Assessing Internet Source Credibility

Size: px
Start display at page:

Download "Assessing Internet Source Credibility"

Transcription

1 Assessing Research-in-Progress Thomas F. Stafford University of Memphis Robin S. Poston University of Memphis Jason Rhea University of Memphis ABSTRACT Little work in IT trust has extended the source credibility model from mass communications to the context of online media. Existing constructs arise from reference discipline concepts of interpersonal trust, but consumers view the Internet differently than they view individuals. We develop an model that compares the effects of Trusting Intentions and Cosmetic Credibility on Purchase Intentions for an Internet security application provided by an Internet Service Provider. Results indicate that aspects of are conceptually different from constructs demonstrated in both prior IS research and mass communications research. We find that the popular operationalization of trusting dispositions of buyers for the Internet medium is conceptually different from the popular IS operationalization of trust drawn from interpersonal buyer-seller interaction research. We also determine that characteristics of Internet sites are more predictive of subsequent purchase intentions than are user trusting intentions. Keywords Online Trust,, IT Trust INTRODUCTION Trust is a critical construct in ecommerce research. Buyers typically will not purchase online if they do not trust online retailers (Gefen et al., 2003; Gefen et al., 2006). Without considering trust, understanding why buyers engage in ecommerce is problematic. Trust serves to balance against uncertainty arising from online security threats such as malware and viruses, as well as hackers and interpersonal fraud in the form of phishing and pharming (Dinev and Hu, 2007; Hu and Dinev, 2005). Trust also salves concerns for privacy in online activities (Dinev and Hart 2006) as well as buyer concerns about opportunistic behaviors of sellers (e.g, Doney and Cannon, 1997; Ganeson, 1994). Transaction-specific suspicion of opposite parties in commercial exchanges is a theoretical staple of institutional economics (e.g, Williamson, 1985), which has been applied in relationship marketing research to explain the importance of trust in overcoming transaction-based risks (Dwyer, Schurr and Oh, 1987; Ganeson, 1994). The literature that has considered trust in online contexts has typically operationalized from interpersonal contexts (e.g., Gefen et al., 2006), although some approaches adopt an institutional perspective (Mayer, Davis and Schoorman, 1995; McKnight, Choudhury and Kacmar, 2002; McKnight, Cummings and Chervany, 1998). None, however, view online trust as dependent on the online medium and its related technologies, and this study offers a model of trust in online media developed specific to the online context. THEORETICAL ORIGINS OF THE TRUST CONSTRUCT Buyers and sellers routinely categorize each other (cf., Stafford, 1996; Stafford et al., 1995) which is why trust is a compelling research topic for online contexts. Consumers are typically considered to be suspicious of sellers, in line with a schemer schema (Wright, 1986), so trust is a highly compelling construct for business relationships of all sorts. Yet, trust as generally defined and theorized in MIS research may well be misspecified as a construct for many of its uses, despite some exceedingly detailed development in the literature (for a summary, see Gefen et al., 2006). The issue regards a primary Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

2 divergence in the nature of trust as a theoretical concept about a half century ago in the reference disciplines from which the currently-popular IS trust construct has been derived, and fresh considerations of the path not chosen in that theoretical divergence provides some very subtle distinctions between how people trust each other, one-to-one, and how people may likely trust each other through intermediating technologies. Perhaps people simply regard the machinery of the Internet as the source of the commercial communications they consider and disregard the humans behind it? In distinguishing between operationalizations of trust developed for interpersonal contexts with operationalizations tailored to mediated contexts, media models that consider trust as a component of source credibility can probably supplement what we have already learned from interpersonal contexts. Intermediated operationalizations can also enhance what we hope to learn about the nature of buyer trust in the Web sites where ecommerce occurs. The source credibility model of mass communications research can be useful in intermediated contexts (Fogg, 2003; Fogg and Tseng, 1999), but the trustworthiness and expertise measures directly adapted directly from prior mass media contexts do not fully capture the richness and complexity of the online metamedium and the domain for these dimensions must be newly resampled for the emergent online context (Fogg, 2004). This is because the dimensions of source credibility studied to date were designed for assessing old media, its effects and communicators, whereas the new media bundled in the context of the internet are quite different holistic as opposed to monolithic and old measures simply can t represent the richness of new mediated contexts. New measures must be developed. That is the purpose of this paper: to begin the process of demonstrating the credibility in its new online context. Simply adapting earlier measures of media-based source credibility to online contexts is not sufficient (Fogg, 2004) since too much time has passed and media have changed too much since their development. If mediated models of trust are to be used in online research in supplement to the currently employed interpersonal models, constructs developed specifically for the online context will be required. The process starts with new domain sampling and exploratory construct development (e.g., Stafford, Poston and Paul, 2012). The process continues with modeling such constructs in important business contexts to demonstrate their efficacy. The paper proceeds as follows: first, there is review of varying dimensions of trust currently seen in the IS literature ranging from both interpersonal and institutional perspectives. Then, the source credibility model of mass communications is reviewed for application to the Internet context. As part of this discussion, the most recent work on exploring the new domain of media-based Internet trust is reviewed (e.g., Stafford et al., 2012), whereupon we adopt emerging exploratory constructs for developing a model of customer subscription to an anti-spyware application offered by their Internet Service Provider. This model benchmarks emerging intermediated dimensions of with important business outcomes. We then conclude with a discussion of potential applications of such validated measures in ecommerce and Information and Communications Technology research. PARALLEL PATHS IN THE LITERATURE Researchers not familiar with communications theory or the literature on personal selling may not recognize the subtle but important distinctions between the sort of trust that develops between human exchange partners in sales relationships, and the types of trust that exist in mediated contexts. The important point is that human communications are often carried by intervening media, and this suggests that the credibility of communications media should be considered as part of online trust. An important consideration, however, is that the way in which Internet users view their online exchange partners is probably not the same as how individual persons view other individual persons in interpersonal contexts. The confidence that buyers have in Internet sites is better represented by an emergent concept of intermediated rather than interpersonal trust (e.g., Fogg, 2003; Reeves and Nass, 1996). This divergence of the several theoretical meanings of trust resembles the divergence in the communications theory literature between interpersonal communication and mass communication some years ago (Rogers and Valenti, 1993). This divergence arose from Schramm and his students discussions (e.g., Berlo, 1977; Schramm, 1971) of the communication process model that was popularized by Shannon and Weaver s (1949) Information Theory thesis. It is this subtle but important distinction between interpersonal and intermediated communication that drives the need to explore source effects conceptualizations of credibility and its subsidiary concept, trustworthiness, in the context of consumer interactions with the Internet. The view of trust that has been largely missing in the MIS research comes from the Yale School research team led by Carl Hovland. At the close of World War II these scholars conducted a massive study on the topic of Nazi propaganda (best characterized in Hovland et al. 1953). The source credibility perspective that arose from this represents the mass communication side of the mass/personal communication theory divergence in Internet trust research. The Yale theorists provided starting points which would guide mass communications theorists through two generations of inquiry into the nature of source credibility as the overarching concept in which trust was embedded (this evolution is well documented by Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

3 McGuire s 1973 and 1985 essays). Marketing researchers adopted this emergent source credibility model to understand how mediated persuasion worked. This led to a source effects model in which the characteristic of trust was embedded, along with several other important factors such as expertise and attractiveness (see Ohanian s 1990 celebrity endorser article for a succinct review). While communications theorists and market researchers were expanding the Yale source effects model, organizational psychologists were thinking about how the process of negotiation between suspicious transaction parties worked. Their theoretical contribution led to a view of trust as a single construct (see the earlier studies from Deutsch, 1960, or Lindskold, 1978, and the more recent study from Mayer et al., 1995). The organizational psychology research represents the personal communication side of the theoretical divergence of trust research, and this is the path that has informed much of what we currently know about trust in the IS literature (cf., Gefen, 2002; Gefen et al., 2003; Komiak et al., 2005; Lim et al., 2006; McKnight et al., 1998; 2002; Nicolau and McKnight, 2006; Pavlou, 2002; Pavlou et al., 2007; Stewart, 2003; Wang and Benbasat, 2007). When considering prominent trust research in MIS, only Benbasat has acknowledged the importance of source effects theories, and then only to call for research in that area (e.g., Xiao and Benbasat, 2007). Of the researchers calling on the concept of credibility (e.g., Ba and Pavlou, 2002; Pavlou and Dimoka, 2006; Fogg, 2003; Fogg and Tseng, 1999; Fogg et al., 2001; Xiao and Benbasat, 2007), only Fogg and his colleagues are drawing directly from the Yale School tradition, and then simply to observe that there have not been any large quantitative studies done on the nature of Web site credibility (Fogg et al., 2001). The Role of Source Credibility Online When considering trust in the realm of ecommerce, the well-respected communications theory paradigm of source credibility offers new perspectives yet to be considered (Xiao and Benbasat, 2007, p. 201). The only prior consideration of anything approaching the source credibility concept comes from Joe Cannon s components of trust conceptualization for personal selling contexts (e.g., Ba and Pavlou, 2002; Pavlou and Dimoka, 2006). Credibility and benevolence combine to form interpersonal trust in this view. Doney and Cannon (1997) evolve their credibility concept from Ganeson s (1994) interpretation of Lindskold (1978) the expectation that a partner s statements can be relied upon. This objective credibility of Lindskold operationalizes as reliance upon the veracity of another and is conceptually similar to the meaning of trust found in research based on Mayer et al. s (1995) definition. Even so, this characterization of credibility based on personal veracity is not conceptually similar to the mass communications source credibility paradigm which operationalizes credibility in terms of the combined effects of trusworthiness, expertise and attractiveness. The fundamental basis of source credibility in mass communications has always been found in the combination of trustworthiness (what Lindskold calls objective credibility ) and expertise (Hovland et al., 1953). More recent considerations have been augmented this view with the source attractiveness model, consisting of likeability, similarity and attraction characteristics (e.g., McGuire, 1973; 1985; Ohanian, 1990), in addition to the more traditional expertise and trustworthiness constructs. The Differing Aspects of Trust Trust has frequently been considered in the MIS literature to be the expectation that others will not behave opportunistically in the face of vulnerability of the trusting party (Gefen et al., 2003). This represents the interpersonal view of trust as adopted from the personal selling literature, which, in turn, relies on a transaction costs perspective of institutional economics (e.g., Anderson and Narus, 1990). This view of trust has been applied in organizations in the context workplace employee interactions (Mayer et al., 1995), or investigated in sales dyads between buyers and sellers (Doney and Cannon, 1997). It has, however, remained an interpersonal construct when used in MIS research for use in mainly impersonal ecommerce contexts. The problem with using conceptualizations of interpersonal trust brought from research on the nature of personal selling or workplace relationships is that trust plays an entirely different role in buyer-seller interactions than it does anywhere else in life. Buyer-seller interactions are characterized by background psychological categorization processes in which trust is required to overcome natural suspicions that buyers have of sellers (Fiske and Pavelchak, 1986; Stafford, 1996). Buyers routinely stereotype sellers and do this so automatically and generally that they are often not aware of the process (Stafford, 1996). The economic concept of transaction-specific risks (Williamson, 1985) suggests that risk is inherent in all commercial exchanges, particularly those taking place online (cf., Bakos, 1998; Glassberg and Merhout, 2007; Malone et al., 1987; 1989). But, taking interpersonal trust constructs from the sales literature while construing their operation to be consistent with the institutional construct of risk in online transactions raises issues of ecological validity in such context-modified theoretical scenarios. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

4 Except for studies that specifically focus on Internet mediated personal selling, such as an online auction with an identified human seller (cf., Ba and Pavlou, 2002; Pavlou and Dimoka, 2006; Pavlou and Geffen, 2004), it is hard to make a case for constructs based on personal selling rubrics of trust being contextually similar to ecommerce scenarios. Human computer interaction can be person-like (Reeves and Nass, 1996; Xiao and Benbasat, 2007) but is still distinct from human interpersonal interaction. Hence, trust that technology users place in their machine interactions should be studied in a unique and independent context. Based on exploratory research that sampled the domain of, while providing two key dimensions of trust-like characteristics in online contexts (e.g., Stafford et al., 2012), we propose a model that compares the effects of a dimension of trusting intent combined with a dimension of Web site cosmetic characteristics as a signal of credibility in motivating behavioral intentions of Internet customers to subscribe to a computer security application that their Internet Service Provider was offering. METHOD The scenario in which the exploratory dimensions of were fitted for modeling against business outcomes involved a prominent Internet Service Provider, America Online. The provider wished to investigate the characteristics of its customers which might lead to successfully launching a new spyware protection service being offered by subscription. It was suspected by executives that trust factors would have important effects on purchase intentions. Our involvement ranged from consultation on questionnaire construction to analysis and testing of causal hypotheses related to the credibility dimensions adapted from Stafford et al. (2012). The scale indicators for AOL s desired set of behavioral intention indicators (Purchase Intentions), as well as the two constructs (Trusting Intentions and Cosmetic Credibility) are listed in the Appendix. The indicators for the constructs are adapted directly from Stafford et al. (2012), while the Purchase Intentions indicators were supplied by AOL at their request, in order to examine the influence of source credibility components on characteristics considered to be related to potential subscription to the proffered service. It was expected that both constructs would be strongly related with each other, and that each would also have significant causal links to the AOL behavioral indicator set, characterized as Purchase Intentions. A structural model specified to these expectations was fitted, with data drawn from 1006 AOL subscribers who were recruited by the provider from their online research site, Opinion Place. Subjects participated in exchange for American Airlines frequent flyer points. America Online randomly assigns subjects to studies based on a sequential rotation of assignment to their pool of active research studies (Stafford and Gonier, 2004), but due to customer privacy requirements demographic information was not provided to us for reporting. However, AOL s own demographic summaries of their research respondent population routinely benchmarks their subject pool to both the general Internet population and the America Online user population. These statistical summaries are summarized in Table 1. Gender Male Female Opinion Place (participants) 35% 65% AOL (members) 45% 55% Internet (general users) 49% 51% U.S. Population 48% 52% Age % 25% 30% 23% 12% 16% 18% 27% 24% 16% 14% 21% 26% 23% 15% 12% 20% 21% 15% 32% Married 58% 62% 66% 57% Table 1. AOL Opinion Place Demographics 1 1 AOL demographic profiles are provided by and used with permission from AOL Opinion Place, and are the result of ongoing in-house demographic profile studies of their membership to support commercial research generality. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

5 The model, fitted in Lisrel 8.51, is shown in the Figure, and provides an excellent fit to the data, in accordance with commonly-reported fit indices and parameters. Modeling provided results in line with expectations with one notable exception: while Trusting Intentions and Cosmetic Credibility were highly related to each other, as expected, and while Cosmetic Credibility significantly predicted Purchase Intentions, Trusting Intentions did not. Since this construct is conceptually similar to McKnight s trusting intention/trusting belief characterization (e.g., McKnight et al., 1998), the distinction between customers inherent capabilities for trusting an online company and the completely different trust engendered by the appearance and performance of the online site are worth considering. PI 6 PI 5 PI 4 PI 3 PI 2 PI Purchase Intention χ 2 = (.000), df = 227 χ 2 /df = 3.44, GFI =.93, AGFI =.92 NFI =.93, CFI =.95, SRMR =.045 RMSEA = (.73).34 (7.59) Trusting Intentions.46 (16.32) Cosmetic Credibility CC7 CC6 CC5 CC4 CC3 CC2 CC1 TI 10 TI 9 TI 8 TI 7 TI 6 TI 5 TI 4 TI 3 TI 2 TI 1 FIGURE. Model of DISCUSSION AND IMPLICATIONS Trusting an Internet Service Provider to offer a useful anti-spyware utility for subscription purposes seems to be most highly related to the effect on customers of the Provider s Web presence, as opposed to the customer s inherent predisposition to trust an online provider. The seeming goodness of the technological interface would appear to be a highly influential credibility component in motivating intentions to subscribe to a commercial technological offering. The lack of influence of Trusting Intentions is curious; on interpretation might be that, in ecommerce operations, good Web design and effectively Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

6 functioning transactions sites are far more effective in motivating user trust in an online offering than are attempts to leverage consumers inherent disposition to trust a business. Another interpretation might be that the tendency of individuals to trust applied more to other individuals than it does to discorporate representations of companies in their technologically-mediated online settings. It bears mention that Trusting Intentions is a measure of the predisposition a customer has for trust, as opposed to a customer s actual development of trust in an online business based upon their interface with the online presence. It may be the case that people differ in their propensity to trust, but that their inclination to trust is catalyzed by site-specific characteristics that serve to activate the judgment. (i.e., cosmetic factors). The role of ecommerce site familiarity in producing degrees of buyer trust leading to purchase (e.g., Gefen, 2000), is one such example. We characterize this broadly as the dichotomoy between the inclination to trust and the cosmetic factors of site appearances and performance; other rubrics can also be drawn to characterize similar processes in different contexts, though the explanatory power of the familiarity construct is limited here in this study of specific subscribers to an Internet service (i.e., our subjects were all already quite familiar with their chosen Internet Service Provider). Understanding the distinction between the predisposition to trust and the factors which catalyze this predisposition will certainly be a fertile area for further inquiry and more detailed investigation, but in view of the Internet-specific context of development for the two constructs (e.g., Stafford et al., 2012), this outcome suggests that there are subtle but important departures to be made from traditional conceptualizations of online trust that were adapted from interpersonal contexts (e.g., McKnight et al., 1998). Ongoing research that directly compares the effects and performance of the differing constructs between the two views will be instructive. People and machines interact in interesting ways, but in ways that are not always directly comparable to how people interact with other people, even if the commercial contexts are comparable, as in buyer-seller interactions. In our study we adapt and test two components that are conceptually related but contextually distinct from the concepts arising from the online trust literature. Interesting new viewpoints from which to consider ongoing experimentation can be based on such concepts. The role of interpersonal trust as a rubric for online trust can benefit from further deliberation, as can the mode and methods of trust signaling cues developed as part of Web site designs used to demonstrate quality and trustworthiness in online contexts to customers. CONCLUSION The body of literature on Internet trust generally arises from interpersonal models of trust brought from reference disciplines. Trust in online contexts, however, can be examined through both interpersonal and intermediated contexts. We provide an initial demonstration of the intermediated approach here. This study provides a theoretical platform for the ongoing development of, and work going forward can seek to compare the influence and effects of interpersonal and intermediated conceptualizations of Internet trust. The effects of technological components of company Web resources are worth consideration, just as are the lack of effects that customer predispositions to trust have on purchase intentions, benchmarked in the context of the strong influence of credibility components related to the intermediate context of online commerce. REFERENCES 1. Anderson, E. and Narus, J.A. (1990), A Model of Distributor Firm and Manufacturer Firm Working Partnership, Journal of Marketing, 54, 1, Ba, S. and Pavlou, P.A. (2002), Evidence of the Effects of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior, MIS Quarterly, 26, 3, Bakos, Y. (1998), Towards Friction-Free Markets: The Emerging Role of Electronic Marketplaces on the Internet, Communications of the ACM, 41, 8, Berlo, D.K. (1977), Communication as process: Review and Commentary, in Communication Yearbook, B. Rubin (ed.), New Brunswick, NJ: Transaction Publishers. 5. Dinev, T. and Hart, P. (2006), An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research, 17, 1, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

7 6. Dinev, T. and Hu, Q. (2007), The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies, Journal of the AIS, 8, 7, Deutsch, M. (1960), The Effect of Motivational Orientation on Trust and Suspicion, Human Relations, 13, Doney, P.M. and Cannon, J.P An Examination of Trust in Buyer-Seller Relationships, Journal of Marketing, 61, Dwyer, F.R., Schurr, P.H. and Oh, S. (1987), Developing Buyer-Seller Relationships, Journal of Marketing, 51, Fiske, S.T. and Pavelchak, M.A. (1986), Category-Based versus Piecemeal-Based Affective Responses: Developments in Schema Triggered Affect, in Handbook of Motivation and Cognition: Foundations of Social Behavior, E. Higgins (ed.), New York: Guilford Press. 11. Fogg, B.J. (2004). Personal conversation. 12. Fogg, B.J. (2003). Persuasive Technology: Using Computers to Change what We Think and Do, San Francisco: Morgan Kauffman Publishers. 13. Fogg, B.J. and Tseng, H. (1999), The Elements of Computer Credibility, Proceedings of the ACM SIHCHI Conference. 14. Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P. and Treimen, M. (2001), What Makes Web Sites Credible? A Report on a Large Quantitative Study, Proceedings of the ACM SIGCHI Conference. 15. Ganesan, S. (1994), Determinants of Long Term Orientation in Buyer-Seller Relationships, Journal of Marketing, 58, Gefen, D. (2000), E-Commerce: The Role of Familiarity and Trust, Omega, 28, Gefen, D., Pavlou, P.A., Benbasat, I., McKnight, D., Stewart, K and Straub, D. (2006), ICIS Panel Summary: Should Institutional Trust Matter in Information Systems Research? Communications of the AIS, 17, 9, Glassberg, B.C. and Merhout, J.W. (2007), Electronic Markets Hypothesis Redux: Where are We Now? Communications of the ACM, 50, 2, Hovland, C.I., Janis, I.L. and Kelley, H.H. (1953). Communication and Persuasion: Psychological Studies of Opinion Change, New Haven, CT: Yale University Press. 20. Hu, Q. and Dinev, T. (2005), Spyware: An Internet-Age Nuisance or Public Menace? Communications of the ACM, 48, 8, Komiak, S.Y.K., Wang, W., and Benbasat, I. (2005), Trust Building in Virtual Salespersons versus Virtual Salespersons: Similarities and Differences, eservice Journal, 3, 3, Lindskold, S. (1978), Trust Development, the GRIT Proposal, and the Effects of Conciliatory Acts on Conflict and Cooperation, Psychological Bulletin, 85, 4, Lim, K.H., Sia, C.L., Lee, M.K.O., and Benbasat, I. 2006), Do I Trust You Online, and if so, Will I Buy? An Empirical Study of Two Trust-Building Strategies, Journal of MIS, 23, 2, Malone, T.W., Yates, J. and Benjamin, R. I. (1987), Electronic Markets and Electronic Hierarchies, Communications of the ACM, 30, 6, Malone, T.W., Yates, J. and Benjamin, R. I. (1989), The Logic of Electronic Markets, Harvard Business Review, 67, 3, Marakas, G.M., Johnson, R.D., and Palmer, J. (2000), A Theoretical Model of Differential Social Attributes toward Computing Technology: When The Metaphors become the Model, International Journal of Human-Computer Studies, 52, 4, Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995), An Integrative Model of Organizational Trust, Academy of Management Review, 20, 5, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

8 28. McGuire, W.J. (1973), Persuasion, Resistance and Attitude Change, in Handbook of Communication, I. de Sola Poul, F. Frey, W. Schram, N Macoby and E. Parker (eds.), Chicago: Rand McNally. 29. McGuire, W.J. (1985), Attitudes and Attitude Change, in Handbook of Social Psychology, Volume 2, G. Lindzey and E. Aronson (eds.), New York: Random House. 30. McKnight, D.H., Choudhury, V. and Kacmar, C. (2002), Developing and Validating Trust Measures for ecommerce: An Integrative Typology, Information Systems Research, 13, 3, McKnight, D.H., Cummings, L.L. and Chervany, N.L. (1998), Initial Trust Formation in New Organizational Relationships, Academy of Management Review, 23, 3, Morgan, R. M., and Hunt, S.D. (1994), The Commitment-Trust Theory of Relationship Marketing, Journal of Marketing, 58, 3, Nicolau, A.I. and McKnight, D.H. (2006), Perceived Information Quality in Data Exchange: Effectiveness, Risk, Trust and Intention to Use, Information System Research, 17, 4, Ohanian, R. (1990), Construction and Validation of a Scale to Measure Celebrity Endorsers Perceived Expertise, Trustworthiness and Attractiveness, Journal of Advertising, 19, 3, Pavlou, P.A. (2002), Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, 7, 3, Pavlou, P.A. and Dimoka, A.(2006), The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums and Seller Differentiation, Information Systems Research, 17, 4, Pavlou, P.A. and Gefen, D. (2004), Building Effective Online Marketplaces with Institution-Based Trust, Information Systems Research, 15, 1, Reeves, B. and Nass, C. (1996). The Media Equation: How People Treat Computers, Television and New Media like Real People and Places, New York: CSLI Publications. 39. Rogers, E. and Valente, T.W. (1993), A History of Information Theory in Communication Research, in Between Communication and Information: Information and Behavior Vol. 4, J. Schement and B. Rubin (eds.), New Brunswick, NJ: Transaction Publishers. 40. Schramm, W. (1971), The Nature of Communication between Humans, in The Process and Effects of Mass Communication, W. Schramm and D. Roberts (eds.), Urbana, IL: University of Illinois Press. 41. Shannon, C.E. and Weaver, W. (1949). The Mathematical Theory of Communication, Urbana, IL: University of Illinois Press. 42. Stafford, T.F. (1996), Conscious and Unconscious Processing of Priming Cues in Selling Encounters, Journal of Personal Selling and Sales Management, 2, Stafford, T.F. and Gonier, D. (2004), Gratifications for Internet Use: What Americans Like about Being Online, Communications of the ACM, 47, 1, Stafford, T.F., Leigh, T.W., and Martin, L.L. (1995), Assimilation and Contrast Priming Effects In the Initial Consumer Sales Call, Psychology and Marketing, 12, 4, Stafford, T.F., Poston, R.S. and Paul, R. (2012), : Cognitive Constructs of Trustworthiness for Online Media. Proceedings of the IS CoRE ICIS Special Interest Group for Cognitive Research in Information Systems. 46. Stewart, K.J. (2003), Trust Transfer on the World Wide Web, Organization Science, 14, 1, Wang, W. and Benbasat, I. (2007), Recommendation Agents for Electronic Commerce: Effects of Explanation Facilities on Trusting Beliefs, Journal of MIS, 23, 4, Williamson, O. E. (1985). The Economic Institutions of Capitalism. Free Press, New York. 49. Wright, P. (1986), Schemer Schema: Consumer s Intuitive Theories about Marketers Influence Tactics, Advances in Consumer Research, 13, 1-3. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

9 50. Xiao, B. and Benbasat, I. (2007), E-Commerce Product Recommendation Agents: Use, Characteristics and Impact, MIS Quarterly, 31, 1, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

10 APPENDIX Scale Indicators Purchase Intent PI 1 I agree the service is new and different PI 2 I agree that AOL is the appropriate provider for the service PI 3 I agree that it is believable that AOL could provide such a service PI 4 I agree that it is AOL s responsibility to provide such a service PI 5 I agree that I would feel positive about AOL if it provided the service PI 6 How likely are you to subscribe to the service? Trusting Intentions TI 1 I tend to believe information from Web sites as fact TI 2 It is natural for me to trust information from Web sites TI 3 It is comfortable for me to trust information from Web sites TI 4 I believe Web site technology can be trusted TI 5 I trust a majority of the information on the Internet TI 6 If a site performs well, I tend to believe it TI 7 If a site takes the human side, I tend to believe it TI 8 It is a habit for me to trust information from Web sites TI 9 If a site sounds smart, I tend to believe it TI 10 If a site gives interesting points of view, I tend to believe it Cosmetic Credibility CC 1 It says it is the official site CC 2 The site is linked to a site I already find believable CC 3 The site was recommend by a friend CC 4 The site looks professionally designed CC 5 The site provides quick responses to customer service questions CC 6 The site sends confirmation s to for my transactions CC 7 The site is arranged in a way that makes sense Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,

Trust in E-Commerce Vendors: A Two-Stage Model

Trust in E-Commerce Vendors: A Two-Stage Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model

More information

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH DANIEL Z. LEVIN Management and Global Business Dept. Rutgers Business School Newark and New Brunswick Rutgers

More information

Is entrepreneur s photo a crucial element in a crowdfunding webpage?

Is entrepreneur s photo a crucial element in a crowdfunding webpage? Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business

More information

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:

More information

Creating More Credible and Likable Travel Recommender Systems

Creating More Credible and Likable Travel Recommender Systems Creating More Credible and Likable Travel Recommender Systems Kyung Hyan Yoo Laboratory for Intelligent Systems in Tourism Department of Recreation, Park & Tourism Sciences Texas A&M University, USA toinette@tamu.edu

More information

How Self-Efficacy and Gender Issues Affect Software Adoption and Use

How Self-Efficacy and Gender Issues Affect Software Adoption and Use How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize

More information

Untangling the Antecedents and Covariates of E-Commerce Trust: Institutional Trust vs. Knowledge-Based Trust

Untangling the Antecedents and Covariates of E-Commerce Trust: Institutional Trust vs. Knowledge-Based Trust RESEARCH Untangling the Antecedents and Covariates of E-Commerce Trust: Institutional Trust vs. Knowledge-Based Trust STEPHEN C. WINGREEN AND STEPHEN L. BAGLIONE A b s t r a c t Through experimentation,

More information

Evolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model

Evolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2006 Evolution of Trust in Distributed Software Development

More information

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce

More information

EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE

EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE Abstract Ben Liu University of Georgia benliu@uga.edu Elena Karahanna University of Georgia ekarah@terry.uga.edu Technology acceptance model

More information

Assessing Social Networking from Three Different Perspectives: Toward an Integrative View

Assessing Social Networking from Three Different Perspectives: Toward an Integrative View Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2013 Proceedings Midwest (MWAIS) 5-24-2013 Assessing Social Networking from Three Different Perspectives: Toward an Integrative

More information

Who Subscribe to Identity Theft Protection Service

Who Subscribe to Identity Theft Protection Service DECISION SCIENCES INSTITUTE? An Exploration of Antecedent Factors Yuan Li University of Illinois at Springfield Email: yli295@uis.edu Jingguo Wang University of Texas at Arlington Email: jwang@uta.edu

More information

THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES

THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN

More information

Naturalness of a product is a trustworthiness cue

Naturalness of a product is a trustworthiness cue Naturalness of a product is a trustworthiness cue Sydney Scott 4 th Year Doctoral Candidate Department of Psychology and Wharton Marketing Department Mailing Address: 3720 Walnut St. Philadelphia, PA 19104

More information

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey Available online at www.sciencedirect.com Procedia - Social and Behavioral Scien ce s 8 ( 0 ) nd World Conference on Educational Technology Researches WCETR0 The role of Gender in Pharmacists Attitudes

More information

Personal Talent Skills Inventory

Personal Talent Skills Inventory Personal Talent Skills Inventory Sales Version Inside Sales Sample Co. 5-30-2013 Introduction Research suggests that the most effective people are those who understand themselves, both their strengths

More information

Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment

Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Marshall University Marshall Digital Scholar Management Faculty Research Management, Marketing and MIS Fall 11-14-2009 Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Wai Kwan

More information

CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors

CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY Guest Co-Editors Philip Bobko Gettysburg College pbobko@gettysburg.edu Alex J. Barelka Illinois State

More information

reward based power have ability to give you what you want. coercive have power to punish

reward based power have ability to give you what you want. coercive have power to punish Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator

More information

An Examination of Perceptions of Male and Female Avatars

An Examination of Perceptions of Male and Female Avatars Association for Information Systems AIS Electronic Library (AISeL) MG 2009 Proceedings Mardi Gras Conference February 2009 An Examination of Perceptions of Male and Female Avatars David DeWester Department

More information

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment

More information

VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS

VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS Noel J. Lindsay 1, Anton Jordaan, and Wendy A. Lindsay Centre for the Development of Entrepreneurs University of South

More information

Kahneman, Daniel. Thinking Fast and Slow. New York: Farrar, Straus & Giroux, 2011.

Kahneman, Daniel. Thinking Fast and Slow. New York: Farrar, Straus & Giroux, 2011. The accumulating research indicates that individuals cognitive and behavioral orientations to objects (their thoughts and actions) are frequently based on rapid shortcuts or heuristics. The past few decades

More information

Shannon-Weaver communication transmission model

Shannon-Weaver communication transmission model AEE 6540 Communication Theories and Strategies for Agriculture and Natural Resources Course purpose and objectives Where else would you rather be? Why is it important to learn about communication theory

More information

INDIVIDUALIZED MASTER OF ARTS PROGRAM IN CONFLICT RESOLUTION. The McGregor School of Antioch University. Core Session I

INDIVIDUALIZED MASTER OF ARTS PROGRAM IN CONFLICT RESOLUTION. The McGregor School of Antioch University. Core Session I INDIVIDUALIZED MASTER OF ARTS PROGRAM IN CONFLICT RESOLUTION The McGregor School of Antioch University Core Session I Topic: Professor: Trust and Trust-Building Dr. Honggang Yang (Notes: Classes start

More information

Issues in Information Systems Volume 17, Issue II, pp , 2016

Issues in Information Systems Volume 17, Issue II, pp , 2016 CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr

More information

School Administrators Level of Self-Esteem and its Relationship To Their Trust in Teachers. Mualla Aksu, Soner Polat, & Türkan Aksu

School Administrators Level of Self-Esteem and its Relationship To Their Trust in Teachers. Mualla Aksu, Soner Polat, & Türkan Aksu School Administrators Level of Self-Esteem and its Relationship To Their Trust in Teachers Mualla Aksu, Soner Polat, & Türkan Aksu What is Self-Esteem? Confidence in one s own worth or abilities (http://www.oxforddictionaries.com/definition/english/self-esteem)

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time

More information

Thank you very much for your guidance on this revision. We look forward to hearing from you.

Thank you very much for your guidance on this revision. We look forward to hearing from you. 1 PAINTED BUNTING MANUSCRIPT REVIEW HISTORY REVISION NOTES FROM AUTHORS (ROUND 2) We would like to submit a revision of our manuscript. As you requested, we have run new studies that employ additional

More information

Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found and Lost

Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found and Lost Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2012 Proceedings Proceedings Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found

More information

PLANNING THE RESEARCH PROJECT

PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm page 1 Part I PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm

More information

ABSTRACT. Professor Dr. Rebecca Hamilton and Professor Dr. Joydeep Srivastava, Department of Marketing

ABSTRACT. Professor Dr. Rebecca Hamilton and Professor Dr. Joydeep Srivastava, Department of Marketing ABSTRACT Title of Document: THE INFLUENCE OF CONSUMER MOTIVATIONS ON CONSUMPTION INTENTIONS AND BEHAVIOR Francine da Silveira Espinoza, Doctor of Philosophy, 2009 Co-Directed By: Professor Dr. Rebecca

More information

CHAPTER III RESEARCH MODEL FRAMEWORK

CHAPTER III RESEARCH MODEL FRAMEWORK CHAPTER III RESEARCH MODEL FRAMEWORK This chapter presents an overview of the relevant theories related to the adoption of new information technology and includes a briefing of online trust, followed by

More information

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Timothy Teo & Chwee Beng Lee Nanyang Technology University Singapore This

More information

A Model of Unethical Usage of Information Technology

A Model of Unethical Usage of Information Technology Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha

More information

NEGOTIATION SEVENTH EDITION

NEGOTIATION SEVENTH EDITION NEGOTIATION SEVENTH EDITION ROY J. LEWICKI DAVID M. SAUNDERS BRUCE BARRY 2015 by McGraw Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution

More information

Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites

Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-1-2010 Privacy Concern, Locus of Control, and Salience in

More information

The Effects of Societal Versus Professor Stereotype Threats on Female Math Performance

The Effects of Societal Versus Professor Stereotype Threats on Female Math Performance The Effects of Societal Versus Professor Stereotype Threats on Female Math Performance Lauren Byrne, Melannie Tate Faculty Sponsor: Bianca Basten, Department of Psychology ABSTRACT Psychological research

More information

Cognitive Authority. Soo Young Rieh. School of Information. University of Michigan.

Cognitive Authority. Soo Young Rieh. School of Information. University of Michigan. Cognitive Authority Soo Young Rieh School of Information University of Michigan rieh@umich.edu Patrick Wilson (1983) developed the cognitive authority theory from social epistemology in his book, Second-hand

More information

Models of Information Retrieval

Models of Information Retrieval Models of Information Retrieval Introduction By information behaviour is meant those activities a person may engage in when identifying their own needs for information, searching for such information in

More information

Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,*

Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,* 2017 International Conference on Applied Mechanics and Mechanical Automation (AMMA 2017) ISBN: 978-1-60595-471-4 Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi

More information

The influence of (in)congruence of communicator expertise and trustworthiness on acceptance of CCS technologies

The influence of (in)congruence of communicator expertise and trustworthiness on acceptance of CCS technologies The influence of (in)congruence of communicator expertise and trustworthiness on acceptance of CCS technologies Emma ter Mors 1,2, Mieneke Weenig 1, Naomi Ellemers 1, Dancker Daamen 1 1 Leiden University,

More information

Collaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration

Collaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration Collaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration Roy Chua, Harvard Business School Michael Morris, Columbia Business School Shira Mor, Columbia Business

More information

A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan

A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan Pei Liu School of Management and Economics, North China Zhen Li Data Science

More information

The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options

The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Executive Summary: The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Overview This is the first Deliberative Poll (DP) anywhere in the world that was

More information

THE IMPACT OF PSYCHOLOGICAL CONTRACT ON RELATIONSHIP QUALITY IN FINANCIAL SERVICES MARKET

THE IMPACT OF PSYCHOLOGICAL CONTRACT ON RELATIONSHIP QUALITY IN FINANCIAL SERVICES MARKET THE IMPACT OF PSYCHOLOGICAL CONTRACT ON RELATIONSHIP QUALITY IN FINANCIAL SERVICES MARKET Mario Pepur University of Split, Faculty of Economics Cvite Fiskovića 5, 21000 Split, Croatia mpepur@efst.hr Zoran

More information

Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London. Harvey Toulouse October 2009

Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London. Harvey Toulouse October 2009 Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London Outline Definitions of trust Some research issues for psychologists Ways of studying trust

More information

On Trust. Massimo Felici. Massimo Felici On Trust c

On Trust. Massimo Felici. Massimo Felici On Trust c On Trust Massimo Felici Outline 1 What is Trust? Trust matters Trust problems Seeking an Experimental Trust Framework Trust and Dependability Directions for future work What is Trust? 2 Constructive Trust

More information

Improving the U.S. Public s Understanding of Climate Change

Improving the U.S. Public s Understanding of Climate Change Improving the U.S. Public s Understanding of Climate Change Paul C. Stern, Director, Committee on the Human Dimensions of Global Change National Research Council, USA Presentation to Symposium on Communicating

More information

Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal

Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal Seoul Journal of Business Volume 11, Number 1 (June 2005) Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal

More information

Issues in Information Systems

Issues in Information Systems ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web

More information

The Holistic Defense Toolkit

The Holistic Defense Toolkit The Holistic Defense Toolkit Table of Contents 1. Holistic Defense Defined 2. The Four Pillars of Holistic Defense 3. The Holistic Defense Office Self-Assessment Tool 4. Explanation of Services Offered

More information

An Experimental Investigation of Self-Serving Biases in an Auditing Trust Game: The Effect of Group Affiliation: Discussion

An Experimental Investigation of Self-Serving Biases in an Auditing Trust Game: The Effect of Group Affiliation: Discussion 1 An Experimental Investigation of Self-Serving Biases in an Auditing Trust Game: The Effect of Group Affiliation: Discussion Shyam Sunder, Yale School of Management P rofessor King has written an interesting

More information

Qualitative Data Analysis. Richard Boateng, PhD. Arguments with Qualitative Data. Office: UGBS RT18 (rooftop)

Qualitative Data Analysis. Richard Boateng, PhD. Arguments with Qualitative Data. Office: UGBS RT18 (rooftop) Qualitative Data Analysis Lecturer/Convenor: Richard Boateng, PhD. Email: richard@pearlrichards.org Office: UGBS RT18 (rooftop) Arguments with Qualitative Data Photo Illustrations from Getty Images www.gettyimages.com

More information

Written by admin Monday, 24 December :50 - Last Updated Saturday, 05 January :05

Written by admin Monday, 24 December :50 - Last Updated Saturday, 05 January :05 Conflict Mediation and Resolution Introduction Ethics in healthcare is a matter that needs to be given a lot of priority as well as a keen approach. This is because what one person might consider being

More information

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Introduction Technology enables consumers to undertake everything from relatively simple

More information

The Impact of Internalization and Familiarity On Trust and Adoption of Recommendation Agents

The Impact of Internalization and Familiarity On Trust and Adoption of Recommendation Agents The Impact of Internalization and Familiarity On Trust and Adoption of Recommendation Agents Key Words: Electronic Commerce, Trust, Customer Trust, Computer Agent, Intelligent Agent, Recommendation Agent,

More information

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines ABSTRACT Heshan Sun Syracuse University hesun@syr.edu The current study is built upon prior research and is an

More information

Attitude Measurement

Attitude Measurement Business Research Methods 9e Zikmund Babin Carr Griffin Attitude Measurement 14 Chapter 14 Attitude Measurement 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or

More information

The Effects of Product Attribute s New Information and Target Compatibility on Consumer Elaboration

The Effects of Product Attribute s New Information and Target Compatibility on Consumer Elaboration The Effects of Product Attribute s New Information and Target Compatibility on Consumer Elaboration Dr. Chan-Chien Chiu, Associate Professor of Taiwan Hospitality & Tourism College, Taiwan ABSTRACT This

More information

Applied Social Psychology Msc.

Applied Social Psychology Msc. Applied Social Msc. Course Course names Course description codes MSPSY501* Applied Social This module will discuss, at advanced level: The cognitive system, conceptual systems, expectation, explanation

More information

Schematic Model Of A Theory Of Mass Media Communication

Schematic Model Of A Theory Of Mass Media Communication Schematic Model Of A Theory Of Mass Media Communication 1Department of Mass Communication,University of Ilorin, Ilorin The earliest model of democracy which used to be dominant in ancient Athens was There

More information

Experimental Study of Consumer Behavior Conformity and Independence

Experimental Study of Consumer Behavior Conformity and Independence Experimental Study of Consumer Behavior Conformity and Independence M. VENKATESAN* >Results of a laboratory experiment indicate that in consumer decision making, in the absence of any objective standard,

More information

Trust Needs Touch: Understanding the Building of Trust through Social Presence Completed Research Paper

Trust Needs Touch: Understanding the Building of Trust through Social Presence Completed Research Paper Trust Needs Touch: Understanding the Building of Trust through Social Presence Completed Research Paper Nicolai Walter University of Muenster ERCIS nicolai.walter@uni-muenster.de Bjoern Niehaves Hertie

More information

Services Marketing Chapter 10: Crafting the Service Environment

Services Marketing Chapter 10: Crafting the Service Environment Chapter 10: Crafting the Service Environment 7/e Chapter 10 Page 1 Overview of Chapter 10 What is the Purpose of Service Environments? Understanding Consumer Responses to Service Environments Dimensions

More information

THE HYBRID MODEL OF TRUST AND DISTRUST: EXTENDING THE NOMOLOGICAL NETWORK. Gregory Daniel Moody

THE HYBRID MODEL OF TRUST AND DISTRUST: EXTENDING THE NOMOLOGICAL NETWORK. Gregory Daniel Moody THE HYBRID MODEL OF TRUST AND DISTRUST: EXTENDING THE NOMOLOGICAL NETWORK by Gregory Daniel Moody B. S. Information Systems Management, Brigham Young University, 2006 Master of Information Systems Management,

More information

Systems Theory: Should Information Researchers Even Care?

Systems Theory: Should Information Researchers Even Care? Association for Information Systems AIS Electronic Library (AISeL) SAIS 2016 Proceedings Southern (SAIS) 2016 Systems Theory: Should Information Researchers Even Care? Kane J. Smith Virginia Commonwealth

More information

Servant and Transformational Followership as a Consumptive Experience

Servant and Transformational Followership as a Consumptive Experience REGENT UNIVERSITY Servant and Transformational Followership as a Consumptive Experience Servant Leadership Research Roundtable August 2005 Bruce E. Winston, Ph.D. Regent University This conceptual article

More information

Effects of Aggregate Rating on ewom Acceptance: An Attribution Theory Perspective

Effects of Aggregate Rating on ewom Acceptance: An Attribution Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) PACIS 2010 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2010 Effects of Aggregate Rating on ewom Acceptance: An

More information

The Effect of the Fulfillment of Hedonic and Aesthetic Information Needs of a Travel Magazine on Tourist Decision Making

The Effect of the Fulfillment of Hedonic and Aesthetic Information Needs of a Travel Magazine on Tourist Decision Making University of Massachusetts Amherst ScholarWorks@UMass Amherst Travel and Tourism Research Association: Advancing Tourism Research Globally 2011 ttra International Conference The Effect of the Fulfillment

More information

Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site

Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site SEUNGHO CHO shcho72@gmail.com LAURA RICHARDSON WALTON lwalton@comm.msstate.edu Mississippi

More information

Cultural Competence Learning Guide. Cook Ross Inc.

Cultural Competence Learning Guide. Cook Ross Inc. Cultural Competence Learning Guide Cook Ross Inc. INTRODUCTION Welcome to CultureVision s Cultural Competence Learning Guide, a combination of education, exploration, and self-analysis around cultural

More information

MANAGEMENT. MGMT 0021 THE MANAGEMENT PROCESS 3 cr. MGMT 0022 FINANCIAL ACCOUNTING 3 cr. MGMT 0023 MANAGERIAL ACCOUNTING 3 cr.

MANAGEMENT. MGMT 0021 THE MANAGEMENT PROCESS 3 cr. MGMT 0022 FINANCIAL ACCOUNTING 3 cr. MGMT 0023 MANAGERIAL ACCOUNTING 3 cr. MANAGEMENT MGMT 0021 THE MANAGEMENT PROCESS 3 cr. An introduction designed to emphasize the basic principles, practices, and terminology essential to the understanding of contemporary business and its

More information

Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health

Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health + Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health By Resiliency Initiatives and Ontario Public Health + Presentation Outline Introduction The Need for a Paradigm Shift Literature

More information

RapidRapport. Action Journal. with Michael Bernoff

RapidRapport. Action Journal. with Michael Bernoff with Michael Bernoff Action Journal Rapport-building acts as the foundation for the introduction of ideas, relationships, products and services. Without establishing rapport, you are unlikely to get the

More information

Planning Case Study. Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan

Planning Case Study. Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan Planning Case Study Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan On the vanguard of thought. Reimagining The futurecancer of healthcare Care requires nothing less. Planning

More information

An Exploratory Study on Consumer Psychological Contracts

An Exploratory Study on Consumer Psychological Contracts International DSI / Asia and Pacific DSI 2007 Full Paper (July, 2007) An Exploratory Study on Consumer Psychological Contracts Jingyi Wang 1), Hongping Sun 2) Management School, Guangdong University of

More information

The Relative Importance Of Trust Intentions And Trust Beliefs In Internet Banking Adoption

The Relative Importance Of Trust Intentions And Trust Beliefs In Internet Banking Adoption International Review of Business Research Papers Vol. 5 No. 6 November 2009, Pp.231-247 The Relative Importance Of Trust Intentions And Trust Beliefs In Internet Banking Adoption Bander A. Alsajjan 1 The

More information

A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES

A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS

More information

15 May 2017 Exposure Draft. Response Due Date 23 June Exposure Draft

15 May 2017 Exposure Draft. Response Due Date 23 June Exposure Draft 15 May 2017 Exposure Draft Response Due Date 23 June 2017 Exposure Draft Proposed Application Material Relating to: (a) Professional Skepticism Linkage with the Fundamental Principles; and (b) Professional

More information

Thinking Like a Researcher

Thinking Like a Researcher 3-1 Thinking Like a Researcher 3-3 Learning Objectives Understand... The terminology used by professional researchers employing scientific thinking. What you need to formulate a solid research hypothesis.

More information

Priming Effects by Visual Image Information in On-Line Shopping Malls

Priming Effects by Visual Image Information in On-Line Shopping Malls Priming Effects by Visual Image Information in On-Line Shopping Malls Eun-young Kim*, Si-cheon You**, Jin-ryeol Lee*** *Chosun University Division of Design 375 Seosukdong Dong-gu Gwangju Korea, key1018@hanmail.net

More information

Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members

Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members Lionel P. Robert Jr., Alan R. Dennis, and Yu Ting Caisy Hung Li o n e l P. Ro b e rt Jr. is an Assistant Professor

More information

Consumers' Acceptance of Electronic Word-of- Mouth Recommendations: Effects of Multiple Communication Elements and Processing Motivation

Consumers' Acceptance of Electronic Word-of- Mouth Recommendations: Effects of Multiple Communication Elements and Processing Motivation Association for Information Systems AIS Electronic Library (AISeL) ICIS 2006 Proceedings International Conference on Information Systems (ICIS) December 2006 Consumers' Acceptance of Electronic Word-of-

More information

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning

More information

EMOTIONAL TRUST AND COGNITIVE DISTRUST: FROM A COGNITIVE-AFFECTIVE PERSONALITY SYSTEM THEORY PERSPECTIVE

EMOTIONAL TRUST AND COGNITIVE DISTRUST: FROM A COGNITIVE-AFFECTIVE PERSONALITY SYSTEM THEORY PERSPECTIVE EMOTIONAL TRUST AND COGNITIVE DISTRUST: FROM A COGNITIVE-AFFECTIVE PERSONALITY SYSTEM THEORY PERSPECTIVE Jung Lee, Bang College of Business, Kazakhstan Institute of Management, Economics and Strategic

More information

Chapter 1 Introduction to Educational Research

Chapter 1 Introduction to Educational Research Chapter 1 Introduction to Educational Research The purpose of Chapter One is to provide an overview of educational research and introduce you to some important terms and concepts. My discussion in this

More information

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL Eduardo Esteva-Armida, Instituto Tecnológico y de Estudios Superiores de Monterrey Gral. Ramón Corona 2514, Zapopan, Jalisco, México 45120 Phone: (5233) 3669.3080

More information

Assessing e-banking Adopters: an Invariance Approach

Assessing e-banking Adopters: an Invariance Approach Assessing e-banking Adopters: an Invariance Approach Vincent S. Lai 1), Honglei Li 2) 1) The Chinese University of Hong Kong (vslai@cuhk.edu.hk) 2) The Chinese University of Hong Kong (honglei@baf.msmail.cuhk.edu.hk)

More information

Research on Social Psychology Based on Network Big Data

Research on Social Psychology Based on Network Big Data 2017 2nd International Conference on Mechatronics and Information Technology (ICMIT 2017) Research on Social Psychology Based on Network Big Data Fuhong Li Department of psychology, Weifang Medical University,

More information

Optimal Flow Experience in Web Navigation

Optimal Flow Experience in Web Navigation Optimal Flow Experience in Web Navigation Hsiang Chen, Rolf T. Wigand and Michael Nilan School of Information Studies, Syracuse University Syracuse, NY 13244 Email: [ hchen04, rwigand, mnilan]@mailbox.syr.edu

More information

Is Leisure Theory Needed For Leisure Studies?

Is Leisure Theory Needed For Leisure Studies? Journal of Leisure Research Copyright 2000 2000, Vol. 32, No. 1, pp. 138-142 National Recreation and Park Association Is Leisure Theory Needed For Leisure Studies? KEYWORDS: Mark S. Searle College of Human

More information

Planning Case Study. Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan

Planning Case Study. Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan Planning Case Study Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan On the vanguard of thought. Reimagining The futurecancer of healthcare Care requires nothing less. Planning

More information

WHAT DOES THE BRAIN TELL US ABOUT TRUST AND DISTRUST? EVIDENCE FROM A FUNCTIONAL NEUROIMAGING STUDY 1

WHAT DOES THE BRAIN TELL US ABOUT TRUST AND DISTRUST? EVIDENCE FROM A FUNCTIONAL NEUROIMAGING STUDY 1 SPECIAL ISSUE WHAT DOES THE BRAIN TELL US ABOUT TRUST AND DISTRUST? EVIDENCE FROM A FUNCTIONAL NEUROIMAGING STUDY 1 By: Angelika Dimoka Fox School of Business Temple University 1801 Liacouras Walk Philadelphia,

More information

Topic 2 Traits, Motives, and Characteristics of Leaders

Topic 2 Traits, Motives, and Characteristics of Leaders Topic 2 Traits, Motives, and Characteristics of Leaders Introduction Are some individuals endowed with special qualities that allow them to lead? Why is one person more successful than another? Can we

More information

Building Trust through Social Networking

Building Trust through Social Networking Building Trust through Social Networking Jeffrey Bohler Troy University jbohler@troy.edu Full Paper John R. Drake East Carolina University drakejo@ecu.edu Abstract Usage of social networking sites requires

More information

User Acceptance of Mobile Internet Based on. Gender Differences

User Acceptance of Mobile Internet Based on. Gender Differences SOCIAL BEHAVIOR AND PERSONALITY, 2010, 38(3), 415-426 Society for Personality Research (Inc.) DOI 10.2224/sbp.2010.38.3.415 User Acceptance of Mobile Internet Based on THE UNIFIED THEORY OF ACCEPTANCE

More information

GREEN MARKETING - WHAT MAKES SOME CONSUMERS BUY GREEN PRODUCTS WHILE OTHERS DO NOT?

GREEN MARKETING - WHAT MAKES SOME CONSUMERS BUY GREEN PRODUCTS WHILE OTHERS DO NOT? GREEN MARKETING - WHAT MAKES SOME CONSUMERS BUY GREEN PRODUCTS WHILE OTHERS DO NOT? Rudly Raphael President - qsample Caroline Fisher, Ph.D. University of Missouri WHAT DETERMINES ENVIRONMENTALLY-FRIENDLY

More information

Affect, Behavior, Cognition, and Desire in the Big Five: An Analysis of Item Content and Structure

Affect, Behavior, Cognition, and Desire in the Big Five: An Analysis of Item Content and Structure Affect, Behavior, Cognition, and Desire in the Big Five: An Analysis of Item Content and Structure Joshua Wilt Department of Psychological Sciences Case Western Reserve University Cleveland, OH USA July

More information