vol5no2_8
DESCRIPTION
vol 2 on m commTRANSCRIPT
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
111
Consumer Attitude towards M-Commerce: The Perceived Level of
Security and the Role of Trust 1 Zakaria I. Saleh,
2 Ahmad Mashhour
1Associate Professor, IT program, American Intercontinental University, Schaumburg, Illinois, USA 2Ass Associate Professor, Department of Information Systems University of Bahrain, Bahrain
ABSTRACT The emerging industry of mobile commerce (M-commerce), while being a complex and with uncertain environment is
influencing businesses and consumers engagement at both national and international levels. The objectives of this research
are to: (1) investigate the degree to which various trust and information security factors influence consumer to engage in
mobile commerce, and (2) identify key drivers of intention to use M-commerce. The study is based on literature revision,
and a survey that was conducted on 268 individual mobile users in the USA. The results identify several factors that have
significant influence on trusting mobile commerce. The results show that previous Internet shopping experience associated
with frequency and extent of mobile use have significant influence on trusting M-commerce and the intention to use it.
This study, therefore, aims to enhance understanding of consumer behavior regarding M-commerce.
Keywords: M-commerce, Convenience, Security, Trust
1. INTRODUCTION E-commerce is indeed a revolutionary
innovation, and businesses have increasingly adopted
electronic commerce (or e-commerce) to automate their
operations and processes. Contemporary electronic
commerce involves everything from selling goods and
services via the Internet, ordering "digital" content for
immediate online utilization, to a range of services, and
there are a number of models that retailers can adopt
entire books on e-commerce have been written with far
too many concepts, and e-commerce potential service
[1,2,3,4,5,6]. The leading business and financial
institutions use the internet to exchange financial data to
facilitate domestic and international business. Data
integrity and information security however, are very
important issues for in e-commerce, and there are several
possible attack scenarios in an e-commerce system.
The increase of smartphone implementation in e-
commerce has been rapid, and the next six years will see
smartphone subscriptions triple according to the latest
Ericsson Mobility Report [7].The next phase of the
wireless industry won't just be about keeping up with the
increased need for mobile wireless device data, and over
time, users tend to discover more advanced services that
put greater demands on device capabilities. In addition, as
tablets become more frequently used in homes throughout
the world, tableaus will make a real contribution to brand
engagement and become an increasingly important feature
of a brand’s marketing programmer [8]. As in the case of
e-commerce, there are security issues which already have
been started. Security threats in mobile commerce can
range from passively eavesdropping into others’ message
to actively stealing user’s data and information.
In this research, we make the following contributions:
• We investigated the overall mobile activities of
the different mobile owners.
•
• We created an instrument and added Perceived
Trust and Convenience, to the traditional testing
that was mostly stressing on ease of use, and
Perceived Usefulness, and measured how
Convenience is influencing the Frequency of
Mobile use and how Frequency of Mobile use is
influencing the perceived trust.
• We tested the instrument’s reliability where
Several analyses were performed for factors
analysis and factor loading values to insure the
consistency of our findings.
Section 2 describes the concept of trust in the
context of M-commerce. Section 3 provides an overview
of security and summaries the Security threats in M-
commerce. In Section 4, we describe the research method.
Section 5 provides a description of the hypotheses. We
conclude the research in Section 6, with the data analysis
and the research findings.
2. SECURITY OVERVIEW The concept of Electronic Commerce (e-
commerce) has revolutionized business operation and
services remarkably. E-commerce provides means for
business automations, and established the exchange of
goods and services over the Internet. Now a day, all major
retail brands have an online presence. In addition, the
advancement in the Information and communication
technology (ICT), and the deployment of wireless Internet
capabilities, provided means for M-commerce to be an
expansion of e-commerce. Mobile technology and
composter networks have sped up many of our work
processes to increase productivity more than ever before
[12]. Undoubtedly, the technical advancement will
continue to influence how companies sell and market their
products, and many new applications are becoming
possible, and many existing e-commerce applications can
be modified for a mobile environment [13].
Unfortunately, the development of high-tech
communications has outpaced the discipline necessary to
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
112
secure the shared information and threats to business
security are becoming more complex.
Security threats in M-commerce can range from
passively eavesdropping into others’ message to actively
stealing user’s data. In a study conducted by Web credible
in 2011 [14], found that the mobile users, especially the
ones using Android and Blackberry phones were
concerned about security issues like having their phones
hacked, or infected with viruses that could cause their
personal information to get intercepted or stolen.
In general, the mobile customer and the e-
merchant involved in an m-commerce transaction should
ensure Confidentiality (the messages are kept secret),
Authentication (that each party knows who the other party
is), Message Integrity (the messages are passed from
sender to receiver unaltered or modified), Prevent Replay
Attack (detect, prevent, and reject any unauthorized re-
sending of messages), and Non-repudiation (neither party
can later claim that the exchange did not take place). With
smartphones though, users still feel more exposed and
lack this sort of recognizable protection. Business will
lose customers if the mobile security system is not secure
enough [14].
With advancement of cutting-edge technologies
and state-of-the-art tools implemented in both, traditional
commerce is facing titanic shifts with respect to customer
behaviors. Today, traditional commerce is almost
vanishing in thin air with the arrival of mobile- and e-
commerce. Total smartphone subscriptions expected to
reach 1.9 billion by the end of 2013 and are expected to
grow to 5.6 billion in 2019 [7]. A major determining
factor for the success of m-commerce is service
affordability—such as low access [15]. Different
generations of wireless communication systems have been
developed to provide high data rate, high mobility, and
diverse applications, with high efficiency and high
flexibility, which suggest that M-commerce will become
widely available [15]. While this means loads of
opportunities, there's also a dark cloud and more security
issues to worry about.
The global use of wireless technologies adds
further complexity to issues in m-commerce [1], and the
enhanced functionality and greater levels of mobile
services require an in-depth understanding of consumer
perceptions and behavior. Mallat [17] in 2007, examined
consumer adoption of mobile payment perceived trust and
risks and found Several barriers to the adoption of mobile
payments, including lack of widespread merchant
acceptance and perceived risks. Kim et al. [18] developed
Value-based Adoption Model (VAM) and explained
customers' M-Internet adoption from the value
maximization perspective, and Mao et al. [19] studied
the key factors that influence the usefulness, ease of use,
and intentions to use advanced mobile Internet access
and payments. However, the consistency between attitude
and intention has been studied and researchers have
demonstrated that the various attitudinal qualities
moderate the attitude-behavior relationship, such as direct
experience [20], and attitude confidence, which
unfortunately have been overlooked in M-commerce
adoption studies [21]. Attitude confidence plays a
significant role in explaining intention, and it is a focal
construct in studying consumer behavior as it is more
susceptible to marketing intervention [22].
3. RESEARCH METHOD The key intention of this paper is to investigate
the degree to which various trust factors and information
security would influence consumer to engage in mobile
commerce, and to identify key drivers of intention to use
M-commerce. A survey instrument in the form of
questionnaire was developed through data collected from
previous studies on acceptance of mobile banking and
online shopping. Several questions were constructed in
the questionnaire based on the objectives of the research.
Gathering information from the customer in the
interaction to understand the customer more thoroughly
and better serve him or her [23]. Likert-type Scale
questions are used in order to identify the respondents’
perceptions towards engaging in M-commerce. Table 1
explains the Questionnaire’s Scale items.
Convenience sampling method was used. It is
sampling types that involves the sample of accessible
subjects that are available to participate in the research
study and are willing to participate. There are two
reasons of using this sampling type. First, it provides
means for easily obtaining the raw data for the further
analysis. Second, it provides cost and time saving.
However, the respondents were randomly selected from
two major shopping malls in the Chicago metropolitan
area.
4. HYPOTHESES DESCRIPTION The concept of customer experience was first
recognized years back when the notion of consumption
experience and hedonic consumption were discussed by
Holbrook and Hirschman [24]. More recently, many
authors were focusing on the concepts of customer
experience as a factor to gain a competitive advantage for
companies and destination marketers [3,25,26,27,28,29],
and Internet shopping experience was significantly
associated with attitudes to Internet shopping and
intentions to shop online [30,31].
H1: Exposure to M-commerce positively influences
the future intention to use.
H2: Frequency of Mobile use has a positive influence
on future M-commerce intention to use.
This research assumes that convenience plays a
prominent role in choices of today’s consumers. M-
commerce aims to utilize mobile devices and wireless
connection in combination with E-commerce systems,
allowing shoppers to experience convenient, instant and
suitable shopping at unrestricted time and place.
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
113
H3: Convenience has a positive influence on
Frequency of Mobile use
Table 1: Scale items of the Questionnaire
Variable Scale item Statements Source
Perceived Trust
(PT)
Mobile commerce is reliable. New Item
Using Mobile commerce, I can rely on business to keep the promises that they make. New Item
I Will not trust Wireless communications until I have clear evidence that it can be
trusted New Item
Wireless communications cannot be trusted; there are just too many uncertainties. New Item
Mobile commerce has the chance of fraud. New Item
Convenience
(CON)
I Could shop anytime I want to Jiang et, al [2013]
I Could order products wherever I am Jiang et, al [2013]
The websites are always accessible Jiang et, al [2013]
Easy to understand and navigate websites Jiang et, al [2013]
I can search for desired products quickly Jiang et, al [2013]
There are Variety of search options to find the same product Jiang et, al [2013]
I am satisfied with the ability of merchants to prevent security threats Jiang et, al [2013]
I am satisfied with the way the merchants protect my information while in
transaction Jiang et, al [2013]
Perceived
security (PS)
I believe my information will not be lost during a session Yousafzai et al [2009]
I believe that the security system will confirm my identity before disclosing account
information Yousafzai et al [2009]
I believe that the security system will confirm my identity before processing
transactions Yousafzai et al [2009]
I believe that the security system provides a secure environment in which to bank Yousafzai et al [2009]
I believe my transaction information will only reach the target bank account Chellappa [2003]
I believe that the security system does not allow unauthorized access to the account Chellappa [2003]
I believe that the security system stops any unauthorized changes to a transaction Chellappa [2003]
Perceived
Usefulness
(PU)
M-Commerce transactions save more time. Davis, [1989]
M-Commerce makes it easier for me to do shopping. Davis, [1989]
M-Commerce helps me to know the state of my order faster. Davis, [1989]
M-Commerce provides me prompt and efficient services. Davis, [1989]
M-Commerce provides systems to give appropriate feedback. Davis, [1989]
M-Commerce gives the joy of controlling my financial transactions. Davis, [1989]
There are mixed results for the effect of
frequency of online shopping and the comfort of online
shopping. Leeraphong and Mardjo [4], in their study of
doing business through online social network and
consumers purchase intention through Facebook. The
frequency and comfort of online shopping did not
encourage some respondents to purchase product through
Facebook, and assumed that this may have been caused
by other factors that were more important such as trust
and perceived risk. McCole and Palmer [2] conducted an
empirical study discussing the relationship between
transaction frequency and trust in Internet buying
behavior and found that trust increased with increasing
use of the Internet.
H4: Frequency of Mobile use has a positive influence
on the perceived trust.
H5: The perceived trust has a positive influence on
the intention to use M-commerce services
Strong emotions affect human decision-making
processes. Fear is generally caused by the known, not the
unknown. Most Consumers know what happens when
their information systems are compromised. When major
security incidents take place, the news is made public,
and the organization faces a loss of reputation. This
knowledge is sufficient to cause fear among online
shoppers as well as mobile shoppers. With cybercriminals
now targeting mobile devices, securing smart phones is
more important than ever. Therefore, Consumers’ trust in
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
114
their electronic transactions is vital for the sustained
progress and development of M-commerce.
H6: The Perceived Level of security has a positive
influence on perceived trust
H7: Perceived Level of security positively influences
the intention to use M-commerce.
5. ANALYSIS AND RESEARCH
FINDINGS
The hypotheses were tested with a survey
involving 268 customers in two U.S shopping malls. The
data was analyzed using SPSS for Windows, version 15.
The reliability of the instrument’s constructs was
conducted to determining the degree of inconsistency in
observations due to random error. The purpose of
reliability testing is to provide confidence that the
instrument meets its reliability requirements.
Table 2: Factor Loading
PS PT CON PU
PS1-0.711 PT1-0.585 CON1-0.835 PU1-0.835
PS2-0.671 PT2-0.586 CON2-0.734 PU2-0.665
PS3-0.826 PT3-0.573 CON3-0.685 PU3-0.778
PS4-0.762 PT4-0.596 CON4-0.622 PU4-0.625
PS5-0.646 PT5-0.784 CON5-0.656 PU5-0.677
PS6-0.753
CON6-0.626 PU6-0.734
PS7-0.644
CON7-0.685
CON8-0.652
Table 3: Reliability Test
Determinants No. of items Reliability
PS 7 0.83
PT 5 0.66
CON 8 0.84
PU 6 0.61
The instrument was tested for reliability using
Cronbach’s coefficient alpha estimate. Several analyses
were performed for factors analysis and factor loading
values were obtained using varimax rotation. The results
of the reliability testing are illustrated in table 2 and table
3. As shown in table 2, most of the factor loading for each
constructs exceeded 0.6, which indicates significant level
of convergent validity. The items statements for which
were asking the participants to select an opinion on a 1-7
Likert scale where 1 indicates “strongly disagree” and 7
indicates “strongly agree.” The demographic profile of
the respondents and the mobile use of respondents is
described in table 4 and table 5.
Table 4: Demographic profile of respondents
Has Mobile phone 100%
Gender of the Respondents Male 44.00%
Female 56.00%
Age of the Respondents
18-25 44.03%
26-35 16.42%
36-45 13.81%
46-55 15.30%
>55 10.45%
Years of Experience with
Mobile Phone
<1 year 0%
1-2 Years 7.09%
3-4 Years 28.73%
5-6 Years 35.82%
7- 8 Years 7.84%
9-10
Years
6.34%
> 10
Years
4.10%
Table 5: Mobile use of respondents
Total (268)
Mobile
Shoppers
(153)
Non
Mobile
shoppers
( 115)
Frequency Of Mobile Use
More than 10 times a day 20.26% 13.91%
Between 6 and 10 times a day 30.72% 27.83%
Between 3 and 5 times a day 27.45% 24.35%
Between 1 and 2 times a day 10.46% 20.00%
Several times a week 9.80% 9.57%
Once a week 1.31% 3.48%
Less frequently 0.00% 0.87%
As indicated in the Theoretical Framework
section, the sample was chosen using the convenience
sampling method, where about 60% were between 18-35
years old and about 10% were older than 55 years of age,
and about 54% have more than 5 years of experience with
mobile phone. The study found that 56% of the
respondents have smartphones. The study also found that
mobile shoppers use their phones for a variety of
shopping activities (see table 6). The highest activity was
software downloads, where 67% of the respondents
indicated that. 48% of consumers look up prices on a
store’s website, while 57% of the users, use their mobile
to search for deals. In addition, not only will consumers
use mobile devices to research products, but 24%
indicated that they would try and make purchases
directly from their mobile devices.
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
115
Table 6: Mobile Activities
Activities % *
Browsing Shops without purchasing 48%
Software Downloads 67%
shopping for deals 57%
Purchasing 6%
6. HYPOTHESIS TESTING The First Hypothesis (H01): Consumers’
exposure to M-commerce positively influences the future
intention to use. Testing this hypothesis, in the scale of 1
to 7, the mean score for exposure to M-commerce is 3.49
and the mean score for the intention to use is 4.47. The
standard deviation of the exposure to M-commerce is
1.68 and the median is 5.12, where standard deviation of
the intention to use is 0.87 and the median is 5 . A
Pearson's correlation was run to determine the
relationship between the participants’ exposure to M-
commerce and the intention to use values. There was a
very strong, positive correlation (r = 0.88, N=268, p <
.001).
The Second Hypothesis (H02): Frequency of
Mobile use has a positive influence on the future M-
commerce intention to use. The mean score for frequency
of mobile use is 5.63 and the standard deviation of the
Internet security score is 1.39 and the standard deviation
of the frequency of mobile use is 1.55. We tested to see if
the slope significantly different from zero, and found that
there was a very strong, positive correlation between
frequency of mobile use and intention to use M-
commerce (r = 0.93, N=268, p < .001). While data was
collected from mobile shoppers and the non- mobile
shoppers, testing the second hypothesis, we used all
respondents regardless of being mobile shoppers and the
non- mobile shoppers.
The Third Hypothesis (H03): Convenience
has a positive influence on the frequency of mobile use.
Testing this hypothesis, the mean score for convenience is
4.78 and the standard deviation of the convenience score
is 1.22. Testing the correlation between convenience and
frequency of mobile use, we found that the P value to be
(r = 0.76, N=268, p < .001) which is considered strong.
The Fourth Hypothesis (H04): Frequency of
Mobile use has a positive influence on the perceived trust.
To seek the association between the users' frequency of
mobile use and tendency to trust M-Commerce, the mean
score for perceived trust is 4.32, the median is 4.40, and
the standard deviation of the perceived trust is 0.98. The
Pearson correlation coefficient is found to be (r = 0.31,
N=268, p < 0.05) . This means the positive correlation
between the two measurements is statistically significant
though it is weak.
The Fifth Hypothesis (H05): The perceived
trust has a positive influence on the intention to use M-
commerce services. The Pearson correlation coefficient
between the perceived trust has a positive influence on
the intention to use M-commerce is (r = 0.72, N=268, p <
0.01) , which indicates a strong positive correlation, and
that the correlation is very significant.
The Sixth Hypothesis (H06): The Perceived
Level of security has a positive influence on perceived
trust. Testing this hypothesis, the mean score for level of
security is 4.88 and the standard deviation of the level of
security 1.05 and the median score is 5.10. We tested to
see if the slope significantly different from zero, and
found that (r = 0.72, N=268, p < 0.01), which is
considered very weak and considered not extremely
significant.
The Seventh Hypothesis (H07): Perceived
Level of security positively influences the intention to use
M-commerce We stated to see if there is a correlation
between the perceived level of security and the intention
to use M-Commerce we found that the P value to be (r =
0.81, N=268, p < .001). Based on the above testing result,
we can accept the hypothesis.
7. CONCLUSION Lack of trust has been found to be a significant
factor influencing the acceptance of M-commerce
services. Trust is important during situations that are
perceived to be insecure, and M-commerce exposes
consumers to new vulnerabilities and security risks. The
results show that previous Internet shopping experience
and frequency and time length of mobile use have
significant influence on trusting M-commerce and the
intention to use M-commerce.
Perceived convenience had a positive effect on
perceived usefulness and continuance intention. The
findings show that intention to use M-commerce can be
predicted by attitudinal and perceived behavioral
convenience factors. The results from this study have also
shown that the perceived security has a marginal impact
on the users' tendency to trust M-commerce (very weak
and not extremely significant relationship between
perceived level of security and trust.). And while the
research assumed that with cybercriminals targeting
mobile devices, securing smart phones is more important
than ever, and would impact trust in M-commerce, but the
week relationship sounds as if the user evaluates “each
situation” and compare the levels of trust versus the
perceived level of security. If trust is high, the consumer
will engage in M-commerce. So, it becomes the
merchant's responsibility to establish such trust.
REFERENCES [1] McKnight, D. H., Choudhury, V., Kacmar,
C.,(2002). Developing and Validating Trust
Measures for e-Commerce: An Integrative
Typology. Information Systems Research, Volume
13, Number 3, pp. 334–359
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
116
[2] McCole, P., and Palmer, A., (2002). “Transaction
Frequency and Trust in Internet Buying
Behaviour”, Irish Marketing Review, Volume 15,
Number 2, pp. 35-50.
[3] Schmitt, B. (2003) “Customer Experience
Management: A Revolutionary Approach to
Connecting with Your Customer. New Jersey:
Wiley and Sons.
[4] Leeraphong, A., and Mardjo, A.(2013). Trust and
Risk in Purchase Intention through Online Social
Network: A Focus Group Study of Facebook in
Thailand. Journal of Economics, Business and
Management, Vol. 1, No. 4, pp. 314-318
[5] Bradach, J. L., & Eccles, R. G. (1989) Price,
authority, and trust: From ideal types to plural
forms. Annual Review of Sociology, Volume 15,
pp. 97-118.
[6] Forster, D. (2012), How a secure ecommerce
website design will instill trust in potential buyers.
Articleslash.net, Retrieved from the WWW on
August 22, 2013 at
www.articleslash.net/article_680770.pdf
[7] Ericsson (2013). Ericsson Mobility Report on The
Pulse of The Networked Society, Document No:
EAB-13:063042 Uen, Revision A.
[8] Hacon, T. (2013) "T-Commerce – What the tablet
can do for brands and their consumers". Governor
Technology. Retrieved November 15, 2013, from
www.governor.co.uk/news-plus-
views/2013/march/t-commerce-what-the-tablet-
can-do-for-brands-and-their-consumers/
[9] Yousafzai, S., Palliser, J., and Foxall, G., (2009).
Multi-dimensional role of trust in Internet banking
adoption. The Service Industries Journal Vol. 29,
No. 5, pp. 591–605
[10] Cofta, P. (2006). Convergence and trust in
eCommerce, BT Technology Journal, Volume 24,
Issue 2, pp. 214-218
[11] Lee, M. K. O., & Turban, E. (2001). A Trust
Model for Consumer Internet Shopping.
International Journal of Electronic Commerce,
Volume 6, Number 1,pp. 75-91.
[12] Frost & Sullivan (2011). Using Mobile Solutions
to Improve Insurance Sector Performance, A Frost
& Sullivan White Paper, Retrieved from the
WWW on October 2, 2013 at www.frost.com
[13] Wadhaval, A., Mehta, R., and Gawade,A., (2013).
Mobile Commerce and Related Mobile Security
Issues. International Journal of Engineering Trends
and Technology (IJETT) - Volume 4, Issue 4, pp.
668-670
[14] Web credible (2011), Mobile survey results! Is the
55+ market satisfied? Accessed on October 22,
2013 at: www.webcredible.co.uk/blog/mobile-
survey-results
[15] Grami, A., and Schell, B.H., (2004).Future Trends
in Mobile Commerce: Service Offerings,
Technological Advances and Security, Proceedings
Second Annual Conference on Privacy, Security
and Trust, University of New Brunswick, Canada
[16] Dai, H., and Palvia, P. (2009). Mobile Commerce
Adoption in China and the United States: A Cross-
Cultural Study. The Data Base for Advanced
Information Systems. Volume 40, Number 4. pp.
43-61
[17] Mallat, N. (2007). “Exploring Consumer Adoption
of Mobile Payments - A Qualitative Study”,
Journal of Strategic Information Systems, Volume
16, Issue 4, pp. 413-432
[18] Kim, H.W., Chan, H. C., and Gupta, S.
(2007),“Value-based adoption of mobile internet:
an empirical investigation,” Decision Support
Systems, Volume 43, Number 1, pp. 111–126
[19] Mao, E., Srite, M., Thatcher, J.B., and Yaprak, O.,
(2005), “A research model for mobile phone
service behaviors: empirical validation in the U.S.
and Turkey”, Journal of Global Information
Technology Management, Volume 8, Number 4,
pp. 7-28.
[20] Fazio, R. H. and Zanna, M. P. (1978), “Attitudinal
qualities relating to the strength of the ttitude-
behavior relationship,” Journal of Experimental
Social Psychology, Volume 14, pp. 398-408.
[21] Chong, A. Y. L., Darmawan, N., Ooi, K. B., and
Lee, V. H.(2010), “Determinants of 3g adoption in
Malaysia: A structural analysis “ Journal of
Computer Information Systems, Volume 51,
Number 2, pp. 71-80.
[22 Bergkvist, L. (2009), “The role of confidence in
attitude-intention and beliefs-attitude
relationships,” International Journal of
Advertising, Volume 28, Number 5, pp. 863-880.
[23] Gremler, D. D. and Gwinner, K. P.(2008),
“Rapport-building behavours used by retail
employees,” Journal of Retailing, Volume 84,
Number 3, pp. 308-324.
[24] Holbrook, M. B. and Hirschman E. C. (1982),
“Experiential Consumption: Consumer Fantasies,
Feelings, and Fun,” Journal of Consumer Research
Vol. 5, No. 2 February 2014 ISSN 2079-8407
Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved.
http://www.cisjournal.org
117
, Volume 9, pp. 132-140.
[25] Caru, A. & Cova, B. (2003). “Revisiting
consumption experience: A more humble but
Complete view of the concept”, Marketing Theory,
Volume 3, Number 2, pp. 267-286.
[26] LaSalle, D. & Britton, T. A. (2003).“Priceless:
Turning Ordinary Products into Extraordinary
Experiences”, Boston: Harvard Business School
Press.
[27] Ponson by-McCabe, S. & Boyle, E. (2006)
“Understanding Brands as Experiential Spaces:
Axiological Implications for Marketing
Strategists”, Journal of Strategic Marketing,
Volume 14, Number 2, pp. 175-189.
[28] Prahalad, C. K. & Ramaswamy, V. (2004). “Co-
Creation Experiences: The Next Practice in Value
Creation”, Journal of Interactive Marketing,
Volume 18 Number 3, pp.5-14.
[29] Smith, W. A. (2003). “Does B and B Management
Agree with the Basic Ideas behind Experience
Management Strategy?” Journal of Business and
Management, Volume 9, Number 3, pp. 233-246.
[30] Doolin, B., Dillon, S., Thompson, F., & Corner, J.
L. (2005). Perceived Risk, the Internet Shopping
Experience and Online Purchasing Behavior: A
New Zealand Perspective. Journal of Global
Information Management, Volume 13, Number 2,
pp. 66-88.
[31] Vijayasarathy, L. R., & Jones, J. M. (2000). Print
and Internet Catalog Shopping: Assessing
Attitudes and Intentions. Internet Research,
Volume 10, Number 3, pp. 191-202.
AUTHOR PROFILES
Dr. Zakaria I. Saleh: An Associate Professor in
Information Technology at American Intercontinental
University, USA. Besides academia, his work experience
ranged for simply providing technical support and non-
conformance resolutions for a “Compaq Computers” PC
Configuration Center, to working on the design and
development of electronic control systems in the
Automotive Industry, where he has contributed to the
introduction of the M2M (Machine to Machine)
Communication Systems. Prior to joining academia, he
was working as a Project Engineer, at Case Corporation,
an International Designer and Manufacturer of
Agricultural and Construction Equipment, located in the
USA. He was the lead engineer to work on the design and
development of web based Fleet Management System.
Dr. Ahmad Mashhour: He is currently an
associate professor at the University of Bahrain,
Information System Dept. Earned his PhD in Information
Systems from University of London (LSE), UK,1989. He
also joined other universities in the middle East for some
time including University of Qatar, and Yarmouk
University of Jordan. His research interest includes
Simulation modeling and Analysis, Information security,
e-business, and e-learning.