Influence of Perceived Security and Perceived Risk on Continuance Intention in Using ShopeePay Digital Wallet Service: SEM-PLS Analysis
DOI:
https://doi.org/10.23917/saintek.v2i1.13562Keywords:
data protection, digital payment, information security, ShopeePay, user trustAbstract
The rapid growth of digital payment services in Indonesia has increased the adoption of digital wallets, including ShopeePay. While the integration of technologies associated with the Fourth Industrial Revolution enhances transaction efficiency and convenience, it also raises concerns regarding security and data protection. This study examines the effects of perceived security and perceived risk on users’ continuance intention to use ShopeePay.
A quantitative approach was employed using Structural Equation Modeling–Partial Least Squares (SEM-PLS). Data were collected through questionnaires distributed to 76 ShopeePay users. The analysis involved evaluation of both the measurement model (outer model) and the structural model (inner model). The results indicate that all constructs meet the criteria for convergent validity and reliability, although the risk construct shows relatively lower internal consistency. Structural model analysis reveals that perceived security has a positive and significant effect on continuance intention, with a strong effect size. In contrast, perceived risk does not significantly influence continuance intention and is not significantly affected by perceived security. These findings suggest that security is a more dominant factor than risk in shaping continued use of ShopeePay. The study provides practical implications for digital payment providers to strengthen security systems and enhance communication regarding data protection, while contributing to the literature on continuance intention in fintech services.
Downloads
References
[1] A. Thommandru and B. Chakka, “The Globalization of Cashless Transactions Using Blockchain Technology to Preventing Money Laundering and The Changing Trends in The Cryptocurrency Market: A Learning Experience of Polish and EU Laws,” European Studies, vol. 9, no. 2, pp. 213–233, Dec. 2022, doi: 10.2478/eustu-2022-0021.
[2] M. Al-Okaily, “The influence of e-satisfaction on users’ e-loyalty toward e-wallet payment apps: a mediated-moderated model,” International Journal of Emerging Markets, vol. 20, no. 6, pp. 2428–2454, May 2025, doi: 10.1108/IJOEM-08-2022-1313.
[3] B. L. Handoko, I. G. M. Karmawan, and L. Meliana, “Factors Influenced User Interest in Payment Transaction of ShopeePay Digital Wallet Application,” in 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, Oct. 2022, pp. 1–6. doi: 10.1109/ICORIS56080.2022.10031472.
[4] S. Sivamohan and S. S. Sridhar, “An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework,” Neural Comput. Appl., vol. 35, no. 15, pp. 11459–11475, May 2023, doi: 10.1007/s00521-023-08319-0.
[5] S. Jain, S. Sharma, and R. Tomar, “Integration of Wit API with Python Coded Terminal Bot,” 2019, pp. 397–406. doi: 10.1007/978-981-13-1501-5_34.
[6] M. Wu, Z. Song, and Y. B. Moon, “Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods,” J. Intell. Manuf., vol. 30, no. 3, pp. 1111–1123, Mar. 2019, doi: 10.1007/s10845-017-1315-5.
[7] F. Zhang, H. A. D. E. Kodituwakku, J. W. Hines, and J. Coble, “Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data,” IEEE Trans. Industr. Inform., vol. 15, no. 7, pp. 4362–4369, Jul. 2019, doi: 10.1109/TII.2019.2891261.
[8] V. Tan and V. N. Renata, “The effect of promotion, expenditure budgeting, and consumptive behavior on Indonesians’ intention of using GoPay or ShopeePay,” E3S Web of Conferences, vol. 426, p. 02060, Sep. 2023, doi: 10.1051/e3sconf/202342602060.
[9] Hariyadi, K. Handoko, and A. Noviliza, “The Influence of Information Technology and Communication Advancement Especially Smartphone on Muhammadiyah University of West Sumatera’s Students Year 2019,” J. Phys. Conf. Ser., vol. 1779, no. 1, p. 012083, Feb. 2021, doi: 10.1088/1742-6596/1779/1/012083.
[10] N. I. Abas and D. Puspawati, “E-Wallet Adoption in Continuance Intention As A e-Payment System for Live Streaming Shopping,” Procedia Comput. Sci., vol. 234, pp. 1137–1144, 2024, doi: 10.1016/j.procs.2024.03.109.
[11] N. Widayanto, A. R. Lahitani, and N. I. Kusumaningtyas, “Analisis Keamanan Data Pribadi pada Shopee Paylater Menggunakan Metode Hybrid,” Teknomatika: Jurnal Informatika dan Komputer, vol. 15, no. 1, pp. 28–33, May 2021, doi: 10.30989/teknomatika.v15i1.1097.
[12] K. Zhang, W. Zuo, Y. Chen, D. Meng, and L. Zhang, “Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising,” IEEE Transactions on Image Processing, vol. 26, no. 7, pp. 3142–3155, Jul. 2017, doi: 10.1109/TIP.2017.2662206.
[13] W. Adiani, A. Aprianingsih, I. Fachira, T. Debby, and A. P. Maharatie, “Social influence, financial benefit, and e-wallet multi-brand loyalty: The mediating impact of commitment,” Cogent Business & Management, vol. 11, no. 1, Dec. 2024, doi: 10.1080/23311975.2023.2290228.
[14] S. K. W. Amnesti, S. Zulaichah, and N. Istiqomah, “Legal protection of personal data security in Indonesian Local Government apps: Al Farabi’s perspective,” Legality : Jurnal Ilmiah Hukum, vol. 33, no. 1, pp. 1–19, Oct. 2024, doi: 10.22219/ljih.v33i1.34623.
[15] M. Yusuf, “Pengaruh Promosi, Gaya Hidup, dan Persepsi Risiko terhadap Niat Beli Motor Listrik menggunakan Metode SEM - PLS,” G-Tech: Jurnal Teknologi Terapan, vol. 6, no. 2, pp. 241–248, Sep. 2022, doi: 10.33379/gtech.v6i2.1685.
[16] D. Novitasari et al., “Optimizing Educational Technology for Inclusive and Quality Learning Through PLS-SEM Analysis,” in 2025 4th International Conference on Creative Communication and Innovative Technology (ICCIT), IEEE, Aug. 2025, pp. 1–7. doi: 10.1109/ICCIT65724.2025.11167583.
[17] B. R. KARTAWINATA, A. A. WAFA, D. KURNIANINGRUM, M. Fakhri, A. WARDHANA, and R. JOVIANO, “The impact of digital marketing and brand trust on e-wallet adoption (study on ShopeePay Indonesia),” in International Conference on Medical Imaging, Electronic Imaging, Information Technologies, and Sensors (MIEITS 2024), J. Jaiswal, Ed., SPIE, Jun. 2024, p. 47. doi: 10.1117/12.3032488.
[18] M. Tavakol and R. Dennick, “Making sense of Cronbach’s alpha,” Int. J. Med. Educ., vol. 2, pp. 53–55, Jun. 2011, doi: 10.5116/ijme.4dfb.8dfd.
[19] K. S. Taber, “The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education,” Res. Sci. Educ., vol. 48, no. 6, pp. 1273–1296, Dec. 2018, doi: 10.1007/s11165-016-9602-2.
[20] N. H. Mohd Dzin and Y. F. Lay, “Validity and Reliability of Adapted Self-Efficacy Scales in Malaysian Context Using PLS-SEM Approach,” Educ. Sci. (Basel)., vol. 11, no. 11, p. 676, Oct. 2021, doi: 10.3390/educsci11110676.
[21] M. P. Libório, A. M. A. Diniz, D. A. G. Vieira, and P. I. Ekel, “Subjective–Objective Method of Maximizing the Average Variance Extracted From Sub-indicators in Composite Indicators,” Soc. Indic. Res., vol. 175, no. 2, pp. 613–637, Nov. 2024, doi: 10.1007/s11205-024-03385-w.
[22] H. Mohd Thas Thaker, N. R. Subramaniam, A. Qoyum, and H. Iqbal Hussain, “Cashless society, e‐wallets and continuous adoption,” International Journal of Finance & Economics, vol. 28, no. 3, pp. 3349–3369, Jul. 2023, doi: 10.1002/ijfe.2596.
[23] C. Aprilia and R. Amalia, “How Perceived Security Influences Continuance Intention to Use Mobile Wallet,” Jurnal Minds: Manajemen Ide dan Inspirasi, vol. 9, no. 2, pp. 271–288, Dec. 2022, doi: 10.24252/minds.v9i2.30083.
[24] M. S. Adhantoro et al., “Hybrid Deep-Ensemble Learning for Cybersecurity: A Multi-Dataset Framework Achieving High Precision and Minimal False Positives in Attack Detection,” International Journal of Intelligent Engineering and Systems, vol. 18, no. 8, pp. 692–706, Sep. 2025, doi: 10.22266/ijies2025.0930.42.
[25] Y.-M. Wang and Y.-X. Li, “Adaptive security control of time-varying constraints nonlinear cyber-physical systems with false data injection attacks,” Journal of Control and Decision, vol. 11, no. 1, pp. 50–59, Jan. 2024, doi: 10.1080/23307706.2022.2136274.
Downloads
Submitted
Accepted
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Devita Rizqi Maulida, Nirma Ayu Suryaningtyas, Selvalentina Anggita, Umi Mahmudah

This work is licensed under a Creative Commons Attribution 4.0 International License.





