skip to main content
research-article

Who is out there?: exploring the effects of trust and perceived risk on saas adoption intentions

Published:23 August 2010Publication History
Skip Abstract Section

Abstract

Software as a Service (SaaS) is a relatively new organizational application sourcing alternative, offering organizations the option to access applications--via the Internet--that are remotely hosted on offsite servers instead of installing equivalent applications in-house, thus presumably saving costs. Although SaaS has been offered since the late 1990s, so far it has not become a dominant sourcing alternative for organizational core applications, in spite of the fact that most leading IT companies now offer remotely-hosted organization-wide applications. This study conceptualized and empirically tested a model of the effects of the perceived risk of SaaS and trust in the SaaS vendor community on the organizational intention to adopt SaaS at this early stage of the SaaS market. Three novel, risk-related constructs were developed: perceived risk of SaaS, perceived risk of systems unavailability, and perceived risk of data insecurity. Likewise, three new trust-related constructs were also conceived: trust in the SaaS vendor community, perceived capabilities and perceived reputation of the SaaS vendor community. An empirical test of the model demonstrated the negative effect of perceived risk and the positive effects of trust in, and the reputation of, the SaaS vendor community, on the intention to adopt SaaS. Trust in the SaaS vendor community was also found to strongly affect all three risk concepts.

References

  1. Aalders, R. The IT Outsourcing Guide Wiley, NY, New York, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anderson, J.C., and Gerbing, D.W. "Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach," Psychological Bulletin (103:3), 1988, pp 411--423.Google ScholarGoogle ScholarCross RefCross Ref
  3. Applegate, L.M., McKenney, J.L., and McFarlan, F.W. Corporate Information Systems Management: Text and Cases McGraw-Hill Higher Education, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Attewell, P. "Technology Diffusion and Organizational Learning: The Case of Business Computing," Organization Science (3:1), 1992, pp 1--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ba, S., and Pavlou, P.A. "Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior," MIS Quarterly (26:3), 2002, pp 243--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bahmanziari, T., Pearson, J.M., and Crosby, L. "Is trust important in technology adoption? A policy capturing approach," The Journal of Computer Information Systems (43:4), 2003, pp 46--54.Google ScholarGoogle Scholar
  7. Bakos, J.Y., and Brynjolfsson, E. "Information technology, incentives, and the optimal number of suppliers," Journal of Management Information Systems (10:2), 1993, pp 37--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bensaou, M. "Interorganizational Cooperation: The Role of Information Technology an Empirical Comparison of U.S. and Japanese Supplier Relations," Information Systems Research (8:2), 1997, pp 107--124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bensaou, M., and Venkatraman, N. "Inter-organizational relationships and information technology: A conceptual synthesis and a research framework," European Journal of Information Systems (5:2), 1996, pp 84--91.Google ScholarGoogle ScholarCross RefCross Ref
  10. Boudreau, M.-C., Gefen, D., and Straub, D., W. "Validation in information systems research: A state-of-the-art assessment," MIS Quarterly (25:1), 2001, pp 1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bunduchi, R. "Business relationships in internet-based electronic markets: the role of goodwill trust and transaction costs," Information Systems Journal (15:4), 2005, pp 321--341.Google ScholarGoogle ScholarCross RefCross Ref
  12. Carr, N. "The End of Corporate Computing," MIT Sloan Management Review (46:3), 2005, pp 66--73.Google ScholarGoogle Scholar
  13. Chang, M.K., Cheung, W., and Lai, V.S. "Literature derived reference models for the adoption of online shopping," Information & Management (42:4), 2005, pp 543--559. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chellappa, R.K., and Pavlou, P.A. "Perceived information security, financial liability and consumer trust in electronic commerce transactions " Logistics Information Management (15:5-6), 2002, pp 358--368.Google ScholarGoogle Scholar
  15. Cheon, M., Grover, V., and Teng, J. "Theoretical Perspectives on the Outsourcing of Information Systems," Journal of Information Technology Theory and Application (JITTA) (10, 1995, pp 209--219.Google ScholarGoogle Scholar
  16. Chiles, T.H., and McMackin, J.F. "Integrating variable risk preferences, trust, and transaction cost economics," Academy of Management Review (21:1), 1996, pp 73--99.Google ScholarGoogle ScholarCross RefCross Ref
  17. Chin, W.W. "The Partial Least Squares Approach for Structural Equation Modeling," in: Modern Methods for Business Research, G.A. Marcoulides (ed.), Lawrence Erlbaum Associates, Mahwah, NJ, 1998, pp. 295--336.Google ScholarGoogle Scholar
  18. Chin, W.W., Marcolin, B.L., and Newsted, P.R. "A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study," Information Systems Research (14:2), 2003, pp 189--219. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chwelos, P., Benbasat, I., and Dexter, A., S. "Research report: Empirical test of an EDI adoption model," Information Systems Research (12:3), 2001, pp 304--321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Cropanzano, R., and Mitchell, M.S. "Social Exchange Theory: An Interdisciplinary Review," Journal of Management (31:6), 2005, pp 874--900.Google ScholarGoogle ScholarCross RefCross Ref
  21. Currie, Desai, B., and Khan, N. "Customer Evaluation of Application Services Provisioning in Five Vertical Sectors," Journal of Information Technology Theory and Application (JITTA) (19:1), 2004a, pp 39--58.Google ScholarGoogle ScholarCross RefCross Ref
  22. Currie, W. "A Knowledge-based Risk Assessment Framework for Evaluating Web-enabled Application Outsourcing Projects," International Journal of Project Management (21, 2003, pp 207--217.Google ScholarGoogle ScholarCross RefCross Ref
  23. Currie, W., L., Desai, B., and Khan, N. "Customer evaluation of application services provisioning in five vertical sectors," Journal of Information Technology (19:1), 2004b, pp 39--58.Google ScholarGoogle ScholarCross RefCross Ref
  24. Currie, W., and Seltsikas, P. "Delivering Business Critical Information Systems Through Application Service Providers: The Need for a Market Segmentation Strategy," International Journal of Innovation Management (5:3), 2001, pp 323--349.Google ScholarGoogle ScholarCross RefCross Ref
  25. Currie, W.L. "The organizing vision of application service provision: a process-oriented analysis," Information and Organization (14:4), 2004, pp 237--267.Google ScholarGoogle ScholarCross RefCross Ref
  26. Davies, M., and Prince, M. "Dynamics of Trust Between Clients and Their Advertising Agencies: Advances in Performance Theory," Academy of Marketing Science Review (2005:11), 2005, pp 1--32.Google ScholarGoogle Scholar
  27. De Looff, L. "Information Systems Outsourcing Decision Making: A Framework, Organizational Theories and Case Studies," Journal of Information Technology Theory and Application (JITTA) (10, 1995, pp 281--297.Google ScholarGoogle Scholar
  28. Doney, P., M., and Cannon, J., P. "An examination of the nature of trust in buyer-seller relationships," Journal of Marketing (61:2), 1997, pp 35--51.Google ScholarGoogle Scholar
  29. Dyer, J.H., and Chu, W. "The role of trustworthiness in reducing transaction costs and improving performance: empirical evidence from the United States, Japan, and Korea," Organization Science (14:1), 2003, pp 57--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Einwiller, S. "When Reputation Engenders Trust: An Empirical Investigation in Business-to-Consumer Electronic Commerce," Electronic Markets -- International Journal of Electronic Commerce Business Media (13:3), 2003, pp 196--210.Google ScholarGoogle ScholarCross RefCross Ref
  31. Ekanayaka, Y., Currie, W., and Seltsikas, P. "Delivering Enterprise Resource Planning Systems through Application Service Providers," Logistics Information Management (15:3), 2002, pp 192--203.Google ScholarGoogle ScholarCross RefCross Ref
  32. Ekanayaka, Y., Currie, W., and Seltsikas, P. "Evaluating application service Providers," Benchmarking: An International Journal (10:4), 2003, pp 343--354.Google ScholarGoogle ScholarCross RefCross Ref
  33. Franke, J., Stockheim, T., and König, W. "The impact of reputation on supply chains. An analysis of permanent and discounted reputation," Information Systems and eBusiness Management (3:4), 2005, pp 323--341.Google ScholarGoogle Scholar
  34. Ganesan, S. "Determinants of long-term orientation in buyer-seller relationships," Journal of Marketing (58:2), 1994, pp 1--19.Google ScholarGoogle ScholarCross RefCross Ref
  35. Gefen, D. "E-commerce: the role of familiarity and trust," Omega (28:6), 2000, pp 725--737.Google ScholarGoogle ScholarCross RefCross Ref
  36. Gefen, D. "Reflections on the dimensions of trust and trustworthiness among online consumers," Database for Advances in Information Systems (33:3), 2002, pp 38--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Gefen, D. "What Makes an ERP Implementation Relationship Worthwhile: Linking Trust Mechanisms and ERP Usefulness," Journal of Management Information Systems (21:1), 2004, pp 263--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Gefen, D. "A Practical Guide to Factorial Validity Using PLS-Graph: Tutotial and Annotated Example," Communications of the Association for Information Systems (16:Article 5), 2005, pp 91--109.Google ScholarGoogle Scholar
  39. Gefen, D., and Heart, T. "On the Need to Include National Culture as a Central Issue in E-Commerce Trust Beliefs," International journal of information management (14:4), 2006, pp 1--30.Google ScholarGoogle Scholar
  40. Gefen, D., Karahanna, E., and Straub, D., W. "Trust and TAM in online shopping: An integrated model," MIS Quarterly (27:1), 2003, pp 51--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Gefen, D., and Straub, D. "The Relative Importance of Perceived Ease-of-Use in IS Adoption: A Study of e-Commerce Adoption," Journal of the AIS (JAIS) (1:8), 2000, pp 1--30.Google ScholarGoogle Scholar
  42. Gefen, D., Straub, D., and Boudreau, M. "Structural Equation Modeling and Regression: Guidelines for research Practice," Communications of the Associations for Information Systems (CAIS) (4 article 7), 2000.Google ScholarGoogle Scholar
  43. Grazioli, S., and Jarvenpaa, S. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man and Cybernetics -- Part A: Systems and Humans (30:4), 2000, pp 395--410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Greenemeier, L. IT Security: The Data Theft Time Bomb Information week 2007 Available from, http://www.informationweek.com/showArticle.jhtml;jsessionid=PJZQW2ZKX4XO4QSNDLPSKHSCJUNN2JVN?articleID=201001203&queryText=accenture+security+survey+2007, {accessed August 7 2007}Google ScholarGoogle Scholar
  45. Grossman, M. "The Role of Trust and Collaboration in the Internet-enabled Supply Chain," Journal of American Academy of Business, Cambridge (5:1/2), 2004, pp 391--396.Google ScholarGoogle Scholar
  46. Gruman, G. The Truth about Software as a Service (SaaS). 2007 Available from, http://www.cio.com/article/109706/The_Truth_About_Software_as_a_Service_SaaS_, {accessed September 13 2008}Google ScholarGoogle Scholar
  47. Gupta, A., and Herath, S.K. "Latest trends and issues in the ASP service market," Industrial Management + Data Systems (105:1/2), 2005, pp 19--25.Google ScholarGoogle Scholar
  48. Hancox, M., and Hackney, R. "IT Outsourcing: Frameworks for Conceptualizing Practice and Perception," Information Systems Journal (10, 2000, pp 217--237.Google ScholarGoogle ScholarCross RefCross Ref
  49. Harney, J. "The New World of ASP," Cutter Consortium, Arlington, MA, pp. 5(9), 1--25, September 2004 2004.Google ScholarGoogle Scholar
  50. Hart, P., and Saunders, C. "Power and trust: Critical factors in the adoption and use of electronic data interchange," Organization Science (8:1), 1997, pp 23--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Heart, T., and Pliskin, N. "Is E-Commerce of IT Application Services (ASP) Alive and Well?," Journal of Information Technology Theory and Application (JITTA) (3:4), 2001, pp 33--41.Google ScholarGoogle Scholar
  52. Heart, T., and Pliskin, N. "Business-to-Business eCommerce of Information Systems: Two Cases of ASP-to-SME eRental," IMFORM (40:1), 2002a, pp 23--34.Google ScholarGoogle Scholar
  53. Heart, T., and Pliskin, N. "Renting Restaurant Applications from Application Service Providers," International Journal of Hospitality Information Technology (2:2), 2002b, pp 45--61.Google ScholarGoogle ScholarCross RefCross Ref
  54. Heart, T., Pliskin, N., and Curley, K. "Application Hosting as Means for Aligning Business and IT," International Journal of E-Business (5:2), 2007, pp 176--187.Google ScholarGoogle Scholar
  55. Henderson, J., and Venkatraman, N. "Strategic Alignment: Leveraging Information Technology for Transforming Organizations," IBM System Journal (32:1), 1993, pp 4--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Hill, C.W.L. "Cooperation, Opportunism, and the Invisible Hand: Implications for Transaction Cost Theory," Academy of Management Review (15:3), 1990, pp 500--513.Google ScholarGoogle ScholarCross RefCross Ref
  57. Hosmer, L.T. "Trust: The connecting link between organizational theory and Philosofical Ethics," Academy of Management. The Academy of Management Review (20:2), 1995, pp 379--409.Google ScholarGoogle ScholarCross RefCross Ref
  58. Iacovou, C.L., Benbasat, I., and Dexter, A.S. "Electronic data interchange and small organizations: Adoption and impact of technology," MIS Quarterly (19:4), 1995, pp 465--485. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Jarvenpaa, S., L., Shaw, T., R., and Staples, D.S. "Toward Contextualized Theories of Trust: The Role of Trust in Global Virtual Teams," Information Systems Research (15:3), 2004, pp 250--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Jarvenpaa, S., Tractinsky, N., and Vitale, M. "Consumer Trust in an Internet Store," Information Technology and Management (1:12), 2000, pp 45--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Kakabadse, A., and Kakabadse, N. "Application Service Providers (ASPs): New Impetus for Transformational Change," Knowledge and Process Management (9:4), 2002, pp 205--218Google ScholarGoogle ScholarCross RefCross Ref
  62. Kakabadse, N., K., and Kakabadse, A. "Critical review -- outsourcing: A paradigm shift," The Journal of Management Development (19:8), 2000, pp 670--728.Google ScholarGoogle ScholarCross RefCross Ref
  63. Kakabadse, N., K., Kakabadse, A., Ahmed, P., K., and Kouzmin, A. "The ASP phenomenon: an example of solution innovation that liberates organization from technology or captures it?," European Journal of Innovation Management (7:2), 2004, pp 113--127.Google ScholarGoogle ScholarCross RefCross Ref
  64. Karpinski, R. "Trust takes new meaning online," B to B (85:11), 2000, pp 12--13.Google ScholarGoogle Scholar
  65. Kern, T., Kreijger, J., and Willcocks, L. "Exploring ASP as Sourcing Strategy: Theoretical Perspectives, Propositions for Practice," Journal of Strategic Information Systems (11, 2002a, pp 153--177.Google ScholarGoogle Scholar
  66. Kern, T., Willcocks, L., and Lacity, M. "Application Service Provision: Risk Assessment and Mitigation," MIS Quarterly Executive (1:2), 2002b, pp 113--126.Google ScholarGoogle Scholar
  67. Khalifa, M. "SME Adoption of IT: The Case of Electronic Trading Systems," IEEE Transactions on Engineering Management (53:2), 2006, pp 275--284.Google ScholarGoogle ScholarCross RefCross Ref
  68. Kim, D., and Benbast, I. "Trust-Related Arguments in Internet Stores: A Framework for Evaluation," Journal of Electronic Commerce Research (4:2), 2003, pp 49--64.Google ScholarGoogle Scholar
  69. King, J.L., Gurbaxani, V., Kraemer, K.L., McFarlan, F.W., Raman, K.S., and Yap, C.S. "Institutional factors in information technology innovation," Information Systems Research (5:2), 1994, pp 139--169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Koller, M. "Risk as a Determinant of Trust," Basic & Applied Social Psychology (9:4), 1988, pp 265--276.Google ScholarGoogle ScholarCross RefCross Ref
  71. Kumar, N. "The Power of Trust in Manufacturer-Retailer Relationships," Harvard Business Review (74:6), 1996, pp 92--106.Google ScholarGoogle Scholar
  72. Lacity, M., and Hirschheim, R. "The Information Systems Outsourcing Bandwagon," Sloan Management Review (35:1), 1993, pp 73--86.Google ScholarGoogle Scholar
  73. Lim, K., H., Sia, C.L., Lee, M., K. O., and Benbasat, I. "Do I Trust You Online, and If So, Will I Buy? An Empirical Study of Two Trust-Building Strategies," Journal of Management Information Systems (23:2), 2006, pp 233--266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Lockett, N., Brown, D., H., and Kaewkitipong, L. "The Use of Hosted Enterprise Applications by SMEs: A Dual Market and User Perspective," Electronic Markets (16:1), 2006, pp 85--96.Google ScholarGoogle ScholarCross RefCross Ref
  75. Loh, L., and Venkatraman, N. "Determinants of Information Technology Outsourcing: A Cross-Sectional Analysis," Journal of Management Information Systems (9:1), 1992, pp 7--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Luhmann, N. Trust and Power Wiley & Sons, London, 1979.Google ScholarGoogle Scholar
  77. Mayer, R.C., Davis, J.H., and Schoorman, F.D. "An integration model of organizational trust," Academy of Management. The Academy of Management Review (20:3), 1995, pp 709--734.Google ScholarGoogle ScholarCross RefCross Ref
  78. McKnight, D.H., Choudhury, V., and Kacmar, C. "Developing and validating trust measures for e-commerce: An integrative typology," Information Systems Research (13:3), 2002, pp 334--359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. McKnight, D.H., Cummings, L.L., and Chervany, N.L. "Initial trust formation in new organizational relationships," The Academy of Management Review (23:3), 1998, pp 473--490.Google ScholarGoogle ScholarCross RefCross Ref
  80. McKnight, H.D., and Chervany, N.L. "What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology," International Journal of Electronic Commerce (6:2 ), 2001, pp 35--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Mustonen-Ollila, E., and Lyytinen, K. "How organizations adopt information system process innovations: a longitudinal analysis," European Journal of Information Systems (13:1), 2004, pp 35--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Nicolaou, A.I., and McKnight, D.H. "Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use," Information Systems Research (17:4), 2006, pp 332--351. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Paraskevas, A., and Buhalis, D. "Outsourcing IT for Small Hotels: The Opportunities and Challenges of Using Application Service providers," Cornell Hotel and Restaurant Administration Quarterly (43:2), 2002, pp 27--39.Google ScholarGoogle Scholar
  84. Patnasingam, P., Gefen, D., and Pavlou, P. "The role of facilitating conditions and institutional trust in electronic marketplaces," Journal of Electronic Commerce in Organizations (3:3), 2005, pp 69--82.Google ScholarGoogle ScholarCross RefCross Ref
  85. Pavlou, P., A., and Gefen, D. "Building Effective Online Marketplaces with Institution-Based Trust," Information Systems Research (15:1), 2004, pp 37--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Pavlou, P.A. "Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation," The Journal of Strategic Information Systems (11:3-4), 2002, pp 215--243.Google ScholarGoogle ScholarCross RefCross Ref
  87. Pavlou, P.A., and Gefen, D. "Psychological Contract Violation in online marketplaces: antecedents, consequences, and moderating role.(online business contracts)," Information Systems Research (16:4), 2005, pp 372--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Petter, S., Straub, D., and Rai, A. "Specifying Formative Constructs in Information Systems Research," MIS Quarterly (31:4), 2007, pp 623--656. Google ScholarGoogle ScholarCross RefCross Ref
  89. Podsakoff, P.M., MacKenzie, S.B., Jeong-Yeon, L., and Podsakoff, N.P. "Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies," Journal of Applied Psychology (88:5), 2003, pp 879--903.Google ScholarGoogle ScholarCross RefCross Ref
  90. Quinn, J., and Hilmer, F. "Strategic Outsourcing," Sloan Management Review (35:4), 1994, pp 43--55.Google ScholarGoogle Scholar
  91. Ramiller, N., C., and Swanson, E.B. "Organizing visions for information technology and the information systems executive response," Journal of Management Information Systems (20:1), 2003, pp 13--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Ratnasingam, P. "The importance of technology trust in Web services security," Information Management & Computer Security (10:5), 2002, pp 255--260.Google ScholarGoogle ScholarCross RefCross Ref
  93. Ratnasingam, P. "E-Commerce Relationships: The Impact of Trust on Relationship Continuity," International Journal of Commerce & Management (15:1), 2005, pp 1--16.Google ScholarGoogle ScholarCross RefCross Ref
  94. Ratnasingam, P. "A risk-control framework for e--marketplace participation: the findings of seven cases," Information Management & Computer Security (15:2), 2007, pp 149--166.Google ScholarGoogle ScholarCross RefCross Ref
  95. Ravichandran, T. "Organizational Assimilation of Complex Technologies: An Empirical Study of Component-Based Software Development," IEEE Transactions on Engineering Management (52:2), 2005, pp 249--268.Google ScholarGoogle ScholarCross RefCross Ref
  96. Rogers, E. Diffusion of Innovations, (3'rd ed.) The Free Press, New York, 1983.Google ScholarGoogle Scholar
  97. Sako, M., and Helper, S. "Determinants of trust in supplier relations: Evidence from the automotive industry in Japan and the United States," Journal of Economic Behavior & Organization (34:3), 1998, pp 387--417.Google ScholarGoogle ScholarCross RefCross Ref
  98. Scott, J., E. "Measuring dimensions of perceived e-business risks," Information Systems and eBusiness Management (2:1), 2004, pp 31--55.Google ScholarGoogle Scholar
  99. Seligman, L. "Sensemaking throughout adoption and the innovation-decision process," European Journal of Innovation Management (9:1), 2006, pp 108--120.Google ScholarGoogle ScholarCross RefCross Ref
  100. Shapiro, S.P. "The Social Control of Impersonal Trust," American Journal of Sociology (93:3), 1987, pp 623--658.Google ScholarGoogle ScholarCross RefCross Ref
  101. Sigala, M. "The ASP-Qual model: measuring ASP service quality in Greece," Managing Service Quality (14:1), 2004, pp 103--114Google ScholarGoogle ScholarCross RefCross Ref
  102. Smith, A., and Rupp, W. "Application Service Providers (ASP): Moving Downstream to Enhance Competitive Advantage," Information Management and Company Security (10:2), 2002, pp 64--72.Google ScholarGoogle ScholarCross RefCross Ref
  103. Soliman, K. "A Framework for Global IS Outsourcing by Application Service Providers," Business Process Management Journal (9 6), 2003, pp 735--744.Google ScholarGoogle ScholarCross RefCross Ref
  104. Son, J.--Y., and Benbasat, I. "Organizational Buyers' Adoption and Use of B2B Electronic Marketplaces: Efficiency- and Legitimacy-Oriented Perspectives," Journal of Management Information Systems (24:1), 2007, pp 55--99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Spector, P., E. "Method Variance in Organizational Research: Truth or Urban Legend?," Organizational Research Methods (9:2), 2006, pp 221--232.Google ScholarGoogle ScholarCross RefCross Ref
  106. Susarla, A., Barua, A., and Whinston, A. "Understanding the Service Component of Application Service Providers: An Empirical Analysis of Satisfaction with ASP Service," MIS Quarterly (27:1 ), 2003, pp 91--123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Swanson, B.E., and Ramiller, N.C. "The Organizing Vision in Information Systems Innovation," Organization Science (8:5), 1997, pp 458--474.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Swanson, E.B. "Information systems innovation among organizations," Management Science (40:9), 1994, pp 1069--1092. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Tallon, P., P., Kraemer, K., L., and Gurbaxani, V. "Executives' perceptions of the business value of information technology: A process-oriented approach," Journal of Management Information Systems (16:4), 2000, pp 145--173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Tao, L. "Shifting Paradigms with ASP Model," Computer (34:10), 2001, pp 32--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Tirole, J. "A Theory of Collective Reputations " Review of Economic Studies (63:214), 1996, pp 1--22.Google ScholarGoogle ScholarCross RefCross Ref
  112. Tornatzky, L.G., and Fleischer, M. The Process of Technological Innovation Lexington Books, Lexington, MA, 1990.Google ScholarGoogle Scholar
  113. Walsh, K. "Analyzing the ASP Concept: Technologies, Economies, and Strategies," Communications of the ACM (46 8), 2003, pp 103--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Williamson, O. "Transaction Cost Economics: The Governance of Contractual Relations," The Journal of Law and Economics (22:2), 1979, pp 233--261.Google ScholarGoogle ScholarCross RefCross Ref
  115. Williamson, O. The economic institutions of capitalism The Free Press, New--York, 1985.Google ScholarGoogle Scholar
  116. Wing, S.C., and Angie, N.K.O. "A Study of Trust in E-Shopping Before and After First-Hand Experience is Gained," The Journal of Computer Information Systems (46:4), 2006, pp 125--130.Google ScholarGoogle Scholar
  117. Yao, J., E., Xu, X., Liu, C., and Lu, J. "Organizational size: A significant predictor of it innovation adoption," The Journal of Computer Information Systems (43:2), 2002, pp 76--82.Google ScholarGoogle Scholar
  118. Zaheer, A., McEvily, B., and Perrone, V. "Does Trust Matter? Exploring the Effects of Interorganizational and Interpersonal Trust on Performance," Organization Science (9:2), 1998, pp 123--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Zand, D.E. "Trust and Managerial Problem Solving," Administrative Science Quarterly (17:2), 1972, pp 229--239.Google ScholarGoogle ScholarCross RefCross Ref
  120. Zhu, K., and Kraemer, K., L. "Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry," Information Systems Research (16:1), 2005, pp 61--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Zhu, K., Kraemer, K., and Xu, S. "Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors," European Journal of Information Systems (12:4), 2003, pp 251--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Zucker, L. "Production of Trust: Institutional Sources of EconomicGoogle ScholarGoogle Scholar

Index Terms

  1. Who is out there?: exploring the effects of trust and perceived risk on saas adoption intentions

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader