Skip to main content

2016 | OriginalPaper | Buchkapitel

Trust in the Information Systems Discipline

verfasst von : Ayten Öksüz, Nicolai Walter, Bettina Distel, Michael Räckers, Jörg Becker

Erschienen in: Trust and Communication in a Digitized World

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The digitalization of today’s world has greatly advanced during the last few years and affects nearly all areas of life. The research discipline Information Systems (IS) views digitalization from multiple perspectives. On the one hand, IS is concerned with the development and functionality of technological artifacts. On the other hand, researchers in this field also investigate questions of how users perceive and actually use technological innovations. This last point brings about the question of how users deal with perceptions of risks that are inevitably connected to the use of technology (e.g., data theft, abuse of personal data). Thereby, trust research found its way into IS research since trust is widely considered to be a key factor in dealing with risk perceptions. Trust relations are commonly described as the relation between two parties: the trustor (who trusts) and the trustee (who is trusted). So far, technology has mainly been viewed as a medium through which trust can be transmitted or developed. With the emergence of quasi humans (e.g., recommendation agents), this ascription becomes more and more difficult and raises the question of whether or not a technology can be trusted. This article gives an overview of perspectives on the relations between users’ perceptions of risk, trust through and in technologies, and trust towards technology providers. We furthermore provide insights into the state of the art of trust research in the IS discipline.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Akkaya, C., Obermeier, M., Wolf, P., & Krcmar, H. (2011). Components of trust influencing eGovernment adoption in Germany. In M. Janssen, H. J. Scholl, M. A. Wimmer, & Y.-H. Tan (Eds.), Electronic government. 10th IFIP WG 8.5 International Conference, EGOV 2011 Delft, The Netherlands, August/September 2011. Proceedings (pp. 88–98). Heidelberg: Springer. Akkaya, C., Obermeier, M., Wolf, P., & Krcmar, H. (2011). Components of trust influencing eGovernment adoption in Germany. In M. Janssen, H. J. Scholl, M. A. Wimmer, & Y.-H. Tan (Eds.), Electronic government. 10th IFIP WG 8.5 International Conference, EGOV 2011 Delft, The Netherlands, August/September 2011. Proceedings (pp. 88–98). Heidelberg: Springer.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.CrossRef
Zurück zum Zitat Ba, S., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly, 26(3), 243–268.CrossRef Ba, S., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly, 26(3), 243–268.CrossRef
Zurück zum Zitat Becker, J., Heddier, M., Öksüz, A., & Knackstedt, R. (2014). The effect of providing visualizations in privacy policies on trust in data privacy and security. In 47th Hawaii International Conference on System Sciences (HICSS) (pp. 3224–3233). Becker, J., Heddier, M., Öksüz, A., & Knackstedt, R. (2014). The effect of providing visualizations in privacy policies on trust in data privacy and security. In 47th Hawaii International Conference on System Sciences (HICSS) (pp. 3224–3233).
Zurück zum Zitat Belanche, D., Casaló, L. V., & Flavián, C. (2012). Integrating trust and personal values into the technology acceptance model: The case of e-government services adoption. Cuadernos de Economía y Dirección de la Empresa, 15(4), 192–204. doi:10.1016/j.cede.2012.04.004.CrossRef Belanche, D., Casaló, L. V., & Flavián, C. (2012). Integrating trust and personal values into the technology acceptance model: The case of e-government services adoption. Cuadernos de Economía y Dirección de la Empresa, 15(4), 192–204. doi:10.​1016/​j.​cede.​2012.​04.​004.CrossRef
Zurück zum Zitat Bélanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245–270.CrossRef Bélanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245–270.CrossRef
Zurück zum Zitat Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.CrossRef Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.CrossRef
Zurück zum Zitat Benbasat, I. (2010). HCI research: Future challenges and directions. AIS Transactions on Human-Computer Interaction, 2(2), 16–21. Benbasat, I. (2010). HCI research: Future challenges and directions. AIS Transactions on Human-Computer Interaction, 2(2), 16–21.
Zurück zum Zitat Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior, 30, 299–306.CrossRef Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior, 30, 299–306.CrossRef
Zurück zum Zitat Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistic Information Management, 15(5/6), 358–368.CrossRef Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistic Information Management, 15(5/6), 358–368.CrossRef
Zurück zum Zitat Colquitt, J. A., Scott, B. A., & LePine, J. A. (2007). Trust, trustworthiness, and trust propensity: A meta-analytic test of their unique relationships with risk taking and job performance. The Journal of Applied Psychology, 92(4), 909–927.CrossRef Colquitt, J. A., Scott, B. A., & LePine, J. A. (2007). Trust, trustworthiness, and trust propensity: A meta-analytic test of their unique relationships with risk taking and job performance. The Journal of Applied Psychology, 92(4), 909–927.CrossRef
Zurück zum Zitat Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human-Computer Studies, 58(6), 737–758.CrossRef Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human-Computer Studies, 58(6), 737–758.CrossRef
Zurück zum Zitat Cyr, D. (2013). Website design, trust and culture: An eight country investigation. Electronic Commerce Research and Applications, 12(6), 373–385.CrossRef Cyr, D. (2013). Website design, trust and culture: An eight country investigation. Electronic Commerce Research and Applications, 12(6), 373–385.CrossRef
Zurück zum Zitat Cyr, D., Head, M., Larios, H., & Pan, B. (2009). Exploring human images in website design: A multi-method approach. MIS Quarterly, 33(3), 539–566. Cyr, D., Head, M., Larios, H., & Pan, B. (2009). Exploring human images in website design: A multi-method approach. MIS Quarterly, 33(3), 539–566.
Zurück zum Zitat Friedman, B., Khan, P. H., & Howe, D. C. (2000). Trust online. Communications of the ACM, 43(12), 34–40.CrossRef Friedman, B., Khan, P. H., & Howe, D. C. (2000). Trust online. Communications of the ACM, 43(12), 34–40.CrossRef
Zurück zum Zitat Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing. Communications of the ACM, 55(9), 62–68.CrossRef Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing. Communications of the ACM, 55(9), 62–68.CrossRef
Zurück zum Zitat Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.
Zurück zum Zitat Gefen, D., & Straub, D. W. (2003). Managing user trust in B2C e-services. e-Service, 2(2), 7–24.CrossRef Gefen, D., & Straub, D. W. (2003). Managing user trust in B2C e-services. e-Service, 2(2), 7–24.CrossRef
Zurück zum Zitat Hess, T. J., Fuller, M., & Campbell, D. (2009). Designing interfaces with social presence: Using vividness and extraversion to create social recommendation agents. Journal of the Association for Information Systems, 10(12), 889–919. Hess, T. J., Fuller, M., & Campbell, D. (2009). Designing interfaces with social presence: Using vividness and extraversion to create social recommendation agents. Journal of the Association for Information Systems, 10(12), 889–919.
Zurück zum Zitat Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.
Zurück zum Zitat Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85.CrossRef Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85.CrossRef
Zurück zum Zitat Hofmann, S., & Heierhoff, L. (2012). Adoption of municipal e-Government services – A communication problem? 18th Americas Conference on Information Systems (AMCIS 2012) (pp. 1–10). Hofmann, S., & Heierhoff, L. (2012). Adoption of municipal e-Government services – A communication problem? 18th Americas Conference on Information Systems (AMCIS 2012) (pp. 1–10).
Zurück zum Zitat Hofmann, S., Räckers, M., & Becker, J. (2012). Identifying factors of e-Government acceptance - A literature review. Thirty Third International Conference on Information Systems, Orlando (pp. 1–19). Hofmann, S., Räckers, M., & Becker, J. (2012). Identifying factors of e-Government acceptance - A literature review. Thirty Third International Conference on Information Systems, Orlando (pp. 1–19).
Zurück zum Zitat Horst, M., Kuttschreuter, M., & Gutteling, J. M. (2007). Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands. Computers in Human Behavior, 23, 1838–1852. doi:10.1016/j.chb.2005.11.003.CrossRef Horst, M., Kuttschreuter, M., & Gutteling, J. M. (2007). Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands. Computers in Human Behavior, 23, 1838–1852. doi:10.​1016/​j.​chb.​2005.​11.​003.CrossRef
Zurück zum Zitat Karimov, F. P., Brengman, M., & Van Hove, L. (2011). The effect of website design dimensions on initial trust: A synthesis of the empirical literature. Journal of Electronic Commerce Research, 12(4), 272–301. Karimov, F. P., Brengman, M., & Van Hove, L. (2011). The effect of website design dimensions on initial trust: A synthesis of the empirical literature. Journal of Electronic Commerce Research, 12(4), 272–301.
Zurück zum Zitat Kerschbaum, F. (2011). Secure and sustainable benchmarking in clouds. Business & Information Systems Engineering, 3(3), 135–143.CrossRef Kerschbaum, F. (2011). Secure and sustainable benchmarking in clouds. Business & Information Systems Engineering, 3(3), 135–143.CrossRef
Zurück zum Zitat Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional, 12(5), 20–26.CrossRef Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional, 12(5), 20–26.CrossRef
Zurück zum Zitat Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544–564.CrossRef Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544–564.CrossRef
Zurück zum Zitat Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17(1), 39–71.CrossRef Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17(1), 39–71.CrossRef
Zurück zum Zitat Lisetti, C., Amini, R., Yasavur, U., & Rishe, N. (2013). I can help you change! An empathic virtual agent delivers behavior change health interventions. ACM Transactions on Management Information Systems, 4(4), 1–28. doi:10.1145/2544103.CrossRef Lisetti, C., Amini, R., Yasavur, U., & Rishe, N. (2013). I can help you change! An empathic virtual agent delivers behavior change health interventions. ACM Transactions on Management Information Systems, 4(4), 1–28. doi:10.​1145/​2544103.CrossRef
Zurück zum Zitat Lowry, P. B., Vance, A., Mood, G., Beckman, B., & Read, A. (2008). Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24(4), 199–224.CrossRef Lowry, P. B., Vance, A., Mood, G., Beckman, B., & Read, A. (2008). Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24(4), 199–224.CrossRef
Zurück zum Zitat Marschall, S. (1998). Netzöffentlichkeit - eine demokratische Alternative? In W. Gellner & F. von Korff (Eds.), Demokratie und Internet (pp. 43–54). Baden-Baden: Nomos Verlag. Marschall, S. (1998). Netzöffentlichkeit - eine demokratische Alternative? In W. Gellner & F. von Korff (Eds.), Demokratie und Internet (pp. 43–54). Baden-Baden: Nomos Verlag.
Zurück zum Zitat Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709–734. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709–734.
Zurück zum Zitat McKnight, D. H. (2005). Trust in information technology. In G. Davis (Ed.), The Blackwell encyclopedia of management (Management Information Systems, Vol. 7, pp. 329–331). Oxford: Blackwell. McKnight, D. H. (2005). Trust in information technology. In G. Davis (Ed.), The Blackwell encyclopedia of management (Management Information Systems, Vol. 7, pp. 329–331). Oxford: Blackwell.
Zurück zum Zitat McKnight, D. H., Carter, M., Thatcher, J. B., & Clay, P. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems, 2(2), 1–15.CrossRef McKnight, D. H., Carter, M., Thatcher, J. B., & Clay, P. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems, 2(2), 1–15.CrossRef
Zurück zum Zitat McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3), 297–323.CrossRef McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3), 297–323.CrossRef
Zurück zum Zitat McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.CrossRef McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.CrossRef
Zurück zum Zitat Neidhardt, F. (1994). Öffentlichkeit, öffentliche Meinung, soziale Bewegungen. Kölner Zeitschrift für Soziologie und Sozialpsychologie. Opladen: Westdeutscher Verlag. Neidhardt, F. (1994). Öffentlichkeit, öffentliche Meinung, soziale Bewegungen. Kölner Zeitschrift für Soziologie und Sozialpsychologie. Opladen: Westdeutscher Verlag.
Zurück zum Zitat Öksüz, A. (2014). Turning dark into white clouds – A framework on trust building in cloud providers via websites. In Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, Georgia. Öksüz, A. (2014). Turning dark into white clouds – A framework on trust building in cloud providers via websites. In Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, Georgia.
Zurück zum Zitat Orlikowski, W. J., & Iacono, C. (2001). Desperately seeking the “IT” in IT research: A call to theorizing the IT artifact. Information Systems Research, 12(2), 121–134.CrossRef Orlikowski, W. J., & Iacono, C. (2001). Desperately seeking the “IT” in IT research: A call to theorizing the IT artifact. Information Systems Research, 12(2), 121–134.CrossRef
Zurück zum Zitat Ortbach, K., Gaß, O., Köffer, S., Schacht, S., Walter, N., Maedche, A., et al. (2014). Design principles for a social question and answers site: Enabling user-to-user support in organizations. In Proceedings of the Advancing the Impact of Design Science: Moving from Theory to Practice (Lecture Notes in Computer Science, Vol. 8463, pp. 54–68). doi:10.1007/978-3-319-06701-8_4. Ortbach, K., Gaß, O., Köffer, S., Schacht, S., Walter, N., Maedche, A., et al. (2014). Design principles for a social question and answers site: Enabling user-to-user support in organizations. In Proceedings of the Advancing the Impact of Design Science: Moving from Theory to Practice (Lecture Notes in Computer Science, Vol. 8463, pp. 54–68). doi:10.​1007/​978-3-319-06701-8_​4.
Zurück zum Zitat Ortbach, K., Walter, N., & Öksüz, A. (2015). Are you ready to lose control? A theory on the role of trust and risk perception on bring-your-own-device policy and information system service quality. In Proceedings of the 23rd European Conference on Information Systems (ECIS 2015). Ortbach, K., Walter, N., & Öksüz, A. (2015). Are you ready to lose control? A theory on the role of trust and risk perception on bring-your-own-device policy and information system service quality. In Proceedings of the 23rd European Conference on Information Systems (ECIS 2015).
Zurück zum Zitat Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134. Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.
Zurück zum Zitat Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behaviour. MIS Quarterly, 30(1), 115–143. Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behaviour. MIS Quarterly, 30(1), 115–143.
Zurück zum Zitat Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136.
Zurück zum Zitat Qiu, L., & Benbasat, I. (2005). Online consumer trust and live help interfaces: The effects of text-to-speech voice and three-dimensional avatars. International Journal of Human-Computer Interaction, 19(1), 75–94.CrossRef Qiu, L., & Benbasat, I. (2005). Online consumer trust and live help interfaces: The effects of text-to-speech voice and three-dimensional avatars. International Journal of Human-Computer Interaction, 19(1), 75–94.CrossRef
Zurück zum Zitat Qiu, L., & Benbasat, I. (2009). Evaluating anthropomorphic product recommendation agents: A social relationship perspective to designing information systems. Journal of Management Information Systems, 25(4), 145–182.CrossRef Qiu, L., & Benbasat, I. (2009). Evaluating anthropomorphic product recommendation agents: A social relationship perspective to designing information systems. Journal of Management Information Systems, 25(4), 145–182.CrossRef
Zurück zum Zitat Recker, J. (2013). Scientific research in information systems: A beginner’s guide. Heidelberg: Springer.CrossRef Recker, J. (2013). Scientific research in information systems: A beginner’s guide. Heidelberg: Springer.CrossRef
Zurück zum Zitat Richards, D., & Bransky, K. (2014). ForgetMeNot: What and how users expect intelligent virtual agents to recall and forget personal conversational content. International Journal of Human-Computer Studies, 72(5), 460–476.CrossRef Richards, D., & Bransky, K. (2014). ForgetMeNot: What and how users expect intelligent virtual agents to recall and forget personal conversational content. International Journal of Human-Computer Studies, 72(5), 460–476.CrossRef
Zurück zum Zitat Rogers, E. M. (2003). Diffusion of innovations. New York: Free Press. Rogers, E. M. (2003). Diffusion of innovations. New York: Free Press.
Zurück zum Zitat Sherchan, W., Nepal, S., & Paris, C. (2013). A survey of trust in social networks. ACM Computing Surveys, 45(4), 1–33.CrossRef Sherchan, W., Nepal, S., & Paris, C. (2013). A survey of trust in social networks. ACM Computing Surveys, 45(4), 1–33.CrossRef
Zurück zum Zitat Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., & Leimeister, J.M. (2012). Understanding the formation of trust in IT artifacts. In Thirty Third International Conference on Information Systems (pp. 1–18), Orlando. Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., & Leimeister, J.M. (2012). Understanding the formation of trust in IT artifacts. In Thirty Third International Conference on Information Systems (pp. 1–18), Orlando.
Zurück zum Zitat Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior, 29(3), 821–826.CrossRef Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior, 29(3), 821–826.CrossRef
Zurück zum Zitat Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24–31.CrossRef Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24–31.CrossRef
Zurück zum Zitat van Eimeren, B., & Frees, B. (2014). Ergebnisse der ARD/ZDF-Onlinestudie 2014: 79 Prozent der Deutschen online – Zuwachs bei mobiler Internetnutzung und Bewegtbild. Media Perspektiven, 7–8, 378–396. van Eimeren, B., & Frees, B. (2014). Ergebnisse der ARD/ZDF-Onlinestudie 2014: 79 Prozent der Deutschen online – Zuwachs bei mobiler Internetnutzung und Bewegtbild. Media Perspektiven, 7–8, 378–396.
Zurück zum Zitat Verhagen, T., Meents, S., & Tan, Y.-H. (2006). Perceived risk and trust associated with purchasing at electronic marketplaces. European Journal of Information Systems, 15(6), 542–555.CrossRef Verhagen, T., Meents, S., & Tan, Y.-H. (2006). Perceived risk and trust associated with purchasing at electronic marketplaces. European Journal of Information Systems, 15(6), 542–555.CrossRef
Zurück zum Zitat Wakefield, R. L., Stocks, M. H., & Wilder, W. M. (2004). The role of web site characteristics in initial trust formation. Journal of Computer Information Systems, 45(1), 94–103. Wakefield, R. L., Stocks, M. H., & Wilder, W. M. (2004). The role of web site characteristics in initial trust formation. Journal of Computer Information Systems, 45(1), 94–103.
Zurück zum Zitat Walter, N. (2014). “Do you trust me?” – A structured evaluation of trust and social recommendation agents. In SIGHCI 2014 Proceedings. Walter, N. (2014). “Do you trust me?” – A structured evaluation of trust and social recommendation agents. In SIGHCI 2014 Proceedings.
Zurück zum Zitat Walter, N., Öksüz, A., Walterbusch, M., Teuteberg, F., & Becker, J. (2014). “May I help you?” Increasing trust in cloud computing providers through social presence and the reduction of information overload. In Proceedings of the 35th International Conference on Information Systems (ICIS 2014). Walter, N., Öksüz, A., Walterbusch, M., Teuteberg, F., & Becker, J. (2014). “May I help you?” Increasing trust in cloud computing providers through social presence and the reduction of information overload. In Proceedings of the 35th International Conference on Information Systems (ICIS 2014).
Zurück zum Zitat Walter, N., Ortbach, K., Niehaves, B., & Becker, J. (2013). Trust needs touch: understanding the building of trust through social presence. In Proceedings of the 19th Americas Conference on Information Systems (AMCIS 2013). Chicago, IL. Walter, N., Ortbach, K., Niehaves, B., & Becker, J. (2013). Trust needs touch: understanding the building of trust through social presence. In Proceedings of the 19th Americas Conference on Information Systems (AMCIS 2013). Chicago, IL.
Zurück zum Zitat Wang, W., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217–246.CrossRef Wang, W., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217–246.CrossRef
Zurück zum Zitat Wang, W., & Benbasat, I. (2008). Attributions of trust in decision support technologies: A study of recommendation agents for e-commerce. Journal of Management Information Systems, 24(4), 249–273.CrossRef Wang, W., & Benbasat, I. (2008). Attributions of trust in decision support technologies: A study of recommendation agents for e-commerce. Journal of Management Information Systems, 24(4), 249–273.CrossRef
Zurück zum Zitat Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125.CrossRef Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125.CrossRef
Zurück zum Zitat Xiao, B., & Benbasat, I. (2007). E-commerce product recommendation agents: Use, characteristics, and impact. MIS Quarterly, 31(1), 137–209. Xiao, B., & Benbasat, I. (2007). E-commerce product recommendation agents: Use, characteristics, and impact. MIS Quarterly, 31(1), 137–209.
Zurück zum Zitat Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.CrossRef Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.CrossRef
Metadaten
Titel
Trust in the Information Systems Discipline
verfasst von
Ayten Öksüz
Nicolai Walter
Bettina Distel
Michael Räckers
Jörg Becker
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-28059-2_12

Premium Partner