Professional Documents
Culture Documents
Philipo Translation
Philipo Translation
Philipo Translation
Introduction
This section entails the findings and discussions. It will describe the data processing and show the
study's empirical findings. The study's data processing will describe how the data was analyzed using
demographic and finding from the application SPSS. Following the presentation of the hypothesis
The act of translating acquired information or observations into a collection of meaningful, coherent
categories is referred to as data coding. It is the process of summarizing and re-presenting facts to
create a systematic description of a recorded or observed phenomena. Data coding is necessary as the
initial step in preparing data for SPSS processing. Data collected via surveys will be coded and placed
into the database. Coding entails giving a number to the replies of the participants in order to transcribe
the data from the questionnaire and then key in the data.
Coding is required for any survey questionnaire replies that are presented in a format that cannot be
analyzed. Do the data input when the data from the questionnaire has been coded. The act of
transferring the codes from the questionnaire form to the computer is known as data entry. SPSS
Demographic analysis is the study of a population based on criteria such as age, ethnicity, and gender.
education, income, marriage rates, birth and death rates, and so on. Demographic information gives
information about research participants and is required to determine if the persons in a given study are
a representative sample of the target population for generalization purposes. In this study,
demographic profile include gender, age, race, educational level, residential area, respondent awareness
towards e-wallet, use of e-wallet and the type of e-wallet respondent use.
Table 1 shows the frequency of demographic profiles via gender wise distribution of 372 participants. As
shown in the table, out of 372 respondents 189 were males and 183 were females. As shown in pie chart
4.1 below, the research involved 372 respondents out of which 49.2% were females and 50.8% males.
Gender
Valid Cumulative
Frequency Percent Percent Percent
Valid Female 183 49.2 49.2 49.2
MALE 189 50.8 50.8 100.0
Total 372 100.0 100.0
Table 1 Distribution of Gender Groups
Table 2 shows the frequency of demographic profiles via race wise distribution. Out of 372 respondents
177 were Indians, 104 were Malay, 81 were Chinese, 9 were Punjabi and only 1 was Iban. As depicted in
pie chart 4.2, 47.6% respondents are Indian, 28% Malay, 21.8% Chinese, 2.4% Punjabi and 0.3% Iban.
Ethnicity
Valid Cumulative
Frequency Percent Percent Percent
Valid CHINESE 81 21.8 21.8 21.8
Iban 1 .3 .3 22.0
INDIAN 177 47.6 47.6 69.6
MALAY 104 28.0 28.0 97.6
Punjabi 9 2.4 2.4 100.0
Total 372 100.0 100.0
Table 2 Distribution of Race group
The demographic distribution of respondents by their age in table 3 shows that the age group of 30 – 39
years old have the largest number of respondents out of 372 participants, i.e., 146, then 40 – 49 years
old age group with 90, 20 – 29 years old age group with 80 and the age group of 50 years old and above
have the least participants with only 56 respondents. 39.2% respondents belong to the age group of 30
– 39 years old, 24.2% belongs to the 40 – 49 years old age group, 21.5% belongs to the age group of 20 –
29 years old whereas the remaining 15.1% were 50 years old or above as shown in pie chart 4.3.
Age
Valid Cumulative
Frequency Percent Percent Percent
Valid 20 - 29 YEARS OLD 80 21.5 21.5 21.5
30 - 39 YEARS OLD 146 39.2 39.2 60.8
40 - 49 YEARS OLD 90 24.2 24.2 84.9
50 YEARS OLD AND 56 15.1 15.1 100.0
ABOVE
Total 372 100.0 100.0
Table 3 Distribution of Age Group
Figure 4.3 Demographic Analysis via Age
The result of table 4, describes that the respondents in this research with bachelor’s degree were 185
EDUCATION LEVEL
Valid Cumulative
Frequency Percent Percent Percent
Valid BACHELOR DEGREE 185 49.7 49.7 49.7
HSC/STPM/ 85 22.8 22.8 72.6
MATRICULATION/
DIPLOMA
MASTER / PhD 37 9.9 9.9 82.5
PRIMARY 65 17.5 17.5 100.0
/SECONDARY
Total 372 100.0 100.0
Table 4 Demographic Distribution by Education Level
As shown in table 5, the majority of the respondents belongs to the urban area contributing to the
54.3% (202 respondents) whereas 24.2% (90) respondents belong to suburban areas and the remaining
RESIDENTIAL AREA
Valid Cumulative
Frequency Percent Percent Percent
Valid RURAL 80 21.5 21.5 21.5
SUBURBAN 90 24.2 24.2 45.7
URBAN 202 54.3 54.3 100.0
AREA
Total 372 100.0 100.0
Table 5 Demographic Distribution by Residential Area
The result of table 6 depicts that out of 372, 348 respondents (93.5%) were aware of the e-wallet
applications.
Majority of the respondents, i.e., 320 out of 371 (86%) were already using the e-wallet whereas 52
respondents (14%) were not using the e-wallet as depicted in the table 7.
The graph 4.4 shows that the majority of the respondents use “Touch N Go” as their preferred e-wallet
with 262 (70.4%), followed by “Shopeepay” with 163 (43.8%). Then followed by “Grabpay” with 151
(40.6%), “Maybank” with 133 (35.8%), “Lazada wallet” with 97 (26.1%), “Boost” with 56 (15.1%),
“Applepay” with 53 (14.2%), “WeChat pay” with 52 (14%), “Samsung pay” with 49 (13.2%), “Bigpay”
with 45 (12.1%) and “Alipay” with 27 (7.3%) respondents. Apart from these, there are 15 respondents
Descriptive Analysis:
Descriptive statistics are short informative coefficients that describe a specific data collection, which
might represent the complete population or a subset of a population. Measures of central tendency and
measures of variability are two types of descriptive statistics (spread). The mean, median, and mode are
examples of measurements of central tendency, whereas standard deviation, variance, minimum and
maximum variables, kurtosis, and skewness are examples of measures of variability. (Hayes, 2022)
The state of the variables is described by a descriptive statistic. It is a quick explanation of the data
gathered through the distribution of questionnaires. It delivers respondents' data information. The
descriptive statistics in this study include mean, standard deviation, minimum and maximum values.
Std.
N Minimum Maximum Mean Deviation
The descriptive analysis results in table 8 show that there are no missing observations, no unlawful
The validity test is used to determine the reliability of questionnaire questions in measuring and
collecting data from respondents. If the significance, (sig) correlation number is less than 0.05 (5%), the
instrument is valid. Otherwise, if the sig is greater than 0.05 (5%), the instrument is invalid, implying that
I trust the ability of the e-wallet to protect user information and privacy
I trust the ability of the e-wallet to protect the connectivity link between
banking portals
I trust the ability of e-wallet to protect the privacy of every transaction
.936
.955
.978
.964
using e-wallets
codes, and a decent dispersion of answers to each variable item.
conventional cash
I find that e-wallets have more access to making multiple payments at
one time
I find that using e-wallet app make me manage transactions more
Testing the Goodness of Measure: discreetly
save more
I find the e-wallet app is very favorable to me
I am able to access my e-wallet app anytime anywhere at any
Perceived Ease of Use
convenient time
Perceived Benefit
Valid N (listwise)
Perceived Trust
Validity Test
I find that e-wallet apps are easy to use and saves time
I find that e- Pear 1 .8 .7 .7 .7 .7 .7 .6 .7 .6 .6 .6 .6 .6 .5 .5 .5 .6 .6 .6 .6 .6 .5 .6
saves time Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
are Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
convenient lation
compared Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
to other (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
forms of tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
payment/tra )
nsactions N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
Learning to Pear .7 .8 1 .8 .7 .7 .7 .6 .6 .6 .6 .6 .5 .6 .5 .5 .5 .6 .6 .6 .6 .5 .6 .6
use an e- son 82 10 01 42 61 60 26 78 60 98 29 41 44 68 31 93 09 28 09 62 84 02 21
user- Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
friendly (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
)
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
The e- Pear .7 .7 .8 1 .7 .7 .7 .6 .6 .6 .6 .6 .5 .6 .5 .5 .5 .5 .6 .5 .6 .5 .5 .5
make my Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
everyday lation
payment Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
and (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
transaction tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
s easy to )
manage N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
I am able to Pear .7 .7 .7 .7 1 .7 .7 .7 .7 .6 .6 .6 .5 .6 .5 .5 .6 .6 .5 .5 .6 .5 .5 .5
track my son 13 23 42 86 34 48 14 24 75 67 41 87 23 79 38 10 32 95 87 02 91 92 82
daily Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
expenses lation
easily with Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
the e-wallet (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
app tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
I am able to Pear .7 .7 .7 .7 .7 1 .7 .6 .6 .6 .7 .6 .5 .6 .5 .5 .5 .5 .6 .5 .6 .5 .6 .6
access my son 20 58 61 69 34 48 03 20 27 00 34 46 30 49 42 66 52 31 95 26 56 09 11
e-wallet Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
app lation
anytime Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
anywhere (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
at any tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
convenient )
time N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
is very Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
favorable to lation
me Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
using e- son 50 14 26 74 14 03 00 83 12 57 53 21 07 22 79 64 19 78 11 86 92 97 06
expenditure (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
more )
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
using e- son 13 80 78 89 24 20 28 83 66 19 70 12 70 33 15 56 61 14 24 52 63 57 35
make me lation
manage Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
transaction (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
s more tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
discreetly )
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
wallets son 65 74 60 79 75 27 21 12 66 51 22 94 08 02 11 60 34 71 84 42 21 05 44
access to lation
making Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
multiple (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
payments tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
at one time )
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
have lation
secure Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
transaction (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
s better tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
than )
convention N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
al cash 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
I find that e- Pear .6 .6 .6 .6 .6 .6 .7 .6 .6 .7 .7 1 .6 .6 .6 .6 .6 .6 .5 .5 .6 .6 .6 .6
multiple lation
bank Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
accounts (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
which is tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
convenienc )
e for me N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
E-wallets Pear .6 .5 .5 .5 .5 .5 .6 .6 .6 .5 .6 .6 1 .6 .7 .7 .7 .7 .6 .6 .6 .6 .6 .6
ensure son 01 54 41 33 87 46 19 21 12 94 32 11 89 24 22 09 19 50 68 14 39 53 76
protection Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
of fraud Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
and (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
financial tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
loss )
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
E-wallets Pear .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 .6 1 .6 .6 .6 .7 .7 .7 .7 .6 .7 .6
ensure son 67 34 44 17 23 30 78 07 70 08 79 54 89 49 78 96 48 01 01 25 80 13 96
high- Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
security lation
features for Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
the users (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
by tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
considering )
that you N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
authorize 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
every
transaction
with a PIN
or
password
or
fingerprint
scanner.
The risk of Pear .5 .5 .5 .5 .5 .5 .5 .6 .6 .6 .6 .6 .7 .6 1 .7 .7 .7 .6 .7 .6 .6 .7 .7
abuse of son 43 60 68 21 79 49 82 22 33 02 27 07 24 49 60 82 55 49 12 74 90 11 32
usage Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
information lation
is low when Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
using e- (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wallets tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
I think my Pear .5 .5 .5 .5 .5 .5 .5 .5 .6 .6 .5 .6 .7 .6 .7 1 .7 .7 .6 .7 .7 .7 .7 .7
confidential Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
guaranteed Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
when using (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e-wallets tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
E-wallets Pear .5 .5 .5 .5 .6 .5 .6 .6 .6 .6 .6 .6 .7 .6 .7 .7 1 .7 .6 .7 .7 .7 .7 .7
keep my son 98 67 93 88 10 66 21 64 56 60 69 77 09 96 82 92 93 82 35 39 46 44 29
financial Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
transaction lation
s safe. Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
)
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
using e- son 10 23 09 83 32 52 51 19 61 34 63 65 19 48 55 71 93 88 24 03 24 80 22
perfectly lation
safe Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
(2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
)
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
E-wallet Pear .6 .6 .6 .6 .5 .6 .6 .5 .6 .5 .6 .5 .6 .7 .6 .6 .6 .6 1 .7 .7 .6 .7 .7
offers son 45 24 28 05 95 31 68 78 14 71 55 97 50 01 49 21 82 88 52 10 82 18 68
security Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
protection lation
greater Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
than the (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
convention tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
al wallet )
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
E-wallet Pear .6 .5 .6 .5 .5 .5 .6 .6 .6 .5 .6 .5 .6 .7 .7 .7 .7 .7 .7 1 .7 .7 .7 .7
app son 16 84 09 57 87 95 20 11 24 84 42 86 68 01 12 26 35 24 52 71 96 74 68
transaction Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
secure and Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
protected (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
with tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
multiple )
security N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
recognition 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
E-wallet Pear .6 .6 .6 .6 .6 .6 .6 .5 .6 .6 .6 .6 .6 .7 .6 .7 .7 .7 .7 .7 1 .7 .7 .7
app son 54 40 62 28 02 26 40 86 52 42 45 52 14 25 74 27 39 03 10 71 98 77 35
enhances Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
the lation
effectivene Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
ss in (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
conducting tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
secure )
payment N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
transaction 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
s
ability of e- son 04 88 84 50 91 56 99 92 63 21 27 06 39 80 90 45 46 24 82 96 98 89 79
wallet to Corre ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** **
every (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
transaction tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
ability of son 96 04 02 51 92 09 37 97 57 05 59 27 53 13 11 24 44 80 18 74 77 89 96
to protect lation
the Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
connectivity (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
link tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
between )
banking N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
portals 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
ability of son 06 15 21 68 82 11 44 06 35 44 87 37 76 96 32 18 29 22 68 68 35 79 96
to protect lation
user Sig. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <. <.
information (2- 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
and privacy tailed 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37 37
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
Table 9 Measurement of Instrument of Validity
The validity test results are shown in Table 9 above. The validity test indicated that all instruments were
valid when comparing the Pearson product-moment correlation index with a significance level of 5%
with the crucial value, the significant value produced by the Sig. (2-tailed) of (<0.001)< 0.05.
Reliability Test
Reliability is used to assess for consistency and stability in how effectively the items measure the model
and correlate to one another. Cronbach's alpha is a reliability coefficient that measures how effectively
the items in a collection are positively connected to one another. A reliable instrument has a coefficient
of 0.60 or above. Otherwise, if the coefficient is less than 0.60, the instrument is unreliable.
According to the findings of the reliability test table 10 above, the lowest Cronbach's alpha for the
construct is 0.932, and the maximum is 0.950. That indicates Cronbach's alpha is greater than 0.60,
Correlation Analysis
Correlation analysis is used to assess the strength of the linear relationship between two variables that
are not assumed to be dependent or independent. The correlation coefficient has a value range of -1 to
+1. When the correlation coefficient is close to one, it indicates that the linear link between variables is
very strong, and when it is close to zero, it indicates that the relationship is weak.
The value of sig (<0.01) < 0.05 in table 11 correlation indicates that there is a linear connection between
variables. Each variable's amount of correlation varies, but all linear correlations are positive. The higher
Multiple linear regression is a regression that uses more than one independent variable to explain the
variation in the dependent variable. It allows you to objectively examine the degree and nature of the
link between the independent variable and the dependent variable: the regression coefficient reveals
the relative relevance of each independent variable in predicting the dependent variable.