An Analysis of Bitcoin Acceptance in Indonesia
DOI:
https://doi.org/10.21512/comtech.v8i4.3885Keywords:
Bitcoin, Unified Theory of Acceptance and Use of Technology (UTAUT), Indonesia, CryptocurrencyAbstract
This research intended to understand the factors affecting the acceptance of Bitcoin technology in Indonesia. It adopted the model of Unified Theory of Acceptance and Use of Technology (UTAUT), which took into account four influencing factors. Those were performance expectancy, effort expectancy, social influence, and facilitating conditions. The factors of gender and age were assumed to moderate the relations between those four factors and use and behavioral intention. The empirical data for those factors were collected by questionnaires from 49 respondents. The statistical significance of the relationships was evaluated by multivariate regression analysis. The result is a model that matches the data with R2 = 0,678. It demonstrates a high level of fitness. The analysis suggests that the performance expectancy factor and the social influence factor greatly affect the behavioral intention to use Bitcoin with the values of t-statistic of 3,835 (p-value = 0,000) for the former factor and 1,948 (0,059) for the latter factor. However, the social influence factor has less profound effect on the behavioral intention.
Plum Analytics
References
Abdulwahab, L., & Dahalin, Z. M. (2010). A conceptual model of Unified Theory of Acceptance and Use of Technology (UTAUT) modification with management effectiveness and program effectiveness in context of telecentre. African Scientist, 11(4), 267-
Androulaki, E., Karame, G. O., Roeschlin, M., Scherer, T., & Capkun, S. (2013). Evaluating user privacy in Bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 34-51). Springer, Berlin, Heidelberg.
Bohr, J., & Bashir, M. (2014). Who uses Bitcoin? An exploration of the Bitcoin community. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST) (pp. 94-101). IEEE.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.
Fathema, N., Shannon, D., & Ross, M. (2015). Expanding the Technology Acceptance Model (TAM) to examine faculty use of Learning Management Systems (LMSs) in higher education institutions. Journal of Online Learning & Teaching, 11(2), 210-
Feld, S., Schönfeld, M., & Werner, M. (2014). Analyzing the deployment of bitcoin’s p2p network under an AS-level perspective. Procedia Computer Science, 32, 1121-1126.
Fleder, M., Kester, M. S., & Pillai, S. (2015). Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657.
Lungan, R. (2006). Aplikasi statistika dan hitung peluang. Yogyakarta: Graha Ilmu.
Moore, T., & Christin, N. (2013). Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In International Conference on Financial Cryptography and Data Security (pp. 25-33). Springer.
Rogojanu, A., & Badea, L. (2014). The issue of competing currencies. Theoretical and Applied Economics, 21(1), 1-12.
Silinskyte, J. (2014). Understanding Bitcoin adoption: Unified Theory of Acceptance and Use of Technology (UTAUT) application (Master Thesis). University Leiden.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 425-478.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: