원문정보
초록
영어
With the growing adoption of electronic financial payment services across both wired and wireless environments, the importance of managing personal information in FinTech has become increasingly critical. Incidents such as hacking and phishing within the FinTech ecosystem have caused significant harm to users, making personal information protection a paramount concern. This study presents a research framework based on Protection Motivation Theory (PMT) to analyze the psychological responses of FinTech payment services users. Specifically, it examines the impact how prior experiences of privacy invasion influence users’ emotional concerns (i.e., threat appraisals), perceived security (i.e., coping appraisals), and compliance intentions regarding personal information protection. Data were collected through an online survey of FinTech users with relevant experience. The empirical results show that privacy invasion experiences increase emotional concerns and reduce perceived security, although they do not affect FinTech-related knowledge. Additionally, while FinTech knowledge does not influence emotional concerns, it has a positive effect on perceived security and compliance intentions. Perceived security was found to alleviate emotional concerns and enhance compliance intentions. These findings provide valuable insights for FinTech services providers seeking to strengthen user behavior concerning personal information protection.
목차
Ⅰ. Introduction
Ⅱ. Theoretical Background
2.1. FinTech Services Characteristics
2.2. Fintech Services and Privacy Regulations: A Regulatory Perspective
2.3. Protection Motivation Theory (PMT)
2.4. Research Hypothesis Development
2.5. Research Model
Ⅲ. Research Methodology
3.1. Scales Development
3.2. Survey Outline
Ⅳ. Analysis of Empirical Analysis
4.1. Demographic Characteristics of Samples
4.2. Reliability and Validity: One Phase Approach
4.3. Reliability and Validity of the Second Order Approach: A Two-step Approach
4.4. CMB Test
4.5. VIF Test
4.6. Justification of Sample Size
4.7. Path Model Analysis Results
Ⅴ. Conclusion
5.1. Discussions of Research Finding
5.2. Theoretical Implications
5.3. Practical Implications
5.4. Limitations and Future Direction of Research
Acknowledgements
