Therefore, the research group has decided to carry out the research topic "Factors affecting the intention to use the digital identification application among Ho Chi Minh City students."
Trang 1UEH
UNIVERSITY
FINAL PROJECT SUBJECT: Applied Statistics for Business & Economics TOPIC: FACTORS AFFECTING THE INTENTION TO USE THE DIGITAL IDENTIFICATION APPLICATION - VNeID AMONG HO CHI MINH CITY STUDENTS
Group members: Bui Hoang Nam - 31231024207
Phan Thị Minh Ngọc - 31231027158
Đoàn Hữu Đức - 31231020096 Pham Song Gia Binh - 31231023726
Trang 2STATEMENT OF ORIGINALITY
At this moment, we declare that this research paper is the orginal work of our research group All data and results presented in this paper are authentic and have a clear source The findings presented in this paper have not been published in any other research paper
ADO gg
Vietnam is no exception in a time when digital technologies are rapidly
transforming society The government has been actively promoting digital identification
in recent years VNeID 1s a national digital identification platform launched by the Vietnamese government to provide a secure and convenient way for citizens to access various online services However, currently, a sizable number of people still do not like
or limit the use of VNeID To understand the reasons that affect how often students use VNelID, specifically in Ho Chi Minh City, the critical economic region of our country, and at the same time, through collected data, offer aid for developers and policymakers in the successful implementation and widespread adoption of digital identification technologies On top of that, the implications can assist future research and expand knowledge in the field of technology adoption and user behavior Therefore, the research group has decided to carry out the research topic "Factors affecting the intention to use the digital identification application among Ho Chi Minh City students."
The research analyzes factors affecting the Intention to use the digital
identification application, including Performance expectancy, Social influence, Service quality, Perceived risk, and Facilitating conditions
The research group collected 164 valid responses and checked the reliability of the scales using Cronbach's Alpha, exploratory factor analysis (EFA), and confirmatory factor analysis (CFA) using SPSS software The study found that Performance
expectancy has the most substantial impact on the Intention to use VNeID among students in Ho Chi Minh City Other factors, such as Social influence, Service quality,
1
Trang 3and Facilitating conditions, are also influential
Based on the study's results, recommendations for enhancing the Intention to use the VNeID application are enhancing the adoption of VNeID, improving usability, addressing security concerns, promoting benefits, and monitoring user experiences
CHAPTER 1: TOPIC INTRODUCTION 1.1 Rationale
The digital transformation of the world is a remarkable achievement Digital transformation is the process of changing individuals’ and organizations’ lifestyles, work, and production methods in a comprehensive way using digital technology
An application of digital transformation in today's world is the introduction of digital identity (digSital-ID) Digital ID refers to the compiled information presenting a person
or an organization It is a form of identity authentication via digital media and technology
in a digital environment It facilitates people's access to their online information and the use of services provided by organizations and the government through the mediation- computer system Until now, many countries have used digital identification applications
to administer their citizens, such as Estomia's pioneering chip-embedded electronic identification cards (e-ID), China's e-wallet Alipay, and many others According to Juniper Research, as many as 3 billion citizens worldwide will be equipped with a government-initiated mobile [ID app by 2024 (Parking Today Media, November 2020) The Internet, which has dominated our world by enabling people to lead a more convenient and fulfilling life, is an essential element of this digital transformation In light of that fact, Vietnam is in a favorable condition to launch a digital transformation campaign As Minh-Ngoc Nguyen (July 19, 2022), a researcher for the Southeast Asian region, stated, "Vietnam is among the countries with the most internet users in the Asia Pacific region In 2021, out of its population of over 96 million people, internet users reached approximately 69 million Internet usage in Vietnam is predominantly mobile-
2
Trang 4based, thanks to the high smartphone penetration rate Internet use has become a daily habit among many Vietnamese people, with multiple purposes including work, study, entertainment, and more”
Based on this foundation, in addition to the National Population Database and Citizen Identification Database system, the Ministry of Public Security has built Vietnam's electronic identification (VNeID) and put the system into operation starting July 18,
2022 VNeID is an application designed to assist people in keeping track of their personal information by the government and offers a wide range of services, including:
1 Using electronic personal documents instead of traditional paper ones reduces the paperwork needed to carry out administrative transactions
2 Health declaration: Vietnamese citizens can easily declare medical information anywhere, as long as there is an internet connection This makes tracing FO, F1, and F2 patients easier and limits the outbreak of Covid-19
3 Stay informed: Through the VNeID application, the stay notification procedure
is done quickly on the phone
4 Report on public order: Citizens can promptly and quickly report security and order violations to the Police through the VNeID application
Moreover, VNeID is oriented to become a super application that integrates additional functions such as E-wallet, non-cash payment, securities, etc
"Vietnam is one of the earliest countries to apply digital identification and universalize digital identity Accurate identification of individuals and organizations in the digital environment is a strong digital transformation step im implementing administrative procedures, public services, e-commerce, and service business platforms, contributing to successfully transforming the country's implementation", Colonel Vu Van Tan affirmed
However, only a minor percentage of the population frequently uses the application despite the benefits and wide dissemination by the government As of August 31, 2022,
3
Trang 5the total number of users is estimated to have reached 5.78 million, a modest number that accounts for only 6% of the total population According to a report by Airports Corporation of Vietnam (ACV) and Van Don Airport (July 2023), the average rate of passengers using VNeID accounts to fly from June to July 2023 is only 0.64%
For those reasons, the awareness of what factors affect the intention to use the VNeID application among students in Ho Chi Minh City could help the local authorities to propose effective strategies to better respond to the needs of its citizens in general and students in particular, then increase the level of satisfaction and prompt the use of VNeID That is why our group chose the research topic: "FACTORS AFFECTING THE INTENTION TO USE THE DIGITAL IDENTIFICATION APPLICATION - VNeID AMONG HO CHI MINH CITY STUDENTS."
Based on the objectives, research questions have been formulated by our group:
«" What factors affect the intention to use the digital identification application (VNeID) among Ho Chi Minh City students?
" To what extent do those factors influence the research subject? Moreover, what is the most/least influencing factor?
« What solutions can effectively influence the students’ intention to use VNeID? 1.4 Research methods
Trang 6=" Qualitative research method:
The research group built a preliminary scale by referencing background models and previous research on similar topics Afterward, to be more comprehensive about the practicality of the topic, we had direct discussions with other students and our instructors Based on that, some adjustments were made to complete the questionnaire for our quantitative research
=" Quantitative research method:
Our team collected data on influencing factors through 194 survey responses from students from various universities and colleges in Ho Chi Minh City Those submitted forms are then appropriately selected to serve the research’s synthesis, analysis, descriptive statistics, and deduction to evaluate the hypothesized factors In this framework, we could offer appropriate recommendations for the local authorities to increase students’ application use frequency
1.5 Research subject and scope of research
The research subject of the project is the factors affecting the intention to regularly use the digital identification application VNeID of students in Ho Chi Minh City Scope of research: The scope of research is limited to students of various local universities in Ho Chi Minh City, most of whom are students of the University of Economics in Ho Chi Minh City The research was conducted through an online questionnaire sent to students from several Ho Chi Minh City universities The surveying period lasted two months, from October 2023 to December 2023, and ended after the research reached the sample size of 209 respondents
1.6 Contribution of the research
= In theoretical aspect:
The research utilizes sources of scholarly information concerning the topic Specifically, the research employed the Unified Theory of Acceptance and Use of
5
Trang 7Technology (UTAUT) and Theory of Planned Behaviour (TPB), proclaiming the applicability of those theories in practical research
= In practical aspect:
This research outcome is expected to interpret how some factors have affected the intention to use the digital identification application (VNeID) among Ho Chi Minh City students Moreover, based on that, it is possible to deduce a comprehensive understanding of the use of this application throughout Vietnam
With a relative understanding of constraints preventing citizens from using VNelID, its provider and the government would have some recommendations to improve users’ experience Furthermore, based on positive influencing factors drawn from the research, they could develop progressive amenities to enhance users' trust and increase the intention to use
1.7 Development direction of the topic
With limited research time and resources, our team has strived to complete the research and overcome any shortcomings as best as we could However, like many other studies that have come before, the research inevitably has some limitations Because of such constraints, we have proposed some suggestions for future research as follows:
" The survey should be conducted with a larger sample size to produce more comprehensive and accurate results
«" The survey should be conducted at a larger scale at many universities in other provinces and cities, especially in places considered to be economic development centers such as Hanoi, Da Nang.,
" Future studies should be more precise and develop more complete models
Trang 8TABLE OE CONTENTS Content
S
STATEMENT OF ORIGINALTTY - Q Q11 1110100110231 11H TC cv 1 1): 02 00 1 ÐĐš/.)95):019)4108069.49)910i95.9) 11 H AI 2 1.1 si) 2
12 600) 1 4 M.U 4
IS on e 4 cua e 4 1.5 Research subJect and scope ofresearch c1 2121221211101 12115511011 11 1111101111101 1120111 8k 2xx rry 5
I X9 ao 5 1.7 Development direction of the †OpIC - Q1 0221212121211 151 1221551111121 2511110112511 1 11 115111 sưa 6
IV ):)0019)0069)000) 661“ .a 7 LIST OF TABLES 2 ccccccececcceeeeceecceeeeeeeceeeeceeeeecaeeeeeeeeeceeeecaaaaeaaaaaeeeeeeceeeeeeeeeeeeeeeeeaaeeeeaeeeeessees 9 I3 9)000:6000.45 1111 4 ::›OOÔÔÔỒÔÔ 10 I3 9)00.9)5).4047.0019) 61155 ad 10 CHAPTER 2: THEORETICAL BASTS - Q QQQ Q22 2 SH SSS HH1 11235 1c cọ TH cv cEE 11 2.1 The definition of diptfal identification appÌICafIOH - 0 2 221211221221 2211221 5512011122811 1H re 11 2.2 The reality of using digital identification applications i Viet Nam cece eteeeeneeeeeeneenes 12 2.3 Theoretical basis relating †o users” beliaVIOT - c1 2122112112212 1 1511221111111 211 2111112111011 re 13
VI C22242 ng 0/6 0n 6 ee 13 2.3.2 Unified Theory of Acceptance and Use of TechnologV (1T) àà «+ xxx xxx seeeeexxe 14 2.3.3 Theory of Planned Behaviour (TPB) .csscccccccceceecceeeeceeeeeeeeee cette E 15 2.4 Previous on e 16 2.5 Proposed research model and hypotheses -.- 0 2 2012211211221 2 21121122112 11112121 111112812 1 re 20
Trang 9VN 18, an gen e 20
2.5.2 Social .nốneốeẶ.Ặ4 20
PP nan ốằ 20
2.5.4 Perceived s5 nan .eS- ố Ắ 21
VN 2 0 0n nan e<e 21
2.5.6 Proposed reseqFCh IO(ÍGÏL Sa xnxx TT TT cọ Thìn TH 22 057 1499)058:47.)97.)4050 11095/90 0 — 23
ENN:C.- 0i n c(4daaá 23
KSI Cô 23
3.3 Sample 5 - 24
3.4 Sampling technIqUe - 1 21211121221 121 1121251101 1211 5211011012101 1 201211011 11111111 11 01K TH TH Hrkt 25 E0) e.- Ả 25
3.6 Scales OÝ m€aSUT€THTI LH nh H HH TH HT HT TH TH TH HT TT TH Tiết 25 KP co na 28
KP 1 nan .e 28
3.7.2 Evaluating scql© r€liABiÏIRW ào cc cu ng xo TT TT TT cv 29 3.7.3 EEA factor ANGLYSIS nee 29
3.7.4 Multivariate regression ANLYVSIS 2c ee 30
E08 0/0 x00 ea 30
057.1499):6G 08:47) 4050.4710011 5 — 30
NI) oi nh hee 30
“AI cac a ens 32 4.2.1 Testing scale reliability with Cronbach AlDÌA c«ccc nh tt nh nh ve 32 4.2.2 Testing scale validity with Exploratory Factor ẢHQÌV$Í ch nen 36 4.3 Evaluating the research model using Multiple repression analySIs ó2 2n 40 4.4 Testing the hypothesis of the multiple repression modelÌ - - c c2 2232213512211 21 xe re 43
Trang 10J1 000 ẻnn.eốốốẶố 4.4.2 Assumptlon of No serial correlation (DMFBbIH-ÏÏfGÍSOHI) an nen ch nen 4.4.3 Assumption of Normally distributed residuals (Kolmogorov Smirnov/Shapiro fesl) 4.4.4 Assumption of No multicollinearity: VIP Lo ccccccccccccccceeeeeceeeeeeeeen cece eeneeaeeeeceeeeeeeeeeaeenteeees
` Ä 0:/.1405):0®9)i001915190)02155 5.1 ContrIbufIOWS c2 20222112 21121 121112 1121112111101 2511111111111 01 1191111111111 1 115 H11 Tkk TH nHxk nc ưu 5.2 Recommedations
b6 nh ro in 2/2000 TT n 3.3 LHÍIGÍOHẨ QQQ TQ Q TT HT TH TH nọ xo TC TT KH kh cv S8 8ˆ )0 5n ee
;38840)10527177
LIST OF TABLES Table 1.1 Previous researches’ review
Table 1.2 Accepted variables of previous researches
Table 3 Descriptive statistics for gender
Table 4 Descriptive statistics for universities
Table 5 Descriptive statistics for VNeID installation
Table 6: Results of Cronbach's Alpha coefficient analysis
Table 7 EFA of independent variables
Table 8 Result of Regression Analysis
Table 9 Hypotheses Acceptance
Trang 11LIST OF FIGURES Figure 1 Technology Acceptance Model (TAM)
Figure 2 Unified Theory of Acceptance and Use of Technology Model (UTAUT) Figure 3 Theory of Planned Behaviour (TPB)
Figure 4 Research model
Figure 5 Research Process
Figure 6 A Scatterplot of Regression Standardized Residual
Figure 7 A histogram of Standardized Regression
Figure 8 P-P Plot graph
Figure 9 Research results
LIST OF ABBREVIATIONS PE: Performance Expectancy
SE: Social Influence
SQ: Service Quality
PR: Perceived Risk
FC: Facilitating Conditions
IU: Intention to Use
TAM: Technology Adoption Method
UTAUT: Unified Theory of Acceptance and Use of Technology
TPB: Theory of planned behavior
EFA: Exploratory Factor Analysis Anova: Analysis of Variance
Sig: Observed Significance level KMO: Kaiser — Meyer — Olkin
10
Trang 12VIF: Variance inflation factor
SPSS: Statistical Package for the Social Science
CHAPTER 2: THEORETICAL BASIS 2.1 The definition of digital identification application
A digital identification application is a mobile app or software that allows users to create, store, manage, and authenticate their digital identities It typically involves using digital credentials, such as usernames, passwords, or digital certificates, to verify the identity of a user online and offline and grant them access to online services and resources, such as government services, banking, and healthcare
In other words, a digital identification application is used as a substitute for physical documents, identifying citizens in a digital environment and providing utilities for developing digital citizenship, digital government, and digital society
A digital identification application is recognized for its convenience, authenticity, and efficiency There are two main types of digital identification applications:
" Self-sovereign identity applications give users complete control over their identities Users can create their own identities and store them on their own devices They can also choose which information they want to share with others
" A trusted organization, such as a government or a bank, manages federated identity applications Users can create their identities on these applications, but the organization controls them Users may have less control over their identities, but the organization can ensure they are secure and accurate
The intention to use identification applications among HCMC students depends on the application's compatibility, flexibility, and interactive functions through electronic devices
11
Trang 13It can be described that the intention to use identification applications among HCMC students depends on the compatibility, flexibility, and interactive functions of the application through electronic devices
2.2 The reality of using digital identification applications in Viet Nam
The number of Vietnamese people using digital identification applications has been increasing significantly in recent years, and users are benefiting from the variety of functions this form provides
The Vietnamese government has been actively promoting the use of digital identification applications in recent years In 2020, the government launched the National Digital Transformation Program to make Vietnam a digitally-enabled nation by 2030 One of the critical goals of the program is to increase the use of digital identification applications to 70% of the population by 2025
The increasing popularity of smartphones is also driving the growth of digital identification applications in Vietnam According to Statista, there were over 76 million smartphone users in Vietnam in 2023 This number is expected to grow to over 86 million by 2025 The widespread adoption of smartphones makes it easier for people to access and use digital identification applications
The growing demand for online services also drives the growth of digital identification applications in Vietnam More and more people are using online services to access government services, make payments, and shop online Digital identification applications are essential for accessing these services securely and conveniently
A report by the Ministry of Information and Communications of Vietnam found that as of October 2023, over 65 million people were using digital identification applications in Vietnam The report also found that the number of digital identification application users is expected to grow to over 80 million by 2025
As of March 3, 2022, 85% of Vietnamese internet users have a digital
12
Trang 14identification application The Vietnam Internet Association survey also found that the use of digital identification applications is proliferating, with the number of users increasing by 20% in the past year and expected to increase in the future
A report by the World Bank found that the adoption of digital identification applications in Vietnam is one of the highest in the world
The most popular digital identification application in Vietnam is VNeID VNeID can access government services, make payments, and shop online As of October 2023, Vietnam has over 50 million VNeID users
Overall, using digital identification in Vietnam is a positive development Digital identification can make it easier for people to access services, reduce fraud, and improve security However, it is essential to address the challenges of digital identification, such
as privacy concerns and the digital divide, to ensure that digital identification is used responsibly and equitably
2.3 Theoretical basis relating to users’ behavior
2.3.1 Technology Acceptance Model (TAM)
The Technology Acceptance Model (TAM), introduced by Davis (1986), is one of the most widely used models to explain user acceptance behavior This model is grounded in social psychology theory in general and the Theory of Reasoned Action (TRA) in particular (Fishbein, & Ajzen,1975) TRA asserts that beliefs influence attitudes, which lead to intentions and there-fore generate behavior
The model suggests three main categories of characteristics that influence consumers’ choices when they have access to new technology
Trang 15Figure 1 Technology Acceptance Model (TAM)
1 Attitude towards use: is the mindset around utilizing a system created by the reliability
in terms of perceived usefulness and perceived ease of use
" Aware extent of perceived usefulness: as the extent to which an individual believes that using a particular technology would be beneficial
" Aware extent of perceived ease of use: as the extent to which an individual believes that using a particular technology would be free from effort
2 Intention to use: The adoption of new technology by users is closely correlated with their willingness to utilize it
3 External variables: Variables that have an indirect impact on behavior, such as the personality traits of the user, the features of the system, and external objective factors
2.3.2 Unified Theory of Acceptance and Use of Technology (UTAUT)
The theoretical model of UTAUT suggests that the actual use of technology is determined by behavioral intention The perceived likelihood of adopting the technology
is dependent on the direct effect of four key constructs, namely performance expectancy, effort expectancy, social influence, and facilitating conditions The effect of predictors is moderated by age, gender, experience and voluntariness of use (Venkatesh et al., 2003)
14
Trang 16
Figure 2 Unified Theory of Acceptance and Use of Technology Model (UTAUT)
" Performance expectancy: refers to the degree to which an individual perceives that using a system will help in attaining a gain in job performance (Venkatesh et al, 2003)
« Effort expectancy: is the level of convenience and usability that people feel when using a specific information system ( Venkatesh et al., 2003 )
" Social influence: is defined as an individual feeling the importance that the others believe he or she should use the new system
" Facilitating conditions: the degree to which an individual believes that an organization's and technical infrastructure exists to support the use of the system" (Venkatesh et al., 2003)
2.3.3 Theory of Planned Behaviour (TPB)
The theory of planned behavior is a theory used to understand and predict behaviors, which posits that behaviors are immediately determined by behavioral
15
Trang 17intentions and under certain circumstances, perceived behavioral control Behavioral intentions are determined by a combination of three factors: attitudes toward the behavior, subjective norms, and perceived behavioral control
Figure 3 Theory of Planned Behaviour (TPB)
" Attitude: This refers to the degree to which a person has a favorable or unfavorable evaluation of the behavior of interest
" Subjective norms: This refers to the belief about whether most people approve or disapprove of the behavior It relates to a person's beliefs about whether peers and people of importance to the person think he or she should engage in the behavior
" Perceived behavioral control: refers to a person's perception of the ease or difficulty of performing the behavior of interest Percerved behavioral control varies across situations and actions, which results in a person having varying perceptions of behavioral control depending on the situation
2.4 Previous researches:
16
Trang 18
Factors Ali The study suggests a positive- The main objective of this study was to Affecting User | Alkhalifah | quantitative approach to explain | identify and empirically examine the factors Adoption of (2013) and predict a causal model and | affecting user adoption of IMS (Web-based Identity validate the results The research | identity management systems) This study Management instruments were developed and | suggests some important factors which Systems validated using pre-tests and affect users’ behavioral intention to adopt
pilot study The data collection | IdMS including usefulness, ease of use, was carried out using an online | task—technology fit, trusting beliefs, trust in survey method, with 332 the Internet, information disclosure, respondents from Facebook and _ | perceived risk and cost
LinkedIn users Data analyses were conducted under structural equation modelling using the partial least squares technique
The adoption | Ahmed This study adopted the Unified | The purpose of this study was to examine
of E- A.AI- Theory of Acceptance and Use _| the factors influencing the acceptance and government Imarah, of Technology (UTAUT) model | use of e-government services, specifically, Services in the | Ammar to explore factors that determine | to explore the important factor on the Iraqi Higher Zwain and | the adoption of e-government adoption of e-government services in Iraqi Education Prof Dr services in the Iraqi higher- higher education context by using UTAUT Context Laith Ali education context Quantitative | model The results reveal that performance
Yousif Al- | research in the form of a survey | expectancy and effort expectancy determine Hakim questionnaire was undertaken to | academic staff's behavioral intention (2013) meet the aim of the research In | Moreover, facilitating conditions and
the University of Kufa, 430 behavioral intentions determine academic academic staffs’ were surveyed | staff's use of e-government services using a modified version of the
explain their intention to use
technology Data were analyzed using structural equation modeling of the intention to use technology, while
perceived ease of use influenced intention to use technology through attitude towards computer use Computer self-efficacy and subjective norm acted as antecedents for perceived usefulness and attitude towards computer use, while facilitating conditions acted as antecedents for perceived ease of use and attitude towards computer use Together these constructs explained 54.7 %
17
Trang 19
and and 65 years The questionnaire | financial cost and age on acceptance of IoT- Younes received 268 responses based healthcare devices Based on 268
expectancy and effort expectancy are the key predictors positively influencing behavioral intention to use IoT for eHealth EGOSQ — Anand To develop the quality This study aims at finding the dimensions Users’ Agrawal instrumentation EGOSQ, a two- | and attributes which determine e-governance Assessment of | et al stage research was designed to | online-service quality (EGOSQ) from the e-Governance | (2007) The first stage was the perspective of users of such services
Online- qualitative research consisting of | (Citizens) as one of the major factors that Services focus groups and in-depth can influence the success of e-governance
interviews, the second stage initiatives depends on citizens’ awareness comprised of questionnaire level, acceptance level and hopes and fears survey The measurement scale | about the e-governance.A high quality of used for this study was online-service quality by government will developed by combining the ensure high acceptance level and fewer exploratory and the empirical fears
studies
Table 1.1 Previous researches’ review
Perfomance | Effort Social Service | Percetved | Facilitatin | Trust | Financial | Task - Expectancy | Expectanc | Influence | Quality | Risk 8 Cost Technology
Trang 20Table 1.2 Accepted variables of previous researches
Out of the nine variables that were accepted in earlier studies, five are used in our
project; four are dropped for the reasons listed below:
Effort expectancy is the level of convenience and usability that people feel when
using a specific information system ( Venkatesh et al., 2003 ) While VNeID is a digital
identification application that is mainly used to replace physical papers to identify
citizens in the digital environment and provide utilities for developing digital citizens,
digital government, and digital society, the users will not have to put much effort when
using the application so there is no need to analyze this variable because the result is
obvious
Financial cost the amount users must pay when using a specific thing FC is one of
the removed variables because users can easily download VNelID for free
Trust is the subjective probability that a person will perform an action that benefits
another person, even in the face of uncertainty and risk (Venkatesh et al., 2003) This
variable is abandoned because VNelID is the application created and developed by the
Ministry of Public Security, so trust-related issues are not a significant concern in the
19
Trang 21report
Task-technology fit is the extent to which users perceive that the technology can enable performance on specific tasks (Venkatesh et al., 2003) Since VNeID was explicitly created to carry out the functions of a digital identification application that fulfills users' demands, something other than TTF was chosen for the study
2.5 Proposed research model and hypotheses
2.5.1 Performance Expectancy
Performance expectancy (PE) is the degree to which an individual believes that using a system will help him or her attain gains in job performance (Venkatesh et al., 2003) In this context, performance expectancy can be seen as the extent to which users perceive that using the digital identification application would improve their performance
in work and life The proposed hypothesis is:
H1: Performance Expectancy has a positive effect on Intention to use VneID 2.5.2 Social Influence
Social influence refers to the degree to which the views of the other relevant parties influence the person's actions regarding the usage of innovative technologies (Venkatesh et al., 2003) In this research, social influence refers to the extent to which the view of peers, families, and relevant parties influence the behavioral mtention of the VNeID users The proposed hypothesis is:
H2: Social Influence has a positive effect on Intention to use VneID
Trang 22deliver satisfaction to its users The proposed hypothesis is:
H3: Service Quality has a positive effect on Intention to use VneID
2.5.4 Perceived Risk
Perceived risk refers to an individual’s perception of the potential outcomes of an action owing to his or her degree of uncertainty about a particular behavior The reason for this is that people want to avoid losses as much as possible when making decisions in risky situations, which can be achieved through certain actions A considerable number of works have demonstrated how the perceived nsks of using connected devices are likely
to influence decision-making and ultimately behavioral intentions (Benson et al., 2015; George, 2004; Ha and Stoel, 2009; Hansen et al., 2004; Liu et al., 2005; Saridakis et al., 2015) In this context, perceived risk can be seen as the users’ doubts and uncertainties when using VNeID The proposed hypothesis is:
H4: Perceived Risk has a negative effect on Intention to use VneID
2.5.5 Facilitating Conditions
Facilitating conditions refer to the degree to which a person believes that the existing organizational and technical infrastructure can support the use of technology (Chan et al., 2010) In this case, facilitating conditions are the guidance, instructions on using VNeID, and support from the departments in charge of operating the application The proposed hypothesis is:
HS: Facilitating Conditions has a positive effect on Intention to use VneID
21
Trang 232.5.6 Proposed research model
Trang 24CHAPTER 3: RESEARCH METHOD 3.1 Research process
Objective
basis research model scale research
Quantitative Official scale
Multivariate Check the fit of the model
regression analysis Test the normal distribution of residuals
23
Trang 25the topic From that, we adjusted and completed suggestions on the questionnaire to facilitate quantitative research
For quantitative research: The team mainly used questionnaires to collect data, obtaining the necessary information to meet the proposed research objectives After using qualitative methods, the team built a complete questionnaire with 20 questions based on the Likert scale The questionnaire uses a 5-point scale to help surveyed individuals express the following levels: disagree entirely, disagree, neutral, agree, and completely agree with each specific statement After being collected, the data is processed through SPSS software to test the scale through Cronbach's Alpha reliability coefficient so that the team can evaluate the scale's reliability and eliminate inappropriate variables Next,
we analyzed EFA exploratory factors and multivariate regression analysis to determine the level of impact of each factor Finally, we evaluated the proposed model and tested the hypothesis that the team came up with
For multivariate regression analysis based on Tabachnick and Fidel’s theory in
1996, the minimum sample size is determined by the formula n = 50 + 8 * m (where m is the number of independent factors) This study has five independent variables, so the minimum sample number according to multivariate regression analysis is n = 90
As a result, the authors chose a minimum sample size of 150 to conduct
24
Trang 26quantitative research
3.4 Sampling technique
Filtered the data collected from the survey form, eliminated respondents who did not meet the criteria or belong to the group that our team wanted to survey, and removed unusual pieces in the research article After filtering the data, only 164 respondents met the requirements
3.5 Sample approach
To ensure the above sample size, we used the online survey tool "Google Forms" and invited respondents to participate by sharing it with study groups of many UEH students In addition, we also approached friends and directly asked them to participate in the survey
I
1| PEI | Using the system would Using VNeID would make ID Davis et
make it easier to do my job | verification and authentication | al
2| PE2 | Using the system in my job Using VNeID would enable me
would enable me to to do ID verification and
accomplish tasks more authentication more quickly
quickly,
3| PE3 | Using the system would Using VNeID would enhance
25
Trang 27
enhance my effectiveness on | my effectiveness in work and
Social Influence Scale:
/
1) SI | The senior management of | The government has been Ajzen
this business has been helpful in the use of VNeID (1991)
2| Si2 | In general, the organization | In general, society has
has supported the use of the | supported the use of VNelD (1991) system
3| S13 | People who are important to | People who are important to me
me think that I should use think that I should use VNeID
the system
4| SH | People who influence my People who influence my
behavior think that I should \ behavior think that I should use
Service Quality Scale:
/
TỊ SOI | XYZ has up-to-date VNelID has an up-to-date Parasurama
equipment system netal., 2| SQ2 | When XYZ promises to When VNeID promises to fix a
Trang 28
do something by a system error by a certain time,
certain time, it does so it does so
3| SQ3 | When you have problems, | When you have problems,
XYZ is sympathetic and VNeID resolves them quickly
reassuring
4| SOQ4 | XYZ keeps its records VNelD keeps its user records
accurately accurate
Perceived Risk Scale:
/
1| PRI | Using loT products for Using VNelD for my personal Stone and
my healthcare is risky information is risky Gronhaug 2| PR2 | Lfeel that using loT I feel that using VNeID for my (1993) products for my personal information would cause | adapted healthcare would cause | me a lot of trouble if something by Arfi
something went wrong
3| PR3 | Basically, I’m sure I Basically, I’m sure I would make a
would make a mistake if I | mistake if were to use VNeID for
were to use IoT products | my personal information
Trang 291| FCI | Guidance was available to Guidance was available to me in | Thompso
me in the selection of the the selection of VNeID net al
2| FC2 | Specialized instruction Specialized instruction
concerning the system was concerning VNeLD was
available to me available to me
3| FC3 | A specific person (or group) | A specific person (or group) is
is available for assistance available for assistance with
with system difficulties VNeID difficulties
Intention to Use Scale:
/
Z| LUI | Lintend to use the 1 intend to use VNelID in the future | Venkatesh et
months
of a physical ID card
verification and authentication whenever needed
Trang 303.7.1 Descriptive statistics
Descriptive statistics of identifying variables: Research evaluates statistics on school, gender, and VNeID usage level of survey participants
3.7.2 Evaluating scale reliability
Regarding Cronbach's Alpha coefficient, used to check the reliability of the scale and eliminate observed variables that do not ensure reliability based on the following criteria:
" Test each group of observed variables of each factor
" Cronbach's Alpha coefficient of the scale, which is more significant than 0.6, is accepted
" Suppose the Cronbach's Alpha coefficient is less than 0.6 In that case, we need to eliminate the variables that help the Cronbach's Alpha coefficient or Cronbach's Alpha if Item Deleted the most significant variable and continue to run again until the scale Cronbach's Alpha coefficient meets the conditions of 0.6 or higher
« Eliminate variables with Corrected Item - Total Correlation coefficient less than 0.3
3.7.3 EFA factor analysis
Exploratory factor analysis (EFA) is a quantitative analysis method used to reduce
a set of many interdependent measurement variables into a smaller set of variables (called factors) so that they are meaningful but still contain most of the information of the original variable set (Hair et al., 2009)
Compared to the Cronbach Alpha scale reliability test, which evaluates the relationship between variables in the same group and the identical factor but does not consider the relationship between all observed variables in other factors, EFA considers the relationship between variables in all different groups (factors) to discover observed variables that load on many factors or observed variables that were initially assigned the
29
Trang 31wrong factor based on the following criteria:
= 0.5 <KMO (Kaiser —Meyer-Olkin) < |
" Bartlett's test has Sig < 0.05 (with HO: variables are not correlated with each other
in the population, H1: variables are correlated with each other in the population)
" Total Variance Explained > 50%
" Eigenvalue > | (Eigenvalue is a criterion to determine the number of factors in EFA analysis With this criterion, the minimum Eigenvalue must be equal to 1)
" Factor loading factor > 0.3Bartlett's test has Sig < 0.05 (with HO: variables are not correlated with each other in the population, H1: variables are correlated with each other in the population)
3.7.4 Multivariate regression analysis
Regression analysis is an essential statistical analysis in quantitative research After concluding the correlation between the independent and dependent variables, our group continued to do multivariate regression analysis to clarify how the independent variables affected the dependent variable The regression analysis model describes the form of this relationship to predict the dependent variable's value when knowing the independent variable's value
The variance inflation factor - VIF >3 in the regression analysis results table is used to check the multicollinearity phenomenon in the model In addition, we can also use the Tolerance value because these two values are the inverse of each other (VIF = 1/Tolerance), so we only need to evaluate one of these two values
3.8 Statistical analysis techniques
Data are collected from many sources to compare and ensure reliability and clear, specific description (Yoon, 2008) Quantitative data were compiled and analyzed, and multivariate regression was run to produce results to test hypotheses on SPSS 20 software Qualitative data were analyzed using the content analysis method
30
Trang 32CHAPTER 4: RESEARCH RESULTS 4.1 Descriptive statistics
The research group has collected 209 responses, including 11 invalid responses due to inappropriate response content and five duplicate responses The number of valid survey responses after being filtered is 194 The data is then processed using the software IBM SPSS Statistics 25.0
Trang 33
University of Economics in Ho Chi Minh City, comprising 61.3% of survey participants Meanwhile, the number of students from other universities contributed 38.7% to the sum
of participants in the survey
4.2 Testing Scale
4.2.1 Testing scale reliability with Cronbach Alpha
"Cronbach's Alpha coefficient is a test to measure the reliability of a scale by reflecting the level of close correlation between observed variables in the same factor" (Hoang Trong & Chu Nguyen Mong Ngoc, 2008) Here, Cronbach's Alpha reliability coefficient will be used to eliminate inappropriate variables
According to Nunnally (1978), a suitable scale should have a Cronbach's Alpha reliability of 0.7 or higher However, as a preliminary exploratory study, the Cronbach's Alpha threshold of 0.6 is acceptable
Besides, we also consider another important index, the Total Correlation
32
Trang 34Coefficient (Corrected Item - Total Correlation) Cristobal and colleagues (2007) stated that a good scale is when observed variables have Corrected Item - Total Correlation values of 0.3 or higher, so any observed variable with a Corrected Item - Total Correlation coefficient less than 0.3 will be removed
VNeID People support the