Pengaruh Perceived Security terhadap Pengadopsian In-App Purchase pada Aplikasi Mobile

Yhony Agus Setya Mahendra, Wing Wahyu Winarno, P. Insap Santosa


In-App Purchase or payment system based on application is one of promising revenue model in mobile application for application developers or marketers. However, in-app purchase is placed in the lowest rate compared to other model. This paper attempts to present the analysis of in-app purchase adoption viewed from the user behavior of mobile application as consumers. This study is conducted by combining the unified theory of acceptance and use of technology approach that was developed (UTAUT2) with involving perceived security aspect. The result shows that the habit of potential users, information security assurance, and hedonic motivations of potential users are the main supporting factors in adopting in-app purchase. Those factors can be admitted as a reference in developing mobile application, in order to make in-app purchase can be accepted and used by potential users of mobile application.


in-app purchase; UTAUT2; perceived security; partial least squares

Full Text:



P. Roma and D. Ragaglia, “Revenue models, in-app purchase, and the app performance: Evidence from Apple’s App Store and Google Play,” Electron. Commer. Res. Appl., 2016.

A. S. Jati, “Pendapatan Aplikasi Mobile di Indonesia akan Sentuh Rp 1,8 Triliun,” Detikom, 2016. [Online]. Available: [Accessed: 10-Aug-2016].

GfK Indonesia, “Mobile Apps Market Study Indonesia: Final Reports,” Baidu Indonesia, 2015. [Online]. Available: [Accessed: 10-Aug-2016].

W. Mitra, “Mengenal Ekosistem Mobile Untuk Membuat Aplikasi Bersama @iTrainIndonesia,”, 2014. [Online]. Available: [Accessed: 20-Sep-2016].

C. Z. Liu, Y. A. Au, and H. S. Choi, “AN EMPIRICAL STUDY OF THE FREEMIUMSTRATEGY FOR MOBILE APPS: EVIDENCE FROM THE GOOGLE PLAY MARKET,” in Thirty Third International Conference on Information Systems (Economics and Value of IS), 2012, vol. 33.

“Google Gencarkan Pendekatan pada Pengembang Lokal,”, 2015. [Online]. Available: [Accessed: 29-Dec-2016].

D. Cho, “What Influences People to Purchase InGame Mobile Items?: Analysis of Motivational Drivers to Use InGame Mobile Game items in The US,” Michigan State University, 2015.

K.-L. Hsiao and C.-C. Chen, “What Drives In-App Purchase Intention for Mobile Games? An Examination of Perceived Values and Loyalty,” Electron. Commer. Res. Appl., vol. 16, pp. 18–29, 2016.

V. Venkatesh, J. Y. L. Thong, and X. Xu, “Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology,” MIS Q., vol. 36, no. 1, pp. 157–178, 2012.

D.-H. Shin, “Towards an understanding of the consumer acceptance of mobile wallet,” Comput. Human Behav., vol. 25, no. 6, pp. 1343–1354, Nov. 2009.

J. Arenas-Gaitán, B. Peral-Peral, and M. A. Ramón-Jerónimo, “Elderly and Internet Banking: An Application of UTAUT2,” J. Internet Bank. Commer., vol. 20, no. 1, 2015.

Junadi and Sfenrianto, “A Model of Factors Influencing Consumer’s Intention To Use E-Payment System in Indonesia,” Procedia Comput. Sci., vol. 59, pp. 214–220, 2015.

M. Sareen, “Influence of Demographic Profile on Perceived Security and level of adoption of Internet Banking in a developing country: An Empirical Study,” Int. J. Emerg. Trends Technol. Comput. Sci., vol. 4, no. 5, pp. 16–22, 2015.

E. Keisidou, L. Sarigiannidis, and D. Maditinos, “Consumer characteristics and their effect on accepting online shopping, in the context of different product types,” Int. J. Bus. Sci. Appl. Manag., vol. 6, no. 2, pp. 31–51, 2011.

iOS Developer Program, “In-App Purchase for Developers,” 2014. [Online]. Available: [Accessed: 20-Dec-2016].

Google, “In-app Billing | Android Developers,” 2015. [Online]. Available: [Accessed: 20-Dec-2016].

Microsoft, “In-app purchase for Windows Phone 8,” 2015. [Online]. Available: [Accessed: 20-Dec-2016].

Investopedia, “In-App Purchasing,”, 2014. [Online]. Available: [Accessed: 02-Nov-2016].

F. Nugraha and P. S. Utama, “Memahami In-App Purchase,”, 2013. [Online]. Available: [Accessed: 20-Sep-2016].

M. Ally and M. Toleman, “A Framework for Assessing Payment Security Mechanisms and Security Information on e-Commerce Web Sites,” in Pacific Asia Conference on Information Systems, 2005, pp. 1216–1231.

Google, “Security and Design | Android Developers,” 2015. [Online]. Available: [Accessed: 20-Dec-2016].

V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User Acceptance of Information Technology: Toward a Unified View,” MIS Q., vol. 27, no. 3, pp. 425–478, 2003.

M. A. G. Elmursyidi, “Pengaruh Brand Attachment Terhadap Perilaku Pengguna Smartphone,” Universitas Gajah Mada, 2015.

Indrawati and K. S. Haryoto, “The Use of Modified Theory of Acceptance and Use Of Technology 2 to Predict Prospective Users’ Intention in Adopting TV Streaming,” in Proceedings of the 5th International Conference on Computing and Informatics, ICOCI 2015, 2015, pp. 206–215.

S. A. Brown and V. Venkatesh, “Model of Adoption of Technology in the Household: A Baseline Model Test and Extension Incorporating Household Life Cycle,” MIS Q., vol. 29, no. 3, pp. 399–426, 2005.

M. D. Williams, N. P. Rana, and Y. K. Dwivedi, “A Bibliometric Analysis of Articles Citing the Unified Theory of Acceptance and Use of Technology,” in Information Systems Theory: Explaining and Predicting Our Digital Society, Integrated., Y. K. Dwivedi, S. L. Schneberger, and M. R. Wade, Eds. Springer, 2012, pp. 37–59.

I. Arpaci, Y. Y. Cetin, and O. Turetken, “Impact of Perceived Security on Organizational Adoption of Smartphones,” Cyberpsychology, Behav. Soc. Netw., vol. 18, no. 10, pp. 602–608, 2015.

M. A. Harris, R. Brookshire, and A. G. Chin, “Identifying factors influencing consumers’ intent to install mobile applications,” Int. J. Inf. Manage., vol. 36, pp. 441–450, 2016.

B. Suh and I. Han, “The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce,” Int. J. Electron. Commer., vol. 7, no. 3, pp. 135–161, 2003.

L. Abdelnour, “In-App Purchases in iOS and security, pros and cons of downloading content vs unlocking content,”, 2016. [Online]. Available: 6/08/03/in-app-purchases-in-ios-and-security-pros-and-cons-of-downloading-content-vs-unlocking-content. [Accessed: 02-Nov-2016].

Jogiyanto, Konsep dan Aplikasi Structural Equation Modeling (SEM) Berbasis Varian dalam Penelitian Bisnis, 1st ed. Yogyakarta: UPP STIM YKPN, 2011.

J. F. Hair, W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate Data Analysis, 7th ed. New York: Pearson Prentice Hall, 2010.

J. F. Hair, G. T. M. Hult, C. M. Ringle, and M. Sarstedt, A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Los Angeles: SAGE Publications, Inc., 2014.

J. Bradley, “If We Build It They Will Come? The Technology Acceptance Model,” in Information Systems Theory: Explaining and Predicting Our Digital Society, 1st ed., Y. K. Dwivedi, S. L. Schneberger, and M. R. Wade, Eds. New York, NY, USA: Springer New York Dordrecht Heidelberg London, 2012, pp. 19–36.

J. F. Hair, C. M. Ringle, and M. Sarstedt, “PLS-SEM: Indeed a silver bullet,” J. Mark. Theory Pract., vol. 19, pp. 139–151, 2011.

T. T. C. Lin, F. Paragas, and J. R. Bautista, “Determinants of mobile consumers’ perceived value of location-based advertising and user responses,” Int. J. Mob. Commun., 2014.

J.-J. Hew, V.-H. Lee, K.-B. Ooi, and J. Wei, “What catalyses mobile apps usage intention: an empirical analysis,” Ind. Manag. Data Syst., vol. 115, no. 7, pp. 1269–1291, 2015.

H. W. Kim, A. Kankanhalli, and H. L. Lee, “Investigating decision factors in mobile application purchase: A mixed-methods approach,” Inf. Manag., 2014.

C.-L. Hsu and J. C.-C. Lin, “Effect of perceived value and social influences on mobile app stickiness and in-app purchase intention,” Technol. Forecast. Soc. Change, vol. 108, pp. 42–53, 2016.

M. Limayem and C. M. K. Cheung, “Predicting the continued use of Internet-based learning technologies: the role of habit,” Behav. Inf. Technol., vol. 30, no. 1, pp. 91–99, Jan. 2011.

D. H. Shin, “The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption,” Interact. Comput., vol. 22, no. 5, pp. 428–438, 2010.

D. L. Amoroso and R. Magnier-Watanabe, “Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan,” J. Theor. Appl. Electron. Commer. Res., vol. 7, no. 1, pp. 94–110, 2012.

K.-H. Shin and C. Y. Lee, “A Study on Behavioral Intention of Sharp (#) Mail Potential Users Focused on Non-Repudiation Function,” Int. J. Secur. Its Appl., vol. 8, no. 4, pp. 341–352, 2014.

C. W. Dawson, Projects in Computing and Information Systems: A Student’s Guide, 2nd ed. Pearson Education Limited, 2009.

C. R. Kothari, Research Methodology: Methods and Techniques, 2nd ed. New Delhi: New Age International (P) Ltd., Publishers, 2004.

S. Guritno, Sudaryono, and U. Rahardja, Theory and Application of IT Research: Metodologi Penelitian Teknologi Informasi. Yogyakarta: Penerbit ANDI, 2011.

Jogiyanto, Metodologi Penelitian Sistem Informasi: Pedoman dan Contoh Melakukan Penelitian di Bidang Sistem Teknologi Informasi. Yogyakarta: Penerbit ANDI, 2008.

P. I. Santosa, Petunjuk Pengopoperasian SmartPLS. Yogyakarta: (Unpublished), 2012.

V. Venkatesh and M. G. Morris, “Why Don’t Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior,” Gend. Technol. Accept. Usage, MIS Q., vol. 24, no. 1, pp. 115–139, 2000.



  • There are currently no refbacks.

Copyright (c) 2017 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)

JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)

Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305