Abstract
Over the last decade, various pieces of legislation have been enacted and policies developed both on national and international fronts in order to promote the usage of electronic signatures. However, paper-based signatures are still the preferred instrument to electronic signatures for entering into contracts and commercial transactions. What are the causes of this apathy on the part of the business community? Why is there a resistance towards electronic signatures in this era of e-business?
This paper conducts a comprehensive empirical investigation to examine factors that have contributed to the low acceptance of electronic signatures, in particular the digital signature, in the Australian business community. The six main factors that have been identified are: the prevailing culture and customs associated with manuscript signatures; ignorance about the electronic signature technology; legal concerns; security issues; the cost of using the technology; and the complexity associated with its setting up and usage. The paper also makes some useful suggestions that may encourage businesses to use electronic signatures in order to facilitate the growth of e-commerce.
Similar content being viewed by others
References
A standards-based biometric smart card—at what cost? (2008). Biometric Technology Today, 16(1), 3–4.
Ackerman, M. S., & Davis, D. T. (2003). Privacy and security issues in e-commerce. In D. C. Jones (Ed.), New economy handbook. San Diego: Academic Press.
Anderson, J. C., & Closen, M. L. (1999). Document authentication in electronic commerce: the misleading notary public analog for the Digital Signature Certification Authority. The John Marshall Journal of Computer & Information Law, 17(3), 833.
Australia (2001). Corporations Act 2001 (Cth).
Australian Bureau of Statistics (2010). Business use of information technology. Available at http://www.ausstats.abs.gov.au. Accessed 17 June 2010.
Australian Government (2001). Government role in B2B e-commerce. Canberra: Department of Communications, Information Technology and the Arts. Available at http://www.archive.dcita.gov.au/2001/10/b2b_e-commerce/role. Accessed 12 December 2010.
Backhouse, J. (2002). Assessing the certification authorities: guarding the guardians of secure e-commerce? Journal of Financial Crime, 9(3), 217–226.
Beer, M. (1980). Organization change and development: a systems view. Santa Monica: Goodyear.
Brazell, L. (2004). Electronic signatures law and regulation. London: Sweet & Maxwell.
Christensen, S. A., Duncan, W., & Low, R. (2003). The statute of frauds in the digital age—maintaining the integrity of signatures. Murdoch University Electronic Journal of Law, 10(4). Available at http://www.murdoch.edu.au/elaw/issues/v10n4/christensen104.html. Accessed 26 September 2010.
Commission of the European Communities (2006). Report on the operation of Directive 1999/93/EC on a Community framework for electronic signatures. Available at http://ec.europa.eu/information_society/eeurope/i2010/docs/single_info_space/com_electronic_signatures_report_en.pdf. Accessed 11 May 2010.
Davis, D. (1996). Compliance defects in public-key cryptography. Paper presented at the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography, San Jose, California, 22–25 July 1996.
Emerson, R. W., Stevenson, B. (1967). Stevenson’s book of quotations: classical and modern (10th edn.). London: Cassell.
Financial Services Technology (2007). Electronic signature solutions: enabling the paperless enterprise. Available at http://www.usfst.com/article/Electronic-Signature-Solutions-Enabling-the-Paperless-Enterprise/. Accessed 18 September 2010.
Fisher, W., & Wesolkowski, S. (1999). The social and economic costs of technology resistance. IEEE Canadian Review, Winter, 14.
Fitzgerald, B., Fitzgerald, A., Middleton, G., Lim, Y., & Beale, T. (2007). Internet and e-commerce law: technology, law and policy. Pyrmont: Lawbook.
Ford, J. D., Ford, L. W., & McNamara, R. T. (2002). Resistance and the background conversations of change. Journal of Organizational Change Management, 15(2), 105–121.
Furnell, S. (2005). Authenticating ourselves: will we ever escape the password? Network Security, 3, 8–13.
Gelboard, B. (2000). Signing Your 011001010: the problems of digital signatures. Communications of the ACM, 43(12), 27.
Greenberg, J., & Baron, R. A. (2008). Behavior in organizations. Upper Saddle River: Prentice Hall.
Hague Conference on Private International Law and the e-APP (2009). Electronic Apostille Pilot Program. Available at http://www.hcch.net/index_en.php. Accessed 30 November 2009.
Hannan, M., & Freeman, J. (1988). Structural inertia and organizational change. In K. Cameron, R. I. Sutton, & D. A. Whetton (Eds.), Readings in organizational decline: frameworks, research, and prescriptions. Cambridge: Ballinger.
Huntley, J. (2007). Book review: electronic signatures, law and regulation by Lorna Brazell. International Journal of Law and Information Technology, 15(2), 227–229.
Jueneman, R. R., & Robertson, R. J. (1998). Biometrics and digital signatures in electronic commerce. Jurimetrics, 38(3), 427–457.
Kearns, B. (2004). Technology and change management. Available at http://www.comp.dit.ie/rfitzpatrick/MSc_Publications/2004_Brenda_Kearns.pdf. Accessed 25 April 2010.
Kingpin, J. (2000). Attacks on and countermeasures for USB hardware token devices. Paper presented at the 5th Nordic Workshop on Secure IT Systems Encouraging Co-operation, Reykjavik, Iceland, 12–13 October 2000.
Kotter, J. P., & Schlesigner, L. A. (1979). Choosing strategies for change. Harvard Business Review, 57(2), 106–114.
McCullagh, A., & Caelli, W. J. (2000). Non-repudiation in the digital environment. First Monday 5(8). Available at http://firstmonday.org/htbin/cgiwrap/bin/ojs/index. php/fm/article/view/778/687. Accessed 28 January 2006.
McCullagh, A., Little, P., & Caelli, W. (1998). Electronic signatures: understand the past to develop the future. University of New South Wales Law Journal, 21(2), 452–465.
Metselaar, E. E. (1997). Assessing the willingness to change: construction and validation of the dinamo. Amsterdam: Free University of Amsterdam. Quoted in J. Vos (2006). The role of personality and emotions in employee resistance to change. Master Thesis, Erasmus University, 2006.
Omychund v Barker (1745). 26 ER 15.
Parliament of Victoria. Drugs and Crime Prevention Committee (2004). Inquiry into fraud and electronic commerce: final report. Available at http://www.parliament.vic.gov.au/images/stories/committees/dcpc/DCPC_FraudElectronicCommerce_05-01-2004.pdf. Accessed 21 September 2010.
Perry, R. (2003). E-conveyancing: problems ahead? Conveyancer and Property Lawyer, 67, 215–224.
Praca, D., & Barral, C. (2001). From smart cards to smart objects: the road to new smart technologies. Computer Networks, 36(4), 381–389.
Pun, K. H., Hui, L., Chow, K. P., Tsang, W. W., Chong, C. F., & Chan, H. W. (2002). Review of the electronic transactions ordinance: can the personal identification number replace the digital signature? Hong Kong Law Journal, 32, 241.
Ritchie, J., & Spencer, L. (1994). Qualitative data analysis for applied policy research. In A. Bryman & R. G. Burgess (Eds.), Analysing qualitative data. London: Routledge.
Roßnagel, H. (2006). On diffusion and confusion: why electronic signatures have failed. In S. Fischer-Hübner, J. Lopez, & G. Pernul (Eds.), Trust and privacy in digital business: third international conference, TrusBus: proceedings, Krakow, Poland, September 4–8, 2006. Berlin: Springer.
Rogers, W. A., Fisk, A. D., & Walker, N. (Eds.) (1996). Aging and skilled performance: advances in theory and applications. Mahwah: Lawrence Erlbaum Associates.
Rumelt, R. P. (1995). Inertia and transformation. In C. A. Montgomery (Ed.), Resource-based and evolutionary theories of the firm: towards a synthesis. Boston: Kluwer Academic.
Schultz, E. (2002). The gap between cryptography and information security. Computers & Security, 21(8), 674–676.
Shark Tank (2003). Not exactly what the doctor ordered. Computerworld, 29 January. Available at http://blogs.computerworld.com/sharky/20030129. Accessed 22 March 2010.
Sneddon, M. (2000). Legal liability and e-transactions: a scoping study for the National Electronic Authentication Council. Canberra: National Office for the Information Economy. Available at http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan014676.pdf. Accessed 26 September 2010.
Spector, B. A. (1989). From bogged down to fired up: inspiring organizational change. Sloan Management Review, 30(4), 29–34.
Srivastava, A. (2005). Educating businesses about electronic signatures. International Journal of Business and Management Education. Available at http://www.usq.edu.au/business/research/ijbme/articles. Accessed 28 September 2010.
Tuesday, V. (2002). User indifference thwarts electronic signature effort. Computerworld, 14 January. Available at http://www.computerworld.com/securitytopics/security/story/0,10801,67303,00.html. Accessed 28 January 2010.
UNCITRAL (1996). UNCITRAL model law on electronic commerce. Available at http://www.uncitral.org/uncitral/en/uncitral_texts/electronic_commerce/1996Model.html. Accessed 15 July 2010.
UNCITRAL (2001). Guide to enactment of the UNCITRAL model law on electronic signatures. Available at http://www.uncitral.org/pdf/english/texts/electcom/ml-elecsig-e.pdf. Accessed 5 August 2009.
Worthington, T. (2006). Digital evidence for lawyers and IT professionals. Net Traveller, August 13. Available at http://blog.tomw.net.au/2006/08/digital-evidence-for-lawyers-and-it.html. Accessed 27 June 2010.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Srivastava, A. Resistance to change: six reasons why businesses don’t use e-signatures. Electron Commer Res 11, 357–382 (2011). https://doi.org/10.1007/s10660-011-9082-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10660-011-9082-4