{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T03:31:15Z","timestamp":1774582275158,"version":"3.50.1"},"reference-count":42,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2001,6,1]],"date-time":"2001-06-01T00:00:00Z","timestamp":991353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001,6,1]]},"abstract":"<jats:p>While Web\u2010based consumer activity is poised on the brink of dramatic growth, concerns about security have the potential to limit this growth by arousing shopper\u2019s concerns about the Web\u2010based channel. One key aspect to consumer participation in Web commerce may be the extent to which they perceive risk to their sensitive information. This study describes the creation of a scale to measure perceived Web security. We apply the scale in a causal model to investigate the relative impact of beliefs about Web shopping on intent to purchase products using the World Wide Web. Data from two samples is used to develop the scale and to perform the causal analysis. Our findings indicate the favorable psychometric properties of the scale, and the causal analysis from our sample indicates that security is a greater influence on intent to purchase using the Web than is the ease and utility of purchasing products.<\/jats:p>","DOI":"10.1108\/02635570110390071","type":"journal-article","created":{"date-parts":[[2007,4,13]],"date-time":"2007-04-13T09:51:27Z","timestamp":1176457887000},"page":"165-177","source":"Crossref","is-referenced-by-count":388,"title":["Perceived security and World Wide Web purchase intention"],"prefix":"10.1108","volume":"101","author":[{"given":"W. David","family":"Salisbury","sequence":"first","affiliation":[]},{"given":"Rodney A.","family":"Pearson","sequence":"additional","affiliation":[]},{"given":"Allison W.","family":"Pearson","sequence":"additional","affiliation":[]},{"given":"David W.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031020051310700_B1","doi-asserted-by":"crossref","unstructured":"Adams, D.A., Nelson, R.R. and Todd, P.A. (1992), \u201cPerceived usefulness, ease of use and usage of information technology: A replication\u201c, Management Information Systems Quarterly, Vol. 16 No. 2, pp. 227\u201047.","DOI":"10.2307\/249577"},{"key":"key2022031020051310700_B2","doi-asserted-by":"crossref","unstructured":"Anderson, J. and Gerbing, D.W. (1991), \u201cPredicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities\u201d, Journal of Applied Psychology, Vol. 76 No. 5, pp. 732\u201040.","DOI":"10.1037\/0021-9010.76.5.732"},{"key":"key2022031020051310700_B3","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1985), \u201cFrom intentions to actions: a theory of planned behavior\u201d, in Kuhl, J. and Becaman, J. (Eds.), Action\u2010control: From Cognition to Behavior, Springer, Heidelberg, pp. 11\u201039.","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"key2022031020051310700_B4","unstructured":"Ajzen, I. and Fishbein, M. (1980), Understanding Attitudes and Predicting Social Behavior, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022031020051310700_B5","unstructured":"Arbuckle, J. (1999), AMOS 4.0 User\u2019s Guide, SmallWaters Corporation, Chicago, IL."},{"key":"key2022031020051310700_B6","doi-asserted-by":"crossref","unstructured":"Bagozzi, R.P. and Yi, Y. (1988), \u201cOn the evaluation of structural equation models\u201d, Journal of the Academy of Marketing Science, Vol. 16,  pp. 74\u201094.","DOI":"10.1007\/BF02723327"},{"key":"key2022031020051310700_B7","doi-asserted-by":"crossref","unstructured":"Bentler, P.M. (1990), \u201cComparative fit indexes in structural models\u201d, Psychological Bulletin, Vol. 107, pp. 238\u201046.","DOI":"10.1037\/0033-2909.107.2.238"},{"key":"key2022031020051310700_B8","doi-asserted-by":"crossref","unstructured":"Bentler, P.M. and Bonnett, D.G. (1980), \u201cSignificance tests and goodness of fit in the analysis of covariance structures\u201d, Psychological Bulletin, Vol. 88, pp. 588\u2010606.","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"key2022031020051310700_B9","unstructured":"Blair, T. (1997), \u201cBorderless buying: the net lets consumers import their own culture\u201d, Time, available online: http:\/\/pathfinder.com\/time\/magazine\/199\/the_arts_publ.borderless.bu.html"},{"key":"key2022031020051310700_B10","doi-asserted-by":"crossref","unstructured":"Bollen, K.A. (1986), \u201cSample size and Bentler and Bonnet\u2019s nonnormed fit index\u201d, Psychometrika, Vol. 51, pp. 375\u201077.","DOI":"10.1007\/BF02294061"},{"key":"key2022031020051310700_B11","doi-asserted-by":"crossref","unstructured":"Bollen, K.A. (1989), Structural Equations with Latent Variables, Wiley, New York, NY.","DOI":"10.1002\/9781118619179"},{"key":"key2022031020051310700_B12","doi-asserted-by":"crossref","unstructured":"Bollen, K.A. and Stine, R.A. (1992), \u201cBootstrapping goodness\u2010of\u2010fit measures in structural equation models\u201d, in Bollen, K.A. and Long, J.S. (Eds.), Testing Structural Equation Models, Sage, Thousand Oaks, CA, pp. 111\u201035.","DOI":"10.1177\/0049124192021002004"},{"key":"key2022031020051310700_B13","doi-asserted-by":"crossref","unstructured":"Chin, W.W. and Gopal, A. (1995), \u201cAdoption intention in GSS: Relative importance of beliefs\u201d, The Database for Advances in Information Systems, Vol. 26 No. 2 and 3,  pp. 42\u201064.","DOI":"10.1145\/217278.217285"},{"key":"key2022031020051310700_B14","unstructured":"Chin, W.W. and Newsted, P.R. (1993), \u201cOn the appropriate use and reporting of covariance\u2010based structural equations models in information systems research: The case of end\u2010user computing satisfaction\u201d, University of Calgary Working Paper No. WP 93\u201041."},{"key":"key2022031020051310700_B15","doi-asserted-by":"crossref","unstructured":"Chin, W.W. and Todd, P.R., (1995), \u201cOn the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution\u201d, Management Information Systems Quarterly, Vol. 19 No. 2, pp. 237\u201046.","DOI":"10.2307\/249690"},{"key":"key2022031020051310700_B16","doi-asserted-by":"crossref","unstructured":"Chin, W.W. Gopal, A. and Salisbury, W.D. (1997), \u201cAdvancing the theory of adaptive structuration: the development of a scale to measure faithfulness of appropriation\u201d, Information Systems Research, Vol. 8 No. 4, pp. 342\u201067.","DOI":"10.1287\/isre.8.4.342"},{"key":"key2022031020051310700_B17","unstructured":"Cohen, J. (1988), Statistical Power Analysis for the Behavioral Sciences, Second Edition, Lawrence Erlbaum, Hillsdale, NJ."},{"key":"key2022031020051310700_B18","unstructured":"Computer Security Canada, Inc. (1998), \u201cMedia examples of security breaches\u201d, available online: http:\/\/www.csci.ca\/breach.htm"},{"key":"key2022031020051310700_B19","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, Management Information Systems Quarterly, Vol. 13 No. 3, pp. 319\u201039.","DOI":"10.2307\/249008"},{"key":"key2022031020051310700_B20","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022031020051310700_B21","unstructured":"Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: an Introduction to Theory and Research, Addison\u2010Wesley, Reading, MA."},{"key":"key2022031020051310700_B22","doi-asserted-by":"crossref","unstructured":"Hendrickson, A.R., Massey, P.D. and Cronan, T.P. (1993), \u201cOn the test\u2010retest reliability of perceived usefulness and perceived ease of use scales\u201d, Management Information Systems Quarterly, Vol. 17 No. 2, pp. 227\u201030.","DOI":"10.2307\/249803"},{"key":"key2022031020051310700_B23","unstructured":"Hoyle, R.H. and Panter, A.T. (1995), \u201cWriting about structural equations models\u201d, in Hoyle, R.H. (Ed.), Structural Equation Modeling: Concepts, Issues, and Applications, Sage, Thousand Oaks, CA, pp. 158\u201076."},{"key":"key2022031020051310700_B24","unstructured":"Hu, L.\u2010T., and Bentler, P.M. (1995), \u201cEvaluating model fit\u201d, in Hoyle R.H. (Ed.), Structural Equation Modeling: Concepts, Issues, and Applications, Sage, Thousand Oaks, CA,  pp. 76\u201099."},{"key":"key2022031020051310700_B25","unstructured":"International Data Corporation (1999a), \u201cInternet commerce will rocket to more than $1 trillion by 2003\u201d, available online: http:\/\/www.idc.com\/Data\/Internet\/content\/ NET062899PR.htm"},{"key":"key2022031020051310700_B26","unstructured":"International Data Corporation (1999b), \u201cBanks cash in on the online craze\u201d, available online: http:\/\/www.idc.com\/Data\/Internet\/content\/NET060199PR.htm"},{"key":"key2022031020051310700_B27","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.L. and Todd, P.A. (1997), \u201cConsumer reactions to electronic shopping on the World Wide Web\u201d, International Journal of Electronic Commerce, Vol. 1 No. 2, pp. 59\u201088.","DOI":"10.1080\/10864415.1996.11518283"},{"key":"key2022031020051310700_B28","unstructured":"Joreskog, K.G. and Sorbom, D. (1988), \u201cLISREL 7: a guide to the program and applications\u201d, SPSS Inc, Chicago, IL."},{"key":"key2022031020051310700_B29","doi-asserted-by":"crossref","unstructured":"Kahneman, D. and Tversky, A. (1979), \u201cProspect theory: an analysis of decision under risk\u201d, Econometrica, Vol. 47, pp. 263\u201091.","DOI":"10.2307\/1914185"},{"key":"key2022031020051310700_B30","unstructured":"Long, J.S. (1983), Covariance Structure Models: An Introduction to LISREL, Sage University Paper No. 07\u2010034, Sage, Newbury Park, CA."},{"key":"key2022031020051310700_B31","doi-asserted-by":"crossref","unstructured":"McDonald, R.P. and Marsh, H.W. (1990), \u201cChoosing a multivariate model: noncentrality and goodness of fit\u201d, Psychological Bulletin, Vol. 107 No. 2,  pp. 247\u201055.","DOI":"10.1037\/0033-2909.107.2.247"},{"key":"key2022031020051310700_B32","doi-asserted-by":"crossref","unstructured":"March, J.G. (1978), \u201cBounded rationality, ambiguity, and the engineering of choice\u201d, Bell Journal of Economics, Vol. 9, pp. 587\u2010608.","DOI":"10.2307\/3003600"},{"key":"key2022031020051310700_B33","doi-asserted-by":"crossref","unstructured":"Moore, G.C. (1987), \u201cEnd user computing and office automation: a diffusion of innovations perspective\u201d, INFOR, February, pp. 214\u201035.","DOI":"10.1080\/03155986.1987.11732040"},{"key":"key2022031020051310700_B34","doi-asserted-by":"crossref","unstructured":"Moore, G.C. and Benbasat, I. (1991) \u201cDevelopment of an instrument to measure the perceptions of adopting an information technology innovation\u201d, Information Systems Research, Vol. 2 No. 3, pp. 192\u2010222.","DOI":"10.1287\/isre.2.3.192"},{"key":"key2022031020051310700_B35","unstructured":"Rogers, E.M., (1995), Diffusion of Innovations, Fourth Edition, The Free Press, New York, NY."},{"key":"key2022031020051310700_B36","doi-asserted-by":"crossref","unstructured":"Saris, W.E., and Stronkhorst, L.H. (1984), Causal Modeling in Nonexperimental Research: An Introduction to the LISREL Approach, Sociometric Research Foundation, Amsterdam.","DOI":"10.2307\/1956406"},{"key":"key2022031020051310700_B37","doi-asserted-by":"crossref","unstructured":"Sitkin, S.B., and Pablo, A.L. (1992), \u201cReconceptualizing the determinants of risk behavior\u201d, Academy of Management Review, Vol. 17 No. 1, pp. 9\u201038.","DOI":"10.5465\/amr.1992.4279564"},{"key":"key2022031020051310700_B38","doi-asserted-by":"crossref","unstructured":"Stine, R.A. (1989), \u201cAn introduction to bootstrap methods: Examples and ideas\u201d, Sociological Methods and Research, Vol. 18, pp. 243\u201091.","DOI":"10.1177\/0049124189018002003"},{"key":"key2022031020051310700_B39","doi-asserted-by":"crossref","unstructured":"Szajna, B. (1994), \u201cSoftware evaluation and choice: predictive validation of the technology acceptance instrument\u201d, Management Information Systems Quarterly, Vol. 18 No. 4, pp. 319\u201024.","DOI":"10.2307\/249621"},{"key":"key2022031020051310700_B40","doi-asserted-by":"crossref","unstructured":"Tucker, L.R. and Lewis, C. (1973), \u201cA reliability coefficient for maximum likelihood factor analysis\u201d, Psychometrika, Vol. 38, pp. 1\u201010.","DOI":"10.1007\/BF02291170"},{"key":"key2022031020051310700_B41","doi-asserted-by":"crossref","unstructured":"Vleck, C. and Stallen, P.J. (1980), \u201cRational and personal aspects of risk\u201d, Acta Psychologica, Vol. 45, pp. 273\u2010300.","DOI":"10.1016\/0001-6918(80)90038-4"},{"key":"key2022031020051310700_B42","doi-asserted-by":"crossref","unstructured":"Wheaton, B., Muthen, B., Alwin, D. and Summers G. (1977), \u201cAssessing reliability and stability in panel models\u201d, in Heise D. (Ed.), Sociological Methodology, Jossey\u2010Bass, San Francisco, CA, pp. 84\u2010136.","DOI":"10.2307\/270754"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570110390071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570110390071\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570110390071\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:36:59Z","timestamp":1753400219000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/101\/4\/165-177\/183208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,6,1]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2001,6,1]]}},"alternative-id":["10.1108\/02635570110390071"],"URL":"https:\/\/doi.org\/10.1108\/02635570110390071","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2001,6,1]]}}}