0% found this document useful (0 votes)
11 views

predicting CI of UPI

Research paper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

predicting CI of UPI

Research paper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

International Journal of Early Childhood Special Education (INT-JECSE)

DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

PREDICTING CONTINUATION INTENTION OF UNIFIED


PAYMENT INTERFACE (UPI) USERS WITH TRUST AND
SECURITY: A SEM APPROACH

Sandeep Kaur, Research scholar, Lovely Professional University, Phagwara, email


[email protected]
*Dr. Rupinder Katoch, Associate Professor, Mittal School of Business, Lovely Professional
University, Phagwara-176027, Punjab, India, [email protected]
Corresponding author: - [email protected]

Abstract - The technological development in electronic payment systems has expanded the
prevalence of Unified Payment Interface (UPIs). The users can do shopping online through a
cell phone, which is efficient and helpful. The progress of UPI sets out an open door to
redesigning the places of the UPI system by knowing elements that impact its users in the
continuation of UPI. Whereas several methodologies can be utilized to promote the adoption
of UPI among users, the durable feasibility of a UPI pivots more on users’ continuance
intentions than their preliminary adoption decisions. This article proposed to investigate trust
and security factors affecting the continuance intentions of UPI users in India. SEM analysis
discovered trust and security to be significant determinants of the continuance intentions of
the users towards UPI services in India. Hence, the background of UPI highlights the
importance of integrating trust and security as contextual beliefs in the UPI continuance
intentions. The research’s conclusion has theoretical as well as practical implications that
help to understand the post-adoption behavior towards the UPI system. These results can help
the UPI service providers in decision-making to retain the continuance intentions of users by
giving importance to trust and security antecedents.

Keywords: UPI, Trust, Security, Continuance Intention

1. Introduction

The Unified Payments Interface (UPI) technology combines several bank accounts into a
single mobile app that offers a variety of financial services on a single platform. It is a peer-
to-peer collection request that can be completed as needed and at the user's convenience. The
National payments corporation of India (NPCI), which is controlled by the Reserve bank of
India, launched UPI, an immediate real-time payments system Users can make financial
transactions between two bank accounts on a mobile device using a UPI-enabled app. While
setting up the UPI enabled App, the user should create a Personal Identification Number
(MPIN) for UPI ID for a bank account. Additional bank information, such as account number
and branch IFSC code, isn't required. For transactions, the UPI platform just requires the UPI
ID and MPIN as two-factor validation. The UPI-based transactions are safe and secure thanks
to two-factor authentication. In India, NPCI's BHIM app and Google's Google Pay are two
applications that use the UPI platform. The Unified Payment Interface is a real-time interbank

8419
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

payment system based on smart phones that can revolutionize and universalize digital
payments.
In today's age of digital payments, security and trust are critical for maintaining the link
between users, businesses, and the UPI payment system. For UPI users, security is a big
concern. Users have their own private keys, and secret codes for digital transactions in digital
payments, which has increased the perceived security of UPI payments. It is vital to maintain
a system of authorization and authentication between businesses, users, and payment service
providers in this digital era (Shon and Swatman, 1998). Consumers' perceptions are regularly
identified as a big issue for users of online services and digital technology goods, as they
keep a great deal of data and digital identification methods are occasionally employed to
create secure platforms (Mir et al, 2019). When consumers are concerned about how others
may use their data that is shared and stored on a distant platform, they are less likely to reuse
it. We extend this argument by claiming that such users would generally stop using it. The
study's goal is to see how perceived security considerations affect consumers' trust and
whether or not they will continue to utilize UPI. Organizations can collect user data in the
electronic age, which can be utilized for many purposes. Various studies found the impact of
security and trust on the continued usage of technology in m-commerce, m-banking, and m-
payments, among other areas. The innovative component of this research, to the best of the
researchers' understanding, is that it focuses on trust and security factors in the continuation
of using UPI technology.
The study's background was Indian users’ continuance intentions towards usage of UPI
technologies. UPI is a digital platform that is used to transfer funds from one bank account to
another without sharing any personal information such as bank account details. UPI enables
citizens to access a variety of electronic services, such as payments, paying utility bills, filing
taxes, recharges of mobiles and TVs, online shopping, etc.

2. Theoretical Background and hypothesis development

UPI adoption has continued to grow at an explosive rate. Post-adoption behavior of users has
become a hot theme in the research of information technology (Bhattacherjee, 2001;
Bhattacherjee and Premkumar, 2004). Whereas there are a variety of ways that might be used
to stimulate consumer acceptance of an innovation, the durable success of new technology is
dependent on consumers' continued behavior rather than their early acceptance choices. Users
are subject to dangers like credit card fraud and identity theft in programs that allow the
transfer of sensitive personal data, like business-to-consumer or e-commerce, or government-
to-public or e-government (filing of online tax). Many types of online fraud, such as phishing
and pharming, are growing more popular as e-commerce grows more widespread (Cards
International, 2007). Consumers are concerned about the security of their personal
information on the internet more than ever before (USA Today, 2006). There are growing
concerns that, while reaping the advantages of e-government, the general public may be
jeopardizing their privacy by providing sensitive information to governments (Yu, 2005). As
a result, the importance of infusing trust as a background faith in the information system's
continued existence is highlighted in the e-government research context. Prior information
system research has demonstrated the relevance of trust.

8420
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

Consumers' confidence in UPI to deliver on its promises is measured by their level of trust.
Venkatesh et al., (2012) As a result; continuity intention refers to the extent to which a person
has devised plans to repeat specific future conduct in the future. When executing online
financial transactions in a virtual environment, trust can be defined as the amount of risk
(virus infection, misuse of sensitive data); trust is directly tied to the continued use of the
technology. As a result, trust plays an important role in UPI usage. Users' perceptions of UPI
payments will improve if they have faith in the system. Kindness, honesty, and integrity are
all components of trust. Kindness, honesty, and talent are all traits that contribute to trust.
Users' demands must be met, service providers must not deceive consumers and must keep
their promises, and they must have the necessary abilities to give desired services to users.
The faith that the trustee will work collaboratively to meet the trustor's expectations without
exploiting the trustor's weaknesses is described as trust (Pavlou & Fygenson, 2006). While
trust can be defined in a variety of ways (Mayer et al., 1995; McAllister, 1995), we see it as a
three-dimensional construct that includes competence, compassion, and integrity (Mayer et
al., 1995). Prior research in a context related to the current topic, namely e-commerce, has
used this conceptualization (McKnight et al., 2002; Pavlou and Fygenson, 2006).
Competency is the trustor's confidence in the capacity of the trustee to fulfill the expectations
of the trustor. The trustor has a belief that the trustee will do everything in his best interest is
known as benevolence. The trust in the honesty of the trustee and the ability to maintain its
promises is known as integrity. In societal trade connections, trust is crucial.
Trust is widely utilized to alleviate ambiguity or vulnerability in exchanges, as Bradach &
Eccles (1989) found, especially when persons have limited knowledge or prior experiences.
In the information technology context, somewhere consumers' privacy and security are in
danger, trust is especially important. Consumers must give their sensitive personal data (like
credit card information, mobile numbers) to the merchant through the web while utilizing e-
commerce Web sites, for example. As previously stated, the rise in online fraud as a result of
the disclosure of personal information builds trust a critical element in B2C and G2C
platforms. We anticipate that trust will play a crucial role in the pre-and post-use stages of
UPI.
Users' security worries are a critical problem that can erode trust and slow adoption (Gu et
al., 2016; Hogail, 2018; Falcone and Sapienza, 2018; Momani et al., 2016). So the Digital
service providers must earn the trust of their users and reassure them that they will be safe.
Given that these technologies capture a wide range of data from users through their sensor
network, the approach of security executed and its impact on consumers' perceptivity is
closely tied to their trust in the structure and usage intention (Gu et al., 2016; Hogail, 2018;
Falcone and Sapienza, 2018; Bhattarai and Wang, 2018). The users will not rely on those
technology devices if they carry many risks. Privacy and security are found main constructs
in the literature that significantly affects the trust in the wearables context; also these factors
are identified as barriers to trust formation and usage intention (Pal et al., 2019; Warrington
et al., 2000).
Trust has been shown to influence UPI acceptance by instilling favorable attitudes, making it
a critical factor in the development of various IS. The studies of e-commerce (Pavlou and

8421
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

Fygenson, 2006; Wang, 2008) and e-government (Carter and Belanger, 2005) are examples
of information systems that demand the digital transfer of sensitive personal information, as
well as IS that promote inter-organizational data distribution like supply chain management
method (Straub et al., 2004). As users interact with the digital system, trust grows and varies
over the period. Models that look at the impact of trust over some time on diverse behavioral
results are relatively uncommon. As a result, it's critical to consider the longitudinal character
of trust and study its consequences overtime on UPI. The level of security available will
influence a user's decision to adopt any digital payment method (Huang, 2012). The desire to
use digital payment in the future was driven by security concerns. High security and privacy
concerns would make people less likely to use mobile payments (Lei-da Chen and Ravi Nath,
2008). As a result, we anticipate trust and security to be critical contextual assumption that
influences intention to continue. Furthermore, a previous study (Carter and Belanger, 2005;
Pavlou and Fygenson, 2006; Lightner, 2004; Liao and Shi, 2017) indicates that after usage
trust and security have a beneficial impact on continuation intentions and further security
affects users' trust in UPI.
In the objective, the factors security and trust are included that influence the users continued
intention to use UPI-based payment practices. Firstly, the impact of perceived security on
users' trust is analyzed. The user’s trust in UPI-based payment practices is assumed to be an
endogenous construct zero-order reflective in nature. The security is assumed as an
exogenous construct. Secondly, security and trust influence on intention to continue using
UPI is analyzed. These factors influencing the user continuance intention of UPI-based
payment practices are assumed to be zero-order and reflective in nature. The user continuance
intention of UPI-based payment practices is assumed to be an endogenous construct zero-
order reflective in nature. The security and trust factors are assumed as exogenous constructs
and a structural model (SEM model) is developed in examining the impact of perceived
security on users' trust, then security and trust on continuance intention of UPI-based
payment practices. The SEM analysis is used to examine the following hypothesis:

On the basis of the model, we framed 3 main hypotheses:


H1: Security in UPI is positively related with users’ trust in UPI.
H2: Security in UPI has positive impact on continuance intention to use UPI
H3: Trust is positively associated to continuance intention to use UPI

8422
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

Figure 1- Conceptual model

3. Measurement
In this study, the data used to evaluate the hypotheses was acquired by a structured
questionnaire. The content validity test, expert validity test, and pilot testing are some of the
procedures involved in creating successful questionnaire items. To begin, the researchers
used and changed questionnaire items from earlier studies that had been published in
respectable international or national publications to undertake content validity testing. For all
constructs, we updated previously verified scales to meet the requirements.
By providing certain questionnaire modifications, the authors validate the questions with five
experts in the academic field. After that, a readability test was carried out. The findings
revealed that respondents had no trouble to fill the questionnaire. The next step is to run pilot
testing to ensure that the items meet the construct validity and reliability requirements. Data
from 79 respondents were used in the pilot test, which was processed using SPSS 25
software. The "Corrected Item – Total Correlation" score is used to determine item validity.
Friedenberg and Kaplan stated that for an item to be regarded legitimate, the correlation
coefficient should be more than 0.3 [Indravati and Shabila, 2020]. The overall items are valid,
according to the validity test, with all CITC scores over 0.3. The Cronbach-Alpha (CA)
approach is the most extensively used to measure item reliability [Indravati and Shabila,
2020]. Instruments with a CA of greater than 0.70 can be considered reliable [Indravati and
Shabila, 2020]. All of the items are reliable and valid, according to the SPSS 25 Software
results.
The items are shown in table 1.

Trust I trust the UPI’s reliability and availability


I believe that UPI is trustworthy
UPI provides online transaction services in my best interest
I believe that transaction data is safe and confidential
I believe that immediate confirmation message provided by
system, when transaction is completed
I believe UPI service providers keep users interest in mind

8423
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

I believe that UPI service provider will do everything to keep


users transaction data secure
Security I would feel secure using my personal information through
UPI system
UPI system are secure means through which, funds can be
send/receive
UPI is secured method of online payments/transactions
UPI maintains privacy of data
UPI platform provides good firewall technology to prevent
unauthorized intrusion
Data stored at UPI system cannot be manipulated or
tampered
I have not fear of hack invasion into UPI system
Continuance If I had access to UPI, I intend to continue use it
Intention I plan to continue use of UPI in future
I will have continuance intention to use UPI for online
transaction
I have continuance intentions of using UPI than other
alternative means
I would like to continue to make suggestions for UPI
I will keep using UPI as regularly as I do now
Table 1- statements of constructs and sources

4. Data collection, data analysis, and results


The authors used Google Forms to distribute the questionnaire and collect the data in order to
test the 3 hypotheses. The study takes place in India, in the cities of Punjab, Haryana, and
Himachal Pradesh. The data was gathered from 651 respondents. Valid data refers to
information that has been filled up by the participants who match the study's criterion. The
respondent's uniqueness are UPI users who have been using the UPI services in order to
obtain more reliable data on the customers' opinions, and customers aged less than 30years,
31-45 years, and more than 46 years. The UPI users selected as respondents of the study are
service class people, businessmen, professionals, retired people, and students. Purposive
sampling and cluster sampling are adopted in the study to select the respondents for the study
because the sampling frame of the respondents is not available, and the probability sampling
method is difficult to apply. A sample of 651 UPI users was collected through a structured
questionnaire as follows:

State Number of UPI users


Punjab 300
Haryana 275
Himachal Pradesh 76
Table 2

8424
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

4.1 Demographic profile of respondents

We calculated the demographic factors, which are shown in Table 3. There were 57.3%
males, while females accounted for 42.7% of all respondents; 42.5% of respondents belonged
31-45 years, 39.8% of participants were aged less than 30years, and 17.7% were aged more
than 45years. Most participants (76.8%) in the study were urban people. The majority of the
respondents are service class people (42.9%).

Demographics Sub Category Frequency (%)

Gender Male 373 (57.3%)


Female 278 (42.7%)
Age Less than 30 259 (39.8%)
31-45years 277 (42.5%)
More than 45years 115 (17.7%)
Occupation Service class- (Employees) 279 (42.9%)
Businessmen 110 (16.9%)
Professional- (CA, Dr., Lawyers 58 (8.9%)
etc.)
Retired people 49 (7.5%)
Student 155 (23.8%)
Location Rural 151 (23.2%)
Urban 500 (76.8%)
Table 3: Frequency Distribution

After the data collection, the authors did a descriptive analysis to determine UPI user’s
perceptions of the Model's factors.

Mean Std. Skewness Kurtosis


Statements Deviation
TR1- I trust the UPI’s 5.28 1.450 -0.708 -0.268
reliability and availability
TR2- I believe that UPI is 5.01 1.477 -0.587 -0.376
trustworthy
TR3- UPI provides online 5.17 1.465 -0.512 -0.695
transaction services in my
best interest
TR4- I believe that 5.08 1.519 -0.656 -0.171
transaction data is safe and
confidential
TR5- I believe that 4.98 1.558 -0.547 -0.466
immediate confirmation
message provided by

8425
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

system, when transaction


is completed
TR6- I believe UPI 5.03 1.446 -0.544 -0.383
service providers keep
users interest in mind
TR7- I believe that UPI 5.20 1.479 -0.635 -0.367
service provider will do
everything to keep users
transaction data secure
Table 4: Descriptive statistic- Trust

Mean Std. Skewness Kurtosis


Statements Deviation
SEC1- I would feel 4.86 1.744 -0.436 -0.927
secure using my
personal information
through UPI system
SEC2- UPI system 5.00 1.560 -0.611 -0.510
are secure means
through which, funds
can be send/receive
SEC3- UPI is secured 4.82 1.574 -0.513 -0.361
method of online
payments/transactions
SEC4-UPI maintains 4.88 1.596 -0.536 -0.529
privacy of data
SEC5- UPI platform 4.70 1.552 -0.460 -0.453
provides good firewall
technology to prevent
unauthorized intrusion
SEC6- Data stored at 4.60 1.684 -0.372 -0.795
UPI system cannot be
manipulated or
tampered
SEC7- I have not fear 4.74 1.746 -0.475 -0.846
of hack invasion into
UPI system
Table 5: Descriptive statistics- Security

8426
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

Mean Std. Skewness Kurtosis


Statements Deviation
CI1- If I had access to 4.91 1.612 -0.457 -0.628
UPI, I intend to
continue use it
CI2- I plan to continue 4.81 1.568 -0.360 -0.794
use of UPI in future
CI3- I will have 4.79 1.567 -0.407 -0.590
continuance intention
to use UPI for online
transaction
CI4- I have 4.72 1.542 -0.294 -0.755
continuance intentions
of using UPI than other
alternative means
CI5- I would like to 4.73 1.496 -0.386 -0.600
continue to make
suggestions for UPI
CI6- I will keep using 4.97 1.717 -0.556 -0.720
UPI as regularly as I do
now
Table 6: Descriptive statistics- Continuance Intention

Respondents had a favorable opinion of Trust towards UPI. According to the data, most of
the respondents consider UPI is a trustworthy platform. Meanwhile, the lowest score is T5,
which means "I believe that immediate confirmation message is provided by the system
when the transaction is completed." It was discovered that UPI has already established
consumer trust; consequently, UPI must maintain users' trust to continue to connect with
customers. The customer perception of the Continuance Intention element is positive. It
indicates that a person has made intentions to use UPI on a regular basis and to engage in a
specific UPI future behavior.
The authors assessed the valid data after learning how the customers felt about the
components in the conceptual Model. Smart PLS, was used to evaluate the 651 valid data.
PLS data processing consists of two steps: evaluation of the Outer and Inner models. Firstly,
it is to ensure that the things are both valid and trustworthy. The reliability is calculated using
Cronbach’s Alpha and composite reliability In [Indravati, 2017], a Cronbach's Alpha should
be 0.7 shows that questionnaire is reliable. High composite reliability means the construct is
sound. Good composite reliability shows that the construct indicators are combined and
measure the construct appropriately. A minimum CR value of 0.7 was necessary for the value
of CR [Indravati, 2017]. TABLE 7 demonstrates that all of the items in this study met the
requirements for dependability.

8427
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

4.2 Construct Validity


After ensuring the presence of internal consistency reliability in the different factors of the
measurement scale measuring the factors which influence the user’s satisfaction of UPI-
based payment practices, the construct validity of the scale is examined with the help of the
CFA method. The construct validity of the scale includes the convergent validity as well as
discriminant validity. The convergent validity of the scale examines whether the included
statement of each factor is significantly related and also has a significant correlation with
their factors. In other words, the convergent validity confirms that the statement used in the
study significantly represents their respective factors. The convergent validity of the
measurement scale is tested using construct loadings, composite reliability (CR), and average
variance extracted (AVE) estimates. In order to ensure the presence of convergent validity in
the scale, the following conditions must be fulfilled:

Construct Construct Cronbach Composite Average


Name Loadings Alpha Reliability variance
CI1 0.85 Extracted
CI2 0.758
CI3 0.72
CI4 Continuance 0.772 0.912 0.912 0.636
CI5 Intention 0.762
CI6 0.907
SAT2 0.72
SAT3 0.801
SAT4 0.775
SAT5 0.823
SEC1 0.829
SEC2 Security 0.747 0.917 0.918 0.615
SEC3 0.786
SEC4 0.777
SEC5 0.751
SEC6 0.776
SEC7 0.818
TR1 0.804
TR2 Trust 0.734 0.894 0.895 0.55
TR3 0.737
TR4 0.714
TR5 0.67
TR6 0.718
TR7 0.805
Table 7 CA, CR, AND AVE
In order to ensure the presence of discriminant validity, the AVE of each construct should be
greater than its MSV estimate and the square root of AVE should be greater than the
correlation of each construct with the remaining construct.

8428
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

Continuan

Intention

Security

Trust
ce
Continuance Intention 0.797
Security 0.74 0.784
Trust 0.78 0.768 0.742
Table 8: Discriminant Validity

The test was carried out in terms of convergent validity by calculating the Average Variance
Extracted (AVE) Indicators. In Indravati, 2017, AVE score of higher than 0.50 indicates that
the elements of a construct have sufficient convergent validity (Indravati, 2017). Table 7
demonstrates that the AVE values for the constructs employed in this investigation are
greater than 0.5. As a result, every construct passes the convergent validity test.
The following are the findings of hypothesis testing:
The bootstrapping procedure is used to determine the influence of latent variables on other
latent variables, which is the first stage in evaluating a structural model in PLS. The t-value
of the path coefficient from one latent variable to another variable must be at least 1.65 to be
declared significant at the 95 percent confidence level in one tail test. Each latent variable's
path coefficient and t-value are shown in Table 9.

Figure 2- SEM

8429
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

Hypothesis Endogeno Exogeno Standa


us us Path rd R
Construct Constru coeffici Deviati Squar Remar
ct ent on T Stats e k
Security in
UPI has
positive Support
impact on 0.361 0.041 8.838** ed
continuance Security
intention to 56.7%
use UPI Continuan
Trust is ce
positively Intention
associated to Trust Support
continuance 0.456 0.457 10.842** ed
intention to
use UPI
Security in
UPI is
positively
related with Trust Security Support
users’ trust in 0.697 0.027 26.033** 48.6% ed
UPI

TABLE 9 – the path coefficient and T value

4.3 Results
The results of the SEM analysis supported the hypothesis that “There selected factors
(security and trust) significantly influence the user continuance intention of using UPI based
payment practices. For the security factor that influences users' Trust in UPI; security and
trust in UPI significantly influence continuance intention of using UPI. The table also
reported the path coefficients of the different factors that influence the user continuance
intention of using UPI-based payment practices (security =.361, trust =.456; and path
coefficient of security factor that affects trust is .697. Thus, it can be concluded that the
selected factors of security and trust significantly influenced on intention to continue using
UPI and security also influenced users' trust in using UPI significantly.
Security influenced users' trust in using UPI significantly. Trust and Security are the
independent constructs that affect CI positivity and significantly, respectively, from the
highest to the lowest, according to the data provided in Table9.
On the basis on the results and analysis of this study, we draw some conclusions.

8430
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

5. Conclusion
This objective aims to find the impact of perceived security factors on users' trust and its
influence on intention to continue using UPI. This objective is fulfilled with the help of
hypothesis testing using SEM analysis using Smart-PLS software. All the assumptions are
examined before the hypothesis testing method.
In the research, 2 variables were found to have a favorable and significant impact on the
user's intentions to continue using UPI. The following are recommendations for UPI services
providers based on the aspects that have a substantial impact on the user's continued intention
to use UPI:

6. Suggestions
The first factor that has a major impact on the desire to use UPI in the future is trust. The
lowest item score in this variable was concerning the customer's trust in UPI to perform the
appropriate jobs even when they weren't being supervised. It would be preferable if UPI
service providers worked to enhance user trust by reducing the number of faults that occur in
the system. UPI management can develop and upgrade the system and security regularly. As
a result, errors would be reduced, perhaps increasing consumer trust in UPI. If some faults
occur, UPI must always be prepared to assist customers in resolving their issues.

7. Theoretical implications
The objective of the study is to see if trust and security have any impact on the hypothesized
model relationships. The study's distinctiveness comes in its proposal of a new approach for
gauging UPI continuance intentions. In addition, Trust and security have rarely been
mentioned a few times in earlier UPI research. This paper contributes to the field through its
research on the continuance intention of UPI services. Previous research findings on the
continuance intentions in m-commerce and m-payment are mixed. In that regard, this new
research aids in the clarification of this contradiction.

8. Practical implications
The study contains several management implications to consider. In the first instance, UPI
service providers must highlight the use of UPI services and emphasize the trust security
concerns to the continuation of these services. Trust and security were revealed to be
significant predictors of continuance intention in the study. UPI service providers should
strengthen their data protection and security mechanisms, as well as their public transparency
on privacy, data protection, and refund policies, in order to increase perceived consumer
trust. UPI service providers must implement secure and dependable security measures to
prevent unauthorized access to consumer accounts. The use of third-party certification
systems can further improve consumer perceptions of trust and security. Furthermore,
because UPI transactions involve the transmission of sensitive personal and financial
information, advanced encryption methods must be used to protect data not only during
transmission but also during storage. Additional verification mechanisms for smart phones,
such as fingerprint recognition, can help make UPI transactions more secure and reliable.

8431
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

References
[1]. Indravati and Shabila, A. M. (2020, June). The Influence of Website-Based and
Company-Based Quality toward Loyalty with Perceived Website Trust as
Antecedents. In 2020 8th International Conference on Information and
Communication Technology (ICoICT) (pp. 1-5). IEEE.
[2]. Indrawati, R., Wai, A., Mansur, M., Tohir, G., & Has, Y. (2017). Perilaku Konsumen
Individu. Aditama. Bandung.
[3]. Putri, D. A. (2018, May). Analyzing factors influencing continuance intention of e-
payment adoption using modified UTAUT 2 model. In 2018 6th International
Conference on Information and Communication Technology (ICoICT) (pp. 167-173).
IEEE.
[4]. Putri, D. A., Indrawati, L. H., & Dwi, L. (2017). The use of modified unified theory of
acceptance and use of technology 2 model to analyze factors influencing continuance
intention of E-Payment adoption (a case study of Go-Pay from
Indonesia). International Journal of Science and Research (IJSR), 1322-1326.
[5]. Indrawati, R., Wai, A., Mansur, M., Tohir, G., & Has, Y. (2017). Perilaku Konsumen
Individu. Aditama. Bandung.
[6]. Lightner, N. J. (2004). Evaluating e-commerce functionality with a focus on customer
service. Communications of the ACM, 47(10), 88-92.
[7]. Liao, Z., & Shi, X. (2009). Consumer perceptions of internet‐based e‐retailing: an
empirical research in Hong Kong. Journal of Services Marketing.
[8]. Li, H., & Liu, Y. (2014). Understanding post-adoption behaviors of e-service users in
the context of online travel services. Information & Management, 51(8), 1043-1052.
[9]. Liao, Z., & Shi, X. (2017). Web functionality, web content, information security, and
online tourism service continuance. Journal of Retailing and Consumer Services, 39,
258-263.
[10]. Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of
information technology: extending the unified theory of acceptance and use of
technology. MIS quarterly, 157-178.
[11]. Mir, U. B., Kar, A. K., Dwivedi, Y. K., Gupta, M. P., & Sharma, R. S. (2019).
Realizing digital identity in government: Prioritizing design and implementation
objectives for Aadhaar in India. Government Information Quarterly, 37(2), 101442
[12]. Shon, T. H., & Swatman, P. M. (1998). Identifying effectiveness criteria for Internet
payment systems. Internet Research, 8(3), 202–218
[13]. Gu, Z., Wei, J., & Xu, F. (2016). An empirical study on factors influencing
consumers' initial trust in wearable commerce. Journal of Computer Information
Systems, 56(1), 79-85.
[14]. AlHogail, A. (2018). Improving IoT technology adoption through improving
consumer trust. Technologies, 6(3), 64.
[15]. Falcone, R., & Sapienza, A. (2018). On the users’ acceptance of IoT systems: A
theoretical approach. Information, 9(3), 53.

8432
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

[16]. Al-Momani, A. M., Mahmoud, M. A., & Ahmad, M. S. (2016). Modeling the
adoption of internet of things services: A conceptual framework. International
Journal of Applied Research, 2(5), 361-367.
[17]. Bhattarai, S., & Wang, Y. (2018). End-to-end trust and security for Internet of Things
applications. Computer, 51(4), 20-27.
[18]. Warrington, T. B., & Caldwell, H. M. (2000). Building trust to develop competitive
advantage in e‐business relationships. Competitiveness Review: An International
Business Journal.
[19]. Pal, D., Funilkul, S., & Papasratorn, B. (2019). Antecedents of trust and the
continuance intention in IoT-based smart products: The case of consumer
wearables. IEEE Access, 7, 184160-184171.
[20]. Bhattacherjee, A. (2001). Understanding information systems continuance: An
expectation-confirmation model. MIS quarterly, 351-370.
[21]. Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in belief and
attitude toward information technology usage: A theoretical model and longitudinal
test. MIS quarterly, 229-254.
[22]. Cards International (2007) Security and fraud: the changing face of fraud. Cards
International, London, May 7, 2007.
[23]. Carter, L., & Bélanger, F. (2005). The utilization of e‐government services: citizen
trust, innovation and acceptance factors. Information systems journal, 15(1), 5-25.
[24]. McAllister, D. J. (1995). Affect-and cognition-based trust as foundations for
interpersonal cooperation in organizations. Academy of management journal, 38(1),
24-59.
[25]. McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating
trust measures for e-commerce: An integrative typology. Information systems
research, 13(3), 334-359.
[26]. Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic
commerce adoption: An extension of the theory of planned behavior. MIS quarterly,
115-143.
[27]. Yu, J. W. K. (2005). Electronic government and its implication for data privacy in
Hong Kong: Can Personal Data (Privacy) Ordinance protect the privacy of personal
information in cyberspace?. International Review of Law, Computers &
Technology, 19(2), 143-163.
[28]. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of
organizational trust. Academy of management review, 20(3), 709-734.
[29]. Bradach, J. L., & Eccles, R. G. (1989). Price, authority, and trust: From ideal types to
plural forms. Annual review of sociology, 15(1), 97-118.
[30]. Straub, D., Rai, A., & Klein, R. (2004). Measuring firm performance at the network
level: A nomology of the business impact of digital supply networks. Journal of
management information systems, 21(1), 83-114.
[31]. Huang, E., & Cheng, F. C. (2012). Online security cues and e-payment continuance
intention. International Journal of E-Entrepreneurship and Innovation (IJEEI), 3(1),
42-58.

8433
International Journal of Early Childhood Special Education (INT-JECSE)
DOI:10.9756/INTJECSE/V14I2.937 ISSN: 1308-5581 Vol 14, Issue 02 2022

[32]. Nath, R. (2008). Determinants of mobile payments: an empirical analysis. Journal of


International Technology and Information Management, 17(1),

Author’s profile

Sandeep kaur is currently Research scholar at Mittal School of Business, Lovely


professional University, Phagwara, Punjab (India). She has worked at GNDU RC Fattudhinga
as a assistant professor on part time basis. She has published 6 research papers in national
journals and edited books.

CS.Dr. Rupinder Katoch is currently Associate Professor at Mittal School of


Business, (MHRD NIRF India Rank 52; ACBSP USA, Accredited), Lovely Professional
University, Phagwara, Punjab (India).
In academic career spanning over 18 years, she has served at Sant Baba Bhag Singh Post
Graduate College,Jalandhar as Principal, Khalsa College for women, Civil Lines ,Ludhiana
as Head of the Commerce Department, Kamla Nehru College Phagwara and S.D.College
Hoshiarpur as an Assistant Professor in Commerce. She also held the Prestigious position of
the Chairman of Board of Studies of the University Institue of Commerce and management,
and was actively engaged in syllabus formation of the Sant Baba Bhag Singh University.
As ingenious researcher, she has published several research papers in national & international
journals and is also a blogger on Taxguru. She has published two text books. She has guided
2 M.Phil research students. She believes in the philosophy “Failure is the temporary change
in the direction to set you straight for your next success”.

8434

You might also like