Assessing Internet Source Credibility
|
|
- Shonda Norton
- 5 years ago
- Views:
Transcription
1 Assessing Research-in-Progress Thomas F. Stafford University of Memphis Robin S. Poston University of Memphis Jason Rhea University of Memphis ABSTRACT Little work in IT trust has extended the source credibility model from mass communications to the context of online media. Existing constructs arise from reference discipline concepts of interpersonal trust, but consumers view the Internet differently than they view individuals. We develop an model that compares the effects of Trusting Intentions and Cosmetic Credibility on Purchase Intentions for an Internet security application provided by an Internet Service Provider. Results indicate that aspects of are conceptually different from constructs demonstrated in both prior IS research and mass communications research. We find that the popular operationalization of trusting dispositions of buyers for the Internet medium is conceptually different from the popular IS operationalization of trust drawn from interpersonal buyer-seller interaction research. We also determine that characteristics of Internet sites are more predictive of subsequent purchase intentions than are user trusting intentions. Keywords Online Trust,, IT Trust INTRODUCTION Trust is a critical construct in ecommerce research. Buyers typically will not purchase online if they do not trust online retailers (Gefen et al., 2003; Gefen et al., 2006). Without considering trust, understanding why buyers engage in ecommerce is problematic. Trust serves to balance against uncertainty arising from online security threats such as malware and viruses, as well as hackers and interpersonal fraud in the form of phishing and pharming (Dinev and Hu, 2007; Hu and Dinev, 2005). Trust also salves concerns for privacy in online activities (Dinev and Hart 2006) as well as buyer concerns about opportunistic behaviors of sellers (e.g, Doney and Cannon, 1997; Ganeson, 1994). Transaction-specific suspicion of opposite parties in commercial exchanges is a theoretical staple of institutional economics (e.g, Williamson, 1985), which has been applied in relationship marketing research to explain the importance of trust in overcoming transaction-based risks (Dwyer, Schurr and Oh, 1987; Ganeson, 1994). The literature that has considered trust in online contexts has typically operationalized from interpersonal contexts (e.g., Gefen et al., 2006), although some approaches adopt an institutional perspective (Mayer, Davis and Schoorman, 1995; McKnight, Choudhury and Kacmar, 2002; McKnight, Cummings and Chervany, 1998). None, however, view online trust as dependent on the online medium and its related technologies, and this study offers a model of trust in online media developed specific to the online context. THEORETICAL ORIGINS OF THE TRUST CONSTRUCT Buyers and sellers routinely categorize each other (cf., Stafford, 1996; Stafford et al., 1995) which is why trust is a compelling research topic for online contexts. Consumers are typically considered to be suspicious of sellers, in line with a schemer schema (Wright, 1986), so trust is a highly compelling construct for business relationships of all sorts. Yet, trust as generally defined and theorized in MIS research may well be misspecified as a construct for many of its uses, despite some exceedingly detailed development in the literature (for a summary, see Gefen et al., 2006). The issue regards a primary Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
2 divergence in the nature of trust as a theoretical concept about a half century ago in the reference disciplines from which the currently-popular IS trust construct has been derived, and fresh considerations of the path not chosen in that theoretical divergence provides some very subtle distinctions between how people trust each other, one-to-one, and how people may likely trust each other through intermediating technologies. Perhaps people simply regard the machinery of the Internet as the source of the commercial communications they consider and disregard the humans behind it? In distinguishing between operationalizations of trust developed for interpersonal contexts with operationalizations tailored to mediated contexts, media models that consider trust as a component of source credibility can probably supplement what we have already learned from interpersonal contexts. Intermediated operationalizations can also enhance what we hope to learn about the nature of buyer trust in the Web sites where ecommerce occurs. The source credibility model of mass communications research can be useful in intermediated contexts (Fogg, 2003; Fogg and Tseng, 1999), but the trustworthiness and expertise measures directly adapted directly from prior mass media contexts do not fully capture the richness and complexity of the online metamedium and the domain for these dimensions must be newly resampled for the emergent online context (Fogg, 2004). This is because the dimensions of source credibility studied to date were designed for assessing old media, its effects and communicators, whereas the new media bundled in the context of the internet are quite different holistic as opposed to monolithic and old measures simply can t represent the richness of new mediated contexts. New measures must be developed. That is the purpose of this paper: to begin the process of demonstrating the credibility in its new online context. Simply adapting earlier measures of media-based source credibility to online contexts is not sufficient (Fogg, 2004) since too much time has passed and media have changed too much since their development. If mediated models of trust are to be used in online research in supplement to the currently employed interpersonal models, constructs developed specifically for the online context will be required. The process starts with new domain sampling and exploratory construct development (e.g., Stafford, Poston and Paul, 2012). The process continues with modeling such constructs in important business contexts to demonstrate their efficacy. The paper proceeds as follows: first, there is review of varying dimensions of trust currently seen in the IS literature ranging from both interpersonal and institutional perspectives. Then, the source credibility model of mass communications is reviewed for application to the Internet context. As part of this discussion, the most recent work on exploring the new domain of media-based Internet trust is reviewed (e.g., Stafford et al., 2012), whereupon we adopt emerging exploratory constructs for developing a model of customer subscription to an anti-spyware application offered by their Internet Service Provider. This model benchmarks emerging intermediated dimensions of with important business outcomes. We then conclude with a discussion of potential applications of such validated measures in ecommerce and Information and Communications Technology research. PARALLEL PATHS IN THE LITERATURE Researchers not familiar with communications theory or the literature on personal selling may not recognize the subtle but important distinctions between the sort of trust that develops between human exchange partners in sales relationships, and the types of trust that exist in mediated contexts. The important point is that human communications are often carried by intervening media, and this suggests that the credibility of communications media should be considered as part of online trust. An important consideration, however, is that the way in which Internet users view their online exchange partners is probably not the same as how individual persons view other individual persons in interpersonal contexts. The confidence that buyers have in Internet sites is better represented by an emergent concept of intermediated rather than interpersonal trust (e.g., Fogg, 2003; Reeves and Nass, 1996). This divergence of the several theoretical meanings of trust resembles the divergence in the communications theory literature between interpersonal communication and mass communication some years ago (Rogers and Valenti, 1993). This divergence arose from Schramm and his students discussions (e.g., Berlo, 1977; Schramm, 1971) of the communication process model that was popularized by Shannon and Weaver s (1949) Information Theory thesis. It is this subtle but important distinction between interpersonal and intermediated communication that drives the need to explore source effects conceptualizations of credibility and its subsidiary concept, trustworthiness, in the context of consumer interactions with the Internet. The view of trust that has been largely missing in the MIS research comes from the Yale School research team led by Carl Hovland. At the close of World War II these scholars conducted a massive study on the topic of Nazi propaganda (best characterized in Hovland et al. 1953). The source credibility perspective that arose from this represents the mass communication side of the mass/personal communication theory divergence in Internet trust research. The Yale theorists provided starting points which would guide mass communications theorists through two generations of inquiry into the nature of source credibility as the overarching concept in which trust was embedded (this evolution is well documented by Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
3 McGuire s 1973 and 1985 essays). Marketing researchers adopted this emergent source credibility model to understand how mediated persuasion worked. This led to a source effects model in which the characteristic of trust was embedded, along with several other important factors such as expertise and attractiveness (see Ohanian s 1990 celebrity endorser article for a succinct review). While communications theorists and market researchers were expanding the Yale source effects model, organizational psychologists were thinking about how the process of negotiation between suspicious transaction parties worked. Their theoretical contribution led to a view of trust as a single construct (see the earlier studies from Deutsch, 1960, or Lindskold, 1978, and the more recent study from Mayer et al., 1995). The organizational psychology research represents the personal communication side of the theoretical divergence of trust research, and this is the path that has informed much of what we currently know about trust in the IS literature (cf., Gefen, 2002; Gefen et al., 2003; Komiak et al., 2005; Lim et al., 2006; McKnight et al., 1998; 2002; Nicolau and McKnight, 2006; Pavlou, 2002; Pavlou et al., 2007; Stewart, 2003; Wang and Benbasat, 2007). When considering prominent trust research in MIS, only Benbasat has acknowledged the importance of source effects theories, and then only to call for research in that area (e.g., Xiao and Benbasat, 2007). Of the researchers calling on the concept of credibility (e.g., Ba and Pavlou, 2002; Pavlou and Dimoka, 2006; Fogg, 2003; Fogg and Tseng, 1999; Fogg et al., 2001; Xiao and Benbasat, 2007), only Fogg and his colleagues are drawing directly from the Yale School tradition, and then simply to observe that there have not been any large quantitative studies done on the nature of Web site credibility (Fogg et al., 2001). The Role of Source Credibility Online When considering trust in the realm of ecommerce, the well-respected communications theory paradigm of source credibility offers new perspectives yet to be considered (Xiao and Benbasat, 2007, p. 201). The only prior consideration of anything approaching the source credibility concept comes from Joe Cannon s components of trust conceptualization for personal selling contexts (e.g., Ba and Pavlou, 2002; Pavlou and Dimoka, 2006). Credibility and benevolence combine to form interpersonal trust in this view. Doney and Cannon (1997) evolve their credibility concept from Ganeson s (1994) interpretation of Lindskold (1978) the expectation that a partner s statements can be relied upon. This objective credibility of Lindskold operationalizes as reliance upon the veracity of another and is conceptually similar to the meaning of trust found in research based on Mayer et al. s (1995) definition. Even so, this characterization of credibility based on personal veracity is not conceptually similar to the mass communications source credibility paradigm which operationalizes credibility in terms of the combined effects of trusworthiness, expertise and attractiveness. The fundamental basis of source credibility in mass communications has always been found in the combination of trustworthiness (what Lindskold calls objective credibility ) and expertise (Hovland et al., 1953). More recent considerations have been augmented this view with the source attractiveness model, consisting of likeability, similarity and attraction characteristics (e.g., McGuire, 1973; 1985; Ohanian, 1990), in addition to the more traditional expertise and trustworthiness constructs. The Differing Aspects of Trust Trust has frequently been considered in the MIS literature to be the expectation that others will not behave opportunistically in the face of vulnerability of the trusting party (Gefen et al., 2003). This represents the interpersonal view of trust as adopted from the personal selling literature, which, in turn, relies on a transaction costs perspective of institutional economics (e.g., Anderson and Narus, 1990). This view of trust has been applied in organizations in the context workplace employee interactions (Mayer et al., 1995), or investigated in sales dyads between buyers and sellers (Doney and Cannon, 1997). It has, however, remained an interpersonal construct when used in MIS research for use in mainly impersonal ecommerce contexts. The problem with using conceptualizations of interpersonal trust brought from research on the nature of personal selling or workplace relationships is that trust plays an entirely different role in buyer-seller interactions than it does anywhere else in life. Buyer-seller interactions are characterized by background psychological categorization processes in which trust is required to overcome natural suspicions that buyers have of sellers (Fiske and Pavelchak, 1986; Stafford, 1996). Buyers routinely stereotype sellers and do this so automatically and generally that they are often not aware of the process (Stafford, 1996). The economic concept of transaction-specific risks (Williamson, 1985) suggests that risk is inherent in all commercial exchanges, particularly those taking place online (cf., Bakos, 1998; Glassberg and Merhout, 2007; Malone et al., 1987; 1989). But, taking interpersonal trust constructs from the sales literature while construing their operation to be consistent with the institutional construct of risk in online transactions raises issues of ecological validity in such context-modified theoretical scenarios. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
4 Except for studies that specifically focus on Internet mediated personal selling, such as an online auction with an identified human seller (cf., Ba and Pavlou, 2002; Pavlou and Dimoka, 2006; Pavlou and Geffen, 2004), it is hard to make a case for constructs based on personal selling rubrics of trust being contextually similar to ecommerce scenarios. Human computer interaction can be person-like (Reeves and Nass, 1996; Xiao and Benbasat, 2007) but is still distinct from human interpersonal interaction. Hence, trust that technology users place in their machine interactions should be studied in a unique and independent context. Based on exploratory research that sampled the domain of, while providing two key dimensions of trust-like characteristics in online contexts (e.g., Stafford et al., 2012), we propose a model that compares the effects of a dimension of trusting intent combined with a dimension of Web site cosmetic characteristics as a signal of credibility in motivating behavioral intentions of Internet customers to subscribe to a computer security application that their Internet Service Provider was offering. METHOD The scenario in which the exploratory dimensions of were fitted for modeling against business outcomes involved a prominent Internet Service Provider, America Online. The provider wished to investigate the characteristics of its customers which might lead to successfully launching a new spyware protection service being offered by subscription. It was suspected by executives that trust factors would have important effects on purchase intentions. Our involvement ranged from consultation on questionnaire construction to analysis and testing of causal hypotheses related to the credibility dimensions adapted from Stafford et al. (2012). The scale indicators for AOL s desired set of behavioral intention indicators (Purchase Intentions), as well as the two constructs (Trusting Intentions and Cosmetic Credibility) are listed in the Appendix. The indicators for the constructs are adapted directly from Stafford et al. (2012), while the Purchase Intentions indicators were supplied by AOL at their request, in order to examine the influence of source credibility components on characteristics considered to be related to potential subscription to the proffered service. It was expected that both constructs would be strongly related with each other, and that each would also have significant causal links to the AOL behavioral indicator set, characterized as Purchase Intentions. A structural model specified to these expectations was fitted, with data drawn from 1006 AOL subscribers who were recruited by the provider from their online research site, Opinion Place. Subjects participated in exchange for American Airlines frequent flyer points. America Online randomly assigns subjects to studies based on a sequential rotation of assignment to their pool of active research studies (Stafford and Gonier, 2004), but due to customer privacy requirements demographic information was not provided to us for reporting. However, AOL s own demographic summaries of their research respondent population routinely benchmarks their subject pool to both the general Internet population and the America Online user population. These statistical summaries are summarized in Table 1. Gender Male Female Opinion Place (participants) 35% 65% AOL (members) 45% 55% Internet (general users) 49% 51% U.S. Population 48% 52% Age % 25% 30% 23% 12% 16% 18% 27% 24% 16% 14% 21% 26% 23% 15% 12% 20% 21% 15% 32% Married 58% 62% 66% 57% Table 1. AOL Opinion Place Demographics 1 1 AOL demographic profiles are provided by and used with permission from AOL Opinion Place, and are the result of ongoing in-house demographic profile studies of their membership to support commercial research generality. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
5 The model, fitted in Lisrel 8.51, is shown in the Figure, and provides an excellent fit to the data, in accordance with commonly-reported fit indices and parameters. Modeling provided results in line with expectations with one notable exception: while Trusting Intentions and Cosmetic Credibility were highly related to each other, as expected, and while Cosmetic Credibility significantly predicted Purchase Intentions, Trusting Intentions did not. Since this construct is conceptually similar to McKnight s trusting intention/trusting belief characterization (e.g., McKnight et al., 1998), the distinction between customers inherent capabilities for trusting an online company and the completely different trust engendered by the appearance and performance of the online site are worth considering. PI 6 PI 5 PI 4 PI 3 PI 2 PI Purchase Intention χ 2 = (.000), df = 227 χ 2 /df = 3.44, GFI =.93, AGFI =.92 NFI =.93, CFI =.95, SRMR =.045 RMSEA = (.73).34 (7.59) Trusting Intentions.46 (16.32) Cosmetic Credibility CC7 CC6 CC5 CC4 CC3 CC2 CC1 TI 10 TI 9 TI 8 TI 7 TI 6 TI 5 TI 4 TI 3 TI 2 TI 1 FIGURE. Model of DISCUSSION AND IMPLICATIONS Trusting an Internet Service Provider to offer a useful anti-spyware utility for subscription purposes seems to be most highly related to the effect on customers of the Provider s Web presence, as opposed to the customer s inherent predisposition to trust an online provider. The seeming goodness of the technological interface would appear to be a highly influential credibility component in motivating intentions to subscribe to a commercial technological offering. The lack of influence of Trusting Intentions is curious; on interpretation might be that, in ecommerce operations, good Web design and effectively Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
6 functioning transactions sites are far more effective in motivating user trust in an online offering than are attempts to leverage consumers inherent disposition to trust a business. Another interpretation might be that the tendency of individuals to trust applied more to other individuals than it does to discorporate representations of companies in their technologically-mediated online settings. It bears mention that Trusting Intentions is a measure of the predisposition a customer has for trust, as opposed to a customer s actual development of trust in an online business based upon their interface with the online presence. It may be the case that people differ in their propensity to trust, but that their inclination to trust is catalyzed by site-specific characteristics that serve to activate the judgment. (i.e., cosmetic factors). The role of ecommerce site familiarity in producing degrees of buyer trust leading to purchase (e.g., Gefen, 2000), is one such example. We characterize this broadly as the dichotomoy between the inclination to trust and the cosmetic factors of site appearances and performance; other rubrics can also be drawn to characterize similar processes in different contexts, though the explanatory power of the familiarity construct is limited here in this study of specific subscribers to an Internet service (i.e., our subjects were all already quite familiar with their chosen Internet Service Provider). Understanding the distinction between the predisposition to trust and the factors which catalyze this predisposition will certainly be a fertile area for further inquiry and more detailed investigation, but in view of the Internet-specific context of development for the two constructs (e.g., Stafford et al., 2012), this outcome suggests that there are subtle but important departures to be made from traditional conceptualizations of online trust that were adapted from interpersonal contexts (e.g., McKnight et al., 1998). Ongoing research that directly compares the effects and performance of the differing constructs between the two views will be instructive. People and machines interact in interesting ways, but in ways that are not always directly comparable to how people interact with other people, even if the commercial contexts are comparable, as in buyer-seller interactions. In our study we adapt and test two components that are conceptually related but contextually distinct from the concepts arising from the online trust literature. Interesting new viewpoints from which to consider ongoing experimentation can be based on such concepts. The role of interpersonal trust as a rubric for online trust can benefit from further deliberation, as can the mode and methods of trust signaling cues developed as part of Web site designs used to demonstrate quality and trustworthiness in online contexts to customers. CONCLUSION The body of literature on Internet trust generally arises from interpersonal models of trust brought from reference disciplines. Trust in online contexts, however, can be examined through both interpersonal and intermediated contexts. We provide an initial demonstration of the intermediated approach here. This study provides a theoretical platform for the ongoing development of, and work going forward can seek to compare the influence and effects of interpersonal and intermediated conceptualizations of Internet trust. The effects of technological components of company Web resources are worth consideration, just as are the lack of effects that customer predispositions to trust have on purchase intentions, benchmarked in the context of the strong influence of credibility components related to the intermediate context of online commerce. REFERENCES 1. Anderson, E. and Narus, J.A. (1990), A Model of Distributor Firm and Manufacturer Firm Working Partnership, Journal of Marketing, 54, 1, Ba, S. and Pavlou, P.A. (2002), Evidence of the Effects of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior, MIS Quarterly, 26, 3, Bakos, Y. (1998), Towards Friction-Free Markets: The Emerging Role of Electronic Marketplaces on the Internet, Communications of the ACM, 41, 8, Berlo, D.K. (1977), Communication as process: Review and Commentary, in Communication Yearbook, B. Rubin (ed.), New Brunswick, NJ: Transaction Publishers. 5. Dinev, T. and Hart, P. (2006), An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research, 17, 1, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
7 6. Dinev, T. and Hu, Q. (2007), The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies, Journal of the AIS, 8, 7, Deutsch, M. (1960), The Effect of Motivational Orientation on Trust and Suspicion, Human Relations, 13, Doney, P.M. and Cannon, J.P An Examination of Trust in Buyer-Seller Relationships, Journal of Marketing, 61, Dwyer, F.R., Schurr, P.H. and Oh, S. (1987), Developing Buyer-Seller Relationships, Journal of Marketing, 51, Fiske, S.T. and Pavelchak, M.A. (1986), Category-Based versus Piecemeal-Based Affective Responses: Developments in Schema Triggered Affect, in Handbook of Motivation and Cognition: Foundations of Social Behavior, E. Higgins (ed.), New York: Guilford Press. 11. Fogg, B.J. (2004). Personal conversation. 12. Fogg, B.J. (2003). Persuasive Technology: Using Computers to Change what We Think and Do, San Francisco: Morgan Kauffman Publishers. 13. Fogg, B.J. and Tseng, H. (1999), The Elements of Computer Credibility, Proceedings of the ACM SIHCHI Conference. 14. Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P. and Treimen, M. (2001), What Makes Web Sites Credible? A Report on a Large Quantitative Study, Proceedings of the ACM SIGCHI Conference. 15. Ganesan, S. (1994), Determinants of Long Term Orientation in Buyer-Seller Relationships, Journal of Marketing, 58, Gefen, D. (2000), E-Commerce: The Role of Familiarity and Trust, Omega, 28, Gefen, D., Pavlou, P.A., Benbasat, I., McKnight, D., Stewart, K and Straub, D. (2006), ICIS Panel Summary: Should Institutional Trust Matter in Information Systems Research? Communications of the AIS, 17, 9, Glassberg, B.C. and Merhout, J.W. (2007), Electronic Markets Hypothesis Redux: Where are We Now? Communications of the ACM, 50, 2, Hovland, C.I., Janis, I.L. and Kelley, H.H. (1953). Communication and Persuasion: Psychological Studies of Opinion Change, New Haven, CT: Yale University Press. 20. Hu, Q. and Dinev, T. (2005), Spyware: An Internet-Age Nuisance or Public Menace? Communications of the ACM, 48, 8, Komiak, S.Y.K., Wang, W., and Benbasat, I. (2005), Trust Building in Virtual Salespersons versus Virtual Salespersons: Similarities and Differences, eservice Journal, 3, 3, Lindskold, S. (1978), Trust Development, the GRIT Proposal, and the Effects of Conciliatory Acts on Conflict and Cooperation, Psychological Bulletin, 85, 4, Lim, K.H., Sia, C.L., Lee, M.K.O., and Benbasat, I. 2006), Do I Trust You Online, and if so, Will I Buy? An Empirical Study of Two Trust-Building Strategies, Journal of MIS, 23, 2, Malone, T.W., Yates, J. and Benjamin, R. I. (1987), Electronic Markets and Electronic Hierarchies, Communications of the ACM, 30, 6, Malone, T.W., Yates, J. and Benjamin, R. I. (1989), The Logic of Electronic Markets, Harvard Business Review, 67, 3, Marakas, G.M., Johnson, R.D., and Palmer, J. (2000), A Theoretical Model of Differential Social Attributes toward Computing Technology: When The Metaphors become the Model, International Journal of Human-Computer Studies, 52, 4, Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995), An Integrative Model of Organizational Trust, Academy of Management Review, 20, 5, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
8 28. McGuire, W.J. (1973), Persuasion, Resistance and Attitude Change, in Handbook of Communication, I. de Sola Poul, F. Frey, W. Schram, N Macoby and E. Parker (eds.), Chicago: Rand McNally. 29. McGuire, W.J. (1985), Attitudes and Attitude Change, in Handbook of Social Psychology, Volume 2, G. Lindzey and E. Aronson (eds.), New York: Random House. 30. McKnight, D.H., Choudhury, V. and Kacmar, C. (2002), Developing and Validating Trust Measures for ecommerce: An Integrative Typology, Information Systems Research, 13, 3, McKnight, D.H., Cummings, L.L. and Chervany, N.L. (1998), Initial Trust Formation in New Organizational Relationships, Academy of Management Review, 23, 3, Morgan, R. M., and Hunt, S.D. (1994), The Commitment-Trust Theory of Relationship Marketing, Journal of Marketing, 58, 3, Nicolau, A.I. and McKnight, D.H. (2006), Perceived Information Quality in Data Exchange: Effectiveness, Risk, Trust and Intention to Use, Information System Research, 17, 4, Ohanian, R. (1990), Construction and Validation of a Scale to Measure Celebrity Endorsers Perceived Expertise, Trustworthiness and Attractiveness, Journal of Advertising, 19, 3, Pavlou, P.A. (2002), Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, 7, 3, Pavlou, P.A. and Dimoka, A.(2006), The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums and Seller Differentiation, Information Systems Research, 17, 4, Pavlou, P.A. and Gefen, D. (2004), Building Effective Online Marketplaces with Institution-Based Trust, Information Systems Research, 15, 1, Reeves, B. and Nass, C. (1996). The Media Equation: How People Treat Computers, Television and New Media like Real People and Places, New York: CSLI Publications. 39. Rogers, E. and Valente, T.W. (1993), A History of Information Theory in Communication Research, in Between Communication and Information: Information and Behavior Vol. 4, J. Schement and B. Rubin (eds.), New Brunswick, NJ: Transaction Publishers. 40. Schramm, W. (1971), The Nature of Communication between Humans, in The Process and Effects of Mass Communication, W. Schramm and D. Roberts (eds.), Urbana, IL: University of Illinois Press. 41. Shannon, C.E. and Weaver, W. (1949). The Mathematical Theory of Communication, Urbana, IL: University of Illinois Press. 42. Stafford, T.F. (1996), Conscious and Unconscious Processing of Priming Cues in Selling Encounters, Journal of Personal Selling and Sales Management, 2, Stafford, T.F. and Gonier, D. (2004), Gratifications for Internet Use: What Americans Like about Being Online, Communications of the ACM, 47, 1, Stafford, T.F., Leigh, T.W., and Martin, L.L. (1995), Assimilation and Contrast Priming Effects In the Initial Consumer Sales Call, Psychology and Marketing, 12, 4, Stafford, T.F., Poston, R.S. and Paul, R. (2012), : Cognitive Constructs of Trustworthiness for Online Media. Proceedings of the IS CoRE ICIS Special Interest Group for Cognitive Research in Information Systems. 46. Stewart, K.J. (2003), Trust Transfer on the World Wide Web, Organization Science, 14, 1, Wang, W. and Benbasat, I. (2007), Recommendation Agents for Electronic Commerce: Effects of Explanation Facilities on Trusting Beliefs, Journal of MIS, 23, 4, Williamson, O. E. (1985). The Economic Institutions of Capitalism. Free Press, New York. 49. Wright, P. (1986), Schemer Schema: Consumer s Intuitive Theories about Marketers Influence Tactics, Advances in Consumer Research, 13, 1-3. Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
9 50. Xiao, B. and Benbasat, I. (2007), E-Commerce Product Recommendation Agents: Use, Characteristics and Impact, MIS Quarterly, 31, 1, Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
10 APPENDIX Scale Indicators Purchase Intent PI 1 I agree the service is new and different PI 2 I agree that AOL is the appropriate provider for the service PI 3 I agree that it is believable that AOL could provide such a service PI 4 I agree that it is AOL s responsibility to provide such a service PI 5 I agree that I would feel positive about AOL if it provided the service PI 6 How likely are you to subscribe to the service? Trusting Intentions TI 1 I tend to believe information from Web sites as fact TI 2 It is natural for me to trust information from Web sites TI 3 It is comfortable for me to trust information from Web sites TI 4 I believe Web site technology can be trusted TI 5 I trust a majority of the information on the Internet TI 6 If a site performs well, I tend to believe it TI 7 If a site takes the human side, I tend to believe it TI 8 It is a habit for me to trust information from Web sites TI 9 If a site sounds smart, I tend to believe it TI 10 If a site gives interesting points of view, I tend to believe it Cosmetic Credibility CC 1 It says it is the official site CC 2 The site is linked to a site I already find believable CC 3 The site was recommend by a friend CC 4 The site looks professionally designed CC 5 The site provides quick responses to customer service questions CC 6 The site sends confirmation s to for my transactions CC 7 The site is arranged in a way that makes sense Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17,
Trust in E-Commerce Vendors: A Two-Stage Model
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model
More informationPERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH
PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH DANIEL Z. LEVIN Management and Global Business Dept. Rutgers Business School Newark and New Brunswick Rutgers
More informationIs entrepreneur s photo a crucial element in a crowdfunding webpage?
Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business
More informationWhy We Don t Block 3rd Party Trackers: An Attributional Theory Perspective
Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:
More informationCreating More Credible and Likable Travel Recommender Systems
Creating More Credible and Likable Travel Recommender Systems Kyung Hyan Yoo Laboratory for Intelligent Systems in Tourism Department of Recreation, Park & Tourism Sciences Texas A&M University, USA toinette@tamu.edu
More informationHow Self-Efficacy and Gender Issues Affect Software Adoption and Use
How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize
More informationUntangling the Antecedents and Covariates of E-Commerce Trust: Institutional Trust vs. Knowledge-Based Trust
RESEARCH Untangling the Antecedents and Covariates of E-Commerce Trust: Institutional Trust vs. Knowledge-Based Trust STEPHEN C. WINGREEN AND STEPHEN L. BAGLIONE A b s t r a c t Through experimentation,
More informationEvolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2006 Evolution of Trust in Distributed Software Development
More informationUnderstanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption
Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce
More informationEMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE
EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE Abstract Ben Liu University of Georgia benliu@uga.edu Elena Karahanna University of Georgia ekarah@terry.uga.edu Technology acceptance model
More informationAssessing Social Networking from Three Different Perspectives: Toward an Integrative View
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2013 Proceedings Midwest (MWAIS) 5-24-2013 Assessing Social Networking from Three Different Perspectives: Toward an Integrative
More informationWho Subscribe to Identity Theft Protection Service
DECISION SCIENCES INSTITUTE? An Exploration of Antecedent Factors Yuan Li University of Illinois at Springfield Email: yli295@uis.edu Jingguo Wang University of Texas at Arlington Email: jwang@uta.edu
More informationTHE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN
More informationNaturalness of a product is a trustworthiness cue
Naturalness of a product is a trustworthiness cue Sydney Scott 4 th Year Doctoral Candidate Department of Psychology and Wharton Marketing Department Mailing Address: 3720 Walnut St. Philadelphia, PA 19104
More informationa, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey
Available online at www.sciencedirect.com Procedia - Social and Behavioral Scien ce s 8 ( 0 ) nd World Conference on Educational Technology Researches WCETR0 The role of Gender in Pharmacists Attitudes
More informationPersonal Talent Skills Inventory
Personal Talent Skills Inventory Sales Version Inside Sales Sample Co. 5-30-2013 Introduction Research suggests that the most effective people are those who understand themselves, both their strengths
More informationPersonality Traits Effects on Job Satisfaction: The Role of Goal Commitment
Marshall University Marshall Digital Scholar Management Faculty Research Management, Marketing and MIS Fall 11-14-2009 Personality Traits Effects on Job Satisfaction: The Role of Goal Commitment Wai Kwan
More informationCALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors
CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY Guest Co-Editors Philip Bobko Gettysburg College pbobko@gettysburg.edu Alex J. Barelka Illinois State
More informationreward based power have ability to give you what you want. coercive have power to punish
Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator
More informationAn Examination of Perceptions of Male and Female Avatars
Association for Information Systems AIS Electronic Library (AISeL) MG 2009 Proceedings Mardi Gras Conference February 2009 An Examination of Perceptions of Male and Female Avatars David DeWester Department
More informationPhysicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment
More informationVALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS
VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS Noel J. Lindsay 1, Anton Jordaan, and Wendy A. Lindsay Centre for the Development of Entrepreneurs University of South
More informationKahneman, Daniel. Thinking Fast and Slow. New York: Farrar, Straus & Giroux, 2011.
The accumulating research indicates that individuals cognitive and behavioral orientations to objects (their thoughts and actions) are frequently based on rapid shortcuts or heuristics. The past few decades
More informationShannon-Weaver communication transmission model
AEE 6540 Communication Theories and Strategies for Agriculture and Natural Resources Course purpose and objectives Where else would you rather be? Why is it important to learn about communication theory
More informationINDIVIDUALIZED MASTER OF ARTS PROGRAM IN CONFLICT RESOLUTION. The McGregor School of Antioch University. Core Session I
INDIVIDUALIZED MASTER OF ARTS PROGRAM IN CONFLICT RESOLUTION The McGregor School of Antioch University Core Session I Topic: Professor: Trust and Trust-Building Dr. Honggang Yang (Notes: Classes start
More informationIssues in Information Systems Volume 17, Issue II, pp , 2016
CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr
More informationSchool Administrators Level of Self-Esteem and its Relationship To Their Trust in Teachers. Mualla Aksu, Soner Polat, & Türkan Aksu
School Administrators Level of Self-Esteem and its Relationship To Their Trust in Teachers Mualla Aksu, Soner Polat, & Türkan Aksu What is Self-Esteem? Confidence in one s own worth or abilities (http://www.oxforddictionaries.com/definition/english/self-esteem)
More informationUser Acceptance of E-Government Services
User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time
More informationThank you very much for your guidance on this revision. We look forward to hearing from you.
1 PAINTED BUNTING MANUSCRIPT REVIEW HISTORY REVISION NOTES FROM AUTHORS (ROUND 2) We would like to submit a revision of our manuscript. As you requested, we have run new studies that employ additional
More informationUnauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found and Lost
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2012 Proceedings Proceedings Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found
More informationPLANNING THE RESEARCH PROJECT
Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm page 1 Part I PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm
More informationABSTRACT. Professor Dr. Rebecca Hamilton and Professor Dr. Joydeep Srivastava, Department of Marketing
ABSTRACT Title of Document: THE INFLUENCE OF CONSUMER MOTIVATIONS ON CONSUMPTION INTENTIONS AND BEHAVIOR Francine da Silveira Espinoza, Doctor of Philosophy, 2009 Co-Directed By: Professor Dr. Rebecca
More informationCHAPTER III RESEARCH MODEL FRAMEWORK
CHAPTER III RESEARCH MODEL FRAMEWORK This chapter presents an overview of the relevant theories related to the adoption of new information technology and includes a briefing of online trust, followed by
More informationExamining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*
Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Timothy Teo & Chwee Beng Lee Nanyang Technology University Singapore This
More informationA Model of Unethical Usage of Information Technology
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha
More informationNEGOTIATION SEVENTH EDITION
NEGOTIATION SEVENTH EDITION ROY J. LEWICKI DAVID M. SAUNDERS BRUCE BARRY 2015 by McGraw Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution
More informationPrivacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-1-2010 Privacy Concern, Locus of Control, and Salience in
More informationThe Effects of Societal Versus Professor Stereotype Threats on Female Math Performance
The Effects of Societal Versus Professor Stereotype Threats on Female Math Performance Lauren Byrne, Melannie Tate Faculty Sponsor: Bianca Basten, Department of Psychology ABSTRACT Psychological research
More informationCognitive Authority. Soo Young Rieh. School of Information. University of Michigan.
Cognitive Authority Soo Young Rieh School of Information University of Michigan rieh@umich.edu Patrick Wilson (1983) developed the cognitive authority theory from social epistemology in his book, Second-hand
More informationModels of Information Retrieval
Models of Information Retrieval Introduction By information behaviour is meant those activities a person may engage in when identifying their own needs for information, searching for such information in
More informationTourism Website Customers Repurchase Intention: Information System Success Model Ming-yi HUANG 1 and Tung-liang CHEN 2,*
2017 International Conference on Applied Mechanics and Mechanical Automation (AMMA 2017) ISBN: 978-1-60595-471-4 Tourism Website Customers Repurchase Intention: Information System Success Model Ming-yi
More informationThe influence of (in)congruence of communicator expertise and trustworthiness on acceptance of CCS technologies
The influence of (in)congruence of communicator expertise and trustworthiness on acceptance of CCS technologies Emma ter Mors 1,2, Mieneke Weenig 1, Naomi Ellemers 1, Dancker Daamen 1 1 Leiden University,
More informationCollaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration
Collaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration Roy Chua, Harvard Business School Michael Morris, Columbia Business School Shira Mor, Columbia Business
More informationA Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan
A Hierarchical Comparison on Influence Paths from Cognitive & Emotional Trust to Proactive Behavior Between China and Japan Pei Liu School of Management and Economics, North China Zhen Li Data Science
More informationThe National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options
Executive Summary: The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Overview This is the first Deliberative Poll (DP) anywhere in the world that was
More informationTHE IMPACT OF PSYCHOLOGICAL CONTRACT ON RELATIONSHIP QUALITY IN FINANCIAL SERVICES MARKET
THE IMPACT OF PSYCHOLOGICAL CONTRACT ON RELATIONSHIP QUALITY IN FINANCIAL SERVICES MARKET Mario Pepur University of Split, Faculty of Economics Cvite Fiskovića 5, 21000 Split, Croatia mpepur@efst.hr Zoran
More informationVerbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London. Harvey Toulouse October 2009
Verbal and behavioural indicators of trust: How well are they associated? Nigel Harvey University College London Outline Definitions of trust Some research issues for psychologists Ways of studying trust
More informationOn Trust. Massimo Felici. Massimo Felici On Trust c
On Trust Massimo Felici Outline 1 What is Trust? Trust matters Trust problems Seeking an Experimental Trust Framework Trust and Dependability Directions for future work What is Trust? 2 Constructive Trust
More informationImproving the U.S. Public s Understanding of Climate Change
Improving the U.S. Public s Understanding of Climate Change Paul C. Stern, Director, Committee on the Human Dimensions of Global Change National Research Council, USA Presentation to Symposium on Communicating
More informationPsychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal
Seoul Journal of Business Volume 11, Number 1 (June 2005) Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal
More informationIssues in Information Systems
ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web
More informationThe Holistic Defense Toolkit
The Holistic Defense Toolkit Table of Contents 1. Holistic Defense Defined 2. The Four Pillars of Holistic Defense 3. The Holistic Defense Office Self-Assessment Tool 4. Explanation of Services Offered
More informationAn Experimental Investigation of Self-Serving Biases in an Auditing Trust Game: The Effect of Group Affiliation: Discussion
1 An Experimental Investigation of Self-Serving Biases in an Auditing Trust Game: The Effect of Group Affiliation: Discussion Shyam Sunder, Yale School of Management P rofessor King has written an interesting
More informationQualitative Data Analysis. Richard Boateng, PhD. Arguments with Qualitative Data. Office: UGBS RT18 (rooftop)
Qualitative Data Analysis Lecturer/Convenor: Richard Boateng, PhD. Email: richard@pearlrichards.org Office: UGBS RT18 (rooftop) Arguments with Qualitative Data Photo Illustrations from Getty Images www.gettyimages.com
More informationWritten by admin Monday, 24 December :50 - Last Updated Saturday, 05 January :05
Conflict Mediation and Resolution Introduction Ethics in healthcare is a matter that needs to be given a lot of priority as well as a keen approach. This is because what one person might consider being
More informationUsing the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions
Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Introduction Technology enables consumers to undertake everything from relatively simple
More informationThe Impact of Internalization and Familiarity On Trust and Adoption of Recommendation Agents
The Impact of Internalization and Familiarity On Trust and Adoption of Recommendation Agents Key Words: Electronic Commerce, Trust, Customer Trust, Computer Agent, Intelligent Agent, Recommendation Agent,
More informationAn Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines
An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines ABSTRACT Heshan Sun Syracuse University hesun@syr.edu The current study is built upon prior research and is an
More informationAttitude Measurement
Business Research Methods 9e Zikmund Babin Carr Griffin Attitude Measurement 14 Chapter 14 Attitude Measurement 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or
More informationThe Effects of Product Attribute s New Information and Target Compatibility on Consumer Elaboration
The Effects of Product Attribute s New Information and Target Compatibility on Consumer Elaboration Dr. Chan-Chien Chiu, Associate Professor of Taiwan Hospitality & Tourism College, Taiwan ABSTRACT This
More informationApplied Social Psychology Msc.
Applied Social Msc. Course Course names Course description codes MSPSY501* Applied Social This module will discuss, at advanced level: The cognitive system, conceptual systems, expectation, explanation
More informationSchematic Model Of A Theory Of Mass Media Communication
Schematic Model Of A Theory Of Mass Media Communication 1Department of Mass Communication,University of Ilorin, Ilorin The earliest model of democracy which used to be dominant in ancient Athens was There
More informationExperimental Study of Consumer Behavior Conformity and Independence
Experimental Study of Consumer Behavior Conformity and Independence M. VENKATESAN* >Results of a laboratory experiment indicate that in consumer decision making, in the absence of any objective standard,
More informationTrust Needs Touch: Understanding the Building of Trust through Social Presence Completed Research Paper
Trust Needs Touch: Understanding the Building of Trust through Social Presence Completed Research Paper Nicolai Walter University of Muenster ERCIS nicolai.walter@uni-muenster.de Bjoern Niehaves Hertie
More informationServices Marketing Chapter 10: Crafting the Service Environment
Chapter 10: Crafting the Service Environment 7/e Chapter 10 Page 1 Overview of Chapter 10 What is the Purpose of Service Environments? Understanding Consumer Responses to Service Environments Dimensions
More informationTHE HYBRID MODEL OF TRUST AND DISTRUST: EXTENDING THE NOMOLOGICAL NETWORK. Gregory Daniel Moody
THE HYBRID MODEL OF TRUST AND DISTRUST: EXTENDING THE NOMOLOGICAL NETWORK by Gregory Daniel Moody B. S. Information Systems Management, Brigham Young University, 2006 Master of Information Systems Management,
More informationSystems Theory: Should Information Researchers Even Care?
Association for Information Systems AIS Electronic Library (AISeL) SAIS 2016 Proceedings Southern (SAIS) 2016 Systems Theory: Should Information Researchers Even Care? Kane J. Smith Virginia Commonwealth
More informationServant and Transformational Followership as a Consumptive Experience
REGENT UNIVERSITY Servant and Transformational Followership as a Consumptive Experience Servant Leadership Research Roundtable August 2005 Bruce E. Winston, Ph.D. Regent University This conceptual article
More informationEffects of Aggregate Rating on ewom Acceptance: An Attribution Theory Perspective
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2010 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2010 Effects of Aggregate Rating on ewom Acceptance: An
More informationThe Effect of the Fulfillment of Hedonic and Aesthetic Information Needs of a Travel Magazine on Tourist Decision Making
University of Massachusetts Amherst ScholarWorks@UMass Amherst Travel and Tourism Research Association: Advancing Tourism Research Globally 2011 ttra International Conference The Effect of the Fulfillment
More informationIntegrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site
Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site SEUNGHO CHO shcho72@gmail.com LAURA RICHARDSON WALTON lwalton@comm.msstate.edu Mississippi
More informationCultural Competence Learning Guide. Cook Ross Inc.
Cultural Competence Learning Guide Cook Ross Inc. INTRODUCTION Welcome to CultureVision s Cultural Competence Learning Guide, a combination of education, exploration, and self-analysis around cultural
More informationMANAGEMENT. MGMT 0021 THE MANAGEMENT PROCESS 3 cr. MGMT 0022 FINANCIAL ACCOUNTING 3 cr. MGMT 0023 MANAGERIAL ACCOUNTING 3 cr.
MANAGEMENT MGMT 0021 THE MANAGEMENT PROCESS 3 cr. An introduction designed to emphasize the basic principles, practices, and terminology essential to the understanding of contemporary business and its
More informationMapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health
+ Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health By Resiliency Initiatives and Ontario Public Health + Presentation Outline Introduction The Need for a Paradigm Shift Literature
More informationRapidRapport. Action Journal. with Michael Bernoff
with Michael Bernoff Action Journal Rapport-building acts as the foundation for the introduction of ideas, relationships, products and services. Without establishing rapport, you are unlikely to get the
More informationPlanning Case Study. Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan
Planning Case Study Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan On the vanguard of thought. Reimagining The futurecancer of healthcare Care requires nothing less. Planning
More informationAn Exploratory Study on Consumer Psychological Contracts
International DSI / Asia and Pacific DSI 2007 Full Paper (July, 2007) An Exploratory Study on Consumer Psychological Contracts Jingyi Wang 1), Hongping Sun 2) Management School, Guangdong University of
More informationThe Relative Importance Of Trust Intentions And Trust Beliefs In Internet Banking Adoption
International Review of Business Research Papers Vol. 5 No. 6 November 2009, Pp.231-247 The Relative Importance Of Trust Intentions And Trust Beliefs In Internet Banking Adoption Bander A. Alsajjan 1 The
More informationA LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS IN CONSUMER ACCEPTANCE OF AN ESERVICE: THE CASE OF ONLINE HEALTH SERVICES
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 A LONGITUDINAL STUDY OF TRUST AND PERCEIVED USEFULNESS
More information15 May 2017 Exposure Draft. Response Due Date 23 June Exposure Draft
15 May 2017 Exposure Draft Response Due Date 23 June 2017 Exposure Draft Proposed Application Material Relating to: (a) Professional Skepticism Linkage with the Fundamental Principles; and (b) Professional
More informationThinking Like a Researcher
3-1 Thinking Like a Researcher 3-3 Learning Objectives Understand... The terminology used by professional researchers employing scientific thinking. What you need to formulate a solid research hypothesis.
More informationPriming Effects by Visual Image Information in On-Line Shopping Malls
Priming Effects by Visual Image Information in On-Line Shopping Malls Eun-young Kim*, Si-cheon You**, Jin-ryeol Lee*** *Chosun University Division of Design 375 Seosukdong Dong-gu Gwangju Korea, key1018@hanmail.net
More informationIndividual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members
Individual Swift Trust and Knowledge Based Trust in Face to Face and Virtual Team Members Lionel P. Robert Jr., Alan R. Dennis, and Yu Ting Caisy Hung Li o n e l P. Ro b e rt Jr. is an Assistant Professor
More informationConsumers' Acceptance of Electronic Word-of- Mouth Recommendations: Effects of Multiple Communication Elements and Processing Motivation
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2006 Proceedings International Conference on Information Systems (ICIS) December 2006 Consumers' Acceptance of Electronic Word-of-
More informationLearning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior
Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning
More informationEMOTIONAL TRUST AND COGNITIVE DISTRUST: FROM A COGNITIVE-AFFECTIVE PERSONALITY SYSTEM THEORY PERSPECTIVE
EMOTIONAL TRUST AND COGNITIVE DISTRUST: FROM A COGNITIVE-AFFECTIVE PERSONALITY SYSTEM THEORY PERSPECTIVE Jung Lee, Bang College of Business, Kazakhstan Institute of Management, Economics and Strategic
More informationChapter 1 Introduction to Educational Research
Chapter 1 Introduction to Educational Research The purpose of Chapter One is to provide an overview of educational research and introduce you to some important terms and concepts. My discussion in this
More informationADOPTION PROCESS FOR VoIP: THE UTAUT MODEL
ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL Eduardo Esteva-Armida, Instituto Tecnológico y de Estudios Superiores de Monterrey Gral. Ramón Corona 2514, Zapopan, Jalisco, México 45120 Phone: (5233) 3669.3080
More informationAssessing e-banking Adopters: an Invariance Approach
Assessing e-banking Adopters: an Invariance Approach Vincent S. Lai 1), Honglei Li 2) 1) The Chinese University of Hong Kong (vslai@cuhk.edu.hk) 2) The Chinese University of Hong Kong (honglei@baf.msmail.cuhk.edu.hk)
More informationResearch on Social Psychology Based on Network Big Data
2017 2nd International Conference on Mechatronics and Information Technology (ICMIT 2017) Research on Social Psychology Based on Network Big Data Fuhong Li Department of psychology, Weifang Medical University,
More informationOptimal Flow Experience in Web Navigation
Optimal Flow Experience in Web Navigation Hsiang Chen, Rolf T. Wigand and Michael Nilan School of Information Studies, Syracuse University Syracuse, NY 13244 Email: [ hchen04, rwigand, mnilan]@mailbox.syr.edu
More informationIs Leisure Theory Needed For Leisure Studies?
Journal of Leisure Research Copyright 2000 2000, Vol. 32, No. 1, pp. 138-142 National Recreation and Park Association Is Leisure Theory Needed For Leisure Studies? KEYWORDS: Mark S. Searle College of Human
More informationPlanning Case Study. Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan
Planning Case Study Barbara Ann Karmanos Cancer Institute McLaren Health Care Detroit, Michigan On the vanguard of thought. Reimagining The futurecancer of healthcare Care requires nothing less. Planning
More informationWHAT DOES THE BRAIN TELL US ABOUT TRUST AND DISTRUST? EVIDENCE FROM A FUNCTIONAL NEUROIMAGING STUDY 1
SPECIAL ISSUE WHAT DOES THE BRAIN TELL US ABOUT TRUST AND DISTRUST? EVIDENCE FROM A FUNCTIONAL NEUROIMAGING STUDY 1 By: Angelika Dimoka Fox School of Business Temple University 1801 Liacouras Walk Philadelphia,
More informationTopic 2 Traits, Motives, and Characteristics of Leaders
Topic 2 Traits, Motives, and Characteristics of Leaders Introduction Are some individuals endowed with special qualities that allow them to lead? Why is one person more successful than another? Can we
More informationBuilding Trust through Social Networking
Building Trust through Social Networking Jeffrey Bohler Troy University jbohler@troy.edu Full Paper John R. Drake East Carolina University drakejo@ecu.edu Abstract Usage of social networking sites requires
More informationUser Acceptance of Mobile Internet Based on. Gender Differences
SOCIAL BEHAVIOR AND PERSONALITY, 2010, 38(3), 415-426 Society for Personality Research (Inc.) DOI 10.2224/sbp.2010.38.3.415 User Acceptance of Mobile Internet Based on THE UNIFIED THEORY OF ACCEPTANCE
More informationGREEN MARKETING - WHAT MAKES SOME CONSUMERS BUY GREEN PRODUCTS WHILE OTHERS DO NOT?
GREEN MARKETING - WHAT MAKES SOME CONSUMERS BUY GREEN PRODUCTS WHILE OTHERS DO NOT? Rudly Raphael President - qsample Caroline Fisher, Ph.D. University of Missouri WHAT DETERMINES ENVIRONMENTALLY-FRIENDLY
More informationAffect, Behavior, Cognition, and Desire in the Big Five: An Analysis of Item Content and Structure
Affect, Behavior, Cognition, and Desire in the Big Five: An Analysis of Item Content and Structure Joshua Wilt Department of Psychological Sciences Case Western Reserve University Cleveland, OH USA July
More information