Trust Models and Applications
VerifiedAdded on 2020/06/05
|16
|3547
|164
AI Summary
This document analyzes 30 different trust models used across various technological applications. Each model is broken down with details on its trust attributes, context, methodology, application, theoretical basis, citation, validation status, and examples. The models cover a wide range of areas including HRIS, socio-technical systems, online health communities, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
DIRTY REVIEW
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
PAPERS................................................................................................................................................3
PAPERS................................................................................................................................................3
PAPERS
1. Model-Trust in digital information
Trust attributes-Motivation, Reliability, predictability, positive intention
'Context- digital information
methodology- Emprical
Application-to get authentic information from digital medium. Authentic details can support in
increasing trust of users and can make them loyal.
Theory used
Citation- Coutu, D.L. (1998). Organization: Trust in virtual teams. Harvard Business
Review, 76(3), 20–21
Validated-yes
Examples
More notes- An integrated model of trust in information: I like this statement in the paper on 369
where researcher has explained the model in effective manner.
Sample size and type
2. Model-Trust in a Specific Technology: An Investigation of Its Components and Measures
Trust attributes-Faith in general tech, trusting stance
'Context- technology
methodology- Statistical
Application- The study has focused on trust in technology instead of trust in people. That helps in
developing better understanding about IS and other tools.
Theory used-
Citation- K OUFARIS , M. AND H AMPTON -S OSA , W. 2004. The development of initial trust
in an online company by new
customers. Inf. Manag. 41, 3, 377–397.
Validated-yes
Examples
More notes- Conceptual comparison between trust in people and trust in technology is interesting
topic that has defined clear difference between both terms at page 12:4
Sample size and type- MIS students 359
3. Model- Dynamics of Trust Revision: Using Health
Infomediaries
Trust attributes- Relevance, understandability, adequacy, prior experience, perceived favorable
reputation, propensity to trust
'Context- health informediaries
1. Model-Trust in digital information
Trust attributes-Motivation, Reliability, predictability, positive intention
'Context- digital information
methodology- Emprical
Application-to get authentic information from digital medium. Authentic details can support in
increasing trust of users and can make them loyal.
Theory used
Citation- Coutu, D.L. (1998). Organization: Trust in virtual teams. Harvard Business
Review, 76(3), 20–21
Validated-yes
Examples
More notes- An integrated model of trust in information: I like this statement in the paper on 369
where researcher has explained the model in effective manner.
Sample size and type
2. Model-Trust in a Specific Technology: An Investigation of Its Components and Measures
Trust attributes-Faith in general tech, trusting stance
'Context- technology
methodology- Statistical
Application- The study has focused on trust in technology instead of trust in people. That helps in
developing better understanding about IS and other tools.
Theory used-
Citation- K OUFARIS , M. AND H AMPTON -S OSA , W. 2004. The development of initial trust
in an online company by new
customers. Inf. Manag. 41, 3, 377–397.
Validated-yes
Examples
More notes- Conceptual comparison between trust in people and trust in technology is interesting
topic that has defined clear difference between both terms at page 12:4
Sample size and type- MIS students 359
3. Model- Dynamics of Trust Revision: Using Health
Infomediaries
Trust attributes- Relevance, understandability, adequacy, prior experience, perceived favorable
reputation, propensity to trust
'Context- health informediaries
methodology-statistical
Application- To assess the process of trust which have been evolved in online industry.
Theory used- to compare temporal changes of trust with the help of health infomediaries.
Citation- Jarvenpaa, S.L.; Shaw, T.R.; and Staples, D.S. Toward contextualized theories of trust:
The
role of trust in global virtual teams. Information Systems Research, 15, 3 (2004), 250–267.
Validated-yes
Examples
More notes- Dynamic model of trust-is very interesting part of this paper which is at page no 232.
Sample size and type- 400 subjects
4. Model- Social presence, trust, and social commerce purchase intention: An empirical research.
Trust attributes – Integrity, benevolent and competence, Other’s perception towrdas sellers,
interaction with sellers covers intended price fairness, trust disposition, comment, and trust in
market
'Context- social commerce
Methodology – Empirical research
Application- To examine social presence and trust in the buying intention in the e-commerce sector
Theory used- To understand the trust level of persons in online shopping.
Citation- Lu, Y., Zhao, L., & Wang, B. (2010). From virtual community members to C2C e-
commerce buyers: trust in virtual communities and its effect on consumers' purchase intention.
Electronic Commerce Research and Applications, 9(4),346e360.
Validated-yes through LISREL for SEM
Examples
More notes- Social presence of interaction and trust is the interesting topic of this paper which is on
the page 229.
Sample size and type- 552 online buyers of Amazon & Taobao, 53.1% male and 46.9% female
5. Model- The effects of trust, security and privacy in social networking: A security-based approach
to understand the pattern of adoption
Trust attributes- Intention, security,
'Context- security and privacy
Methodology- Emprical
Application-
Theory used-
Citation- Miyazaki, A.D., Fernandez, A., 2001. Consumer perceptions of privacy and
security risks for online shopping. The Journal of Consumer Affairs 35 (1), 27– 44.
Validated-yes
Application- To assess the process of trust which have been evolved in online industry.
Theory used- to compare temporal changes of trust with the help of health infomediaries.
Citation- Jarvenpaa, S.L.; Shaw, T.R.; and Staples, D.S. Toward contextualized theories of trust:
The
role of trust in global virtual teams. Information Systems Research, 15, 3 (2004), 250–267.
Validated-yes
Examples
More notes- Dynamic model of trust-is very interesting part of this paper which is at page no 232.
Sample size and type- 400 subjects
4. Model- Social presence, trust, and social commerce purchase intention: An empirical research.
Trust attributes – Integrity, benevolent and competence, Other’s perception towrdas sellers,
interaction with sellers covers intended price fairness, trust disposition, comment, and trust in
market
'Context- social commerce
Methodology – Empirical research
Application- To examine social presence and trust in the buying intention in the e-commerce sector
Theory used- To understand the trust level of persons in online shopping.
Citation- Lu, Y., Zhao, L., & Wang, B. (2010). From virtual community members to C2C e-
commerce buyers: trust in virtual communities and its effect on consumers' purchase intention.
Electronic Commerce Research and Applications, 9(4),346e360.
Validated-yes through LISREL for SEM
Examples
More notes- Social presence of interaction and trust is the interesting topic of this paper which is on
the page 229.
Sample size and type- 552 online buyers of Amazon & Taobao, 53.1% male and 46.9% female
5. Model- The effects of trust, security and privacy in social networking: A security-based approach
to understand the pattern of adoption
Trust attributes- Intention, security,
'Context- security and privacy
Methodology- Emprical
Application-
Theory used-
Citation- Miyazaki, A.D., Fernandez, A., 2001. Consumer perceptions of privacy and
security risks for online shopping. The Journal of Consumer Affairs 35 (1), 27– 44.
Validated-yes
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Examples
More notes- online social networks statement on page 429 is very interesting in which researcher
has explained real condition of trust among society related to online shopping.
Sample size and type- college students, 19 students
6. Model- Patterns of Trust in Ubiquitous Environments, Trust in Ubiquitous Systems
Trust attributes- understandability, availability, privacy, credibility, reliability, feedback
'Context- environment in ubiquitous
Methodology- statistical
Application-
Theory used-
Citation- F. K. Hussain and E. Chang. An overview of the interpretations of trust and reputation.
Advanced International Conference on Telecommunications, 0:30, 2007.
Validated-
Examples
More notes- Patterns of trust in ubiquitous
environments at page no 393 is interesting topic of this paper.
Sample size and type-
7. Model- Exploring the antecedents of trust in virtual communities
Trust attributes- perceived responsiveness, share vision, relationship
'Context- virtual communities
Methodology- Empirical
Application-
Theory used- to understand the antecedents of trusts in virtual communities
Citation- Chiu, C.M., Hsu, M.H., and Wang, T.G, 2006. Under- standing knowledge sharing in
virtual communities: an integration of social capital and social cognitive theories. Decision Support
Systems, 42, 1872–1888.
Validated-yes
Examples
More notes- Trust-building bases in Vcs at page 589 is essential part of this paper.
Sample size and type- 20 master
students
8. Model- Understanding Consumer Trust in Internet Shopping:
A Multidisciplinary Approach
Trust attributes- Integrity, ability, creditability
'Context-internet shopping
More notes- online social networks statement on page 429 is very interesting in which researcher
has explained real condition of trust among society related to online shopping.
Sample size and type- college students, 19 students
6. Model- Patterns of Trust in Ubiquitous Environments, Trust in Ubiquitous Systems
Trust attributes- understandability, availability, privacy, credibility, reliability, feedback
'Context- environment in ubiquitous
Methodology- statistical
Application-
Theory used-
Citation- F. K. Hussain and E. Chang. An overview of the interpretations of trust and reputation.
Advanced International Conference on Telecommunications, 0:30, 2007.
Validated-
Examples
More notes- Patterns of trust in ubiquitous
environments at page no 393 is interesting topic of this paper.
Sample size and type-
7. Model- Exploring the antecedents of trust in virtual communities
Trust attributes- perceived responsiveness, share vision, relationship
'Context- virtual communities
Methodology- Empirical
Application-
Theory used- to understand the antecedents of trusts in virtual communities
Citation- Chiu, C.M., Hsu, M.H., and Wang, T.G, 2006. Under- standing knowledge sharing in
virtual communities: an integration of social capital and social cognitive theories. Decision Support
Systems, 42, 1872–1888.
Validated-yes
Examples
More notes- Trust-building bases in Vcs at page 589 is essential part of this paper.
Sample size and type- 20 master
students
8. Model- Understanding Consumer Trust in Internet Shopping:
A Multidisciplinary Approach
Trust attributes- Integrity, ability, creditability
'Context-internet shopping
Methodology- statistical
Application-
Theory used-
Citation- Nua. (2002). Internet users still not buying online. Retrieved February 26, 2002, from
http://www.nua.ie/surveys/index.cgi?f=VS&art_id= 905358100 &rel=true
Validated-yes
Examples
More notes- An Integrative Model of Consumer Trust in Internet Shopping on page 482 is effective
statement that has explained the actual perception of consumers those who buy products from
internet.
Sample size and type- potential internet shoppers
9. Model- Trust transference in brick and click retailers: An investigation
of the before-online-visit phase
Trust attributes- benevolence, integrity, relationship
'Context- brick and click retailers before online visit phase
Methodology- Empirical
Application-
Theory used-
Citation- E. Turban, D. King, J. Lee, M. Warkentin, H.M. Chung, Electronic Commerce: A
Managerial Perspective, Prentice Hall, 2002.
Validated-yes
Examples
More notes- Interaction dimension of trust: before-online-
page 177 is interesting part of this paper.
Sample size and type- 246
customers
10. Model- Impact of Signals and Experience on Trust
and Trusting Behavior
Trust attributes- ability, predictability, integrity,
'Context-trusting behavior
Methodology- statistical
Application-
Theory used-
Citation- Kwon W-S, Lennon SJ. What induces online loyalty? Online versus offline brand images.
Journal of Business Research 2009; 62:557–64.
Validated-yes
Application-
Theory used-
Citation- Nua. (2002). Internet users still not buying online. Retrieved February 26, 2002, from
http://www.nua.ie/surveys/index.cgi?f=VS&art_id= 905358100 &rel=true
Validated-yes
Examples
More notes- An Integrative Model of Consumer Trust in Internet Shopping on page 482 is effective
statement that has explained the actual perception of consumers those who buy products from
internet.
Sample size and type- potential internet shoppers
9. Model- Trust transference in brick and click retailers: An investigation
of the before-online-visit phase
Trust attributes- benevolence, integrity, relationship
'Context- brick and click retailers before online visit phase
Methodology- Empirical
Application-
Theory used-
Citation- E. Turban, D. King, J. Lee, M. Warkentin, H.M. Chung, Electronic Commerce: A
Managerial Perspective, Prentice Hall, 2002.
Validated-yes
Examples
More notes- Interaction dimension of trust: before-online-
page 177 is interesting part of this paper.
Sample size and type- 246
customers
10. Model- Impact of Signals and Experience on Trust
and Trusting Behavior
Trust attributes- ability, predictability, integrity,
'Context-trusting behavior
Methodology- statistical
Application-
Theory used-
Citation- Kwon W-S, Lennon SJ. What induces online loyalty? Online versus offline brand images.
Journal of Business Research 2009; 62:557–64.
Validated-yes
Examples
More notes- Impact of signals and experience on trust and trusting behavior on page no 541 is
important that helps in knowing the behaviour of people.
Sample size and type- 32 graduate students
11. Model- Consumer trust and distrust: An issue of website design
Trust attributes: Benevolence, predictability, integrity
'Context- issues related with website designing
Methodology- statistical
Application- To investigate consumer trust and distrust in website designing
Theory used- To identify the issues that are related with website designing and identify btrust
element in this respect.
Citation- Pace, S. (2004). A grounded theory of the flow experiences of web users. International
Journal of Human-Computer Studies 60. pp. 327–363
Validated-yes
Examples
More notes- he antecedents of trust and distrust on page no 917 is interesting part of this paper.
Sample size and type- 100 students 50.3% male and 49.7% female
12. Model- Social presence, trust, and social commerce purchase intention: An
empirical research
Trust attributes- Competence, trust disposition, comment, benevolence, integrity
'Context- purchasing intention and social commerce
Methodology- statistical
Application-
Theory used- this paper looks into
the nature of social aspect in online social commerce marketplaces
by proposing a set of three social presence variables, SP of the web,
perception of others and SP of interaction, respectively
Citation- Zhou, L., Zhang, P., & Zimmermann, H. D. (2013). Social commerce research: an
integrated view. Electronic Commerce Research and Applications, 12(2), 61e68.
Validated-yes
Examples
More notes- Social aspect of online shopping on page 226 is interesting part of this paper.
Sample size and type-
13. Model- Online Trust Forming Mechanism: Approaches and An
Integrated Model
More notes- Impact of signals and experience on trust and trusting behavior on page no 541 is
important that helps in knowing the behaviour of people.
Sample size and type- 32 graduate students
11. Model- Consumer trust and distrust: An issue of website design
Trust attributes: Benevolence, predictability, integrity
'Context- issues related with website designing
Methodology- statistical
Application- To investigate consumer trust and distrust in website designing
Theory used- To identify the issues that are related with website designing and identify btrust
element in this respect.
Citation- Pace, S. (2004). A grounded theory of the flow experiences of web users. International
Journal of Human-Computer Studies 60. pp. 327–363
Validated-yes
Examples
More notes- he antecedents of trust and distrust on page no 917 is interesting part of this paper.
Sample size and type- 100 students 50.3% male and 49.7% female
12. Model- Social presence, trust, and social commerce purchase intention: An
empirical research
Trust attributes- Competence, trust disposition, comment, benevolence, integrity
'Context- purchasing intention and social commerce
Methodology- statistical
Application-
Theory used- this paper looks into
the nature of social aspect in online social commerce marketplaces
by proposing a set of three social presence variables, SP of the web,
perception of others and SP of interaction, respectively
Citation- Zhou, L., Zhang, P., & Zimmermann, H. D. (2013). Social commerce research: an
integrated view. Electronic Commerce Research and Applications, 12(2), 61e68.
Validated-yes
Examples
More notes- Social aspect of online shopping on page 226 is interesting part of this paper.
Sample size and type-
13. Model- Online Trust Forming Mechanism: Approaches and An
Integrated Model
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Trust attributes- Perceived reputation, size and brand cognition in the initial trust
Perceived product quality, service level in the committed trust stage
'Context- Trust construction methods
Methodology- Empirical
Application- To examine the online trust mechanism in the e-commerce industry
Theory used-
Citation- Keat, T.K. and Mohan, A. 2004. Integration of TAM Based Electronic Commerce Models
for Trust. Journal of American Academy of Business, Cambridge; Sep 2004; 5, 1/2; 404-410
Validated-yes
Examples
More notes- Basic Trust Construct on page 203 is an interesting part of the study.
Sample size and type- No primary research conducted
14. Model- Increasing trust in mobile commerce through design aesthetics
Trust attributes- Usefulness, ease of use, design aesthetics and customization
Context- mobile commerce (m-commerce)
Methodology: Statistical study
Application- To determine the increasing consumer trust in the m-commerce that can be built throug
mobile device
Theory used- It is used to develop understanding about m-commerce and trust
Citation- Hull, J., Lehn, D., & Tedlie, J. (1991). A general approach to testing multifaceted
personality constructs. Journal of Personality and Social Psychology, 61(6),934–945.
Validated-yes through SEM modelling
Examples
More notes- A model for m-trust development. On page 675 says about trust development in m-
commerce.
Sample size and type- 200 mobile users if Taiwan aged between 19-28 years
51.5% female and 48.5% male
15. Model- A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and
Website Design for Heightened Credibility and Consumer Trust
Trust attributes- Disposition to trust (Integrity, benevolence, trusting stance and competence)
Disposition to distrust (Integrity, benevolence, distrusting stance and competence)
Distrusting belief (integrity, Competence and benevolence)
Trusting belief (integrity, Competence and benevolence)
'Context-Source Credibility Theory
Methodology- statistical
Application- To examine the application of Source credibility theory into logo & website design for
Perceived product quality, service level in the committed trust stage
'Context- Trust construction methods
Methodology- Empirical
Application- To examine the online trust mechanism in the e-commerce industry
Theory used-
Citation- Keat, T.K. and Mohan, A. 2004. Integration of TAM Based Electronic Commerce Models
for Trust. Journal of American Academy of Business, Cambridge; Sep 2004; 5, 1/2; 404-410
Validated-yes
Examples
More notes- Basic Trust Construct on page 203 is an interesting part of the study.
Sample size and type- No primary research conducted
14. Model- Increasing trust in mobile commerce through design aesthetics
Trust attributes- Usefulness, ease of use, design aesthetics and customization
Context- mobile commerce (m-commerce)
Methodology: Statistical study
Application- To determine the increasing consumer trust in the m-commerce that can be built throug
mobile device
Theory used- It is used to develop understanding about m-commerce and trust
Citation- Hull, J., Lehn, D., & Tedlie, J. (1991). A general approach to testing multifaceted
personality constructs. Journal of Personality and Social Psychology, 61(6),934–945.
Validated-yes through SEM modelling
Examples
More notes- A model for m-trust development. On page 675 says about trust development in m-
commerce.
Sample size and type- 200 mobile users if Taiwan aged between 19-28 years
51.5% female and 48.5% male
15. Model- A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and
Website Design for Heightened Credibility and Consumer Trust
Trust attributes- Disposition to trust (Integrity, benevolence, trusting stance and competence)
Disposition to distrust (Integrity, benevolence, distrusting stance and competence)
Distrusting belief (integrity, Competence and benevolence)
Trusting belief (integrity, Competence and benevolence)
'Context-Source Credibility Theory
Methodology- statistical
Application- To examine the application of Source credibility theory into logo & website design for
building consumer trust
Theory used- It is used to explain the meaning of source credibility theory in logo and website
design.
Citation- Bracken, C. C. (2006). Perceived source credibility of local television news:The impact of
television form and presence. Journal of Broadcasting & Electronic Media, 50, 723–741.
Validated-yes
Examples
More notes- Source Credibility Theory at page 65 is one of the essential part of this paper which
says about SCT to online context.
Sample size and type- 220 US professionals, 50.2% female and 49.8% male
16. Model- Building online trust through privacy practices
Trust attributes- Firm’s privacy policy includes integrity, ability and benevolence that build
individual trust and influence their truthfulness and loyalty
'Context- privacy practices
Methodology- Statistical
Application- To build trust among users through employing privacy practices in e-commerce
industry
Theory used- It is used to develop understanding about online trust by maintaining privacy.
Citation- Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: a review and
recommended two-step approach. Psychol.Bull. 103(3), 411–423 (1998)
Validated-yes through LISREL for structural equation modelling
Examples
More notes- Antecedents of online trust at page 326 says about factors that lead to willingness to be
risk. It defines loyalty of consumers much more depends upon trust.
Sample size and type- 269 students, 46.1% female and 53.9% male
17. Model- Trust in consumer-to-consumer electronic commerce
Trust attributes- Internal: perceived integrity, competency, security and privacy control, External:
Third party recognition and legal framework
Context-e-commerce
Methodology- Statistical
Application – To examine users trust in E-commerce industry
Theory used-
Citation- C.M.K. Cheung, M.K.O. Lee, Understanding consumer trust in internet shopping: a
multidisciplinary approach, Journal of the American Society for Information Science and
Technology 57, 2006, pp. 479–492
Validated-yes through Statistical Equation Modelling (SEM)
Examples
More notes- C2C trust model at page no 89 explains the trust of people in electronic business
Sample size and type- 52
Theory used- It is used to explain the meaning of source credibility theory in logo and website
design.
Citation- Bracken, C. C. (2006). Perceived source credibility of local television news:The impact of
television form and presence. Journal of Broadcasting & Electronic Media, 50, 723–741.
Validated-yes
Examples
More notes- Source Credibility Theory at page 65 is one of the essential part of this paper which
says about SCT to online context.
Sample size and type- 220 US professionals, 50.2% female and 49.8% male
16. Model- Building online trust through privacy practices
Trust attributes- Firm’s privacy policy includes integrity, ability and benevolence that build
individual trust and influence their truthfulness and loyalty
'Context- privacy practices
Methodology- Statistical
Application- To build trust among users through employing privacy practices in e-commerce
industry
Theory used- It is used to develop understanding about online trust by maintaining privacy.
Citation- Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: a review and
recommended two-step approach. Psychol.Bull. 103(3), 411–423 (1998)
Validated-yes through LISREL for structural equation modelling
Examples
More notes- Antecedents of online trust at page 326 says about factors that lead to willingness to be
risk. It defines loyalty of consumers much more depends upon trust.
Sample size and type- 269 students, 46.1% female and 53.9% male
17. Model- Trust in consumer-to-consumer electronic commerce
Trust attributes- Internal: perceived integrity, competency, security and privacy control, External:
Third party recognition and legal framework
Context-e-commerce
Methodology- Statistical
Application – To examine users trust in E-commerce industry
Theory used-
Citation- C.M.K. Cheung, M.K.O. Lee, Understanding consumer trust in internet shopping: a
multidisciplinary approach, Journal of the American Society for Information Science and
Technology 57, 2006, pp. 479–492
Validated-yes through Statistical Equation Modelling (SEM)
Examples
More notes- C2C trust model at page no 89 explains the trust of people in electronic business
Sample size and type- 52
18. Model- Website characteristics, Trust and purchase intention in online stores: -An Empirical
study in the Indian context
Trust attributes- Website information design, visuality, Navigation, Communication, Social
Presence, privacy and security
Context - Purchase intention in online stores
Methodology- Statistical
Application- To examine internet shopper’s behaviour in an Indian e-commerce industry
Theory used -
Citation- Morgan, R.M. and Hunt, S.D. (1994). "The commitment trust theory of relationship
marketing". Journal of Marketing. 58. pp 20-38.
Validated-yes via Structure Equation Modelling
Examples
More notes- Trust and Perceived Risk is the essential part of this paper which explains the trust and
risk relationship.
Sample size and type- 290 students, 240 male and 50 females
19. Model- Understanding Consumer Trust in Internet Shopping: A Multidisciplinary Approach
Trust attributes- integrity, privacy control, legal framework, benevolence
Context- Internet shopping
Methodology- statistical
Application-
Theory used- It is used to understand the trust of users in internet shopping.
citation- Barber, B. (1983). The logic and limits of trust. New Brunswick, NJ:Rutgers University
Press.
Validated-yes
Examples
More notes- sociologists views have been explained in the page no 481 that helps in knowing the
perception of internet users for buying products.
Sample size and type-
20. Model- Trust transfer in the continued usage of public e-services
Trust attributes- loyalty, benevolence, reliability, efficiency, fulfilment, trust in the internet
Context- public e-services
Methodology- statistical
Application- To investigate the usage e- services regarding public administration services
Theory used-It is used to know the usage of public e-services,
citation -R.B. Money, M.C. Gilly, J.L. Graham, Exploration of national culture and word-of-mouth
referral behavior in the purchase of industrial services in the United States and Japan, J. Market. 62,
study in the Indian context
Trust attributes- Website information design, visuality, Navigation, Communication, Social
Presence, privacy and security
Context - Purchase intention in online stores
Methodology- Statistical
Application- To examine internet shopper’s behaviour in an Indian e-commerce industry
Theory used -
Citation- Morgan, R.M. and Hunt, S.D. (1994). "The commitment trust theory of relationship
marketing". Journal of Marketing. 58. pp 20-38.
Validated-yes via Structure Equation Modelling
Examples
More notes- Trust and Perceived Risk is the essential part of this paper which explains the trust and
risk relationship.
Sample size and type- 290 students, 240 male and 50 females
19. Model- Understanding Consumer Trust in Internet Shopping: A Multidisciplinary Approach
Trust attributes- integrity, privacy control, legal framework, benevolence
Context- Internet shopping
Methodology- statistical
Application-
Theory used- It is used to understand the trust of users in internet shopping.
citation- Barber, B. (1983). The logic and limits of trust. New Brunswick, NJ:Rutgers University
Press.
Validated-yes
Examples
More notes- sociologists views have been explained in the page no 481 that helps in knowing the
perception of internet users for buying products.
Sample size and type-
20. Model- Trust transfer in the continued usage of public e-services
Trust attributes- loyalty, benevolence, reliability, efficiency, fulfilment, trust in the internet
Context- public e-services
Methodology- statistical
Application- To investigate the usage e- services regarding public administration services
Theory used-It is used to know the usage of public e-services,
citation -R.B. Money, M.C. Gilly, J.L. Graham, Exploration of national culture and word-of-mouth
referral behavior in the purchase of industrial services in the United States and Japan, J. Market. 62,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1998, pp. 76–87.
Validated-yes
Examples
More notes- trust transfer approaches at page no 629 says about approaches of transfer of trust.
Sample size and type- 336, Spanish users of transactional e-government services and Spanish
Internet users
21. Model- An extension of Trust and TAM model with TPB in the initial adoption of on-line tax:
An empirical study
Trust attributes- loyalty, intention, attitude, innovation
Context- Online tax system
Methodology- Empirical
Application- To assess the trust of people with respect to online tax services
Theory used- It is used to understand the relationship between trust and online tax.
Validated-yes
Examples
More notes- Trust and TAM relationship at page no 790 says about TPB and relationship with trust.
Sample size and type- 1032 user through online questionnaire
22. Model- Fostering trust in virtual project teams: Towards a design framework grounded in a
TrustWorthiness ANtecedents (TWAN) schema
Trust attributes- ability, accountability, benevolence
Context- TWAN schema
Methodology- Empirical
Application-
Theory used- It is used to know how
interpersonal trust forms in face-to-face project teams as well as on insight into how this process
differs in virtual teams
Validated-yes
citation- Hung, Y.C., Dennis, A.R, Robert, L., 2004. Trust in virtual teams: towards an integrative
model of trust formation. Paper presented at the 37th Hawaii International Conference on System
Sciences, Hawaii.
Examples
More notes- TWAN schema at page no 844 says about the relationship between both these terms.
Sample size and type-
23. Model- Individual Swift Trust and Knowledge‐Based Trust in Face‐to‐Face and Virtual Team
Members
Validated-yes
Examples
More notes- trust transfer approaches at page no 629 says about approaches of transfer of trust.
Sample size and type- 336, Spanish users of transactional e-government services and Spanish
Internet users
21. Model- An extension of Trust and TAM model with TPB in the initial adoption of on-line tax:
An empirical study
Trust attributes- loyalty, intention, attitude, innovation
Context- Online tax system
Methodology- Empirical
Application- To assess the trust of people with respect to online tax services
Theory used- It is used to understand the relationship between trust and online tax.
Validated-yes
Examples
More notes- Trust and TAM relationship at page no 790 says about TPB and relationship with trust.
Sample size and type- 1032 user through online questionnaire
22. Model- Fostering trust in virtual project teams: Towards a design framework grounded in a
TrustWorthiness ANtecedents (TWAN) schema
Trust attributes- ability, accountability, benevolence
Context- TWAN schema
Methodology- Empirical
Application-
Theory used- It is used to know how
interpersonal trust forms in face-to-face project teams as well as on insight into how this process
differs in virtual teams
Validated-yes
citation- Hung, Y.C., Dennis, A.R, Robert, L., 2004. Trust in virtual teams: towards an integrative
model of trust formation. Paper presented at the 37th Hawaii International Conference on System
Sciences, Hawaii.
Examples
More notes- TWAN schema at page no 844 says about the relationship between both these terms.
Sample size and type-
23. Model- Individual Swift Trust and Knowledge‐Based Trust in Face‐to‐Face and Virtual Team
Members
Trust attributes-, integrity, reliability, benevolence
context- Various trusts
Methodology- statistical
Application-
Theory used- It is used to develop understanding about Knowledge based trust, virtual team
members and swift trust.
citation-Castelfranchi, C., and Tan, Y. The role of trust and deception in virtual societies. Inter-
national Journal of Electronic Commerce, 6, 2 (2002), 55–70.
Validated-yes
Examples
More notes- knowledge based trust at page no 247 says about how the trust is depended upon
knowledge.
Sample size and type-
24. Model- Models and Patterns of Trust
Trust attributes- Predict behavior, integrity, competence, reliability
context- Patterns of trusts
Methodology- Empirical
Application-
Theory used- It is used to know the trust's pattern
citation-Alexander, C. The Timeless Way of Building, vol. 1.Oxford University Press, 1979.
Validated-yes
Examples
More notes- Trust & Anonymity has been explained on page no 333 which says patterns of trust.
Sample size and type-
25. Model- Investigating Individual Trust for Collaboration Using Spider Diagram
Trust attributes- High power, utility value and interest
context- spider diagrams
Methodology- statistical
Application-
Theory used- It is used to know the individual trust for collaboration with the help of spider
diagrams
citation- Cheng Xusen, Macaulay Linda and Zarifis Alexandros (2008), Individual Trust
Development in Computer Mediated Teamwork, Proceedings of WebScience 2008, June 19,
Pittsburgh, Pennsylvania, USA:ACM Press.
Validated-yes
Examples
context- Various trusts
Methodology- statistical
Application-
Theory used- It is used to develop understanding about Knowledge based trust, virtual team
members and swift trust.
citation-Castelfranchi, C., and Tan, Y. The role of trust and deception in virtual societies. Inter-
national Journal of Electronic Commerce, 6, 2 (2002), 55–70.
Validated-yes
Examples
More notes- knowledge based trust at page no 247 says about how the trust is depended upon
knowledge.
Sample size and type-
24. Model- Models and Patterns of Trust
Trust attributes- Predict behavior, integrity, competence, reliability
context- Patterns of trusts
Methodology- Empirical
Application-
Theory used- It is used to know the trust's pattern
citation-Alexander, C. The Timeless Way of Building, vol. 1.Oxford University Press, 1979.
Validated-yes
Examples
More notes- Trust & Anonymity has been explained on page no 333 which says patterns of trust.
Sample size and type-
25. Model- Investigating Individual Trust for Collaboration Using Spider Diagram
Trust attributes- High power, utility value and interest
context- spider diagrams
Methodology- statistical
Application-
Theory used- It is used to know the individual trust for collaboration with the help of spider
diagrams
citation- Cheng Xusen, Macaulay Linda and Zarifis Alexandros (2008), Individual Trust
Development in Computer Mediated Teamwork, Proceedings of WebScience 2008, June 19,
Pittsburgh, Pennsylvania, USA:ACM Press.
Validated-yes
Examples
More notes- Investigation survey over stages says about spider diagrams and individual trust.
Sample size and type-
26. Model- Why do we trust new technology? A study of initial trust formation with organizational
information systems
Trust attributes-, benevolence, reliability, integrity
context- new technology in formation of trust
Methodology- statistical
Application-
Theory used- It is used to form the initial trust with information systems.
citation-Luo, X., 2002. Trust production and privacy concerns on the internet: a framework based
on relationship marketing and social exchange theory. Industrial Marketing Management 31 (2),
111–118.
Validated-yes
Examples
More notes- Cognitive trusting base is being explained on page 45 which says aboutr social
psychology.
Sample size and type-
27. Model- Human resource information systems (HRIS) and technology trust
Trust attributes- ability, reliability, honesty, motivation
of trust, Technology trust and HRIS implementation success
context- HRIS
Methodology- Empirical
Application- The main aim of Human resource information system is to make substantial use of
Communication and Information technologies
Theory used-
citation- W.O. Hagood and L. Friedman, Using the balanced
scorecard to measure the performance of your HR infor-mation system, Public Personnel
Management 31(4) (2002) 543–57.
Validated-yes
Examples
More notes- Model of technology trust in human resource information systems at page 345 says
about this model effectively.
Sample size and type- 11 prepositions
28. Model- The Role of Trust and Assurance in the
Design of Secure Socio-Technical Systems
Trust attributes- motivation,, integrity,
Sample size and type-
26. Model- Why do we trust new technology? A study of initial trust formation with organizational
information systems
Trust attributes-, benevolence, reliability, integrity
context- new technology in formation of trust
Methodology- statistical
Application-
Theory used- It is used to form the initial trust with information systems.
citation-Luo, X., 2002. Trust production and privacy concerns on the internet: a framework based
on relationship marketing and social exchange theory. Industrial Marketing Management 31 (2),
111–118.
Validated-yes
Examples
More notes- Cognitive trusting base is being explained on page 45 which says aboutr social
psychology.
Sample size and type-
27. Model- Human resource information systems (HRIS) and technology trust
Trust attributes- ability, reliability, honesty, motivation
of trust, Technology trust and HRIS implementation success
context- HRIS
Methodology- Empirical
Application- The main aim of Human resource information system is to make substantial use of
Communication and Information technologies
Theory used-
citation- W.O. Hagood and L. Friedman, Using the balanced
scorecard to measure the performance of your HR infor-mation system, Public Personnel
Management 31(4) (2002) 543–57.
Validated-yes
Examples
More notes- Model of technology trust in human resource information systems at page 345 says
about this model effectively.
Sample size and type- 11 prepositions
28. Model- The Role of Trust and Assurance in the
Design of Secure Socio-Technical Systems
Trust attributes- motivation,, integrity,
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
context- Socio-technical system
Methodology- Empirical
Application-
Theory used- It is used to explain the role of trust and assurance
citation- Adams, A. & Sasse, M. A. Users Are Not The Enemy. Communications of the ACM 1999.
VoL 42, No. 12 December
Validated-yes
Examples
More notes- people and security part is being explained at 35-36 page which say about role of trust.
Sample size and type-
29. Model- Building Trusting Relationships in Online Health Communities
Trust attributes- motivation, integrity, benevolence, competence
of Relationship Marketing
context- Trust relationship
Methodology- statistical
Application-
Theory used- It is used to explain how trust can be built up.
citation-Feng JJ, Lazar J, Preece J. Empathy and online interpersonal trust: a fragile relationship.
Behaviour & Information Technology 2004; 23:97–106.
Validated-yes
Examples
More notes- The Commitment-Trust Theory at page no 651 says about the trust relationship and its
building process.
Sample size and type-
30. Model- Untangling the antecedents of initial trust in Web-based health information: The roles of
argument quality, source expertise, and user perceptions of information quality and risk
Trust attributes- behaivour, perception,
context-role of information quality and risk
Methodology- statistical
Application- To assess the initial trust formation in web based health information
Theory used- It is used to develop understanding about argument quality and role of risk.
Citation- R.E. Kirk, Experimental Design: Procedures for the Behavioral Sciences, 3rd ed.
Brooks/Cole Publishing, Pacific Grove, CA, 1995.
Validated-yes
Examples
More notes-
Methodology- Empirical
Application-
Theory used- It is used to explain the role of trust and assurance
citation- Adams, A. & Sasse, M. A. Users Are Not The Enemy. Communications of the ACM 1999.
VoL 42, No. 12 December
Validated-yes
Examples
More notes- people and security part is being explained at 35-36 page which say about role of trust.
Sample size and type-
29. Model- Building Trusting Relationships in Online Health Communities
Trust attributes- motivation, integrity, benevolence, competence
of Relationship Marketing
context- Trust relationship
Methodology- statistical
Application-
Theory used- It is used to explain how trust can be built up.
citation-Feng JJ, Lazar J, Preece J. Empathy and online interpersonal trust: a fragile relationship.
Behaviour & Information Technology 2004; 23:97–106.
Validated-yes
Examples
More notes- The Commitment-Trust Theory at page no 651 says about the trust relationship and its
building process.
Sample size and type-
30. Model- Untangling the antecedents of initial trust in Web-based health information: The roles of
argument quality, source expertise, and user perceptions of information quality and risk
Trust attributes- behaivour, perception,
context-role of information quality and risk
Methodology- statistical
Application- To assess the initial trust formation in web based health information
Theory used- It is used to develop understanding about argument quality and role of risk.
Citation- R.E. Kirk, Experimental Design: Procedures for the Behavioral Sciences, 3rd ed.
Brooks/Cole Publishing, Pacific Grove, CA, 1995.
Validated-yes
Examples
More notes-
Sample size and type- 300 online users
16
1 out of 16
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.