{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:07:19Z","timestamp":1743124039611,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105470"},{"type":"electronic","value":"9783031105487"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10548-7_19","type":"book-chapter","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T12:04:01Z","timestamp":1658750641000},"page":"253-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["E-Payment Continuance Usage: The Roles of Perceived Trust and Perceived Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5775-8494","authenticated-orcid":false,"given":"Thanh D.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Quynh N. T.","family":"Tran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"19_CR1","unstructured":"Abrazhevich, D.: Electronic Payment Systems: A User-Centered Perspective and Interaction Design. Technische Universiteit Eindhoven (2004)"},{"issue":"3","key":"19_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/S0268-4012(01)00011-1","volume":"21","author":"AM Aladwani","year":"2001","unstructured":"Aladwani, A.M.: Online banking: a field study of drivers, development challenges, and expectations. Int. J. Inf. Manag. 21(3), 213\u2013225 (2001)","journal-title":"Int. J. Inf. Manag."},{"key":"19_CR3","unstructured":"Bauer, R.A.: Consumer behavior as risk taking. In: AMA Proceeding, Chicago (1960)"},{"issue":"3","key":"19_CR4","doi-asserted-by":"publisher","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"A Bhattacherjee","year":"2001","unstructured":"Bhattacherjee, A.: Understanding information systems continuance: an expectation-confirmation model. MIS Q. 25(3), 351\u2013370 (2001)","journal-title":"MIS Q."},{"issue":"5","key":"19_CR5","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1108\/09576050210447046","volume":"15","author":"RK Chellappa","year":"2002","unstructured":"Chellappa, R.K., Pavlou, P.A.: Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logist. Inf. Manag. 15(5), 358\u2013368 (2002)","journal-title":"Logist. Inf. Manag."},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35, 982\u20131003 (1989)","journal-title":"Manage. Sci."},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","volume":"59","author":"M Featherman","year":"2003","unstructured":"Featherman, M., Pavlou, P.: Predicting e-services adoption: a perceived risk facets perspective. Int. J. Hum. Comput. Stud. 59(4), 451\u2013474 (2003)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"3","key":"19_CR8","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s10796-015-9611-0","volume":"19","author":"L Gao","year":"2015","unstructured":"Gao, L., Waechter, K.A.: Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation. Inf. Syst. Front. 19(3), 525\u2013548 (2015). https:\/\/doi.org\/10.1007\/s10796-015-9611-0","journal-title":"Inf. Syst. Front."},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51\u201390 (2003)","journal-title":"MIS Q."},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0378-7206(02)00006-X","volume":"40","author":"G Hackbarth","year":"2003","unstructured":"Hackbarth, G., Grover, V., Mun, Y.Y.: Computer playfulness and anxiety: positive and negative mediators of the system experience effect on perceived ease of use. Inf. Manag. 40, 221\u2013232 (2003)","journal-title":"Inf. Manag."},{"key":"19_CR11","first-page":"31","volume":"17","author":"RJ Hwang","year":"2006","unstructured":"Hwang, R.J., Li, J.F., Hsiao, Y.K.: A wireless-based authentication and anonymous channels for GSM system. J. Comput. 17, 31\u201336 (2006)","journal-title":"J. Comput."},{"key":"19_CR12","volume-title":"Electronic Commerce: A Manager\u2019s Guide","author":"R Kalakota","year":"1997","unstructured":"Kalakota, R., Whinston, A.B.: Electronic Commerce: A Manager\u2019s Guide. Addison-Wesley, Boston (1997)"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.elerap.2009.04.014","volume":"9","author":"C Kim","year":"2010","unstructured":"Kim, C., Tao, W., Shin, N., Kim, K.S.: An empirical study of customers\u2019 perceptions of security and trust in e-payment systems. Electron. Commer. Res. Appl. 9, 84\u201395 (2010)","journal-title":"Electron. Commer. Res. Appl."},{"key":"19_CR14","unstructured":"Laudon, K., Traver, C.: E-Commerce: Business Technology Society. Pearson (2021)"},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.elerap.2011.07.003","volume":"10","author":"C Liao","year":"2011","unstructured":"Liao, C., Liu, C.C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. Electron. Commer. Res. Appl. 10, 702\u2013715 (2011)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"4","key":"19_CR16","doi-asserted-by":"publisher","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"M Limayem","year":"2007","unstructured":"Limayem, M., Hirt, S.G., Cheung, C.M.: How habit limits the predictive power of intention: the case of information systems continuance. MIS Q. 31(4), 705\u2013737 (2007)","journal-title":"MIS Q."},{"key":"19_CR17","unstructured":"Linck, K., Pousttchi, K., Wiedemann, D.G.: Security issues in mobile payment from the customer viewpoint. In: ECIS Proceedings, p. 62 (2006)"},{"key":"19_CR18","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1007\/978-3-319-73150-6_68","volume-title":"Econometrics for Financial Applications","author":"TD Nguyen","year":"2018","unstructured":"Nguyen, T.D., Huynh, P.A.: The roles of perceived risk and trust on e-payment adoption. In: Anh, L.H., Dong, L.S., Kreinovich, V., Thach, N.N. (eds.) ECONVN 2018. SCI, vol. 760, pp. 926\u2013940. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73150-6_68"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1080\/1331677X.2017.1305791","volume":"30","author":"E Oney","year":"2017","unstructured":"Oney, E., Guven, G.O., Rizvi, W.H.: The determinants of electronic payment systems usage from consumers\u2019 perspective. Econ. Res.-Ekonomska Istra\u017eivanja 30, 394\u2013415 (2017)","journal-title":"Econ. Res.-Ekonomska Istra\u017eivanja"},{"key":"19_CR20","first-page":"6","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Lee, D., Ahn, J.: Risk-focused e-commerce adoption model: a cross-country study. J. Glob. Inf. Technol. Manag. 7, 6\u201330 (2004)","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7, 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commer."},{"key":"19_CR22","unstructured":"Rahman, S.: Introduction to E-commerce technology in business. GRIN (2014)"},{"key":"19_CR23","unstructured":"Shao, Z., Zhang, L.: What promotes customers\u2019 trust in the mobile payment platform: an empirical study of alipay in China. In: CONF-IRM Proceedings, p. 45 (2018)"},{"issue":"3","key":"19_CR24","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1108\/10662249810217759","volume":"8","author":"TH Shon","year":"1998","unstructured":"Shon, T.H., Swatman, P.M.: Identifying effectiveness criteria for Internet payment systems. Internet Res. 8(3), 202\u2013218 (1998)","journal-title":"Internet Res."},{"key":"19_CR25","first-page":"39994","volume":"3","author":"W Suwunniponth","year":"2015","unstructured":"Suwunniponth, W.: Customers\u2019 intention to use electronic payment system for purchasing. Image 3, 39994 (2015)","journal-title":"Image"},{"key":"19_CR26","unstructured":"Swick, N.K.: Benefits & risks of electronic payment systems (2010). https:\/\/thatcreditunionblog.wordpress.com"},{"key":"19_CR27","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.cose.2004.11.001","volume":"24","author":"T Tsiakis","year":"2005","unstructured":"Tsiakis, T., Sthephanides, G.: The concept of security and trust in electronic payments. Comput. Secur. 24, 10\u201315 (2005)","journal-title":"Comput. Secur."},{"issue":"3","key":"19_CR28","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"key":"19_CR29","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1111\/j.1365-2575.2011.00373.x","volume":"21","author":"V Venkatesh","year":"2011","unstructured":"Venkatesh, V., Thong, J.Y., Chan, F.K., Hu, P.J.H., Brown, S.A.: Extending the two-stage information systems continuance model: incorporating UTAUT predictors and the role of context. Inf. Syst. J. 21, 527\u2013555 (2011)","journal-title":"Inf. Syst. J."},{"key":"19_CR30","unstructured":"We are social. Digital 2020 Vietnam report (2021)"},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","volume":"42","author":"JH Wu","year":"2005","unstructured":"Wu, J.H., Wang, S.C.: What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model. Inf. Manag. 42, 719\u2013729 (2005)","journal-title":"Inf. Manag."},{"key":"19_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.chb.2015.03.058","volume":"50","author":"Q Yang","year":"2015","unstructured":"Yang, Q., Pang, C., Liu, L., Yen, D., Tarn, J.: Exploring consumer perceived risk and trust for online payments: an empirical study in China\u2019s younger generation. Comput. Hum. Behav. 50, 9\u201324 (2015)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"19_CR33","first-page":"44","volume":"13","author":"W Yaokumah","year":"2017","unstructured":"Yaokumah, W., Kumah, P., Okai, E.: Demographic influences on e-payment services. Int. J. Econ. Bus. Res. 13(1), 44\u201365 (2017)","journal-title":"Int. J. Econ. Bus. Res."},{"key":"19_CR34","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-030-96305-7_42","volume-title":"Hybrid Intelligent Systems","author":"M Shaba","year":"2022","unstructured":"Shaba, M., Roland, A., Simon, J., Misra, S., Ayeni, F.: A real-time sentimental analysis on e-commerce sites in Nigeria using machine learning. In: Shaba, M., Roland, A., Simon, J., Misra, S., Ayeni, F. (eds.) HIS 2021. LNNS, vol. 420, pp. 452\u2013462. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96305-7_42"},{"key":"19_CR35","unstructured":"Vietnam E-commerce Association: Vietnam e-commerce (2021)"},{"key":"19_CR36","unstructured":"Q&Me: Vietnam e-commerce report, Ho Chi Minh City (2018)"},{"key":"19_CR37","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46, 186\u2013204 (2000)","journal-title":"Manag. Sci."},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39, 273\u2013315 (2008)","journal-title":"Decis. Sci."},{"issue":"1","key":"19_CR39","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh, V., Thong, J., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157\u2013178 (2012)","journal-title":"MIS Q."},{"key":"19_CR40","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-86223-7_19","volume-title":"Information Systems and Management Science","author":"AO Afolabi","year":"2022","unstructured":"Afolabi, A.O., Oluwatobi, S., Emebo, O., Misra, S., Garg, L.: Evaluation of the merits and demerits associated with a diy web-based platform for e-commerce entrepreneurs. In: Garg, L., et al. (eds.) ISMS 2020. LNNS, vol. 303, pp. 214\u2013227. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-86223-7_19"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10548-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T12:07:52Z","timestamp":1658750872000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10548-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105470","9783031105487"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10548-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"279","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285 Workshop submission accepted out of 815 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}