Mathematics: An Exploratory Approach To The Adoption Process of Bitcoin by Business Executives
Mathematics: An Exploratory Approach To The Adoption Process of Bitcoin by Business Executives
Mathematics: An Exploratory Approach To The Adoption Process of Bitcoin by Business Executives
Article
An Exploratory Approach to the Adoption Process of Bitcoin by
Business Executives
Pedro Palos-Sanchez 1 , Jose Ramon Saura 2, * and Raquel Ayestaran 3
1 Department of Financial Economics and Operations Management, University of Seville, 41001 Seville, Spain;
ppalos@us.es
2 Department of Business Economics, Rey Juan Carlos University, 28032 Madrid, Spain
3 Faculty of Legal and Business Sciences, Francisco de Vitoria University, 28223 Madrid, Spain;
r.ayestaran@ufv.es
* Correspondence: joseramon.saura@urjc.es
Abstract: The purpose of this research study is to analyze the exploratory study of the adoption
of Bitcoin cryptocurrency based on blockchain technology and its use as a means of payment in
companies. This research is exploratory in nature. As such, an adoption model was investigated
using the technology acceptance model (TAM) which was extended with new variables. The sample
was made up of business executives from companies and commercial establishments (n = 248). Partial
least squares structural equation modeling (PLS-SEM) was chosen as the analysis and evaluation
technique for the model. The authors demonstrated that privacy has an important influence on
perceived utility, and that trust has a very significant influence on privacy and perceived ease of use,
thus indirectly affecting the intention to use cryptocurrencies.
Figure 1. Bitcoin price value from April 2020 to February 2021. Source: Adapted from DailyFX [19].
Even so, Bitcoins are still a safe bet as an exchange currency in e-commerce and
business, not only because of their electronic nature and potential privacy, but because
blockchain technology is the basis of their production and use [3,9].
The acceptance of Bitcoin cryptocurrency by Spanish business executives has, there-
fore, become an interesting area of study. It is important because Bitcoin can change how
companies organize their marketing and business development strategies. Businesses could
soon be facing a great change due to the use of Bitcoin and the related blockchain tech-
nology. The users who must decide whether to trust this new tendency are the managers
of companies.
Therefore, this study fills a research gap for information about the acceptance of
Bitcoin in company business by business executives. To study this phenomenon, previous
related research was found in the literature [18,20] and, finally, a widely used theoretical
adoption model, TAM (technology acceptance model) [21], was used. Four external vari-
ables previously used for payment methods and e-banking technologies were added to
this model. These variables were perceived security, privacy, risks, and trust.
Therefore, under this context, in order to understand the adoption of Bitcoin by
business executives, the present research study stablishes the following objectives:
Mathematics 2021, 9, 355 3 of 22
2. Theoretical Background
In recent years, numerous studies analyzed Bitcoin and its influence on different
sectors [18,22,23]. It is important to note that these studies were mainly interested in the
economic impacts of a possible standardization of cryptocurrency, or on trading it for
profit, even when its endurance over time is uncertain [19]. Furthermore, various studies
investigated the acceptance of cryptocurrency and why users decided to use it or trade
with it [20,24].
Technology acceptance has been widely studied over the years and, in the case of the
acceptance of blockchain technology and cryptocurrencies such as Bitcoin, research has
been carried out that aimed to understand the adoption type or the adoption process in
different industries, sectors, and companies, or directly by individual users [20,23]. Table 1
lists some papers that discussed the adoption of Bitcoin technology as a cryptocurrency.
Authors Research
Proposed a technology acceptance model to measure the influence of
Francisco and
cryptocurrencies, analyzing the case of Bitcoin and its acceptance in the
Swanson [25]
retail sector.
In this research, the authors developed the unified theory of acceptance and
Francisco and use of technology (UTAUT) model to measure the influence of the variables
Swanson [25] on the technology acceptance of Bitcoin and transparency in the
cryptocurrency sector.
In this paper, an adoption model was developed to find the Bitcoin
Jonker [26] acceptance process in retail and its potential long-term influence on
this industry.
In their research, they presented a model for measuring user acceptance of
Presthus and
Bitcoin as a digital currency, establishing the reasons and obstacles that led
O’Malley [23]
users to stop using Bitcoin as a payment method.
Folkinshteyn and Discussed the technology acceptance of Bitcoin as a cryptocurrency in their
Lennon [20] research, mentioning the technology on which it is based, blockchain.
The research by Li and Wang [24] aimed to give an economic value to the technologies
which cryptocurrencies use, paying particular attention to Bitcoin, deeming it to be one of
the most sensitive currencies to economic changes due to its high volatility.
In turn, Cheah et al. [27] also studied a cross-market model in their research to find
Bitcoin prices from the track record of economic changes experienced over the years,
concluding that a negative factor for Bitcoin investment is user confidence due to the
high prices.
Glaser et al. [28] also carried out research on Bitcoin as a cryptocurrency in order to find
a sensible price to use in predictive modeling of the Bitcoin market and large-scale trading.
Mathematics 2021, 9, 355 4 of 22
Lastly, the research by Hayes [22], identified the factors that determine the validity of
information on cryptocurrencies, including Bitcoin. In this study, a cross-sectional model is
proposed to find the financial patterns that give Bitcoin prices, as well as differences in the
marginal production costs.
Hypothesis (H1). Trust influences privacy in the Bitcoin adoption process by Spanish executives.
Diniz et al. [18], researched the influence of trust on perceived usefulness, demonstrat-
ing the influence that this variable has on Bitcoin adoption. Folkinshteyn and Lennon [20]
also used these variables to create a Bitcoin adoption model [49]. The following hypothesis
was proposed on the basis of this research:
Hypothesis (H2). Trust influences perceived usefulness (PU) in the Bitcoin adoption process by
Spanish executives.
Diniz et al. [18] also measured the influence of the trust variable on perceived use-
fulness and on perceived ease of use of Bitcoin technology. Dauda and Lee [50] and
Mathematics 2021, 9, 355 5 of 22
Folkinshteyn and Lennon [20] also studied the relationship and influence of trust on per-
ceived ease of use in their research. After taking these studies into account and reviewing
the literature, the following hypothesis was proposed:
Hypothesis (H3). Trust influences perceived ease of use (PEOU) in the Bitcoin adoption process
by Spanish executives.
The research by Dauda and Lee [50] showed how the adoption of cryptocurrencies can
influence consumer behavior. The influence of perceived risk and the aversion to risk that
electronic commerce users and consumers have when accepting Bitcoin technology were
investigated. Trust was directly linked to risk for the use of Bitcoin [51]. These two variables
are thought to be linked, due to aversion to risk and trust when using this cryptocurrency.
Folkinshteyn and Lennon [20] also emphasized the importance of risk and trust in a study
of Bitcoin technology adoption. From this literature review, the following hypothesis was
formulated:
Hypothesis (H4). Risk influences trust in the Bitcoin adoption process by Spanish executives.
The research by Urquhart [52], studied the acceptance of the Bitcoin economy, analyz-
ing price-related information and showing that the risks are directly linked to the perceived
usefulness of Bitcoin as a cryptocurrency. Likewise, Junadi and Fenrianto [48] once again
proposed a technology adoption and use model, the unified theory of acceptance and
use of technology (UTAUT), to measure the influence of risks on perceived usefulness in
the process of adoption and use of Bitcoins, placing special emphasis on virtual payment
methods. On the basis of this research, the following hypothesis was proposed:
Hypothesis (H5). Risk influences perceived usefulness (PU) in the Bitcoin adoption process by
Spanish executives.
Thong et al. [53] and Folkinshteyn and Lennon [20] constructed technology acceptance
models in their research and made the link between risks and perceived ease of use (PEOU)
for Bitcoin users [54]. From the research such as that mentioned above, the following
hypothesis was formulated:
Hypothesis (H6). Risk influences perceived ease of use (PEOU) in the Bitcoin adoption process by
Spanish executives.
Folkinshteyn and Lennon [20], showed the influence of the privacy afforded to con-
sumers who use Bitcoin and its influence on perceived ease of use and, therefore, acceptance
of Bitcoin. In addition, Lee [55] noted that this is one of the main reasons why Bitcoin and
the technology related to it could be used around the world [56]. From the literature, the
following hypothesis was proposed:
Hypothesis (H7). Privacy influences perceived ease of use (PEOU) in the Bitcoin adoption process
by Spanish executives.
Lee [55] and Folkinshteyn and Lennon [20] measured the influence of the privacy
variable on the perceived usefulness of Bitcoin, taking into account that privacy determines
the effect of users’ concerns about their data and the perceived ease of use of cryptocurrency.
Perceived usefulness reflects whether users perceive Bitcoin as useful regardless of whether
they understand its main functionalities [18].
Hypothesis (H8). Privacy influences perceived usefulness (PU) in the Bitcoin adoption process by
Spanish executives.
Mathematics 2021, 9, 355 6 of 22
Folkinshteyn and Lennon [20] and Urquhart [52] discussed the influence of PEOU
on PU, given that the TAM directly links the perceived usefulness of a technology to the
perceived ease of use of that technology, which could influence its acceptance and use. On
the basis of the research indicated, the following hypothesis was proposed:
Hypothesis (H9). Perceived ease of use (PEOU) influences perceived usefulness (PU) in the
Bitcoin adoption process by Spanish executives.
Folkinshteyn and Lennon [20] and Diniz et al. [18] analyzed the influence of PEOU on
ATU for the adoption of Bitcoin technology, taking into account that perceived usefulness
could predetermine the attitude toward using this technology among consumers or man-
agers with decision-making power. After analyzing the literature presented, the following
hypothesis was proposed:
Hypothesis (H10). Perceived ease of use (PEOU) influences attitude toward usage (ATU) in the
Bitcoin adoption process by Spanish executives.
Folkinshteyn and Lennon [20] and Diniz et al. [18] indicated in their research that the
attitude toward using Bitcoin could influence the use of the cryptocurrency and, therefore,
factors such as privacy, trust, or understanding why it is useful could influence the attitude
toward using and the use of Bitcoin. From the research indicated, the following hypothesis
was proposed:
Hypothesis (H11). Attitude toward using (ATU) influences intention to use in the Bitcoin
adoption process by Spanish executives.
Blundell-Wignall [57] and Bradbury [58] studied trust and perceived security of Bitcoin
users. In a Bitcoin acceptance model, Junadi and Fenrianto [48] used the perceived security
construct to analyze obstacles that Bitcoin users encounter for acceptance, which determine
their attitude toward use, giving rise to the following hypothesis:
Hypothesis (H12). Perceived security influences attitude toward using (ATU) in the Bitcoin
adoption process by Spanish executives.
As stated before, Junadi and Fenrianto [48] created a model to find Bitcoin and
cryptocurrency use relationships with perceived security and the way consumers use
Bitcoin. Using the research stated, the following hypothesis was proposed:
Hypothesis (H13). Perceived security influences behavioral intention to use in the Bitcoin adoption
process by Spanish executives.
Presthus and O’Malley [23], Folkinshteyn and Lennon [20], and Junadi and Fen-
rianto [48] studied the link between the perceived usefulness of Bitcoin as a cryptocurrency
and the way it is used by consumers in different sectors. It was found that the use of
Bitcoin as a cryptocurrency depends on the perceived usefulness that users have before
using it, among other factors. Using the consulted literature, the following hypothesis was
formulated:
Hypothesis (H14). Perceived usefulness (PU) influences behavioral intention to use (BIU) in the
Bitcoin adoption process by Spanish executives.
As indicated above, the papers by Blundell-Wignall [57], Junadi and Fenrianto [48],
Lee [55], and Folkinshteyn and Lennon [20] all showed the importance of analyzing the
perceived usefulness of Bitcoin, as well as analyzing the target audience for the technology.
The influence of the attitude toward using Bitcoin as an emerging technology was studied
Mathematics 2021, 9, 355 7 of 22
along with other constructs. From the literature presented, the following hypothesis was
proposed:
Hypothesis (H15). Perceived usefulness (PU) influences attitude toward usage (ATU) in the
Bitcoin adoption process by Spanish executives.
The proposed research model is shown in Figure 2 below. The main dependent
variable is outlined in bold to identify the main construct that might help us understand
how Spanish executives make use of Bitcoin cryptocurrency in their companies.
4. Methodology
4.1. Questionnaire Design
The research technique chosen to gather the data was the questionnaire, which is
a quantitative technique. It enabled us to understand the perceptions and attitudes of
professionals to blockchain technology and, more specifically, Bitcoin. The questionnaire
contained 23 questions about attitudes and behaviors, along with five classification ques-
tions, namely, gender, age, job, residence, and education level. The questionnaire was
structured in three categories. The sections dealt with questions about the TAM model [35]
and how it relates to blockchain technology and cryptocurrencies [23,33,34], questions
about the respondents’ behavior, and their perceptions and attitudes toward the adoption
and use of Bitcoin (see Appendix A).
Another section contained 11 questions broken down into PU (3), PEOU (4), ATU
(2), and BIU (2). The scales for the TAM model variables were measured using adapted
items [35]. The elimination of some items from the model was due to the fact that the
values obtained did not have a sufficient level of validity and were, therefore, discarded.
The second section consisted of a block of questions about some details of cryptocurrencies
and blockchain technology. These questions were grouped into risks (2), trust (4), privacy
(4), and perceived security (2). The behavioral items for the use of blockchain technology
and cryptocurrencies as a payment method were adapted from studies on privacy [59–61],
perceived security [48], and risks [20,23,60,61].
There were a total of 29 items in the research questionnaire. Every item, except the
demographic profile, was assessed using a five-point Likert scale ranging from “strongly
disagree” (1) to “strongly agree” (5).
Mathematics 2021, 9, 355 8 of 22
Figure 4. Madrid region map of businesses which accept Bitcoin. Source: Coinmap.org.
Mathematics 2021, 9, 355 9 of 22
Although some of the businesses and retailers could not be found, other companies
were detected during the field survey because they advertised their acceptance of Bitcoin
payment. Finally, the population was n = 264, from which a sample of (n = 248) validated
questionnaires was obtained (See Figure 4).
The demographic characteristics of the sample are shown in Table 2. A total of 248
questionnaires were collected at different shopping centers and office buildings in the
region of Madrid, all of which were valid. Google Forms was used to create the online
survey, which was filled out directly at the point of sale or in the company’s offices
(see Table 2).
SPSS 24 statistical software was used to calculate the frequency and statistics tables
for the sample.
Structural equation models (SEMs) with variance were used to analyze the data
and test hypotheses, as this allowed us to statistically analyze a series of interrelated
dependency relationships between variables. Calculations were made using analysis theory
and indicator variables, which were measured with directly observable variables [63]. Of
the different SEM techniques available, the partial least squares (PLS) regression technique
was chosen for this study. PLS trajectory modeling is a complete SEM method for factorial
and composite models, which measures the constructions, estimates the structural models,
and performs fit tests on the models [64].
The PLS-SEM method is a statistical analysis technique based on the structural equa-
tion model and was chosen for its use since it is especially recommended for exploratory
research, because latent constructions can be measured with indicators [65]. PLS-SEM was
chosen because one of the main objectives of the present study was to test whether our
model (see Figure 1) was predictive or not [66–68]. Furthermore, PLS is more appropriate if
the aim of the study is to predict and investigate relatively new phenomena [67]. SmartPLS
3 software was used to carry out the calculations and analysis in this study [69].
The application of PLS is often suggested when there are a limited number of ob-
servations [70]. This approach was applicable in our case, due to the small sample size
(n = 248). To establish the minimum sample size for PLS modeling, Hair and others [71]
Mathematics 2021, 9, 355 10 of 22
recommended the use of Cohen tables [72]. The effect sizes reflect the statistical power
of the research model. The effect size (f2 ) evaluates the degree to which an exogenous
latent variable contributes to the R2 value of an endogenous latent variable. F2 values of
0.02, 0.15, and 0.35 indicate a small, medium, and large effect size [73]. Cohen’s tables [74]
showed that a medium effect size (f2 = 0.15) with a power of 95.18% required a minimum
of 107 questionnaires. Therefore, this research has adequate statistical power.
Another reason for choosing the PLS-SEM was that the topic under study is com-
paratively new and the methodology has not yet been consolidated. Furthermore, an ex-
ploratory method was adopted [68] for which this data analysis method is highly suggested.
5. Results
5.1. Measurement Test Model
The measurement model or internal model was tested by measuring the individual
reliability of each item, the internal consistency or reliability of each scale or construct, the
convergent validity, and the discriminant validity.
As can be seen in the last column of the table in Appendix A, the individual reliability
of the load (λ) of the item was calculated (see loading factor). The minimum acceptance
level was λ ≥ 0.707 [75], and items PU4 and PU5 were disregarded because they did not
reach this minimum value.
The measurement model test included internal reliability, convergent validity, and
discriminant validity. Internal reliability was found using the value of Cronbach’s alpha,
where a value of 0.70 indicates acceptable internal reliability [76]. Loaded indicators and
composite reliabilities were used to analyze causality [77].
As all the Cronbach’s alpha values were higher than 0.7; thus, all the constructs were
confirmed to show internal reliability [68,78,79]. Fornell and Larker [80] suggested using
the average variance extracted (AVE) to assess convergent validity. They recommended a
value of average variance extracted or AVE ≥ 0.50 as acceptable.
Table 3 shows the constructs, element loads, Cronbach’s alpha, and AVE. Cronbach’s
alpha values ranged from 0.915 to 0.816, which are higher than the recommended level of
0.70, thus rendering them indicators of strong internal reliability. The composite reliability
values were between 0.959 and 0.847 and the AVE ranged from 0.679 to 0.844, which are
higher than the recommended levels. Therefore, the conditions for convergent validity
were met.
Table 3. Measurement model. Cronbach’s alpha, rho_A, composite reliability, and average variance extracted (AVE).
The discriminant validity was calculated using the square root of the AVE (see Table 4).
The square root of the AVE of a construct must be greater than the correlation with another
construct for discriminant validity to be deemed satisfactory [80]. Several items were dis-
carded during the cross-loading test because they loaded more heavily on other constructs
than on their own (see Appendix A).
Mathematics 2021, 9, 355 11 of 22
Cronbach’s Composite
Construct rho_A AVE
Alpha Reliability
Attitude toward using (ATU) 0.757 0.761 0.891 0.804
Perceived security (PS) 0.816 0.819 0.916 0.844
Perceived ease of use (PEOU) 0.796 0.805 0.867 0.621
Perceived usefulness (PU) 0.842 0.843 0.905 0.760
Privacy (PR) 0.842 0.844 0.894 0.679
Risks (R) 0.708 0.737 0.847 0.734
Trust (T) 0.873 0.885 0.914 0.726
Behavioral intention to use (BIU) 0.915 0.917 0.959 0.922
β (Path
Hypothesis t Statistic p-Value Support
Coefficient)
H1: Trust → Privacy 0.753 20.467 0.000 Yes ***
H2: Trust → PU 0.068 0.758 0.449 N.S.
H3: Trust → PEOU 0.585 6.748 0.000 Yes ***
H4: Risks → Trust 0.231 2.319 0.020 Yes *
H5: Risks → PU 0.025 0.368 0.713 N.S.
H6: Risks → PEOU 0.134 2.054 0.040 Yes *
H7: Privacy → PEOU 0.160 1.620 0.105 N.S.
H8: Privacy → PU 0.510 6.455 0.000 Yes ***
H9: PEOU → PU 0.322 3.180 0.001 Yes ***
H10: PEOU → ATU 0.489 6.332 0.000 Yes ***
H11: ATU → BIU 0.265 3.204 0.001 Yes ***
H12: Perceived Security → ATU 0.271 2.961 0.003 Yes ***
H13: Perceived Security → BIU 0.048 0.711 0.477 N.S.
H14: PU → BIU 0.551 7.001 0.000 Yes ***
H15: PU → ATU 0.318 3.174 0.002 Yes ***
Notes: For n = 5000 subsamples, based on Student’s t-distribution (499) of a queue: * p < 0.05 (t(0.05; 499) =
1.64791345); *** p < 0.001 (t(0.001;499) = 3.106644601); N.S.—not supported.
Construct Q2 R2 (%)
Attitude toward using (ATU) 0.299 39.5
Perceived ease of use (PEOU) 0.320 57.0
Perceived usefulness (PU) 0.459 66.9
Privacy (PR) 0.351 56.7
Trust (T) 0.028 5.40
Behavioral intention to use (BIU) 0.466 56.5
Using a blindfolding procedure, part of the data for a certain construct were omitted
during parameter estimation, and then an attempt was made to estimate what had been
omitted using the other parameters [88]. Thus, the model’s predictive relevance was studied
using the Stone–Geisser (Q2 ) test [89,90], revealing that the model has predictive capacity.
As shown in Table 6, all endogenous constructions met Q2 > 0. Furthermore, Stone–
Geisser’s Q2 values of 0.02, 0.15, and 0.35 suggest poor, middle, and severe predictive
relevance [91] and, consequently, the constructs had a low predictive relevance, since the
Q2 values were higher than 0.02 (trust). The other constructs had values of 0.35, except for
ATU (Q2 = 0.299). Thus, the proposed research model had high predictive power for the
explanation of BIU for the Bitcoin cryptocurrency using blockchain technology.
indirect effect of perceived ease of use in the partial relation between both constructs with
trust as the mediating variable.
Nevertheless, the most important condition for the implicit effect is to find the impor-
tance of a × b = path for risk × trust with respect to the path of trust × perceived ease of
use [94]. Taking this into account, we obtained results for this indirect effect (a × b = 0.136;
see Table 7) with SmartPLS.
This indirect effect was significant, since the confidence interval (CI) did not contain 0,
which confirms the effect of mediation 1. All results were obtained on the condition that
both the direct effect c’ and the indirect effects, a × b and c’, follow the identical positive
direction [93].
Figure 5. Mediation hypotheses. * p < 0.05; *** p < 0.001; N.S.—not supported.
In accordance with Hair et al. [71], decision-making cannot be based on the importance
of just one of the indicators. Consequently, criteria must be established after taking into
account the part that mediation has on the total effect of the independent variable on
the dependent variable (VAF = variation accounted for). The levels used in this study
were as follows: VAF > 80%, complete mediation; 20% ≤ VAF ≤ 80%, partial mediation;
VAF < 20%, no mediation [71].
The value obtained for the effect of mediation 1 was VAF = 0.503. This shows that
there was partial mediation of 50.31% [71]. The results for the remaining effects are
presented in the last column of Table 7, where it can be observed that there were partial
effects in mediations 1 and 3, which can be seen in the relationships of perceived ease of
use × perceived usefulness, perceived usefulness × attitude toward use, and perceived
ease of use × attitude toward use. The perceived usefulness variable mediated attitude
toward use by 27.14% (see Figure 6).
Mathematics 2021, 9, 355 15 of 22
6. Discussion
The adoption of Bitcoin cryptocurrency using blockchain technology as a means of
payment in companies and shopping centers was studied in this paper. The key factors
for the constructs in the model were proposed and then tested. In order to do this, a TAM
(technology acceptance model) adoption model was extended with new variables to find
the influence of risks, trust, privacy, and perceived security.
The results for the first three hypotheses with trust found that hypothesis H1 had
the highest t-value of all the studied hypotheses (β = 0.753, t = 20.467). The hypotheses
for the external variables of the original TAM model were all supported with the same
degree of confidence (99.9%). Therefore, trust did not show a significant influence on
perceived usefulness (β = 0.068; t = 0.758), meaning that H2 was not supported. However,
trust positively influenced perceived ease of use (β = 0.585, t = 6.748), thus supporting
H3. Therefore, trust influenced the perception of privacy and ease of use with a high level
of significance. These are characteristics which business executives and entrepreneurs
in the commerce sector want. This shows that the expansion of cryptocurrency will be
conditioned by the trust generated by the applications that manage Bitcoin transactions.
The perception of privacy will increase only when users truly trust Bitcoin.
The other external variable, risk, was found to have significant influence (95%) on trust
(β = 0.231; t = 2.319), which means that H4 was supported. Risk did not positively influence
PU (β = 0.025; t = 0.368); thus, H5 was not supported. Risk did, however, positively
influence perceived usefulness (β = 0.134; t = 2.054). These two results allowed hypotheses
H4 and H6 to be supported with a confidence level of 95%. This shows that the risks are not
extremely important, given the statistical values. There does not seem to be any perception
of risk in terms of the usefulness of the cryptocurrency, but the risks involved due to the
confidence that cryptocurrency can generate in the market are taken into account. The risks
due to the ease of use of the applications that manage cryptocurrency transactions are also
considered by managers and businessmen.
The privacy variable showed different behavior in H7 and H8. On the one hand, H7
was not supported because the relationship between privacy and PEOU did not reach the
minimum necessary statistical significance (β = 0.160; t = 1.620). On the other hand, H8
was supported, given that privacy did indeed influence PU (β = 0.510; t = 6.455) with a
confidence level of 99.9%, reaching the third-level path coefficient in the model, after H1
(trust × privacy) (β = 0.753; t = 20.467) and H3 (trust × PEOU) (β = 0.585; t = 6.748).
Regarding the TAM model hypothesis, Table 5 shows that PEOU was positively
associated with PU (β = 0.322, t = 3.180) and with ATU (β = 0.489, t = 6.332); therefore, H9
and H10 were compatible with the proposed model.
The results of the single linear regression from ATU to Bitcoin and BIU confirmed that
the attitude toward using was positively associated with behavioral intention to use for
Bitcoin (β = 0.265; t = 3.204). This means that H11 was supported.
The TAM model constructs that influenced behavioral intention to use, such as per-
ceived usefulness (PU) (β = 0.551; t = 7.001), all had a significant influence on the intention
to use. Therefore, H14 was supported for the proposed model with a confidence level
of 99.9%.
Likewise, another of the relationships in the TAM model, “perceived usefulness
positively influences attitude toward using”, H15, was confirmed and was compatible with
the proposed model (β = 0.318; t = 3.174) with a high level of confidence (99.9%).
The values obtained also indicated that our research model can explain 67.3% of the
variance in the behavioral intention to use variable for Bitcoin (R2 for behavioral intention
to use (BIU) = 56.5%). This explanatory capacity indicated that the model is sufficiently
capable of explaining acceptance by executives and entrepreneurs in the commerce sector
in Spain. Therefore, the result of the extension of TAM in our research is now able to
explain the acceptance of Bitcoin and the evolution of cryptography in Spain.
It may follow a similar path to other information systems in Spain, such as the imple-
mentation and use of Enterprise Resource Planning (ERPs) in companies [95–104], applica-
Mathematics 2021, 9, 355 17 of 22
tions for electronic commerce [105], file scanning systems [106], bank management using the
Internet [107], consumer electronics applications [108], or e-learning platforms [109–112].
The acceptance of all these information systems has been explained with extended TAM.
The model also has a predictive capacity (Q2 > 0 for the endogenous constructs), indicating
that the factors in this model may be crucial in the evolution of Bitcoin and similar future
cryptocurrencies in Spain.
Another external variable for the proposed TAM model was perceived security. This
construct was related to ATU (β = 0.271; t = 2.961) and H12 was, thus, supported with 99.9%
significance. In addition, it was also related to behavioral intention to use, but the relation-
ship between the two was not supported (β = 0.048; t = 0.711). This result is important
because it shows that perceived security influenced attitude toward use but did not directly
influence behavioral intention to use. Therefore, in the future, it will be important when
designing communication campaigns that improve the attitude of business executives and
entrepreneurs to the economic security of Bitcoin cryptocurrency transactions.
7. Conclusions
This manuscript studied the effect of this new form of digital money on the intention
to use it by the managers of the companies and shops in the study. Knowledge about
the factors that condition Bitcoin use is important for the expansion of cryptocurrencies.
The most important thing is to get companies to accept Bitcoin as a means of payment
because this will condition its expansion. The conclusions obtained in this study will help
developers and designers build decentralized systems and applications for peer-to-peer
transactions and implement sustainable business models using this cryptocurrency. It will
also help with the implementation of communication campaigns for Bitcoin because it
found the factors that condition Bitcoin acceptance by company executives in Spain.
The use of cryptocurrencies and blockchain technology is still limited. The data found
show that, in one of the most prosperous regions of Spain and of Europe, where gross
domestic product (GDP) rates are high, acceptance of cryptocurrency as a payment method
is still low. This research indicates that trust and privacy are crucial when it comes to
explaining acceptance of the cryptocurrency by companies. On the one hand, PU is affected
by privacy and PEOU is affected by trust and by risks to a lesser degree. This result will
be very important in future communication campaigns, as it indicates that, while privacy
is the main variable that improves PU, trust for the ease of use of Bitcoin transactions
applications is equally important. However, trust exerted a notable influence on privacy
and business executives and entrepreneurs identified privacy as an important factor for
cryptocurrency use.
Trust was also found to be a moderating variable in the risks × perceived ease of use
relationship, which means that trust affects the perception of the risks of using Bitcoin from
the exclusive point of view of ease of use of cryptocurrency transactions.
The risks of the use of cryptocurrency represent, to a lesser degree than the aforemen-
tioned factors, a positive factor that improves trust, thus influencing PEOU and, indirectly,
ATU and PU. Given that the moderate predictive power of the final model has been shown,
the lack of regulations for cryptocurrency use seems to be a clear driving factor. In other
words, users feel it is worth taking the risk when compared to being controlled by countries
and governments. This conclusion is a far stretch from the basic ethical standards for
citizens; however, perhaps strong fiscal pressure, a lack of awareness about the usefulness
of paying taxes, corruption by the authorities, or other factors could explain these findings.
One of the most interesting conclusions is the high trust given to Bitcoin. This means
that the use of cryptocurrencies will change a lot in coming years because governments will
have to regulate their use. However, this is no easy challenge, considering the cryptographic
foundations of blockchain technology. Perceived security helps improve the attitude that
companies have toward blockchain technology and this proven fact will promote a positive
view of Bitcoin use in other sectors of Spanish society, so that they will not just be seen as
tools for speculation.
Mathematics 2021, 9, 355 18 of 22
One of the findings showed that companies prefer to be paid with Bitcoin rather
than with other payment methods that involve intermediaries. This could mean that
cryptocurrencies might make credit cards and bank documents disappear as payment
methods. Thus, one of the most important conclusions of this study is the need for
companies, especially businesses and shops, to be prepared to receive payment in Bitcoin,
and for financial institutions to also be ready to offer their customers services which
include cryptocurrency [20,49,58] (Blundell-Wignall, 2014; Junadi and Fenrianto, 2015;
Folkinshteyn and Lennon, 2016).
This study was limited because it took into account companies with significant in-
come. Furthermore, business executives and entrepreneurs from the commerce sector were
surveyed; hence, the study was strongly influenced by this sector. Future studies could
cover different economic sectors, which are not as economically developed.
Author Contributions: Conceptualization, P.P.-S. and J.R.S.; methodology, P.P.-S.; software, P.P.-S.;
validation, J.R.S., and P.P.-S.; formal analysis, P.P.-S. and J.R.S.; resources, R.A.; writing—original draft
preparation, P.P.-S. and J.R.S.; writing—review and editing, P.P.-S. and J.R.S.; visualization, P.P.-S. and
J.R.S. All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
Appendix A
References
1. Gil-Cordero, E.; Cabrera-Sánchez, J.P.; Arrás-Cortés, M.J. Cryptocurrencies as a Financial Tool: Acceptance Factors. Mathematics
2020, 8, 1974. [CrossRef]
2. Liébana-Cabanillas, F.; Sánchez-Fernández, J.; Munoz-Leiva, F. Antecedents of the adoption of the new mobile payment systems:
The moderating effect of age. Comp. Human Behav. 2014, 35, 464–478. [CrossRef]
3. Yaya, O.S.; Ogbonna, E.A.; Mudida, R. Market Efficiency and Volatility Persistence of Cryptocurrency during Pre-and Post-Crash
Periods of Bitcoin: Evidence based on Fractional Integration. Int. J. Finance Econ. 2019. [CrossRef]
4. Urquhart, A.M. What Causes the Attention of Bitcoin? SSRN Electr. J. 2018. [CrossRef]
5. Trautman, L.J. Virtual Currencies; Bitcoin & What Now after Liberty Reserve, Silk Road, and Mt. Gox? Richmond J. Law Technol.
2014, 20, 1–108.
6. Gangwal, S.; Longin, F. Extreme movements in Bitcoin prices: A study based on extreme value theory. Work. Paper Ser. 2018,
8, 1–17.
7. Corbet, S.; Lucey, B.; Yarovaya, L. Datestamping the Bitcoin and Ethereum bubbles. Finance Res. Lett. 2018, 26, 81–88. [CrossRef]
8. Burchert, C.; Decker, C.; Wattenhofer, R. Scalable funding of Bitcoin micropayment channel networks. Royal Soc. Open Sci. 2018,
5, 180089. [CrossRef]
9. Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 2018, 61, 95–102. [CrossRef]
10. Simser, J. Bitcoin and modern alchemy: In code we trust. J. Financ. Crime 2015, 22, 156–169. [CrossRef]
11. Saberi, S.; Kouhizadeh, M.; Sarkis, J.; Shen, L. Blockchain technology and its relationships to sustainable supply chain management.
Int. J. Product. Res. 2018, 1–19. [CrossRef]
12. Saura, J.R.; Palos-Sanchez, P.; Velicia-Martin, F. What Drives Volunteers to Accept a Digital Platform That Supports NGO Projects?
Front. Psychol. 2020, 11, 429. [CrossRef] [PubMed]
13. Albuquerque, J.P.; Diniz, E.H.; Cernev, A.K. Mobile payments: A scoping study of the literature and issues for future research.
Inform. Dev. 2014. [CrossRef]
14. Kamble, S.; Gunasekaran, A.; Arha, H. Understanding the Blockchain technology adoption in supply chains-Indian context. Int. J.
Prod. Res. 2018, 1–25. [CrossRef]
15. Chen, Y. Blockchain tokens and the potential democratization of entrepreneurship and innovation. Bus. Horiz. 2018. [CrossRef]
16. Satoshi, N. Bitcoin: A Peer-To-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on
25 January 2021).
17. Roca, J.C.; Chiu, C.-M.; Martínez, F.J. Understanding e-learning continuance intention: An extension of the Technology Acceptance
Model. Int. J. Human-Comp. Stud. 2006, 64, 683–696. [CrossRef]
18. Diniz, E.H.; Cernev, A.K.; Nascimento, E. Mobile social money: An exploratory study of the views of managers of community
banks. Rev. Administr. 2016, 51, 299–309. [CrossRef]
19. DailyFX. Bitcoin Price (BTC/USD): BTC Live Chart, News & Analysis. 2021. Available online: https://www.dailyfx.com/bitcoin
(accessed on 22 January 2021).
20. Folkinshteyn, D.; Lennon, M. Braving Bitcoin: A technology acceptance model (TAM) analysis. J. Inform. Technol. Case Applicat.
Res. 2016, 18, 220–249. [CrossRef]
21. Davis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 1989, 13,
319–340. [CrossRef]
22. Hayes, A. Cryptocurrency Value Formation: An Empirical Analysis Leading to a Cost of Production Model for Valuing Bitcoin.
SSRN Electr. J. 2015. [CrossRef]
23. Presthus, W.; O’Malley, N.O. Motivations and Barriers for End-User Adoption of Bitcoin as Digital Currency. Proc. Comp. Sci.
2017, 121, 89–97. [CrossRef]
Mathematics 2021, 9, 355 20 of 22
24. Li, X.; Wang, C.A. The technology and economic determinants of cryptocurrency exchange rates: The case of Bitcoin. Decis.
Support. Syst. 2017, 95, 49–60. [CrossRef]
25. Francisco, K.; Swanson, D. The Supply Chain Has No Clothes: Technology Adoption of Blockchain for Supply Chain Transparency.
Logistics 2018, 2, 2. [CrossRef]
26. Jonker, N. What Drives Bitcoin Adoption by Retailers. SSRN Electr. J. 2018. [CrossRef]
27. Cheah, E.; Mishra, T.; Parhi, M.; Zhang, Z. Long Memory Interdependency and Inefficiency in Bitcoin Markets. Econ. Lett. 2018,
167, 18–25. [CrossRef]
28. Glaser, F.; Zimmermann, K.; Haferkorn, M.; Weber, M.; Siering, M. Bitcoin asset or currency? Revealing users hidden intentions.
In Proceedings of the European Conference on Information Systems, Tel Aviv, Israel, 9–11 June 2014.
29. Palos-Sanchez, P.R.; Arenas-Marquez, F.J.; Aguayo-Camacho, M. Cloud Computing (SaaS) Adoption as a Strategic Technology:
Results of an Empirical Study. Mobile Inform. Syst. 2017, 1–20. [CrossRef]
30. Sharma, S.K. Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network
modeling. Inform. Syst. Front. 2017, 1–13. [CrossRef]
31. Gumussoy, C.A.; Kaya, A.; Ozlu, E. Determinants of mobile banking use: An extended TAM with perceived risk, mobility access,
compatibility, perceived self-efficacy and subjective Norms. In Industrial Engineering in the Industry 4.0 Era; Springer: Cham,
Switzerland, 2018; pp. 225–238.
32. Venkatesh, V.; Davis, F.D. A theoretical extension of the technology acceptance model: Four longitudinal field studies. Manag. Sci.
2000, 46, 186–204. [CrossRef]
33. Baur, A.W.; Bühler, J.; Bick, M.; Bonorden, C.S. Cryptocurrencies as a Disruption? Empirical Findings on User Adoption
and Future Potential of Bitcoin and Co. In Proceedings of the Conference on e-Business, e-Services and e-Society, Delft, The
Netherlands, 13–15 October 2015; Springer: Cham, Switzerland, 2015; pp. 63–80.
34. Abramova, S.; Böhme, R. Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory
Study. In Proceedings of the International Conference on Information Systems, Dublin, Ireland, 11–14 December 2016; pp. 1–20.
[CrossRef]
35. Davis, F.D. A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results; Mas-
sachusetts Institute of Technology: Cambridge, MA, USA, 1986.
36. Venkatesh, V.; Morris, M.G.; Davis, G.B.; Davis, F.D. User acceptance of information technology: Towarda unified view. MIS
Quart. 2003, 27, 425–478. [CrossRef]
37. Venkatesh, V.; Ramesh, V. Web and wireless site usability: Understanding differences and modeling use. MIS Quart. 2006, 30,
181–206. [CrossRef]
38. Fathema, N.; Shannon, D.; Ross, M. Expanding the Technology Acceptance Model (TAM) to examine faculty use of Learning
Management Systems (LMS). J. Online Learn. Teach. 2015, 11, 210–233.
39. Fathema, N.; Ross, M.; Witte, M. Student acceptance of university web portals: A quantitative study. Int. J. Web Portals 2014, 6,
42–58. [CrossRef]
40. Marangunić, N.; Granić, A. Technology acceptance model: A literature review from 1986 to 2013. Univ. Access Inform. Soc. 2014,
14, 81–95. [CrossRef]
41. Turner, M.; Kitchenham, B.; Brereton, P.; Charters, S.; Budgen, D. Does the technology acceptance model predict actual use? A
systematic literature review. Inform. Softw. Technol. 2010, 52, 463–479. [CrossRef]
42. Wu, P.F. User Acceptance of Emergency Alert Technology: A Case Study. In Proceedings of the 6th International ISCRAM
Conference, Gothenburg, Sweden, 10–13 May 2009.
43. Taherdoost, H. A review of technology acceptance and adoption models and theories. Proc. Manuf. 2018, 22, 960–967. [CrossRef]
44. Palos-Sanchez, P.; Saura, J.R.; Martin-Velicia, F. A study of the effects of Programmatic Advertising on users’ Concerns about
Privacy overtime. J. Bus. Res. 2019, 96, 61–72. [CrossRef]
45. Venkatesh, V.; Morris, M.G. Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology
acceptance and usage behavior. MIS Quart. 2000, 24, 115–139. [CrossRef]
46. Venkatesh, V.; Thong, J.Y.; Xu, X. Consumer acceptance and use of information technology: Extending the unified theory of
acceptance and use of technology. MIS Quart. 2012, 36, 157–178. [CrossRef]
47. Davis, F.D.; Bagozzi, R.P.; Warshaw, P.R. User acceptance of computer technology: A comparison of two theoretical models.
Manag. Sci. 1989, 35, 982–1003. [CrossRef]
48. Junadi, S.; Fenrianto, J. A Model of Factors Influencing Consumers Intention to Use E-payment System in Indonesia. Proc. Comp.
Sci. 2015, 59, 214–220. [CrossRef]
49. Pavlou, P.A. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. Int.
J. Electron. Comm. 2003, 7, 101–134.
50. Dauda, S.Y.; Lee, J. Technology adoption: A conjoint analysis of consumers? preference on future online banking services. Inform.
Syst. 2015, 53, 1–15. [CrossRef]
51. Moore, T.; Christin, N. Beware the middleman: Empirical analysis of bitcoin-exchange risk. In Proceedings of the International
Conference on Financial Cryptography and Data Security 2013, Okinawa, Japan, 1–5 April 2013.
52. Urquhart, A. Price clustering in Bitcoin. Econ. Lett. 2017, 159, 145–148. [CrossRef]
Mathematics 2021, 9, 355 21 of 22
53. Thong, J.Y.; Venkatesh, V.; Xu, X.; Hong, S.-J.; Tam, K.Y. Consumer acceptance of personal information and communication
technology services. MIS Quart. 2011, 58, 613–625. [CrossRef]
54. Vijayasarathy, L.R. Predicting consumer intentions to use on-line shopping: The case for an augmented technology acceptance
model. Inform. Manag. 2004, 41, 747–762. [CrossRef]
55. Lee, L. New Kids on the Blockchain: How Bitcoin’s technology could reinvent the stock market. Hastings Bus. Law J. 2015, 12,
81–132. [CrossRef]
56. Kaplanov, N. Nerdy money: Bitcoin, the private digital currency, and the case against its regulation. Loy Consum. L Rev. 2012,
25, 111. [CrossRef]
57. Blundell-Wignall, A. The Bitcoin question: Currency versus trust-less transfer technology. OECD Work. Papers Finance Insur.
Private Pens. 2014, 1. [CrossRef]
58. Bradbury, D. The problem with Bitcoin. Comp. Fraud Secur. 2013, 2013, 5–8. [CrossRef]
59. Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal
model. Inform. Syst. Res. 2004, 15, 336–355. [CrossRef]
60. Saura, J.R. Using Data Sciences in Digital Marketing: Framework, Methods, and Performance Metrics. J. Innovat. Knowl. 2020, 1.
[CrossRef]
61. Reyes-Menendez, A.; Saura, J.R.; Stephen, B.T. Exploring Key Indicators of Social Identity in the #MeToo Era: Using Discourse
Analysis in UGC. Int. J. Inform. Manag. 2020, 54, 102129. [CrossRef]
62. Coinmap.org. Available online: http://coinmap.org/#/map/40.29838133/-2.97454834/9 (accessed on 23 October 2017).
63. Sarstedt, M.; Joseph, F.; Hair, C.M.; Ringle, K.O.T.; Gudergan, S.P. Estimation Issues with PLS and CBSEM: Where the Bias Lies! J.
Bus. Res. 2016, 69, 3998–4010. [CrossRef]
64. Henseler, J.; Hubona, G.; Ray, P.A. PLS path modeling in new technology research: Updated guidelines. Ind. Manag. Data Syst.
2016, 116, 2–20. [CrossRef]
65. Son, J.Y.; Benbasat, I. Organizational buyers’ adoption and use of B2B electronic marketplaces: Efficiency-and legitimacy-oriented
perspectives. J. Manag. Inform. Syst. 2007, 24, 55–99. [CrossRef]
66. Fornell, C.; Cha, J. Partial Least Squares. Adv. Methods Mark. Res. 1994, 407, 52–78.
67. Chin, W.W.; Newsted, P.R. Structural equation modeling analysis with small samples using partial least squares. Stat. Strat. Small
Sample Res. 1999, 1, 307–341.
68. Hair, J.F.; Ringle, C.M.; Sarstedt, M. PLS-SEM: Indeed a silver bullet. J. Mark. Theory Pract. 2011, 19, 139–152. [CrossRef]
69. Ringle, C.M.; Wende, S.B.M. SmartPLS 3; SmartPLS GmbH: Boenningstedt, Germany, 2015.
70. Reinartz, W.; Haenlein, M.; Henseler, J. An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM.
Int. J. Res. Mark. 2009, 26, 332–344. [CrossRef]
71. Hair, F.J., Jr.; Sarstedt, M.; Hopkins, L.G.; Kuppelwieser, V. Partial least squares structural equation modeling (PLS-SEM): An
emerging tool in business research. Eur. Bus. Rev. 2014, 26, 106–121. [CrossRef]
72. Muller, K.; Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Technometrics 1989, 31, 499. [CrossRef]
73. Hair, J.F.; Sarstedt, M.; Ringle, C.M.; Mena, J.A. An assessment of the use of partial least squares structural equation modeling in
marketing research. J. Acad. Mark. Sci. 2012, 40, 414–433. [CrossRef]
74. Cohen, J. A power primer. Psychol. Bull. 1992, 112, 155–519. [CrossRef]
75. Carmines, G.E.; Zeller, R.A. Reliability and Validity Assessment; Sage Publications: Newbury Park, CA, USA, 2008.
76. Hair, J.F.; Black, W.C.; Babin, B.J.; Anderson, R.E.; Tatham, R.L. Multivariate Data Analysis; Pearson Prentice Hall: Upper Saddle
River, NJ, USA, 2006; Volume 6.
77. Werts, C.E.; Linn, R.L.; Jöreskog, K.G. Intraclass reliability estimates: Testing structural assumptions. Educ. Psychol. Meas. 1974,
34, 25–33. [CrossRef]
78. Bagozzi, R.P.; Yi, Y. On the evaluation of structural equation models. J. Acad. Mark. Sci. 1988, 16, 74–94. [CrossRef]
79. Nunnally, J. Psychometric Methods; McGraw-Hill: New York, NY, USA, 1978.
80. Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res.
1981, 39–50. [CrossRef]
81. Henseler, J.; Ringle, C.M.; Sinkovics, R.R. The use of partial least squares path modeling in international marketing. In Advances in
International Marketing; Sinkovics, R.R., Ghauri, P.N., Eds.; Emerald Group Publishing Limited: Bradford, UK, 2009; pp. 277–319.
[CrossRef]
82. Henseler, J. Why generalized structured component analysis is not universally preferable to structural equation modeling. J. Acad.
Mark. Sci. 2012, 40, 402–413. [CrossRef]
83. Chin, W. How to write up and report PLS analyses. In Handbook of Partial Least Squares: Concepts, Methods and Applications;
Springer: Berlin, Germany, 2010.
84. Barclay, D.; Higgins, C.; Thompson, R. The Partial Least Squares (PLS) A roach to Causal Modelling: Personal Computer Adoption
and Use as an Illustration. Technol. Stud. 1995, 2, 285–309.
85. Hu, L.T.; Bentler, P.M. Fit indices in covariance structure modeling: Sensitivity to underparameterized model misspecification.
Psychol. Methods 1998, 3, 424. [CrossRef]
86. Hu, L.T.; Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives.
Struct. Eq. Model. Multidiscipl. J. 1999, 6, 1–55. [CrossRef]
Mathematics 2021, 9, 355 22 of 22
87. Henseler, J. Bridging Design and Behavioral Research With Variance-Based Structural Equation Modeling. J. Advertis. 2017, 46,
178–192. [CrossRef]
88. Chin, W.W. The partial least squares approach to structural equation modeling. Modern Methods Bus. Res. 1998, 295, 295–336.
89. Stone, M. Cross-validatory choice and assessment of statistical predictions. J. Royal Stat. Soc. 1974. [CrossRef]
90. Geisser, S. A Predictive Approach to the Random Effects Model. Biometrika 1974, 61, 101–107. [CrossRef]
91. Cohen, J. Statistical Power Analysis for the Behavioral Sciences, 2nd ed.; Erlbaum Associates: Hillsdale, NJ, USA, 1988.
92. Hayes, A.F.; Scharkow, M. The Relative Trustworthiness of Inferential Tests of the Indirect Effect in Statistical Mediation Analysis.
Psychol. Sci. 2013, 24, 1918–1927. [CrossRef] [PubMed]
93. Carrión, G.C.; Nitzl, C.; Roldán, J.L. Mediation Analyses in Partial Least Squares Structural Equation Modeling: Guidelines and
Empirical Examples. Part. Least Sq. Path Model. 2017, 173–195. [CrossRef]
94. Hernández-Perlines, F.; Moreno-García, J.; Yañez-Araque, B. The Mediating Role of Competitive Strategy in International
Entrepreneurial Orientation. J. Bus. Res. 2016, 69, 5383–5389. [CrossRef]
95. Lang, A.; Bradley, J.; Lee, S. The Motivation Activation Measure (MAM): How Well Does MAM Predict Individual Differences in
Physiological Indicators of Appetitive and Aversive Activation? Comm. Methods Meas. 2007, 1, 113–136. [CrossRef]
96. Bueno, S.; Salmeron, J.L. TAM-Based Success Modeling in ERP. Interact. Comp. 2008, 20, 515–523. [CrossRef]
97. Calisir, F.; Gumussoy, C.A.; Bayram, A. Predicting the Behavioral Intention to Use Enterprise Resource Planning Systems. Manag.
Res. News 2009, 32, 597–613. [CrossRef]
98. Kwahk, K.Y.; Lee, J. The Role of Readiness for Change in ERP Implementation: Theoretical Bases and Empirical Validation.
Inform. Manag. 2008, 45, 474–481. [CrossRef]
99. Lee, S.; Park, G.; Yoon, B.; Park, J. Open Innovation in SMEs—An Intermediated Network Model. Res. Policy 2010, 39, 290–300.
[CrossRef]
100. Shivers-Blackwell, S.; Atira, L.; Charles, C. Ready, Set, Go: Examining Student Readiness to Use ERP Technology. J. Manag. Dev.
2006, 25, 795–805. [CrossRef]
101. Sternad, S.; Bobek, S. Impacts of TAM-Based External Factors on ERP Acceptance. Proc. Technol. 2013, 9, 33–42. [CrossRef]
102. Sun, D.-L.; Chen, Z.; Ma, N.; Zhang, X.; Fu, X.; Zhang, D. Decision-Making and Prepotent Response Inhibition Functions in
Excessive Internet Users. CNS Spectrums 2009, 14, 75–81. [CrossRef]
103. Uzoka, F.-M.; Alice, E.; Shemi, P.; Seleka, G. Behavioral Influences on E-Commerce Adoption in a Developing Country Context.
Electr. J. Inform. Syst. Dev. Countries 2007, 31, 1–15. [CrossRef]
104. Youngberg, E.; Olsen, D.; Hauser, K. Determinants of Professionally Autonomous End User Acceptance in an Enterprise Resource
Planning System Environment. Int. J. Inform. Manag. 2009, 29, 138–144. [CrossRef]
105. Agrebi, S.; Jallais, J. Explain the Intention to Use Smartphones for Mobile Shopping. J. Retail. Cons. Serv. 2015, 22, 16–23.
[CrossRef]
106. Saura, J.R.; Rodriguez Herráez, B.; Reyes-Menendez, A. Comparing a traditional approach for financial Brand Communication
Analysis with a Big Data Analytics technique. IEEE Access 2019, 7. [CrossRef]
107. Yoon, S.H.L.; Steege, M.B. Development of a Quantitative Model of the Impact of Customers’ Personality and Perceptions on
Internet Banking Use. Comp. Human Behav. 2013, 29, 1133–1141. [CrossRef]
108. Palos-Sánchez, P.; Saura, J.R.; Álvarez-García, J. Innovation and creativity in the mobile applications industry: A case study of
mobile health applications (e-Health Apps). In Cultural and Creative Industries; Springer: Cham, Switzerland, 2019; pp. 121–135.
109. Rocío Sánchez, A.; Hueros, A.M.D. Plataformas Virtuales de Aprendizaje: Análisis Desde Su Adaptación a Estilos de Aprendizaje.
Rev. Venez. Gerenc. 2019. [CrossRef]
110. Ronnie, C.; Vogel, D. Predicting User Acceptance of Collaborative Technologies: An Extension of the Technology Acceptance
Model for e-Learning. Comp. Educ. 2013, 63, 160–175. [CrossRef]
111. Young, L.D.; Mark; Lehto, R. User Acceptance of YouTube for Procedural Learning: An Extension of the Technology Acceptance
Model. Comp. Educ. 2013, 61, 193–208. [CrossRef]
112. Shengcai, L.; Hu, Y.; Zhu, X.; Stan, L.Z. Person Re-Identification by Local Maximal Occurrence Representation and Metric
Learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 7–12
June 2015. [CrossRef]
113. Davis, F.D. User acceptance of information technology: System characteristics, user perceptions and behavioral impacts. Int. J.
Man-Mach. Stud. 1993, 38, 475–487. [CrossRef]
114. Agarwal, R.; Prasad, J. Are individual differences germane to the acceptance of new information technologies? Decis. Sci. 1999,
30, 361–391. [CrossRef]
115. Heijden, H. Factors influencing the usage of websites: The case of a generic portal in The Netherlands. Inform. Manag. 2003, 40,
541–549. [CrossRef]