ANALISIS PERILAKU KONSUMSI PADA MARKETPLACE (SHOPEE & TOKOPEDIA) MENGGUNAKAN MODEL UTAUT
DOI:
https://doi.org/10.31598/sintechjournal.v5i1.1112Keywords:
Marketplace, Data Security, Cybercrime, Quantitative Methods, UTAUTAbstract
Using a marketplace platform for trade transactions in the digital era is currently in great demand than conventional shopping. However, marketplace users cannot just give away their personal data just like that. Customer data security is the most important thing that must be considered in order to avoid computer network crimes or commonly known as cybercrime. This article aims to find out what influences the security of customer data in the marketplace on consumer shopping behavior by implementing the UTAUT (Unified Theory of Acceptance & Use of Technology) research model. The research method in this article uses descriptive quantitative methods by taking population samples of active marketplace users in Denpasar City and using samples from several respondents. In this article it can be concluded that interest in using the marketplace has a partial influence on user behavior and the facilitating condition variables moderated by experience have a simultaneous effect on user behavior. These factors are proven to both have important aspects in influencing the security of customer data on the marketplace.
Downloads
References
R. Indonesia, UU Informasi dan Transaksi Elektronik. 2016.
D. P. Anugerah and M. Indriani, “Data Protection in Financial Technology Services (A Study in Indonesian Legal Perspective),” Sriwij. Law Rev., vol. 2, no. 1, p. 82, 2018, doi: 10.28946/slrev.vol2.iss1.112.pp82-92.
M. Delpiero, F. A. Reynaldi, I. U. Ningdiah, and ..., “Analisis Yuridis Kebijakan Privasi dan Pertanggungjawaban Online Marketplace Dalam Perlindungan Data Pribadi Pengguna Pada Kasus Kebocoran Data,” Padjadjaran Law …, vol. 9, 2021, [Online]. Available: http://jurnal.fh.unpad.ac.id/index.php/plr/article/view/509.
E. F. Thalib and N. P. S. Meinarni, “Tinjauan Yuridis Mengenai Marketplace Berdasarkan Peraturan Perundang-Undangan Di Indonesia,” J. IUS Kaji. Huk. dan Keadilan, vol. 7, no. 2, 2019, doi: http://dx.doi.org/10.29303/ius.v7i2.622.
F. E. Purnomo, A. Kusyanti, and H. Aryadita, “Evaluasi Pengaruh Keamanan Data Dan Kepercayaan Pelanggan Pada Website E-Commerce PT. XYZ,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 6, pp. 2400–2407, 2018.
S. Dewi Rosadi, “Perlindungan Konsumen Daring Dan Tanggung Jawab Perusahaan Marketplace Atas Data Privasi Konsumen,” Suara Keadilan, vol. 21, no. 1, pp. 2621–9174, 2020.
G. Niken, “Daftar Marketplace Indonesia 2020 dengan Kunjungan Terbanyak,” 2020. .
D. Mulyaningtyas, “Situs Tokopedia Diretas Hacker, Ini 6 Faktanya,” 2020. .
P. Koutroumpis, A. Leiponen, and L. Thomas, “The (Unfulfilled) Potential of Data Marketplaces,” ETLA Work. Pap., vol. 2420, no. 53, 2017, [Online]. Available: http://pub.etla.fi/ETLA-Working-Papers-53.pdf%0Ahttp://pub.etla.fi/ETLA-Working-Papers-53.pdf%0Ahttp://pub.etla.fi/ETLA-Working-Papers-53.pd.
J. A. Klien, P. M. Rao, and M. Dalvi, “Competition and consumer privacy in the cyberspace market,” J. Intellect. Prop. Rights, vol. 23, no. 2–3, pp. 70–85, 2018.
V. Venkatesh, G. B. Morris, M., Davis, and F. D. Davis, “User acceptance of information technology: Toward a unified view,” MIS Q., vol. 3, pp. 425–478, 2003, doi: 10.1006/mvre.1994.1019.
E. Rahmanita, N. Prastiti, and I. Jazari, “Penggunaan Metode AHP dan FAHP dalam Pengukuran Kualitas Keamanan Website E-Commerce,” J. Teknol. Inf. dan Ilmu Komput., vol. 5, no. 3, p. 371, 2018, doi: 10.25126/jtiik.201853816.
H. Snyder, “Literature Review as a Research Methodology: An Overview and Guidelines,” J. Bus. Res., pp. 333–339, 2019, doi: https://doi.org/10.1016/j.jbusres.2019.07.039.
I. G. N. Sedana and S. W. Wijaya, “Penerapan Model Utaut Untuk Memahami Penerimaan Dan Penggunaan Learning Management System Studi Kasus: Experential E-Learning of Sanata Dharma University,” J. Sist. Inf., vol. 5, no. 2, p. 114, 2012, doi: 10.21609/jsi.v5i2.271.
D. P. F. Z. Barrane, G. E. Karuranga, “Technology Adoption and Diffusion: A New Application of the UTAUT Model,” Int. J. Innov. Technol. Manag., vol. 15, 2018, doi: doi:10.1142/S0219877019500044.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Ni Putu Suci Meinarni, Ni Putu Ratih Pradnya Dewi, Wayan Gede Suka Parwita
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright in each article belongs to the author.
- The authors admit that SINTECH Journal as a publisher who published the first time under Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
- Authors can include writing separately, regulate distribution of non-ekskulif of manuscripts that have been published in this journal into another version (eg sent to respository institution author, publication into a book, etc.), by recognizing that the manuscripts have been published for the first time in SINTECH Journal