scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Trust and TAM in online shopping: an integrated model

01 Mar 2003-Management Information Systems Quarterly (Society for Information Management and The Management Information Systems Research Center)-Vol. 27, Iss: 1, pp 51-90
TL;DR: Research on experienced repeat online shoppers shows that consumer trust is as important to online commerce as the widely accepted TAM use-antecedents, perceived usefulness and perceived ease of use, and provides evidence that online trust is built through a belief that the vendor has nothing to gain by cheating.
Abstract: A separate and distinct interaction with both the actual e-vendor and with its IT Web site interface is at the heart of online shopping Previous research has established, accordingly, that online purchase intentions are the product of both consumer assessments of the IT itself-specifically its perceived usefulness and ease-of-use (TAM)-and trust in the e-vendor But these perspectives have been examined independently by IS researchers Integrating these two perspectives and examining the factors that build online trust in an environment that lacks the typical human interaction that often leads to trust in other circumstances advances our understanding of these constructs and their linkages to behavior Our research on experienced repeat online shoppers shows that consumer trust is as important to online commerce as the widely accepted TAM use-antecedents, perceived usefulness and perceived ease of use Together these variable sets explain a considerable proportion of variance in intended behavior The study also provides evidence that online trust is built through (1) a belief that the vendor has nothing to gain by cheating, (2) a belief that there are safety mechanisms built into the Web site, and (3) by having a typical interface, (4) one that is, moreover, easy to use
Citations
More filters
Posted Content
01 Jan 2012
TL;DR: The 2008 crash has left all the established economic doctrines - equilibrium models, real business cycles, disequilibria models - in disarray as discussed by the authors, and a good viewpoint to take bearings anew lies in comparing the post-Great Depression institutions with those emerging from Thatcher and Reagan's economic policies: deregulation, exogenous vs. endoge- nous money, shadow banking vs. Volcker's Rule.
Abstract: The 2008 crash has left all the established economic doctrines - equilibrium models, real business cycles, disequilibria models - in disarray. Part of the problem is due to Smith’s "veil of ignorance": individuals unknowingly pursue society’s interest and, as a result, have no clue as to the macroeconomic effects of their actions: witness the Keynes and Leontief multipliers, the concept of value added, fiat money, Engel’s law and technical progress, to name but a few of the macrofoundations of microeconomics. A good viewpoint to take bearings anew lies in comparing the post-Great Depression institutions with those emerging from Thatcher and Reagan’s economic policies: deregulation, exogenous vs. endoge- nous money, shadow banking vs. Volcker’s Rule. Very simply, the banks, whose lending determined deposits after Roosevelt, and were a public service became private enterprises whose deposits determine lending. These underlay the great moderation preceding 2006, and the subsequent crash.

3,447 citations

Journal ArticleDOI
01 Dec 2006
TL;DR: The study holds that the facets of social capital -- social interaction ties, trust, norm of reciprocity, identification, shared vision and shared language -- will influence individuals' knowledge sharing in virtual communities.
Abstract: The biggest challenge in fostering a virtual community is the supply of knowledge, namely the willingness to snare Knowledge with other members. This paper integrates the Social Cognitive Theory and the Social Capital Theory to construct a model for investigating the motivations behind people's knowledge sharing in virtual communities. The study holds that the facets of social capital -- social interaction ties, trust, norm of reciprocity, identification, shared vision and shared language -- will influence individuals' knowledge sharing in virtual communities. We also argue that outcome expectations -- community-related outcome expectations and personal outcome expectations -- can engender knowledge sharing in virtual communities. Data collected from 310 members of one professional virtual community provide support for the proposed model. The results help in identifying the motivation underlying individuals' knowledge sharing behavior in professional virtual communities. The implications for theory and practice and future research directions are discussed.

2,887 citations


Cites background from "Trust and TAM in online shopping: a..."

  • ...There is no concrete reward system in place to reinforce the mechanisms of mutual trust, interaction, and reciprocity among individuals....

    [...]

Journal ArticleDOI
TL;DR: Whether formative constructs are indeed being mistaken for reflective constructs by information systems researchers by examining complete volumes of MIS Quarterly and Information Systems Research over the last 3 years is examined.
Abstract: While researchers go to great lengths to justify and prove theoretical links between constructs, the relationship between measurement items and constructs is often ignored. By default, the relationship between construct and item is assumed to be reflective, meaning that the measurement items are a reflection of the construct. Many times, though, the nature of the construct is not reflective, but rather formative. Formative constructs occur when the items describe and define the construct rather than vice versa. In this research, we examine whether formative constructs are indeed being mistaken for reflective constructs by information systems researchers. By examining complete volumes of MIS Quarterly and Information Systems Research over the last 3 years, we discovered that a significant number of articles have indeed misspecified formative constructs. For scientific results to be valid, we argue that researchers must properly specify formative constructs. This paper discusses the implications of different patterns of common misspecifications of formative constructs on both Type I and Type II errors. To avoid these errors, the paper provides a roadmap to researchers to properly specify formative constructs. We also discuss how to address formative constructs within a research model after they are specified.

2,790 citations


Cites background or methods from "Trust and TAM in online shopping: a..."

  • ...Construct Name Studies Late Cohesiveness Jarvenpaa et al. (2004) Late Satisfaction Jarvenpaa et al. (2004) Local Management Commitment Lewis et al. (2003) Locatability Karimi et al. (2004) Loss of Knowledge Power Kankanhalli et al. (2005) Meaning Karimi et al. (2004) Organizational Responsibility Bassellier & Benbasat (2004) Overall Business Impact of ERP on the Plant Gattiker and Goodhue (2005) Perceived Complexity Teo et al. (2003) Perceived Effectiveness of Credit Card Guarantees Pavlou & Gefen (2004) Perceived Effectiveness of Escrow Services Pavlou & Gefen (2004) Perceived Effectiveness of Feedback Mechanism Pavlou & Gefen (2004) Perceived Enjoyment van der Heijden (2004) Perceived Risk from Community of Sellers Pavlou and Gefen (2004; 2005) Performance Expectancy Venkatesh et al. (2003) Personal Innovativeness with Technology Lewis et al. (2003) Positive Past Experience Pavlou and Gefen (2004; 2005) Presentation Karimi et al. (2004) Pretraining Motivation Yi and Davis (2003) Privileged Information Exchange Malhotra et al. (2005) Product Characteristics Subramani (2004) Project Ownership Koh, Ang & Straub (2004) Prompt Payment Koh, Ang & Straub (2004) Pro-Sharing Norms Kankanhalli et al. (2005) Psychological Contract Violation Pavlou and Gefen (2005) Qualitative Overload Ahuja & Thatcher (2005) Quantitative Overload Ahuja & Thatcher (2005) Reciprocity Kankanhalli et al. (2005); Wasko and Faraj (2005) Reliability Wixom and Todd (2005) Reputation Wasko and Faraj (2005) Responsiveness Kettinger and Lee (2005) Right Data Karimi et al. (2004) Right Level of Detail Karimi et al. (2004) Risk Beliefs Malhotra et al. (2004) Role Overload Ho, Ang, and Straub (2003) Satisfaction Bhattacherjee and Premkumar (2004) Self-Efficacy Brown and Venkatesh (2005) Situational Normality Gefen et al. (2003) Social Influence Venkatesh et al. (2003) Source Credibility Sussman and Siegal (2003) Standard Electronic Business Interfaces Malhotra et al. (2005) Status Gains Brown and Venkatesh (2005) Strategic Benefits Subramani (2004) Strength of Ties with Contractors Ho, Ang, and Straub (2003) Subjective Norm Bock et al. (2005) 656 MIS Quarterly Vol. 31 No. 4/December 2007...

    [...]

  • ...Construct Name Studies Absorptive Capacity Ko, Kirsch, and King (2005) Accessibility Karimi et al. (2004); Wixom and Todd (2005) Accuracy Karimi et al. (2004); Wixom and Todd (2005) Affiliation Bock et al. (2005) Anxiety Venkatesh et al. (2003) Applications for Fun Brown and Venkatesh (2005) Applications for Personal Use Brown and Venkatesh (2005) Assistance Karimi et al. (2004) Attitude Bhattacherjee and Premkumar (2004); Hong et al. (2004); Wixom and Todd (2005) Attitude Toward Knowledge Sharing Bock et al. (2005) Attitude Toward Using Technology Venkatesh et al. (2003) Authorization Karimi et al. (2004) Behavioral Intention Brown and Venkatesh (2005); Teo et al. (2003) van der Heijden (2004); Venkatesh et al. (2003); Wixom and Todd (2005); Building Effective Interorganizational Teams Koh, Ang & Straub (2004) Clear Authority Structures Koh, Ang & Straub (2004) Clear Specifications Koh, Ang & Straub (2004) Client Learning Majchrzak, Beath, Lim, Chen (2005a) Close Project Monitoring Koh, Ang & Straub (2004) Codification Effort Kankanhalli et al. (2005) Commitment Wasko and Faraj (2005) Communication Encoding Confidence Ko, Kirsch, and King (2005) Communication Interfaces Kim et al. (2005) Compatibility Karimi et al. (2004) Completeness Wixom and Todd (2005) Computer Self-Efficacy Lewis et al. (2003) Confusion Karimi et al. (2004) Cooperative Independence Majchrzak, Beath, Lim, Chen (2005a) Coordination Information Exchange Malhotra et al. (2005) Cost Brown and Venkatesh (2005) Currency Karimi et al. (2004); Wixom and Todd (2005); Customer Service (Self Assessment) Ray et al. (2005) 654 MIS Quarterly Vol. 31 No. 4/December 2007...

    [...]

  • ...…& Thatcher (2005) Unauthorized Secondary Use Malhotra et al. (2004) Usage Kankanhalli et al. (2005) Usefulness Bhattacherjee and Premkumar (2004); Gefen et al. (2003); Sussman and Siegal (2003); van der Heijden (2004) Utility for Children Brown and Venkatesh (2005) Utility for Work-Related Use…...

    [...]

  • ...Ease of Use (Brown and Venkatesh 2005; Gefen et al. 2003; Karimi et al. 2004; Lewis et al. 2003; van der Heijden 2004; Wixom and Todd 2005) Interaction with software is clear and understandable Easy to get software to do what I want it to do Easy to use software Learning to use software is easy for me...

    [...]

  • ...Construct Name Studies Subjective Quality Jarvenpaa et al. (2004) System Quality Wixom and Todd (2005) System Reliability Karimi et al. (2004) System Satisfaction Wixom and Todd (2005) Taking Charge Koh, Ang & Straub (2004) Task Efficiency Gattiker and Goodhue (2005) Task Interdependence Karimi et al. (2004) Task Nonroutineness Karimi et al (2004); Majchrzak, Malhotra, and John (2005b) Timeliness Wixom and Todd (2005) Top Management Commitment Lewis et al. (2003) Training Karimi et al. (2004) Transaction Intentions Pavlou and Gefen (2004; 2005) Trust in Contractors Ho, Ang, and Straub (2003) Trust Propensity Pavlou and Gefen (2004; 2005) Trustworthiness-Based Sussman and Siegal (2003) Trying to Innovate with IT Ahuja & Thatcher (2005) Unauthorized Secondary Use Malhotra et al. (2004) Usage Kankanhalli et al. (2005) Usefulness Bhattacherjee and Premkumar (2004); Gefen et al. (2003); Sussman and Siegal (2003); van der Heijden (2004) Utility for Children Brown and Venkatesh (2005) Utility for Work-Related Use Brown and Venkatesh (2005) Workplace Referents’ Influences Brown and Venkatesh (2005)...

    [...]

Journal ArticleDOI
01 Jan 2008
TL;DR: A theoretical framework describing the trust-based decision-making process a consumer uses when making a purchase from a given site is developed and the proposed model is tested using a Structural Equation Modeling technique on Internet consumer purchasing behavior data collected via a Web survey.
Abstract: Are trust and risk important in consumers' electronic commerce purchasing decisions? What are the antecedents of trust and risk in this context? How do trust and risk affect an Internet consumer's purchasing decision? To answer these questions, we i) develop a theoretical framework describing the trust-based decision-making process a consumer uses when making a purchase from a given site, ii) test the proposed model using a Structural Equation Modeling technique on Internet consumer purchasing behavior data collected via a Web survey, and iii) consider the implications of the model. The results of the study show that Internet consumers' trust and perceived risk have strong impacts on their purchasing decisions. Consumer disposition to trust, reputation, privacy concerns, security concerns, the information quality of the Website, and the company's reputation, have strong effects on Internet consumers' trust in the Website. Interestingly, the presence of a third-party seal did not strongly influence consumers' trust.

2,650 citations


Cites background from "Trust and TAM in online shopping: a..."

  • ...Some recent studies [64,82,115,117] have focused on the social and behavioral elements of trust in an e-commerce context, however these were again narrowly focused (e....

    [...]

Journal ArticleDOI
TL;DR: Heuristics for reinvigorating the quest for validation in IS research via content/construct validity, reliability, manipulation validity, and statistical conclusion validity are suggested and new guidelines for validation and new research directions are offered.
Abstract: The issue of whether IS positivist researchers were validating their instruments sufficiently was initially raised fifteen years ago. Rigor in IS research is still one of the critical scientific issues facing the field. Without solid validation of the instruments that are used to gather data on which findings and interpretations are based, the very scientific basis of the profession is threatened. This study builds on four prior retrospectives of IS research that conclude that IS positivist researchers continue to face major barriers in instrument, statistical, and other forms of validation. It goes beyond these studies by offering analyses of the state-of-the-art of research validities and deriving specific heuristics for research practice in the validities. Some of these heuristics will, no doubt, be controversial. But we believe that it is time for the IS academic profession to bring such issues into the open for community debate. This article is a first step in that direction. Based on our interpretation of the importance of a long list of validities, this paper suggests heuristics for reinvigorating the quest for validation in IS research via content/construct validity, reliability, manipulation validity, and statistical conclusion validity. New guidelines for validation and new research directions are offered.

2,644 citations

References
More filters
Journal ArticleDOI
TL;DR: In this article, the adequacy of the conventional cutoff criteria and several new alternatives for various fit indexes used to evaluate model fit in practice were examined, and the results suggest that, for the ML method, a cutoff value close to.95 for TLI, BL89, CFI, RNI, and G...
Abstract: This article examines the adequacy of the “rules of thumb” conventional cutoff criteria and several new alternatives for various fit indexes used to evaluate model fit in practice. Using a 2‐index presentation strategy, which includes using the maximum likelihood (ML)‐based standardized root mean squared residual (SRMR) and supplementing it with either Tucker‐Lewis Index (TLI), Bollen's (1989) Fit Index (BL89), Relative Noncentrality Index (RNI), Comparative Fit Index (CFI), Gamma Hat, McDonald's Centrality Index (Mc), or root mean squared error of approximation (RMSEA), various combinations of cutoff values from selected ranges of cutoff criteria for the ML‐based SRMR and a given supplemental fit index were used to calculate rejection rates for various types of true‐population and misspecified models; that is, models with misspecified factor covariance(s) and models with misspecified factor loading(s). The results suggest that, for the ML method, a cutoff value close to .95 for TLI, BL89, CFI, RNI, and G...

76,383 citations

01 Jan 1989
TL;DR: Regression analyses suggest that perceived ease of use may actually be a causal antecdent to perceived usefulness, as opposed to a parallel, direct determinant of system usage.

40,975 citations


"Trust and TAM in online shopping: a..." refers background or methods or result in this paper

  • ...Trust and TAM in online shopping: An integrated model...

    [...]

  • ...1992; Williamson 1985) and actually deter2Even though PU was originally defined with respect to one's job performance (Davis 1989), PU refers to the performance of any generic task in non-organizational settings....

    [...]

  • ...As such, online purchase intentions should be explained in part by the technology acceptance model, TAM (Davis 1989; Davis et al. 1989)....

    [...]

  • ...1992; Williamson 1985) and actually deter2Even though PU was originally defined with respect to one's job performance (Davis 1989), PU refers to the performance of any generic task in non-organizational settings. This view is consistent with a number of studies such as Agarwal and Karahanna (2000), Davis et al. (1992), Mathieson (1991), Rose and Straub (1998), Sjazna (1994; 1996), Taylor and Todd (1995a), and others which measured PU in settings other than an organization....

    [...]

  • ...1992; Williamson 1985) and actually deter2Even though PU was originally defined with respect to one's job performance (Davis 1989), PU refers to the performance of any generic task in non-organizational settings. This view is consistent with a number of studies such as Agarwal and Karahanna (2000), Davis et al....

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors developed and validated new scales for two specific variables, perceived usefulness and perceived ease of use, which are hypothesized to be fundamental determinants of user acceptance.
Abstract: Valid measurement scales for predicting user acceptance of computers are in short supply. Most subjective measures used in practice are unvalidated, and their relationship to system usage is unknown. The present research develops and validates new scales for two specific variables, perceived usefulness and perceived ease of use, which are hypothesized to be fundamental determinants of user acceptance. Definitions of these two variables were used to develop scale items that were pretested for content validity and then tested for reliability and construct validity in two studies involving a total of 152 users and four application programs. The measures were refined and streamlined, resulting in two six-item scales with reliabilities of .98 for usefulness and .94 for ease of use. The scales exhibited hgih convergent, discriminant, and factorial validity. Perceived usefulness was significnatly correlated with both self-reported current usage r = .63, Study 1) and self-predicted future usage r = .85, Study 2). Perceived ease of use was also significantly correlated with current usage r = .45, Study 1) and future usage r = .59, Study 2). In both studies, usefulness had a signficnatly greater correaltion with usage behavior than did ease of use. Regression analyses suggest that perceived ease of use may actually be a causal antecdent to perceived usefulness, as opposed to a parallel, direct determinant of system usage. Implications are drawn for future research on user acceptance.

40,720 citations

Journal ArticleDOI
TL;DR: In this article, the authors address the ability to predict peoples' computer acceptance from a measure of their intentions, and explain their intentions in terms of their attitudes, subjective norms, perceived usefulness, perceived ease of use, and related variables.
Abstract: Computer systems cannot improve organizational performance if they aren't used. Unfortunately, resistance to end-user systems by managers and professionals is a widespread problem. To better predict, explain, and increase user acceptance, we need to better understand why people accept or reject computers. This research addresses the ability to predict peoples' computer acceptance from a measure of their intentions, and the ability to explain their intentions in terms of their attitudes, subjective norms, perceived usefulness, perceived ease of use, and related variables. In a longitudinal study of 107 users, intentions to use a specific system, measured after a one-hour introduction to the system, were correlated 0.35 with system use 14 weeks later. The intention-usage correlation was 0.63 at the end of this time period. Perceived usefulness strongly influenced peoples' intentions, explaining more than half of the variance in intentions at the end of 14 weeks. Perceived ease of use had a small but significant effect on intentions as well, although this effect subsided over time. Attitudes only partially mediated the effects of these beliefs on intentions. Subjective norms had no effect on intentions. These results suggest the possibility of simple but powerful models of the determinants of user acceptance, with practical value for evaluating systems and guiding managerial interventions aimed at reducing the problem of underutilized computer technology.

21,880 citations