Hubungan Keamanan Persepsian Terhadap Intensi Muzaki Membayar Zakat Menggunakan Aplikasi Digital

Authors

  • Wininda Qusnul Khotimah Universitas Muhammadiyah Prof. DR. HAMKA
  • Meita Larasati Universitas Muhammadiyah Prof. DR. HAMKA

DOI:

https://doi.org/10.22236/alurban_vol3/is2pp1-11

Keywords:

Communication and Information Technology, industrial revolution 4.0, perceived security, Zakat

Abstract

The purpose of this research is to investigate the relationship of perceived security and the intention of muzaki to use the application of digital transactions in paying zakat. The method of collecting samples in this study used a purposive sampling technique. The sample from this study is muzaki in Indonesia who has paid zakat digitally. This study uses a survey method using a research instrument in the form of a questionnaire. The questionnaire will be distributed to muzaki in Indonesia who have paid zakat digitally via email and google docs. Before testing the hypothesis, the researcher tests descriptive, validity and reliability statistics. All collected questionnaires were analyzed using the Pearson correlation. To measure the dimensions of perceived security, perceived security and intention of muzaki to use the application of digital transactions in paying zakat using a Likert scale, 1 means strongly disagree and 5 means strongly agree. The results of this study prove that perceived security has a positive relationship with the intention of muzaki to use digital applications
to pay zakat with a significant number of 0.002.

Downloads

Download data is not yet available.

References

Bodin, L.D., L.A. Gordon., M.P.
Loeb. 2005. Evaluating information
security Investments
using the analytic
hierarchy process, Communications
of the ACM
48 (2). 79–83
Davis, F.D. 1989. Perceived usefulness,
perceived ease of use, and
user accep tance of information
technology. MIS Quarterly,
13, 3, 319-340.
Davis, F.D, R.P., Bagozzi, P.R., Warshaw.
1989. User acceptance
of computer technology: a
comparison of two theoretical
models, Management Science
35. 982–1003
Gantz, S. 2008. Layered Security Architecture;
Establishing Authentication,
Authorization, and
Accountability [Online]. Security
Architecture Available:
Ghozali, Imam. 2011. Aplikasi Analisis
Multivariate Dengan Program
SPSS. Semarang: Badan Penerbit
Universitas Diponegoro.
Hamed, Taherdoost. 2016. Understanding
of E-Service Security
Dimensions and its Effect on
Quality and Intention to Use.
Information and Computer
Security . Vol: 25 Issue: 5. Pp.
535-559.
Hartono, E., Holsapple, C.W., Kim,
K.Y. 2014. Measuring perceived
security in B2C electronic
commerce website
usage: A respecification and
validation. Decision Support
System 62,. 11-21.
Hartono. 2008. SPSS. 16.0. Analisa
Data Statistika dan Penelitian.
Yogyakarta: Pustaka Pelajar.
Hartono, Jogiyanto. 2011. "•Konsep dan
Aplikasi Structural Equation
Modelling Berbasiskan Varian
dalam Penelitian Bisnis."–
STIM YKPN, Yogyakarta.
Hartono, Jogiyanto, dan Willy Abdillah.
2009. Konsep dan Aplikasi
PLS Untuk Penelitian Empiris.
BPFE-Yogyakarta.
Ghozali, Imam. 2011. Aplikasi Analisis
Multivariate Dengan Program
SPSS. Semarang: Badan Penerbit
Universitas Diponegoro.
Juan, R.C., Juan, J.G, Juan, J. 2009.
The Importance of Percieved
78
Winanda Qusnul Khotimah -
Trust, Security and Privacy
in Online Trading Systems.
Information Management &
Computer Security, Vol:17 Issue:
2. Pp.93-113.
Kashif, M., Jamal, K.F., Rehman, M.A.,
2016. The Dinamics of Zakat
Donation Experience Among
Muslims: A Phenomenological
Inquiry. Journal of Islamic
Accounting and Business Research.
Vol: 9, Issue: 1 ,pp.45-
58.
Kim, C, W. Tao, N. Shin, K.S. Kim.
2010. An empirical study of
customers' perceptions of security
and trust in e-payment
systems, Electronic Commerce
Research and Applications
9.84–95
Matic, Matea. Katija Vojvodic. 2014.
Customer-Perceived Insecurity
of Online Shopping
Environment. International
Review of Management
and Marketing Vol. 4, No. 1,
pp.59-65. ISSN: 2146-4405
Mehta, M., Singh, S., Lee,Y. 2000. Security
in E-Services and Application.
Network Security,
pp.1-11.
Muhammad. Sani Adamu., Saad, Ram
Al-Jaffri. 2015. Moderating
Effect of Attitude Toward
Zakat Payment on the Relationship
Between Moral Reasoning
and Intention to Pay
Zakat. Global Business and
Social Science, Kuala Lumpur
: Malaysia. Pp. 520-527.
Norazlina, A.W., Zairy, Z., Mahyuddin,
A.B., Towards Developing
Service Quality Index for
Zakat Institutions. Journal of
Islamic Accounting and Business
Research , Vol:8 Issue:3.
Pp. 326-333.
Kaur, J., & Rashid, N, D, N. 2008. Malaysian
Electronic Government
Adoption Barriers. Public
Sector ICT Management Review,
2(1): 38-43
Ryan, J.J, D.J. Ryan. 2005. Proportional
hazards in information
security [electronic version],
Risk Analysis: An International
Journal 25. 141–149.
Schwab, Klaus. 2016. The Global Competitiveness
Report 2016-
2017. Geneva: World Economic
Forum. Diunduh pada
09 Oktober 2016. Tersedia
pada https://www.weforum.
org
Shah, M.H, H.R. Peikarib, N.M. Yasin.
2014. The determinants of
individuals' perceived e-security:
Evidence from Malaysia,
International Journal of
Information Management 34,
48-57.
Shin, D.H. 2010. Ubiquitous computing
acceptance model: end user
concern about security, privacy
and risk, International
Journal of Mobile Communications
8 (2)169–186.
Tsiakis, T, G. Sthephanides. 2005. The
concept of security and trust
in electronic payments, Journal
of Computer Security
24.10–15
Zamzuri, Z, F., Manaf, M., Yunus, Y., &
Ahmad, A. 2013. Student perception
on security requirement
of e-learning services,
79
Procedia - Social and Behavioral
Sciences, 90, 923 – 930.
Zhang, Y., Deng, X., Wei, D. & Deng, Y.
2012. Assessment of E-Commerce
security using AHP and
evidential reasoning. Expert
Systems with Applications,
39. 3611-3623

Downloads

Published

2019-10-02

How to Cite

Khotimah, W. Q., & Larasati, M. (2019). Hubungan Keamanan Persepsian Terhadap Intensi Muzaki Membayar Zakat Menggunakan Aplikasi Digital. Al-Urban: Jurnal Ekonomi Syariah Dan Filantropi Islam, 3(1), 68–80. https://doi.org/10.22236/alurban_vol3/is2pp1-11

Issue

Section

Articles