GGeeoorrggiiaa SSttaattee UUnniivveerrssiittyy SScchhoollaarrWWoorrkkss @@ GGeeoorrggiiaa SSttaattee UUnniivveerrssiittyy Computer Information Systems Dissertations Department of Computer Information Systems 4-29-2009 TTrruussttiinngg IITT AArrttiiffaaccttss:: HHooww TTrruusstt AAffffeeccttss oouurr UUssee ooff TTeecchhnnoollooggyy Anthony Osborn Vance Follow this and additional works at: https://scholarworks.gsu.edu/cis_diss Part of the Management Information Systems Commons RReeccoommmmeennddeedd CCiittaattiioonn Vance, Anthony Osborn, "Trusting IT Artifacts: How Trust Affects our Use of Technology." Dissertation, Georgia State University, 2009. doi: https://doi.org/10.57709/1063260 This Dissertation is brought to you for free and open access by the Department of Computer Information Systems at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Computer Information Systems Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. Permission to Borrow In presenting this dissertation as a partial fulfillment of the requirements for an advanced degree from Georgia State University, I agree that the Library of the University shall make it available for inspection and circulation in accordance with its regulations governing materials of this type. I agree that permission to quote from, or to publish this dissertation may be granted by the author or, in his/her absence, the professor under whose direction it was written or, in his absence, by the Dean of the Robinson College of Business. Such quoting, copying, or publishing must be solely for scholarly purposes and does not involve potential financial gain. It is understood that any copying from or publication of this dissertation which involves potential gain will not be allowed without written permission of the author. __________________________________ Signature of author Notice to Borrowers All dissertations deposited in the Georgia State University Library must be used only in accordance with the stipulations prescribed by the author in the preceding statement. The author of this dissertation is: Anthony O. Vance 1048 Longwood Drive Woodstock, GA 30189 The director of this dissertation is: Dr. Detmar Straub Computer Information Systems 9th Floor, 35 Broad Street, Atlanta, Georgia, 30302, USA Users of this dissertation not regularly enrolled as students at Georgia State University are required to attest acceptance of the preceding stipulations by signing below. Libraries borrowing this dissertation for the use of their patrons are required to see that each user records here the information requested. Name of User Address Date 1 TRUSTING IT ARTIFACTS: HOW TRUST AFFECTS OUR USE OF TECHNOLOGY BY ANTHONY OSBORN VANCE A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Robinson College of Business of Georgia State University GEORGIA STATE UNIVERSITY ROBINSON COLLEGE OF BUSINESS 2009 2 Copyright by Anthony Osborn Vance 2009 3 ACCEPTANCE This dissertation was prepared under the direction of the candidate’s Dissertation Committee. It has been approved and accepted by all members of that committee, and it has been accepted in partial fulfillment of the requirements for the degree of Doctor in Philosophy in Business Administration in the Robinson College of Business of Georgia State University. ________________________ Dean: H. Fenwick Huss Robinson College of Business Dissertation Committee: __________________________ Chair: Dr. Detmar Straub __________________________ Dr. Arun Rai __________________________ Dr. A. Faye Borthick __________________________ Dr. Michel Kalika __________________________ Dr. Mikko T. Siponen 4 ABSTRACT TRUSTING IT ARTIFACTS: HOW TRUST AFFECTS OUR USE OF TECHNOLOGY By ANTHONY OSBORN VANCE 9/13/2008 Committee Chair: Dr. Detmar Straub Major Department: Computer Information Systems Despite recent interest in the role of trust in Information Systems, the potential of IS to foster trust in business relationships remains largely untapped. In order to better realize this potential, this dissertation examines three areas of IS trust research for which research is particularly limited: (1) the IT artifact as a target of trust, (2) IS-based source credibility as an antecedent of trust, and (3) the effect of anonymity on trust in online environments. The objective of this dissertation is to examine the effects of IS on trust in each of these areas. To do so, a multi-paper dissertation format is adopted in which each area examined constitutes a distinct, though complimentary, study. Together, these studies further research on how IS can enhance trust in business relationships. 5 Acknowledgements I wish to thank: • My wife Sarah for encouraging me throughout the dissertation process. • My family, for their support. • Detmar Straub, for his willingness to collaborate with me even before I asked him to serve as my adviser. Also, for ensuring that we met weekly, despite his increasingly busy schedule. He has been a wonderful adviser and friend. • Robert Sainsbury, for collaborating with me on the data collection for the third chapter of this dissertation. • My committee members, for their input, time, and friendship. • Dan Robey, for advising me throughout the Ph.D. program. • Libby Crawley, for her attentiveness and support. • Emmanuel Monod, for facilitating my Ph.D. at the University of Paris—Dauphine, and ensuring I had a positive experience there. • The GSU faculty and fellow Ph.D. students, who made my experience at GSU enjoyable and successful. • Paul Lowry, for mentoring me during and after my time in the BYU Ph.D. preparation program. He has always been ready to advise and has been a good co-author and friend. Thank you for all of your service on my behalf. 6 TABLE OF CONTENTS TRUSTING IT ARTIFACTS: HOW TRUST AFFECTS OUR USE OF TECHNOLOGY ......... 2 ACCEPTANCE .................................................................................................................................. 4 ACKNOWLEDGEMENTS ....................................................................................................................... 6 TABLE OF CONTENTS ..................................................................................................................... 7 CHAPTER 1: INTRODUCTION ...................................................................................................... 10 INTRODUCTION ................................................................................................................................. 10 TRUST IN IT ARTIFACTS ................................................................................................................... 11 SOURCE CREDIBILITY AS AN ANTECEDENT OF TRUST ..................................................................... 12 PUBLICATION STATUS OF DISSERTATION CHAPTERS ....................................................................... 12 COMPLEMENTARILY OF TRUST STUDIES .......................................................................................... 13 REFERENCES ..................................................................................................................................... 13 CHAPTER 2: EXAMINGING TRUST IN IT ARTIFACTS: THE EFFECTS OF SYSTEM QUALITY AND CULTURE .............................................................................................................. 15 ABSTRACT......................................................................................................................................... 15 INTRODUCTION ................................................................................................................................. 16 LITERATURE REVIEW, RESEARCH MODEL, AND HYPOTHESES ........................................................ 17 Trust in IT Artifacts ...................................................................................................................... 18 The Effect of Trust on Intention to Use ........................................................................................ 19 Institution-based Trust and Trust in IT Artifacts .......................................................................... 20 Ease of Use Linked to Trust ......................................................................................................... 21 System Quality .............................................................................................................................. 21 System Quality and Trust ............................................................................................................. 22 Website Quality/User Interface (UI) Measures ............................................................................ 22 Relationship between System Quality and Ease of Use................................................................ 24 Relationship between System Quality and Trusting Beliefs ......................................................... 25 Trust and Culture ......................................................................................................................... 26 Direct Effect of Culture on Trust in IT Artifacts .......................................................................... 26 Moderating Effect of Culture on Trust in IT Artifacts .................................................................. 27 RESEARCH DESIGN ........................................................................................................................... 28 Choice of M-commerce Portals as Research Stimulus................................................................. 28 Two Disparate Cultures Relative to Trust: US and France ......................................................... 29 Instrumentation, Experimental Procedures, and Sampling ......................................................... 30 Participant Recruitment ............................................................................................................... 32 DATA ANALYSIS ............................................................................................................................... 33 Measurement Validation .............................................................................................................. 33 Validation of Reflective Constructs and Subconstructs ................................................................ 35 Validation of Formative Constructs ............................................................................................. 37 Common Methods Variance (CMV) ............................................................................................. 37 Hypothesis Testing ....................................................................................................................... 38 Evaluating Moderating Effects ..................................................................................................... 39 DISCUSSION ...................................................................................................................................... 41 LIMITATIONS AND FUTURE RESEARCH............................................................................................. 44 CONCLUSION ..................................................................................................................................... 45 ACKNOWLEDGEMENTS ..................................................................................................................... 46 REFERENCES ..................................................................................................................................... 46 CHAPTER 3: THE EFFECT OF TRUST ON USER ADOPTION OF ANONYMIZING SYSTEMS ............................................................................................................................................ 51 ABSTRACT......................................................................................................................................... 51 7 INTRODUCTION ................................................................................................................................. 51 Trusting Beliefs in the IT Artifact ................................................................................................. 54 Anonymizing Beliefs ..................................................................................................................... 57 Trusting Beliefs in Information and Anonymizing Beliefs ............................................................ 57 System Quality .............................................................................................................................. 58 Risk Beliefs ................................................................................................................................... 59 RESEARCH DESIGN ........................................................................................................................... 60 Simulation Procedures ................................................................................................................. 60 Measures and Instrumentation ..................................................................................................... 62 Sampling Frame ........................................................................................................................... 62 DESCRIPTIVE STATISTICS ................................................................................................................. 63 DATA ANALYSIS ................................................................................................................................ 63 Results for Theoretical Model Testing ......................................................................................... 64 Power Analysis ............................................................................................................................. 65 DISCUSSION AND CONTRIBUTIONS ................................................................................................... 66 LIMITATIONS AND DIRECTIONS FOR FUTURE RESEARCH ................................................................. 68 CONCLUSION ..................................................................................................................................... 68 REFERENCES ..................................................................................................................................... 69 CHAPTER 4: IS YOUR WEB SITE CREDIBLE? HOW SOURCE CREDIBILITY AFFECTS CONSUMER TRUST IN E-COMMERCE WEB SITES ............................................................... 78 ABSTRACT......................................................................................................................................... 79 INTRODUCTION ................................................................................................................................. 80 THEORETICAL MODEL ...................................................................................................................... 83 Source Credibility Theory ............................................................................................................ 83 Extending to Dual-Process Models .............................................................................................. 85 HYPOTHESES ..................................................................................................................................... 90 Predictors of Perceived Risk ........................................................................................................ 90 Online Cues that Affect Brand Image........................................................................................... 97 Predictors of Trusting Beliefs ...................................................................................................... 99 Previously Tested Predictors of Trusting Beliefs ....................................................................... 101 Predictors of Consumer Intentions ............................................................................................ 102 METHODOLOGY .............................................................................................................................. 103 Research Stimulus and Task ....................................................................................................... 103 Experimental Procedures ........................................................................................................... 104 Participants and Demographics ................................................................................................. 105 DATA ANALYSIS ............................................................................................................................. 105 Results of Theoretical Model Testing ......................................................................................... 106 DISCUSSION .................................................................................................................................... 108 Summary of Results .................................................................................................................... 108 Contributions .............................................................................................................................. 108 LIMITATIONS AND FUTURE RESEARCH OPPORTUNITIES ................................................................ 113 CONCLUSION ................................................................................................................................... 115 ACKNOWLEDGMENTS ..................................................................................................................... 116 CHAPTER 5: CONCLUSION ......................................................................................................... 123 INTRODUCTION ............................................................................................................................... 123 CONTRIBUTIONS ............................................................................................................................. 124 Contributions for Research of Trust in IT Artifacts ................................................................... 124 Contributions for Source Credibility as an Antecedent Trust .................................................... 125 LIMITATIONS ................................................................................................................................... 126 Limitations for Research on Trust in IT Artifacts ...................................................................... 126 Limitations for Research on Source Credibility as an Antecedent of Trust ............................... 127 CONCLUSION ................................................................................................................................... 128 REFERENCES ................................................................................................................................... 128 8
Description: