information. For example, in addition to the id and
security checking, the company could implement a
rating technique, which would show the trustworthy
users from those who are not and take the necessary
procedures against the latter.
The author might advise the following for
future scholars, specifically:
Conduct research on similar companies
to the one at hand to compare the
findings.
Because this study only looks at the
relationship between the variable
perceived privacy, security, and trust as
an intermediary variable, future
researchers are urged to include
additional factors that have a
significant impact on the continuance
use intention.
Conduct research utilizing the most
recent and varied sources of perceived
privacy, security, trust, and
continuance use intention.
Acknowledgment:
We would like to thank LPPM Telkom University
for supporting this publication.
References:
[1] Ali, S., Islam, N., Rauf, A., Din, I. U.,
Guizani, M., & Rodrigues, J. J. P. C. (2018).
Privacy and security issues in online social
networks. Future Internet, 12, 1–12.
https://doi.org/10.3390/fi10120114
[2] Putri, Y. I., Pradana, M., Utami, F. N.,
Nugraha, D. W., & Karnovi, R. (2021). The
Influence of Brand Ambassador on E-
Commerce Purchase Intention. In Proceedings
of the International Conference on Industrial
Engineering and Operations Managementt
(pp. 6848-6855).
[3] Rehman, I. (2019).
DigitalCommons@University of Nebraska-
Lincoln Facebook- Cambridge Analytica data
harvesting: What you need to know
Facebook-Cambridge Analytica data
harvesting: What you need to know.
https://digitalcommons.unl.edu/libphilpra
[4] Pelau, C., Stanescu, M., & Serban, D. (2019).
Big-Data and Consumer Profiles – The hidden
traps of data collection on social media
networks. Proceedings of the International
Conference on Business Excellence, 13(1),
1070–1078. https://doi.org/10.2478/picbe-
2019-0093
[5] Pradana, M., Rintaningrum, R., Kosov, M.,
Bloshenko, T., Rogova, T., & Singer, N.
(2022). Increasing the Effectiveness of
Educational Technologies in the Foreign
Languages Learning Process by Linguistic
Students (Comparative Analysis of Russian,
Indonesian and Egyptian Experience). In
Frontiers in Education (p. 784). Frontiers.
[6] Gusfei, A.D., Pradana, M. (2022). The Effect
of E-Service Quality and E-Trust on Mobile
Payment Application E-Customer Loyalty
Through E-Customer Satisfaction as
Intervening Variable. Res Militaris, 12(2), pp.
166–180.
[7] Jain, P., Gyanchandani, M., & Khare, N.
(2016). Big data privacy: a technological
perspective and review. Journal of Big Data,
3(1). https://doi.org/10.1186/s40537-016-
0059-y
[8] Li, J., Manafian, J., Wardhana, A., Othman,
A. J., Husein, I., Al-Thamir, M., & Abotaleb,
M. (2022). N-Lump to the (2+ 1)-Dimensional
Variable-Coefficient Caudrey–Dodd–Gibbon–
Kotera–Sawada Equation. Complexity, 2022.
[9] Laudon, K. C., & Laudon, J. P. (2014).
Manajemen Information System: Managing
the Digital Firm. In New Jersey: Prentice
Hall.
[10] Zhiwei, Y., & Zhongyuan, J. (2012). A
Survey on the Evolution of Risk Evaluation
for Information Systems Security. Energy
Procedia, 17, 1288–1294.
https://doi.org/10.1016/j.egypro.2012.02.240
[11] Anderson, J. (2013). Fundamentals of
Fundamentals of. Zitelli and Davis’ Atlas of
Pediatric Physical Diagnosis, 5(March), 447–
469. https://www.crcpress.com/Fundamentals-
of-
Picoscience/Sattler/p/book/9781466505094#g
ooglePreviewContainer
[12] Laudon, K. C., & Laudon, J. P. (2014).
Manajemen Information System: Managing
the Digital Firm. In New Jersey: Prentice
Hall.
[13] Zhiwei, Y., & Zhongyuan, J. (2012). A
Survey on the Evolution of Risk Evaluation
for Information Systems Security. Energy
Procedia, 17, 1288–1294.
https://doi.org/10.1016/j.egypro.2012.02.240
[14] Anderson, J. (2013). Fundamentals of
Fundamentals of. Zitelli and Davis’ Atlas of
WSEAS TRANSACTIONS on ENVIRONMENT and DEVELOPMENT
DOI: 10.37394/232015.2023.19.47
Hicham Riache, Mahir Pradana