consumers' trust in electronic commerce transactions: the role of

38
Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security Ramnath K. Chellappa Goizueta Business School, Emory University Atlanta, GA 30322-2710 [email protected] Acknowledgement I am greatly indebted to Omar El Sawy and Ann Majchrzak for their guidance and suggestion, and I would like to thank Ricky Lim and Raymond for their help with the data analysis.

Upload: others

Post on 11-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Consumers' Trust in Electronic Commerce Transactions: The Role of

Consumers’ Trust in Electronic Commerce Transactions: The Role

of Perceived Privacy and Perceived Security

Ramnath K. Chellappa Goizueta Business School, Emory University Atlanta, GA 30322-2710

[email protected]

Acknowledgement

I am greatly indebted to Omar El Sawy and Ann Majchrzak for their guidance and suggestion,

and I would like to thank Ricky Lim and Raymond for their help with the data analysis.

Page 2: Consumers' Trust in Electronic Commerce Transactions: The Role of

Consumers’ Trust in Electronic Commerce Transactions: The Role of

Perceived Privacy and Perceived Security Abstract

Consumers’ trust in their online transactions is vital for the sustained progress and development

of electronic commerce. Our paper proposes that in addition to known factors of trust such a

vendor’s reputation, consumers’ perception of privacy and security influence their trust in online

transactions. Our research shows that consumers exhibit variability in their perceptions of

privacy, security and trust between online and offline transactions even if it is conducted with the

same store. We build upon this finding to develop and validate measures of consumers'

perceived privacy and perceived security of their online transactions which are then theorized to

influence their trust in EC transactions. We propose that the perceptions of privacy and security

are factors that affect the consumers’ trust in the institutional governance mechanisms underlying

the Internet. We conduct two distinct empirical studies and through successive refinement and

analysis using the Partial Least Squares technique, we test our hypothesized relationships while

verifying the excellent measurement properties associated with our instrument. Our study finds

that the consumers’ perceived privacy and perceived security are indeed distinct constructs but

the effect of perceived privacy on trust in EC transactions is strongly mediated by perceived

security. A major implication of our findings is that while the much studied determinants of

trust such as reputation of the transacting firm should not be neglected, vendors should also

engage in efforts to positively influence consumer perceptions of privacy and security. We

discuss the significance of this observation in the context of increasing importance in acquiring

customer information for personalization and other online strategies.

Keywords: electronic commerce, perceived security, perceived privacy, online trust, PLS

ISRL Categories: AA01, AI0104, AI0401, AI0610

2

Page 3: Consumers' Trust in Electronic Commerce Transactions: The Role of

Consumers’ Trust in Electronic Commerce Transactions: The Role of

Perceived Privacy and Perceived Security

1 Introduction

There is overwhelming evidence that trust in the online environment is an important element of

electronic commerce (EC) relationships and the importance of studying online trust is

underscored by many recent studies [Hoffman, 1999 #51;Jarvenpaa, 2000 #56]. In any

consumer transaction online there are two interacting elements, namely the entity with whom the

consumer is transacting with, i.e. the online vendor and the medium on which the transaction is

taking place, i.e. the Internet. This paper proposes that in addition to a consumer’s trust in a

vendor [Mayer, 1995 #69;McKnight, 2002 #184], the overall trust in a EC transaction is also

influenced by a consumer’s perception of risk to the EC transaction due to the nature of

supporting infrastructure. We identify this consumer perception of risk in the EC transaction as

being caused by the consumer’s perception of risk to the privacy of her EC transaction and the

consumer’s perception of risk to the security of her transaction. We then formalize two

constructs namely a consumer’s perceived privacy of her EC transaction and her perceived

security of the EC transaction and through the development of theoretically grounded scales to

measure these perceptions we hypothesize their effect on the consumer’s trust in the EC

transaction. While the explanations provided by constructs developed for trust in offline

environments hold good in the online context as well, characteristics of the online medium i.e.,

the Internet itself, can influence a consumer’s trust [Keen, 2000 #192] and given that trust itself

is a context dependent construct [Gulati, 1995 #191] it is imperative that the characteristics of the

transacting medium is accounted for.

3

Page 4: Consumers' Trust in Electronic Commerce Transactions: The Role of

Security and privacy concerns of transactions are not new concepts [Westin, 1967 #106].

Consumers have always been concerned about using debit cards at not-so-reputable merchants,

and have often had their privacy invaded in the form of direct marketers who somehow obtained

their telephone numbers. However, with the advent of electronic commerce, the scale, scope and

immediacy of security and privacy issues have compounded many times over [Clarke, 1988

#24;Mason, 1986 #68]. The importance of studying the constructs of security and privacy has

been underscored by research in marketing as well. It has been argued that enhancing favorable

security and privacy perceptions [Friedman, 2000 #41;Shneiderman, 2000 #91] and building

trust [Hoffman, 1996 #50;Keen, 2000 #60] are very important for sustained activity in the

electronic business frontier. Numerous academic, governmental, and managerial articles also

suggest that there is an increased consumer concern for the privacy and security of EC

transactions [FTC, 1998 #26;Gilbert, 2001 #45]. Issues involving security and privacy have

made many consumers hesitant to transact online [FTC, 1998 #27;Meeks, 2000 #70] and in fact,

over half of the respondents in a sample of Americans nationwide said that privacy and security

are their biggest concerns about EC [Cox, 1999 #112]. According to a study in Business Week

[BusinessWeek, 2000 #19], 61% of the survey respondents would conduct transactions on the

Internet if the security and privacy of their personal information could be adequately protected.

However there is no academic research that has explored if these privacy and security concerns

online are any different from their offline counterpart and if the online concerns affect a

consumer’s decision to engage in an EC transaction.

4

Page 5: Consumers' Trust in Electronic Commerce Transactions: The Role of

In order to compare consumer perceptions of privacy and security of online and offline

transactions, it is first important to understand how consumers develop these perceptions. Hence

we incorporate theories from information systems, marketing and public policy, and we develop

and refine scales to measure consumer perceptions of privacy and security. Subsequently we test

the two primary hypotheses of this research that 1. Consumers perceive that the security and

privacy of their transactions are higher offline than online and that 2. Online consumers’

perceptions of privacy and security influence their trust in electronic commerce transactions.

This paper proceeds as follows: Section 2 provides the conceptual development of consumer

perceptions of trust, security and privacy in the online environment through a review of relevant

literature and hypothesizes the relationship between the constructs. Following this, in section 3,

we present the development and testing of our scales through an analysis of two empirical

studies. Section 4 provides a discussion of our results and outlines the study's theoretical and

managerial implications. A series of recommendations are also made for future EC research and

practice.

2. Theory and hypotheses

In any consumer-vendor context it is important to study trust as it reflects consumer perceptions

of uncertainty and risk and their willingness to engage in trust related behavior [McKnight, 2002

#184]. Now consider a consumer who buys a DVD player from BestBuy (the physical store)

and a television from BestBuy.com (the online store), and has hence provided the stores with

his/her (for simplicity sake, from here-on we shall use the pronoun “she” to refer to the

consumer) financial and other personal information. Given that the consumer has transacted

with both the online and offline form of the same store, would it be correct to assume that

consumer has the same level of trust in both transactions? This question is motivated by the fact

5

Page 6: Consumers' Trust in Electronic Commerce Transactions: The Role of

that while the BestBuy physical store does not send an employee along with every customer to

monitor what they are looking at; BestBuy.com indeed does that through cookies and other

tracking mechanisms. If the level of trust varies in the two transactions, then what are the factors

that contribute to this difference?

Literature on consumers’ use of the Internet argues that consumers are concerned about the risk

involved in conducting online transactions [Jarvenpaa, 2000 #56;Hoffman, 1999 #51;Miyazaki,

2000 #72]. While there are many definitions and operationalization of risk in marketing [Mayer,

1995 #69] and IS literature [Grazioli, 2001 #193], our goal in this paper is to identify the factors

that contribute to the risk perceptions involved in online transactions. Keeping in mind that the

inherent risk in electronic commerce transactions is compounded by the spatial and temporal

separation of the transacting entities [Brynjolfsson, 2000 #18;Hoffman, 1999 #51], and given

that prior research finds that consumer's perception of risk is related to trust [Koller, 1988

#61;Gambetta, 1988 #166], we first provide the intuitions behind the development of trust in

online transactions.

2.1 Trust in EC transactions

Trust has been studied by researchers in a variety of different fields from sociology [Shapiro,

1987 #88] to marketing [Doney, 1997 #38;Ganesan, 1994 #43] to information systems

[Jarvenpaa, 1999 #140;Jarvenpaa, 2000 #56;McKnight, 2002 #184]. In this paper we are

interested in studying consumer trust in EC transactions that falls into the category of trust in

consumer-vendor relationships which has largely been studied in marketing literature [Schurr,

1985 #87], albeit in offline interactions. More recently both IS and marketing literature has

suggested that trust assumes great significance in EC transactions as well as they are conducted

6

Page 7: Consumers' Trust in Electronic Commerce Transactions: The Role of

in uncertain environments [Fung, 1999 #42], and the development of trust between consumers

and marketers is critical for the continued growth of EC [Jarvenpaa, 2000 #56;Palmer, 2000

#144;Fontenot, 1998 #39]. Along these lines McKnight et al [, 2002 #184], develop trust

measures for EC by integrating literature from a wide variety of fields including sociology,

organization theory, marketing and information systems.

In any consumer transaction online or offline, there are two interacting elements, namely the

entity with whom the consumer is transacting with, i.e. the merchant and the medium or the

infrastructure that supports the transaction. This paper takes position that while an individual’s

(consumer’s) disposition to trust [McKnight, 2002 #184], trusting intentions [Currall, 1995 #194]

and other trust-related behaviors [Anderson, 1990 #195] have been studied in the context of EC

along with the consumer perceptions of a vendor’s trustworthiness [McKnight, 2002 #184], the

nature of trust specifically with regards to medium of transaction has been some-what less

understood. Even the research that studies trust in the EC context it should be noted here that

trust itself has been studied in the EC context, but primarily from the perspective of trust in the

transacting online store [Jarvenpaa, 1999 #140;Jarvenpaa, 2000 #56]. A recent research finds

that trust in Internet shopping may indeed be affected by infrastructural contextual factors such

as security [McKnight, 2002 #184] and this is supported by earlier work in sociology and

marketing that has maintained that trust is a context dependent construct [Luhmann, 1988

#167;Zucker, 1986 #169] and is also a function of the institutional environment where the trustee

and trustor interact [Zucker, 1986 #169]. Along these lines our paper argues that even if a

consumer transacts with the same entity (e.g., a BestBuy physical store and a BestBuy.com

7

Page 8: Consumers' Trust in Electronic Commerce Transactions: The Role of

online store), she may display differences in the level of trust in the transaction due to

differences in the platform or institutional setup that supports these transactions.

The notion of institution-based trust has its origin in sociology [Barber, 1983 #196;Zucker, 1986

#169] and deals with structures that make an environment trustworthy [Garfinkel, 1963

#197;Shapiro, 1987 #88;Zucker, 1986 #169]. McKnight et al, [, 1998 #199] integrate various

sources of institution-based trust and identify two dimensions namely, structural assurance and

situational normality. Structural assurances include contextual conditions that act as promises,

contracts, regulations and guarantees while situational normality may involve a properly ordered

setting that appears likely to facilitate a successful interaction [McKnight, 1998 #199].. In this

regard, McKnight et al [, 2002 #184] liken the Web to be the 21st century equivalent of the

lawless “wild wild west” of the 19th century. Such a perception is supported by numerous media

reports of break-ins and instances of credit-card and other personal information being stolen

[Judge, 1998 #58]. Thus, when a consumer conducts a transaction with an online store that is

characterized to be operating in an uncertain environment [Fung, 1999 #42] such as the Internet,

she is less likely to trust that everything about her transaction is assured and normal as compared

to her transactions with an offline store. Therefore, we propose that:

Hypothesis 1: A consumer’s trust in her online transaction is lesser than her trust in an offline

transaction.

Now it is important to examine the factors that contribute to perceptions regarding structural

assurance and situational normality. Any commercial transaction involves sharing of

information between the transacting parties and hence the total trust exhibited by the consumer in

8

Page 9: Consumers' Trust in Electronic Commerce Transactions: The Role of

conducting a transaction can be considered to be a combination of trust in the trustee or the

vendor and trust that the environment will guarantee the integrity of the transaction. We propose

that this guarantee and belief that every aspect of the transaction will be as expected to be

determined by the consumers’ perception of risk to their privacy and security of information.

Thus the overall trust in EC transactions is a consumer's subjective evaluation of both the entity's

characteristics [Beccera, 1999 #8] and risk created by security and privacy perceptions.

Consumers who provide personal information during transactions assume the risk of having this

information endangered. Risk has been defined 'the possibility of an adverse outcome, and

uncertainty over the occurrence, timing or magnitude of that adverse outcome' [Covello, 1994

#30]. In addition to any risk associated with transacting with a particular vendor, risk in EC

transactions is essentially created by threats to transfer of information; specifically, threats to

information privacy and security. Prior research has defined trust in terms of acceptance of risk

[Sheppard, 1998 #186], and hence it could be argued that the degree of trust a consumer

develops in the EC transaction is indicative of the degree of risk to the security and privacy of

the transaction that the consumer has accepted. In the following sub-sections we develop the

constructs of perceived privacy and perceived security as a manifest of this acceptance of risk.

2.2 Perceived Privacy

Research in IS and marketing has argued that information privacy and consumer concerns

thereof is one of the most important issues in today’s technology based environment [Stewart

#198;Miyazaki, 2000 #72;Miyazaki, 2001 #185]. The concept of privacy is in itself not new and

it has generally been defined as an individual's ability to control the terms by which their

personal information is acquired and used [Westin, 1967 #106]. Prior research on privacy found

that consumers might be willing to disclose personal information in exchange for some apparent

9

Page 10: Consumers' Trust in Electronic Commerce Transactions: The Role of

benefits [Culnan, 1999 #34]. According to the authors, consumers are also likely to provide

personal information if they believe they have control over this information, the information

requested is relevant, and it is likely to create valid inferences about their preferences. Privacy

has also been discussed in much detail from an individual’s viewpoint and as organizational

practices [Culnan, 1995 #33;Culnan, 2000 #35;Smith, 1996 #93]. Loss of privacy includes (a)

sharing personal information with others that were not part of the original transaction without the

consumer’s consent, and (b) merging transaction and demographic data to create consumer

profiles without the consumer’s knowledge [Foxman, 1993 #40;Godwin, 1991 #48].

In measuring the concern for information privacy (albeit of individual’s concern of organization

practices), the instrument (Concern for Information Privacy - CFIP) developed by Smith, et al. [,

1996 #93] is the first, and it identifies four factors namely collection, errors, secondary use and

unauthorized access as the dimensions of an individual’s concern for privacy. Later research has

argued that “CFIP needs to reinvestigated in light of emerging technology, practice and

research,” [Stewart, 2002 #198], who also suggest that “CFIP itself maybe more parsimoniously

represented as a higher-order factor rather than a set of correlated first-order factors.” This view

is supported by others who suggest that privacy measurement itself needs re-examination in

varying consumer contexts, and argue that in addition to CFIP, a validated scale to measure

overall privacy attitudes is needed [Culnan, 1999 #34]. Subsequently an individual’s concern

for privacy has been shown to be a higher-order factor that can be used in conjunction with other

variables such the computer anxiety of an individual in a CFIP nomological network [Stewart,

2002 #198]. On the other hand it has also been argued that organizations can employ

“procedural fairness,” to reduce consumers’ privacy concerns leading to trust building [Culnan,

10

Page 11: Consumers' Trust in Electronic Commerce Transactions: The Role of

1999 #34]. Similarly other marketing research observes that consumers’ privacy concern is

governed by environment control and secondary use of information control [Hoffman, 1999

#52]. The former refers to a consumer’s ability to controls actions of other parties in a

transactional environment while the latter implies that ability to control the subsequent use of

any information provided during a transaction.

As individual consumers may not be able fully exercise their beliefs regarding privacy and given

its importance in sustained commercial activities, the safeguard of information privacy in

commercial transactions has fallen into the domain of governmental entities such as the United

States Information Infrastructure Task Force (IITF) which first came up with a recommended set

of principles for providing and using personal information [IITF, 1995 #54]. Subsequently, the

Clinton Administration underscored the importance of privacy for the successful emergence of

EC [Clinton, 1997 #25]. Since then the Federal Trade Commission's Bureau of Consumer

Protection, which is the de facto governmental body in charge of privacy initiatives, has

submitted various reports to the US Congress resulting in governmental guidelines for what

constitutes adequate privacy in EC [FTC, 2000 #28;FTC, 2000 #127]. These guidelines known

as the Fair Information Practices [Gillin, 2000 #46] are built upon testimonials of researchers in

this field and prior findings. For example, consistent with the CFIP scale developed by Smith, et

al, [, 1996 #93], the guidelines incorporate rules that define how vendors should collect

information, how they should fix any errors regarding personal information, how they should

inform consumers regarding subsequent use of the information and how the vendors should

prevent any unauthorized access to information. Similarly consistent with findings of Culnan

and Armstrong [, 1999 #34] and Hoffman, et al, [, 1999 #52], the guidelines require that vendors

11

Page 12: Consumers' Trust in Electronic Commerce Transactions: The Role of

should provide the consumer control over all aspects of information collection and usage. The

guidelines can be summed up into five principle actions namely, notice, choice, access, integrity,

and enforcement. First, notice requires that disclosure notices inform online consumers about

how their information will be collected. Second, choice requires that online consumers have a

choice about how their information will be used and to which parties it will be disclosed. Third,

access requires that online consumers have the opportunity to exercise control over their

information. Fourth, integrity requires adequate mechanisms are employed to protect of online

consumer information from unauthorized use. Finally, enforcement requires that there is an

effective authority to enforce and impose sanctions for potential violations.

Given that the above principles incorporate all elements pointed out by both IS [Smith, 1996

#93] and marketing [Hoffman, 1999 #52;Miyazaki, 2000 #72] research, it would suggest that if a

vendor complied with these principles and if a consumer conducts a transaction with the vendor,

then the consumer has no more concern for her information privacy vis-à-vis her transaction with

that particular vendor. However our research argues that this is indeed not the case as

consumers may still hold subjective beliefs regarding how their information provided during a

transaction is handled. We refer to this subjective belief as perceived privacy of a transaction that

is defined as the “the subjective probability with which consumers believe that the collection and

subsequent access, use, and disclosure of their private and personal information is consistent

with their expectations.” Note that our intention is not to re-validate the concern for privacy

instrument as it pertains to an individual, rather our goal is to understand perceptions of privacy

in commercial relationships (e.g., consumer-vendor relationships) where it is required that all

individual concerns of privacy are fully addressed through disclosure. Our definition points out

12

Page 13: Consumers' Trust in Electronic Commerce Transactions: The Role of

that perceived privacy reflects the amount of consumers’ belief that the institutional setup allows

for the privacy of their transaction to maintained as promised.

As opposed to an offline transaction, in any EC transaction, not only is personal information

about a consumer acquired but information about her browsing and shopping preferences can

also be collected even if no financial transaction takes place. For example, in the example of

BestBuy.com, the online store can construct a reasonably accurate consumer profile that is only

possible if the physical store BestBuy attached a camera and processor to every customer who

steps into the store following them into every aisle they visit and every product they lift from the

shelves [Chellappa, 2002 #187]. While the offline store may have access only to the financial

transaction information, the information collected online broadly falls into three categories: a.

Anonymous information, that refers to information gathered about page visits, without the use of

any invasive technologies, typically the standard information sent with any Web or Internet

request. Such information includes a machine's IP address, domain type, browser version and

type, operating system, browser language, and local time. b. Personally non-identifying

information, that refers to "information that, taken alone, cannot be used to identify or locate an

individual.” It mainly refers to information such as age, date of birth, gender, occupation,

education, income, ZIP Code with no address, interest and hobbies. The consumer through radio

buttons, menus or check boxes on a Web page has to explicitly disclose most of this information.

In addition to solicited information, this category also often involves the use of sophisticated

tracking technologies, e.g., cookies, clear gifs, etc. Such technologies, though not identifying a

customer individually, enable the information collecting entity to sketch an effective customer

profile. c. Personally identifying information that refers to information that can be used to

13

Page 14: Consumers' Trust in Electronic Commerce Transactions: The Role of

identify or locate an individual. These include email addresses, name, address, phone number,

fax number, credit card number, social security number, etc. Invariably, such information is

almost always gathered explicitly from the customer and is typically collected when consumers

register with Web sites [Chellappa, 2002 #187]. The cumulative effect of these information

types can be more telling on the privacy of the consumer as information across categories can be

combined, allowing for use of information in ways that were not feasible or practical before

[Culnan, 1999 #34]. Given that consumers part with minimal information in the offline

environment as opposed to the online one, it is reasonable to expect that their perception of risk

to their privacy offline is lesser than its online counterpart, i.e. consumers’ perceived privacy of

offline transaction is greater than privacy perceptions of offline transaction. Hence we have:

Hypothesis 2: A consumer’s perceived privacy of her online transaction is lesser than her

perceived privacy of her offline transaction

From a practical perspective, it is now important to question the role of this perceived privacy,

i.e. what element of a commercial transaction does this influence? In this regard, we find that

prior research indicates that factors such as “procedural fairness” builds impersonal trust and

finds that when vendors act on behalf of consumer concerns and incorporates fair practices, then

consumers become more trusting of that vendor [Culnan, 1999 #34]. Similarly Hoffman et al. [,

1999 #51] point that consumers’ ability to control information collection and usage can reduce

the risk associated with Internet usage. Given that during any transaction, the degree of trust an

individual forms toward the interacting entity is a function of the degree of risk that is involved

in the situation [Koller, 1988 #61], it can be argued that the perceptions of risk to the privacy of

their information in an online transaction is related to the trust in that online environment. This

14

Page 15: Consumers' Trust in Electronic Commerce Transactions: The Role of

view also finds support in other findings that suggest that privacy is a major factor in EC trust

[Friedman, 2000 #41;Shneiderman, 2000 #91]. McKnight et al, [, 2002 #184] also suggest that

factors such as trusted-third parties (e.g., third party icons like Truste) may not affect beliefs

about a specific vendor rather they may influence the trust perceptions about the Internet.

Hypothesis 3: A consumer’s perceived privacy of her online transaction positively contributes to

her trust in her online transaction

2.3 Perceived Security

The open nature of the Internet and its unregulated global nature have heightened concerns about

transaction security [Fung, 1999 #42]. From the perspective of the online institutional

infrastructure, i.e., the Internet, structural assurances regarding privacy and security and security

of a transaction are distinct constructs. While privacy enforcement is largely through legal

mechanisms such as alliances with monitoring agencies (e.g., Truste, WEBcpa, BBBonline),

fines stipulated by the FTC and legal disclosure notices, enforcement of security is largely a

function of technological actions undertaken. In fact the US government has enacted two

separate acts namely the E-Privacy act (S. 2067) and the Secure Public Networks act (S. 909) to

regulate privacy and security in electronic commerce. From a consumer’s perspective perceived

security of an electronic commerce transaction may be defined as “the subjective probability

with which consumers believe that their personal information (private and monetary) will not be

viewed, stored, and manipulated during transit and storage by inappropriate parties in a manner

consistent with their confident expectations.” Just as consumers may have various beliefs

regarding the privacy of their online transactions even if vendors provide assurance regarding all

aspects of an individual’s concern for privacy, consumers may also possess different beliefs

regarding the security of their online transaction even if all security enforcements are in place.

15

Page 16: Consumers' Trust in Electronic Commerce Transactions: The Role of

The real security of an EC transaction itself can be scientifically guaranteed with adequate

encryption, digital signatures and third party authentication, and such methods [Bhimani, 1996

#180] have been addressed in great detail by trade and computer science literature

[Varadharajan, 1997 #103;US Congress, 1997 #161;US Congress, 1997 #160]. However

consumer perception of security online is altogether a different matter, and at present there is

relatively little research on this subject [Lee, 2001 #190]. The perceptions or concerns of

security by users of electronic systems was first addressed by IS research [Carr, 1987

#154;Benson, 1983 #155;White, 1987 #156;Goodhue, 1991 #157], specifically in the context of

organizational systems [Goodhue, 1991 #157]. With regards to security concerns of online

consumers recent research points out that consumer perceptions of unsatisfactory security on the

Internet continues to exist even when vendors undertake security enforcement mechanisms

[Zellweger, 1997 #189;Miyazaki, 2001 #185]. For instance, a 128-bit encryption objectively

gives the odds of a hacker decrypting a message as one in 2128. Clearly it is unlikely that an

average consumer would exactly perceive this probability or its role. Also consumers implicitly

accept certain elements such as the identity of the entities they are transacting with in traditional

environments; hence, conventional assumptions are can rightfully be questioned by a consumer

in electronic transactions. For example, the familiarity of a ‘Sears’ logo is often satisfactory

enough for consumers to assure that they are indeed at the actual ‘Sears’ department store. In

cases where the consumer is not familiar with the store location, a yellow pages reference often

suffices. In contrast, this experiential aspect of the transaction is clearly not present in the online

world. It is not only easy for someone to create a phony Web page, but it is also equally possible

for a malicious operator to create entirely spurious Web site. Do all consumers to know that

16

Page 17: Consumers' Trust in Electronic Commerce Transactions: The Role of

Citibank is housed at ‘www.citibank.com’ and not at ‘www.citibank.net’ or even that Citibank is

spelt with an “i” and not a “y” as in Citybank? Indeed there are many examples of sites that have

actually benefited from typographical errors [Sullivan, 2000 #114]. Hence we propose that:

Hypothesis 4: A consumer’s perceived security of her online transaction is lesser than her

perceived security of her offline transaction

Similar to the fair information practices principle, in the EC context, all online vendors today are

required to employ online security enforcement principles of encryption, protection, verification

and authentication [Chellappa, 2002 #188]. These mechanisms protect consumer data from

being viewed or modified and ensure that only the appropriate entities (e.g., vendor, credit card

authorizer – visa, bank) have access to consumer data. The enforcement principles contribute to

ensuring that typical guarantees regarding financial and other transactions are met, and

expectations consistent with normal commercial transactions are maintained. In other words

consumer perceptions of these security enforcement principles lead to their beliefs regarding

situational normality and structural assurance, and hence contribute to their trust perceptions

regarding EC transactions. Hence we propose:

Hypothesis 5: A consumer’s perceived security of her online transaction positively contributes to

her trust in her online transaction.

Even if privacy and security of a transaction are enforced through distinct principles, it is

possible that consumers may perceive security and privacy to be somewhat related concepts

[Jones, 1991 #57]. Such a view merits attention as even researchers in marketing have

considered consumer perceptions of risk to security and privacy of their transaction as being

17

Page 18: Consumers' Trust in Electronic Commerce Transactions: The Role of

somewhat equivalent [Miyazaki, 2001 #185]. An average consumer may believe that all

structural assurances can be guaranteed if the security of the transaction can be guaranteed. This

implies that only perceptions of security influences trust in EC transaction and any role of

privacy perceptions on trust in EC transactions is mediated by the consumer’s perceived security.

Our research proposes that perceived privacy and perceived security are indeed distinct

constructs but we need to consider the possibility of mediated effect on trust in EC.

Hypothesis 6: The influence of a consumer’s perceived privacy of her online transaction on trust

is mediated by her perceived security.

2.4 Controlling for trust in the transacting entity

Trust in the online merchant is the element of online trust that has been most studied and found

to be a significant factor in the overall trust towards online shopping [Jarvenpaa, 2000 #56;Lee,

2001 #190]. However, as discussed earlier, our paper is interested in isolating the factors

responsible for institution-based trust, i.e. trust in EC transactions themselves as separated with

trust in the transacting entity or the vendor. Hence we need to control for factors that lead to

trust in the vendors themselves rather than the EC transaction. Such a trust has been shown to be

developed due to consumer beliefs regarding the reputation of the vendor [McAllister, 1995

#168] and the customer's satisfaction with previous interactions with the etailer [Ganesan #43].

Reputation is defined as the extent to which consumers view a marketer to be reliable, honest,

and trustworthy and this is known to be a source of trust [Zucker, 1986 #169;Doney, 1997 #38].

In a process-based mechanism of trust building, repeated exchanges influence future

relationships [Gefen, 2000 #138], and empirical evidence clearly points out that trust follows

satisfaction with a service provider [Singh, 2000 #174]. Thus in any buyer-seller relationship it

18

Page 19: Consumers' Trust in Electronic Commerce Transactions: The Role of

has been argued that satisfaction with previous outcomes has a significant impact on trust

[Ganesan, 1994 #43] and hence it needs to be controlled for in our study.

Hypothesis 7: A consumer’s overall trust in her online transaction is positively related to the

reputation of the online vendor whom she transacting and her satisfaction with her past

interactions with the online vendor.

Figure 1 provides a representation of our model of trust in EC transactions. The potential for a

relationship between the constructs of perceived privacy and perceived security also implies that

a second generation data analysis tool [Bagozzi, 1982 #6] tool such as LISREL or PLS needs to

be employed rather than simple linear regression.

Perceived Security of

EC Transactions

Control Variables (Trust in Vendor)

Perceived Privacy of

EC Transactions

Trust in

EC Transactions

Reputation Satisfaction

+ve

+ve

+ve

+ve +ve

Figure 1: Hypothesized relationships

19

Page 20: Consumers' Trust in Electronic Commerce Transactions: The Role of

3. Methodology

We developed a survey to test our hypotheses but first we set about validating our survey

instrument. Prior research has argued heavily in favor of adopting rigorous validation of

instruments in MIS research, to bring clarity to the formulation and interpretation of research

questions [Straub, 1989 #99]. Our study follows the 3-stage procedure following

recommendations of prior research in information systems [Smith, 1996 #93;Straub, 1989 #99]

for developing and validating measurement instruments. The first stage is devoted to the domain

and dimensionality of the purported metrics through a review of relevant literature and

corresponding scales. Following this, for stage 2 a set of sample items was generated for each

new construct and assessed for reliability and content validity. This was followed by

streamlining of the metrics, in order to fit our context of perceived privacy and security in

Internet based EC and a first version of the instrument was created. We present two studies; in

the first study, we administer the first version of the multi-time scales to a sample of consumers

who have purchased an item from both the online and offline form of a single store. In this study

we measure the consumer perceptions of privacy and security with regards to offline transactions

as well, we also use this study to eliminate any redundancy in items, and ensure good

measurement properties with regards to constructs related to the EC environment. Following

this, in stage 3 we proceed with an extensive confirmatory analysis for online transactions only

(study 2) that test and validate the refined scales for their reliability and construct validity. We

also verify the convergent, discriminant and factorial validity of our study involving a sum total

of 217 subjects.

20

Page 21: Consumers' Trust in Electronic Commerce Transactions: The Role of

3.1 Pretest

Measures for perceived privacy and perceived security were developed following standard

psychometric scale development procedures [Bagozzi, 1982 #6;Anderson, 1988 #3]. Note that

while Smith et al (1996), have developed instruments for an individual’s concern for privacy, our

interest is in measure consumer perceptions of privacy given that the online vendors provide a

government mandated assurance of satisfying individual’s concern of privacy. In other words

we are interested in measuring how consumers perceive structural assurances given in the EC

environment. Similarly, we are interested in measuring how consumers perceive procedural

fairness [Culnan, 1999 #34] will be upheld in the EC environment, given that vendors promise

procedural fairness online. We need to measure how a consumer believes her information is

handled in response to claims and other technological investments for privacy protection

employed by online sellers. Similarly in order to measure consumer perceptions of security we

rely both on the consumer perceptions of the antecedents of security [Chellappa, 2002 #188] and

Goodhue and Straub’s [, 1991 #157] measures of perceptions of security in an organizational

context. Our construct of perceived security of EC transactions can be thought of as being

related to organizational user's concern of security that is measured through user assessment of

security effectiveness [Goodhue, 1991 #157, p.20]. The survey instrument itself is presented in

Appendix I.

Before we conduct the study, we tested both constructs in the context of Internet based EC

transactions through a series of informal interviews with faculty and doctoral students in a

business school to ensure that they were properly operationalized. This resulted in13 candidate

items for each construct, where each item had a corresponding domain of content [Nunnaly,

21

Page 22: Consumers' Trust in Electronic Commerce Transactions: The Role of

1978 #73]. This was followed with selection of items [Anastasi, 1986 #2], to choose ones that

best fit the proposed definition. Out of the 13 candidate items, 7 items for perceived privacy and

6 items for perceived security were incorporated into the first instrument, which was again tested

by faculty and doctoral students for comprehensiveness, clarity and appropriateness. Given

extant research on trust, reputation and satisfaction measures for them were easily available from

literature and suitably modified or adapted for our study. Each of the 23 items were followed by

a seven point Likert scale anchored by ‘1 = strongly disagree’ to ‘7 = strongly agree’.

3.2 Reliability and validity tests used

For each of the 2 studies, construct, convergent and discriminant validities were always tested,

followed by reliability analysis, in order to provide good measurement properties [Straub, 1989

#99]. First, indicators for the hypothesized principal constructs were identified through an

exploratory factor analysis, and each item was subjected to item-to-total examination. Construct

validity was ascertained through inter-item correlation and factor-loading matrices of the

principal constructs. All items tapping the same construct should have high correlations, whereas

items tapping different constructs should have significantly lower correlations. Convergent

validity refers to whether the items comprising a scale behave as if they are measuring a common

underlying construct. In this sense, all items measuring the same construct should correlate with

the items in the same scale [Bagozzi, 1988 #7]. Discriminant validity is concerned with the

ability of a measurement item to differentiate among different measure items [Davis, 1989

#37;Davis, 1989 #36]. The basic test for discriminant validity is to show that an item should

correlate more highly with other items intended to measure the same attribute than with items

used to measure a different attribute.

22

Page 23: Consumers' Trust in Electronic Commerce Transactions: The Role of

For this research we had first analyzed our data using linear regression, however due to possible

correlation between our constructs of perceived security and perceived privacy, we proceeded to

use a second generation data analysis technique [Bagozzi, 1982 #6] using Partial Least Squares

(PLS). This allows for a combined analysis of measurement and structural models, where factor

analysis can be combined with hypotheses testing [Gefen, 2000 #175]. Thus from the

perspective of validity testing, instead of factors from principal component analysis, we will

present a table of latent constructs. For reliability analysis, no reliability statistic such as

Cronbach's alpha is produced automatically by PLS. However other construct reliability

measures AVE1 (Average Variance Extracted) and CREL2 (Composite Reliability) can be used

[Gefen, 2000 #175]. To perform confirmatory factor analysis, a factor score for each construct is

calculated based on the weighted sum of that factor’s standardized and normalized indicators:

prior to running PLS, the “data matrix” output option in PLS-Graph is selected. After PLS

execution, the latent construct scores will appear as “eta latent variable scores” in the output file.

The factor scores are correlated with individual items (likewise standardized and normalized, and

provided by PLS-Graph in the “rescaled data matrix” section of output) to calculate cross

loadings. See note in Agarwal and Karahanna [, 2000 #132]. Boldface item loadings in the

tables below should be greater than cross-loadings, and should likewise, as a rule of thumb,

exceed 0.70 [Thompson, 1995 #177;Hair, 1998 #176].

1 AVE = (Σλi

2 / Σλi2 + ΣΘii), where λi are factor loadings and Θii are unique error variance = 1-λi

2. Gefen [Gefen, 2000 #175] recommend the diagonals to be = AVE. Agarwal & Karahanna, 2000 and Compeau & Higgins, 1995 are more generous and use the square root of AVE on the diagonal. 2 CREL = composite reliability = (Σλi)2 / (Σλi)2 + ΣΘii, where λi are factor loadings and Θii are unique error variance = 1-λi

2. These reliabilities are functionally equivalent to a Cronbach’s reliability alpha. Factor loadings are provided by PLS-Graph.

23

Page 24: Consumers' Trust in Electronic Commerce Transactions: The Role of

3.3 Study 1

Study 1 was conducted with graduate business students in a large private West Coast University

as subjects, who rated their perceptions of privacy, security, and trust in EC transactions through

the 23-item online questionnaire. There were two goals to this study; the first goal of this study

was to empirically verify if indeed consumers exhibited different levels of trust in their online

and offline transactions even if they interacted with the same entity, i.e., the online and offline

version of the same store. This would serve to isolate the trust towards the EC element and not

the trustworthiness of the vendors themselves. The second goal of the study was to do scale

validation of the perceived privacy and perceived security measures for the online store to

conduct the subsequent study focused solely on understanding the nature of trust building online.

Therefore even if we do not measure the reputation and past satisfaction in this study it serves

the purpose of isolating the differences between online and offline transactions independent of

the stores and it serves as a platform to refine the scales for the subsequent study.

The survey was administered to 64 subjects of whom we had 40 respondents giving us a

response rate 62.5%. The 64 subjects were selected carefully so as represent a sample of users

who have purchased items both from the online and offline form of the same store. Our

collection of stores included Barnes&Noble/Barnes&Noble.com, BestBuy/BestBuy.com,

Borders/Borders.com, CompUSA/CompUSA.com, Macy's/Macy's.com, Virgin Music/Virgin

.com, WalMart/WalMart.com. The subjects were then asked about perceived privacy, perceived

security and trust in their transactions for each store type (online and offline) based upon their

past experiences. Clearly this study does not account for self-selection and social desirability

bias, but the variance in the responses for the principal constructs gives us adequate information

24

Page 25: Consumers' Trust in Electronic Commerce Transactions: The Role of

for a first study. Since university rules prohibit collection of demographic information from

students, it was not possible to collect specific information from these students about their own

characteristics. The use of students as a sample does not appear to pose any significant problems

and the student population has been commonly studied in many studies related to consumer

behavior [Calder, 1981 #200]. Even specifically in the context of information privacy the

original Smith et al [, 1996 #93] paper includes a sample of students and there were no

significant differences reported when Stewart and Segars [Stewart, 2002 #198] employ a non-

student sample.

3.4 Results and discussion of study 1

We first analyzed the data to observe any differences in consumer perceptions of privacy and

security between their online and offline transactions. We employed the paired t-test to test to

verify these differences. Our analysis (given in table 1) shows consumers indeed differ on their

security and privacy perceptions. The analysis of means also shows that consumers’ perceptions

of security online, privacy online and trust online is lower than their counterparts in the offline

transaction. This lends support to our hypotheses 1, 2, and 4, and substantiates the claim that

even if they have conducted transactions with the online and offline counterpart of the same

store, their perceptions of trust may vary. This finding implies that trust in the transaction may

have a greater role to play than just as an indicator of intention to shop from the store. We

discuss this implication in greater detail in the final sections of this paper.

Paired Differences

95% Confidence

Interval

Construct Store Mean Std. Dev. Mean

Std. Dev.

Lower Upper

t value

p value

25

Page 26: Consumers' Trust in Electronic Commerce Transactions: The Role of

Offline 5.8600 .8242 Perceived

Security Online 5.3300 .8742 .5300 .7786 .2810 .7790 4.305 .000

Offline 5.5228 .9168 Perceived

Privacy Online 4.8875 .8838 .6353 .8052 .3778 .8928 4.990 .000

Offline 4.7407 .9251 Trust

Online 3.9786 1.0233.7621 .9444 .4601 1.0641 5.104 .000

Table 1: Study 1 - Online vs. Offline stores

In this first study, we did not control for reputation of the stores and satisfaction with past

outcome as we test perceptions regarding the same store. Their buying decision itself may have

been dependent on the trust in the stores themselves. However the data collected on the

perceptions of privacy and security provides us a good basis to refines scales for the later study.

Generally items with high loadings on the intended factor and no substantial cross-loadings were

retained. Based on this it was decided that PRIV3, SEC6, TRUST3 and TRUST5 variables in

the online store data, could be eliminated to provide for better measurement properties. For

construct validity, the path findings and the loadings in PLS analysis are presented below in table

2. While the diagonals (bolded) are consistently greater than the off-diagonals, indicating

acceptable construct validity, some items have loadings below 0.7, suggesting further revision of

some of the items.

Latent constructs Construct Items

SEC PRIV TRUST

SEC1 0.762 0.471 0.753

SEC2 0.839 0.568 0.436

SEC3 0.803 0.450 0.486

SEC4 0.614 0.320 0.191

Perceived

Security

SEC6 0.558 0.291 0.158

26

Page 27: Consumers' Trust in Electronic Commerce Transactions: The Role of

SEC7 0.930 0.651 0.394

PRIV1 0.551 0.654 0.206

PRIV2 0.233 0.445 -0.092

PRIV4 0.452 0.691 0.113

PRIV5 0.315 0.550 0.311

PRIV6 0.511 0.837 0.369

Perceived

Privacy

PRIV7 0.151 0.566 0.351

TRUST1 0.436 0.240 0.870 TRUST2 0.344 0.272 0.810 TRUST4 0.579 0.407 0.774

Trust

TRUST5 0.401 0.187 0.651

Table 2: Study 1 - Loadings in PLS Analysis for online stores

Table 3 shows the inter-construct correlations, AVE and CREL for this study. As observed, the

bold diagonals are larger than the off-diagonals, ensuring reliability.

Inter-construct correlations

Construct AVE CREL SEC PRIV TRUST

SEC 0.580 0.890 0.762

PRIV 0.404 0.797 0.626** 0.636

TRUST 0.609 0.861 0.588** 0.372* 0.781

Table 3: Study 1 - Correlation between constructs for online stores

Although the goal of the first study was not to establish any causal paths, even without

controlling for reputation and satisfaction with past outcomes, the results still support our

conceptual model. While our results show that perceived privacy and perceived security of

online transactions are indeed distinct constructs, it also appears that while perceived security is

well correlated with trust (table 4), perceived privacy influences trust primarily through

perceived security that acts a mediating variable. This implies that consumers’ perceive the

27

Page 28: Consumers' Trust in Electronic Commerce Transactions: The Role of

items in the construct of perceived privacy to be important determinants of trust but they may see

it as being operationalized through their perceptions of security in the online transaction.

Link Path coefficient (t-stat)

R-square

Privacy Security 0.626 (8.574**) 0.392

Privacy Trust 0.007 (0.032)

Security Trust 0.584 (3.334**) 0.346

* sig @ .05 ** sig @ .01 n=40

Table 4: Study 1 - Path findings via PLS analysis for online stores

3.5 Study 2

Based on study 1, the scales were refined to finally come up with a set of 7 questions for

perceived privacy, 6 questions for perceived security, and 3 questions for measuring trust.

Participants were asked to rate the perceived privacy and perceived security they would expect

from a prospective transaction with specified online store. To increase generalizability a sample

was chosen to consist of two groups, consisting of both graduate (3 MBA cores – a total of 198

students) and undergraduate business students (2 senior electives – 114 students), and thus

increasing the heterogeneity of the sample. A $200 reward was announced as a raffle prize for

completing the survey, 128 graduate (response rate – 64.6%) and 51 undergraduate (response

rate – 44.7%) students (total 179) responded to this online questionnaire. Study 2 was designed

to control for the effect of store reputation and satisfaction with past outcomes that are discussed

earlier as important antecedents of trust in buyer-seller relationships [Ganesan, 1994

#43;Jarvenpaa, 2000 #56]. While satisfaction with past outcomes was expected to vary

adequately among the study participants, store reputation was manipulated by presenting two

different online stores to the respondents. A concern was to choose stores with reputations such

28

Page 29: Consumers' Trust in Electronic Commerce Transactions: The Role of

that a high level of variance was possible for this control variable. Therefore a pilot study was

conducted to identify familiar and known stores versus unfamiliar and unknown stores based on

two items adapted by the standard scales found in the Marketing Scales Handbook [Bruner, 1992

#16]. A sample of 150 graduate students from the same business school rated 5 different online

stores for the two familiarity items. From this pilot study, two stores emerged that had high

variance and significantly different familiarity scores. Buy.com (www.buy.com) had a mean

value of 4.7 on a 7-point scale (STD=2.1), while PCNation.com (www.pcnation.com) had a

mean of 2.1 (STD=2.0). Therefore, half of the respondents were presented a hypothetical

scenario where the target store was Buy.com, and the other half was given PCNation.com.

Manipulation check showed a significant difference (p<.01) between Buy.com (mean=5.7,

STD=1.8) and PCNation.com (mean=4.3, STD=1.5) on the reputation variable. Therefore, social

desirability bias is limited in this study by properly manipulating target online stores and not

allowing participants to choose their desired merchants. This resulted in the final set of

questions as given in appendix I.

Two data points were out rightly dropped due to extraordinary number of missing values. For the

other data points that had missing values (especially for the unfamiliar brand), substitution by

random assignment within-groups procedure was used [Stump, 1996 #100]. This procedure

divides the sample into two groups that were highly correlated with the items with missing

values. The cases with missing values were then assigned the item value of the preceding case

within the group. This procedure is arguably a better way to handle missing data. First,

compared to the practice of deleting cases on the basis of missing data, this procedure has the

benefit of allowing full use of the data. Second, compared to the method of replacing missing

29

Page 30: Consumers' Trust in Electronic Commerce Transactions: The Role of

values with mean or median values, the random assignment procedure is advantageous because it

avoids constraining variation among responses.

3.6 Results and discussion of study 2

The same tests for construct validity and reliability explained in section 3.2 were repeated for

this study as well. All the items (except REPUT3 which loads marginally) display excellent

measurement properties suggesting that our items accurately measure the constructs in question.

Latent Constructs

Construct Item PRIV TRUST SEC REP SAT

PRIV1 0.871 0.059 0.312 0.146 -0.137

PRIV2 0.723 0.061 0.240 0.068 -0.093

PRIV4 0.881 0.085 0.334 0.142 -0.169

PRIV5 0.749 0.110 0.211 -0.059 0.081

PRIV6 0.865 0.102 0.354 0.064 0.002

Perceived

Privacy

PRIV7 0.848 0.204 0.351 0.076 0.070

TRUST1 -0.038 0.821 0.202 0.144 0.242

TRUST2 0.185 0.900 0.477 0.305 0.195

Trust

TRUST4 0.113 0.702 0.177 0.172 0.097

SECUR1 0.302 0.503 0.840 0.313 0.238

SECUR2 0.393 0.291 0.880 0.287 0.108

SECUR3 0.271 0.222 0.826 0.235 0.132

SECUR4 0.307 0.392 0.829 0.291 0.213

Perceived

Security

SECUR5 0.268 0.155 0.816 0.157 0.102

REPUT1 0.070 0.294 0.275 0.950 0.128

REPUT2 0.133 0.267 0.344 0.959 0.222

Reputation

REPUT3 0.001 0.075 0.200 0.688 0.161

SAT1 -0.025 0.241 0.222 0.222 0.952Satisfaction

SAT2 -0.078 0.124 0.102 0.061 0.805

Table 5: Study 2 - Loadings in PLS Analysis for online stores

30

Page 31: Consumers' Trust in Electronic Commerce Transactions: The Role of

Table 6 below shows the inter-construct correlations, AVE and CREL for this study. As

observed, the bold diagonals are larger than the off-diagonals, ensuring reliability of our scales.

Inter-construct Correlations

Construct CREL AVE PRIV TRUST SEC REP SAT

PRIV 0.927 0.681 0.825

TRUST 0.852 0.659 0.131 0.812

SEC 0.922 0.703 0.373** 0.404** 0.839

REP 0.905 0.765 0.095 0.278** 0.320** 0.875

SAT 0.874 0.777 -0.048 0.223** 0.201** 0.185* 0.882

* sig at 0.05 level **sig at 0.01 level

Table 6: Study 2 - Correlation between constructs for online stores

The results of study 2 also clearly show that trust is significantly correlated with perceptions of

security, validating hypothesis 5. While there is a poor correlation between perceived privacy

and trust invalidating hypothesis 3, we see a significant correlation between perceived privacy

and perceived security validating. The results shown in table 7 show that hypothesis 6 is

validated implying that the construct of perceived privacy manifests itself primarily through

perceived security. Note that from table 5, we can still see that the two constructs are distinct in

the consumer’s mind. Part of hypothesis 7 that aims to control for known factors that affect trust

is also validated, where we find that reputations loads with the 95% confidence interval although

satisfaction with past out comes loads marginally on trust in EC transactions with only the 90%

confidence. One reason may be that there may have been a mix of positive and negative

satisfaction with past outcomes that should have been measured separately.

Link Path coefficient (t-stat)

R-square

Privacy Security 0.373 (4.798**) 0.139

31

Page 32: Consumers' Trust in Electronic Commerce Transactions: The Role of

Security Trust 0.331 (3.848**) 0.204

Privacy Trust -0.001 (-0.012)

Rep Trust 0.149 (2.263*)

Sat Trust 0.129 (2.096*)

* sig at 0.05 level **sig at 0.01 level n=177

Re-run after dropping TRUST1

Link Path coefficient (t-stat)

R-square

Privacy Security 0.374 (4.816**) 0.140

Security Trust 0.357 (4.133**) 0.236

Privacy Trust 0.044(0.569)

Rep Trust 0.164(2.509*)

Sat Trust 0.096(1.609)

* sig at 0.05 level **sig at 0.01 level n=177

Table 7: Study 2 - Path findings via PLS analysis

4 Discussion and conclusions

Trust in the transacting entity has always been an important factor in any interactions involving

risk [Sheppard, 1998 #186]. In the context of buyer-seller relationships, marketing literature

finds that consumer trust in the transacting vendor is of utmost importance in order for the

consumer to accept the risk of transaction, financial or otherwise and the vendor’s reputation

and branding are known determinants of this trust [Doney, 1997 #38;Ganesan, 1994 #43].

There is no reason to believe that trust in the vendor will be any less important to the online

consumer and evidence to this effect has been presented by many later studies as well

[Jarvenpaa, 2000 #56;Lee, 2001 #190;Notenberg, 1999 #143;Keen, 2000 #192]. However from

an IS perspective it is important to explore if the underlying information technology

characteristics themselves contribute to variability in the overall consumer trust in a transaction.

32

Page 33: Consumers' Trust in Electronic Commerce Transactions: The Role of

Our research develops the constructs of perceived privacy and perceived security as the chief

determinants trust in the EC transaction after the trust in the vendor is accounted for. Evidence

from our first study shows that consumers exhibit differences in their perceptions of privacy,

security and trust between online and offline transactions even if these transactions involve the

same store. Our instrument also displays excellent measurement properties and establishes

perceived privacy and perceived security of EC transactions to be distinct constructs. Both our

studies confirm that while perceived security directly acts upon trust in EC transactions,

perceived privacy’s effect on trust is mediated by perceived security. From a theoretical

perspective, our study adds to the understanding of the multi-dimensional construct of trust.

McKnight et al [, 2002 #184 p.353] suggest that future research needs to understand the link

between institution-based trust and trusting beliefs in the vendor. In studying the overall trust in

a EC transaction and by controlling for trust in the vendor, our study proposes perceived privacy

and perceived security as antecedents of trust developed due to the nature of the institutional

infrastructure, i.e., the Internet. From the perspective of research in privacy, we address Culnan

and Armstrong’s [, 1999 #34 p.113] observation that “there is no validated scale to measure

overall privacy attitudes.”

This result has some interesting managerial implications as well; note that in our first study, even

when our subjects have actually purchased (i.e., conducted a financial transaction), they display

differences in their perceptions of privacy, security and trust. Hence it cannot be argued that the

role of trust in a transaction has implications only on purchase behavior. Evidence from earlier

work supports this view as it finds that even if credit card firms fully absolve any risk from

conducting a financial transaction, consumers still have concerns regarding their transactions

33

Page 34: Consumers' Trust in Electronic Commerce Transactions: The Role of

[Chellappa, 2002 #188]. We propose that the implications of the trust affected by perceived

privacy and perceived security plays a role in the nature and type of information that a consumer

is willing to share with the vendor. Culnan and Armstrong [, 1999 #34] observe that not only

does technology allow for a vast amount of consumer information to be collected during EC

transactions but they also point out the importance of acquiring this information for a vendor’s

survival in an increasingly competitive economy. This information is critical in forming bonds

with consumers and has been studied by literature on customization and personalization

[Chellappa, 2002 #187]. In the offline world it was impossible or simply uneconomical to

acquire this magnitude of consumer information, and hence bonding with customers was limited

to purchase characteristics. However, today an Amazon.com not only provides personalized

suggestions on the basis of purchase information but it can even include personalized coupons

created by looking only at the consumer’s browsing behavior. Data and Web mining

technologies allow online vendors to even distinguish between items that were simply looked at

versus those that were included in the shopping cart without actually being purchased.

Acquiring consumer permission to collect and use this information is crucial to fully understand

future product purchase preferences. Hence if consumers perceive the sharing of this

information to be not so secure or private, they are unlikely to allow the acquisition and use of

this information. Along these lines Culnan and Armstrong [, 1999 #34] also observe that

vendors can gain competitive advantage by improving upon the consumer attitudes towards the

privacy of their information.

Given that all vendors online today employ both the fair information practices and security

information practices in their online transaction the question to be asked is why do consumers

34

Page 35: Consumers' Trust in Electronic Commerce Transactions: The Role of

still exhibit lower levels or perceived privacy and perceived security? One can lean on literature

in public policy and risk management to seek some answers. It should be noted that the

disclosure notices and security principles are created on the basis of recommendations of experts

from both research and practice through their analysis and congressional testimony [US

Congress, 1997 #160;US Congress, 1997 #161]. Research in risk management argues that there

is a significant difference in the public perceptions and expert assessment of risks, particularly

technology related risks [Powell, 1998 #82]. Hence one possibility is that consumers do not

fully understand as to how the actions undertaken by vendors allay their risk. This may be due to

a “risk communication vacuum,” [Powell, 1997 #80] that represents the inability of conveying

technological risk and hence measures taken to mitigate them to the public. One way to address

this gap is through education and awareness programs such as those instigated by the

government during outbreak of E-Coli bacteria in hamburgers. Another way is for vendors

themselves to engage in education of the public and to some extent one can see this initiative by

credit-card issuers. For example, CapitalOne has employed television advertising effectively to

inform customers that it is ok to use their cards online as well. Thus an awareness program on

the efficacy of the protection mechanisms may be required if consumers have share their

information online and if personalization strategies have to succeed. Note that at no point in

time can a vendor afford to neglect his reputation as that is clearly a factor in the overall trust in

an EC transaction.

4.1 Limitations and future research

Our study suffers that same limitations as many other empirical studies in that “confirmatory

findings should be viewed as scientific findings only to the extent that they can be replicated in

subsequent studies,” [Stewart, 2002 #198 p. 45]. Further, our sample consisted of a convenience

35

Page 36: Consumers' Trust in Electronic Commerce Transactions: The Role of

sample of students and while this does not pose a major problem for internal validity, issues of

external validity may arise [Calder, 1981 #200]. Although prior research on privacy [Smith,

1996 #93] has used both student and non-students subjects and has found no significant

difference in general privacy concerns. As we were interested in the perceptions of consumers

who transacted online, the fact that everyone in our sample of users are familiar with and transact

on the Web poses no significant risk. However, less can be said on the perceptions of consumers

who have not used the Web.

Future studies can also take into account gender and other demographic variables as technology

use and possibly perceptions of security and privacy can be subject to gender biases [Venkatesh,

2000 #181], global and cultural biases [Straub, 1997 #182;Jarvenpaa, 1999 #55] and user

expertise [Farkas, 1989 #183]. Due to the limitations on collection of demographic and other

information on the student population, our study cannot make any observations along this

dimension. These dimensions may provide interesting recommendations on the difference in the

trust building mechanisms to be adopted for differing genders and cultures. Further, future

studies may also want to differentiate between risks in financial versus non-financial transactions

and consumer perceptions of privacy and security therein.

References

36

Page 37: Consumers' Trust in Electronic Commerce Transactions: The Role of

Appendix I

Survey Instrument

Perceived Privacy

1. I am confident that I know all the parties who collect the information I provide during a

transaction with this store.

2. I am aware of the exact nature of information that will be collected during a transaction

with this store.

3. I know what information I need to provide during a transaction with this store.3

4. I believe I have control over how the information I provide will be used by this store.

5. I believe I can subsequently verify the information I provide during a transaction with

this store.

6. I believe that this store will disclose my information without my consent R

7. I believe there is an effective mechanism to address any violation of the information I

provide to this store.

Perceived Security

1. I have confidence in the security of my transaction with this store.

2. I am confident that the private information I provide during my transaction with this store

will only reach this store.

3. I believe inappropriate parties may deliberately view the information I provide during my

transaction with this store R

3 Items in italics dropped R Reverse-scale item

37

Page 38: Consumers' Trust in Electronic Commerce Transactions: The Role of

4. I believe the information I provide during my transaction with this store will not be

manipulated by inappropriate parties.

5. I believe that inappropriate parties may store the information I provide during my

transaction with this store R

6. I believe this store will not expose the information I provide during my transaction to

inappropriate parties

Trust

1. I believe that my transaction with this store is likely to be safe.

2. My transaction with this store is likely to be reliable.

3. Many things may go wrong with my transaction with this store.1, R

4. This store will promptly inform me if any problems occur with my transaction.

5. I am confident that my transaction with this store will be transparent R

Reputation

1. This online store has a reputation for being reliable.

2. This online store is known to be dependable.

3. This online store has poor reputation in the market R

Satisfaction with past outcomes

1. I am satisfied in general with my transactions on the Internet in the past.

2. I have successfully transacted on the Internet in the past.

38