Now showing 1 - 2 of 2
  • Publication
    Why Different Trust Relationships Matter for Information Systems Users
    (Operational Research Society, 2016-05-01) ;
    Hoffmann, Axel
    ;
    Technology acceptance research has shown that trust is an important factor fostering use of information systems (IS). As a result, numerous IS researchers have studied factors that build trust in IS. However, IS research on trust has mainly focused on user's trust in the IS itself, neglecting other targets of trust that might also drive IS use from a user's point of view. Accordingly, we investigate the importance of different targets of trust in IS use. Therefore, we use the concept of a network of trust and identify four different targets of trust that are prevalent. Afterwards, we develop our research model and evaluate it using a free simulation experiment. The results show that multiple targets of trust are important in the context of IS use. In particular, we highlight the importance of a second target - trust in the provider - which is equally important as trust in the IS itself. Consequently, IS providers should focus not only on fostering users' trust in their IS but also on positioning themselves as trustworthy providers. Additionally, we show that a third target - trust in the Internet - has significant indirect effects on important constructs in the context of IS use.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 145
  • Publication
    Understanding the Development of Trust: Comparing Trust in the IT Artifact and Trust in the Provider
    (Academy of Management, 2016) ;
    Pavlou, Paul
    ;
    The importance of trust has been shown in numerous studies in the IS discipline, including but not limited to IT adoption and diffusion. Although researchers agree that trust is not only relevant for one-time interactions, but that trust develops gradually during an interaction and needs to be maintained over time, most studies rely on research designs that only capture a cross-sectional snapshot of trust development. We aim to address this gap in the trust literature by conducting a five-wave longitudinal field study to investigate how trust in a new IT artifact – a new student information system – and trust in the provider of the system emerges. The results of our latent growth modeling analysis indicate that trust in a new IT artifact develops as follows. First, the users confirm whether their level of initial trust was correct and adapt their level of trust accordingly. Next, the users start to build trust, resembled by a linear growth in trust. Finally, trust stops to increase and remains stable. Furthermore, this development does not vary comparing new and experienced users. For trust in the provider, the results differ between new versus experienced users. New users also confirm whether their level of initial trust was correct and adapt their level of trust in the provider accordingly. Next, new users start building trust, but the trust-building process is characterized by a quadratic growth. In contrast, for experienced users, we observed a constant linear growth throughout the study. Based on our results, a sixth stage called confirmation of initial trust should be added into the trust lifecycle in between the stages of initial trust building and trust building.