Vulnerability of Gen-Z to E-Commerce Deception on Consumer's Belief Categories in Online Product Recommendations Systems

Shiraz Parveen (1), Ramya Krishnaraj (2)
(1) Avinashiligam Institute of Home Science and Higher Education for Women, India,
(2) Avinashiligam Institute of Home Science and Higher Education for Women, India

Abstract

Purpose: Despite the convenience of the Online Product Recommendation (OPR) system, concerns persist regarding deception practices in online shopping, especially among consumers from the Generation Z demographic cohort, for which less attention has been given in the previous literature.


Methodology/Approach: The impact of independent variables, namely   Perceived Usefulness, Perceived Enjoyment, and Perceived Risk, on Susceptibility to e-commerce fraud among Gen Z consumers has been studied. By conducting a mall intercept survey in four major metropolitan cities in India with a usable sample of 488 responses, the study empirically tested the data using SmartPLS 4.0.


Findings: The study concludes that Perceived Usefulness and Enjoyment positively influence continuous usage intention, while Perceived Deception and Perceived Risk are negatively connected with continuous usage intention. It depicts that the Gen Z consumer's belief categories formed during their early years as digital natives sharpen their alertness to deception practices.


Research Limitation/Implication: The study may not be generalised to represent Gen Z consumers as it collected data only from those who visited malls in the metropolitan cities of India.


Originality/Value of paper: This paper exclusively investigates the interrelation of belief categories to continuous usage intention. Further, the intersection of perceived Deception is proved in light of the E-commerce practices.

Full text article

Generated from XML file

References

Aditya, R.N., 2001a. The psychology of deception in marketing: A conceptual framework for research and practice', Psychology & Marketing, 18(7), pp. 735–761. https://doi.org/https://doi.org/10.1002/mar.1028.

Alba, J. et al.,1997. Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces, Journal of Marketing. http://www.shopfido.com.

Apau, R. and Koranteng, F.N., 2019. Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior, International Journal of Cyber Criminology, 13(2), pp. 228–254. https://doi.org/10.5281/zenodo.3697886.

Ashraf, M., Ismawati Jaafar, N. and Sulaiman, A., 2019. System- vs. consumer-generated recommendations: affective and social-psychological effects on purchase intention', Behaviour and Information Technology, 38(12), pp. 1259–1272. https://doi.org/10.1080/0144929X.2019.1583285.

Beatty, S.E. and Smith, S.M., 1987. External Search Effort: An Investigation Across Several Product Categories, Journal of Consumer Research, 14(1), pp. 83–95. http://www.jstor.org/stable/2489245.

Benbasat, I. and Wang, W., 2005. Trust In and Adoption of Online Recommendation Agents, Journal of the Association for Information Systems, 6(3), pp. 72–101. https://doi.org/10.17705/1jais.00065.

Benlian, A., Titah, R. and Hess, T., 2012a. Differential Effects of Provider Recommendations and Consumer Reviews in E-Commerce Transactions: An Experimental Study, Journal of Management Information Systems, 29, pp. 237–272. https://doi.org/10.2307/41713875.

Benlian, A., T.R., & H.T., 2010. Provider-vs. user-generated recommendations on e-commerce websites–comparing cognitive, affective and relational effects. In: ICIS 2010 Proceedings.

Bhattacherjee, A. 2001a. An empirical analysis of the antecedents of electronic commerce service continuance, Decision Support Systems, 32(2), pp. 201–214. https://doi.org/10.1016/S0167-9236(01)00111-7.

Bhattacherjee, A., 2001b. Understanding Information Systems Continuance: An Expectation-Confirmation Model, MIS Quarterly, 25, pp. 351–370https://doi.org/10.2307/3250921.

Bhattacherjee, A. et al., 2004. Understanding Changes in Belief and Attitude toward Information Technology Usage: A Theoretical Model and Longitudinal Test, MIS Quarterly.

Black, W.C., Babin, B.J. and Anderson, R.E., 2010. Multivariate data analysis: A global perspective. Chester: Pearson.

Bong, X.L., 2023. A study of awareness of cyber scams and cybersecurity among university students in Malaysia. Universiti Tunku Abdul Rahman. Available at: http://eprints.utar.edu.my/5842/ [Accessed 23.07.2024].

Button, M. and Cross, C., 2017. Cyber frauds, scams and their victims. Routledge.

Cheng, S.Y. et al., 2012. Predicting intention to purchase on group buying website in Taiwan: Virtual community, critical mass and risk, Online Information Review, pp. 698–712. https://doi.org/10.1108/14684521211275984.

Csikszentmihalyi, M., 1998. Finding Flow: The Psychology of Engagement With Everyday Life, in, p. 144.

Cyr, D., Head, M. and Ivanov, A., 2009. Perceived interactivity leading to e-loyalty: Development of a model for cognitive-affective user responses, International Journal of Human-Computer Studies, 67(10), pp. 850–869. https://doi.org/10.1016/j.ijhcs.2009.07.004.

Dabholkar, P.A. and Sheng, X., 2012 Consumer participation in using online recommendation agents: Effects on satisfaction, trust, and purchase intentions, Service Industries Journal, 32(9), pp. 1433–1449. https://doi.org/10.1080/02642069.2011.624596.

Dijkstra, T.K. and Schermelleh-Engel, K., 2014. Consistent partial least squares for nonlinear structural equation models. Psychometrika, 79, pp.585-604.

Dijkstra, T.K. and Henseler, J., 2015. Consistent partial least squares path modeling. MIS quarterly, 39(2), pp.297-316.

Doolin, B., Dillon, S., Thompson, F. and Corner, J.L., 2005. Perceived risk, the Internet shopping experience and online purchasing behavior: A New Zealand perspective. Journal of Global Information Management, 13(2), pp.66-88.

Dowling, G.R. and Staelln, R., 1994. A Model of Perceived Risk and Intended Risk-handling Activity. http://jcr.oxfordjournals.org/.

Falk, R.F. and Miller, N.B., 1992. A primer for soft modeling. A primer for soft modeling. Akron, OH, US: University of Akron Press.

Farrukh, A., Sadwick, R. and Villasenor, J., 2014. Youth Internet Safety: Risks, Responses, and Research Recommendations, The Brookings Institution. [Preprint]. Available at: http://eprints.utar.edu.my/5842/ [Accessed 23 June 2024].

Federal Trade Commission (no date) Facts about fraud from the FTC – and what it means for your business, Federal Trade Commission. Available et https://www.ftc.gov/business-guidance/blog/2024/02/facts-about-fraud-ftc-what-it-means-your-business [Accessed: 22 April 2024].

Forsythe, S.M. and Shi, B., 2003. Consumer patronage and risk perceptions in Internet shopping, Journal of Business Research, 56(11), pp. 867–875.: https://doi.org/10.1016/S0148-2963(01)00273-9.

Gefen, D., Karahanna, E. and Straub, D.W., 2003. Trust and TAM in online shopping: An integrated model. MIS Quarterly, pp.51-90.

Grazioli, S. and Jarvenpaa, S.L., 2000b. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), pp.395-410. https://doi.org/10.1109/3468.852434.

Grazioli, S. and Jarvenpaa, S.L., 2003. Deceived: Under target online. Communications of the ACM, 46(12), pp.196-205.

Hair, J.F., Risher, J.J., Sarstedt, M. and Ringle, C.M., 2019. When to use and how to report the results of PLS-SEM, European Business Review. Emerald Group Publishing Ltd., pp. 2–24. https://doi.org/10.1108/EBR-11-2018-0203.

Hango Darcy.,2023. Online harms faced by youth and young adults: The prevalence and nature of cybervictimization. Statistics Canada. Available at: www.statcan.gc.ca [Accessed 23 July 2024].

Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C., 1998. Multivariate data analysis prentice hall. Upper Saddle River, NJ, 730.

Henseler, J., Ringle, C.M. and Sarstedt, M., 2015. A new criterion for assessing discriminant validity in variance-based structural equation modeling, Journal of the Academy of Marketing Science, 43(1), pp. 115–135. https://doi.org/10.1007/s11747-014-0403-8.

Hsu, H.Y., Chen, W.Y., Weng, C.S. and Lin, S.P., 2008. Risk-reduction strategies for internet shopping of search goods and experience goods. In PICMET'08-2008 Portland International Conference on Management of Engineering & Technology (pp. 1052-1059). IEEE.

Ingram, R., Skinner, S.J. and Taylor, V.A., 2005. Consumers' evaluation of unethical marketing behaviors: The role of customer commitment, Journal of Business Ethics, 62(3), pp. 237–252. https://doi.org/10.1007/s10551-005-1899-0.

Jarvenpaa, S.L. and Grazioli, S., 1999. Surfing among sharks: how to gain trust in Cyberspace. Financial Times, Mastering Information Management, 7, pp.2-3.

Jarvenpaa, S.L., Tractinsky, N. and Vitale, M., 2000a. Article in Information Technology and Management, Information Technology and Management, 1, pp. 45–71. https://doi.org/10.1023/A:1019104520776.

Jarvenpaa, S.L. and Grazioli, S., 1999. Surfing among sharks: how to gain trust in Cyberspace. Financial Times, Mastering Information Management, 7, pp.2-3.

Johnson, P.E., Grazioli, S., Jamal, K. and Berryman, R.G., 2001. Detecting deception: Adversarial problem solving in a low base‐rate world. Cognitive Science, 25(3), pp.355-392.

Johnson, P.E., Grazioli, S. and Jamal, K., 1993. Fraud detection: Intentionality and deception in cognition. Accounting, Organisations and Society, 18(5), pp.467-488.

Kauffman, R. and Wood, C., 2000. Follow the leader? Strategic pricing in e-commerce.

Kelly, L., Kerr, G. and Drennan, J., 2010. Avoidance of Advertising in Social Networking Sites, Journal of Interactive Advertising, 10(2), pp. 16–27. https://doi.org/10.1080/15252019.2010.10722167.

Kock, N., 2015. Common method bias in PLS-SEM: A full collinearity assessment approach, International Journal of e-Collaboration, 11(4), pp. 1–10. https://doi.org/10.4018/ijec.2015100101.

Koufaris, M., 2002. Applying the Technology Acceptance Model and flow theory to online Consumer Behavior, Information Systems Research, 13(2), pp. 205–223. https://doi.org/10.1287/isre.13.2.205.83.

Maes, P., Guttman, R.H. and Moukas, A.G., 1999. Agents that buy and sell. Communications of the ACM, 42(3), pp.81-ff.

Norton Cyber Safety Insights Report., 2021.

Reep-van den Bergh, C.M.M. and Junger, M., 2018. Victims of cybercrime in Europe: a review of victim surveys, Crime Science, 7(1). https://doi.org/10.1186/s40163-018-0079-3.

Ringle, C.M., Wende, S. and Becker, J.M., 2022. SmartPLS 4. Oststeinbek: SmartPLS GmbH.

Román, S., 2010. Relational Consequences of Perceived Deception in Online Shopping: The Moderating Roles of Type of Product, Consumer's Attitude Toward the Internet and Consumer's Demographics, Journal of Business Ethics, 95(3), pp. 373–391. https://doi.org/10.1007/s10551-010-0365-9.

Román, S. and Ruiz, S., 2005. Relationship outcomes of perceived ethical sales behavior: The customer's perspective, Journal of Business Research, 58(4), pp. 439–445. https://doi.org/10.1016/j.jbusres.2003.07.002.

Rosenbaum, M.S., Russell-Bennett, R. and Contreras-Ramírez, G., 2022. Research priorities in the new service marketplace, Journal of Services Marketing, 36(8), pp. 1009–1014. https://doi.org/10.1108/JSM-06-2022-0190.

Saleh, Z.I. and Abushanab, E., 2010. The role of risk related knowledge in the diffusion of internet innovations, Journal of Information and Knowledge Management, 9(1), pp. 31–40. https://doi.org/10.1142/S0219649210002474.

Sandywell, B., 2009. On the globalisation of crime: The Internet and new criminality. Edited by In Y. Jewkes and M. Yar. Routledge.

Marko, S., Ringle, Ch.M., Hair, J.F., 2022. Partial Least Squares Structural Equation Modeling, in M. and V.A. Homburg Christian and Klarmann (ed.) Handbook of Market Research. Cham: Springer International Publishing, pp. 587–632. https://doi.org/10.1007/978-3-319-57413-4_15.

Schimmele, C., Fonberg, J. and Schellenberg, G., 2021. Canadians' assessments of social media in their lives. Economic and Social Reports. https://doi.org/10.25318/36280001202100300004-eng.

Sheng, X., Li, J. and Zolfagharian, M.A., 2014. Consumer initial acceptance and continued use of recommendation agents: Literature review and proposed conceptual framework. International Journal of Electronic Marketing and Retailing, 6(2), pp.112-127.

Sheng, X. and Zolfagharian, M., 2014.Consumer participation in online product recommendation services: Augmenting the technology acceptance model', Journal of Services Marketing, 28(6), pp. 460–470. https://doi.org/10.1108/JSM-04-2013-0098.

Van Wilsem, J., 2013. Hacking and Harassment-Do They Have Something in Common? Comparing Risk Factors for Online Victimisation, Journal of Contemporary Criminal Justice, 29(4), pp. 437–453. https://doi.org/10.1177/1043986213507402.

Wold, H., 1982. Models for knowledge. The making of statisticians, pp.189-212.

Xu, J., Benbasat, I. and Cenfetelli, R.T., 2014. The nature and consequences of trade-off transparency in the context of recommendation agents. MIS Quarterly, 38(2), pp.379-406.https://doi.org/10.2307/26634931.

Yoshida, K., Tsuda, K., Kurahashi, S. and Azuma, H., 2013. Mining Online Shopping Frauds--A Non-Data Mining Approach. International Journal of e-Education, e-Business, e-Management and e-Learning, 3(5), p.365. https://doi.org/10.7763/ijeeee.2013.v3.260.

Zhang, Z. and Ye, Z., 2022. The role of social-psychological factors of victimity on victimisation of online fraud in China, Frontiers in Psychology, 13. https://doi.org/10.3389/fpsyg.2022.1030670.

Authors

Shiraz Parveen
21phbaf003@avinuty.ac.in (Primary Contact)
Ramya Krishnaraj
Author Biography

Ramya Krishnaraj , Avinashiligam Institute of Home Science and Higher Education for Women

Assistant Professor (SG)

Department of Business Administration

Avinashilingam Institute of Home Science and Higher Education for Women

India

Parveen, S., & Krishnaraj , R. (2024). Vulnerability of Gen-Z to E-Commerce Deception on Consumer’s Belief Categories in Online Product Recommendations Systems. Quality Innovation Prosperity, 28(2). https://doi.org/10.12776/qip.v28i2.2017

Article Details

Similar Articles

1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.

No Related Submission Found