Next Article in Journal
Variation Characteristics of Particle Surface Electrochemical Properties during the Improvement of Reclaimed Soil from Hollow Village in Loess Area
Next Article in Special Issue
Blockchain-Based Anti-Counterfeiting Management System for Traceable Luxury Products
Previous Article in Journal
The Impact of Corporate Innovation on Environmental Performance: The Moderating Effect of Financing Constraints and Government Subsidies
Previous Article in Special Issue
Blockchain-Based Land Management for Sustainable Development
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Factors Affecting Organisations’ Adoption Behaviour toward Blockchain-Based Distributed Identity Management: The Sustainability of Self-Sovereign Identity in Organisations

by
Sarah Mulombo Mulaji
* and
Sumarie Roodt
Department of Information Systems, University of Cape Town, Rondebosch, Cape Town 7701, South Africa
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(18), 11534; https://doi.org/10.3390/su141811534
Submission received: 31 July 2022 / Revised: 2 September 2022 / Accepted: 6 September 2022 / Published: 14 September 2022
(This article belongs to the Collection Blockchain Technology)

Abstract

:
Blockchain-based Distributed Identity Management (BDIDM) can enhance sustainable identification and authentication of users on organisations’ digital systems. But there is not a clear consensus on how organisations perceive the value proposition of such technology, nor what might affect their adoption behaviour toward it. This research explains how technological, organisational and environmental (TOE) factors affect organisations’ adoption behaviour toward BDIDM. This study aims to determine the most critical factors affecting the behaviour while assessing the effectiveness and appropriateness of the model involved, i.e., TOE-BDIDM. Online questionnaires are used to survey 111 information and cybersecurity practitioners within South African organisations. The analysis combines binary logistic regression modelling, Structural Equation Modelling of the measurement model, and chi-squared tests. The results suggest TOE factors positively or negatively affect adoption behaviour. The behaviour is significantly affected by technology characteristics, i.e., BDIDM’s disruptive nature, and is associated with Blockchain type. Indeed, the majority of participants intended to recommend BDIDM to their organisations yet paradoxically preferred private-permissioned blockchain the most, revealing resistance to decentralised and privacy-preserving BDIDM models like Self-Sovereign Identity (SSI). The latter might be utopian or unsustainable for organisations. TOE-BDIDM was found relatively appropriate and effective but arguably ‘incomplete’ for explaining the adoption of disruptive technologies like SSI in organisations. TOE should extend to TOEU by including the User factors.

1. Introduction

Identity management (IDM) is the first security barrier of a digital system that consists of identification and authentication of users to mitigate security breaches. Identification labels each user with an identifier, while authentication allows them to prove they are who they claim to be [1]. However, just about all authentication methods (such as passwords, biometrics, tokens, etc.) can be compromised since they have known vulnerabilities that could be exploited [1]. When users’ credentials are compromised, the security of every system relying on them to authorise access is also compromised [2]. Multi-factor authentication is perceived to overcome this issue and offer better identity proofing [3]. Nevertheless, organisations still experience data breaches. Personal identifiable information (PII), from “billions of email account details to millions of credit and identity data”, can now be found on the internet [4]. A growing tendency suggests that the centralised architecture used in today’s IDM systems might be problematic [5].
Traditional centralised IDM systems embed the critical vulnerability of a single point of failure (SPOF) [6] because they use a server to store users’ credentials and related identity data. This data is exposed when the server is compromised, violating the security of the system on the one hand and users’ privacy on the other hand [7]. Balancing security and privacy in organisations is an increasingly challenging task, if not an IDM dilemma. Organisations must know “as much as possible about their (potential) customers” as part of their customer diligence requirements [8] (p. 22). Yet, they need to preserve users’ privacy in compliance with government regulations, such as the Protection of Personal Information Act (POPIA) in South Africa.
Meanwhile, internet growth has resulted in dozens of digital accounts per user for different online services they subscribe to, forcing many to adopt insecure behaviour like reusing the same credentials with various services [9]. Others have been using weak credentials, so they are easier to remember, making it easier for imposters to guess them [2]. Secure and reliable IDM has also proven to be among “the greatest challenges facing cloud computing today” [10] (p. 724), being essential to achieving the requisite ‘secure cloud’ [11] (p. 91). ‘Secure IoT’ (Internet of Things) is another crucial IDM challenge, requiring organisations to effectively identify and authenticate interconnected ‘things’ interacting with people on a digital system [12,13]. ‘Things’ include software, smartphones, robots, automobiles, appliances, entertainment devices, etc.
Innovative IDM systems like BDIDM are emerging to deal with some of the above IDM challenges [6]. Despite its immaturity [14], BDIDM is reported to have no SPOF vulnerability [15] thanks to its decentralised and disintermediated architecture. Typical BDIDM models like SSI are claimed to be privacy-preserving [7] and dissolve the need for multiple accounts by enabling identity interoperability among different online services [16]. SSI might also facilitate ‘secure cloud’ and ‘secure IoT’ [4] in the form of distributed ID-as-a-Service [17]. Thus, organisations might consider adopting BDIDM to avoid potential competitive disadvantages.
Beyond organisations’ legitimate need to address IDM issues, there is more that might affect the likelihood of them adopting such innovation. The technology, organisation, and external environment (TOE) model depicts a comprehensive context of enterprise adoption of innovation. TOE is claimed to explain how an organisation “identifies the need, searches, and adopts new technologies” [18] (p. 232). Therefore, this research investigates how TOE factors might predict organisations’ adoption behaviours toward BDIDM to determine the most critical predictors and examine their effect. TOE theory is also claimed to have “broad applicability” across various technological, industrial, and national/cultural contexts [18] (p. 151). This study also seeks to verify this claim by assessing TOE-BDIDM’s effectiveness and appropriateness in investigating the phenomenon of organisation’s adoption behavior in the context of IDM.
The few studies on blockchain adoption mainly focus on its individual rather than enterprise adoption. This study contributes to the body of knowledge about perceptions of blockchain applications in the enterprise context to address the lack of empirical research on the topics. Knowing how organisations perceive the value proposition of BDIDM will inform scientific enquiries for more realistic blockchain design theories, which will in turn impact the practice. The findings could also inform IDM policymaking in organisations and inspire future research. Theoretically, this study contributes to extending the TOE theory. It advocates for a more comprehensive theory, TOEU, that includes the User context to better explain organisations’ adoption behaviour toward disruptive technologies like SSI. This enterprise-level theory of innovation adoption has not been given much attention like other related theories yet.
The rest of the introduction gives additional background necessary to understand the topic and the TOE-BDIDM model.

1.1. The ‘Ideal’ BDIDM Model for Organisations

The implementation of any blockchain application includes answering three fundamental questions: (i) who can join the network (public vs. private); (ii) whether a validator will be needed (permissioned vs. permissionless); and (iii) what type of consensus protocol (such as Raft, Federated, Proof of Authority, Proof of Work, Proof of Stake, etc.) will regulate interactions among participants [19]. Combined answers to these questions result in three types of blockchains: public permissionless, public permissioned, and private permissioned [20]. In BDIDM terms, public permissionless blockchains are not restricted. Anyone can join to get their DID and self-manage it. They have full control over it and can use it wherever they wish. Public permissioned blockchains are somewhat restricted. Some users can join to get their DIDs and self-manage them as they also have full control over them. Private permissioned blockchains are completely restricted to known and trusted users only. The validator known as “Trust Anchor” [21] (p. 46) has control over users’ DIDs and could, for instance, block a particular DID if necessary.
Some researchers support the notion that public permissioned blockchains are ideal for implementing typical BDIDM models like SSI [16] since they are perceived as more balanced versions of blockchains [22]. They are more decentralised, scalable, efficient [23], and offer “privacy protection and high transparency” [24] (p. 21573). Others argue that private permissioned blockchain might be the perfect implementation for ‘enterprise BDIDM’ because it endorses a service-centric approach by giving total control of the system to the identity provider, i.e., Trust Anchor [21]. However, a private permissioned blockchain would not differ much from traditional centralised models, from which organisations might want to move.
A different view suggests that the choice of the ideal BDIDM implementation ought to depend on trust assumptions [25]. From the outsider-threat perspective of cybersecurity theory [1], this implicit trust means that any type of BDIDM would be unnecessary for ‘trusted users’ (staff members accessing corporate systems from the intranet); permissioned BDIDM would make sense for ‘semi-trusted users’ (clients, suppliers, partners, etc., accessing corporate systems from the extranet); and permissionless BDIDM would be perfect for ‘untrusted users’ (visitors or any unknown user accessing corporate systems from the internet) [25]. However, the National Institute of Standards and Technology (NIST) highlights the new tendency to shift from this traditional implicit trust framework to a Zero Trust (ZT) security architecture. ZT tends to support the insider-threat cybersecurity theory that indirectly advocates for even more radical BDIDM, like SSI. ZT theory suggests that all entities ought to be untrusted, and prevented from accessing corporate systems by default: all should rigorously prove the authenticity of their identity in order to gain access [26].
These diverging views around the ideal blockchain implementation for enterprise BDIDM amplify the challenges of adoption and suggest the criticality of blockchain type on BDIDM adoption decision making in organisations. The findings shall reveal which blockchain type organisations might prefer the most and whether that is associated with their adoption behaviour toward BDIDM.

1.2. The Sustainability of the SSI Model in Organisations

SSI is a BDIDM model famous for maintaining users’ privacy and thus enhancing sustainable management of identities on digital systems. Organisations’ use of a privacy-respectful mechanism in identifying and authenticating users could mitigate data breaches, especially PII leaks [27,28]. However, there are controversies about SSI sustainability for organisations since the traditional centralised logic of IDM might be hostile to privacy. SSI adoption might involve solving the conflict between privacy and trust [29].
SSI for enterprise could be illustrated with the scenario of a newly recruited employee. The new employee, Alice, would not need to disclose any PII to their employer, nor create any digital account with them. Thus, there are no additional password/s for Allice to recall. Alice would simply invite their new employer to verify their already existing DID to access the corporate digital assets. Consequently, the employer has no control over that DID and Alice’s privacy is preserved [30]. From the perspective of traditional information security principles, this scenario is disruptive for organisations. An organisation would not trust Alice’s DID, because it is external [25]. The organisation would question whether participants in the blockchain storing Alice’s DID are trustworthy. The organisation would be concerned about potential risks involved when Alice’s DID gets hacked, or wonder whether an imposter was behind Alice’s DID to spy on the company’s business [1]. It would be nearly unacceptable for the organisation to lose control over Alice’s DID since it is used to access its confidential information [2].
SSI opponents stress blockchain’s weaknesses at its endpoints [31]. The PII anonymisation not only means that there is no central authority to block an account in case of identity theft or misbehaviour but also that “each user must themselves safeguard against forgetting (or losing) the private key” [32] (p. 5). SSI is risky because the user is the only one responsible for managing all the cryptographic keys protecting their DIDs [7]. Some researchers even question whether further adoption of blockchain-based solutions ought to be encouraged and whether the overall potential for change “could be [a] net positive” [33] (p. 447). However, others recommend proactive planning instead of fear of the unknown, arguing that “reluctance to adopt disruptive technologies may be a significant competitive disadvantage for an organisation” [14] (p. 34).
Indeed, blockchain technology offers a paradigm shift in developing next-generation cybersecurity barriers. Blockchain-based solutions like BDIDM ensure data integrity due to cryptography and non-reliance on passwords. A blockchain is, by design, resilient to SPOF and “assumes the presence of adversaries in the network”, making tampering with it extremely difficult (but not impossible) [6] (p. XIII). The identity self-management feature of SSI could lead to reduced costs of transactions for both users and organisations [7]. Users benefit from the reduced costs of identity theft and PII leaking. Organisations benefit from the exemption from protecting any PII and replicating it among interested services, reducing related costs of privacy infringements. The cost savings in password management ranges in the millions of dollars [34]. Yet, one would argue that organisations would still prefer to pay these costs than lose control over users.
These divergences make BDIDM adoption in organisations even more daunting. The study findings shall reveal the extent to which organisations are likely to adopt BDIDM. The findings shall especially reveal organisations’ adoption behaviour toward SSI. As mentioned earlier, other factors are involved in predicting organisations’ adoption behaviour toward BDIDM. This study chose to classify them all according to the TOE theory as technological, organisational, and environmental factors. These factors form the basis of the TOE-BDIDM model.

1.3. The TOE-BDIDM Research Model

The TOE-BDIDM model in Figure 1 is a particularised version of the TOE model initially developed by Tornatzky and Fleischer in 1990 as part of The Processes of Technological Innovation then updated later by Jeff Baker in 2011 [18]. The model is operationalised to guide empirical investigation of the enterprise BDIDM adoption phenomenon [30]. The present study (i) develops ten alternative hypotheses, Ha1 to Ha10, represented by the arrows between the independent variables (The nine first-order constructs) and the dependent variable (adopt or not adopt BDIDM) as shown in Figure 1. The study then (ii) tests the associated null hypotheses H01 to H010, and then (iii) assesses the TOE performance in the BDIDM context. The sub-sections of technological factors, organisational factors, and environmental factors detail the hypotheses’ development to anticipate organisations’ adoption behaviour toward BDIDM.

1.3.1. Technological Factors

Technologies in use and those existing in the marketplace but not yet adopted can affect how organisations adopt an innovation [18]. In the case of BDIDM, legacy centralised technologies may constrain its adoption due to their incompatibility with a distributed architecture [21]. BDIDM might lead to a complete rebooting of the organisation’s Information Technology (IT) infrastructure [35]. Since a poorly designed blockchain could be disastrous, its adequate implementation requires new competencies, which are still rare [36]. Thus, we posit that IT infrastructure and competencies have a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha4).
The market is now offering some BDIDM products, providing insight into BDIDM readiness in terms of its governance and standardisation [37]. However, there are inconsistencies in updating blockchain’s fundamental rules [37]. Consensus-based rules involve all nodes, “which can be any device” [38] (p. 242). This seems problematic for organisations following centralised-IDM logic and could disrupt the accountability and management of the network [39]. Therefore, we hypothesise that BDIDM readiness (for the enterprise context) has a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha3).
Innovation’s characteristics, i.e., the extent of the change it brings, also affect organisations’ adoption decision making. BDIDM is a radical innovation. It does not increment or synthesise existing technologies but tends to reboot them in a radical manner through distributed computing [40]. Such innovations produce “discontinuous change” and have higher adoption risks, yet can “enhance competitive standing in an organisation” [18] (p. 232). Technology characteristics relevant to BDIDM adoption include trialability, observability, compatibility, and complexity [41]. Another key BDIDM characteristic is the security construct. The CIA triad theory states that security balances confidentiality, integrity, and availability; thus the acronym CIA [1]. The Trust Service Framework (TSF) adds a fourth item of privacy [42]. This extension means that security without privacy is problematic, just as a four-legged table cannot balance if one leg is missing [30]. This principle seems to be what BDIDM, especially SSI, advocates for. All these dynamics lead to hypothesising that BDIDM characteristics have a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha1).
Blockchain types might be another essential facet of BDIDM characteristics. It seems there are underlying diverging views in the literature around the ideal BDIDM implementation for enterprises, which might signal significant differences among blockchain types associated with BDIDM adoption decision making in organisations. Therefore, we anticipate that statistically, blockchain types are significantly different and associated with organisations’ adoption behaviours toward BDIDM (Ha2).
Another relevant technological construct is “technical know-how” [43] (p. 7), made up of the availability of skills, consultants, and vendors of BDIDM. However, this study chooses to view these items as external to the organisation and thus identifies them under environmental factors [18].

1.3.2. Organisational Factors

The organisational factors include a firm’s characteristics that can affect organisations’ adoption behaviour, typically through its structure and communication processes [44]. Organisational structures like formal and informal mechanisms linking different organisation units may promote innovation [18]. Organisations with an organic and decentralised structure may cope well with the BDIDM adoption phase. Those with formal reporting relationships, centralised decision-making, and clearly defined roles for employees may instead cope well with the implementation phase [18]. Communication processes or channels like “top management support” [45] (p. 1457) can either promote or constrain the adoption since it is key to preparing a corporate culture that welcomes change. The support would typically include describing the BDIDM value proposition, rewarding related initiatives, and building “a skilled executive team” that can cast a compellingly firm vision [46] (p. 233). Thus, we posit that organisation characteristics have a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha5).
Another organisational factor consists of organisations’ readiness in terms of (financial) resources and awareness. BDIDM upfront implementation cost is perceived as high financially and requires highly skilled labour [36]. Blockchain technology was initially designed for “an investment rather than a traditional business use with an expected return on investment” [14] (p. 37). Moreover, organisations tend to be hostile to strongly privacy-flavoured BDIDM like SSI [45]. BDIDM’s relative newness raises the importance of organisations’ awareness, preparedness, and cultural adaptation [39] for such change as opposed to their “reluctance to change” or “fear of unknown technology” [14] (p. 37). We, then, hypothesise that organisation readiness has a statistically significant positive effect on organisations’ adoption behaviours toward BDIDM (Ha6).
Organisation size is considered a minor organisational factor, as there have not been many empirical studies confirming its link to innovation adoption [18]. However, due to the implementation cost involved [14], SMEs may be less likely to adopt BDIDM than larger organisations [45]. Small businesses and startups would not be able to afford such expensive and disruptive technologies [14]. Therefore, we speculate that statistically, organisations’ sizes (means they) are significantly different and thus are associated with organisations’ adoption behaviours toward BDIDM (Ha7).

1.3.3. Environmental Factors

Environmental factors that could affect organisations’ adoption behaviour include the industry’s characteristics (like competition, dominant firms, etc.), the availability of service providers, and whether the regulatory environment, such as government regulations, exists [18]. The industry life cycle can also affect innovation adoption: firms in rapidly growing industries tend to innovate more quickly than those in mature or declining industries. Similarly, the availability of supportive infrastructure, skilled labour, and consultants may affect the adoption [18,43]. Thus, we propose that industry and market environment have a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha8). Likewise, support environment has a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha9).
Additionally, BDIDM adoption in organisations may be affected by the need to comply with government regulations for protecting users’ privacy, like POPIA in South Africa, and some security codes of best practices, like ISO/IEC 27001/2 and NIST [47]. Moreover, the lack of blockchain-specific firm regulations, guidelines, and policies for its adequate standardisation could heavily affect its adoption in organisations [14,36]. For this reason, we posit that regulatory environment has a statistically significant effect on organisations’ adoption behaviours toward BDIDM (Ha10).
The rest of the paper is organised into four sections. Section 2 discusses the methodology followed by executing the research. Section 3 reports the research results, followed by Section 4 discussing the result’s implications. The last section, Section 5, concludes the study, highlights major limitations, and provides hints for future research.

2. Materials and Methods

This section elaborates on the methodology followed to do this cross-sectional research. The study considered the positivism philosophy, focusing on what could be objectively measured without researchers’ interference [48]. It followed a deductive approach since it aimed to test the appropriateness and effectiveness of an existing theory, TOE, for the BDIDM context. Baker [18] claimed that TOE is cross-industry, technology, and context. The study utilised the survey strategy, because it deals with ‘what’ and ‘how’ research questions, aligning well with the study’s purpose and approach. Awa et al. [43] proved that a survey can be successfully used with the TOE theory. Surveys mitigate the chances for researchers to influence participants by avoiding direct interaction and limiting interference to preserve objectivity [48].

2.1. Data Collection

The targeted population to which the study attempts to generalise its results consists of every organisation in the world. Thus, the study’s unit of analysis is organisation per se. The research sample consisted of South African organisations, due to the country’s proximity to researchers and high exposure to data breaches. Statistics report that Africa has one of the highest rates of cybercrimes and financial losses, with South Africa in the lead in this regard due to its high connectivity rate when compared to the rest of the continent [49].
All qualified participants were targeted. The selection was random, but was limited by the algorithm embedded in the search engine of the medium used (LinkedIn) and restricted to the sample frame. Since identity management is primarily a domain of InfoSec management [1], participants were InfoSec practitioners. However, this population was declared unknown by the Institute of Information Technology Professionals South Africa. The sample frame included different managerial levels of InfoSec to ensure the population representativeness. InfoSec managerial levels are often classified into security officers, managers, and technical staff. Security officers lead digital transformation and set the InfoSec policy in an organisation. They might play a decisive role in adopting BDIDM in their respective enterprises. Security managers are responsible for the security of a specific area of the organisation. They might have distinct perceptions of BDIDM adoption. Technical staff are responsible for implementing, maintaining, and monitoring security measures according to the InfoSec policy. They might have a pragmatic perspective on BDIDM adoption [1,2].
The data collection instrument was rooted in TOE-BDIDM. The online questionnaire translated every TOE-BDIDM item into a specific close-ended question and was built using Microsoft Forms. Three sections of the questionnaire measured the three main constructs and independent variables of the TOE-BDIDM model, namely: Technology, Organisation, and Environment. The fourth section measured the dependent variable of the TOE-BDIDM model, namely: BDIDM Adoption. The fifth section captured some background information about the sample. Table 1 defines items retained to measure each construct and the independent variable while providing the type of scales used to observe each item.
Data collection took place from February to August 2021. A pilot was conducted for the 15 first records to test the instrument. Requests for participation were regularly sent via LinkedIn direct messages to all 884 prospective participants identified, 15 to 20 participants at a time to allow smooth troubleshooting. This troubleshooting consisted of proving the legitimacy of the research to participants who wished to establish that the participation request was not a disguised cyber-attack. This limitation was expected to constrain the sample size since InfoSec practitioners tend to be ‘reserved’ due to the nature of their jobs [1].

2.2. Data Analysis

Statistical-paradigm-underlined data analysis was performed using three software applications: Microsoft Excel, the IBM Statistical Package for Social Science (SPSS) version 27.0, and the IBM SPSS analysis of moment structures (AMOS) version 24.0. The study’s confidence level was set to 95%, with a subsequent margin of error of 5 percent.
The analysis consisted of three main statistical tests: (i) Structural Equation Modelling (SEM) of the measurement model, known as confirmatory factor analysis (CFA), to test the model fitness and some types of validity and reliability; (ii) binary logistic regression modelling to test the null hypotheses involving variables measured on interval scales and assess the model’s predictive accuracy; and (iii) chi-squared tests of goodness-of-fit and association to test null hypotheses involving variables measured on nominal scales. Other important analysis activities included analysing different types of reliability and validity, as well as normality testing and data cleaning.
CFA is often used in social science research [51] to test the fitness of a model with latent variables to particular data. The TOE-BDIDM had latent variables at three levels. The lower level had the security construct; the middle level had BDIDM Characteristics, BDIDM Readiness, Infrastructure and Competencies, BDIDM Characteristics, BDIDM Readiness, Market and Industry, Support Environment, and Regulatory Environment constructs; and the upper level had Technology, Organisation, and Environment constructs. These levelled latent variables lead to a “higher-order CFA” [52] (p. 287) [53] (p. 288). Table 2 describes the fitness indices and their level of acceptance. In the absolute-fit category, Chisq should be insignificant, i.e., with a p > 0.05, for a better fit. A significant Chisq indicates a significant difference between the hypothesised model and the actual variance matrices, thus a poorer fit. In addition to testing the model fitness, CFA facilitates the assessment of some reliability and validity measurements [54]. Table 3 describes the level-of-acceptance of reliability and validity indexes. The internal reliability of scales was estimated using Cronbach’s alpha and parallel forms techniques.
A binary logistic regression modelling “aims to see whether a value of the binary dependent variable can be predicted by the score of an independent variable” [55] (p. 319). In this study, the test sought to see if scores in the TOE factors, i.e., the eight middle latent variables, could predict adopters (‘1’ value) and non-adopters (‘0’ value) in the Adopt Indicator dependent variable. Binary logistic regression analysis was more suitable than path analysis mainly because the dependent variable’s scale is dichotomous. Path analysis involves linear regression [56] and requires that the dependent variable be measured on a ratio [57] or interval scale [58].
In IBM Amos SPSS, the binary logistic regression test involves an omnibus test, Hosmer–Lemeshow goodness-of-fit test, and Cox–Snell R-Squared (R2) values to estimate the explanatory strength of the latent variables. The significance of the regression depends on the significance of the omnibus test (p < 0.05) and the insignificance of the Hosmer–Lemeshow test (p > 0.05). Wald statistics also accompany the test to determine the significance of each factor of the logistic regression. A classification table displays the number of observed cases the model predicted accurately and their percentages [55,58]. This test was appropriate for all the null hypotheses except H02 and H07.
H02 and H07 involve nominal variables, which were tested separately using the chi-squared test of goodness-of-fit and association. The chi-squared test of goodness-of-fit compares expected and observed frequencies of the categories of a variable to assess whether there is a significant difference between them [58]. The chi-squared test of association seeks to “compare two different sets of frequency counts to see” if they are associated [55] (p. 13).

3. Results

This section reports the study’s findings based on statistical tests performed on data as predesigned. The survey recorded 115 responses out of 884 requests sent, indicating a participation rate of 13%. The survey was set to only record valid responses to anticipate data cleaning. Thus, no missing data were found in the dataset. However, four records were excluded because they were beyond the sample frame or ethics requirements: two respondents were outside South African organisations, and two were younger than 18. This led to a sample size of 111. This sample size is arguably acceptable given the good internal consistency and exceptional “missing data level” of 0, though it led to 4.8 responses per parameter, close to the minimum requirement of five responses per parameter [69] (p. 2223). The distributions were visualised in boxplots to indicate the five extreme values as outliers. Records with outliers were not deleted to avoid unnecessary shrinking of the sample size. Except for nominal variables, all outliers were replaced by the average values of the respective distributions.

3.1. Demographic Information

The 111 InfoSec practitioners had various backgrounds, but their profiles aligned well with the sample frame as shown in Table 4: 14 officers, 16 managers, and 78 technical staff. The executive level was not anticipated but aligned well with the targeted profiles. Respondents could enter their job titles when they could not pick one which was representative of their position from the list provided. The table also shows that all four organisation sizes were represented in the sample. The organisation’s sizes were determined by the number of employees as estimated by each respondent: above 250 employees for large enterprises, 51 to 250 employees for medium enterprises, 11 to 50 employees for small enterprises, and below 10 employees for micro-enterprises. Of the 111 respondents, 70 belonged to large enterprises and 41 belonged to SMEs. The pie chart in Figure 2 describes organisation sectors represented in the sample according to the Statistics South Africa department classification (stats-sa, inedi). Most of the respondents’ organisations fall under information and communication technology (47 respondents, accounting for 42.3 % of the sample) or financial and insurance (30 respondents, accounting for 27 % of the sample) sectors. Table 5 gives additional background information, including age group, IDM system existence, awareness of BDIDM, blockchain type, and the intention to adopt BDIDM.

3.2. Assessing Internal and Parallel-Forms Reliabilities

In Table 6 column ‘α’ shows that all constructs had good internal consistency. A good percentage of the variance observed in the constructs is accurate and reliable: 78% for security, 72% for BDIDM Characteristics, 65% for BDIDM Readiness, 69% for IT Infrastructure and Competences, 78% for Organisation Characteristics, 83% for Organisation Readiness, 78% for Support Environment, 89% for Industry and Market Environment, and 78% for Regulatory Environment. The security variable part of BDIDM Characteristics was computed as the average of its constituents as predesigned according to the CIA triad theory. The Cronbach’s alpha test suggested that Awareness1 be excluded from the Organisation Characteristics construct to improve its internal consistency to 0.83 from 0.45. However, before excluding it, the test of the parallel form was performed to assess any possibility of combining it with Awareness2.
The questionnaire had some parallel questions (i.e., different questions measuring the same items) set intentionally to anticipate internal reliability. The parallel-form reliability estimates the correlation between such variables to test the consistency of answers [70]. The Spearman’s correlation test showed that Blockchain Type1 and Blockchain Type2 correlated absolutely since the p-value was 0.0. Thus, the study’s observation about Blockchain Type for the enterprise context is accurate and reliable. Blockchain Type2 was chosen for the rest of the analysis because it was more reliable. The Pearson correlation test shows that Awareness1 and Awareness2 were not correlated, as the p-value was 0.06. The survey questions might not have been semantically identical enough and thus measured distinct aspects of awareness. Thus, Awareness1 and Awareness2 could not be combined. Awareness2 was chosen over Awareness1 because it was far more reliable.

3.3. SEM of the Measurement Model—CFA

The higher-order CFA shown in Figure 3 represents TOE-BDIDM’s measuring model performed on data using IBM Amos SPSS. Directional arrows indicate causal relationships, bidirectional arrows indicate covariance relationships, and circles measure error on each ‘caused’ variable. Numbers on directional arrows indicate the factor loadings and those on bidirectional arrows indicate covariance rate between constructs. Rectangles represent indicators or items. Ovals in the middle represent first-order constructs (the eight latent variables), while those on the right-hand side represent second-order constructs (the three contexts of the TOE model). It is important to recall that Organisation Size and Blockchain Type items are excluded from CFA because they are nominal scales. Table 7 reports the fitness indices for the hypotheses’ BDIDM model as illustrated in Figure 3 and the modified TOE-BDIDM model.
Fitness indices of the hypothesised model suggested a poor fit for this data. The model was modified to improve the fit by (i) excluding items with a poor factor loading of ʎ < 0.5, (ii) adding some covariances between errors as suggested by improvement indices of the test, and (iii) solving a suspected ‘redundancy’ signalled by a very high covariance of 0.95 between Technology and Environment constructs. The Environment construct appeared more problematic because only one of its constituents, Sup_Env, was strongly loaded with ʎ = 0.98. The rest were unusually weak. The three constituents (Ind_Mark, Sup_Env, and Reg_Env) do not share a fair portion of variance with the Environment construct they intended to measure. Unexpectedly, Sup_Env was also strongly loading on the Organisation construct with ʎ = 0.95, causing it to be redundant with Environment. The problem was solved by moving Sup_Env into the Organisation construct and isolating the remaining variables.
Nevertheless, this change did not affect further binary logistic regression analysis since it only involved the first-order constructs. The suggestion of solving redundancy by either “combining the highly correlated variables through principal component analysis, or omitting a variable from the analysis that associated with another variable (s) highly” [68] (p. 5) was not applicable. The redundancy happened at the higher level of the model, making it unreasonable to combine or omit such constructs. Moreover, the collinearity test performed earlier using linear regression analysis in SPSS suggested no case of multicollinearity. Table 8 shows that all items’ and constructs’ tolerance values were greater than 0.1, and their respective VIF values less than 10. Therefore, the items and first-order constructs of the hypothesised model are distinctive, fulfilling the requirement of discriminant validity.
Table 8 reports good construct reliability of the hypothesised model as nearly all of the CR values for both first- and second-order constructs were greater than 0.6, except for the Technology construct which was entirely below this threshold. This result means that an overall good proportion of variance is shared between indicators and the constructs they measured.
Of the nine first-order constructs, Table 8 shows that eight did more-or-less meet the acceptable level of convergent validity as their AVE values are greater than 0.5, even though BDIDM_Read and Org-Char’s values are just about that threshold while BDIDM_Char’s is remarkably low. BDIDM-Char’s AVE value did not improve after excluding poorly loading factors. The modified model reported AVE values of 0.39 for BDIDM_Char, 0.49 for BDIDM_Read, and 56 for Org-Char. Therefore, Sec and Obs items were reconsidered in the binary logistic modelling. This choice was also motivated by BDIDM_Char’s excellent internal consistency of α = 0.72 and good construct reliability of CR = 0.68 in the hypothesised model.
Of the three second-order constructs, only the Environment’s AVE value met the threshold of greater than 0.6. The modification done on the model did not improve this result, as the Technology and Organisation’s AVEs were still below 0.6, moving from 0.11 to 0.12 and from 0.13 to 12, respectively. However, the CFA indicated that nearly all regression weights of the hypothesised model were statistically significant. Therefore, the convergent validity of the hypothesised model is arguably acceptable. In other words, the variation in the constructs is reasonably explained by their respective item constituents. However, the hypothesised model did not fully meet the requirement concerning construct validity since the CFA suggested that it did not perfectly fit the data. The modified model offered a better fit.

3.4. Normality Testing

Any regression analysis requires data to be normally distributed. Normality testing only relied on boxplot visualisation, skewness, and kurtosis [71]. The Shapiro and Kolmogorov tests are often difficult to pass for a sample size below 300 [72]. A common rule in skewness and kurtosis assessment suggests that the statistic’s ratio on the test’s standard error should be less than the Z-distribution’s critical value of 1.96 [73]. Another rule adds that the skewness statistic should be less than 0.8 [74]. The tests performed on the eight distributions revealed that only Org_Read and Reg_Env had their skewness critical value greater than 1.96. However, their skewness and kurtosis statistics were mostly less than 0.8. Therefore, the eight distributions are approximately normally distributed and fit further analysis.

3.5. Binary Logistic Regression Analysis

Binary logistic regression analysis considered the hypothesis model over the modified since it has no redundant items or first-order constructs. The study’s hypotheses concern the direct relationship between the eight latent variables and the dependent variable without any moderation. The latent variables were computed as the average of their respective items. The binary logistic regression modelling was performed using IBM Amos SPSS and utilised the ‘Enter’ method. The enter method means the factors were simultaneously inserted together in the regression model in Step 1 to see their overall interaction. No factor was delayed or privileged over others.
The test showed a significant omnibus result of χ2 = 31.15, df = 8, p = 0.0 and an insignificant Hosmer result of χ2 = 8.48, df = 8, p = 0.39. These results indicate that the binary logistic regression was significant. The variance observed in the Adopt Indicator dependent variable was due to the variance observed in the TOE factors (the eight latent variables), rather than randomness. Therefore, there is a relationship between the TOE factors and organisations’ adoption behaviours toward BDIDM. The test reported a Cox–Snell R2 of 0.245 to 0.351. Since the study’s confidence level is 95%, this interval meant that if the data collection was repeated 20 times, 19 would have 24.5 to 35.1% of the variance observed in the Adopt Indicator due to the variance in the TOE factors. The classification table in Block 1 (see Table 9) shows that the hypothesised model has an overall predictive accuracy of 79.3%, a higher percentage than that of the basic model in Block 0, which displayed 72.1 percent. The hypothesised model was exceptionally accurate in predicting BDIDM adopters, more so than non-adopters: 92.5% of adopters were accurately predicted compared to only 45.2% of non-adopters accurately predicted.
Wald statistics in Table 10 show the significance of each of the eight factors included in the regression, with the values of the ‘B’ column representing the values each could predict. A Yes value is predicted with positive values and a No value with negative values. It can be seen that only Org_Read factors could predict a ‘Yes’ in the Adopt Indicator. Thus, it has a positive effect on BDIDM adoption. The rest of the factors could predict a ‘No’ value in the Adopt Indicator. Thus, they have a negative effect on BDIDM adoption.
However, the column ‘Sig’ of the table reveals that only BDIDM_Char’s effect is statistically significant since it is the only factor displaying a p-value of less than 0.05 (Wald = 5.415, df = 1, Sig. = 0.02). Therefore, BDIDM characteristics, which is made up of Security, Trialability, Complexity, Observability, Compatibility, and Integration items, constituted the most significant factor that negatively affects the likelihood of adopting BDIDM in an organisation. The data provided enough evidence supporting that the more BDIDM is insecure, uncontrollable, user-unfriendly, complex, incompatible with other systems, and challenging to integrate into the enterprise ecosystem, the less likely an organisation would be to adopt it.
As a result, of the eight underlying null hypotheses, only H01 was rejected, which confirmed the study’s alternative hypothesis Ha1, stating that BDIDM Characteristics have a statistically significant effect on BDIDM Adoption.

3.6. Chi-Square Tests of Goodness of Fit and Association

Chi-squared tests were intended to test H02 and H07, as these were not part of the above logistic regression due to their nominal nature. This test was done in two steps: Chi-squared test of goodness-of-fit and Chi-squared test of association. The chi-squared test of goodness assessed the significance of the difference between categories for both Blockchain Type and Organisation Size variables, represented by H02.1 and H07.1, respectively. The test reported a p-value of less than 0.05 for both Blockchain Type and Organisation Size variables, suggesting that the categories were indeed different. The chi-squared test of association assessed whether the outcome in the Adopt Indicator dependent variable was associated with the categories for both Blockchain Type and Organisation Type variables, represented by H02.2 and H07.2, respectively. As shown in Table 11, the test reported p-values of more than 0.05 for Organisation Size and less than 0.05 for Blockchain Type variables. These results suggest that only the Blockchain Types are associated with BDIDM adoption. Therefore, an organisation can decide whether to adopt BDIDM or not to based on the blockchain types involved. Table 12 summarises the outcome of all hypothesis-testing activities. The study failed to reject the null hypotheses H03, H04, H05, H06, H08, H09, and H010. This means there is not enough statistical evidence to support Ha3, Ha4, Ha5, Ha6, Ha8, Ha9, and Ha10. Only H01 and H02 were rejected, which confirmed the study’s alternative hypothesis Ha1 and Ha2.

3.7. Summary of Findings

The binary logistic regression analysis confirmed the relationship between the TOE factors and BDIDM adoption decision making. The factors predict whether an organisation would fall under the BDIDM Adopters or Non-Adopters category. The effect of each of the TOE factors was either positive or negative. A positive predictor suggests that positive growth in its score results in an increased likelihood of an organisation adopting BDIDM. A negative predictor suggests that negative growth in its score results in a decreased likelihood of an organisation adopting BDIDM. BDIDM Characteristics happened to be the only statistically significant factor in the regression.
The Chi-squared tests, on one hand, confirmed the notion that blockchain types are associated with organisations’ adoption behaviour toward BDIDM and, on the other hand, refuted the notion that organisation sizes are not associated with the behaviour.
SEM of the measurement model reveals that TOE-BDIDM is highly effective in predicting adopters of BDIDM, more so than non-adopters, accurately predicting 92.5% of adopters but only 45.2% of non-adopters. TOE-BDIDM tends to be faulty on construct validity since it did not perfectly fit the data. However, the model displays excellent internal reliability, good construct reliability, and arguably reasonable convergent and discriminant validity. Hence, the general view is that the model is relatively appropriate for the context of enterprise BDIDM adoption.

4. Discussion

This section discusses the implications of the findings and their significance from the literature perspective, considering the research objectives, practice, and theory.

4.1. Implications for the Study’s Objectives

The study examined the effect of TOE factors on organisations’ adoption behaviours toward BDIDM, anticipating a relationship between them. The findings confirmed the relationship, supporting that TOE factors do predict how an organisation “identifies the need, searches, and adopts new technologies” [18] (p. 232). Typically, the factors either promote or constrain the adoption [14], predicting BDIDM adopters and non-adopters.
This study also argued that some TOE factors were more critical than others, assuming they were statistically significant, and affected the adoption behaviour in organisations the most. The data suggests that this argument, alongside the assumption, is correct. The most critical factor happened to be BDIDM characteristics. This confirms the literature’s view that the disruptiveness of BDIDM heavily affects its adoption in organisations [6]. Another result that verified the significance of some TOE factors over others was the statistical significance of the association of the Blockchain Type item with the adoption behaviour in organisations. Blockchain Type item was designed as part of the BDIDM Characteristics factor, which was already statistically significant in the regression model. This implies some degree of consistency in the measurements and validity of the results.
The reasonable appropriateness and effectiveness of TOE-BDIDM means that these findings are mostly rational and consistent. TOE-BDIDM was excellent in predicting BDIDM adopters at an accuracy rate of 92.5 percent. The model tends to be less effective in predicting BDIDM non-adopters at an accuracy rate of 45.2 percent. The TOE-BDIDM’s overall predictive accuracy sits at 79.3 percent. These results are valid since Awa et al.’s [43] TOE-based model displayed a similar pattern, with about the same overall predictive accuracy of 78.7%, but at different individual proportions of 87.1% for ERP adopters and 66.7% for ERP non-adopters. The CFA suggested a poor fit of the hypothesised TOE-BDIDM. The modified model offered a better fit. However, most of the items of the hypothesised model were loading well on the constructs, indicating fair composite reliability. Nearly the entire model had an excellent internal consistency. Therefore, TOE-BDIDM as hypothesised is relatively appropriate for the BDIDM context. TOE-BDIDM identified two significant relationships with N = 111, at p < 0.05 compared to three identified in a similar study [43] with N = 373, at p < 0.05. This verifies the assumption of the TOE theory’s ability to explain the enterprise adoption phenomenon in the contex of IDM and validates TOE’s interoperability [18].

4.2. Implications for Practice

BDIDM Characteristics is the only statistically significant factor in the regression in contrast to Awa et al. [43]’s study that found that Organisation Size and Support Environment were statistically significant at p < 0.05, N = 373. The insignificance of Support Environment in the present study may mean that outsourcing BDIDM solutions is perhaps not a sustainable solution for organisations, due to privacy issues and the legal responsibilities involved [16,75]. The results also contrast against the literature’s suggestion that SMEs may be less likely to adopt BDIDM than large enterprises [45] due to its relatively high cost of implementation [14]. This means BDIDM disruptiveness could be leveraged by any organisation regardless of its size. This finding may be encouraging to SMEs with little or no preexisting IDM systems. They could leverage the lower cost of rebooting their IT infrastructure into a distributed architecture [21,35].
Critics have highlighted the principle vulnerability of BDIDM and SSI dwelling at its endpoints [31], questioning whether further adoption ought to be encouraged [33]. From this perspective, the significance of BDIDM Characteristics may imply that more investment will be directed toward making BDIDM more secure, controllable, user-friendly, less complex to implement, more compatible with other systems, and smoother to integrate into the enterprise ecosystem. However, some of these goals might be extremely difficult to achieve because blockchain was somehow designed to function as such. With the imminence of ZT security architecture [26], perhaps the question should shift from ‘how to make BDIDM organisation-friendly’ to ‘how to make an organisation BDIDM-friendly’. “Reluctance to adopt disruptive technologies might be a significant competitive disadvantage for an organisation, whereas proactive planning can be a significant advantage” [14] (p. 34).
The significance of the Blockchain Type item echoes the debate around the ideal blockchain implementation for organisations [25]. Adopters preferred the private permissioned blockchain type, supporting the view that this blockchain is more suitable for the enterprise context [21]. They indirectly disapprove of SSI, holding the view that it is the typical BDIDM model fitting into a public permissioned blockchain [16]. This finding may suggest that SSI is not yet fully sustainable for the enterprise context. The SSI value proposition for organisations is not well understood or is yet to be adequately articulated [18].
From a practical significance perspective, Organisation Readiness (involving Financial Readiness and Organisation Awareness items) is the second critical factor. It was the least statistically insignificant, with a p-value of 0.57, just above the threshold of 0.5. Moreover, this factor is as expected and the only to have a positive effect on BDIDM adoption, thus, the only factor predicting BDIDM adopters. The criticality of Organisation Readiness echoes the so-often-highlighted effect of financial resources in adopting blockchain-based solutions [14]. It also reflects the importance of awareness of BDIDM in promoting its adoption due to its relative newness [39].

4.3. Implications for Theory

The criticality of the BDIDM Characteristics factor, including the Blockchain Type item, suggests that organisations’ adoption behaviour toward BDIDM is “more driven by technological factors than by organisational and environmental factors” [43] (p. 16), just like Awa’s study in the context of ERP adoption in SMEs. The criticality of BDIDM Characteristics, broadly relating to the Technology Characteristics of the TOE theory, resonates with Baker’s view portraying BDIDM as a disruptive and radical innovation, producing a discontinuous change intended to shift the InfoSec paradigm [6]. Although its proper implementation is costly, requiring a highly skilled team [14], its cost savings in password management alone is estimated in the millions of dollars [34]. Therefore, it could be theorised that BDIDM has both a high risk related to its adoption and the potential to “enhance competitive standing in an organisation” [18] (p. 232). BDIDM-derived competitive advantages include enhancing a sustainable IDM through the maintaining of privacy.
The TOE theory’s flexibility, which allows for customisation to different constructs [18], tends to leave room for ambiguities. The Support Environment factor is referred to by some literature as “Technical Know-how” [43] (p. 7), locating it under the Technology construct, while others [18] identify it as external support, locating it under the Environment construct. Contrary to both views, this study suggests that it fits the Organisation construct well, which led to the modification of the model. Moreover, the TOE theory should extend to include a ‘User construct’ to capture a more comprehensive context of BDIDM adoption in organisations. In contrast to traditional IDM systems, SSI is user-centric [76] due to identity self-management preserving privacy [15,16]. This “could practically introduce novel issues” [7] (p. 106). The BDIDM system would rely heavily on users to “safeguard against forgetting (or losing) the private key” [32] (p. 5). Therefore, a complete explanation of organisations’ adoption behaviours toward BDIDM might necessitate measuring individual factors, such as User Preparedness, Willingness, Acceptance, Skills, Awareness, Perceived Usefulness, etc.

5. Conclusions

This study primarily sought to explain the predictive effect of TOE factors on organisations’ adoption behaviours toward BDIDM to determine the most critical predictors and examine their effect. Technology Characteristics happened to be the most critical factor and predicted BDIDM non-adopters the most. The more BDIDM is insecure, uncontrollable, user-unfriendly, complex, incompatible with other systems, and challenging to integrate into the enterprise ecosystem, the less likely an organisation would be to adopt it. Blockchain Type, which is an item within the Technology Characteristics construct, was confirmed to be associated with organisations’ adoption behaviour, supporting the notion that an organisation can adopt BDIDM because of the type of blockchain involved. The association between organisation sizes and BDIDM adoption happened to be statistically insignificant, supporting that SMEs are as likely to adopt BDIDM as larger organisations.
The majority of respondents intended to recommend BDIDM to their organisations yet, paradoxically, preferred private permissioned blockchain type the most, revealing resistance to decentralised and privacy-preserving BDIDM models like SSI. The latter might be utopian or impractical for organisations. Consequently, blockchain technology might not necessarily dissolve intermediation in IDM in organisations but rather transform it to maintain centralisation.
Regarding the TOE performance, the general view is that the TOE model is relatively appropriate for the context of enterprise BDIDM adoption. However, TOE’s flexibility appears to accommodate certain ambiguities. The TOE theory is arguably ‘incomplete’, as it does not include individual aspects of adoption, which seems critical for adopting disruptive technologies like BDIDM, especially SSI, in organisations. Therefore TOE should be extended to TOEU to include the User factors.

5.1. Limitations

A reflection on the research process identified some limitations linked to methodology, theory, and researchers’ experience.
At the methodological level, the first limitation was the philosophical choice of positivism and quantitative methods, which did not allow for deeper insights into the current state of BDIDM adoption in the South African context. Although this was due to the relative newness of the technology, which made the study prioritise prediction over history, a different approach would yield different results. The second limitation concerned data analysis. It was impossible to test the structure model of TOE-BDIDM using path analysis, as suggested by the SEM framework. This was due to the dichotomous nature of the dependent variable as intentionally set according to the study objective.
At the theoretical level, the key limitation was that the TOE theory was found to be, to some extent, incomplete. Although it was more suitable for the context than other theories found in the literature, it did not accommodate measures of the individual aspects of BDIDM adoption in organisations, which might be essential for the smooth adoption of this disruptive technology.
At the researchers’ experience level, there were some inconsistencies due to human error. The most noticeable limitation in this category was that the User Privacy item was missing from the interval-scaled data because it was unintentionally omitted in data collection. Hence, privacy was only measured on a binary scale, making it impossible to be part of the regression analysis and SEM of the measurement model.

5.2. Future Research

Given the limitations highlighted above, methodological, theoretical, and topical measures could be adopted for further research on the topic or in the field.
From a methodological perspective, as blockchain technology evolves, further research might consider using a different approach, including combining quantitative and qualitative data collection and analysis methods, to accommodate both depth and accuracy. Alternatively, one might want to record the actual state of BDIDM adoption in a specific context, for instance, using a case study or grounded theory research strategy rather than a survey.
From a theoretical perspective, future investigation of the adoption of disruptive technologies like BDIDM-SSI might consider combining TOE with another theoretical framework, such as TAM, to include the individual aspects of adoption in organisations. Alternatively, one might use any other theory, or develop one, that provides for all four contexts, namely: Technology, Organisation, External Environment, and ‘User’ (TOEU).
From a topical perspective, the reflection led to an understanding that BDIDM adoption might be beyond silos of adoption. It was learnt that, given its relatively high disruptiveness, BDIDM might perhaps be impractical for sole organisations to adopt without a national strategy supporting or enforcing the adoption. For a more sustainable adoption, a government might need to be actively involved in, if not initiate, the adoption. This is especially important in the case of national BDIDM. Therefore, future research might rather study the national adoption of BDIDM, or the broader institutionalisation of blockchain.

Author Contributions

Conceptualization, S.M.M.; Methodology, S.M.M.; Validation, S.M.M.; Formal Analysis, S.M.M.; Investigation, S.M.M.; Resources, S.M.M.; Data Curation, S.M.M.; Writing—Original Draft Preparation, S.M.M.; Writing—Review & Editing, S.M.M.; Visualization, S.M.M.; Supervision, S.R.; Project Administration, S.M.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Ethics Committee of the University of Cape Town (protocol code: REC 2020/11/003, date of approval: 13 July 2022).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented in this study are accessible on figshare, at https://doi.org/10.25375/uct.20180054 (accessed on 1 August 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Whitman, M.E.; Mattord, H.J. Principles of Information Security; Cengage learning: Boston, MA, USA, 2021. [Google Scholar]
  2. Alexander, D.; Finch, A.; Sutton, D.; Taylor, A. Information Security Management Principles, 3rd ed.; BCS: London, UK, 2020. [Google Scholar]
  3. ISO/IEC. South African National Standard: Information Technology—Security Techniques—Code of Practice for Information Security Controls; SABS: Geneva, Switzerland, 2014. [Google Scholar]
  4. Saini, K.; Chelliah, P.R.; Saini, D.K. Essential Enterprise Blockchain Concepts and Applications; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  5. Liu, Y.; Sun, G.; Schuckers, S. Enabling Secure and Privacy Preserving Identity Management via Smart Contract. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019. [Google Scholar]
  6. Shetty, S.; Kamhoua, C.A.; Njilla, L.L. Blockchain for Distributed Systems Security; John Wiley & Sons: Hoboken, NJ, USA, 2019. [Google Scholar]
  7. Maesa, D.D.F.; Mori, P. Blockchain 3.0 Applications Survey. J. Parallel Distrib. Comput. 2020, 138, 99–114. [Google Scholar] [CrossRef]
  8. Breuer, J.; Ranaivoson, H.; Buchinger, U.; Ballon, P. Who manages the manager? Identity management and user ownership in the age of data. In Proceedings of the 2015 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, 21–23 July 2015. [Google Scholar]
  9. Shehu, A.-S.; Pinto, A.; Correia, M.E. Privacy Preservation and Mandate Representation in Identity Management Systems. In Proceedings of the 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, 19–22 June 2019. [Google Scholar]
  10. Bendiab, K.; Kolokotronis, N.; Shiaeles, S.; Boucherkha, S. WiP: A novel blockchain-based trust model for cloud identity management. In Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Athens, Greece, 12–15 August 2018. [Google Scholar]
  11. Moghaddam, F.F.; Wieder, P.; Yahyapour, R. A policy-based identity management schema for managing accesses in clouds. In Proceedings of the 2017 8th International Conference on the Network of the Future (NOF), London, UK, 22–24 November 2017. [Google Scholar]
  12. Bouras, M.A.; Lu, Q.; Dhelim, S.; Ning, H. A Lightweight Blockchain-Based IoT Identity Management Approach. Futur. Internet 2021, 13, 24. [Google Scholar] [CrossRef]
  13. Zhu, X.; Badr, Y. A survey on blockchain-based identity management systems for the Internet of Things. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018. [Google Scholar]
  14. Demir, M.; Turetken, O.; Mashatan, A. An Enterprise Transformation Guide for the Inevitable Blockchain Disruption. Computer 2020, 53, 34–43. [Google Scholar] [CrossRef]
  15. Kshetri, N. Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 2017, 41, 1027–1038. [Google Scholar] [CrossRef]
  16. Bernabe, J.B.; Canovas, J.L.; Hernandez-Ramos, J.L.; Moreno, R.T.; Skarmeta, A. Privacy-Preserving Solutions for Blockchain: Review and Challenges. IEEE Access 2019, 7, 164908–164940. [Google Scholar] [CrossRef]
  17. Argento, L.; Buccafurri, F.; Furfaro, A.; Graziano, S.; Guzzo, A.; Lax, G.; Pasqua, F.; Saccà, D. ID-Service: A Blockchain-Based Platform to Support Digital-Identity-Aware Service Accountability. Appl. Sci. 2020, 11, 165. [Google Scholar] [CrossRef]
  18. Baker, J. The Technology–Organization–Environment framework. In Information Systems Theory; Springer: New York, NY, USA, 2012; p. 231. [Google Scholar]
  19. Politou, E.; Casino, F.; Alepis, E.; Patsakis, C. Blockchain mutability: Challenges and proposed solutions. IEEE Trans. Emerg. Top. Comput. 2019, 9, 1972–1986. [Google Scholar] [CrossRef]
  20. Labazova, O. Towards a Framework for Evaluation of Blockchain Implementations; ICIS: London, UK, 2019. [Google Scholar]
  21. Marsalek, A.; Kollmann, C.; Zefferer, T.; Teufl, P. Unleashing the full potential of blockchain technology for security-sensitive business applications. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Korea, 14–17 May 2019. [Google Scholar]
  22. Buccafurri, F.; Lax, G.; Russo, A.; Zunino, G. Integrating digital identity and blockchain. In OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”; Springer: Cham, Switzerland, 2018. [Google Scholar]
  23. Thai, Q.T.; Yim, J.C.; Kim, S.M. A scalable semi-permissionless blockchain framework. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 16–18 October 2019. [Google Scholar]
  24. Mitani, T.; Otsuka, A. Traceability in permissioned blockchain. IEEE Access 2020, 8, 21573–21588. [Google Scholar] [CrossRef]
  25. Wüst, K.; Gervais, A. Do you need a blockchain? In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 20–22 June 2018. [Google Scholar]
  26. Stafford, V. Zero Trust Architecture; NIST Special Publication: Gaithersburg, MD, USA, 2020; Volume 800, p. 207. [Google Scholar]
  27. Cheesman, M. Self-sovereignty for refugees? The contested horizons of digital identity. Geopolitics 2022, 27, 134–159. [Google Scholar] [CrossRef]
  28. Shekar, M.C.; Gururaj, H.L.; Flammini, F. Securing personal identity using blockchain. Int. J. Crit. Comput.-Based Syst. 2022, 10, 248–267. [Google Scholar] [CrossRef]
  29. Ren, Y.; Liu, W.; Liu, A.; Wang, T.; Li, A. A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning. Futur. Gener. Comput. Syst. 2021, 127, 56–69. [Google Scholar] [CrossRef]
  30. Mulaji, S.S.M.; Roodt, S.S. The Practicality of Adopting Blockchain-Based Distributed Identity Management in Organisations: A Meta-Synthesis. Secur. Commun. Networks 2021, 2021, 9910078. [Google Scholar] [CrossRef]
  31. Helebrandt, P.; Bellus, M.; Ries, M.; Kotuliak, I.; Khilenko, V. Blockchain adoption for monitoring and management of enterprise networks. In Proceedings of the 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018. [Google Scholar]
  32. Kuperberg, M. Blockchain-based identity management: A survey from the enterprise and ecosystem perspective. IEEE Trans. Eng. Manag. 2019, 67, 1008–1027. [Google Scholar] [CrossRef]
  33. Rot, A.; Blaicke, B. Blockchain’s future role in cybersecurity. Analysis of defensive and offensive potential leveraging blockchain-based platforms. In Proceedings of the 2019 9th International Conference on Advanced Computer Information Technologies (ACIT), Ceske Budejovice, Czech Republic, 5–7 June 2019. [Google Scholar]
  34. Wolfond, G. A blockchain ecosystem for digital identity: Improving service delivery in Canada’s public and private sectors. Technol. Innov. Manag. Rev. 2017, 7, 35–40. [Google Scholar] [CrossRef]
  35. Stoica, M.; Ghilic-Micu, B.; Mircea, M. Restarting the Information Society Based on Blockchain Technology. Inform. Econ. 2019, 23, 39–48. [Google Scholar] [CrossRef]
  36. Duy, P.T.; Hien, D.T.T.; Pham, V.-H. A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation. In Proceedings of the Ninth International Symposium on Information and Communication Technology, Danang, Vietnam, 6–7 December 2018. [Google Scholar]
  37. Butijn, B.-J.; Tamburri, D.A.; Heuvel, W.-J.v.d. Blockchains: A systematic multivocal literature review. ACM Comput. Surv. (CSUR) 2020, 53, 1–37. [Google Scholar] [CrossRef]
  38. Cui, Z.; Fei, X.U.E.; Zhang, S.; Cai, X.; Cao, Y.; Zhang, W.; Chen, J. A hybrid BlockChain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 2020, 13, 241–251. [Google Scholar] [CrossRef]
  39. Upadhyay, N. Demystifying blockchain: A critical analysis of challenges, applications and opportunities. Int. J. Inf. Manag. 2020, 54, 102120. [Google Scholar] [CrossRef]
  40. Dresher, D. Blockchain Basics; Apress: Frankfurt, Germany, 2017. [Google Scholar]
  41. Hameed, M.A.; Arachchilage, N.A.G. A Conceptual Model for the Organizational Adoption of Information System Security Innovations, in Security, Privacy, and Forensics Issues in Big Data; IGI Global: Hershey, PA, USA, 2020; pp. 317–339. [Google Scholar]
  42. Romney, M.; Steinbart, P.; Mula, J.; McNamara, R.; Tonkin, T. Accounting Information Systems Australasian Edition; Pearson Higher Education AU: Melbourne, Australia, 2012. [Google Scholar]
  43. Awa, H.O.; Ukoha, O.; Emecheta, B.C. Using T-O-E theoretical framework to study the adoption of ERP solution. Cogent Bus. Manag. 2016, 3, 1196571. [Google Scholar] [CrossRef]
  44. Rogers, E.M. Diffusion of Innovations, 5th ed.; Free Press: New York, NY, USA, 2003. [Google Scholar]
  45. Clohessy, T.; Acton, T. Investigating the influence of organizational factors on blockchain adoption: An innovation theory perspective. Ind. Manag. Data Syst. 2019, 119, 1457–1491. [Google Scholar] [CrossRef]
  46. Turner, J.R.; Baker, R.M. Complexity theory: An overview with potential applications for the social sciences. Systems 2019, 7, 4. [Google Scholar] [CrossRef]
  47. Grassi, P.; Fenton, J.; Lefkovitz, N.; Danker, J.; Choong, Y.Y.; Greene, K.; Theofanos, M. Digital identity Guidelines: Enrollment and Identity Proofing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017. [Google Scholar]
  48. Saunders, M.N.; Lewis, P.; Thornhill, A. Research Methods for Business Students, 8th ed.; Pearson (Intl): London, UK, 2019. [Google Scholar]
  49. Musuva-Kigen, P.; Mueni, F.; Ndegwa, D. Africa Cyber Security Report 2016; Serianu Cyber Threat Intelligence Team: Nairobi, Kenya, 2016. [Google Scholar]
  50. Fernando, E. Essential Blockchain Technology Adoption factors in Pharmaceutical Industry. In Proceedings of the 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 20–21 November 2019. [Google Scholar]
  51. Ismael, S.N.; Mohd, O.; Abd Rahim, Y. Assessing Data Sharing’s Model Fitness Towards Open Data by using Pooled CFA. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2021, 12, 5. [Google Scholar] [CrossRef]
  52. Brown, T.A. Confirmatory Factor Analysis for Applied Research; Guilford Publications: New York, NY, USA, 2015. [Google Scholar]
  53. Thakkar, J.J. Structural Equation Modelling: Application for Research and Practice (with AMOS and R). In Studies in Systems, Decision and Control; Springer Singapore Pte. Limited: Singapore, 2020. [Google Scholar]
  54. Ahmad, S.; Zulkurnain, N.N.A.; Khairushalimi, F.I. Assessing the Validity and Reliability of a Measurement Model in Structural Equation Modeling (SEM). J. Adv. Math. Comput. Sci. 2016, 15, 1–8. [Google Scholar] [CrossRef]
  55. Hinton, P.; McMurray, I.; Brownlow, C. SPSS Explained; Routledge: New York, NY, USA, 2014. [Google Scholar]
  56. Thrane, C. Applied Regression Analysis: Doing, Interpreting and Reporting; Routledge: New York, NY, USA, 2019. [Google Scholar]
  57. Blunch, N. Introduction to Structural Equation Modeling Using IBM SPSS Statistics and AMOS; Sage: Los Angeles, CA, USA, 2012. [Google Scholar]
  58. Vogt, W.P.; Johnson, R.B. The SAGE Dictionary of Statistics & Methodology: A Nontechnical Guide for the Social Sciences; Sage: Los Angeles, CA, USA, 2012. [Google Scholar]
  59. Wheaton, B. Assessment of fit in overidentified models with latent variables. Sociol. Methods Res. 1987, 16, 118–154. [Google Scholar] [CrossRef]
  60. Brown, M.W.; Cudeck, R. Alternative ways of assessing model fit. Test. Struct. Equ. Models 1993, 154, 136–162. [Google Scholar] [CrossRef]
  61. Jöreskog, K.; Sörbom, D. LISREL-VI User’s Guide, 3rd ed.; Scientific Software: Mooresville, NC, USA, 1984. [Google Scholar]
  62. Tanaka, J.S.; Huba, G.J. A fit index for covariance structure models under arbitrary GLS estimation. Br. J. Math. Stat. Psychol. 1985, 38, 197–201. [Google Scholar] [CrossRef]
  63. Bentler, P.M. Comparative fit indexes in structural models. Psychol. Bull. 1990, 107, 238. [Google Scholar] [CrossRef]
  64. Bentler, P.M.; Bonett, D.G. Significance tests and goodness of fit in the analysis of covariance structures. Psychol. Bull. 1980, 88, 588. [Google Scholar] [CrossRef]
  65. Bollen, K.A. A new incremental fit index for general structural equation models. Sociol. Methods Res. 1989, 17, 303–316. [Google Scholar] [CrossRef]
  66. Marsh, H.W.; Hocevar, D. Application of confirmatory factor analysis to the study of self-concept: First-and higher order factor models and their invariance across groups. Psychol. Bull. 1985, 97, 562. [Google Scholar] [CrossRef]
  67. Awang, Z. SEM Made Simple: A gentle Approach to Learning Structural Equation Modeling; MPWS Rich Publication: Selangor, Malaysia, 2015. [Google Scholar]
  68. Daoud, J.I. Multicollinearity and regression analysis. In Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2017. [Google Scholar]
  69. Kyriazos, T.A. Applied psychometrics: Sample size and sample power considerations in factor analysis (EFA, CFA) and SEM in general. Psychology 2018, 9, 2207. [Google Scholar] [CrossRef]
  70. Agresti, A.; Finlay, B. Statistical Methods for the Social Sciences; Pearson Education Limited: London, UK, 2009. [Google Scholar]
  71. Cramer, D. Fundamental Statistics for Social Research: Step-By-Step Calculations and Computer Techniques Using SPSS for Windows; Routledge: London, UK, 2003. [Google Scholar]
  72. Kim, T.K.; Park, J.H. More about the basic assumptions of t-test: Normality and sample size. Korean J. Anesthesiol. 2019, 72, 331. [Google Scholar] [CrossRef] [PubMed]
  73. Doane, D.P.; Seward, L.E. Measuring skewness: A forgotten statistic? J. Stat. Educ. 2011, 19. [Google Scholar] [CrossRef]
  74. Trafimow, D.; Wang, T.; Wang, C. From a sampling precision perspective, skewness is a friend and not an enemy! Educ. Psychol. Meas. 2019, 79, 129–150. [Google Scholar] [CrossRef] [PubMed]
  75. Mpofu, N.; van Staden, W.J. Evaluating the severity of trust to identity-management-as-a-service. In Proceedings of the 2017 Information Security for South Africa (ISSA), Johannesburg, South Africa, 16–17 August 2017. [Google Scholar]
  76. Grüner, A.; Mühle, A.; Meinel, C. An Integration Architecture to Enable Service Providers for Self-sovereign Identity. In Proceedings of the 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 26–28 September 2019. [Google Scholar]
Figure 1. The TOE-BDIDM model.
Figure 1. The TOE-BDIDM model.
Sustainability 14 11534 g001
Figure 2. The sample by organisation sector.
Figure 2. The sample by organisation sector.
Sustainability 14 11534 g002
Figure 3. Higher-order CFA of the hypothesised TOE-BDIDM model.
Figure 3. Higher-order CFA of the hypothesised TOE-BDIDM model.
Sustainability 14 11534 g003
Table 1. Primary measurements.
Table 1. Primary measurements.
LabelNameDefinitionAdapted FromScale
TechnologyBDIDM Characteristics:BDIDM_Char [18](p. 232)-
Security (Sec)ConfConfidentiality: Resilience to unauthorised view [1,23,50]Interval
IntIntegrity: Resilience to unauthorised change
AvailAvailability: Accessibility to legitimate users when needed
Blockchain Type1Type1Blockchain implementation type[20]Nominal
Blockchain Type2Type2
TrialabilityTrialBDIDM easiness of use[23,41] Interval
ComplexityCplexBDIDM easiness of implementation[41]
ObservabilityObsBDIDM easiness of being controlled[41]
CompatibilityCpatBDIDM easiness of interoperating with other systems[41]
IntegrationItegraBDIDM easiness of smoothly functioning in an ecosystem[21]
BDIDM Readiness:BDIDM_Read [18](p. 232)-
Technology ReadinessTreadBDIDM preparedness for the enterprise context[14] (p. 37), [36] (p. 202) Interval
StandardisationStd2BDIDM normalisation and governance
Infrastructure and Competences:Infr_Comp [18](p. 232)
CompetencesCpetAvailability of BDIDM competences[36,43] Interval
IT InfrastructureITInfAvailability of IT infrastructure supportive of BDIDM[21,35]
OrganisationOrganisation Characteristics:Org_Char [18](p. 232)-
Employees LinkageNetFormal and informal employees networking supportive of BDIDM[18] (p. 232) [44] Interval
Presence Product ChampionCham Availability of perceptions of BDIDM value
Top management SupportMSupStrategic support and planning for BDIDM
Leadership and CommunicationComStrategic communication about BDIDM values
Organisation Readiness:Org_Read [18](p. 232)-
Organisation Financial ReadinessOReadPreparedness for financial investment in BDIDM[14,18] Interval
Awareness1Awa1Awareness of BDIDM[39]
Awareness2Awa2
Organisation SizeSizeRange of enterprise/Number of employees[18](p. 232)Nominal
EnvironmentSupport Environment:Sup_Env -
Vendor SupportVSupBDIDM products vendors support[18] (p. 232)Interval
Skill LabourSlabBDIDM external skills support
ConsultantsConsBDIDM consultants support
Market and Industry:Ind_Mark [18](p. 232)
Industry PressureIndIndustry pressure for BDIDM adoption [18]Interval
Competition IntensityCpetiBDIDM adoption competition gains
Regulatory Environment:Reg_Env [18](p. 232)-
Government RegulationGovGovernment pressure for BDIDM adoption[14,36]Interval
Compliance with StandardsStd2Pressure for BDIDM adoption to comply with standards[5,47]
Adopt IndicatorAdoptAdoption intention[18]Binomial
Table 2. Fitness indexes acceptance level.
Table 2. Fitness indexes acceptance level.
Name of CategoryName of IndexLevel of AcceptanceReference
Absolute FitDiscrepancy chi-square (Chisq)p > 0.05[59]
Root Mean Square of Error Approximation (RMSEA)RMSEA < 0.08[60]
Incremental FitGoodness-of-Fit Index (GFI)GFI > 0.90[61]
Adjusted Goodness-of-Fit (AGFI)AGFI > 0.90[62]
Comparative Fit Index (CFI)CFI > 0.90[63]
Tucker–Lewis Index (TLI)TLI > 0.90[64]
Normed Fit Index (NFI)NFI > 0.90[65]
Parsimonious FitChi-squared/Degree of freedom (Chisq/df)Chisq/df < 5.0[66]
Table 3. Reliability and validity indexes acceptance level.
Table 3. Reliability and validity indexes acceptance level.
Name of CategoryName of IndexLevel of AcceptanceReference
Internal reliabilityCronbach’s alpha (α)α ≥ 0.5[67]
Construct reliabilityComposite reliability (CR)CR ≥ 0.6[67]
Convergent ValidityAverage Variance Extracted (AVE)AVE ≥ 0.5[67]
Discriminant Validity
(multicollinearity)
Tolerance (Tol.) or Variance Inflation Factor (VIF)Tolerance > 0.1[68]
VIF < 10[54]
Table 4. Sample managerial levels.
Table 4. Sample managerial levels.
InfoSec Managerial LevelsOrganisation Size
Job TitleFreq. JobFreq. LevelPercent
Level
MicroSmallMediumLarge
Executive: 32.700102
InfoSec Governance/Executive3
Officer: 1412.612318
IAM Officer7
Chief Information Security Officer3
Chief Information Officer 2
Chief Technology Officer2
Manager: 1614.4111113
InfoSec Manager11
InfoSec Architecture Manager 1
Network Security Manager 1
Data Centre Manager 1
Operation Manager 1
Project Manager1
Technical Staff: 7870.27382047
InfoSec Administrator/Analyst/Specialist/Architect/Consultant40
IAM Administrator/Analyst/Specialist/Consultant/Engineer9
Network Security Administrator5
IT auditor/Program Analyst3
Cloud Administrator/Engineer/Consultant4
System Administrator/Engineer4
Software Developer/Engineer2
Solutions Architect4
Data Engineer2
PenTester, ERP Analyst, Technical Support, Technical Engineer5
Total111111100.006132270
Total111
Table 5. Additional demographic information.
Table 5. Additional demographic information.
QuestionAnswerFrequencyPercent
Age groupBetween 18 and 408271.0
Over 403127.0
Does your organisation have an established IDM system?I don’t know32.7
No87.2
Yes10090.1
Total111100.0
Is your organisation aware of BDIDM?No4036.0
Not sure1816.2
Yes5347.7
Total111100.0
Which type of blockchain do you think is suitable for your organisation’s BDIDM?Public permissionless blockchain109.0
Public permissioned blockchain2724.3
Private permissioned blockchain7466.7
Total111100.0
Would you recommend BDIDM to your organisation?Yes8072.1
No3127.9
Total111100.0
Table 6. Internal reliabiity.
Table 6. Internal reliabiity.
Cronbach’s AlphaN of Items
Sec0.783
BDIDM_Char0.726
BDIDM_Read0.652
Infr_Comp0.692
Org_Char0.784
Org_Read0.832
Sup_Env0.783
Reg_Env0.782
Ind_Mark0.892
Table 7. Fitness indices results.
Table 7. Fitness indices results.
Hypothesised ModelModified Model
p0.00.14
RMSEA0.080.03
GFI0.770.87
AGFI0.710.82
CFI0.840.98
TLI0.820.98
NFI0.700.86
Chisq/df01.71.1
Table 8. Summary of Reliability and validity indexes.
Table 8. Summary of Reliability and validity indexes.
ItemFirst-Order ConstructSecond-Order Construct
NameTol0.VIFʎNameCRAVEαVIFTol0.ʎNameCRAVE
Conf0.412.430.64Sec0.800.580.78 Technology0.750.11
Int0.323.090.97
Avail0.452.240.63
Sec 0.16BDIDM_Char0.680.290.720.462.170.91
Obs0.511.960.38
Itegra0.362.760.73
Cplex0.482.100.61
Cpat0.412.430.56
Trial0.551.820.58
Std10.422.370.66BDIDM_Read0.650.490.650.382.6410.11
TRead0.392.540.73
ITInf0.392.550.66Infr_Comp0.690.530.690.591.720.78
Cpet0.442.270.79
Net0.442.180.49Org_Char0.780.480.780.422.400.96Organisation0.650.13
Cham0.442.290.57
Com0.333.050.79
MSup0.263.920.85
ORead0.283.570.86Org_Read0.820.700.830.422.400.91
OAw20.392.590.80
Cons0.392.580.73Sup_Env0.780.550.780.591.710.98Environment0.450.58
Slab0.283.620.89
VSup0.571.740.58
Std20.452.220.83Reg_Env0.720.570.780.392.570.39
Gov0.462.190.67
Ind0.254.010.88Ind_Mark0.790.800.890.591.71−0.37
Cpeti0.224.500.91
Table 9. Classification table.
Table 9. Classification table.
Classification Table a
ObservedPredicted
Adopt IndicatorPercentage Correct
YesNo
Step 1Adopt IndicatorYes74692.5
No171445.2
Overall Percentage 79.3
a. The cut value is 0.500.
Table 10. Wald statistics.
Table 10. Wald statistics.
Variables in the Equation
BS.E.WalddfSig.Exp(B)95% C.I. for EXP(B)
LowerUpper
Step 1 aBDIDM_Char−1.6400.7055.41510.0200.1940.0490.772
BDIDM_Read−0.1670.4420.14210.7060.8470.3562.012
Inf_Comp−0.3180.3470.83710.3600.7280.3681.438
Org_Char−0.3120.6720.21510.6430.7320.1962.734
Org_Read1.3160.6913.62610.0573.7300.96214.458
Indu_Mark−0.2800.3490.64310.4220.7560.3811.498
Sup_Env−0.7070.7250.95110.3290.4930.1192.041
Reg_Env−0.4940.3541.94810.1630.6100.3051.221
Constant6.2582.9204.59310.032522.069 0.772
a. Variable(s) entered on step 1: BDIDM_Char, BDIDM_Read, Inf_Comp, Org_Char, Com_Proc, Org_Read, Indu_Mark, Sup_Env, Reg_Env.
Table 11. Chi-squared test of association—Significance.
Table 11. Chi-squared test of association—Significance.
Chi-Square Tests
Organisation SizeValuedfAsymptotic Significance (2-Sided)
Pearson Chi-Squared4.268 a30.234
Likelihood Ratio5.96030.114
Linear-by-Linear Association2.29510.130
N of Valid Cases111
Blockchain Type2ValuedfAsymptotic Significance (2-Sided)
Pearson Chi-Squared6.863 b20.032
Likelihood Ratio8.69220.013
Linear-by-Linear Association6.65310.010
N of Valid Cases111
a 3 cells (37.5%) have expected count less than 5. The minimum expected count is 1.68. b 1 cells (16.7%) have expected count less than 5. The minimum expected count is 2.79.
Table 12. Summary of hypothesis testing.
Table 12. Summary of hypothesis testing.
Null Hypothesis TestedOutcome
TechnologyH01: BDIDM Characteristics do not have a statistically significant effect on organisations’ adoption behaviours toward BDIDM.    R
H02:H02.1: Statistically, Blockchain Types are equal.RR
H02.2: Statistically, Blockchain Types are not associated with organisations’ adoption behaviours toward BDIDM.R
H03: BDIDM Readiness does not have a statistically significant effect on organisations’ adoption behaviours toward BDIDM.    FR
H04: IT Infrastructure and Competencies do not have a statistically significant effect on organisations’ adoption behaviours toward BDIDM.    FR
OrganisationH05: Organisation Characteristics do not have a statistically significant effect on BDIDM Adoption.    FR
H06: Organisation Readiness does not have a statistically significant positive effect on BDIDM Adoption.    FR
H07:H07.1: Statistically, Organisation Sizes are equal.RFR
H07.2: Statistically, Organisation Sizes are not associated with organisations’ adoption behaviours toward BDIDM.FR
EnvironementH08: Industry and Market Environment do not have a statistically significant effect on organisations’ adoption behaviours toward BDIDM.    FR
H09: Support Environment does not have a statistically significant effect on organisations’ adoption behaviours toward BDIDM.    FR
H010: Regulatory Environment does not have a statistically significant effect on organisations’ adoption behaviours toward BDIDM.    FR
Note: R = Rejected, FR = Failed to Reject.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mulaji, S.M.; Roodt, S. Factors Affecting Organisations’ Adoption Behaviour toward Blockchain-Based Distributed Identity Management: The Sustainability of Self-Sovereign Identity in Organisations. Sustainability 2022, 14, 11534. https://doi.org/10.3390/su141811534

AMA Style

Mulaji SM, Roodt S. Factors Affecting Organisations’ Adoption Behaviour toward Blockchain-Based Distributed Identity Management: The Sustainability of Self-Sovereign Identity in Organisations. Sustainability. 2022; 14(18):11534. https://doi.org/10.3390/su141811534

Chicago/Turabian Style

Mulaji, Sarah Mulombo, and Sumarie Roodt. 2022. "Factors Affecting Organisations’ Adoption Behaviour toward Blockchain-Based Distributed Identity Management: The Sustainability of Self-Sovereign Identity in Organisations" Sustainability 14, no. 18: 11534. https://doi.org/10.3390/su141811534

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop