Sunteți pe pagina 1din 27

Int. J. Networking and Virtual Organisations, Vol. 5, Nos.

3/4, 2008

369

A multitheoretical approach for solving trust problems in B2C e-commerce Siddhi Pittayachawan*, Mohini Singh and Brian Corbitt
School of Business Information Technology RMIT University G.P.O. Box 2476V, Melbourne 3001 Victoria, Australia E-mail: siddhi.pittayachawan@rmit.edu.au E-mail: mohini.singh@rmit.edu.au E-mail: brian.corbitt@rmit.edu.au *Corresponding author
Abstract: Trust has been identified as a major barrier in online shopping, especially in the B2C e-commerce model. It has been studied for several years, but there is no indicator that a satisfactory solution for trust in online shopping has been achieved. A trust model is proposed in this paper in order to address this issue. It is uniquely based on five current issues (cybercrime, security, control, web interface, and a trusted third party) that impact trust, guided by four supportive theories: Semiotics, Trust in Signs, Simmelian Model of Trust and Trustworthiness. The research was accomplished with an online survey to collect data from online shoppers around the world. Structural Equation Modelling (SEM) was used to validate the trust model revealing that privacy and security of information are most important factors affecting trust in B2C e-commerce followed by web interface and control. Keywords: B2C trust model; e-commerce trust issues; online shopping solution for e-vendors. Reference to this paper should be made as follows: Pittayachawan, S., Singh, M. and Corbitt, B. (2008) A multitheoretical approach for solving trust problems in B2C e-commerce, Int. J. Networking and Virtual Organisations, Vol. 5, Nos. 3/4, pp.369395. Biographical notes: Siddhi Pittayachawan is a lecturer in the School of Business Information Technology at RMIT University. He received his PhD degree addressing trust issues in B2C e-commerce. His research interests are online shopping, trust, security, and other consumer issues. Mohini Singh is a Professor of Information Technology and E-business in the School of Business Information Technology at RMIT University. She earned her PhD from Monash University, and has published widely in the areas of e-business and new technology and innovation management. Her publications comprise books, book chapters, journal and conference papers. She is the principal Editor of two highly regarded books on e-business and serves as a member on the editorial boards of several international journals.

Copyright 2008 Inderscience Enterprises Ltd.

370

S. Pittayachawan, M. Singh and B. Corbitt


Professor Brian Corbitt is currently Professor of Management Information Systems and Head of the School of Business Information Technology at RMIT University, Australia. He has previously been Professor of Management Science at Shinawatra University in Thailand, Pro-Vice Chancellor (online services) at Deakin University, and JADE Professor of e-Commerce at Victoria University of Wellington in New Zealand. He specialises in IT policy development, in health information systems, analysis and implementation in business modelling and electronic commerce trade relationships, and knowledge management. He has published ten books including six on e-business, e-commerce and e-government and over 150 refereed scholarly papers.

Introduction

Trust is an important barrier discouraging consumers to transact online, especially in Business-to-Consumer (B2C) model, although e-commerce has expanded and grown in the last five years. The issue of trust in e-commerce is widely addressed, however, a satisfactory solution is yet to be achieved. On the contrary, it is reported that trust in online shopping is not improving, in fact, becoming a bigger problem for electronic vendors (e-vendors), leading to a decline in online shopping (NECTEC, 2006). The aim of this paper is to provide e-vendors a simple trust model to address trust problems in B2C e-commerce. Trust is known to be very complex and multidimensional (McKnight and Chervany, 2001), and therefore, it entails several variables which e-vendors should be aware of. This paper includes a discussion on current trends in online business on the issues of trust and a critical review of literature on trust models from previous research. From an extensive review of literature on trust issues (e.g., cybercrime, security and web interface), 21 propositions were developed to establish consumer issues in online trust. An online survey establishing consumer perception guided by Semiotics (Chandler, 2002), Trust in Signs (Bacharach and Gambetta, 2001), Simmelian Model of Trust (Mllering, 2001), and Trustworthiness (Hardin, 1996) theories was undertaken to develop a trust model for e-vendors. Data analysis based on SEM identifying privacy of information and secure transactions to be the most important components of trust form the gist of this paper.

B2C e-commerce

B2C e-commerce has become a popular method for sale of goods and services to consumers in the last ten years. It enables vendors to access customers globally (Miniwatts, 2006), to generate higher income (comScore, 2006), to gain a competitive advantage (Lederer et al., 2000), to enhance and integrate business processes (Piris et al., 2004), and to improve customer service (Lovett, 2003). McGann (2004) advocates that the benefits of B2C e-commerce to consumers include faster transaction (78%), cheaper prices (51%), more selection of similar products or services (43%), simpler shipping process (40%), more customisable products (28%), and more product information (20%). Due to these benefits, B2C e-commerce is a trend widely adopted and is constantly growing since 1995 (Netcraft, 2007). Despite its rapid growth and popularity, trust is a

A multitheoretical approach for solving trust problems in B2C e-commerce 371 critical problem discouraging the use of B2C e-commerce (CMO Council, 2006; Grazioli and Jarvenpaa, 2000; Hsiung et al., 2001; NECTEC, 2006; Tsiakis et al., 2004; Wang and Emurian, 2005).

2.1 The importance of trust in B2C e-commerce


According to McKnight and Chervany (2001), trust has several meanings including competence, predictability, benevolence and integrity, each meaning different things in different situations. In B2C e-commerce, competence may be used in a trust relationship where the ability of an e-vendor is key to foster consumer trust while benevolence may be applied in a trust relationship where care and responsiveness are important to consumers. This kind of trust relationship is three-part trust relation (Hardin, 2002), which is defined as A trusts B to do C. Trust has been identified to be an important factor affecting online consumers decisions to commit a purchase (McKnight and Chervany, 2001). An important function of trust in e-commerce is to help consumers confidently shop online even if e-vendors are not known or recognised (Akhter et al., 2004; Jutla et al., 2004). Winning consumer trust is especially important for new e-vendors who are using the internet as a platform for business. Although trust has been identified to be a barrier to e-commerce, it is also a success factor for e-vendors if satisfactorily implemented (Stockdale and Standing, 2003). Trust is also a central factor in e-transaction (Daughtrey, 2001), business collaborations (Bryant and Colledge, 2002), security systems (Ratnasingam and Pavlou, 2003) and organisations (Antoci et al., 2006). It supports B2C e-commerce as it simplifies transaction process (Riegelsberger et al., 2003) as well as maintains long-term relationships between e-vendors and customers (Keen, 1997), improves customer loyalty (Thatcher and George, 2004), improves price tolerance (Delgado-Ballester and Munuera-Alemn, 2001), and gains a competitive advantage (Wernerfelt, 1991). Trust is important to every e-vendor because it is a key factor for increased sales and improved market share in online shopping (McKnight and Chervany, 2001; Nielsen et al., 2001).

2.2 Barriers to online trust


There are several new developments that affect trust which impacts e-commerce. These include cybercrime, security, control, web interface, and third party intervention. Each of these issues is explained separately in the following section.

2.2.1 Cybercrime
Cybercrime is an activity that utilises computing and communication technologies as tools to carry out a crime (Smith, 2004). Identity theft and fraud are two main types of cybercrime that affect consumer decisions to shop online (Hoffman et al., 1999a; Taylor Nelson Sofres & TRUSTe, 2005). Identity theft (i.e., stealing information) leads to fraud (Foley et al., 2004), and this causes fear among consumers (Farrell et al., 2000), and discourage them from shopping online (Entrust, 2005). Cybercrime is perceived risk affecting consumer behaviour (Gefen et al., 2003a) on the internet. Since cybercrime affects trust (Farrell et al., 2000), it generates a negative impact on consumer trust and shopping behaviour in e-commerce (Krebsbach, 2006).

372

S. Pittayachawan, M. Singh and B. Corbitt

2.2.2 Security
Security refers to data protection in e-transactions, and is recognised to be a fundamental component in e-commerce (Aldridge et al., 1997; IDC, 2003; Turban et al., 2006). It scrambles text (e.g., e-transactions or financial details) into something unreadable (i.e., an encrypted message) by intruders (e.g., opportunists and criminals) in order to establish secure information exchange. Since scrambled contents generated by security are extremely difficult to decipher, it can deter cybercrime activities (ITU Telecommunication Standardization Sector, 1997; Turban et al., 2006), and thus, foster consumer trust (Farrell et al., 2003; Kini and Choobineh, 1998). McKnight and Chervany (2001) clarify that security makes consumers perceive assurance, helping them to complete transactions without risks. In spite of this, the internet does not naturally support security in online shopping, and subsequently, e-vendors must recognise the importance of security in B2C e-commerce and properly deploy it in their online businesses (Bhimani, 1996). Specifically, four critical aspects of security must be met including authentication (i.e., identities of transacting parties are genuine), confidentiality (i.e., e-transactions are secret to outsiders), integrity (i.e., e-transactions are not compromised) and non-repudiation (i.e., e-transactions are undeniable by relevant parties) in order to establish secure e-transactions (ITU Telecommunication Standardization Sector, 1997). This clearly requires technical knowledge, and thus, it can be notably challenging for e-vendors to correctly utilise security in online shopping. Implementing it wrongly can result in security breaches, and consequently, destroy consumer trust in e-vendors and B2C e-commerce (BBC, 2007; CMO Council, 2006). Several researchers (Chan and Lee, 2003; Gefen et al., 2003b; Lee and Turban, 2001) are of the opinion that security improves trust and intention to shop online. It also helps consumer to trust e-vendors (McKnight and Chervany, 2005). Although Ratnasingam and Phan (2003) state that security is a success factor in e-commerce, Katsikas et al. (2005) argue that security issues need to be further explored in e-commerce.

2.2.3 Control
Control in this paper implies consumers abilities to control, influence, or monitor the online environment and information (Hoffman et al., 1999b; Robles et al., 2001). If control exists, then consumers tend to commit to transactions even if trust is not adequate (Tan and Thoen, 2002). Since a lack of trust and the rise of cybercrime cause consumers to fear e-commerce and to raise concern for the safety of their information, control is recognised as another factor contributing to trust (Yoon, 2002). A lack of control in the online environment create disputes between consumers and e-vendors (Olivero and Lunt, 2004). This is due to the fact that the nature of e-commerce is such that it does not automatically give power to consumers (Yoon, 2002). Therefore, e-vendors must understand what kinds of control should be given to the customers to win their confidence in this environment. Not allowing a consumer to unsubscribe from a mailing list, an e-mail sent to them without consent, inability to change information and inability to close an account (TRUSTe, 2006) are examples of control issues in B2C e-commerce. Silverpop (2006b) suggests that consumers should be able to control content and decide how often they want to receive e-mails about products. Continuously sending e-mails without allowing consumers to unsubscribe from a mailing list generates a

A multitheoretical approach for solving trust problems in B2C e-commerce 373 negative impact on brand reputation and trust (Lee and Turban, 2001; Silverpop, 2006a). Furthermore, spam e-mails are on the rise and more difficult to be detected by anti-spam software, which frequently carry malware, searching and capturing shopping information for cybercriminals (Anti-Phishing Working Group, 2007; Sophos, 2006). This further discourages consumers from shopping online (Taylor Nelson Sofres & TRUSTe, 2005). Hence, it is clear that cybercrime raises the need for more control over e-commerce (Gauzente, 2004).

2.2.4 Web interface


Web interface plays a significant role in e-commerce as it is the first link between a customer and an e-vendor (Fogg et al., 2001). If web interface does not win consumers to believe that e-vendors are trustworthy, then a transaction will not take place (Ang and Lee, 2000). This view is supported by Kini and Choobineh (1998) who recognise that display modes, information of e-vendors and visual effects on the screen are important components of trust. McKnight and Chervany (2001) advocate that site quality, a privacy statement, a trusted seal and links to other websites also support trust and intention to shop online; and Wang and Emurain (2005), are of the opinion that the four dimensions of web interface which enhance trust are graphics, structure, content and social cues. A security and privacy statement, which is categorised as a part of content dimension by Wang and Emurain (2005) is also important in e-commerce. Consumers are concerned about how e-vendors collect and use their information. It is reported that 68% of consumers want e-vendors to disclose where and how their information is being processed (Krebsbach, 2006), and 95% of consumers refuse to provide information if there is no privacy statement (Gauzente, 2004; Hoffman et al., 1999a). It is therefore clear that a security and privacy statement on the website is important information for consumers affecting their decision to shop online. In addition, a security and privacy statement should be written in a way that is easily understood by consumers (Rivest and Lampson, 1996). Therefore, web interface is an important factor affecting shopping intention, trust, security and control.

2.2.5 Third party intervention


A trusted seal is a part of content dimension described by Wang and Emurian (2005). It is a piece of graphics displayed on the front page of shopping websites. Its function is to tell consumers that this e-vendor has been verified, and therefore, it is safe to purchase goods or services from this particular website. A trusted seal has an impact on consumer trust and online shopping behaviour (McKnight and Chervany, 2001). However, a trusted seal is merely a piece of graphics, and it does not contain any trustworthy value. In fact, when consumers trust a seal that is displayed on websites, they trust an identity of the seal issuer and not the seal itself (Sztompka, 2000). An issuer of a trusted seal is commonly known as a Trusted Third Party (TTP). In e-commerce, examples of TTPs are Verisign,1 GeoTrust,2 and TRUSTe.3 Hu et al. (2004) suggest that a trusted seal has a positive impact on consumer trust, and encourages them to purchase products from unknown websites confirming that the e-vendor is genuine. Furthermore, a well-known TTP has been identified to have a greater impact on trust (Peszynski and Thanasankit, 2002).

374

S. Pittayachawan, M. Singh and B. Corbitt

To further understand regarding trust factors in B2C e-commerce, a review of trust models addressing one or more aspects of B2C e-commerce are presented in the following section.

2.3 Previous research on trust models


An analysis of models explaining B2C e-commerce trust is listed in Table 1 from the years 2006 to 2000. Variables addressing trust, impact on B2C e-commerce and limitations of these models are listed in columns 24 of Table 1. Previous studies included in Table 1 addressed some important aspects of trust in B2C e-commerce; however, none of them completely recognised all trust issues (i.e., cybercrime, security, control, web interface and TTP) discussed in this paper. They also placed very little emphasis on e-vendor issues. Without a proper solution to improve trust, the viability of e-commerce is questionable.
Table 1 Study Cheung and Lee (2006) Summary of previous research Variables Legal framework Perceived competence Perceived integrity Perceived privacy control Perceived security control Propensity to trust Third party recognition Kim and Kim (2005) Consumer trust Disposition to trust General self-efficacy Online transaction self-efficacy Perceived risk Pavlou and Gefen (2005) Buyers past experience Perceived effectiveness of institutional structures Perceived risk from community of sellers Price premiums Psychological contract violation Sellers past performance Transaction intentions Trust in community of sellers Koufaris and Hampton-Sosa (2004) Perception about the company Perception about the website Initial trust in company Addressed too few issues Transaction behaviour Too heavily based on psychological issues Purchase intention Too heavily based on consumer skills Impact on B2C e-commerce Consumer trust in internet shopping Limitation(s) Addressed consumer issues, but failed to include web interface and cybercrime

A multitheoretical approach for solving trust problems in B2C e-commerce 375


Table 1 Study Thatcher and George (2004) Summary of previous research (continued) Variables Effect Commitment Satisfaction Social involvement Switching costs Trust in internet Cheung and Liao (2003) Low consumer awareness Negative shopper characteristics Perceived privacy concerns Perceived transaction insecurity Poor perceived e-vendor characteristics Corbitt et al. (2003) Participation in e-commerce Perceived market orientation Perceived risk Perceived site quality Perceived technical trustworthiness Users web experience Corritore et al. (2003) Gefen et al. (2003b) Credibility Ease of use Risk Calculative-based beliefs Perceptions of situation normality Perceptions of structural assurances Familiarity Trust Perceived ease-of-use Perceived usefulness Ratnasingham and Pavlou (2003) Salam et al. (2003) Technology trust Perceived benefits E-commerce performance Economic incentive Institutional trust Consumer-perceived risk of transactions over the internet Technology centric and ignored e-vendors Failed to address trust in e-vendors Intended use of a B2C website Trust Addressed only a narrow perspectives of trust Based on TAM which is technologically oriented. Online trust is not only about technology but also e-vendors Perceived trust Only focused on consumer perception Intentions not to shop over internet Addressed a negative consequence and not useful for e-vendors Impact on B2C e-commerce Web consumer loyalty Limitation(s) Addressed only long-term trust relationship

376
Table 1 Study

S. Pittayachawan, M. Singh and B. Corbitt


Summary of previous research (continued) Variables Perceived business tie Perceived interaction Perceived similarity Trusting beliefs Impact on B2C e-commerce Intention to buy Limitation(s) Addressed trust transitivity without clarification

Stewart (2003)

Suh and Han (2003)

Attitude toward using Behavioural intention to use Perceived strength of control Trust

Actual use

Too heavily based on security, however, trust also involves non-technical variables which this study left out Partially addressed web interface and ignored cybercrime, control and TTP

Belanger et al. (2002)

Pleasure Privacy Security Trustworthiness Web features

Purchase intentions Willingness to give private information

Bhattacherjee (2002) Gefen (2002)

Familiarity Trust Cost to switch vendor Customer trust Perceived risk with vendor Service quality

Willingness to transact Customer loyalty

Not always applicable to B2C e-commerce Too heavily based on service quality and less emphasis on trust

Kimery and McCord (2002)

Attention to assurance seals Attitude toward e-retailer Disposition to trust Perceived risk Trust in e-retailer

Intention to purchase

Too focused on a trusted seal and failed to address trust issues in relation to it

Sultan et al. (2002)

Characteristics of consumer Characteristics of website Perceptions of website trust Navigation functionality Personal variables Transaction security Website awareness Website properties Website satisfaction Website trust

Consumer behavioural intent

Only focused on web interface

Yoon (2002)

On/offline purchase intention

Only focused on security and web interface and failed to address cybercrime, control and TTP

A multitheoretical approach for solving trust problems in B2C e-commerce 377


Table 1 Study Lee and Turban (2001) Summary of previous research (continued) Variables Trustworthiness of internet merchant Trustworthiness of internet shopping medium Contextual factors Other factors McKnight and Chervany (2001) Disposition to trust Institution-based trust Trusting beliefs Trusting intention Web vendor interventions Chau et al. (2000) Attitude towards online purchasing Perceived website ease-of-use Perceived website usefulness Grazioli and Jarvenpaa (2000) Assurance mechanisms Attitude toward shopping at the store Deception Risk Trust Trust mechanisms Jarvenpaa et al. (2000) Attitude Perceived reputation Perceived size Risk perception Trust in store Willingness to buy Only addressed trust in websites and neglected trust in e-vendors Actual purchase and willingness to buy Partially addressed web interface but failed to address security, control and TTP Online purchase intention Too heavily based on consumer attitudes Trust-related internet behaviour Failed to address cybercrime Impact on B2C e-commerce Consumer trust in internet shopping Limitation(s) Too heavily based on consumer perception of trust

2.4 Supportive theories


Four theories, Semiotics (Chandler, 2002), Trust in Signs (Bacharach and Gambetta, 2001), Simmelian Model of Trust (Mllering, 2001) and Trustworthiness (Hardin, 1996) are used to guide the development of research model proposed in this paper. Each of these theories is briefly discussed in the following section. Semiotics (Chandler, 2002) or semiology is the study of signs. It describes how one (i.e., interpretant) perceives something (i.e., representamen), and then refers to it as something else (i.e., object) based on ones belief, as shown in Figure 1. Although its focus is not directly about trust but perception, it is heavily based on belief, which is a very important component of trust. Therefore, it is adopted to explain the perception process and how the perception links to what it is perceived and what it is meant

378

S. Pittayachawan, M. Singh and B. Corbitt

to a person that perceives. For example, Alice (i.e., interpretant) perceives a lock sign (i.e., representamen) on her web browser while shopping online, and then refers to it as security (i.e., object).
Figure 1 A semiotic triangle

Representamen (Lock sign)

Object (Security)

Interpretant (Alice)

Sources: Adapted from Chandler (2002, p.32) and Echtner (1999, p.48)

Trust in Signs (Bacharach and Gambetta, 2001) is a theory that explains how one trusts others based on a hidden property (i.e., krypta), which is translated from the targets appearance (i.e., manifesta), as shown in Figure 2. For example, during shopping online, Alice knows that there is encryption (i.e., krypta) supporting e-commerce websites because she sees a lock sign (i.e., manifesta) on her web browser.
Figure 2 Trust in signs (see online version for colours)
Trustee (person or thing)

(Lock sign) Manifesta (observable property)

(Encryption) Krypta (unobservable property)

Trustor (Alice)

Source: Adapted from Bacharach and Gambetta (2001)

Simmelian Model of Trust (Mllering, 2001) is a theory explaining three-step process of trust. These steps are interpretation, suspension and expectation, as shown in Figure 3. Interpretation signifies the process when one perceives something and interprets it into something else based on incomplete knowledge. No one is able to know and understand everything (Weber, 1913), and subsequently, interpretation always contains

A multitheoretical approach for solving trust problems in B2C e-commerce 379 uncertainty. According to Mllerings (2001) discussion on the work of Simmel (1964) regarding the three-step process of trust, suspension signifies the process when one must ignore uncertainty in interpretation, because one does not have complete knowledge or information about what one perceives. By ignoring uncertainty, interpretation is temporarily valid. Expectation signifies the process when one expects that the interpretation is correct and suspension is the right thing to do. The outcome after these three steps is either trust or distrust. For example, Alice interprets a lock sign as security even though she does not understand anything at all about cryptography. The lack of knowledge about cryptography causes uncertainty in her interpretation. What if her interpretation is wrong? In order to trust or distrust, she must ignore this uncertainty by believing her interpretation to be correct or incorrect. For the outcome to be trust, she must believe that her interpretation is correct, and ignore any thought about her interpretation being wrong. She then expects that the interpretation and suspension are correct, and therefore, she trusts a lock sign as security.
Figure 3 Simmelian model of trust (see online version for colours)
Hm I might be wrong, but I dont care about cryptography or how secure it is. Well, I believe it is secure after all.

I believe a lock sign means security though I have no idea about cryptography at all.

Interpretation

Suspension

Expectation

I trust a lock sign is security that will protect my transaction.

Outcome Knowledge (Lock sign) (Security) Uncertainty (Cryptography)

Source: Adapted from Mllering (2001)

Trustworthiness is a theory that represents perceived value of someone or something about how trustworthy they are. According to Hardin (1996) trustworthiness is the main component in trust, because trustworthiness must be perceived before one can either trust or distrust, as shown in Figure 4. Others (Blois, 1999; Philips, 1996) also agree that unless one demonstrates ones trustworthiness to another party, it is impossible for one to establish trust (Jones, 2002; Lewis and Weigert, 1985). To explain Hardins theory; Alice is shopping from two websites. She notices that one website has a digital certificate signed by a known TTP, because a lock sign appears without any pop-up warning message. Another shopping website also has a digital certificate, but it is signed by an unknown TTP, and a lock sign appears with a pop-up warning message. Based on her knowledge, the second website might be fraudulent since it is verified by an unknown TTP. Accordingly, she decides to purchase from the first one. Alices decision may sound simple but is it logical?

380
Figure 4

S. Pittayachawan, M. Singh and B. Corbitt


Trustworthiness (see online version for colours)

A digital certificate is valid. Should I trust?

Trustee (E-vendor)

Trustor (Alice)

Trustworthiness (Digital certificate )

Source: Adapted from Hardin (1996)

Although each of the above theories provides useful insights into trust or perception, none of them completely address all issues. Semiotics does not explain trust at all. It only focuses on perception (i.e., interpretant, representamen, and object). Trust in Signs only explains how one perceives a physical sign and interprets it. It does not describe how trust is established. Simmelian Model of Trust explains the trust processes without adequate detail. Trustworthiness only explains two core components trustworthiness and trust. It does not clarify how trust is developed and what is involved. Therefore, to address trust issues from the consumer and the e-vendor points of view, the above four theories are integrated to guide the study discussed in this paper. Firstly, representamen from Semiotics and manifesta from Trust in Signs are merged because they share similar definitions. While the scope of representamen covers everything that can be perceived as a sign (i.e., physical or imaginable things), manifesta only focuses on physical characteristics. Hence, in Figure 5, representamen (i.e., a sign) leads to krypta (i.e., a hidden property).
Figure 5 An integrated supportive theory (with an example)
(Correct/Incorrect) (Cryptography) Krypta
Su sp en

Uncertainty

(Lock sign) Representamen Triad of Trust


Pe tio ep rc

In t

erp re ta

si on

tio n

Triad of Trustworthiness Object (Security) Interpretant Expectation (Trust/Distrust) (Alice)

A multitheoretical approach for solving trust problems in B2C e-commerce 381 Secondly, three-step process of trust (i.e., interpretation, suspension and expectation) from Simmelian Model of Trust is integrated to establish the relationships between representamen, krypta and object. As shown in Figure 5, interpretation points from interpretant to krypta indicating that a person interprets a representamen to be krypta. Since there is always uncertainty in interpretation, the arrow pointing from representamen to krypta is labelled as uncertainty, which signifies that the representamen may not have the krypta as it is interpreted by interpretant. Also, Suspension points to uncertainty because interpretant needs to ignore uncertainty for the relationship between representamen and krypta temporarily being certain. Expectation points from interpretant to object signifying that interpretant expects interpretation to be true and suspension to be correct. In other words, by perceiving representamen, interpreting it into krypta, and suspending uncertainty, interpretant expects that representamen and krypta lead to the correct object. Thirdly, the integration of three theories Semiotics, Trust in Signs and Simmelian Model of Trust forms two triads of trustworthiness and trust. With the theory of trustworthiness explained by Hardin (1996), these two triads can be seen as two concepts. The triad of trustworthiness clarifies how trustworthiness is established, and the triad of trust explains how trust is developed. According to Hardin (1996) since trust is more visible than trustworthiness, triad of trust is drawn with a continuous line while trustworthiness is drawn with a dashed line in Figure 5. These two triads are closely connected together illustrating the trustworthiness theory of Hardin (1996), which states that, in order to improve trust, one must improves trustworthiness. To illustrate Figure 5 as a representation of trust in B2C e-commerce, Alice (i.e., interpretant) looks for something that can be referred to as security (i.e., object) before making a transaction. She perceives that there is the lock sign (i.e., representamen) on her web browser as soon as the front page of a shopping website is loaded. Based on her knowledge (i.e., interpretant), she interprets that the lock sign means encryption (i.e., krypta), but also is aware that the lock sign on the screen might not be genuine due to fraudulent websites (i.e., uncertainty). However, in order to make a decision to shop, she must ignore (i.e., suspension) this uncertainty and believe that the lock sign is legitimate or fraudulent. Presumably, based on her personality (i.e., interpretant) she believes that the lock sign is legitimate, and thus believes that her perception, interpretation and suspension is correct (i.e., expectation). Therefore, she trusts that the lock sign leads to security. Conversely, if she interprets that the lock sign is not legitimate, then her interpretation leads to insecurity, and therefore, the result is that she distrusts the lock sign. To accomplish the research discussed in this paper, relevant variables (i.e., cybercrime, security, control, web interface, and TTP), which impact trust in online shopping were identified from the literature. However, addressing all the issues in Figure 5 was beyond the scope of this research. Therefore, in answering the research question which factor is perceived to be trustworthy by a consumer when shopping online only representamen is the focus of this study.

382

S. Pittayachawan, M. Singh and B. Corbitt

Research propositions and model

From a review of relevant literature, 21 propositions (including subpropositions) were established to address representamen in relation to trust in online business: P1 P2 Trust will positively affect consumer intention to shop online. Cybercrime will negatively affect consumer trust. P2a P2b P3 P4 Cybercrime will negatively affect consumer trust in e-transactions. Cybercrime will negatively affect consumer trust in e-commerce websites.

Cybercrime will negatively affect consumer intention to shop online. Security will positively affect consumer trust. P4a P4b P4c Security will positively affect consumer trust in e-transactions. Security will positively affect consumer trust in e-vendors. Security will positively affect consumer trust in e-commerce websites.

P5 P6

Security will positively affect consumer intention to shop online. Cybercrime will positively affect the need for control. P6a P6b Cybercrime will positively affect the need for online environment control. Cybercrime will positively affect the need for information control.

P7 P8 P9

Control will positively affect consumer trust in e-vendors. Web interface will positively affect consumer intention to shop online. Web interface will positively affect consumer trust. P9a P9b Web interface will positively affect consumer trust in e-vendors. Web interface will positively affect consumer trust in e-commerce websites.

P10 Web interface will positively affect security. P11 Web interface will positively affect control. P12 A TTP will positively impact web interface.

A multitheoretical approach for solving trust problems in B2C e-commerce 383 Figure 6 shows the proposed research model including the 21 propositions. There are five representamens (i.e., cybercrime, security, control, web interface, and TTP) perceived by consumers according to the literature review. All these representamens directly affect trust either positively or negatively, and also impact one another.
Figure 6 The research model (see online version for colours)

Representamens P8(+) Web Interface y Graphics y Structure y Content y Social-cue P10(+) Security P9(+) P11(+) Control y Environment y Information P7(+) Trust y E-transaction y E-vendor y Website Intention to Shop Online P5(+) P4(+)

Trusted Third Party

P12(+)

P1(+)

P6(+) Cybercrime y Identity theft y Fraud P2() P3()

Research method

The study was undertaken via an online survey with consumers to establish their perceptions of trust in B2C e-commerce. The advantages of online survey are fast, convenient, access to online consumers worldwide, ability to obtain a response to every question and easy to transfer responses from a database to statistical software (Corbitt et al., 2003; Singh and Burgess, 2007; Singh and Byrne, 2005). The questionnaire was firstly developed with Microsoft Word to focus on creating each question carefully. The questionnaire was divided into two sections. The first section contains a question directed to online shopping experience on a categorical scale. Respondents were asked about their online experiences to ensure that they were real online shoppers. The second section consisted of 65 questions to establish trust issues in online shopping on a 5-point Likert scale, based on the research propositions and literature. The questionnaire was then rewritten in formats of Extensible Hypertext Markup Language (XHTML) and Cascading Style Sheet (CSS) to ensure compatibility with popular web browsers such as Microsoft Internet Explorer and Mozilla Firefox. It was developed with Notepad to minimise loading time of online questionnaire. XHTML and CSS code of questionnaire was validated with World Wide Web Consortium (W3C) online validators to ensure that it complied with the standards. The online questionnaire was presented in a single page to provide for simple navigation. The respondents provided answers by clicking on radio buttons and hitting a SUBMIT button upon completion. Questionnaire responses were transmitted to a database created in MySQL format, which was hosted by RMIT University. A server supported a secure connection to guarantee privacy of respondents. The online questionnaire was then pilot tested with academics and students at RMIT University.

384

S. Pittayachawan, M. Singh and B. Corbitt

University students, graduates and faculties are likely to shop online more than other population (Canadian Internet Project, 2005; Cheeseman Day et al., 2003; Dessewffy et al., 2003; Findahl, 2003; Research Center for Social Development, 2005), and therefore, 22 universities across the globe were contacted to participate in this survey. In addition, since all these participants were educated, it was assumed that they were familiar with internet technology and e-commerce issues. Of these, 19 universities agreed to participate in the survey from which 540 valid responses were generated and stored in a MySQL database. The survey data were then imported and collated in SPSS.

4.1 Data analysis


SEM was used to analyse the survey data based on Byrne (2001) and Hoyles (1995) opinions that: It validates the relationship between two variables while taking effects of other variables into account. It is suitable for a causal relationship. It shows the accuracy of results by evaluating the measurement error.

Owing to the fact that some propositions did not have enough data to be analysed with SEM, five propositions were not tested. Dropping these did not affect the objective of this research, which is to establish a trust model, and not an intention model. For SEM, two-step approach analysis suggested by Anderson and Gerbing (1988) was performed. Firstly, an Exploratory Factor Analysis (EFA) was completed with the use of SPSS. Then, a Confirmatory Factor Analysis (CFA) was carried out with Analysis of Moment Structures (AMOS), which is a software developed especially for SEM (Byrne, 2001; Hair et al., 2006). Kaiser-Meyer-Olkin (KMO) and Bartletts test were used to determine collated data was adequate to be analysed with EFA. The value of KMO was .913 and Bartletts test was p = .000. According to Hair et al. (2006) and Brace et al. (2006), KMO > .8 means that the data is meritorious, and p < .05 indicates that the data is suitable for analysing with EFA. Based on EFA, the data was extracted with Maximum Likelihood (ML) and rotated with oblimin in order to examine the data dimensionality and to develop a measurement model. A combination of two tests Eigenvalues (>1) and scree plot generated by EFA were used to justify the number of extracted factors (i.e., a group of similar items) from the data. Subsequently, eight factors were extracted with 57% variance. These were Trust, Security, Control, Fraud, Privacy, Design-V, Design-W and Warranty, presented in Figure 7. Cronbachs was used to assess the reliability of each factor, results of which are presented in column 3 of Table 3. Nunnally (1978) recommends that the value of Cronbachs higher than .7 indicates a good reliability suggesting that all factors in this analysis are reliable. These eight factors were then put together according to the research model (Figure 6) in order to establish the measurement model (Figure 7), which was used for CFA analysis.

A multitheoretical approach for solving trust problems in B2C e-commerce 385


Figure 7 The measurement model generated by EFA (see online version for colours)
Design-V Security

Design-W

Warranty

Trust

Fraud

Privacy

Control

According to AMOS, the survey data is not multivariate normally distributed. Therefore, bootstrapping with Maximum Likelihood (ML) was used to assess the measurement model. Bootstrapping is a statistical technique that allows the model to be assessed under the condition multivariate normal distribution (Byrne, 2001). Row 2 of Table 2 indicates the goodness-of-fit values of measurement model. By comparing this result with the requirements of goodness-of-fit values (Row 4 of Table 2), the model is moderately supported.
Table 2 Model Original Modified Requirement The goodness-of-fit values

2 (bootstrap)
1455.808 307.733 = df
2

df 1156 253 >0

2/df
1.259 1.216 <2

p (bootstrap) .002 .002 > .05

RMSEA .073 .045 < .05

IFI .798 .957 > .9

CFI .797 .957 > .9

The measurement model (Figure 7) was then modified based on Modification Indices (MI) generated with AMOS that indicated which items can be dropped from the analysis. The model was carefully rectified by dropping one item at a time. The model modification was also thoroughly revised to ensure theoretical sense. The goodness-of-fit values were improved, as shown in Row 3 of Table 2. Although the requirement of p value is >.05, our model obtained p < .002. The p value can be inaccurate with a higher number of sample (Byrne, 2001), and therefore, other goodness-of-fit values must be used to justify validity. Based on the values of 2/df, RMSEA, IFI and CFI presented in Table 2, this research model is well supported by the SEM analysis. Column 4 of Table 3 shows that the reliability of each factor after dropping a few items still hold a high reliability factor (>.7).

386
Table 3 Factor Trust Fraud Privacy Security Control

S. Pittayachawan, M. Singh and B. Corbitt


Factor reliabilities Reliability (before EFA) .841 .840 (Cybercrime) .886 .872 .954 (Web Interface) Reliability (after EFA) .841 .894 .798 .886 .872 .926 .887 .897 Reliability (after CFA) .841 .876 .802 .886 .807 .873 .741 .744

Design-W Design-V Warranty

Discussion

It is evident from column 2 of Table 3 that, by exploring the dimensionality in the survey data with EFA, the findings reveal that two factors (i.e., Cybercrime and Web Interface) are multidimensional: 1 Cybercrime, in the viewpoint of consumers, appears to contain two factors Fraud and Privacy. Furthermore, the correlation between these two factors is extremely low (.102), which indicates two different types of problems in cybercrime. This finding is different from the literature review (Anti-Phishing Working Group, 2007; Federal Trade Commission, 2007), which indicates three issues of cybercrime (identity theft, fraud and privacy). The implication from this research finding is that consumers perceive identity theft associated with fraud, and privacy to be a separate factor. Regarding Web Interface, consumers also see two different issues, which are design/functionality (Design-V and Design-W) and credibility/assurance (Warranty). The difference between Design-V and Design-W is that, the former factor contains items used to validate the relationship between web interface and trust in e-vendors while the latter factor contains items used to validate the relationship between web interface and trust in shopping websites. Warranty contains items related to a trusted seal, a security and privacy statement and information credibility. Regardless of their differences, the findings show moderate correlation between Design-V, Design-W and Warranty (>.4). A possible explanation for this is that even though design/functionality and credibility/assurance are different issues, consumers still observe these issues from the same source, which is the web interface.

To establish trust issues in a greater depth, propositions 2, 4 and 6 presented in Table 4 were tested in groups of two or three based on how closely they were related. Particularly, they are the subpropositions established to address the same issues. The findings of the study presented in Figure 8 indicate the following regarding trust in B2C e-commerce: Privacy and security are most important issues in consumer trust. The regression weight values of .225 (Privacy Trust) and .192 (Security Trust) indicate their impact on trust to be higher than the impact of other factors. The p values < .005

A multitheoretical approach for solving trust problems in B2C e-commerce 387 show that this is significant. This finding confirms the opinions of Belanger et al. (2002) that privacy and security are important factors for winning consumer trust in online business. Web design (Design-V Trust = .170) and control (Control Trust = .162) together impact trust. Data analysis also reveals that web design (Design-V Security = .161) impacts security which then affects trust. It is also evident that privacy (Privacy Control = .369) impacts control which affects trust. This finding supports the views of Wang and Emurian (2005) and Olivero and Lunt (2004) that web interface and control are important components fostering consumer trust. Warranty impacts security (Warranty Security = .202) and control (Warranty Control = .275). A trusted seal, a security and privacy statement and credible information help consumers perceive a greater security and control which lead to trust in the B2C e-commerce. Identity theft and fraud (Fraud Security = .172) have negative impact on security. This finding is similar to the view that customers perceive less security if their information has been compromised (CMO Council, 2006; Taylor Nelson Sofres & TRUSTe, 2005). A likely outcome of this is that the consumer will not commit to a purchase in such circumstances.
Summary of tested propositions Relationship Fraud Trust Privacy Trust 4a + 4b + 4c 6a + 6b Security Trust Fraud Control Privacy Control 7 9a Control Trust Design-V Trust Warranty Trust 9b Design-W Trust Warranty Trust 10 Design-V Security Design-W Security Warranty Security 11 Design-V Control Design-W Control Warranty Control Result Not supported Supported Supported Not supported Supported Supported Supported Not supported Not supported Not supported Supported Not supported Supported Not supported Not supported Supported

Table 4 Propositions 2a + 2b

388
Figure 8

S. Pittayachawan, M. Singh and B. Corbitt


Standardised bootstrapping ML estimates (see online version for colours)

Design-V

.161 * .170 * n.s.

Security

.683 **** n.s. .540 **** .192 **** n.s. n.s. .630 **** .202 **

.289 ****

Design-W

Warranty
.275 *** .172 ****

n.s.

Trust

n.s. .192 ****

Fraud
n.s. .138 ** .225 **** .162 **

* p < .1 ** p < .05 *** p < .01 **** p < .005 n.s. p > .1

Privacy

.369 ****

Control

Applying the findings discussed above to a B2C e-consumer: Alice will look for privacy and security on the shopping website. Privacy will tell Alice how her information will be protected by an e-vendor, and security will ensure secure transaction. She will then explore web design and determine legitimacy of the e-vendor, and also look for controls that will protect her information from further use either for marketing or by other online sellers. Warranty such as a trusted seal will further enhance Alices trust on the e-vendor. However, before committing to a purchase, Alice will also explore the existence of identity theft and fraud problems with this e-vendor. Perhaps, she will ask her friends who are knowledgeable about security and risks in online shopping, or search e-commerce news on the internet. For instance, E-commerce Times4 that is an online e-commerce newspaper reports security breach issues in a daily basis. If Alice finds that the database containing millions of credit card numbers kept by this e-vendor has a history of getting hacked and there is no evidence of any security improvement, this will negatively impact security and then trust on this particular e-vendor.

Implication

This paper suggests that the four theories (i.e., Semiotics, Trust in Signs, Simmelian Model of Trust and Trustworthiness) are a good guide to address trust problems in B2C e-commerce. They helped answering the question what factors impact consumer trust in B2C e-commerce. The scope of this research allowed us to focus on trust from the e-vendors point of view. Based on the findings in this paper, it is suggested that an e-vendor should focus on addressing privacy (e.g., information and spam e-mails) and security (e.g., secure connection) since they have most impact on trust than other factors. After that, web design (e.g., functionality and ease of use) and control (e.g., consumer consents and monitor) should be considered to foster greater trust. Although warranty (e.g., a trusted

A multitheoretical approach for solving trust problems in B2C e-commerce 389 seal and a security and privacy statement) does not have any direct impact on trust, it improves consumers perceptions of security and control. Lastly, an e-vendor should avoid having any negative history regarding identity theft and fraud (e.g., credit card detail is stolen via database hacking), because these indicate to consumers that security used by an e-vendor is inadequate. Particularly, with the internet, consumers can easily search for news, consumer comments and feedback, and e-commerce review websites regarding e-vendors and their websites. In addition, they may ask their friends who are well-informed about security breaches in online shopping.

Limitations

The results presented in this paper are still in a preliminary stage of analysis, and the research is in progress. The goodness-of-fit values indicate that the model is well supported, and therefore, it indicates high construct validity of the research model. However, discriminant validity is still the problem of this model, because Design-V, Design-W and Warrantee are moderately correlated with one another at the values of higher than .540. In addition, the findings reveal that Design-W is statistically insignificant. In order to improve the model parsimony, this factor must be taken off and the model must be reanalysed (Hair et al., 2006). It is expected that the p values of each regression path may be changed due to the absence of this factor, and the conclusion for each relationship (i.e., regression weight values) may also be different from this paper. Therefore, the reader should use the findings with caution.

Conclusion

Trust is widely addressed as an important issue in B2C e-commerce. This research identified important trust issues that e-vendors can implement to enhance trust. The findings of this study include consumer issues analysed statistically to identify trust issues pertinent for all e-vendors. This paper reports that, by addressing trust issues from multiple angles including privacy, security, web design, control, warranty and fraud, e-vendors are able to win consumer confidence and enhance B2C e-commerce. Since this paper aims to propose a trust model, the relationships between the representamens (i.e., cybercrime, security, control, web interface, and TTP) and intention to shop online were not investigated. It is not known how these representamens affect intention to shop online, and therefore, further research is required to validate the proposed model with this factor. The in-depth study of how consumer personality and knowledge affect perception (i.e., exploration of interpretant) and what representamens are interpreted into (i.e., exploration of object) are also other possible new directions of the research.

390

S. Pittayachawan, M. Singh and B. Corbitt

References
Akhter, F., Hobbs, D. and Maamar, Z. (2004) Determining the factors which engender customer trust in Business-to-Consumer (B2C) electronic commerce, proceedings of the IEEE International Conference on E-commerce Technology, IEEE, San Diego, California, USA, 69 July, pp.291294. Aldridge, A., White, M. and Forcht, K. (1997) Security considerations of doing business via the internet: cautions to be considered, Internet Research: Electronic Networking Applications and Policy, Vol. 7, No. 1, pp.915. Anderson, J.C. and Gerbing, D.W. (1988) Structural equation modeling in practice: a review and recommended two-step approach, Psychological Bulletin, Vol. 103, No. 3, pp.411423. Ang, L. and Lee, B-C. (2000) Influencing perceptions of trustworthiness in internet commerce: a rational choice framework, Proceedings of the 5th Collaborative Electronic Commerce Technology and Research (CollECTer) Conference, Brisbane, QLD, Australia, pp.112. Anti-Phishing Working Group (2007) APWG Phishing trends reports, Anti-Phishing Working Group, http://www.antiphishing.org/phishReportsArchive.html (viewed 2 April 2007). Antoci, A., Galeotti, M., Russu, P. and Zarri, L. (2006) Generalized trust and sustainable coexistence between socially responsible firms and nonprofit organizations, Chaos, Solitons & Fractals, Vol. 29, No. 3, pp.783802. Bacharach, M. and Gambetta, D. (2001) Trust in signs, in K.S. Cook (Ed.) Trust in Society, New York: Russell Sage Foundation, pp.148184. BBC (2007) Consumers shun hacked stores, BBC News, 17 April (Technology section). Belanger, F., Hiller, J.S. and Smith, W.J. (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, Journal of Strategic Information Systems, Vol. 11, Nos. 34, pp.245270. Bhattacherjee, A. (2002) Individual trust in online firms: scale development and initial trust, Journal of Management Information Systems, Vol. 19, No. 1, pp.211241. Bhimani, A. (1996) Securing the commercial internet, Communications of the ACM, Vol. 39, No. 6, pp.2935. Blois, K.J. (1999) Trust in business to business relationships: an evaluation of its status, Journal of Management Studies, Vol. 36, No. 2, pp.197215. Brace, N., Kemp, R. and Snelgar, R. (2006) SPSS for Psychologists, 3rd ed., New York: Palgrave Macmillan. Bryant, A. and Colledge, B. (2002) Trust in electronic commerce business relationships, Journal of Electronic Commerce Research, Vol. 3, No. 2, pp.3239. Byrne, B.M. (2001) Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming, Mahwah: Lawrence Erlbaum Associates, Inc. Canadian Internet Project (2005) Canada online: a comparative analysis of internet users and non-users in Canada and the world: behaviour, attitudes and trends 2004, Canadian Internet Project, Toronto, October, http://www.cipic.ca/en/documents/Canada%20Online%20Final% 20English%20Version%2010302005.pdf. Chan, J.K.Y. and Lee, M.K.O. (2003) SME e-procurement adoption in Hong Kong the roles of power, trust and value, Proceedings of the 36th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, USA, 69 January, pp.179188. Chandler, D. (2002) Semiotics: The Basics, London: Routledge. Chau, P.Y.K., Au, G. and Tam, K.Y. (2000) Impact of information presentation modes on online shopping: an empirical evaluation of a broadband interactive shopping service, Journal of Organisational Computing and Electronic Commerce, Vol. 10, No. 1, pp.122. Cheeseman Day, J., Janus, A. and Davis, J. (2003) Computer and internet use in the United States: 2003, U.S. Census Bureau, October, http://www.census.gov/prod/2005pubs/p23-208.pdf.

A multitheoretical approach for solving trust problems in B2C e-commerce 391


Cheung, C.M.K. and Lee, M.K.O. (2006) Understanding consumer trust in internet shopping: a multidisciplinary approach, Journal of American Society for Information Science and Technology, Vol. 57, No. 4, pp.479492. Cheung, M.T. and Liao, Z. (2003) Supply-side hurdles in internet B2C e-commerce: an empirical investigation, IEEE Transactions on Engineering Management, Vol. 50, No. 4, pp.458469. CMO Council (2006) Secure the trust of your brand, CMO Council, Palo Alto, http://www.cmocouncil.org/General%20PDF/SecureTrustConsumerReport.pdf. comScore (2006) Tesco captures four times more online orders than closest competitor during first seven months of 2006, comScore Networks, Reston, 22 August, http://www.comscore.com/ press/release.asp?press=986. Corbitt, B.J., Thanasankit, T. and Yi, H. (2003) Trust and e-commerce: a study of consumer perceptions, Electronic Commerce Research and Applications, Vol. 2, No. 3, pp.203215. Corritore, C.L., Kracher, B. and Wiedenbeck, S. (2003) On-line trust: concepts, evolving themes, a model, International Journal of HumanComputer Studies, Vol. 58, No. 6, pp.737758. Daughtrey, T. (2001) Costs of trust for e-business, Quality Progress, pp.3843. Delgado-Ballester, E. and Munuera-Alemn, J.L. (2001) Brand trust in the context of consumer loyalty, European Journal of Marketing, Vol. 35, Nos. 1112, pp.12381258. Dessewffy, T., Fbin, Z., Galcz, A., Gayer, Z., Medgyesi, M., Rt, Z., et al. (2003) Mapping the digital future: Hungarian society and the internet, Information Society and Trend Research Institute, http://www.worldinternetproject.net/publishedarchive/a687.pdf. Echtner, C.M. (1999) The semiotic paradigm: implications for tourism research, Tourism Management, Vol. 20, No. 1, pp.4757. Entrust (2005) Consumer perspectives of online banking security: entrust internet security survey, Entrust, Addison, October, http://www.entrust.com/resources/download.cfm/22314/ Entrust_Survey_1005_web.pdf?inline=false. Farrell, V., Leung, Y. and Farrell, G. (2000) A study on consumer fears and trust in internet based electronic commerce, Proceedings of the 13th International Bled Electronic Commerce Conference, Bled, Slovenia, 1921 June, pp.119. Farrell, V., Scheepers, R. and Joyce, P. (2003) Models of trust in business-to-consumer electronic commerce, in K.V. Andersen, S. Elliot, P. Swatman, E. Trauth and N. Bjrn-Andersen (Eds.) Seeking Success in E-business: A Multidisciplinary Approach, London: Kluwer Academic Publishers, pp.5167. Federal Trade Commission (2007) Consumer fraud and identity theft complaint data: JanuaryDecember 2006, Federal Trade Commission, Washington, February, http://www .consumer.gov/sentinel/pubs/Top10Fraud2006.pdf. Findahl, O. (2003) Swedes and the internet year 2003, World Internet Institute, Hudiksvall, http://www.worldinternetproject.net/publishedarchive/SwedenInternet2003.pdf. Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., et al. (2001) What makes web sites credible?: A report on a large quantitative study, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Seattle, WA: ACM Press, pp.6168. Foley, L., Foley, J., Hoffman, S.K., McGinley, T.G., Barney, K., Nelson, C., et al. (2004) Identity theft: the aftermath 2004, San Diego, http://www.idtheftcenter.org/aftermath2004.pdf. Gauzente, C. (2004) Web merchants privacy and security statements: how reassuring are they for consumers? a two-sided approach, Journal of Electronic Commerce Research, Vol. 5, No. 3, pp.181198. Gefen, D. (2002) Customer loyalty in e-commerce, Journal of the Association for Information Systems, Vol. 3, pp.2751. Gefen, D., Karahanna, E. and Straub, D.W. (2003a) Trust and TAM in online shopping: an integrated model, MIS Quarterly, Vol. 27, No. 1.

392

S. Pittayachawan, M. Singh and B. Corbitt

Gefen, D., Srinivasan Rao, V. and Tractinsky, N. (2003b) The conceptualization of trust, risk and their relationship in electronic commerce: the need for clarifications, Proceedings of the 36th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, 69 January, pp.192201. Grazioli, S. and Jarvenpaa, S.L. (2000) Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers, IEEE Transactions on System, Man, and Cybernetics Part A: Systems and Humans, Vol. 30, No. 4, pp.395410. Hair, J.F., Jr., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L. (2006) Multivariate Data Analysis, 6th ed., Upper Saddle River: Pearson Education, Inc. Hardin, R. (1996) Trustworthiness, Ethics, Vol. 107, No. 1, pp.2642. Hardin, R. (2002) Trust and Trustworthiness, Russell Sage Foundation. Hoffman, D.L., Novak, T.P. and Peralta, M. (1999a) Building consumer trust online, Communications of the ACM, Vol. 43, No. 4, pp.8085. Hoffman, D.L., Novak, T.P. and Peralta, M. (1999b) Information privacy in the marketspace: implications for the commercial uses of anonymity on the web, The Information Society, Vol. 15, No. 2, pp.129140. Hoyle, R.H. (1995) Structural Equation Modeling: Concepts, Issues, and Applications, Thousand Oaks: SAGE Publications, Inc. Hsiung, H., Scheurich, S. and Ferrante, F. (2001) Bridging e-business and added trust: keys to e-business growth, IT Professional, Vol. 3, No. 2, pp.4145. Hu, X., Lin, Z. and Zhang, H. (2004) Myth or reality: effect of trust-promoting seals in electronic markets, in O. Petrovic, M. Ksela, M. Fallenbck and C. Kittl (Eds.) Trust in Network Economy, Springer, pp.143150. IDC (2003) Security, continuity top IT spending priorities, PrintOnDemand, Framingham, 25 September, http://www.printondemand.com/MT/archives/001335.html. ITU Telecommunication Standardization Sector (1997) Information technology open systems interconnection the directory: authentication framework, Recommendation X.509, International Telecommunication Union. Jarvenpaa, S.L., Tractinsky, N. and Vitale, M. (2000) Consumer trust in an internet store, Internet Technology and Management, Vol. 1, Nos. 12, pp.4571. Jones, A.J.I. (2002) On the concept of trust, Decision Support Systems, Vol. 33, No. 3, pp.225232. Jutla, D.N., Kelloway, E.K. and Saifi, S. (2004) Evaluation of user intervention mechanisms for privacy on SME online trust, Proceedings of the IEEE International Conference on E-Commerce Technology, IEEE, San Diego, California, 69 July, pp.281288. Katsikas, S.K., Lopez, J. and Pernul, G. (2005) Trust, privacy and security in e-business: requirements and solutions, Proceedings of the 10th Panhellenic Conference on Informatics, Volos, Greece: Springer, November, pp.548558. Keen, P.G.W. (1997) Are you ready for trust economy, Computerworld, Vol. 31, No. 16, p.80. Kim, Y.H. and Kim, D.J. (2005) A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction, Proceedings of the 38th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, USA, 36 January. Kimery, K.M. and McCord, M. (2002) Third-party assurances: the road to trust in online retailing, Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE, Waikoloa, Hawaii, 710 January. Kini, A. and Choobineh, J. (1998) Trust in electronic commerce: definition and theoretical considerations, Proceedings of the 31st Hawaii International Conference on System Sciences, IEEE, Kohala Coast, Hawaii, 69 January, pp.5161. Koufaris, M. and Hampton-Sosa, W. (2004) The development of initial trust in an online company by new customers, Information & Management, Vol. 41, No. 3, pp.377397. Krebsbach, K. (2006) As data-breach fears grow, banks need to inspire calm, U.S. Banker.

A multitheoretical approach for solving trust problems in B2C e-commerce 393


Lederer, A.L., Mirchandani, D.A. and Sims, K. (2000) Electronic commerce: a strategic application? Proceedings of the 1996 ACM SIGCPR/SIGMIS Conference on Computer Personnel Research, Denver, CO: ACM Press, pp.277287. Lee, M.K.O. and Turban, E. (2001) A trust model for consumer internet shopping, International Journal of Electronic Commerce, Vol. 6, No. 1, pp.7591. Lewis, J.D. and Weigert, A. (1985) Trust as a social reality, Social Forces, Vol. 63, No. 4, pp.967985. Lovett, J. (2003) How site performance shapes consumer behaviors, attitudes, Gomez, Lexington, November, http://www.gomez.com/performance_strategies/white_papers/how_site _performance_shapes_consumer_behaviors.html. McGann, R. (2004) Online holiday purchases to grow despite growing security concerns, ClickZ Stats, 30 November, http://www.clickz.com/showPage.html?page=3440061. McKnight, D.H. and Chervany, N.L. (2001) Conceptualizing trust: a typology and e-commerce customer relationships model, Proceedings of the 34th Hawaii International Conference on System Sciences, IEEE, Maui, Hawaii, 36 January. McKnight, D.H. and Chervany, N.L. (2005) What builds system troubleshooter trust the best: experiential or non-experiential factors?, Information Resources Management Journal, Vol. 18, No. 3, pp.3249. Miniwatts (2006) Internet growth statistics, Miniwatts Marketing Group, 9 September, http://www.internetworldstats.com/emarketing.htm. Mllering, G. (2001) The nature of trust: from Georg Simmel to a theory of expectation, interpretation and suspension, Sociology, Vol. 35, No. 2, pp.403420. NECTEC (2006) Internet user profile of Thailand 2005, National Electronics and Computer Technology Center, Pathumthani, Thailand, March, http://www.nectec.or.th. Netcraft (2007) Netcraft web server survey, Netcraft, Bath, April, http://survey.netcraft.com/ Reports. Nielsen, J., Molich, R., Snyder, C. and Farrell, S. (2001) E-commerce User Experience, Nielsen Norman Group, Fremont. Nunnally, J.C. (1978) Psychometric Theory, 2nd ed., New York: McGraw-Hill. Olivero, N. and Lunt, P. (2004) Privacy versus willingness to disclose in e-commerce exchanges: the effect of risk awareness on the relative role of trust and control, Journal of Economic Psychology, Vol. 25, No. 2, pp.243262. Pavlou, P.A. and Gefen, D. (2005) Psychological contract violation in online marketplaces: antecedents, consequences, and moderating role, Information Systems Research, Vol. 16, No. 4, pp.372399. Peszynski, K.J. and Thanasankit, T. (2002) Exploring trust in B2C e-commerce an exploratory study of Mori culture in New Zealand, Proceedings of the 10th European Conference on Information Systems, Poland, 68 June. Philips, A. (1996) Relationships, The Independent Magazine, Vol. 13. Piris, L., Fitzgerald, G. and Serrano, A. (2004) Strategic motivators and expected benefits from e-commerce in traditional organisations, International Journal of Information Management, Vol. 24, No. 6, pp.489506. Ratnasingam, P. and Pavlou, P.A. (2003) Technology trust in internet-based interorganizational electronic commerce, Journal of Electronic Commerce in Organizations, Vol. 1, No. 1, pp.1741. Ratnasingam, P. and Phan, D.D. (2003) Trading partner trust in B2B e-commerce: a case study, Information Systems Management, Vol. 20, No. 3, pp.3950. Research Center for Social Development (2005) Surveying internet usage and impact in five Chinese cities, Chinese Academy of Social Sciences, October, http://www.wipchina.org/ ?p1=download&p2=27.

394

S. Pittayachawan, M. Singh and B. Corbitt

Riegelsberger, J., Sasse, M.A. and McCarthy, J.D. (2003) Shiny happy people building trust?: photos on e-commerce websites and consumer trust, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Florida, USA: ACM Press, pp.121128. Rivest, R.L. and Lampson, B. (1996) SDSI a simple distributed security infrastructure, http://theory.lcs.mit.edu/~rivest/sdsi10.ps (viewed 11 August 2006). Robles, S., Poslad, S., Borrell, J. and Bigham, J. (2001) Adding security and privacy to agents acting in a marketplace: a trust model, Proceedings of the 35th International Carnahan Conference on Security Technology, IEEE, London, England, 1619 October, pp.235239. Salam, A.F., Rao, H.R. and Pegels, C.C. (2003) Consumer-perceived risk in e-commerce transactions, Communications of the ACM, Vol. 46, No. 12, pp.325331. Silverpop (2006a) Email marketers missing out on opt-outs, Silverpop, Atlanta, 20 March, http://www.silverpop.com/news/press/03_20_06.html. Silverpop (2006b) Silverpops 2006 list growth survey: comparing UK/EU tactics with US/Canadian methods, Silverpop, Atlanta, 24 July, http://www.silverpop.com/news/press/ 07_24_06.html. Simmel, G. (1964) The Sociology of Georg Simmel, New York: Free Press. Singh, M. and Burgess, S. (2007) Electronic data collection methods, in R.A. Reynolds, R. Woods and J.D. Baker (Eds.) Handbook of Research on Electronic Surveys and Measurements, Idea Group Reference, Hershey, pp.2843. Singh, M. and Byrne, J. (2005) Performance evaluation of e-business in Australia, The Electronic Journal of Information Systems Evaluation, Vol. 8, No. 1, pp.7180. Smith, R.G. (2004) Impediments to the success investigation of transnational high tech crime, Australian Institute of Criminology, October, http://www.aic.gov.au/publications/tandi2/ tandi285.html. Sophos (2006) Sophos security threat management report, Sophos, July, http://www.sophos.com/ virusinfo/whitepapers/sophos-security-report-jun06-srus. Stewart, K.J. (2003) Trust transfer on the World Wide Web, Organization Science, Vol. 14, No. 1, pp.517. Stockdale, R. and Standing, C. (2003) Framework for participants recognition of key success factors in electronic marketplaces, in K.V. Andersen, S. Elliot, P. Swatman, E. Trauth and N. Bjrn-Andersen (Eds.) Seeking Success in E-business: A Multidisciplinary Approach, London: Kluwer Academic Publishers, pp.345364. Suh, B. and Han, I. (2003) The impact of customer trust and perception of security control on the acceptance of electronic commerce, International Journal of Electronic Commerce, Vol. 7, No. 3, pp.135161. Sultan, F., Urban, G., Shankar, V. and Bart, I. (2002) Determinants and Role of Trust in E-business: A Large Scale Empirical Study, MIT Sloan School of Management, http://hdl.handle.net/1721.1/1826 (viewed 5 December 2006). Sztompka, P. (2000) Trust: A Sociological Theory, Cambridge: Cambridge University Press. Tan, Y-H. and Thoen, W. (2002) Formal aspects of a generic model of trust for electronic commerce, Decision Support Systems, Vol. 33, No. 3, pp.233246. Taylor Nelson Sofres & TRUSTe (2005) TNS/TRUSTe holiday shopping survey shows identity theft, spam and spyware to be top concerns with shopping online, Taylor Nelson Sofres plc, London, 23 March, http://www.tns-global.com/corporate/Doc/0/ 4OSFN8JBMCB4N688PVHU4UD1B7/TNS_TRUSTeHoliday2005.pdf. Thatcher, J.B. and George, J.F. (2004) Commitment, trust, and social involvement: an exploratory study of antecedents to web shopper loyalty, Journal of Organizational Computing & Electronic Commerce, Vol. 14, No. 4, pp.243268. TRUSTe (2006) Watchdog report, TRUSTe, San Francisco, http://www.truste.org/consumers/ reports/June2006.html.

A multitheoretical approach for solving trust problems in B2C e-commerce 395


Tsiakis, T., Evagelou, E., Stephanides, G. and Pekos, G. (2004) Identification of trust requirements in an e-business framework, Proceedings of the 8th WSEAS International Conference on Communications, Athens, Greece, 1215 July. Turban, E., King, D., Viehland, D. and Lee, J. (2006) Electronic Commerce 2006: A Managerial Perspective, 4th ed., Upper Saddle River: Pearson Education, Inc. Wang, Y.D. and Emurian, H.H. (2005) An overview of online trust: concepts, elements, and implications, Computers in Human Behavior, Vol. 21, pp.105125. Weber, M. (1913) ber einige Kategorien der verstehenden Soziologie, in J. Winckelman (Ed.) Gesammelte Aufstze zur Wissenschaftslehre, pp.427474. Wernerfelt, B. (1991) Brand loyalty and market equilibrium, Marketing Science, Vol. 10, No. 3, pp.229245. Yoon, S-J. (2002) The antecedents and consequences of trust in online-purchase decisions, Journal of Interactive Marketing, Vol. 16, No. 2, pp.4763.

Notes
1 2 3 4 http://www.verisign.com http://www.geotrust.com http://www.truste.org http://www.ecommercetimes.com

S-ar putea să vă placă și