DETERMINANT IN ACCEPTANCE OF CASHLESS PAYMENT: AN EMPIRICAL STUDY IN MALAYSIA
DOI:
https://doi.org/10.61841/pgw29v88Keywords:
Cashless Payment,, Perceived Usefulness, Perceived Ease of Use,, Risk TrustAbstract
This paper examines the factors that may have influence to the acceptance of cashless payment. A survey method was employed using a sample of 204respondents.The objectives of this research are to determine the determinant of cashless payment among Malaysian, and to evaluate the impact of determinant in acceptance of cashless payment. There are 4 factors; trust, perceived usefulness, perceived ease of use and risk. A quantitative study has been conducted for this research with questionnaire as data collection. The research used multiple regression analysis to recognize the impact that are related to acceptance of cashless payment. The findings of this study reveals there is a positive impact of trust, perceived usefulness, and perceived ease of use towards acceptance of cashless payment, whereas risk has a negative impact. This findings would help to determine whether Malaysian societies are heading towards cashless society in year 2050.
Downloads
References
1. Gefen, D., & Straub, D. (1997). Gender Differences in the perception and use of e-mail:an extension to the techonology acceptance model. MIS Quarterly, 21(4), 389-400.W.-K. Chen, Linear Networks and Systems (Book style).Belmont, CA: Wadsworth, 1993, pp. 123–135.
2. Bradley, L., & Stewart, K. (2002). A Depli study of the drivers and inhibitors of internet banking. International Journal of Bank Marketing, 20(6), 250-260.B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
3. Prateek Kanade, Deepali Gupta, Mahesh Radhakrishnan, Visakh Prabhakar. "Role of Serotonin Type-1A/B (Hydroxytryptamine) Receptors in Depression Revisited." Systematic Reviews in Pharmacy 4.1 (2013), 7-
13. Print. doi:10.4103/0975-8453.135831
4. Mansour, K. B. (2016). An Analysis of Business' Acceptance of Internet Banking: An Integration of e-trust to the TAM. Journal of Business & Industrial Marketing, 982-994.
5. Charfeddine, L., & Nasri, W. (2013). The behaviour Of Intention of Tunisian Banks' customer on using internet banking. Internaational Journal of Innovation in the Digital Economy, 4(1), 16-30.
6. Cheng, K. (2013). An evaluation of RFID door security system Taipei Area Ice Land based on technology acceptance model. International Journal of Management and Information System, 17(2), 117-129.
7. Ozturk, A. B. (2016). Customer Acceptance of Cashless Payment Systems in the Hospitality Industry. International Journal of Contemporary Hospitality Management, 801-817.
8. Chen, C. (2013). "Perceived risk, usage frequency of mobile banking services". Managing Service Quality. An International JournalVol. 23 Issue: 5, 410-436.
9. Satyabrata das sharma, lakshman nayak, chitta ranjan panda, mitali priyadarsini pati, subhalata samantaray (2016) a review on benthic study along odisha coast, east coast of india: a neglected research. Journal of Critical Reviews, 3 (4), 27-32.
10. Wang, Y.-S. (2003). Determinants of user acceptance of internet banking: an Empirical Study. International Journal Service Industry Management, 14(5), 501-519
11. Chang, H. H., & Abdul Hamid, M. (2010). An Empirical Investigation of Internet. Global Journal of Business Research, 4(2), 39-47.
12. Pavlou, P. A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce, 7(3), 69-103.
13. Kailani, M., & Kumar, R. (2011). Investigating uncertainty avoidance and perceived risk for impacting Internet buying: a study in three national cultures. International Journal of Business and Management, 6(5), 76-92.
14. Roscoe, J.T. (1975) Fundamental Research Statistics for the Behavioral Science, International Series in Decision Process, 2nd Edition, Holt, Rinehart and Winston, Inc., New York.
15. Agarwal, & Karahanna. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665-694.
16. Fraenkel, F. R., Wallen, N. E., & Hyun, H. H. (2006). How To Design and Evaluate Research in Education. New York: McGraw Hill.
17. Vafaei, F., Nouri, G., Razi, A.Spontaneous cholecystocutaneous fistulae: A case report(2018) International Journal of Pharmaceutical Research, 10 (3), pp. 344-345. https://www.scopus.com/inward/record.uri?eid=2s2.085049618132&partnerID=40&md5=bce1102da65146 dd5d76338b02fea76e
18. Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach. John Wiley & Sons.
19. Lind, D.A., Marchal, W.G., Wathen, S.A. (2018), Statistical Techniques in Business & Economics, 17th edition, McGraw-Hill.
20. Ristono, A., & Budi, P. (2019). Design of Reliable and Efficient Manchester Carry Chain Adder based 8- BIT ALU for High Speed Applications. Journal of VLSI Circuits And Systems, 1(1), 1-4.
21. Anoop,T.R.,& Mini,M.G. (2015). Altered Fingerprint Matching Using Ridge Texture and Frequency in the Unaltered Region. Bonfring International Journal of Advances in Image Processing, 5(2), 06-09.
22. Wang, Z.Neurofeedback training intervention for enhancing working memory function in attention deficit and hyperactivity disorder (ADHD) Chinese students(2017) NeuroQuantology, 15 (2), pp. 277-283.
23. Shashi Kiran Reddy, J.A novel subject-object model of consciousness(2017) NeuroQuantology, 15 (1), pp. 79-85.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.