Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

The Cryptography Technology Usage in Message System: Online Shoppers Perspective

Azrina Othman, Norhidayah Mohamad, Nik Adzrieman Abdul Rahman, Adilah Mohd Din

http://dx.doi.org/10.6007/IJARBSS/v14-i8/22586

Open access

This research explores the essential role of cryptography in securing messaging systems within online shopping platforms, with a focus on consumer perspectives in Malaysia. As online shopping becomes increasingly prevalent, the need for secure communication to protect sensitive information and maintain consumer trust is paramount. The study utilizes the Technology Acceptance Model (TAM) to examine factors influencing the adoption of cryptography technology among online shoppers. A survey of 150 Shopee users was conducted to gather insights on their perceptions of the technology's usefulness, ease of use, confidentiality, and non-repudiation. Data analysis using SPSS, including descriptive statistics, Pearson correlation, and linear regression, revealed that all four factors significantly impact the adoption of cryptography, with non-repudiation being the most influential. The findings suggest that consumers prioritize the assurance that their messages cannot be altered or denied, underscoring the need for strong cryptographic protections in online shopping platforms. However, the study faced limitations due to the COVID-19 pandemic, which restricted data collection to online methods. Future research should broaden the scope by including a more diverse demographic and geographical representation and incorporating in-depth interviews with industry experts. These steps would provide further insights into the effectiveness of different cryptographic methods across various platforms and industries.

Agar, J. (2019). What is technology? Annals of Science, 486-512.
Akhtar, I. (2016). Research Design. Research in Social Science, 68-79.
Banerjee, S., & Kurths, J. (2014). A new dimension in secure communications. The European Physical Journal Special Topics, 1441-1445.
Boyd, J. (2002). In Community We Trust: Online Security Communication at eBay . Journal Of Computer-Mediated Communication.
Buchanan, T., & Whitty, M. (2014). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law.
Chen, J. (2014). A Secure End-to-End Mobile Chat Scheme. 2014 Ninth International Conference On Broadband And Wireless Computing, Communication And Applications, 472-477.
Cooksey, R. W. (2020). Descriptive Statistics for Summarising Data. Illustrating Statistical Procedures: Finding Meaning in Quantitative Data, 61-139.
Crane, C. (2021). What Is a Hash Function in Cryptography? A Beginner’s Guide. Hashed Out by The SSL Store.
Crossley, J., & Jansen, D. (2021). Saunders’ Research Onion: Explained Simply. Grad Coach.
Crossman, A. (2020). What You Need to Understand About Purposive Sampling. ThoughtCo. Dang, T. (2021). Improving E-Commerce Service For Better. International Business, 5-33.
DeCarlo, M. (2020). Sampling in qualitative research. Pressbooks.
Devi, T. R. (2013). Importance of Cryptography in Network Security. International Conference On Communication Systems and Network Technologies, 462-464.
Dhakal, C. (2018). Interpreting the Basic Outputs (SPSS) of Multiple Linear Regression.International Journal of Science and Research, 1448-1449.
Diggory, K. (2018). Technology in the 21st Century. Explore Life.
Frey, F. (2017). SPSS (Software). International Encyclopedia of Communication Research Methods, 1-2.
Fruhlinger, J. (2020). What is cryptography? How algorithms keep information secret and safe. IDG Communications.
Gencoglu, M. T. (2019). Importance of Cryptography in Information Security. Journal of Computer Engineering, 65-68.
Ginee. (2021). How To Chat Seller In Shopee And How Can I Contact Them.
Huawei. (2021). Quantum computers will disrupt existing systems.
Jones, C. (2010). Utilizing the Technology Acceptance Model to Assess the. Issues in Information Systems, 9-12.
Jonker, N. (2019). What drives the adoption of crypto-payments by online retailers?. Electronic Commerce Research And Applications, Vol. 35, 3-5.
Kartalopoulos, S. V. (2006). A Primer on Cryptography in. IEEE Communications Magazine, vol 44, no. 4, 146-151.
Kasasa. (2021).Boomers,Gen X, GenY, Gen Z, and Gen A explained.
Kuliya, M., & Abubakar, H. (2020). Secured Chatting System Using Cryptography.
International Journal Of Creative Research Thoughts, 23-29.
Lazada. (2021). Help Center.
Lemzy, A. (2018). 9 Types of Mobile Messages to Engage eCommerce Customers. The Branch.
Li, Y. (2016). How to Determine the Validity and Reliability of an Instrument.
Liu, W. (2021). Gold Price Analysis and Prediction based on Pearson Correlation.Association for Computing Machinery, 358-361.Market Business News. (2021). Online shopping – Definition and meaning.
McLeod, S.(2018). Questionnaire: Definition, Examples, Design and Types.Simplypsychology.org.
Mishra, P. (2021). 8 Types of Sampling Techniques. Medium.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer Perceptions of Privacy and Security Risks. Journal of Consumer Affairs, 27-35.
Mohsin, M. (2020). 10 Online Shopping Statistics You Need to Know in 2021.
Pedamkar, P. (2021). What is Cryptography? Educba.
Prince, B. and Lovesum, J., (2020). Privacy Enforced Access Control Model for Secured Data Handling in Cloud?Based Pervasive Health Care System. SN Computer Science, 1-3.
Reynolds, L., & Winks, J. (2021). Data Protection Techniques: A Cryptography Approach. Journal Of Technology and Systems, Vol.3, 13-18.
Richards, K. (2020). What is cryptography? TechTarget.
Ross, M. (2018). 5 Ways Messaging is Transforming Customer Service for Online Retailers. Disruptive advertising.
Sardar, Z. (2020). Cryptography: Why Do We Need It? Electronic Design.
Schober, P. (2018). Correlation Coefficients: Appropriate Use and Interpretation. Anesthesia & Analgesia, 1763-1768.
Shashank. (2020). What is Cryptography? – An Introduction to Cryptographic Algorithms. Edureka.
Shopee. (2021). Privacy Policy.
Singh, H. (2021). E-Commerce Security Issues. Cyphere.
Sithamparam, B. (2021). Consumer alert – Scam cases are rising. Free Malaysia Today:
Smart, N. (2018). How cryptography enables online shopping, cloud tech, and the blockchain. TNW Conference.
The Economic Times. (2021). Definition of 'Cryptography'. Varghese, J. (2021). 10 E-commerce Security Threats That Are Getting Stronger By The Day.
Walia, A. (2020). How to formulate a research strategy? Project Guru.
Wong, A., & Yamat, H. (2020). Testing the Validity and Reliability of the “Learn, Pick, Flip”, International Journal Of Academic Research in Business & Social Sciences, 22-26.
Yasin, S., (2012). Cryptography Based E-Commerce Security: A Review. International Journal of Computer Science Issues, Vol. 9, 132-135.
Yin, W. (2021). Top-selling Product Categories that Customers Buy on Shopee - Involve Asia.
Zamlus, N. (2019). Report: Selangor make up highest number of e-commerce users in 2019 - Selangor Journal.
Zou, D. (2020). Using SPSS to Analyze Complex Survey Data: A Primer. Journal of Modern Applied Statistical Methods, 2-6. (Mansor, Zabarani, & al, 2021)

Othman, A., Mohamad, N., Rahman, N. A. A., & Din, A. M. (2024). The Cryptography Technology Usage in Message System: Online Shoppers Perspective. International Journal of Academic Research in Business and Social Sciences, 14(8), 3365–3378.