Published: 2025-08-01
User Trust, Security, and Data Privacy Awareness in GoPay Usage Using Protection Motivation Theory (PMT)
DOI: 10.35870/ijsecs.v5i2.4518
Diva Ayu Gitareswara, Tri Suratno, Dewi Lestari
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
The widespread adoption of GoPay in Indonesia has raised significant questions about user data privacy and security, dimensions frequently overlooked by traditional utility-focused adoption models such as TAM and UTAUT. This research addresses that gap by applying Protection Motivation Theory (PMT) to examine the psychological drivers behind GoPay usage intention. Through a quantitative national survey of 105 active users analyzed via PLS-SEM, the model explained 69.3% of variance in behavioral intention (R²=0.693). Results show that privacy concern, perceived severity, perceived vulnerability, response cost, response efficacy, and trust significantly and positively influence usage intention. In contrast, security features and user self-efficacy were not significant drivers. The findings demonstrate that users' behavioral intentions are more strongly influenced by their evaluation of potential threats and confidence in the service provider's protective capabilities rather than technical security features or personal competence alone. The study advances understanding of digital payment adoption by revealing that psychological threat assessment processes, rather than technical security perceptions, primarily drive user decisions. GoPay users prioritize the platform's ability to protect them over their own technical skills or general security features. These findings offer practical implications for digital wallet providers seeking to enhance user adoption through targeted trust-building strategies rather than solely focusing on technical security improvements.
Keywords
GoPay ; Protection Motivation Theory ; Behavioral Intention
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 5 No. 2 (2025)
-
Section: Articles
-
Published: %750 %e, %2025
-
License: CC BY 4.0
-
Copyright: © 2025 Authors
-
DOI: 10.35870/ijsecs.v5i2.4518
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
Diva Ayu Gitareswara
Information Systems Study Program, Faculty of Science and Technology, Universitas Jambi, Muaro Jambi Regency, Jambi Province, Indonesia
Tri Suratno
Information Systems Study Program, Faculty of Science and Technology, Universitas Jambi, Muaro Jambi Regency, Jambi Province, Indonesia
-
Annisa, & Munas Dwiyanto, B. (2021). Analisis pengaruh kualitas layanan dan kepercayaan terhadap loyalitas pelanggan dengan kepuasan pelanggan sebagai variabel mediator (Studi pada pengguna jasa PT. Pos Indonesia di Semarang). Diponegoro Journal of Management, 10(3), 1–12. http://ejournal-s1.undip.ac.id/index.php/dbr
-
Delima Sari, S. (2023). Privasi dan keamanan data dalam statistik resmi: Tantangan dan solusi dalam perlindungan data individu. Jurnal Ilmiah Multidisipline, 1(11), 700–703. https://doi.org/10.5281/zenodo.10371661
-
Fitriawibowo, W. A., & Kusumawati, E. (2024). Minat penggunaan sistem pembayaran Shopeepay sebagai dompet digital. INNOVATIVE: Journal of Social Science Research, 4(2807–4238), 4710–4719. https://j-innovative.org/index.php/Innovative
-
Garland, R. (1991). The mid-point on a rating scale: Is it desirable? Marketing Bulletin, 2, 66–70. http://marketing-bulletin.massey.ac.nz/V2/MB_V2_N3_Garland.pdf
-
Gatot Efrianto, & Nia Tresnawaty. (2021). Pengaruh privasi, keamanan, kepercayaan dan pengalaman terhadap penggunaan fintech di kalangan masyarakat Kabupaten Tangerang Banten. Jurnal Liabilitas, 6(1), 53–72. https://doi.org/10.54964/liabilitas.v6i1.71
-
-
-
-
-
-
Kumala, M. (2020). Peran dompet digital dalam meningkatkan kualitas keuangan UMKM menuju era Society 5.0. JPM: Jurnal Pengabdian Masyarakat, 4(1), 26–34. https://doi.org/10.47065/jpm.v4i1.859
-
Liani, A. M., & Yusuf, A. (2021). Pengaruh e-trust terhadap e-loyalty dimediasi oleh e-satisfaction pada pengguna dompet digital GoPay. YUME: Journal of Management, 4(1), 138–149. https://doi.org/10.37531/yume.vxix.445
-
Marikyan, D., & Papagiannidis, S. (2023). Protection motivation theory: A review. In S. Papagiannidis (Ed.), TheoryHub book: This handbook is based on the online theory resource: TheoryHub (pp. 78-93). https://open.ncl.ac.uk/theory-library/TheoryHubBook.pdf
-
Nowlis, S. M., Kahn, B. E., & Dhar, R. (2002). Coping with ambivalence: The effect of removing a neutral option on consumer attitude and preference judgments. Journal of Consumer Research, 29(3), 319–334. https://doi.org/10.1086/344431
-
Prasetyo, A., & Wardhani, A. M. N. (2022). Analisis pengaruh perceived risk dan trust terhadap pengujian behavioral intention mahasiswa pengguna GoPay. EXERO: Journal of Research in Business and Economics, 5(1), 36–63. https://doi.org/10.24071/exero.v5i1.5038
-
-
Sukmawati, K., & Kowanda, D. (2022). Keputusan penggunaan e-wallet GoPay berdasarkan pengaruh keamanan, persepsi kemudahan dan persepsi manfaat. Jurnal Ilmiah Multidisiplin, 1(05), 66–72. https://doi.org/10.56127/jukim.v1i05.481
-
-

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing Agreement
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
- Authors retain full copyright of their work
- Authors grant the journal right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0)
- This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.