Analysis of Reliability, Transaction Speed, and User Experience on Information System Integration in E-commerce Business in Indonesia
DOI:
https://doi.org/10.58812/wsist.v1i02.478Keywords:
Reliability, Transaction Speed, User Experience, Information System Integration, E-commerce, Business, IndonesiaAbstract
This research investigates the dynamics of information system integration in the context of e-commerce businesses in Indonesia, focusing on the critical factors of reliability, transaction speed, and user experience. Employing a quantitative approach, the study utilizes Structural Equation Modeling with Partial Least Squares (SEM-PLS) to analyze data from a sample of 175 participants. The measurement model assessment reveals robust factor loadings and reliability measures, establishing the foundation for further analysis. Discriminant validity analysis highlights the distinctiveness of the constructs, though attention to refining measurement items for user experience is recommended. The model fit assessment indicates that the proposed structural model aligns well with the observed data. The structural model analysis uncovers significant positive relationships between reliability, transaction speed, user experience, and information system integration. Furthermore, the R-Square values underscore the substantial impact of these factors, explaining approximately 60.2% of the variance in information system integration. The findings provide valuable insights for businesses and policymakers, emphasizing the need to prioritize reliability, transaction speed, and user experience to enhance information system integration in Indonesian e-commerce.
References
P. A. Winarsasi, M. C. Thalib, M. R. Moha, and N. F. Elfikri, “State Control Of Electronic Information Resources: Role And Efforts In The Modern Context,” J. Pamator J. Ilm. Univ. Trunojoyo, vol. 16, no. 2, pp. 405–418, 2023.
N. Ishak, “Guarantee of Information and Communication Technology Application Security in Indonesia: Regulations and Challenges?,” Audit. Comp. Law J., vol. 4, no. 2, pp. 108–117, 2023.
R. Kusumarani and R. P. A. Pramesti, “Exploring application portfolio management in Indonesia: A case study of the Indonesia agency for the assessment and application of technology,” Comput. Sci. Inf. Technol., vol. 4, no. 1, pp. 76–84, 2023.
Y. Evitha, S. N. Sari, D. Suprayitno, and J. Irrianda, “Digital Communication Management Government of the Republic of Indonesia for Inclusive and Sustainable Economic Recovery in Indonesia,” KnE Soc. Sci., pp. 621–631, 2023.
H. Al Asyari, “Between Freedom And Protection: A Critical Review Of Indonesia’S Cyberspace Law,” Prophet. Law Rev., vol. 5, no. 1, pp. 79–103, 2023.
D. Junaedi and M. R. Arsyad, “Potensi Disruptif Digital di Negara Berkembang,” Com. Commun. Inf. Technol. J., vol. 1, no. 1, pp. 50–70, 2023.
A. Dudhat and V. Agarwal, “Indonesia’s Digital Economy’s Development,” IAIC Trans. Sustain. Digit. Innov., vol. 4, no. 2, pp. 109–118, 2023.
C. S. Hartati and A. Muhammad, “Combating Cybercrime and Cyberterrorism in Indonesia,” J. Hub. Int., vol. 11, no. 2, pp. 45–56, 2023.
B. Buchanan, The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press, 2016.
M. M. Alam, A. M. Fawzi, M. M. Islam, and J. Said, “Impacts of COVID-19 pandemic on national security issues: Indonesia as a case study,” Secur. J., pp. 1–20, 2021.
F. Cloramidine and M. Badaruddin, “Mengukur Keamanan Siber Indonesia Melalui Indikator Pilar Kerjasama Dalam Global Cybersecurity Index (GCI),” Popul. J. Sos. dan Hum., vol. 8, no. 1, pp. 57–73, 2023.
T. H. Fadillah, “E-Commerce: A New Media that Creates New Disasters,” 2023.
A. Uksan, P. Widodo, and H. Saragi, “The Role of The Kopassus 81 Unit in Dealing With Cyber Terrorism: A Conflict Resolution Effort in Indonesia,” Int. J. Soc. Sci., vol. 2, no. 6, pp. 2351–2356, 2023.
S. Bera, L. Glenn, A. Raghavan, E. Meno, T. Cody, and P. A. Beling, “Deterring Adversarial Learning in Penetration Testing by Exploiting Domain Adaptation Theory,” in 2023 Systems and Information Engineering Design Symposium (SIEDS), IEEE, 2023, pp. 314–318.
A. Rathee, P. Malik, and M. K. Parida, “Network Intrusion Detection System using Deep Learning Techniques,” in 2023 International Conference on Communication, Circuits, and Systems (IC3S), IEEE, 2023, pp. 1–6.
P. Sharma and B. Dash, “Impact of big data analytics and ChatGPT on cybersecurity,” in 2023 4th International Conference on Computing and Communication Systems (I3CS), IEEE, 2023, pp. 1–6.
E. Drozda, “Conclusion—Final Contributions to a Research Agenda on Social Threats,” Soc. Under Threat A Pluri-Disciplinary Approach, vol. 3, p. 217, 2020.
K. Amorosa and B. Yankson, “Human Error-A Critical Contributing Factor to the Rise in Data Breaches: A Case Study of Higher Education,” HOLISTICA–Journal Bus. Public Adm., vol. 14, no. 1, pp. 110–132, 2023.
K. Kannelønning and S. K. Katsikas, “A systematic literature review of how cybersecurity-related behavior has been assessed,” Inf. Comput. Secur., 2023.
N. H. Al-Kumaim and S. K. Alshamsi, “Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership,” Appl. Sci., vol. 13, no. 10, p. 5839, 2023.
G. Kassar, “Exploring Cybersecurity Awareness and Resilience of SMEs amid the Sudden Shift to Remote Work during the Coronavirus Pandemic: A Pilot Study,” in ARPHA Conference Abstracts, Pensoft Publishers, 2023, p. e107358.
M. Nkongolo and M. Tokmak, “Zero-day threats detection for critical infrastructures,” arXiv Prepr. arXiv2306.06366, 2023.
S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity challenges in blockchain technology: A scoping review,” Hum. Behav. Emerg. Technol., vol. 2022, pp. 1–11, 2022.
I. D. Sánchez-García, J. Mejía, and T. San Feliu Gilabert, “Cybersecurity Risk Assessment: A Systematic Mapping Review, Proposal, and Validation,” Appl. Sci., vol. 13, no. 1, p. 395, 2022.
J. Crotty and E. Daniel, “Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment,” Appl. Comput. Informatics, no. ahead-of-print, 2022.
M. Angelelli, S. Arima, C. Catalano, and E. Ciavolino, “Cyber-risk Perception and Prioritization for Decision-Making and Threat Intelligence,” arXiv Prepr. arXiv2302.08348, 2023.
A. A. Latiffi, S. Mohd, N. Kasim, and M. S. Fathi, “Building information modeling (BIM) application in Malaysian construction industry,” Int. J. Constr. Eng. Manag., vol. 2, no. 4A, pp. 1–6, 2013.
A. Ghosh, “Robustness concerns in high-dimensional data analyses and potential solutions,” in Big Data Analytics in Chemoinformatics and Bioinformatics, Elsevier, 2023, pp. 37–60.
A. Azade, R. Saini, and D. Naik, “Visual Question Answering Using Convolutional and Recurrent Neural Networks,” in International Conference on Machine Intelligence and Signal Processing, Springer, 2022, pp. 23–33.
Y. Haji-Othman and M. S. S. Yusuff, “Assessing reliability and validity of attitude construct using partial least squares structural equation modeling (PLS-SEM),” Int. J. Acad. Res. Bus. Soc. Sci., vol. 12, no. 5, pp. 378–385, 2022.
C. M. Davis, J. E. Tate, and T. J. Overbye, “Wide area phasor data visualization,” in 2007 39th North American Power Symposium, IEEE, 2007, pp. 246–252.
T. Gebel, E. Lechtenberg-Auffarth, and C. Guhe, “About hazard and risk assessment: Regulatory approaches in assessing safety in the European Union chemicals legislation,” Reprod. Toxicol., vol. 28, no. 2, pp. 188–195, 2009.
M. Portalatin, O. Keskin, S. Malneedi, O. Raza, and U. Tatar, “Data Analytics for Cyber Risk Analysis Utilizing Cyber Incident Datasets,” in 2021 Systems and Information Engineering Design Symposium (SIEDS), IEEE, 2021, pp. 1–6.
H. Kure and S. Islam, “Cyber threat intelligence for improving cybersecurity and risk management in critical infrastructure,” J. Univers. Comput. Sci., vol. 25, no. 11, pp. 1478–1502, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Loso Judijanto, Wily Mohammad, Etika Purnamasari, Hanifah Nurul Muthmainah
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.