.1596/29053 [DOI] [Google Scholar]
- Ng A. W., Kwok B. K. (2017). Emergence of Fintech and cybersecurity in a global financial centre: strategic approach by a regulator. J. Financial Regul. Compliance 25, 422–434. 10.1108/JFRC-01-2017-0013 [DOI] [Google Scholar]
- Nuryyev G., Spyridou A., Yeh S., Achyldurdyyeva J. (2018). Parallel session 4C: Nefeli B room: “hospitality management and industry” 48, in Factors Influencing the Intention of Use Cryptocurrency Payments in Hotels. Tourman (2018). p. 295. [Google Scholar]
- Nysveen H., Pedersen P. E., Thorbjørnsen H. (2005). Intentions to use mobile services: antecedents and cross-service comparisons. J. Acad. Market. Sci. 33, 330–346. 10.1177/0092070305276149 [DOI] [Google Scholar]
- Orr G. (2003). Diffusion of Innovations, by Everett Rogers (1995). [Google Scholar]
- Parasuraman A., Colby C. L. (2001). Techno-Ready Marketing: How and Why Your Customers Adopt Technology. New York, NY: Free Press. [Google Scholar]
- Park S. Y. (2009). An analysis of the technology acceptance model in understanding university students' behavioral intention to use e-learning. J. Educ. Tech. Soc. 12, 150–162. [Google Scholar]
- Patel H., Shrimali B. (2021). AgriOnBlock: secured data harvesting for agriculture sector using blockchain technology. ICT Express [Preprint]. 10.1016/j.icte.2021.07.003 [DOI] [Google Scholar]
- Pelegrín-Borondo J., Arias-Oliva M., González-Menorca L., Juaneda-Ayensa E. (2015). Pricing policies in hotels: a psychological threshold research in online and offline channels. Int. J. Int. Market. Advertising 9, 161–179. 10.1504/IJIMA.2015.070720 [DOI] [Google Scholar]
- Pikkarainen T., Pikkarainen K., Karjaluoto H., Pahnila S. (2004). Consumer acceptance of online banking: an extension of the technology acceptance model. Int. Res. 14, 224–235. 10.1108/10662240410542652 [DOI] [Google Scholar]
- Piscini E., Rosenberg S. J. L. (2015). State-Sponsored Cryptocurrency: Adapting the Best of Bitcoin's Innovation to the Payments Ecosystem' (Report: Deloitte; ). [Google Scholar]
- Preacher K. J., Hayes A. F. (2004). SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behav. Res. Methods Instruments Comput. 36, 717–731. 10.3758/BF03206553 [DOI] [PubMed] [Google Scholar]
- Ramayah T., Razak D. A. (2008). Factors influencing intention to use diminishing partnership home financing. Int. J. Islamic Middle Eastern Finance Manage. 1, 235–248. 10.1108/17538390810901168 [DOI] [Google Scholar]
- Ramayah T., Yeap J. A., Ignatius J. (2013). An empirical inquiry on knowledge sharing among academicians in higher learning institutions. Minerva 51, 131–154. 10.1007/s11024-013-9229-7 [DOI] [Google Scholar]
- Rathakrishnan M., Singh M. K. S., Raman A., Dzakiria H., Don Y. B. (2021). Covid-19 catastrophe: internet based learning and safety among foundation students of Universiti Utara Malaysia. J. Lang. Linguistic Stud. 17, 2142–2153. 10.52462/jlls.155 [DOI] [Google Scholar]
- Raynor de Best (2021). Quantity of Cryptocurrencies as of August 18, 2021. [Google Scholar]
- Rigdon E. E. (2014). Structural Equation Modeling: Nontraditional Alternatives. Wiley StatsRef: Statistics Reference Online, 1–12. 10.1002/9781118445112.stat06528 [DOI] [Google Scholar]
- Riquelme H. E., Rios R. E. (2010). The moderating effect of gender in the adoption of mobile banking. Int. J. Bank Market. 28, 328–341. 10.1108/02652321011064872 [DOI] [Google Scholar]
- Rogers E. M. (2010). Diffusion of Innovations: Simon and Schuster. [Google Scholar]
- Roto V., Law E., Vermeeren A., Hoonhout J. (2011). Bringing Clarity to the Concept of User Experience. Paper presented at the Result from Dagstuhl Seminar on Demarcating User Experience. [Google Scholar]
- Ryu H.-S. (2018). What makes users willing or hesitant to use Fintech?: the moderating effect of user type. Industr. Manage. Data Syst. 118:541–69. 10.1108/IMDS-07-2017-0325 [DOI] [Google Scholar]
- Salisbury W. D., Pearson R. A., Pearson A. W., Miller D. W. (2001). Perceived security and World Wide Web purchase intention. Industr. Manage. Data Syst. 101, 165–177. 10.1108/02635570110390071 [DOI] [Google Scholar]
- Sam H. K., Othman A. E. A., Nordin Z. S. (2005). Computer self-efficacy, computer anxiety, and attitudes toward the Internet: a study among undergraduates in Unimas. J. Educ. Tech. Soc. 8, 205–219. [Google Scholar]
- Sarstedt M., Ringle C. M., Hair J. F. (2017). Partial least squares structural equation modeling, in Handbook of Market Research, eds Homburg C., Klarmann M., Vomberg A. E. (Cham: Springer; ), 1–40. 10.1007/978-3-319-05542-8_15-1 [DOI] [Google Scholar]
- Sarstedt M., Ringle C. M., Henseler J., Hair J. F. (2014). On the Emancipation of PLS-SEM: A Commentary on Rigdon 2012. Long Range Plann. 47, 154–160. 10.1016/j.lrp.2014.02.007 [DOI] [Google Scholar]
- Sathishkumar T., Navaneethakrishnan P., Shankar S., Rajasekar R., Rajini N. (2013). Characterization of natural fiber and composites–a review. J. Reinforced Plastics Composites 32, 1457–1476. 10.1177/0731684413495322 [DOI] [Google Scholar]
- Sattler H., Völckner F., Riediger C., Ringle C. M. (2010). The impact of brand extension success drivers on brand extension price premiums. Int. J. Res. Market. 27, 319–328. 10.1016/j.ijresmar.2010.08.005 [DOI] [Google Scholar]
- Schaupp L. C., Festa M. (2018). Cryptocurrency adoption and the road to regulation, in Paper Presented at the Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, eds Hinnant C. C., Ojo A. (New York, NY: Association for Computing Machinery; ), 1–9. 10.1145/3209281.3209336 [DOI] [Google Scholar]
- Seetharaman A., Saravanan A., Patwa N., Mehta J. (2017). Impact of Bitcoin as a world currency. Account. Finance Res. 6, 230–246. 10.5430/afr.v6n2p230 [DOI] [Google Scholar]
- Sekaran U., Bougie R. (2019). Research Methods for Business: A Skill Building Approach. New York, NY: John Wiley and Sons. [Google Scholar]
- Shahzad F., Xiu G., Wang J., Shahbaz M. (2018). An empirical investigation on the adoption of cryptocurrencies among the people of mainland China. Tech. Soc. 55, 33–40. 10.1016/j.techsoc.2018.05.006 [DOI] [Google Scholar]
- Shaikh A. A., Glavee-Geo R., Karjaluoto H. (2018a). How relevant are risk perceptions, effort, and performance expectancy in mobile banking adoption? Int. J. E-Business Res. 14, 39–60. 10.4018/IJEBR.2018040103 [DOI] [Google Scholar]
- Shaikh I. M., Noordin K., Alsharief A. (2018b). Factors influencing customers' acceptance towards diminishing partnership home financing: a study of Pakistan. Islamic Economic Studies 26, 63–86. 10.12816/0050311 [DOI] [Google Scholar]
- Shift D. (2015). Technology Tipping Points and Societal Impact. Paper presented at the World Economic Forum Survey Report, available at: http://www.weforum.org/docs/WEF_GAC15_Technological_Tipping_Points_report_2015.pdf (last accessed 20.08.2018).
- Shih Y., Fang K. (2004). The use of a decomposed theory of planned behavior to study Internet banking in Taiwan. Internet Res. 14, 213–223. 10.1108/10662240410542643 [DOI] [Google Scholar]
- Shmueli G., Ray S., Estrada J. M. V., Chatla S. B. (2016). The elephant in the room: Predictive performance of PLS models. J. Business Res. 69, 4552–4564. 10.1016/j.jbusres.2016.03.049 [DOI] [Google Scholar]
- Simsek A. (2011). The relationship between computer anxiety and computer self-efficacy. Contempor. Educ. Techn. 2, 177–187. 10.30935/cedtech/60526052 [DOI] [Google Scholar]
- Solnet D. (2006). Introducing employee social identification to customer satisfaction research: a hotel industry study. Manag. Service Qual. 16, 575–594. 10.1108/09604520610711918 [DOI] [Google Scholar]
- Statista Digital Market Outlook (2021). FinTech Report 2021 - Digital Payments. Available online at: https://www.statista.com/outlook/dmo/fintech/digital-payments/worldwide
- Stolper O. A., Walter A. (2017). Financial literacy, financial advice, and financial behavior. J. Business Econom. 87, 581–643. 10.1007/s11573-017-0853-9 [DOI] [Google Scholar]
- Szopiński T. S. (2016). Factors affecting the adoption of online banking in Poland. J. Business Res. 69, 4763–4768. 10.1016/j.jbusres.2016.04.027 [DOI] [Google Scholar]
- Tan K., Eze U., Chong S. (2009). Factors influencing internet-based information and communication technologies adoption among Malaysian small and medium enterprises. Int. J. Manage. Enterprise Dev. 6, 397–418. 10.1504/IJMED.2009.024232 [DOI] [Google Scholar]
- Tang S.-S., Tan W.-S., Devi S., Wang L.-F., Pang T., Thong K.-L. (2003). Mimotopes of the Vi antigen of Salmonella enterica serovar typhi identified from phage display peptide library. Clin. Vaccine Immunol. 10I, 1078–1084. 10.1128/CDLI.10.6.1078-1084.2003 [DOI] [PMC free article] [PubMed] [Google Scholar]
- Tapscott D., Tapscott A. (2017). How blockchain will change organizations. MIT Sloan Manage. Rev. 58:10. [Google Scholar]
- Taylor S., Todd P. (1995a). Assessing IT usage: the role of prior experience. MIS Quart. 19, 561–570. 10.2307/24963333025686 [DOI] [Google Scholar]
- Taylor S., Todd P. (1995b). Decomposition and crossover effects in the theory of planned behavior: a study of consumer adoption intentions. Int. J. Res. Market. 12, 137–155. 10.1016/0167-8116(94)00019-K [DOI] [Google Scholar]
- Taylor S., Todd P. A. (1995c). Understanding information technology usage: a test of competing models. Informat. Syst. Res. 6, 144–176. 10.1287/isre.6.2.144 [DOI] [Google Scholar]
- Tenenhaus M. (2005). PLS Path Modeling Computational Statistics and Data Analysis. v. 48. 10.1016/j.csda.2004.03.005 [DOI] [Google Scholar]
- Tenenhaus M., Amato S., Esposito Vinzi V. (2004). A Global Goodness-of-Fit Index for PLS Structural Equation Modelling. Paper presented at the Proceedings of the XLII SIS scientific meeting. [Google Scholar]
- Teo T. (2012). Examining the intention to use technology among pre-service teachers: an integration of the technology acceptance model and theory of planned behavior. Interactive Learn. Environ. 20, 3–18. 10.1080/10494821003714632 [DOI] [Google Scholar]
- Torkzadeh G., Angulo I. E. (1992). The concept and correlates of computer anxiety. Behav. Informat. Tech. 11, 99–108. 10.1080/01449299208924324 [DOI] [Google Scholar]
- Turner A., Irwin A. S. M. (2018). Bitcoin transactions: a digital discovery of illicit activity on the blockchain. J. Financial Crime 25, 109–130. 10.1108/JFC-12-2016-0078 [DOI] [Google Scholar]
- Turner M., Kitchenham B., Brereton P., Charters S., Budgen D. (2010). Does the technology acceptance model predict actual use? A systematic literature review. Informat. Softw. Tech. 52, 463–479. 10.1016/j.infsof.2009.11.005 [DOI] [Google Scholar]
- Usebitcoins (2018). useBitcoins.info. Available online at: https://usebitcoins.info/.
- Vallacher R. R., Kaufman J. (1996). Dynamics of Action Identification: Volatility and Structure in the Mental Representation of Behavior. [Google Scholar]
- Van Rooij M., Lusardi A., Alessie R. (2011). Financial literacy and stock market participation. J. Financial Econom. 101, 449–472. 10.1016/j.jfineco.2011.03.006 [DOI] [Google Scholar]
- Veal A. J. (2005). Business Research Methods: A Managerial Approach, 2nd Edn. South Melbourne, ML: Pearson Addison Wesley/Pearson Education Australia. [Google Scholar]
- Venkatesh V. (2000). Determinants of perceived ease of use: Integrating perceived behavioral control, computer anxiety and enjoyment into the technology acceptance model. Informat. Syst. Res. 11, 342–365. 10.1287/isre.11.4.342.11872 [DOI] [Google Scholar]
- Venkatesh V., Bala H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sci. 39, 273–315. 10.1111/j.1540-5915.2008.00192.x [DOI] [Google Scholar]
- Venkatesh V., Davis F., Morris M. G. (2007). Dead or alive? The development, trajectory and future of technology adoption research. J. Assoc. Informat. Syst. 8:1. 10.17705/1jais.00120 [DOI] [Google Scholar]
- Venkatesh V., Davis F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46, 186–204. 10.1287/mnsc.46.2.186.11926 [DOI] [Google Scholar]
- Venkatesh V., Morris M. G., Davis G. B., Davis F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quart. 27, 425–478. 10.2307/30036540 [DOI] [Google Scholar]
- Venkatesh V., Thong J. Y., Xu X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quart. 36, 157–178. 10.2307/41410412 [DOI] [Google Scholar]
- Vovchenko N., Andreeva A., Orobinskiy A., Filippov Y. (2017). Competitive advantages of financial transactions on the basis of the blockchain technology in digital economy. Eur. Res. Stud. 20:193. 10.35808/ersj/778778 [DOI] [Google Scholar]
- Warshaw P. R. (1980). A new model for predicting behavioral intentions: an alternative to Fishbein. J. Market. Res. 17, 153–172. 10.1177/002224378001700201 [DOI] [Google Scholar]
- Wasko M. M., Faraj S. (2005). Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quart. 29, 35–57. 10.2307/25148667 [DOI] [Google Scholar]
- Weil M. M., Rosen L. D. (1995). The psychological impact of technology from a global perspective: a study of technological sophistication and technophobia in university students from twenty-three countries. Comput. Human Behav. 11, 95–133. 10.1016/0747-5632(94)00026-E [DOI] [Google Scholar]
- Wetzels M., Odekerken-Schröder G., Van Oppen C. (2009). Using PLS path modeling for assessing hierarchical construct models: guidelines and empirical illustration. MIS Quart. 33, 177–195. 10.2307/20650284 [DOI] [Google Scholar]
- Widyanto H. A., Kusumawardani K. A., Yohanes H. (2021). Safety first: extending UTAUT to better predict mobile payment adoption by incorporating perceived security, perceived risk and trust. J. Sci. Technol. Policy. 10.1108/JSTPM-03-2020-0058. [Epub ahead of print]. [DOI] [Google Scholar]
- Workie H., Jain K. (2017). Distributed ledger technology: implications of blockchain for the securities industry. J. Securities Operat. Custody 9, 347–355. [Google Scholar]
- World Economic Forum (2021). Global Future Council on Cryptocurrencies. 23. [Google Scholar]
- Worthington S., Edwards V. (2000). Changes in payments markets, past, present and future: a comparison between Australia and the UK. Int. J. Bank Market. 18, 212–221. 10.1108/02652320010356771 [DOI] [Google Scholar]
- Yang K. C. C. (2005). Exploring factors affecting the adoption of mobile commerce in Singapore. Telemat. Inform. 22, 257–277. 10.1016/j.tele.2004.11.003 [DOI] [Google Scholar]
- Yang S., Lu Y., Gupta S., Cao Y., Zhang R. (2012). Mobile payment services adoption across time: an empirical study of the effects of behavioral beliefs, social influences, and personal traits. Comput. Human Behav. 28, 129–142. 10.1016/j.chb.2011.08.019 [DOI] [Google Scholar]
- Zhang Y., Espinoza S. (1998). Relationships among computer self-efficacy, attitudes toward computers, and desirability of learning computing skills. J. Res. Comput. Educ. 30, 420–436. 10.1080/08886504.1998.10782236 [DOI] [Google Scholar]
- Zhao X., Lynch Jr J. G., Chen Q. (2010). Reconsidering Baron and Kenny: myths and truths about mediation analysis. J. Consumer Res. 37, 197–206. 10.1086/651257 [DOI] [Google Scholar]
- Zikmund W. G., Babin B. J., Carr J. C., Griffin M. (2010). Business Research Methods, South-Western, Cengage Learning. Mason: OH. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.



