Skip to main content
Log in

Resistance to change: six reasons why businesses don’t use e-signatures

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Over the last decade, various pieces of legislation have been enacted and policies developed both on national and international fronts in order to promote the usage of electronic signatures. However, paper-based signatures are still the preferred instrument to electronic signatures for entering into contracts and commercial transactions. What are the causes of this apathy on the part of the business community? Why is there a resistance towards electronic signatures in this era of e-business?

This paper conducts a comprehensive empirical investigation to examine factors that have contributed to the low acceptance of electronic signatures, in particular the digital signature, in the Australian business community. The six main factors that have been identified are: the prevailing culture and customs associated with manuscript signatures; ignorance about the electronic signature technology; legal concerns; security issues; the cost of using the technology; and the complexity associated with its setting up and usage. The paper also makes some useful suggestions that may encourage businesses to use electronic signatures in order to facilitate the growth of e-commerce.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A standards-based biometric smart card—at what cost? (2008). Biometric Technology Today, 16(1), 3–4.

    Google Scholar 

  2. Ackerman, M. S., & Davis, D. T. (2003). Privacy and security issues in e-commerce. In D. C. Jones (Ed.), New economy handbook. San Diego: Academic Press.

    Google Scholar 

  3. Anderson, J. C., & Closen, M. L. (1999). Document authentication in electronic commerce: the misleading notary public analog for the Digital Signature Certification Authority. The John Marshall Journal of Computer & Information Law, 17(3), 833.

    Google Scholar 

  4. Australia (2001). Corporations Act 2001 (Cth).

  5. Australian Bureau of Statistics (2010). Business use of information technology. Available at http://www.ausstats.abs.gov.au. Accessed 17 June 2010.

  6. Australian Government (2001). Government role in B2B e-commerce. Canberra: Department of Communications, Information Technology and the Arts. Available at http://www.archive.dcita.gov.au/2001/10/b2b_e-commerce/role. Accessed 12 December 2010.

  7. Backhouse, J. (2002). Assessing the certification authorities: guarding the guardians of secure e-commerce? Journal of Financial Crime, 9(3), 217–226.

    Article  Google Scholar 

  8. Beer, M. (1980). Organization change and development: a systems view. Santa Monica: Goodyear.

    Google Scholar 

  9. Brazell, L. (2004). Electronic signatures law and regulation. London: Sweet & Maxwell.

    Google Scholar 

  10. Christensen, S. A., Duncan, W., & Low, R. (2003). The statute of frauds in the digital age—maintaining the integrity of signatures. Murdoch University Electronic Journal of Law, 10(4). Available at http://www.murdoch.edu.au/elaw/issues/v10n4/christensen104.html. Accessed 26 September 2010.

  11. Commission of the European Communities (2006). Report on the operation of Directive 1999/93/EC on a Community framework for electronic signatures. Available at http://ec.europa.eu/information_society/eeurope/i2010/docs/single_info_space/com_electronic_signatures_report_en.pdf. Accessed 11 May 2010.

  12. Davis, D. (1996). Compliance defects in public-key cryptography. Paper presented at the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography, San Jose, California, 22–25 July 1996.

  13. Emerson, R. W., Stevenson, B. (1967). Stevenson’s book of quotations: classical and modern (10th edn.). London: Cassell.

    Google Scholar 

  14. Financial Services Technology (2007). Electronic signature solutions: enabling the paperless enterprise. Available at http://www.usfst.com/article/Electronic-Signature-Solutions-Enabling-the-Paperless-Enterprise/. Accessed 18 September 2010.

  15. Fisher, W., & Wesolkowski, S. (1999). The social and economic costs of technology resistance. IEEE Canadian Review, Winter, 14.

  16. Fitzgerald, B., Fitzgerald, A., Middleton, G., Lim, Y., & Beale, T. (2007). Internet and e-commerce law: technology, law and policy. Pyrmont: Lawbook.

    Google Scholar 

  17. Ford, J. D., Ford, L. W., & McNamara, R. T. (2002). Resistance and the background conversations of change. Journal of Organizational Change Management, 15(2), 105–121.

    Article  Google Scholar 

  18. Furnell, S. (2005). Authenticating ourselves: will we ever escape the password? Network Security, 3, 8–13.

    Google Scholar 

  19. Gelboard, B. (2000). Signing Your 011001010: the problems of digital signatures. Communications of the ACM, 43(12), 27.

    Article  Google Scholar 

  20. Greenberg, J., & Baron, R. A. (2008). Behavior in organizations. Upper Saddle River: Prentice Hall.

    Google Scholar 

  21. Hague Conference on Private International Law and the e-APP (2009). Electronic Apostille Pilot Program. Available at http://www.hcch.net/index_en.php. Accessed 30 November 2009.

  22. Hannan, M., & Freeman, J. (1988). Structural inertia and organizational change. In K. Cameron, R. I. Sutton, & D. A. Whetton (Eds.), Readings in organizational decline: frameworks, research, and prescriptions. Cambridge: Ballinger.

    Google Scholar 

  23. Huntley, J. (2007). Book review: electronic signatures, law and regulation by Lorna Brazell. International Journal of Law and Information Technology, 15(2), 227–229.

    Article  Google Scholar 

  24. Jueneman, R. R., & Robertson, R. J. (1998). Biometrics and digital signatures in electronic commerce. Jurimetrics, 38(3), 427–457.

    Google Scholar 

  25. Kearns, B. (2004). Technology and change management. Available at http://www.comp.dit.ie/rfitzpatrick/MSc_Publications/2004_Brenda_Kearns.pdf. Accessed 25 April 2010.

  26. Kingpin, J. (2000). Attacks on and countermeasures for USB hardware token devices. Paper presented at the 5th Nordic Workshop on Secure IT Systems Encouraging Co-operation, Reykjavik, Iceland, 12–13 October 2000.

  27. Kotter, J. P., & Schlesigner, L. A. (1979). Choosing strategies for change. Harvard Business Review, 57(2), 106–114.

    Google Scholar 

  28. McCullagh, A., & Caelli, W. J. (2000). Non-repudiation in the digital environment. First Monday 5(8). Available at http://firstmonday.org/htbin/cgiwrap/bin/ojs/index. php/fm/article/view/778/687. Accessed 28 January 2006.

  29. McCullagh, A., Little, P., & Caelli, W. (1998). Electronic signatures: understand the past to develop the future. University of New South Wales Law Journal, 21(2), 452–465.

    Google Scholar 

  30. Metselaar, E. E. (1997). Assessing the willingness to change: construction and validation of the dinamo. Amsterdam: Free University of Amsterdam. Quoted in J. Vos (2006). The role of personality and emotions in employee resistance to change. Master Thesis, Erasmus University, 2006.

  31. Omychund v Barker (1745). 26 ER 15.

  32. Parliament of Victoria. Drugs and Crime Prevention Committee (2004). Inquiry into fraud and electronic commerce: final report. Available at http://www.parliament.vic.gov.au/images/stories/committees/dcpc/DCPC_FraudElectronicCommerce_05-01-2004.pdf. Accessed 21 September 2010.

  33. Perry, R. (2003). E-conveyancing: problems ahead? Conveyancer and Property Lawyer, 67, 215–224.

    Google Scholar 

  34. Praca, D., & Barral, C. (2001). From smart cards to smart objects: the road to new smart technologies. Computer Networks, 36(4), 381–389.

    Article  Google Scholar 

  35. Pun, K. H., Hui, L., Chow, K. P., Tsang, W. W., Chong, C. F., & Chan, H. W. (2002). Review of the electronic transactions ordinance: can the personal identification number replace the digital signature? Hong Kong Law Journal, 32, 241.

    Google Scholar 

  36. Ritchie, J., & Spencer, L. (1994). Qualitative data analysis for applied policy research. In A. Bryman & R. G. Burgess (Eds.), Analysing qualitative data. London: Routledge.

    Google Scholar 

  37. Roßnagel, H. (2006). On diffusion and confusion: why electronic signatures have failed. In S. Fischer-Hübner, J. Lopez, & G. Pernul (Eds.), Trust and privacy in digital business: third international conference, TrusBus: proceedings, Krakow, Poland, September 4–8, 2006. Berlin: Springer.

    Google Scholar 

  38. Rogers, W. A., Fisk, A. D., & Walker, N. (Eds.) (1996). Aging and skilled performance: advances in theory and applications. Mahwah: Lawrence Erlbaum Associates.

    Google Scholar 

  39. Rumelt, R. P. (1995). Inertia and transformation. In C. A. Montgomery (Ed.), Resource-based and evolutionary theories of the firm: towards a synthesis. Boston: Kluwer Academic.

    Google Scholar 

  40. Schultz, E. (2002). The gap between cryptography and information security. Computers & Security, 21(8), 674–676.

    Article  Google Scholar 

  41. Shark Tank (2003). Not exactly what the doctor ordered. Computerworld, 29 January. Available at http://blogs.computerworld.com/sharky/20030129. Accessed 22 March 2010.

  42. Sneddon, M. (2000). Legal liability and e-transactions: a scoping study for the National Electronic Authentication Council. Canberra: National Office for the Information Economy. Available at http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan014676.pdf. Accessed 26 September 2010.

  43. Spector, B. A. (1989). From bogged down to fired up: inspiring organizational change. Sloan Management Review, 30(4), 29–34.

    Google Scholar 

  44. Srivastava, A. (2005). Educating businesses about electronic signatures. International Journal of Business and Management Education. Available at http://www.usq.edu.au/business/research/ijbme/articles. Accessed 28 September 2010.

  45. Tuesday, V. (2002). User indifference thwarts electronic signature effort. Computerworld, 14 January. Available at http://www.computerworld.com/securitytopics/security/story/0,10801,67303,00.html. Accessed 28 January 2010.

  46. UNCITRAL (1996). UNCITRAL model law on electronic commerce. Available at http://www.uncitral.org/uncitral/en/uncitral_texts/electronic_commerce/1996Model.html. Accessed 15 July 2010.

  47. UNCITRAL (2001). Guide to enactment of the UNCITRAL model law on electronic signatures. Available at http://www.uncitral.org/pdf/english/texts/electcom/ml-elecsig-e.pdf. Accessed 5 August 2009.

  48. Worthington, T. (2006). Digital evidence for lawyers and IT professionals. Net Traveller, August 13. Available at http://blog.tomw.net.au/2006/08/digital-evidence-for-lawyers-and-it.html. Accessed 27 June 2010.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aashish Srivastava.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Srivastava, A. Resistance to change: six reasons why businesses don’t use e-signatures. Electron Commer Res 11, 357–382 (2011). https://doi.org/10.1007/s10660-011-9082-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-011-9082-4

Keywords

Navigation