Electronic Commerce Research and Applications 2 (2003) 216228
www.elsevier.com/ locate/ ecra
Consumers perceived risk: sources versus consequences Nena Lim UQ Business School, The University of Queensland, Brisbane, QLD 4072, Australia Received 1 November 2002; received in revised form 14 March 2003; accepted 18 April 2003 Abstract In this study, we examine an important factor that affects consumers acceptance of business-to-commerce (B2C) electronic commerceperceived risk. The objective of this paper is to examine the denition of perceived risk in the context of B2C electronic commerce. The paper highlights the importance of perceived risk and the interwoven relation between perceived risk and trust. It discusses the problem of dening perceived risk in prior B2C research. This study proposes a new classication of consumers perceived risk based on sources. It highlights the importance of identifying the sources of consumers risk perceptions in addition to the consequences dimensions. Two focus group discussion sessions were conducted to verify the proposed classication. Results indicate that Internet consumers perceive three sources of risk in B2C electronic commerce: technology, vendor, and product. 2003 Elsevier B.V. All rights reserved. Keywords: B2C electronic commerce; Online shopping; Internet shopping; Perceived risk; Trust; Internet security 1. Introduction Business-to-consumer e-commerce is important because it profoundly affects individuals purchasing According to Roman and Fjermestad [1], there are behavior and their socialisation pattern [2]. Fast ve categories of electronic commerce customer growth of B2C e-commerce has been expected [3,4] relationship management research: technology, as it is convenient, without sales pressure, and saves knowledge management, business models, markets, time [5]. Researchers reported that retailers in Asia and human factors. This study examines the human Pacic generated US$6.8 billion revenues from B2C factors for business-to-consumer electronic com- e-commerce in 2000. They predicted the revenues to merce (B2C e-commerce) and focuses on consumers double and reach US$14 billion in 2001 [4]. Never- perspective. In this study, business-to-consumer elec- theless, despite optimistic predictions, adoption rates tronic commerce refers to consumers ordering prod- of B2C e-commerce are relatively slow. For exam- ucts or services and paying for them through the ple, although 50% of Australians use the Internet, 1 Internet . only 20% of these Internet users have purchased products or services through the Internet [6]. In two different studies, more than 50% of consumers abandon purchases before purchases are completed E-mail address: n.lim@business.uq.edu.au (N. Lim). 1 [3,7]. In this paper, B2C e-commerce, online shopping, and Internet shopping are used interchangeably. In view of the contradictory evidence, we attempt 1567-4223/ 03/ $ see front matter 2003 Elsevier B.V. All rights reserved. doi:10.1016/ S1567-4223(03)00025-5 217 N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 to help businesses understand effects of an important and perceived risk as the likelihood of both positive perception held by consumersperceived risk [8,9]. and negative outcomes. A number of recent studies The objective of this study is to clarify the denition of B2C e-commerce have then adapted the Mayer et of perceived risk in B2C e-commerce. First we al. model [1114]. explain the relation between perceived risk and trust. Literature shows that researchers have different We then review the existing literature on consumers views about the relations between trust and perceived risk perceptions. We argue that researchers should risk. Fig. 1 summarizes the four types of relations provide a clear denition of perceived risk. More- identied by researchers. In case (a), Stewart [14] over, to provide useful results to Internet vendors, it examines effects of trust in a Web-site and perceived is important for researchers to identify sources in risk in transaction channel on consumers willingness addition to consequences of consumers perceived to purchase online. She considers perceived risk to risk. be a moderating factor on the relation between consumers trust and their willingness to purchase products from Internet vendors [14]. In case (b), Kim 2. Perceived risk and Prabhakar [13] suggest that consumers adoption of Internet banking is determined by a balance 2.1. Perceived risk and trust between trust and perceived risk. If the level of trust exceeds the level of perceived risk, consumers will Although studies show that perceived risk is an perform the trusting behavior (i.e., adopting Internet important factor for online shopping [28,64], there banking). Similar to Mayer et al. [10], they dene has been much confusion about the relation between perceived risk as a combination of relative advan- perceived risk and trust in literature. Mayer et al. tages and negative consequences. [10] argue that risk taking activities in an organiza- Other researchers hold slightly different views. tional context is affected by both trust and perceived Cheung and Lee [12] suggest that trustworthiness of risk. They dene trust as a willingness to take risk Internet vendors is affected by four factors: per-
Fig. 1. Relations between perceived risk and trust. N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 218 ceived security control, perceived privacy control, According to the theory of consumers perceived perceived integrity, and perceived competence. risk, consumers perceive risk because they face Moreover, they describe trust as an antecedent of uncertainty and potentially undesirable consequences perceived risk in their model (Fig. 1, case c). An as a result of purchases [17,21]. Therefore, the more empirical test of Cheung and Lees trust model risk they perceive, the less likely they will purchase. suggests that consumers trust of Internet vendors is Yet consumers often adopt risk reduction strategies negatively associated with their perceived risk in such as information acquisition before they purchase Internet shopping [15]. On the contrary, Mitchell [8] [17,33]. Perceived risk is powerful at explaining considers perceived risk to be an antecedent of trust consumers behavior because consumers are more and the relation between the two factors to be non- often motivated to avoid mistakes than to maximise recursive (Fig. 1, case d). utility in purchasing [8] (p. 163). Studies suggest With the interwoven relation between perceived that perceived risk is important for consumers risk and trust, should we discretely separate the two acceptance of telephone shopping [20] and mail- perceptions? Which one should researchers concen- order shopping [2325]. Consumers who use tele- trate on in their future studies? It is doubtless that the phone shopping perceive risk because they cannot meanings of trust and perceived risk are closely personally inspect products or compare the quality, related. Nevertheless, by denition, trust is a more size, or style of products. Consumers also perceive restrictive concept than perceived risk because trust risk because time may be lost or frustration may needs to involve two parties: trustor and trustee [10]. result where the purchases are unsuccessful [20]. For B2C e-commerce, consumers can trust or distrust As telephone shopping and online shopping are Internet vendors. Nevertheless, what if consumers alike, it is likely that similar types of perceived risk are worried about the Internet and its related tech- also apply to online shopping. With the open and nologies in general? Strictly speaking, consumers complex nature of the Internet and related tech- can perceive risk in vendors or Internet technologies, nologies [68], the technologies are beyond the con- but they cannot trust or distrust Internet technologies. trol of any individual [69]. Together with the exist- As both technology and human factors are salient for ence of countless Internet vendors, the importance of the growth of B2C e-commerce, this study focuses perceived risk to B2C e-commerce further increases. on consumers perceived risk. Such a perception is likely to become a decisive factor in affecting consumers behavior. The existing literature always relates security to perceived risk 2.2. Theory of perceived risk when researchers discuss critical factors associated with the success of e-commerce [26,27]. This is If individuals perceive risk, they expect some because consumers perceive higher levels of risk kinds of loss [16]. Psychology research has widely toward B2C e-commerce when they consider securi- studied risk theory, especially in relation to gambling ty to be insufcient. For example, Ratnasingham [27] behaviour. Different models were proposed to mea- emphasizes the importance of perceived risk on sure perceived risk [7073]. The development of the users acceptance of electronic data interchange theory of perceived risk in the context of consumer (EDI). Fram and Grady [28] report that online behaviour began in 1960 [18]. According to Bauer, customers are concerned with credit card fraud and consumers behaviour involved risk because their are willing to purchase only products with low levels purchasing actions will produce consequences of purchasing risk. After a large-scale denial of which he cannot anticipate with anything approx- Internet service attack in February 2000, 30% of imating certainty, and some of the which at least are respondents of a telephone survey indicated that they likely to be unpleasant [18] (p. 24). Since 1960 would be less likely to adopt B2C e-commerce [18], extensive consumer research has conrmed that because of the incident [29]. In another study, perceived risk affects consumers behavior not only perceived risk was found to have a signicant in North-America [1921] but also across different negative and direct effect on consumers adoption of cultures [22]. Internet banking [30]. 219 N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 2.3. Classication of perceived risk products as well as time spent on returning unsatisfactory products [34]. 2.3.1. Existing dimensions 7. Perceived personal risk is the possibility that A general denition of perceived risk in marketing individuals may be harmed because of their is the nature and amount of risk perceived by a purchase behavior. For example, they are likely consumer in contemplating a particular purchase to suffer if their credit cards information is action [20] (p. 33). Nevertheless, if businesses want stolen [35]. to target their resources on the right places to reduce 8. Perceived privacy risk is the possibility that consumers perceived risk, they need to identify the online businesses collect data about individuals effects of different types of risk [31]. A review of and use them inappropriately [35,36]. This past studies shows that researchers have identied dimension of risk includes undisclosed capture the following nine dimensions of perceived risk of information like consumers shopping habits. 9. Perceived source risk is the possibility that 1. Perceived nancial risk is sometimes called individuals suffer because the businesses from economic risk. It represents the possibility of which they buy products are not trustworthy monetary loss arising from online shopping [34]. It is a general perception regarding the [32,33]. For example, unreliable vendors deliver reliability of vendors such as whether a com- unsatisfactory products or even fail to deliver pany exists. products to consumers. In some cases, indi- viduals spend money to repair problematic Table 1 summarizes the studies that have ex- products. Alternatively, credit card details of amined the above dimensions of perceived risk. The individuals can be stolen when transactions X (examined) descriptor indicates a dimension has occur over the Internet [49,53]. been examined in past studies. The S (signicant) 2. Perceived performance risk is the possibility descriptor indicates a dimension has been examined that the purchased products do not work proper- and was found to be signicant in past studies. For ly or can be used for only a short period of time example, Jacoby and Kaplan [32] identify ve types [23,32]. This dimension of perceived risk is of perceived product risk, namely, nancial risk, similar to the usefulness or functionality of performance risk, social risk, physical risk, and products. psychological risk. Based on Jacoby and Kaplan 3. Perceived social risk is concerned with indi- [32], Darley and Smith [37] add the time-loss viduals perception of other people regarding dimension. In their study of mail-order shopping, their online shopping behavior [32]. It is the Simpson and Lakner [23] identify four types of possibility that consumers shopping behavior is perceived risk, namely, economic, performance not accepted by other society members. physical, and social / psychological. 4. Perceived physical risk is the possibility that In addition to showing perceived risk is a multi- products are harmful to individuals health [32] dimensional construct, Table 1 highlights that not all or products do not look as good as the in- dimensions of perceived risk were found to have dividuals expect [23]. signicant effects on consumers behavior. For ex- 5. Perceived psychological risk is the possibility ample, Lutz and Reilly [38] nd that performance that individuals suffer mental stress because of risk has a signicant effect on consumers infor- their purchasing behavior [32]. For example, mation acquisition behavior, but social risk has no consumers are likely to feel frustrated if their effect. Korgaonkar [31] reports that economic risk is purchases are unsuccessful. signicantly related to consumers intention to pur- 6. Perceived time-loss risk is the possibility that chase, but social risk has no effect. Based on individuals lose time because of their shopping Simpson and Lakner [23], Jarvenpaa and Todd [35] behavior [33]. In addition to shopping time, this identify ve types of risk in online shopping: econ- dimension includes waiting time for receipt of omic, social, performance, personal, and privacy. N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 220 Table 1 Dimensions of perceived risk Prior studies Perceived risk dimensions Year Author(s) Financial Performance Social Physical Psychological Time-loss Personal Privacy Source 1971 Roselius [33] X X X X 1972 Jacoby and Kaplan [32] X X X X X 1974 Lutz and Reilly [38] S X 1982 Korgaonkar [31] S X 1985 Gemunden [66] X X X 1986 Festervand et al. [67] S S S 1990 McCorkle [34] X X X X X 1993 Simpson and Lakner [23] S X X X X 1995 Darley and Smith [37] X X X X X X 1996 Jarvenpaa and Todd [35] X S X S X 1996 Van den Poel and Leunis [25] X X 1997 Fram and Grady [28] S 1999 Graphic, Visualization, & Usability Center [5] S X 1999 Korgaonkar and Wolin [46] S S 1999 Vellido et al. [48] S S 2000 Cheung and Lee [12] X 2000 Nyshadham [36] S 2000 Tan and Toe [30] S S X: Dimensions included in studies. S: Dimensions found to be signicant in the studies. Their results suggest that personal risk and per- the denition of nancial risk is in line with prior formance risk are more important than other types of studies. The convenience dimension in that study risk. refers to consumers perceived usefulness of B2C e-commerce [44]. 2.3.2. Problems of prior B2C research Third, even with proper denition, researchers The number of studies that examine the inuence simply dene perceived risk differently. For exam- of consumers perceived risk on their adoption of the ple, some researchers dene perceived risk for B2C B2C e-commerce has been increasing since Jarven- e-commerce as the lack of security and privacy on paa and Todds study in 1996 [28,30,4145]. Yet the Internet [30,46]. Based on Peter and Ryan [47], despite the increasing number of studies, there is no Salam et al. [9] dene perceived risk as a subjective clear guidance to Internet vendors as to what they expectation of nancial losses. Others refer it as the can do to reduce consumers perceived risk. We trustworthiness or reliability of Internet vendors [48]. believe this situation is attributed to four reasons. It is obvious that perceived risk is a multi-dimension- First, some studies provide unclear denition of al construct. Using perceived risk loosely to repre- perceived risk [13,15,3943]. For example, sent different things results in confusion. Findings of Limayem et al. [41] examine security and privacy in one study often are in conict or incomparable with their study but they do not dene perceived risk. those of other studies [32]. To help readers interpret Without a clear denition, it is difcult to interpret study results, researchers need to be more specic the results. about the type of perceived risk they investigate. Second, some denitions provided by researchers Fourth, as shown in Table 1, some researchers are are misleading [44,45]. For example, Andrade [44] aware of the multi-dimensional nature of perceived used nine variables to represent three dimensions of risk and have identied nine different dimensions in perceived risk: performance risk, nancial risk, and their studies. Yet except for the perceived source risk, convenience. Nevertheless, two of the dimensions in these dimensions represent consequences of con- fact represent antecedents of perceived risk, and only sumers perceived risk. That is, each dimension 221 N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 refers to a type of loss consumers perceive to suffer Internet standards [69]. In response to this consum- as a result of their actions. For example, numerous ers concern, researchers and businesses develop new studies show that perceived nancial risk is a major technologies and protocols, such as rewalls, encryp- dimension that determines consumers behavior tion, digital signatures [26,51], and wireless applica- [5,23,30,31]. What these results fail to show is the tion protocol [52] to improve Internet security. sources of such perceived risk. Financial losses can Despite these efforts, several studies show that be caused by manipulation or misuse of nancial consumers high levels of perceived risk of the information by the intended recipients of credit card Internet and its other related technologies continue to numbers or interception of credit card numbers by be obstacles to their acceptance of B2C e-commerce hackers [49]. Financial losses may also be caused by [12,15,53,63]. Therefore, we propose technology to inappropriate products [45]. Similarly, past studies be the rst source of consumers perceived risk on suggest that perceived privacy risk is another major online shopping. deterrent to consumers acceptance of online shop- In spite of the importance of technology factor, ping [30,36,50]. The question is what businesses can reducing consumers perceived risk toward tech- do in response to these results. Do consumers worry nologies is only a part of the solution. The second about privacy invasion because of hackers attacks or proposed source is related to Internet vendor. In a because of deceitful vendors? To solve the unclear study of business-to-business electronic commerce, problem related to the existing classication of researchers identify two types of risk: technology- perceived risk, we believe researchers need to ex- related and people-related [54]. In a similar vein, amine perceived risk from a different perspective. B2C e-commerce also has technology- and people- Identifying the sources of perceived risk is useful to related risks. People-related risk for B2C e-com- 2 Internet vendors because it allows them to target merce is associated with vendors and consumers . their resources in the right places. Because of the ubiquitous nature of the Internet, consumers can purchase products from vendors 2.3.3. Sources of perceived risk worldwide. Yet the relationship between Internet In view of the problem of classifying perceived vendors and consumers is impersonal and remote risk according to consequences dimensions, research- [49] (p. 145). Unless Internet vendors obtain digital ers need to examine perceived risk from a different certicates from certication authorities such as perspectivesource dimensions. Identifying the Verisign, consumers will have difculties identifying sources of perceived risk is useful to businesses, real owners of businesses [55] or ascertaining because it allows Internet vendors to target their genuine existence of businesses [56]. This kind of resources appropriately to reduce the perception. In anonymity leads to potential risks such as businesses addition to vendors, this study identies three other fail to deliver products as promised [14]. It may also sources of consumers perceived risks in relation to lead to misuse of consumers personal information online shopping: technology, consumer, and product. by those anonymous but malicious businesses [49]. The rst proposed source of consumers perceived The importance of vendor as a source of perceived risk is technology-related [69]. The major difference risk is evidenced by an increasing number of studies between online shopping and telephone shopping lies that examined the effects of Internet vendors charac- in the fast changing and ubiquitous Internet. Because teristics on consumers behaviour. For example, of the use of the Internet, the safety of credit card McKnight and Chervancy [57] examine effects of details and other personal information becomes a vendor reputation whereas Bhatnagar et al. [45] major concern for consumers [28,45,49]. A recent examine effects of reliability of vendors and Internet study examines the technological aspect of electronic security of credit card payment on consumers commerce and nds six impediments to consumers purchase decisions. Cheung and Lee [12] suggest acceptance of online shopping exist. These include download delays, limitations in the interface, search 2 In this study, we focus on direct relationship between Internet problems, inadequate measurement of Web applica- vendors and consumers, and do not examine the role of inter- tion success, security weakness, and a lack of mediaries such as guarantors. N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 222 perceived security control, perceived privacy control, The four dimensions of perceived risk are dened perceived integrity and perceived competence affect with reference to the sources as follows: consumers risk perception. A test of Cheung and Lees model indicates that perceived security control Perceived technology risk refers to the degree to of Internet vendors and perceived competence of which individuals believe that if they purchase Internet vendors are important determinants of con- products or services through the Internet, they sumers risk perceptions [15]. will suffer losses caused by the Internet and its The third source of perceived risk is also people- related technologies [28,54,63]. related and is related to consumers themselves. The Perceived vendor risk refers to the degree to theory of reasoned actions [58,59] posits that social which individuals believe that if they purchase inuence has a direct effect on behavioral intention. products or services through the Internet, they That is, individuals behaviours are inuenced by the will suffer losses caused by Internet vendors beliefs and comments of their families and friends. [12,13,15,55,64]. The more social support individuals garner regarding Perceived consumer risk refers to the degree to their actions, the more likely they will perform the which individuals believe that if they purchase actions. Past studies also suggest that social inuence products or services through the Internet, they affects individuals usage of new technologies will suffer losses caused by social pressure. [60,61]. Hence, we propose social pressure suffered Social pressure refers to pressure individuals by consumers to be a source of their perceived risk receive from their families, friends, or col- on online shopping. leagues [58,60,61]. In addition to technology and human factors, Perceived product risk refers to the degree to products sold on the Internet are another source of which individuals believe that if they purchase consumers risk perceptions. Some consumers per- products or services through the Internet, they ceive risk because they can obtain little product will suffer losses caused by products [45,53,62]. information and have doubts about product quality [62]. Others perceive risk because they cannot select 2.3.4. Perceived risk dimensions: sources versus products personally, or products can be defective or consequences inappropriate for their needs [45,75]. It is important Knowing simply the consequences of risk that to distinguish between perceived risk related to consumers perceive does not provide much help to products/ services and perceived risk in the context Internet vendors. Internet vendors can act on re- of transaction [53]. The former is attributed to the search results only if they know what are causing the nature [45,62] and value [74] of particular products. risk. In light of the importance of identifying sources For example, the ability to touch and feel is more of perceived risk, in this section we match the four important for some products (such as groceries) than sources of perceived risk to the various consequences others (such as books and CDs). Findings of prior dimensions of perceived risk. Perceived source risk studies support the importance of different levels of is excluded from the matching because this dimen- risk associated with products in affecting consumers sion itself represents a source of perceived risk. risk perception [32,38,45]. These ndings explain Furthermore, perceived personal risk is excluded, why consumers purchase some products more fre- because by its denition, this dimension of risk can quently than others on the Internet [6]. Therefore, the be caused by any source. Table 2 summarizes the fourth proposed source of perceived risk is product- matching results. related. Perceived nancial risk, perceived psychological In short, we identify four sources of perceived risk risk, and perceived time-loss risk have three sources. in relation to online shopping: technology, vendor, Hackers can cause nancial losses to consumers by consumer, and product. In this study, overall per- stealing their credit card details. Similarly, consum- ceived risk is dened as the degree to which ers may perceive nancial losses because of poor individuals believe that if they purchase products or product quality. In other cases, a fear that deceitful services through the Internet, they will suffer losses. vendors disappear overnight and do not deliver 223 N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 Table 2 sumer factor is responsible for only one type of Matching of sources and consequences of perceived risk perceived risksocial risk. The matching results Consequence Source coincide partially with a recent study that identies perceived risk with product / service with three types Technology Vendor Consumer Product of consequences dimensions. Their three dimensions Financial comprise functional loss that equals to our per- Performance formance loss, time-loss, and nancial loss [53]. Social Physical Psychological Time-loss 3. Research methodology Privacy Two focus group discussion sessions were con- products or services can also lead to consumers ducted to gather qualitative data from Internet con- perceived nancial risk. Perceived psychological risk sumers and to verify the importance of the proposed refers to mental stress suffered by consumers be- sources of perceived risk. Participants of the discus- cause of their online shopping behavior. Consumers sions are consumers in Queensland, Australia. The are likely to suffer mental stress if their computers focus group discussion was advertised in four local crash and they cannot nish their transactions. They newspapers. Eighty-four people enquired about the will feel stressful if the products they ordered do not discussion by phone or by email. We selected 18 arrive on time, or do not arrive at all. Even if participants with different backgrounds, but two consumers receive the products they ordered, they failed to turn up for the sessions. All participants will still be stressful if the products are of poor were 18 years or older and had access to the Internet. quality or unsuitable for their needs. In a similar Both sessions were held on a Saturday in September, vein, if consumers perceive a loss of time in online 2001. Each session lasted for 90 min. In return for shopping, the risk perception can be caused by slow their participation, participants received A$50. In loading time (i.e., technology-related) or slow re- addition, each participant will receive a copy of the sponse time of vendors. Moreover, consumers may results at the end of this research. have to spend time in returning faulty products. Perceived privacy risk is matched to technology 3.1. Demographics of participants and vendor dimensions. Consumers will lose their privacy if hackers steal their personal information. The demographics of all the participants are Yet their personal information can fall into the hands shown in Table 3. A total of 16 Internet users of third parties simply because Internet vendors sell participated in the two focus group discussion ses- or exchange the data. Perceived performance risk sions. There were nine females and seven males. The and perceived physical risk can be caused by prod- participants were all aged over 18. Most (62.5%) ucts. Alternatively, these two dimensions of risk can were aged between 26 and 35. Seventy-ve percent occur if Internet vendors mislead consumers. Lastly, of the participants had some university education. according to the prior denition of perceived social Their annual incomes ranged from A$20,000 to risk, the only source of this dimension of is related to A$79,999, although nearly half earned A$40,000 to consumers. A$59,999 per annum. Most participants were ex- In summary, Table 2 shows that technology factor perienced computer and Internet users. Only two is a source for four types of loss to consumers: described themselves as inexperienced computer and nancial, psychological, time, and privacy. Product Internet users. Sixty-two percent of participants have is related to ve types of losses: nancial, per- purchased online before. Among the experienced formance, physical, psychological, and time. Vendor online shoppers, 70% spent below A$500 in the last is related to six different types of consequences of 6 months, whereas 12% had spent more than perceived risk: nancial, performance, physical, psy- A$1000. Participants have different backgrounds. chological, time, and privacy. Nevertheless, con- Their occupations include: engineer, high school N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 224 Table 3 3.2. Dimensions of perceived risk Demographics of focus group participants Demographic variable (n 516) Frequency Percent The discussion results suggest that participants are worried about handing personal details to a space- Gender Female 9 56.20 less individual. The results support the existence of Male 7 43.80 three proposed dimensions of perceived risk: tech- nology, vendor, and product. Although all particip- Age ants consider Internet security to be important, some 1825 4 25.00 are concerned more with dealing with unknown 2635 10 62.50 3645 0 0.00 vendors. Others worry about the quality of products 4555 1 6.25 they will get. Yet participants suggest that perceived .55 1 6.25 consumer risk is irrelevant to their decisions to purchase online. Education Some high school 1 6.25 Graduate high school 3 18.75 3.2.1. Perceived technology risk Some university 3 18.75 Graduate university 3 18.75 Participants are concerned because they do not Post-graduate 6 37.50 know who they are dealing with and what is happening behind businesses web pages. They Income ,A$20,000 4 25.00 are unsure whether the payment process is safe. A$20,00039,999 4 25.00 The fear that good hackers will be able to steal A$40,00059,999 7 43.75 their credit card details is common (I dont A$60,00079,999 1 6.25 know if they can give money back if someone misuse my information; Accountability is not Computer skills Inexperienced users 2 12.50 clear in case money get lost in the process). Average user 6 37.50 Some participants worry that if their computers Advanced user 8 50.00 crash during transaction process, their infor- mation will be lost in the electronic never Internet skills never land (Who has got the information? Inexperienced users 2 12.50 Average user 7 43.75 Has the transaction gone through?). Advanced user 7 43.75 Even though many banks nowadays cover con- sumers nancial losses upon hackers attack, Online shopping experience participants are concerned with the privacy of Never 6 37.50 their personal information. ,5 times 6 37.50 59 times 2 12.50 Though 90% of participants were experienced 1020 times 2 12.50 Internet users, most participants do not know what cookies are. They are wary of getting Amount spent in last 6 months viruses as a result of their involvements in A$0 6 37.50 online transactions. A misconception of cookies A$199 2 12.50 A$100499 5 31.25 is that consumers computers will be infected A$500999 1 6.25 with viruses if businesses use cookies during .A$1000 2 12.50 transactions. All participants consider Internet security to be important. Nevertheless, only one participant teacher, university student, administrative ofcer, checks encryption protocols adopted by busines- environmental consultant, project coordinator, dis- ses before he makes any purchasing decision. ability support worker, housewife, marketing ofcer, Some participants perceive less risk in sites public servant, actor, system tester, and accountant. which have a lock symbol, even though they do 225 N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 not understand what kind of security is in place. companies, and they do not who they can Yet several other participants indicate that they complain to if foreign businesses fail to deliver will still perceive a high level of risk even if products. Most participants will purchase from they see a lock symbol. overseas businesses only if someone can refer To minimize potential losses, two participants them. acquired a separate credit card with a low credit Participants worry that businesses may sell limit just for purchasing products or services customer information to third parties. They are through the Internet. particularly cautious about those businesses that Most participants have not heard of electronic ask for unnecessary questions during transaction wallets. processes. As most privacy policies are long and convoluted, some participants read only the 3.2.2. Perceived vendor risk rst one or two policies. Others glance at every policy. On average, they read privacy policies Participants are afraid of not getting what they about 10% of the time. Although participants do pay for. They dislike dealing with unknown not read privacy policies carefully, they per- vendors who may not send them the products as ceive high levels of privacy risk if businesses do promised (Is the company going to disappear not provide privacy policy or the policies are overnight?). One participant perceives a high difcult to nd. level of vendor risk because of an experience of Although cookies allow businesses to provide his friend. That friend once booked and paid for personalized services, participants are wary of a motel accommodation in the United Kingdom them. Most participants feel their privacy is through the Internet. When he arrived at the being invaded if businesses put cookies onto address, he found himself in an industrial area their computers without their knowledge or with no sight of any motel. permission. Many participants perceive less risk in reputable businesses (I wouldnt buy from a company 3.2.3. Perceived product risk that I wouldnt know somehow). They rely on references from other people instead of doing it In contrast to the acceptance of buying boots trial and error. For example, they perceive a low over the Internet [65], participants of the focus level of risk in Amazon.com because of its good group discussion are skeptical about buying reputation. A participant got a second set of products that they cannot touch or feel. Most CDs by express post after complaining to the participants hesitate about purchasing clothes Amazon for not receiving his CDs; he described because sizes vary and clothes may not t them. Amazons response as nice and warm. One participant perceives no risk in purchasing Participants are reluctant to give their credit clothing through the Internet because she had card numbers to unknown Internet vendors good experiences from purchasing childrens because they are afraid that their cards will be clothing. misused. As currently the most common pay- Participants have doubts about the quality of ment method for B2C e-commerce is credit products that they will receive. Because of card, this deters some participants from attempt- different standards, some overseas products may ing to purchase anything on the Internet. be unsuitable for local use. As warranties for Participants perceive risk in businesses who do products are seldom specied on the Web-sites, not provide contact phone numbers or physical participants are worried that businesses are addresses (such as ofce or warehouse address). likely to refuse to take responsibility for dam- Although one of the advantages of B2C e- aged products. commerce is the ability to purchase products Some participants are worried about incurring from overseas, participants are reluctant to do hidden charges such as freight and taxes for so because they know little about those foreign the products they purchase. N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 226 Most participants indicate they will not buy To reduce vendor-related perceived risk, businesses expensive items through the Internet. could consider providing more company information, such as names of owners, staff, company history, 3.2.4. Perceived consumer risk physical addresses, and privacy policies on their Web-sites. Businesses should also enhance their The discussion results suggest that perceived customer services and avoid asking for unnecessary consumer risk does not exist. As one participant data. In terms of consumers perceived product risk, describedyou are alone . . . no peer businesses could consider offering incentives such as pressure . . . You are not affected by what your warranty or money back guarantee. In summary, friends or family think . . . Another participant businesses should communicate with consumers, indicates that although her husband uses B2C deliver technology guarantee and product quality e-commerce frequently, she is not tempted or guarantee, to inspire condence. Moreover, it is swayed to do so. important to provide good services, such as accept- All participants consider going shopping with a ing returned products. Consumers will more likely to few friends to be a valuable experience (It revisit Internet vendors if they have good experience. doesnt compare to the real shopping ex- perience. Physically being there and touching things . . . ; Its not the same feeling when References you get three fellows sit by the computer . . . as compared to go out, take the girls out . . . ). [1] N.C.J. Romano, J. Fjermestad, An agenda for electronic commerce customer relationship management research, in: Proceedings of the 7th Americas Conference on Information Systems, 2001, pp. 831833. 4. Conclusions and discussions [2] A. Bhattacherjee, Acceptance of e-commerce services: the case of electronic brokerages, IEEE Trans. Syst. Man This paper examines the concept of consumers Cybernetics A: Syst. Hum. 30 (4) (2000) 411420. perceived risk toward B2C e-commerce. We argue [3] Boston Consulting Group, The State of Online Retailing 3.0, that it is important for researchers to clearly dene 2000. perceived risk in their studies. Moreover, for the [4] Boston Consulting Group, BCG reports 100 percent growth in online business-to-consumer revenues in AsiaPacic this results to be useful to Internet vendors, researchers year, reaching close to U.S.$14 billion, BCG Media Re- should try to identify sources of consumers per- leases, 2001. ceived risk in addition to consequences. The results [5] Graphic, Visualization, & Usability Center (GVU), GVUs of focus group discussions conrm the importance of 10th World Wide Web User Survey, Georgia Institute of three sources of consumers perceived risktechnol- Technology, Atlanta, GA, 1999. [6] Catalog No. 8147.0 Use of the Internet by Householders, ogy, vendor, and product. Nevertheless, consumer as Australian Bureau of Statistics, 2000. a source of perceived risk was found to be unim- [7] T. Vu, P. Smith, T. Bennett, BizRate.com, NPD Joint survey portant. Participants of the discussion also suggested reveals 75 percent of online customers are abandoning ways to reduce the risk perceptions caused by shopping cart, bizrate.com Press Release, 1999, http: / different factors. / www.bizrate.com/ press/ press room/ release 49.xpml (last ] ] visited: 24/ 4/ 2000). For example, to reduce consumers perceived [8] V. Mitchell, Consumer perceived risk: conceptualisations and technology risk, it is important for businesses to models, Eur. J. Market. 33 (1/ 2) (1999) 163195. upgrade their security measures and emphasize the [9] A.F. Salam, H.R. Rao, C.C. Pegels, An investigation of safety of their sites on their Web-pages. Moreover, as consumer-perceived risk on electronic commerce transac- half of the participants were unaware that bank will tions: The role of institutional trust and economic incentive in a social exchange framework, in: Proceedings of the 4th underwrite their losses upon hacker attacks, busines- Americas Conference on Information Systems, 1998, pp. ses and banks could consider spending more effort 335337. on advertisement in this area. To tackle the fear that [10] R.C. Mayer, J.H. Davis, F.D. Schoorman, An integrative consumers do not receive what they pay for, busines- model of organizational trust, Acad. Manage. Rev. 20 (3) ses may consider adopting cash on delivery payment. (1995) 709734. 227 N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 [11] P.J. Ambrose, G.J. Johnson, A trust based model of buying [29] J. Schwartz, Poll: hack attacks dent e-condence, Washington Post, 2 March, E08, 2000. behavior in electronic retailing, in: Proceedings of the 4th [30] M. Tan, T.S.H. Teo, Factors inuencing the adoption of Americas Conference on Information Systems, 1998, pp. Internet banking, J. Assoc. Informat. Syst. 1 (5) (2000) 263265. 142. [12] C. Cheung, M.K.O. Lee, Trust in Internet shopping: a [31] P.K. Korgaonkar, Non-store retailing and perceived product proposed model and measurement instrument, in: Proceed- risk, in: B.J. Walker et al. (Ed.), An Assessment of Marketing ings of the 6th Americas Conference on Information Sys- Thought and Practice, American Marketing Association, tems, 2000, pp. 681689. Chicago, IL, 204207, p. 1982. [13] K. Kim, B. Prabhakar, Initial trust, perceived risk, and the [32] J. Jacoby, L.B. Kaplan, The components of perceived risk, adoption of Internet banking, in: Proceedings of the 21st in: Annual Conference of the Association for Consumer International Conference on Information Systems, 2000, pp. Research, 1972, pp. 382393. 537543. [33] T. Roselius, Consumer rankings of risk reduction methods, J. [14] K.J. Stewart, Transference as a means of building trust in Market. 35 (1971) 5661. world wide web sites, in: Proceedings of the 20th Interna- [34] D.E. McCorkle, The role of perceived risk in mail order tional Conference on Information Systems, 1999, pp. 459 catalog shopping, J. Direct Market. 4 (1990) 2635. 464. [35] S.L. Jarvenpaa, P.A. Todd, Consumer reactions to electronic [15] A. Borchers, Trust in Internet shopping: a test of a measure- shopping on the World Wide Web, Int. J. Electronic Com- ment instrument, in: Proceedings of the 7th Americas merce 1 (2) (1996) 5988. Conference on Information Systems, 2001, pp. 799803. [36] E.A. Nyshadham, Privacy policies of air travel web sites: a [16] R.N. Stone, F.W. Winter, Risk: is it still uncertainty times survey and analysis, J. Air Transport Manage. 6 (2000) consequences?, in: Proceedings of the American Marketing 143152. Association, 1987, pp. 261265. [37] W.K. Darley, R.E. Smith, Gender differences in information [17] J.W. Taylor, The role of risk in consumer behavior, J. processing strategies: an empirical test of the selectivity Market. 38 (2) (1974) 5460. model in advertising response, J. Advert. 24 (1) (1995) [18] R.A. Bauer, Consumer behavior as risk taking, in: D.F. Cox 4156. (Ed.), Risk Taking and Information Handling in Consumer [38] R.J. Lutz, P.J. Reilly, An exploration of the effects of Behavior, Harvard Business Press, Boston, MA, 1960, pp. perceived social and performance risk on consumer in- 2333. formation acquisition, Adv. Consum. Res. 1 (1974) 393 [19] D.F. Cox, Risk handling in consumer behavioran intensive 405. study of two cases, in: D.F. Cox (Ed.), Risk Taking and [39] M.S. Featherman, Extending the technology acceptance Information Handling in Consumer Behavior, Harvard Busi- model by inclusion of perceived risk, in: Proceedings of the ness Press, Boston, MA, 1967, pp. 3481. 7th Americas Conference on Information Systems, 2001, pp. [20] D.F. Cox, S.U. Rich, Perceived risk and consumer decision 758760. makingthe case of telephone shopping, J. Market. Res. 1 [40] T.P. Liang, J.S. Huang, An empirical study on consumer (4) (1964) 3239. acceptance of products in electronic markets: a transaction [21] G.R. Dowling, R. Staelin, A model of perceived risk and cost model, Decision Support Syst. 24 (1) (1998) 2943. intended risk-handling activity, J. Consumer Res. 21 (1994) [41] M. Limayem, M. Khalifa, A. Frini, What makes consumers 119134. buy from Internet? A longitudinal study of online shopping, [22] B.J. Verhage, U. Yavas, G.T. Green, Perceived risk: a cross- IEEE Trans. Syst. Man Cybernetics A: Syst. Hum. 30 (4) cultural phenomenon?, Int. J. Res. Market. 7 (4) (1990) (2000) 421432. 297303. [42] L. Loh, Y.S. Ong, The adoption of Internet-based stock [23] L. Simpson, H.B. Lakner, Perceived risk and mail order trading: a conceptual framework and empirical results, J. shopping for apparel, J. Consum. Studies Home Econom. 17 Informat. Technol. 13 (2) (1998) 8194. (1993) 377398. [43] D. Van den Poel, J. Leunis, Consumer acceptance of the [24] H.E. Spence, J.F. Engel, R.D. Blackwell, Perceived risk in Internet as a channel of distribution, J. Business Res. 45 (3) mail-order and retail store buying, J. Market. Res. 7 (3) (1999) 249256. (1970) 364369. [44] E.B. Andrade, Identifying discriminating variables of online [25] D. Van den Poel, J. Leunis, Mail-order versus retail store and ofine buyers: a perceived-risk approach, in: Proceed- buyingthe role of perceived risk and risk reduction strate- ings of the 6th Americas Conference on Information Sys- gies, Int. Rev. Retail, Distribut. Consum. Res. 6 (4) (1996) tems, 2000, pp. 13861392. 351371. [45] A. Bhatnagar, S. Misra, H.R. Rao, On risk convenience, and [26] E. Arnum, Doing business on the Interneta question of Internet shopping behavior, Commun. ACM 43 (11) (2000) balance, Business Commun. Rev. 25 (8) (1995) 3538. 98105. [27] P. Ratnasingham, Implicit trust in the risk assessment process [46] P.K. Korgaonkar, L.D. Wolin, A multivariate analysis of Web of EDI, Comput. Security 18 (1999) 317321. usage, J. Advert. Res. 39 (2) (1999) 5368. [28] E.H. Fram, D.B. Grady, Internet shoppers: is there a surfer [47] J.P. Peter, M.J. Ryan, An investigation of perceived risk at gender gap?, Direct Market. 59 (9) (1997) 4650. the brand level, J. Market. Res. 13 (1976) 184188. N. Lim / Electronic Commerce Research and Applications 2 (2003) 216228 228 [48] A. Vellido, P.J.G. Lisboa, K. Meehan, Segmentation of the [62] A. Raijas, The consumer benets and problems in the on-line shopping market using neural networks, Expert Syst. electronic grocery store, J. Retail. Consum. Services 9 Appl. 17 (4) (1999) 303314. (2002) 107113. [49] Organisation for Economic Co-operation and Development [63] D.J. Kim, B. Cho, H.R. Rao, Effects of consumer lifestyles (OECD), The Economic and Social Impact of Electronic on purchasing behavior on the Internet: a conceptual frame- Commerce: Preliminary Findings and Research Agenda, work and empirical validation, in: Proceedings of the 21st 1999. International Conference of Information Systems, Brisbane, [50] D.L. Hoffman, T.P. Novak, M. Peralta, Building consumer 2000, pp. 688695. trust online, Commun. ACM 42 (4) (1999) 8085. [64] S.L. Jarvenpaa, M. Tractinsky, M. Vitale, Consumer trust in [51] M. Greenstein, M. Vasarhelyi, Electronic Commerce: Securi- an Internet store, Informat. Technol. Manage. Special Issue ty, Risk Management, and Control, McGraw-Hill Irwin, Electronic Commerce 1 (12) (2000) 4571. Boston, MA, 2002. [65] R. Scheepers, Supporting the online consumer decision [52] H. Zampetakis, Digital Ids pave wireless web way, The process: electronic commerce in a small Australian retailer, Australian Financial Review, 8 April, 19, 2000. in: Proceedings of the 12th Australasian Conference on [53] D. Lee, J. Park, J. Ahn, On the explanation of factors Information Systems, 2001. affecting e-commerce adoption, in: Proceedings of the 22nd [66] H.G. Gemunden, Perceived risk and information search. A International Conference on Information Systems, 2001, pp. meta-analysis of the empirical evidence, Int. J. Res. Market. 109120. 2 (1985) 79100. [54] P. Ratnasingham, K. Kumar, Trading partner trust in elec- [67] T.A. Festervand, D.R. Snyder, J.D. Tsalikis, Inuence of tronic commerce participation, in: Proceedings of the 21st catalog versus store shopping and prior satisfaction on International Conference on Information Systems, 2000, pp. perceived risk, J. Acad. Market. Sci. 14 (1986) 2836. 544552. [68] R.A. Peterson, S. Balasubramanian, B.J. Bronnenberg, Ex- [55] A.M. Froomkin, The essential role of trusted third parties in ploring the implications of the Internet for consumer market- electronic commerce, in: R. Kalakota, A.B. Whinston (Eds.), ing, J. Acad. Market. Sci. 25 (4) (1997) 329346. Readings in Electronic Commerce, Addison-Wesley, Read- [69] G. Rose, H. Khoo, D.W. Straub, Current technological ing, MA, 1997, pp. 119176. impediments to business-to-consumer electronic commerce, [56] J.M. Gallaugher, E-commerce and the undulating distribution Commun. Assoc. Informat. Syst. 1 (16) (1999) 174. channel, Commun. ACM 45 (7) (2002) 8995. [70] C.H. Coombs, P.E. Lehner, An evaluation of two alternative [57] D.H. McKnight, N.L. Chervany, What is trust? A conceptual models for a theory of risk: part 1, J. Exp. Psychol. Hum. analysis and an interdisciplinary model, in: Proceedings of Percep. Perform. 7 (5) (1981) 11101123. the 6th Americas Conference on Information Systems, 2000, [71] C.H. Coombs, P.E. Lehnar, Conjoint design and analysis of pp. 827833. the bilinear model: an application to judgements of risk, J. [58] M. Fishbein, I. Ajzen, Belief, Attitude, Intention and Be- Mathematical Psychol. 28 (1984) 142. havior: An Introduction to Theory and Research, Addison- [72] A. Pollatsek, A. Tversky, A theory of risk, J. Mathematical Wesley, Reading, MA, 1975. Psychol. 7 (1970) 540553. [59] I. Ajzen, M. Fishbein, Understanding Attitudes and Predict- [73] J.M. Jia, J.S. Dyer, J.C. Butler, Measures of perceived risk, ing Social Behavior, Prentice Hall, Englewood Cliffs, NJ, Manage. Sci. 45 (4) (1999) 519532. 1980. [74] P.A. Bottomley, R. Fildes, The role of prices in models of [60] J.S. Jasperson, V. Sambamurthy, R.W. Zmud, Social inuence innovation diffusion, J. Forecast. 17 (7) (1998) 539555. and individual IT use: unravelling the pathways of appropria- [75] H. Kwak, R.J. Fox, G.M. Zinkhan, What products can be tion moves, in: Proceedings of the 20th International Confer- successfully promoted and sold via the Internet?, J. Advert. ence on Information Systems, Charlotte, NC, 1999, pp. Res. 42 (1) (2002) 2338. 113118. [61] V. Venkatesh, F.D. Davis, A theoretical extension of the technology acceptance model: four longitudinal eld studies, Manage. Sci. 46 (2) (2000) 186204.