[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Trust in the Information Systems Discipline

  • Chapter
  • First Online:
Trust and Communication in a Digitized World

Part of the book series: Progress in IS ((PROIS))

Abstract

The digitalization of today’s world has greatly advanced during the last few years and affects nearly all areas of life. The research discipline Information Systems (IS) views digitalization from multiple perspectives. On the one hand, IS is concerned with the development and functionality of technological artifacts. On the other hand, researchers in this field also investigate questions of how users perceive and actually use technological innovations. This last point brings about the question of how users deal with perceptions of risks that are inevitably connected to the use of technology (e.g., data theft, abuse of personal data). Thereby, trust research found its way into IS research since trust is widely considered to be a key factor in dealing with risk perceptions. Trust relations are commonly described as the relation between two parties: the trustor (who trusts) and the trustee (who is trusted). So far, technology has mainly been viewed as a medium through which trust can be transmitted or developed. With the emergence of quasi humans (e.g., recommendation agents), this ascription becomes more and more difficult and raises the question of whether or not a technology can be trusted. This article gives an overview of perspectives on the relations between users’ perceptions of risk, trust through and in technologies, and trust towards technology providers. We furthermore provide insights into the state of the art of trust research in the IS discipline.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Akkaya, C., Obermeier, M., Wolf, P., & Krcmar, H. (2011). Components of trust influencing eGovernment adoption in Germany. In M. Janssen, H. J. Scholl, M. A. Wimmer, & Y.-H. Tan (Eds.), Electronic government. 10th IFIP WG 8.5 International Conference, EGOV 2011 Delft, The Netherlands, August/September 2011. Proceedings (pp. 88–98). Heidelberg: Springer.

    Google Scholar 

  • Allouche, G. (2014). The future of cloud computing. CMS Report. http://cmsreport.com/articles/the-future-of-cloud-computing-8210. Accessed 6 April 2015.

  • Amazon. (2015). Amazon Prime Air. http://www.amazon.com/b?node=8037720011. Accessed 9 April 2015.

  • Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.

    Article  Google Scholar 

  • Ba, S., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly, 26(3), 243–268.

    Article  Google Scholar 

  • Becker, J., Heddier, M., Öksüz, A., & Knackstedt, R. (2014). The effect of providing visualizations in privacy policies on trust in data privacy and security. In 47th Hawaii International Conference on System Sciences (HICSS) (pp. 3224–3233).

    Google Scholar 

  • Belanche, D., Casaló, L. V., & Flavián, C. (2012). Integrating trust and personal values into the technology acceptance model: The case of e-government services adoption. Cuadernos de Economía y Dirección de la Empresa, 15(4), 192–204. doi:10.1016/j.cede.2012.04.004.

    Article  Google Scholar 

  • Bélanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. Journal of Strategic Information Systems, 17, 165–176. doi:10.1016/j.jsis.2007.12.002.

    Article  Google Scholar 

  • Bélanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245–270.

    Article  Google Scholar 

  • Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.

    Article  Google Scholar 

  • Benbasat, I. (2010). HCI research: Future challenges and directions. AIS Transactions on Human-Computer Interaction, 2(2), 16–21.

    Google Scholar 

  • Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior, 30, 299–306.

    Article  Google Scholar 

  • Bundesministerium des Inneren. (2015). Digital Trust is a location factor of fundamental importance. http://www.bmi.bund.de/SharedDocs/Kurzmeldungen/EN/2015/02/security-congress-rogall.html. Accessed 6 April 2015.

  • Canfora, G., & Visaggio, C. a. (2012). Managing trust in social networks. Information Security Journal: A Global Perspective, 21(4), 206–215. doi:10.1080/19393555.2012.660677.

    Google Scholar 

  • Chattaraman, V., Kwon, W.-S., & Gilbert, J. E. (2012). Virtual agents in retail web sites: Benefits of simulated social interaction for older users. Computers in Human Behavior, 28(6), 2055–2066. doi:10.1016/j.chb.2012.06.009.

    Article  Google Scholar 

  • Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistic Information Management, 15(5/6), 358–368.

    Article  Google Scholar 

  • Colquitt, J. A., Scott, B. A., & LePine, J. A. (2007). Trust, trustworthiness, and trust propensity: A meta-analytic test of their unique relationships with risk taking and job performance. The Journal of Applied Psychology, 92(4), 909–927.

    Article  Google Scholar 

  • Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human-Computer Studies, 58(6), 737–758.

    Article  Google Scholar 

  • Cyr, D. (2013). Website design, trust and culture: An eight country investigation. Electronic Commerce Research and Applications, 12(6), 373–385.

    Article  Google Scholar 

  • Cyr, D., Head, M., Larios, H., & Pan, B. (2009). Exploring human images in website design: A multi-method approach. MIS Quarterly, 33(3), 539–566.

    Google Scholar 

  • Deutsche Telekom/T-Systems. (2014). Sicherheitsreport 2014: Ergebnisse einer repräsentativen Bevölkerungsumfrage. https://www.telekom.com/static/-/244706/5/140801-sicherheitsreport2014-s. Accessed 6 April 2015.

  • Estonia. (2015). i-Voting. https://e-estonia.com/component/i-voting/. Accessed 6 April 2015.

  • Friedman, B., Khan, P. H., & Howe, D. C. (2000). Trust online. Communications of the ACM, 43(12), 34–40.

    Article  Google Scholar 

  • Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing. Communications of the ACM, 55(9), 62–68.

    Article  Google Scholar 

  • Gartner. (2013). Gartner identifies the top 10 strategic technology trends for 2014. Press release. http://www.gartner.com/newsroom/id/2603623. Accessed 6 April 2015.

  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.

    Google Scholar 

  • Gefen, D., & Straub, D. W. (2003). Managing user trust in B2C e-services. e-Service, 2(2), 7–24.

    Article  Google Scholar 

  • Glover, S., & Benbasat, I. (2011). A comprehensive model of perceived risk of e-commerce transactions. International Journal of Electronic Commerce, 15(2), 47–78. doi:10.2753/JEC1086-4415150202.

    Article  Google Scholar 

  • Hess, T. J., Fuller, M., & Campbell, D. (2009). Designing interfaces with social presence: Using vividness and extraversion to create social recommendation agents. Journal of the Association for Information Systems, 10(12), 889–919.

    Google Scholar 

  • Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.

    Google Scholar 

  • Hodson, H. (2014). Google’s fact-checking bots build vast knowledge bank. NewScientist. http://www.newscientist.com/article/mg22329832.700-googles-factchecking-bots-build-vast-knowledge-bank.html#.VSVJGuG2KHR. Accessed 9 April 2015.

  • Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85.

    Article  Google Scholar 

  • Hofmann, S., & Heierhoff, L. (2012). Adoption of municipal e-Government services – A communication problem? 18th Americas Conference on Information Systems (AMCIS 2012) (pp. 1–10).

    Google Scholar 

  • Hofmann, S., Räckers, M., & Becker, J. (2012). Identifying factors of e-Government acceptance - A literature review. Thirty Third International Conference on Information Systems, Orlando (pp. 1–19).

    Google Scholar 

  • Horsburgh, S., Goldfinch, S., & Gauld, R. (2011). Is public trust in government associated with trust in e-Government? Social Science Computer Review, 29(2), 232–241. doi:10.1177/0894439310368130.

    Article  Google Scholar 

  • Horst, M., Kuttschreuter, M., & Gutteling, J. M. (2007). Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands. Computers in Human Behavior, 23, 1838–1852. doi:10.1016/j.chb.2005.11.003.

    Article  Google Scholar 

  • Karimov, F. P., Brengman, M., & Van Hove, L. (2011). The effect of website design dimensions on initial trust: A synthesis of the empirical literature. Journal of Electronic Commerce Research, 12(4), 272–301.

    Google Scholar 

  • Kerschbaum, F. (2011). Secure and sustainable benchmarking in clouds. Business & Information Systems Engineering, 3(3), 135–143.

    Article  Google Scholar 

  • Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional, 12(5), 20–26.

    Article  Google Scholar 

  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544–564.

    Article  Google Scholar 

  • Kumar, N., & Benbasat, I. (2006). The influence of recommendations and consumer reviews on evaluations of websites. Information Systems Research, 17(4), 425–439. doi:10.1287/isre.1060.0107.

    Article  Google Scholar 

  • Lankton, N. K., & McKnight, D. H. (2011). What does it mean to trust facebook? Examining technology and interpersonal beliefs. ACM SIGMIS Database, 42(2), 32–54. doi:10.1145/1989098.1989101.

    Article  Google Scholar 

  • Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17(1), 39–71.

    Article  Google Scholar 

  • Lisetti, C., Amini, R., Yasavur, U., & Rishe, N. (2013). I can help you change! An empathic virtual agent delivers behavior change health interventions. ACM Transactions on Management Information Systems, 4(4), 1–28. doi:10.1145/2544103.

    Article  Google Scholar 

  • Lowry, P. B., Vance, A., Mood, G., Beckman, B., & Read, A. (2008). Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24(4), 199–224.

    Article  Google Scholar 

  • Marschall, S. (1998). Netzöffentlichkeit - eine demokratische Alternative? In W. Gellner & F. von Korff (Eds.), Demokratie und Internet (pp. 43–54). Baden-Baden: Nomos Verlag.

    Google Scholar 

  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709–734.

    Google Scholar 

  • McKnight, D. H. (2005). Trust in information technology. In G. Davis (Ed.), The Blackwell encyclopedia of management (Management Information Systems, Vol. 7, pp. 329–331). Oxford: Blackwell.

    Google Scholar 

  • McKnight, D. H., Carter, M., Thatcher, J. B., & Clay, P. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems, 2(2), 1–15.

    Article  Google Scholar 

  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3), 297–323.

    Article  Google Scholar 

  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.

    Article  Google Scholar 

  • Neidhardt, F. (1994). Öffentlichkeit, öffentliche Meinung, soziale Bewegungen. Kölner Zeitschrift für Soziologie und Sozialpsychologie. Opladen: Westdeutscher Verlag.

    Google Scholar 

  • Öksüz, A. (2014). Turning dark into white clouds – A framework on trust building in cloud providers via websites. In Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, Georgia.

    Google Scholar 

  • Orlikowski, W. J., & Iacono, C. (2001). Desperately seeking the “IT” in IT research: A call to theorizing the IT artifact. Information Systems Research, 12(2), 121–134.

    Article  Google Scholar 

  • Ortbach, K., Gaß, O., Köffer, S., Schacht, S., Walter, N., Maedche, A., et al. (2014). Design principles for a social question and answers site: Enabling user-to-user support in organizations. In Proceedings of the Advancing the Impact of Design Science: Moving from Theory to Practice (Lecture Notes in Computer Science, Vol. 8463, pp. 54–68). doi:10.1007/978-3-319-06701-8_4.

    Google Scholar 

  • Ortbach, K., Walter, N., & Öksüz, A. (2015). Are you ready to lose control? A theory on the role of trust and risk perception on bring-your-own-device policy and information system service quality. In Proceedings of the 23rd European Conference on Information Systems (ECIS 2015).

    Google Scholar 

  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.

    Google Scholar 

  • Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behaviour. MIS Quarterly, 30(1), 115–143.

    Google Scholar 

  • Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136.

    Google Scholar 

  • Qiu, L., & Benbasat, I. (2005). Online consumer trust and live help interfaces: The effects of text-to-speech voice and three-dimensional avatars. International Journal of Human-Computer Interaction, 19(1), 75–94.

    Article  Google Scholar 

  • Qiu, L., & Benbasat, I. (2009). Evaluating anthropomorphic product recommendation agents: A social relationship perspective to designing information systems. Journal of Management Information Systems, 25(4), 145–182.

    Article  Google Scholar 

  • Recker, J. (2013). Scientific research in information systems: A beginner’s guide. Heidelberg: Springer.

    Book  Google Scholar 

  • Richards, D., & Bransky, K. (2014). ForgetMeNot: What and how users expect intelligent virtual agents to recall and forget personal conversational content. International Journal of Human-Computer Studies, 72(5), 460–476.

    Article  Google Scholar 

  • Rogers, E. M. (2003). Diffusion of innovations. New York: Free Press.

    Google Scholar 

  • Sherchan, W., Nepal, S., & Paris, C. (2013). A survey of trust in social networks. ACM Computing Surveys, 45(4), 1–33.

    Article  Google Scholar 

  • Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., & Leimeister, J.M. (2012). Understanding the formation of trust in IT artifacts. In Thirty Third International Conference on Information Systems (pp. 1–18), Orlando.

    Google Scholar 

  • Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior, 29(3), 821–826.

    Article  Google Scholar 

  • Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24–31.

    Article  Google Scholar 

  • van Eimeren, B., & Frees, B. (2014). Ergebnisse der ARD/ZDF-Onlinestudie 2014: 79 Prozent der Deutschen online – Zuwachs bei mobiler Internetnutzung und Bewegtbild. Media Perspektiven, 7–8, 378–396.

    Google Scholar 

  • Verhagen, T., Meents, S., & Tan, Y.-H. (2006). Perceived risk and trust associated with purchasing at electronic marketplaces. European Journal of Information Systems, 15(6), 542–555.

    Article  Google Scholar 

  • Wakefield, R. L., Stocks, M. H., & Wilder, W. M. (2004). The role of web site characteristics in initial trust formation. Journal of Computer Information Systems, 45(1), 94–103.

    Google Scholar 

  • Walter, N. (2014). “Do you trust me?” – A structured evaluation of trust and social recommendation agents. In SIGHCI 2014 Proceedings.

    Google Scholar 

  • Walter, N., Öksüz, A., Walterbusch, M., Teuteberg, F., & Becker, J. (2014). “May I help you?” Increasing trust in cloud computing providers through social presence and the reduction of information overload. In Proceedings of the 35th International Conference on Information Systems (ICIS 2014).

    Google Scholar 

  • Walter, N., Ortbach, K., Niehaves, B., & Becker, J. (2013). Trust needs touch: understanding the building of trust through social presence. In Proceedings of the 19th Americas Conference on Information Systems (AMCIS 2013). Chicago, IL.

    Google Scholar 

  • Wang, W., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217–246.

    Article  Google Scholar 

  • Wang, W., & Benbasat, I. (2008). Attributions of trust in decision support technologies: A study of recommendation agents for e-commerce. Journal of Management Information Systems, 24(4), 249–273.

    Article  Google Scholar 

  • Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125.

    Article  Google Scholar 

  • Xiao, B., & Benbasat, I. (2007). E-commerce product recommendation agents: Use, characteristics, and impact. MIS Quarterly, 31(1), 137–209.

    Google Scholar 

  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jörg Becker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Öksüz, A., Walter, N., Distel, B., Räckers, M., Becker, J. (2016). Trust in the Information Systems Discipline. In: Blöbaum, B. (eds) Trust and Communication in a Digitized World. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-319-28059-2_12

Download citation

Publish with us

Policies and ethics