ArticlePDF Available

Abstract

Purpose – Vulnerability is a concept that lies at the core of the most prevalent academic trust definitions. Accordingly, a vast amount of scholars refers to vulnerability when studying trust. Surprisingly, there is almost no conceptual nor empirical work explicitly directed at understanding vulnerability itself. The purpose of this paper is to summarize and critique the existing base of knowledge of vulnerability with a particular focus on the leader-follower relationship and to open avenues for future research. Design/methodology/approach – In the process of a very systematic literature search, the authors identified 49 studies that refer to vulnerability when studying trust at the interpersonal level. The authors coded the literature into conceptualizations, antecedents and consequences of vulnerability – with a particular focus on the leader-follower relationship. Findings – The authors introduce a theoretical framework which allows the authors to structure the rather fuzzy discussed concept of vulnerability. The development of such a theoretical framework allows the authors to distinguish between trusting beliefs and actual trusting behaviour so that it is possible to separate the constructs of willingness-to-be-vulnerable and actual vulnerability. Research limitations/implications – With the help of the developed framework, the authors point to the need for more work on vulnerability in order to take the study of trust to the next level. In this respect, the authors formulate several propositions that should be tested in future research. Practical implications – Practitioners are made aware of the need to risk willingness to be vulnerable as a base for trusting behaviour. There is no way around being willing to be vulnerable. Originality/value – This literature review provides a holistic understanding of the concept of vulnerability. The intention is to show the different understandings and interpretations of this term within the literature and identify which antecedents and consequences are related to the concept of vulnerability.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
1
Nienaber, A./ Hofeditz, M./Romeike, P.
This is a green open access version of an article accepted for publication in Personnel Review
For APA Quotation use: Nienaber A. M., Hofeditz M., & Romeike P. D. (2015): Vulnerability
and Trust in Leader-Follower Relationships, in: Personnel Review accepted; forthcoming in
2015
Copyright © 2014 (Emerald Group Publishing Limited)
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
2
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
ANN-MARIE NIENABER
Reader in Business Management,
Centre for Trust, Peace and Social Relations,
Coventry University, United Kingdom
MARCEL HOFEDITZ
Phd student at Chair of Business Management, Personnel and Innovation
Munster University, Munster, Germany
PHILIPP D. ROMEIKE
Phd student at Centre for Trust and Communication in a Digitized World
Munster University, Munster, Germany
Abstract
We introduce a theoretical framework which allows structuring the rather fuzzy discussed concept
of vulnerability. We distinguish between trusting beliefs and actual trusting behaviour in order to
separate the constructs of willingness-to-be-vulnerable and actual vulnerability. With the help of
the framework developed, we point to the need for more work on vulnerability in order to take the
study of trust to the next level. In this respect, we formulate several propositions that should be
tested by future research.
2
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
3
Introduction
Vulnerability and trust are distinct concepts but often times mentioned together in regard to
leader-follower relationships. Although trust topics recently became of major public interest,
scholars in the field of Human Resource Management have still paid less attention to the term
vulnerability in leader-follower relationships. Only a few examples can be identified that
focus on vulnerability. One prominent example can be found by Lapidot, Kart and Shamir
(2007). Their analysis in a military training context shows impressively the cadets’
vulnerability to the actions of their team commanders since their judgments have an influence
whether the cadets survive or not. The study concludes that vulnerability is essential for trust
but needs further attention by scholars and business managers in the Human Resource field,
since an exact understanding of how trust and vulnerability are interrelated is still missing.
Regarding the Human Resource and Psychology literature, scholars agree on two key
issues concerning trust. First, trust is seen as the willingness to rely on a key partner in whom
one has confidence (Moorman et al., 1992; Mayer et al., 1995). Second, trust is defined as an
expectation held by an individual that his partner will behave in a mutually acceptable manner
(Sako and Helper, 1998). Thus, scholars define trust as the willingness of a party (the trustor)
to be vulnerable to the actions of another party (the trustee) based on the expectation that the
trustee will perform a particular action important to the trustor, irrespective of the ability to
monitor and control the other party (Rousseau et al., 1998).
A wealth of literature now exists which has used such vulnerability-based
conceptualisations of interpersonal trust when studying its antecedents and consequences
(e.g., Fulmer and Gelfand, 2012; McEvily and Tortoriello, 2010; Poon, 2013; Robertson et
al., 2013; Schoorman et al., 2007), often using the terms willingness to be vulnerable and
vulnerability interchangeable. Such a tendency to conflate the two terms constitutes a major
shortcoming which needs to be addressed. Accordingly, the intention of this paper is to
provide a holistic conceptualisation of trust and vulnerability that clearly distinguishes
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
4
between trusting beliefs (i.e. the willingness to be vulnerable) and trusting behavior (i.e.
actual vulnerability).
In order to do so, we firstly review the literature and illustrate which factors lead to
trusting beliefs and explain how these can lead to actual trusting behavior while taking into
account the role of different moderating factors. Secondly, we connect the vulnerability or
trusting behavior of one person to the level of trust an interpersonal referent holds.
Throughout the paper we apply our argumentation to the leader-follower relationship which is
an example for a situation with an imbalance of power and therefore a particularly interesting
area to study vulnerability and trust (Suff and Williams, 2004).
To the best of our knowledge, this appears to be the first literature review focussing
specifically on vulnerability as the key manifestation of trust between individuals. We build
this bridge with the use of sense-making theory (Maitlis and Christianson, 2014; Weick et al.,
2005). Sense-making theory provides a useful approach to this topic because of its focus on
the role of emotions (Weick et al. 2005; Maitlis et al., 2013). Very limited conceptual or
empirical work so far exists that is explicitly directed to understand vulnerability itself (e.g.
Sheffi, 2005; Tsui-Auch and Moellering, 2010). In the present study, we analyse 49 studies
(conceptual and empirical) that deal with vulnerability and its connection to the overarching
concept of interpersonal trust.
We are able to make the following contributions: First, this literature review provides
a holistic understanding of the concept of vulnerability. The intention is to show the different
understandings and interpretations of this term within the literature and identify which
antecedents and consequences are related to the concept of vulnerability. Second, we
introduce a theoretical framework which allows us to structure this rather fuzzy discussed
concept of vulnerability. The development of such a theoretical framework allows us to
distinguish between trusting beliefs and actual trusting behaviour so that it is possible to
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
5
separate the constructs of willingness-to-be-vulnerable and actual vulnerability. Third, based
on this framework we are able to derive further research implications in the form of testable
propositions and provide practical implications for building trustful leader-follower
relationships based on actual vulnerability.
Theory
Vulnerability is typically mentioned in relation to trust in the management and psychological
literature since scholars in these fields see the willingness to be vulnerable as one core aspect
when defining trust. In the case of trust between leader and followers, trust both Mayer et al.
(1995) and Rousseau et al. (1998) define trust as the follower’s willingness to be vulnerable
based on positive expectations that his leader will not take advantage of this vulnerability.
However, while most scholars refer to the “willingness to be vulnerable”, the interpretation of
vulnerability itself being either an intention to trust (e.g. Chow et al., 2012) or an actual
trusting behaviour (e.g. Graebner, 2009) is rather unclear. As mentioned before, Lapidot et al.
(2007) were one of the first to study the impact of vulnerability on trust. Their content
analysis of critical incidents in a cadets’ officer training course revealed that higher feelings
of vulnerability on the side of the follower increased the importance of the perceived leader’s
trustworthiness.
To provide a broad understanding of the concept vulnerability, we start by outlining
different conceptualisations of this construct across different disciplines. Second, we explore
the exact relationship between vulnerability and trust. Finally, we get even more specific and
explore vulnerability in leader-follower relationships with the use of sense-making theory.
The United Nations (ISDR, 2002) propose a macroeconomic perspective on
vulnerability describing how general categories of factors determine a community’s level of
vulnerability. One of the most dominant streams of research on vulnerability can be found in
medical sciences. Here, vulnerability describes an individual’s inability to protect and
maintain her/his interests (CIOMS, 2002). Just taking into account relevant sociological
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
6
factors, Chambers (2006) explains vulnerability in terms of arising from two sources: external
threats and a lack of internal coping mechanisms.
Turner et al.’s (2003) conceptualisation of vulnerability has originally been used for
models of human-environment systems and is one of the most prevalent in the literature that
has been widely quoted in other disciplines, too. The authors argue that vulnerability can be
observed not only in situations of stress or perturbations (hazards), but also in the system’s
resilience and sensitivity when being exposed to such hazards. Table 1 includes a list of the
most frequently used definitions of vulnerability from different disciplinary backgrounds.
[Insert table 1 around here]
Focussing on the widely accepted definition of trust from Mayer et al. (1995) we can
say that trust in general is based on two core elements: (a) the positive expectations that the
other party will behave not in an opportunistic way and (b) the willingness to be vulnerable
because we trust someone. Regarding the relationship between positive expectations and
vulnerability, two different opinions can be identified in the literature. The first perspective
relies on the view offered by Mayer et al. (1995) who see the willingness to be vulnerability
as a consequence of positive expectations. An individuals’ willingness to accept vulnerability
is based on an assessment of the partner’s trustworthiness and thus, on the positive
expectations that the partner will behave in goodwill. Following Luhmann (1988)
vulnerability itself is seen as an antecedent for trusting someone and thus having positive
expectations towards his behavior. Luhmann states that “trust presupposes a situation of risk”
(Luhmann, 1988, p. 97). These two references already suggest that it is important to
distinguish clearly between the willingness to be vulnerable and actual vulnerability.
Most researchers nowadays agree on the fact that trust has to be distinguished into two
dimensions: cognitive trust and affective trust (Lewis and Weigert, 1985; McAllister, 1995).
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
7
While cognitive trust is usually related to a rational assessment whether a party (e.g. the
leader) is seen as trustworthy or not, the affective dimension of trust is based on emotions.
The perceived trustworthiness of a party (e.g. the leader) is mainly determined by a perception
of the other party’s ability, benevolence and integrity (Mayer et al., 1995) while affective
trust is mainly developed through the interpersonal interactions (Lewis and Weigert, 1985).
This suggests that positive expectations are more strongly related to cognitive trust while the
willingness to be vulnerable has stronger associations with affective trust. We elaborate on
that in our results section.
To address the affective side of trust in terms of willingness to be vulnerable, we have
to think about an adequate theoretical stream of research. Two main theories in terms of trust
between individuals (e.g. leader and follower) are social exchange theory and transaction cost
economic theory. While the latter theory may be useful to address the cognitive part of trust
(i.e. positive expectations), social exchange theory focuses on the affective part of trust (i.e.
willingness to be vulnerable). Social exchange theory advocates that trust decreases with a
perceived imbalance in the exchange (Khazanchi and Masterson, 2011). However, social
exchange theory does not reach far enough to explore the affective side of trust. Sense-
making theory puts emotions in the centre of its interest (Weick et al. 2005) which is why this
lens to explore the matter of affective trust and vulnerability. Sense-making theory suggests
that risky experiences such as unfamiliar situations are characterized by negative feelings in
the form of disorientation or foreignness (Maitlis and Christianson, 2014; Louis, 1980). The
key question related to sense-making is “same or different?” (Weick et al., 2005). The
majority of research in this area focuses on how awareness of a specific situation or event is
formed and categorized, and how these processes influence individual’s actions. While a lot
of researchers focused on the cognitive side of sense-making theory, we also have to consider
that Maitlis and colleagues (2013) pointed out which role individual emotions in the sense-
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
8
making process have and how these emotions are able to influence the final individual
decision making.
With the help of sense-making theory, we introduce a theoretical framework to
demonstrate the different relationships between antecedents, dimensions, intentions and
behaviours of trust, in particular of vulnerability and enhance our understanding of the
underlying relations and differences especially between willingness to be vulnerable and
vulnerability in regards to trust.
Method
Data collection
This study applies the guidelines for a systematic literature review as provided by Pittaway et
al. (2004). First, we identified clear and precise aims and objectives for our literature search.
Thus, we checked the search categories dealing with vulnerability and trust between leaders
and followers. These categories are management, psychology and behavioural science. A
comprehensive search of the following databases was conducted, EbscoHost and
ScienceDirect.
Second, we defined the following exclusion and inclusion criteria based on Tranfield
et al. (2003): 1) academic rigour (peer-reviewed journals); 2) interpersonal trust in business
contexts (we excluded non-business and organizational trust contexts); 3) sufficient scope for
generalizability (no single person interviews); and 4) a definition of trust that includes
vulnerability (e.g. Mayer et al., 1995; Rousseau et al., 1998).
Third, we applied the following search terms for our electronic search in combination
with trust (search hits in brackets): vulnerability (167), vulnerable (177), sensitivity (244),
susceptibility (25), vulnerableness (0), violability (0), unprotectedness (0). To ensure that we
focussed on the relationship between leader and follower, we also combined the search term
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
9
vulnerability with leader (84), supervisor (14), subordinate (37), follower (310) and employee
(310). In total, we were able to generate 1053 hits with the help of our search strategy.
Data filtering and description
We discarded more than three quarters of the studies due to duplication or because they did
not fit the general topic after a quick check of title and abstract, leaving 223 studies for closer
examination. Second, we excluded half of these studies after closer inspection of the entire
text document as they did not fit our inclusion criteria (1-3) leaving 132 studies for
examination. Finally, we excluded 84 studies since they did not define vulnerability as part of
trust (exclusion criteria 4). As a final step to ensure comprehensive coverage, we manually
undertook a forward and backward search of the identified studies which yielded the removal
of one additional study.
Overall, 49 articles (see appendix) were identified that met our criteria, spanning a ten
year period from 2002 and 2012. This is a comparable number to similar qualitative reviews
(e.g. Oreg et al.,, 2011). Two of the authors individually read and coded the final set of 49
studies following an inductive approach (Oreg et al., 2011). Where there was disagreement,
the coders reached consensus by re-visiting previously coded papers in the light of these
problems. Amongst these relevant articles, 33 are quantitative studies, eight are qualitative
studies and another eight are pure conceptual articles. Of the quantitative studies, 24 are
survey studies, two are case studies, one is a simulation study, three are interview studies,
eight are experiments and two are quantitative meta-analyses. 34 of the 49 studies used Mayer
et al. (1995) and/or Rousseau et al. (1998) for their definition of trust. From the entire set of
49 studies only 34 studies make an assertion about vulnerability beyond including the term in
their definition of trust. Strikingly, most of the assertions appear to be rather brief and to
remain on the concept’s surface. Only a very few articles put vulnerability into the centre of
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
10
interest (e.g. Sheffi, 2005; Tsui-Auch and Moellering, 2010); 14 studies explicitly cover a
leader-follower situation. In total, 11 of the 49 studies have empirically measured
vulnerability.
Results and Discussion
In presenting our results we develop a comprehensive model that distinguishes vulnerability
from trust. We outline how, trust antecedents, cognitive and affective bases of trust, trust
intentions (i.e. willingness to be vulnerable) and trustful behaviour (i.e. actual vulnerability)
are interrelated. We describe how trust bases result into the trusting intention a person holds
and discuss how trusting intentions are finally manifested in trusting, vulnerable behaviour
such as disclosing sensible information to the supervisor. We also outline a number of
moderating factors. As last step of our model we link trusting behaviour of one person to the
level of trust his referent holds.
Figure 1 provides an overview of the theoretical model for this study which will be
discussed in a step by step in the following sections. Step 1 will describe the relationship
between trust antecedents, bases of trust and trusting intention. Step 2 explains the
relationship between the trusting intentions and the manifestation of trust and finally, step 3
refers to the trusting referent.
---- Insert Figure 1 around here ----
Step 1: Trust antecedents, bases of trust and trusting intentions:
Research on trust has typically distinguished between two classes of trust antecedents. One is
more strongly related to the formation of cognitive trust and the other has stronger
associations with the development of affective trust (McAllister, 1995).
The perceptions of a person’s character (Dirks and Ferrin, 2002) in terms of his
ability, integrity and benevolence (Mayer et al. 1995) fall into this first category which means
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
11
the formation of cognitive trust. Regarding the relationship to vulnerability, of these three
dimensions benevolence has received most attention by researchers. Some researchers
actually refer to benevolence as not taking advantage of the trustee’s vulnerability (Bews and
Rossouw, 2002). That means a leader should behave in a benevolent way towards his
followers and should not take advantage of a follower’s vulnerability due to hierarchical
issues or other dependencies. In a similar vein, others propose that fair treatment (Johnson and
Lord, 2010; Yang and Mossholder, 2010) and perceived justice (Colquitt and Rodell, 2011)
are particularly relevant concepts to benevolence as the presence of such perceptions
increases a person’s perceived trustworthiness and leads to a greater willingness to be
vulnerable. Apart from benevolence, integrity in the form of honest and truthful justifications
may lead to a higher willingness to be vulnerable (Colquitt and Rodell, 2011). Scholars have
noted that this assessment of the trust referent’s character is a rather cognitive process.
Indeed, Colquitt and Rodell (2011) state that the deliberate, careful consideration of the
supervisor’s or leader’s trustworthiness drives employee’s or follower’s intentions to be
vulnerable while Yang et al. (2009) argue that “subordinates [followers] become cognitively
assured about their vulnerability in interactions with their supervisors [leaders].” (p. 145).
Interactions between a trustor and trustee play an important role in the development of
affective trust. Research observes that personal interactions lead to more willingness to be
vulnerable (Mislin et al., 2011). In other words the more a leader and a follower interact with
each other the more willingness to be vulnerable they are to each other. Having a shared
interest is associated with both affective trust and a higher willingness to be emotionally
vulnerable (Jiang et al., 2011). Our results clearly demonstrate that the affective dimension of
trust needs further research as only a handful of the studies found within this review really
analysed affective trust. In support of such assertions, Dirks and Ferrin (2002) decided to
exclude affective trust from their meta-analysis because of too few studies in that field.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
12
It is important to note that the development of trust bases as built on these trust
antecedents is not the same for everyone. Instead, in line with sense-making theory (Weick et
al., 2005), individual characteristics do play a role: People with low self-esteem are expected
to show less willingness to be vulnerable (Premeaux and Bedeian, 2003), whereas strong
interdependent identities show greater willingness to be vulnerable (Johnson and Lord, 2010;
2012).
The two bases of trust cognitive and affective form the trusting intention a person
holds. Most researchers conceptualised this trusting intention as consisting of two elements:
Positive expectations and the willingness to be vulnerable (Bird and Osland, 2005; Olsen,
2012). Particularly the intention to accept vulnerability has been named as the core element of
a trusting intention (Chow et al., 2012; Colquitt and Rodell, 2011) whereas Graebner (2009)
only refers to the aspect of positive expectation in a situation involving vulnerability” (p.
436). Regarding the interrelationship of positive expectations and the willingness to be
vulnerable, Olsen (2012) for example notes that the intention to accept vulnerability is based
upon positive expectations.
Step 2: From trusting intentions to actual trusting behaviour
To fully understand the concept of interpersonal trust, the trusting intention or beliefs
consisting in positive expectations and the willingness to be vulnerable must be considered
with trusting behaviour that is manifested in actual vulnerability. Gundlach and Cannon
(2010, p. 400) for example note that trust is manifested by actually increasing one’s
vulnerability to the actions of another and Deb and Chavali (2010) argue that “without
vulnerability of the trustor upon the trustee, trust becomes irrelevant (p. 44) which means
that both, the leader and the follower, have to express vulnerability otherwise trust is not
relevant in their relationship.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
13
As trusting intention and trusting behaviour appear to go hand in hand, it is vital to
clearly distinguish between these two concepts. Lin et al. (2003) for example state that
vulnerability means taking a risk whereas the trusting intention does not yet comprise risk but
only the willingness to take risk. Similarly, Mayer and Gavin (2005) note that trust is a
generalized behavioural intention to take risk, whereas its outcome is actually taking risk.
Colquitt et al. (2007) state that “the distinction between trust and risk taking reflects the
distinction between a willingness to be vulnerable and actually becoming vulnerable.”
(p. 910). Hence, trust is manifested in actual behaviour that allows vulnerability to the trustee
(Mayer and Gavin, 2005).
Regarding the relationship between trusting intentions and actual trusting behaviour
one can see a clear complementary relationship: Higher levels of trusting intentions are
associated with higher levels of vulnerable behaviour: Confident expectations lead to a higher
willingness to be vulnerable which leads to higher levels of actual behavioural trust (Gillespie
and Mann, 2004) such as higher levels of dependence Svensson (2004). The more leaders
trust their followers, the more power they will delegate (Tzafrir, 2005). Furthermore,
Gundlach and Cannon (2010) note that relationships with the highest level of trust (close
relationships) may also be the relationships with the highest level of vulnerability. This result
is in line with Scandura and Pellegrini’s (2008) observation that high-quality relationships are
characterized by high levels of vulnerability.
Trusting behaviour itself can be distinguished between active vulnerability for
example characterized by deliberately disclosing sensible, potentially damaging information
(Mayer and Gavin, 2005) and passive vulnerability for example consisting in merely relying
on another person (Gillespie and Mann, 2004). In a similar vein, Child and Moellering (2003)
distinguish institution-based trust from active trust development that is more risky because it
requires a leap of faith and investment. In the leader-follower relationship, followers express
disclosure-based trust by actively sharing potentially damaging information and reliance-
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
14
based trust by passively accepting the influence of the leader (Mayer and Gavin, 2005).
Contrary, an unwillingness to be vulnerable leads to less reliance-based and disclosure-based
behavioural trust that becomes apparent in verification strategies, monitoring, assurances, and
corroboration (Gundlach and Cannon, 2010).
Proposition 1: The trusting behaviour of a person will be manifested in active
vulnerability (disclosure-based trust) and passive vulnerability (reliance-based trust).
Most research on trust focuses on the passive manifestation of vulnerability in the
form of reliance-based behaviour. This may take the form of help-seeking (Hofmann et al.,
2009), feedback seeking (Hays and Williams, 2011), and acceptance of risks (Bidault et al.
2007). In addition, a high degree of reliance-based trust becomes apparent when employees or
followers are free to focus their full attention on job tasks (Colquitt et al., 2007) and allow the
leader to have significant influence over their working lives (Colquitt and Rodell, 2011).
Reliance-based trust (i.e. passive vulnerability) may not only be expressed by followers
towards their leader but also vice versa: The trust a leader holds towards his followers is
manifested in sharing his power with them (Tzafrir, 2005). Reliance-based trust is also
relevant in international business where foreign investors may express behavioural trust by
relying on local leaders rather than sending in expatriates which increases their vulnerability
(Child and Moellering, 2003). As can be seen from our results, most research on trusting
behaviour (i.e. actual vulnerability) concentrated on reliance-based trust (i.e. passive
vulnerability). We therefore encourage future work to address this imbalance and direct their
research efforts towards disclosure-based behavioural manifestations of trust (i.e. active
vulnerability).
Proposition 2: Reliance-based passive trust is more strongly related to the cognitive
trust building process and the positive expectation a person holds whereas disclosure-
based active vulnerability is more strongly related to the affective process of trust
building and the willingness to be vulnerable a person holds.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
15
Similarly to our conclusion that the strength of the relationship between trust
antecedents and the formation of trust bases depends on certain individual differences, the
connection between trusting intention (i.e. willingness to be vulnerable) and trusting
behaviour (i.e. actual vulnerability) appears to be contingent on a number of situational
factors as well as on the trust referent (Mayer and Gavin, 2005; Kickul et al., 2005). Research
has articulated that less behavioural trust (i.e. actual vulnerability) will be expressed in
situations with higher levels of uncertainty (Dirks and Ferrin, 2002), that are for example
characterized by an absence of formal contracts (Colquitt et al., 2007). Virtuality is said to
have a negative effect on trusting behaviour (Hill et al., 2009) that may be caused by the
increase in distant between trustee and trustor, here leader and follower, that makes face-to-
face meetings less likely which reduces vulnerability and hence behavioural trust (Yakovleva
et al., 2010). Furthermore, a number of studies pointed out that the higher the power or status
difference between trustee and trustor, the higher the level of vulnerability of the trustor will
be (de Jong et al., 2007; Mayer and Gavin, 2005; Yang et al., 2009) and accordingly the more
behavioural trust expressed by relying on the trustee and by disclosing information, the higher
is the level of vulnerability of the trustor. The same applies to situations that are characterized
by a high degree of asymmetrical task dependence (de Jong et al., 2007). Therefore, we are
able to make the following propositions:
Proposition 3: Situational characteristics moderate the strength of the connection
between trusting intentions (i.e. willingness to be vulnerable) and trusting behaviour
(i.e. actual vulnerability).
Step 3: From trusting vulnerable behaviour of one person to the level of trust his referent
holds
Trust generally develops from the iterative reciprocation of the parties’ trusting acts. The
process begins with one party trusting another enough to act on that trust (Weber et al. 2004).
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
16
The higher the vulnerability expressed by the trustor (e.g. the follower), the higher will be the
trust reciprocated by the trust referent (e.g. leader): Malhotra and Murningham (2002) argue
that “trusted parties were less likely to honour trust when trustors had taken small rather than
large risks as they attributed such actions to a lack of trust, which was viewed negatively
(p. 555). In the leadership context Gillespie and Mann (2004) note that trust building
leadership practises put the leader in a position of vulnerability and may be reciprocated by
the followers. This also applies to the international business context where Child and
Moellering (2003) report that for international investors who made themselves vulnerable by
relying on local leaders/managers instead of expatriates this might pay off as local
leaders/managers appreciate such signals of trust and reciprocate this to the advantage of the
investor.
Proposition 4: The higher the level of vulnerability expressed by the trustor, the higher will be
the reciprocal trust of the trust referent.
Implications for Research on Human Resource Management
Based on our results, we can conclude, that the current state of research does clearly not
satisfy the increasing relevance of vulnerability in interpersonal relationships in organisations.
Our results demonstrate that there are only a few studies that take the concept of vulnerability
into account but none of these studies explicitly addresses the role vulnerability plays exactly.
Furthermore, we found that the cognitive dimension of trust together with its antecedents
(ability, benevolence and integrity) appears relatively well researched. Contrary, the affective
dimension of trust needs further attention. Researchers should also be more sensitive when
conceptualizing the different components of trusting intentions which are positive
expectations and the willingness to be vulnerable. In particular they should differentiate these
underlying bases of trust from trustful behaviour which is actual vulnerability (either in active
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
17
or passive form). Finally, researchers should be more sensitive when conceptualizing the
different components of trust itself: positive expectations and willingness to be vulnerable and
in particular differentiate these underlying concepts of trust from trustful behaviour which is
the actual vulnerability (either in active or passive form).
Implications for Human Resource Management practise
Trust building through leaders expression of vulnerability
Our results demonstrate that the key issue for leaders’ perceived trustworthiness is the
expression of actual vulnerability. Thus, leaders should avoid showing themselves as
distanced and inaccessible to their followers. Instead they should demonstrate their own
vulnerability. Only when they present themselves as vulnerable they are able to build strong
emotional based relationships to their followers and thus, real trust relationships. Leaders may
express vulnerability in two regards: one being passive in the form of reliance-based trustful
behaviour, the other being active in the form of disclosure-based trustful behaviour. Reliance-
based trustful behaviour may in particular take the form of reducing control mechanisms or
monitoring systems. In terms of disclosure-based trust leaders may for example share
important strategic information with their followers.
Trust-building through followers expression of vulnerability
Our review clearly underlines that actual vulnerability expressed by the follower is essential
for trust to develop reciprocally in the relationship with the leader. Due to the hierarchical
nature of the leader-follower relationship, followers are typically per se in the more
vulnerable position. Nevertheless, in order to actually express vulnerability, the follower must
also hold some willingness to be vulnerable. To stimulate that willness leaders should avoid
any behaviour that might be perceived as opportunistic by the followers. Taking further into
account, that our review suggests that the willingness to be vulnerable (i.e. the intention to
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
18
trust) is mainly driven by the affective base of trust, two antecedents appear particularly
relevant: Emotional bonds between leader and follower as well as personal interactions
between the two. Hence in order to drive reciprocal trust, leaders should build an emotional
bond with their followers and secure regular personal meetings with the follower.
Conclusion
With this literature review, we are able to contribute to Human Resource Management and
Psychology in three regards. First, we show that there are only few studies that take the
concept of vulnerability into account while no single study explicitly addresses the role
vulnerability plays. This observation is striking as obviously a considerable amount of studies
rely on the concept of vulnerability when defining trust but apparently these studies lack a
deeper understanding of the concept of vulnerability and its relationship with trust. Second,
we introduce a comprehensive theoretical framework which allows us to distinguish between
the willingness-to-be-vulnerable and the actual vulnerability. Third, we provide clear
implications how leaders are able to build trustful relationships to their followers by being
willingly to be vulnerable and showing actual vulnerability
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
19
References
Alwang, J., Siegel, P. B., and Jorgensen, S. L. (2001), Vulnerability: a view from different
disciplines: The World Bank.
Aryee, S., Budhwar, P. S., and Chen, Z. X. (2002), “Trust as a mediator of the relationship
between organizational justice and work outcomes: Test of a social exchange model“,
Journal of organizational Behavior, Vol. 23 No. 3, pp. 267-285.
Axelrod, R. M. (1984), The evolution of cooperation. Basic books.
Bal, P. M., de Lange, A. H., Ybema, J. F., Jansen, P. G., and van der Velde, M. E. (2011),
Age and trust as moderators in the relation between procedural justice and turnover: a
large-scale longitudinal study“, Applied Psychology, Vol. 60 No. 1, pp. 66-86.
Bews, N. F., and Rossouw, G. J. (2002), “A role for business ethics in facilitating
trustworthiness”, Journal of Business Ethics, Vol. 39 No. 4, pp. 377-390. doi:
10.1023/a:1019700704414
Bidault, F., de La Torre, J., De Rham, C., and Sisto, M. (2007), “What makes executives trust
each other? The determinants of the willingness to rely on trust in business
partnerships“, Creativity and Innovation Management, Vol. 16 No. 3, pp. 317-329.
Bird, A., and Osland, J. S. (2005), “Making sense of intercultural collaboration“,
International Studies of Management and Organization, Vol. 35 No. 4, pp. 115-132.
Butler, P., Glover, L., and Tregaskis, O. (2011), “‘When the going gets tough’...: recession
and the resilience of workplace partnership“, British Journal of Industrial Relations,
Vol. 49 No. 4, pp. 666-687.
Caldwell, C. and Hansen, M. 2010, “Trustworthiness, governance, and wealth creation”,
Journal of Business Ethics, Vol. 97, pp. 173-188. doi:10.1007/s10551-010-0503-4.
Chambers, R. (2006), “Vulnerability, coping and policy” (Reprinted from IDS Bulletin, vol
20, 1989), Ids Bulletin-Institute of Development Studies, Vol. 37 No. 4, pp. 33-40.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
20
Child, J., and Mollering, G. (2003), “Contextual confidence and active trust development in
the Chinese business environment”, Organization Science, Vol. 14 No. 1, pp. 69-80,
doi: 10.1287/orsc.14.1.69.12813
Chow, P. T., Cheung, S. O., and Chan, K. Y. (2012), Trust-building in construction
contracting: Mechanism mechanism and expectation“, International Journal of
Project Management, Vol. 30 No.8, pp. 927-937.
Chua, R. Y. J., Ingram, P., and Morris, M. W. (2008), “From the head and the heart: Locating
cognition- and affect-based trust in managers' professional networks”, Academy of
Management Journal, Vol. 51 No. 3, pp. 436-452.
CIOMS. (2002), “International ethical guidelines for biomedical research involving human
subjects”, Council for International Organizations of Medical Sciences (CIOMS),
Geneva, CH.
Colquitt, J. A., Scott, B. A., and LePine, J. A. (2007), “Trust, trustworthiness, and trust
propensity: A meta-analytic test of their unique relationships with risk taking and job
performance”, Journal of Applied Psychology, Vol 92 No. 4, pp. 909-927, doi:
10.1037/0021-9010.92.4.909
Colquitt, J. A., and Rodell, J. B. (2011), “Justice, trust, and trustworthiness: A longitudinal
analysis integrating three theoretical perspectives“, Academy of Management Journal,
Vol. 54 No. 6, pp. 1183-1206.
Colquitt, J. A., LePine, J. A., Piccolo, R. F., Zapata, C. P., and Rich, B. L. (2012),
Explaining the justiceperformance relationship: Trust as exchange deepener or trust
as uncertainty reducer?“, Journal of Applied Psychology, Vol. 97 No. 1, pp. 1-15.
Coyle-Shapiro, J. A. M., Morrow, P. C., Richardson, R., and Dunn, S. R. (2002), “Using
profit sharing to enhance employee attitudes: A longitudinal examination of the effects
on trust and commitment“, Human resource management, Vol. 41 No. 4, pp. 423-439.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
21
Cruz, C. C., Gómez-Mejia, L. R., and Becerra, M. (2010), “Perceptions of benevolence and
the design of agency contracts: CEO-TMT relationships in family firms“, Academy of
Management Journal, Vol. 53 No. 1, pp. 69-89.
Deb, M., and Chavali, K. (2010), “Significance of trust and loyalty during financial crisis: A
study on customer behavior of indian banks“, South Asian Journal Of Management,
Vol. 17 No. 1, pp. 43-60.
de Jong, S. B., Van der Vegt, G. S., and Molleman, E. (2007), “The relationships among
asymmetry in task dependence, perceived helping behavior, and trust”, Journal of
Applied Psychology, Vol. 92 No. 6, pp. 1625-1637, doi: 10.1037/0021-9010.92.6.1625
Deutsch, M. (1958), “Trust and suspicion”, Journal of Conflict Resolution, Vol. 2, pp 265-
279.
Dirks, K. T., and Ferrin, D. L. (2002), “Trust in leadership: meta-analytic findings and
implications for research and practice”, Journal of Applied Psychology, Vol. 87 No.
4, pp. 611-628.
Fulmer, C. A., and Gelfand, M. J. (2012), “At what level (and in whom) we trust: trust across
multiple organizational levels”, Journal of Management, Vol. 38 No. 4, pp. 1167-
1230. doi: 10.1177/0149206312439327
Gardner, W. L., Fischer, D., and Hunt, J. G. J. (2009), “Emotional labor and leadership: A
threat to authenticity?“, The Leadership Quarterly, Vol. 20 No. 3, pp. 466-482.
Gillespie, N. A., and Mann, L. (2004), “Transformational leadership and shared values: the
building blocks of trust”, Journal of Managerial Psychology, Vol. 19 No. 6, pp. 588-
607, doi: 10.1108/02683940410551507
Graebner, M. E. (2009), “Caveat venditor: Trust asymmetries in acquisitions of
entrepreneurial firms“, Academy of Management Journal, Vol. 52 No. 3, pp. 435-472.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
22
Gundlach, G. T., and Cannon, J. P. (2010), “’Trust but verify’? The performance implications
of verification strategies in trusting relationships“, Journal Of The Academy Of
Marketing Science, Vol. 38 No. 4, pp. 399-417. doi:10.1007/s11747-009-0180-y
Hall, A. T., Blass, F. R., Ferris, G. R., and Massengale, R. (2004), “Leader reputation and
accountability in organizations: Implications for dysfunctional leader behavior“, The
Leadership Quarterly, Vol. 15 No. 4, pp. 515-536.
Hays, J. C., and Williams, J. R. (2011),”Testing multiple motives in feedback seeking: The
interaction of instrumentality and self protection motives”, Journal of Vocational
Behavior, Vol. 79 No. 2, pp. 496-504, doi: http://dx.doi.org/10.1016/j.jvb.2011.01.007
Hill, N. S., Bartol, K. M., Tesluk, P. E., and Langa, G. A. (2009), “Organizational context and
face-to-face interaction: Influences on the development of trust and collaborative
behaviors in computer-mediated groups”, Organizational Behavior and Human
Decision Processes, Vol. 108 No. 2, pp. 187-201, doi: 10.1016/j.obhdp.2008.10.002
Hofmann, D. A., Lei, Z. K., and Grant, A. M. (2009), “Seeking help in the shadow of doubt:
the sensemaking processes underlying how nurses decide whom to ask for advice”,
Journal of Applied Psychology, Vol. 94 No. 5, pp. 1261-1274, doi: 10.1037/a0016557
Howorth, C., and Moro, A. (2006), “Trust within entrepreneur bank relationships: Insights
from Italy“, Entrepreneurship Theory and Practice, Vol. 30 No. 4, pp. 495-517.
Huang, X., Iun, J., Liu, A., and Gong, Y. (2010), “Does participative leadership enhance work
performance by inducing empowerment or trust? The differential effects on
managerial and non-managerial subordinates“, Journal of Organizational Behavior,
Vol. 31 No. 1, pp. 122-143.
ISDR (2002). “Living with the risk : A global review of disaster reduction initiatives :
Preliminary version”, United Nations, Geneva, CH.
Jiang, C. X., Chua, R. Y., Kotabe, M., and Murray, J. Y. (2011), “Effects of cultural ethnicity,
firm size, and firm age on senior executives' trust in their overseas business partners:
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
23
Evidence from China”, Journal of International Business Studies, Vol. 42 No. 9, pp.
1150-1173, doi: 10.1057/jibs.2011.35
Johnson, R. E., and Lord, R. G. (2010), “Implicit effects of justice on self-identity”, Journal
of Applied Psychology, Vol. 95 No. 4, pp. 681-695, doi: 10.1037/a0019298
Khazanchi, S., and Masterson, S. S. (2011), Who and what is fair matters: A multi-foci
social exchange model of creativity“, Journal of Organizational Behavior, Vol. 32
No. 1, pp. 86-106. doi:10.1002/job.682.
Kickul, J., Gundry, L. K., and Posig, M. (2005), “Does trust matter? The relationship between
equity sensitivity and perceived organizational justice“, Journal of Business Ethics,
Vol. 56 No. 3, pp. 205-218.
Korsgaard, M. A., Brodt, S. E., and Whitener, E. M. (2002), “Trust in the face of conflict: The
role of managerial trustworthy behavior and organizational context”, Journal of
Applied Psychology, Vol. 87 No. 2, pp. 312-319. doi: 10.1037//0021-9010.87.2.312
Lapidot, Y., Kark, R., and Shamir, B. (2007), “The impact of situational vulnerability on the
development and erosion of followers' trust in their leader”, Leadership Quarterly,
Vol. 18 No. 1, pp. 16-34, doi: 10.1016/j.leaqua.2006.11.004
Lewis, J., and Weigert, A. (1985), Trust as a social reality”, Social Forces, Vol. 63, pp. 967-
985.
Lin, F. R., Sung, Y. W., and Lo, Y. P. (2003), “Effects of trust mechanisms on supply-chain
performance: A multi-agent simulation study“, International Journal of Electronic
Commerce, Vol. 9 No. 4, pp. 9-112.
Louis, M. (1980), “Surprise and sense making: What newcomers experience in entering
unfamiliar organizational settings“, Administrative Science Quarterly, Vol. 25 No. 2,
pp. 226-251.
Luhmann, N. (1988), “Familiarity, confidence, trust: Problems and alternatives”, in Gambetta,
D. G. (Ed.), Trust; Basil Blackwell, New York, NY, pp. 94-107.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
24
Maitlis, S., and Christianson, M. (2014), “Sensemaking in Organizations: Taking Stock and
Moving Forward”, The Academy of Management Annals, Vol. 8, No. 1, pp. 57-125.
Maitlis, S., Vogus, T. J., and Lawrence, T. B. (2013), “ Sensemaking and emotion in
organizations”, Organizational Psychology Review, Vol. 3, No. 3, pp. 222247.
Malhotra, D., and Murnighan, J. K. (2002), “The effects of contracts on interpersonal trust”,
Administrative Science Quarterly, Vol. 47, No. 3, pp. 534-559. doi: 10.2307/3094850
Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995), “An integrative model of
organizational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709-734,
doi: 10.2307/258792
Mayer, R. C., and Gavin, M. B. (2005), “Trust in management and performance: Who minds
the shop while the employees watch the boss?”, Academy of Management Journal,
Vol. 48 No. 5, pp. 874-888.
McAllister, D. J. (1995), “Affect- and cognition-based trust as foundations for interpersonal
cooperation in organizations”, Academy of Management Journal, Vol. 38 No. 1, pp.
24-59, doi: 10.2307/256727
McEvily, B., and Tortoriello, M. (2010), “Measuring trust in organisational research: Review
and recommendations”, Journal of Trust Research, Vol. 1 No. 1, pp. 23-63.
Mislin, A. A., Campagna, R. L., and Bottom, W. P. (2011), “After the deal: Talk, trust
building and the implementation of negotiated agreements”, Organizational Behavior
and Human Decision Processes, Vol. 115 No. 1, pp. 55-68, doi:
10.1016/j.obhdp.2011.01.002
Moorman, Christine, Gerald Zaltman, and Rohit Deshpande (1992), "Relationships between
providers and users of market research: the dynamics of trust within and between
organisations," Journal of Marketing Research, Vol. 24, pp. 314-328.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
25
Muethel, M., Siebdrat, F., and Hoegl, M. (2012), “When do we really need interpersonal trust
in globally dispersed new product development teams?“, RandD Management, Vol. 42
No. 1, pp. 31-46.
Nguyen, T. V., and Rose, J. (2009), “Building trust—Evidence from Vietnamese
entrepreneurs“, Journal of Business Venturing, Vol. 24 No. 2, pp.165-182.
Norman, S. M., Avolio, B. J., and Luthans, F. (2010), “The impact of positivity and
transparency on trust in leaders and their perceived effectiveness“, The Leadership
Quarterly, Vol. 21 No. 3, pp. 350-364.
Olsen, R. (2012), “Trust: the underappreciated investment risk attribute“, Journal of
Behavioral Finance, Vol. 13 No. 4, pp. 308-313.
Oreg, S., Vakola, M. and Armenakis, A. (2011), “Change recipients' reactions to
organizational change: a 60-year review of quantitative studies”, Journal of Applied
Behavioral Science, Vol. 47 No. 4, pp. 461-524.
Pittaway, L., Robertson, M., Munir, K., Denyer, D. and Neely, A. (2004), “Networking and
innovation: a systematic review of the evidence”, International Journal of
Management Reviews, Vol. 5/6 No. 3/4, pp. 137-168.
Poon, J. M. (2013) "Effects of benevolence, integrity, and ability on trust-in-supervisor",
Employee Relations, Vol. 35 No. 4, pp. 396 407.
Premeaux, S. F., and Bedeian, A. G. (2003), “Breaking the silence: The moderating effects of
self-monitoring in predicting speaking up in the workplace”, Journal of Management
Studies, Vol. 40 No. 6, pp. 1537-1562. doi: 10.1111/1467-6486.00390
Robertson, R., Gockel, C., and Brauner, E., (2013), "Trust your teammates or bosses?
Differential effects of trust on transactive memory, job satisfaction, and performance",
Employee Relations, Vol. 35 No. 2, pp.222 242.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
26
Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. (1998), “Not so different after all:
A cross-discipline view of trust”, Academy of Management Review, Vol. 23 No. 3, pp.
393-404. doi: 10.5465/amr.1998.926617
Sako, M., and Helper, S. (1998). Determinants of trust in supplier relations: Evidence from
the automotive industry in Japan and the United States. Journal of Economic Behavior
and Organization, Vol. 34 No.3, pp. 387-417.
Scandura, T. A., and Pellegrini, E. K. (2008), “Trust and leader-member exchange a closer
look at relational vulnerability“, Journal of Leadership and Organizational Studies,
Vol. 15 No. 2, pp. 101-110.
Schoorman, F. D., Mayer, R. C., and Davis, J. H. (2007), “An integrative model of
organizational trust: Past, present, and future”, Academy of Management Review, Vol.
32 No. 2, pp. 344-354.
Sheffi, Y. (2005), The resilient enterprise: Overcoming vulnerability for competitive
advantage, MIT Press, Cambridge, MA.
Simons, T. (2002), “Behavioral integrity: The perceived alignment between managers' words
and deeds as a research focus“, Organization Science, Vol. 13 No. 1, pp. 18-35.
Simmons, B. L., Gooty, J., Nelson, D. L., and Little, L. M. (2009), “Secure attachment:
implications for hope, trust, burnout, and performance“, Journal of Organizational
Behavior, Vol. 30 No. 2, pp. 233-247.
Sniezek, J. A., and Van Swol, L. M. (2001), “Trust, confidence, and expertise in a judge-
advisor system“, Organizational behavior and human decision processes, Vol. 84 No.
2, pp. 288-307.
Suff, R., and Williams, S., (2004), "The myth of mutuality? Employee perceptions of
partnership at Borg Warner", Employee Relations, Vol. 26 No. 1, pp.30 43.
Svensson, G. (2004), “Vulnerability in business relationships: the gap between dependence
and trust“, Journal of business and industrial marketing, Vol. 19 No. 7, pp. 469-483.
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
27
Tranfield, D.R., Denyer, D. and Smart, P. (2003), “Towards a Methodology for Developing
Evidence-Informed Management Knowledge by Means of Systematic Review”,
British Journal of Management, Vol. 4 No. 3, pp. 207-222.
Tsui-Auch, L. S., and Mollering, G. (2010), “Wary managers: Unfavorable environments,
perceived vulnerability, and the development of trust in foreign enterprises in China”,
Journal of International Business Studies, Vol. 41 No. 6, pp. 1016-1035. doi:
10.1057/jibs.2009.28
Turner, B. L., Kasperson, R. E., Matson, P. A., McCarthy, J. J., Corell, R. W., Christensen,
L., . . . Schiller, A. (2003), “A framework for vulnerability analysis in sustainability
science”, Proceedings of the National Academy of Sciences of the United States of
America, Vol. 100 No. 14, pp. 8074-8079. doi: 10.1073/pnas.1231335100
Tzafrir, S. S. (2005), “The relationship between trust, HRM practices and firm performance“,
The International Journal of Human Resource Management, Vol. 16 No. 9, pp. 1600-
1622.
Weber, J. M., Malhotra, D., and Murnighan, J. K. (2004), “Normal acts of irrational trust:
Motivated attributions and the trust development process“, Research in organizational
behavior, Vol. 26, pp. 75-101.
Weick, K. E., Sutcliffe, K. M., and Obstfeld, D. (2005), Organizing and the process of
sensemaking“, Organization science, Vol. 16 No. 4, pp. 409-421.
Yakovleva, M., Reilly, R. R., and Werko, R. (2010), “Why do we trust? moving beyond
individual to dyadic perceptions”, Journal of Applied Psychology,Vol. 95 No. 1, pp.
79-91. doi: 10.1037/a0017102
Yang, J., and Mossholder, K. W. (2010), „Examining the effects of trust in leaders: A bases-
and-foci approach“, Leadership Quarterly, Vol. 21 No. 1, pp. 50-63.
doi:10.1016/j.leaqua.2009.10.004
VULNERABILITY AND TRUST IN LEADER-FOLLOWER RELATIONSHIPS
28
Yang, J. X., Mossholder, K. W., and Peng, T. K. (2009), “Supervisory procedural justice
effects: The mediating roles of cognitive and affective trust”, Leadership Quarterly,
Vol. 20 No. 2, pp. 143-154. doi: 10.1016/j.leaqua.2009.01.009
G: Trust Referent
A: Trust Antecedents
Assessment of
Trustworthiness
Interaction Frequency
Emotional Bonds
F: Trusting Behaviour:
Actual Vulnerability
Reliance-Based Trust:
Passive Vulnerability
Disclosure-Based Trust:
Active Vulnerability
C: Bases of Trust
Cognitive Trust
Affective Trust
D: Trusting Intention
Positive Expectations
Willingness to be
Vulnerable
B: Individual
Characteristics
e.g. Trustor‘s
Propenstity
to Trust
E: Situational
Characteristics
e.g. Perceived Risk
Trust Antecedents ->
Bases of Trust ->
Trusting Beliefs ->
Trusting Behaviour
P3
FIGURE 1
P4
P1
P2
... However, researchers suggest developing the vulnerability scale for interpersonal relationships and to study the direct relationship between vulnerability and trust. Nienaber et al. (2015) through their study exploring vulnerability and trust in leader-follower relationships give a clear distinction between trust and vulnerability by suggesting that trust is 'willingness to be vulnerable' whereas vulnerability is the 'trusting behavior'. In this attempt the researchers have measured vulnerability using disclosure-based trust (active vulnerability). ...
... Contemporary shift in nature of work and work situations such as uncertain work environment caused by pandemics such as Covid 19 and geopolitical tensions, team-work, growing social media exposure, need to resonate more with people, growing concerns for psychological and mental health, have redefined the leadership roles where the leaders are expected to be more humane, self-aware, open, concerned, transparent, accessible, authentic (even imperfect), and instrumental in building trust and psychological safety in the team they are leading (Cashman, 2017;McAdoo, 2025). As a result, there is a growing recognition of leadership vulnerability as a concept in leaders/organizational behaviorists/literature/articles demanding a scientifically proven definition of the construct (Simonis, 2015;Nienaber et al., 2015). The emergence of leadership vulnerability as a construct is new and demands an organizational-oriented approach in its definition instead of hard-core medical or psychological definitions. ...
... Morgan (2023) suggests that the concept of 'Leadership Vulnerability' should focus on the intentional efforts of leaders to open themselves to an emotional situation/exposure to create a positive result. Few research attempts have been made to examine Leadership vulnerability using either a single question measurement (Lopez, 2018) or using Trust or/and Psychological Cognitive scale as a proxy measure for leadership vulnerability (Nienaber et al., 2015;Simonis, 2015) without properly defining leadership vulnerability and its dimensions, hence of limited use for further organizational research. Being a new concept, no effort has been made till now for its scientific conceptualization or measurement. ...
Article
Full-text available
Leadership Vulnerability has garnered increasing attention in recent years from scholars and practitioners. However, the research in this field is still in its infancy and requires attention from academicians and researchers. The studies exploring vulnerability are mostly general without giving much consideration to the conceptualization of leadership vulnerability and only a few have attempted to include it in empirical studies. To fill this research gap, we have used the grounded theory approach to get an in-depth understanding of the concept of leadership vulnerability and to develop the content validity of the instrument that is deeply rooted in the data. Subsequently, the concepts emerging from grounded theory were positioned in the literature and then finally were assessed for content validity through a panel of experts using CVR, I-CVI, S-CVI, and Kappa statistics. The findings of the paper provide a valuable addition to the theory and practice on leadership by conceptualizing leadership vulnerability and suggesting an instrument for its measurement for researchers and practitioners.
... We extend Misztal's (2012) and Weibel and colleagues' (2023) theorizing on vulnerability by demonstrating that dyads experience vulnerability relationally and argue this sense of shared vulnerability strengthens their bond. Importantly, despite an ILOC relational threat initially triggering a sense of heightened vulnerability for one party, those who opt to share their feelings engage in active vulnerability (Nienaber, Hofeditz, & Romeike, 2015) and provide a platform for reciprocal vulnerability. This shifts the vulnerability from being more salient for one party to being shared and experienced relationally. ...
... This shifts the vulnerability from being more salient for one party to being shared and experienced relationally. Taken together, these insights represent a useful extension as-despite acknowledging vulnerability as a relational construct-scholarship has mostly conceptualized it as experienced by the trustor or trustee individually (Nienaber et al., 2015). Finally, our observations of contextual and active vulnerability also add value to the ongoing debate of whether vulnerability is an existential condition or a deliberate decision (Schafheitle, Weibel, & Möllering, 2023). ...
Article
Full-text available
Interpersonal trusting relationships frequently experience relational threats that require both parties to engage actively in trust maintenance efforts. Yet, trust research has tended to focus on trust formation, or trust repair in the case of a violation, and offers us little insight regarding how these more ambiguous threats to trusting relationships are experienced and overcome relationally. To provide novel insight on this topic, this exploratory study gathers dyadic interview data from 26 manager–employee trusting relationships regarding their experience of relational threats and their proactive efforts to overcome these negative relational experiences. Findings show that the experience of a relational threat triggers a three-stage trust maintenance process that includes an assessment phase, an active maintenance phase, and an outcome phase. Threats are assessed at the individual level via cognitive and affective sensemaking, while trust maintenance efforts (creating a shared mental model, cognitive and structural reassurance, and dyadic problem solving) require dyadic counterparts to act with mutual agency to overcome the relational threat and avoid a loss of trust. Trust maintenance processes support dyads to either maintain or strengthen their existing trusting relationships. Our findings advance our theoretical understanding of interpersonal trust maintenance by demonstrating that this process unfolds across three phases and can lead to different outcomes for dyads’ trusting relationships. We offer practical guidelines to safeguard existing trusting relationships, as well as a new agenda for trust scholars to extend our theorizing.
... Specific leadership was labeled by Möllering and Tsui-Auch (2010) as vulnerable behavior, capable of convincing followers to trust the leader. It was discovered that consultative decision-making, sharing mutual principles with team members, and modeling and communicating a value-driven collective vision greatly influence the trust of followers in leaders (Nienaber et al., 2015). ...
... Leaders who demonstrate vulnerability by openly acknowledging their limitations and mistakes create an atmosphere of trust and inclusivity, which is crucial for successful organizational change. This aligns with Nienaber et al. (2015), who highlight the significance of vulnerability in fostering trust between leaders and their teams. Vulnerability allows leaders to connect with employees on a deeper level, encouraging participation and reducing resistance during transitions (Leroy et al., 2015). ...
Article
Full-text available
This research aimed to investigate the role of humanizing leadership in enhancing the effectiveness of change management strategies within organizations. Specifically, it focused on how humanizing leadership influences change outcomes and the extent to which organizational culture moderates this relationship. The study addressed critical questions regarding the impact of leadership behaviors, such as model vulnerability, emotional intelligence, open communication, and psychological safety on effective change management and employee performance. A quantitative approach was employed to provide a comprehensive analysis of the phenomena. Quantitative data were collected from a sample of 325 employees through surveys that measured perceptions of Humanizing leadership behaviors, organizational culture, and change outcomes. Data was analyzed by IBM SPSS 26.0. The findings revealed that humanizing leadership behaviors significantly enhances the success of change initiatives, primarily through improved employee engagement and reduced resistance. Organizational culture was found to play a moderating role, amplifying the positive effects of empathetic and inclusive leadership practices. The study provides actionable recommendations for organizational leaders and managers to foster a culture that supports humanizing leadership. By adopting leadership strategies that emphasize vulnerability, empathy, and inclusivity, organizations can enhance their adaptability and resilience against the backdrop of continuous change. These findings are particularly valuable for enhancing managerial practices and informing policy within corporate settings.
... around sources of authority in the classroom, student-student and student-instructor relationships, and what course engagement looks like). The importance of vulnerability, in addition to trust in higher education, is becoming increasingly apparent in building relationships between faculty and students (see Abruzzo, Sklar, and McMahon 2019;Archer-Kuhn and MacKinnon 2020;Nienaber, Hofeditz, and Romeike, 2015). When we looked back on our experience of the courses and what we observed in student writing, we found that a connected sense of risk and vulnerability mirrored what we learned from the pedagogy of vulnerability. ...
Article
Full-text available
In this reflective essay, we explore how we and our students experienced trust and opened ourselves up to being vulnerable in two iterations of a course that was built on the pedagogies of ungrading and co-creation in teaching and learning (CCTL). As approaches that fall under the broader umbrella of critical pedagogy, ungrading usually involves an alternative to conventional alphanumeric grading systems, while co-creation in teaching and learning consists of a varied scale of student-and-instructor partnerships in the classroom. The course contexts explored here take ungrading to mean student self-assessment and self-assignment of grades, and our implementation of co-creation focused on significant elements of the course such as expectations, content, assignments, and assessments. We suggest that our combination of these pedagogies exposed the significance of vulnerability to nurturing trust in the college classroom. After an overview of the salient points in the literature on these pedagogies and a discussion of trust and vulnerability, we recollect our own experiences of them in a co-taught second-year honors course. Drawing from our reflections and those expressed in student writing, we observe that we brought a significant level of trust in each other and our students to the course. Further, we note that the processes of sharing authority embedded in both pedagogies significantly deepened that trust while also underscoring, in retrospect, the remarkable degree of vulnerability made accessible to students and instructors alike. Instructors who wish to implement these approaches should be keenly aware of the additional opportunities that trust and vulnerability, as made possible via these pedagogies, offer for building relationships in the classroom and working toward increased inclusivity and equity in the course community.
Article
Full-text available
In the care sector, professionals face numerous challenges, such as a lack of resources, overloaded wards, physical and psychological strain, stressful constellations with patients and cooperation with medical professionals. Care robots are therefore increasingly being used to provide relief or to test new forms of interaction. However, this also raises the question of trust in these technical companions and the potential vulnerability to which these people then expose themselves. This article deals with an ethical analysis of the two concepts of trust and vulnerability in the context of care robotics. The first step is to examine what can be understood by vulnerability, focusing specifically on Misztal's three proposed types (relationships, future anticipation, past experiences). This strategy is often used as a starting point by authors and also seems relevant for the connection to the concept of trust. In a second step, these three types of human vulnerability are examined on the basis of a technical concept of trust. It is shown that (1) relationships and thus also interdependence can create additional options, (2) the anticipation problem with regard to the actions of others also makes responsibility transferable and (3) an explication of freedom is also associated with potential traumatic experiences. The final step brings together the previous considerations and makes it clear once again that trust in a care robot need not only be associated with vulnerability, but that vulnerability can also potentially be reduced, transferred and overcome.
Article
Interpersonal trusting relationships frequently experience relational threats that require both parties to engage actively in trust maintenance efforts. Yet, trust research has tended to focus on trust formation, or trust repair in the case of a violation, and offers us little insight regarding how these more ambiguous threats to trusting relationships are experienced and overcome relationally. To provide novel insight on this topic, this exploratory study gathers dyadic interview data from 26 manager–employee trusting relationships regarding their experience of relational threats and their proactive efforts to overcome these negative relational experiences. Findings show that the experience of a relational threat triggers a three-stage trust maintenance process that includes an assessment phase, an active maintenance phase, and an outcome phase. Threats are assessed at the individual level via cognitive and affective sensemaking, while trust maintenance efforts (creating a shared mental model, cognitive and structural reassurance, and dyadic problem solving) require dyadic counterparts to act with mutual agency to overcome the relational threat and avoid a loss of trust. Trust maintenance processes support dyads to either maintain or strengthen their existing trusting relationships. Our findings advance our theoretical understanding of interpersonal trust maintenance by demonstrating that this process unfolds across three phases and can lead to different outcomes for dyads’ trusting relationships. We offer practical guidelines to safeguard existing trusting relationships, as well as a new agenda for trust scholars to extend our theorizing.
Article
Full-text available
Leaders, often perceived as possessing exceptional confidence and competence, are not immune to feelings of self-doubt. Leader impostorism describes the experience that one’s attributes, experiences, skills, and abilities fall short of the standards expected in the leadership role, resulting in a sense of deception in fulfilling leadership responsibilities. While existing research has examined the antecedents and individual outcomes of leader impostorism, its implications for leaders’ treatment of subordinates remain largely unexplored. In this research, we investigate the downstream consequences of leader impostorism on behaviors directed toward subordinates. Integrating research on leader impostorism with power dependence theory, we propose that for leaders with a low power distance orientation, leader impostorism increases supervisor support through the mechanism of perceived power dependence on subordinates, whereas for leaders with a high power distance orientation, leader impostorism increases supervisor undermining through the mechanism of power threat. The findings from two field studies support our theoretical model. This research contributes to the literature by broadening the understanding of the impact of leader impostorism on subordinates, extending power dependence theory within leader–subordinate dynamics, and offering insights into the dual nature of impostorism and its contingent effects.
Article
Purpose The purpose of this research is to investigate how WeChat official account marketing activities influence consumer brand loyalty through instrument- and emotion-based paths (i.e. cognitive and affective brand trust) and how these paths operate depending on consumer shopping motivation. Design/methodology/approach We tested hypotheses using structural equation modeling with a three-wave online survey of two-week intervals administered to 179 individuals who follow the WeChat official account of a yoga gym brand. Findings WeChat official account marketing activities are positively related to cognitive and affective brand trust. Affective trust mediated the relationship between WeChat official account marketing activities and brand loyalty, and hedonic motivation moderated this relationship. Originality/value Our research extends the current knowledge by articulating that the influence of WeChat official account marketing activities on brand loyalty is mediated by affective brand trust, and hedonic motivation as a key contingency affects this mediation effect.
Article
Despite the burgeoning literature on leadership and employees' feedback‐seeking behaviors, research linking contemporary leadership styles and feedback seeking is still limited. Our study examines the role of humble leadership on employees' feedback‐seeking behaviors. Based on data from 172 leader‐follower dyadic pairs, our results show that humble leadership has a positive effect on feedback‐seeking behaviors via employees' affective trust in the leader when the mediating effects of psychological safety and cognitive trust were controlled. Furthermore, the overall mediation effect of affective trust is strengthened by higher levels of employees' perceived human resource management strength. Theoretical and practical implications are discussed.
Article
Full-text available
The authors investigate the role of trust between knowledge users and knowledge providers. The kind of knowledge of special concern is formal market research. Users include marketing and nonmarketing managers; providers include marketing researchers within a user's own firm and those external to the firm. A theory of the relationships centering on personal trust is developed to examine (1) how users’ trust in researchers influences various relationship processes and the use of market research and (2) how the relationships vary when examined across dyads. The relationships were tested in a sample of 779 users and providers of market research information. Results indicate that trust and perceived quality of interaction contribute most significantly to research utilization, with trust having indirect effects through other relationship processes, as opposed to important direct effects on research utilization. Deeper levels of exchange, including researcher involvement in the research process and user commitment to the research relationship, however, have little effect on research use. Finally, the relationships in the model show few differences depending on whether the producer and user share marketing or research orientations. Interorganizational dyads, however, generally exhibit stronger model relationships than intraorganizational dyads.
Article
A retrospective assessment of 100 consecutive accepted referrals to a crisis intervention centre was undertaken. Successful outcome and a good level of previous coping were most likely amongst those not exposed to any of the Brown and Harris vulnerability factors, although there was no evidence for an additive effect for those experiencing more than one vulnerability factor. A significantly greater number of clients without a confidante showed a poor level of previous coping but none of the other vulnerability factors individually had a major influence on coping or outcome. The implications of the findings are discussed.
Article
The rise of globalization is accompanied by an increase in alliances and collaboration. While firms are gaining in expertise and cultural sensitivity, some initiatives founder as people fail to fully consider culture’s impact. We adopt a cultural sense-making approach to intercultural collaboration, presenting a framework for analyzing cultural differences—value dimensions and communication styles rarely compiled in one location. Using these concepts, we explain cultural barriers to trust, a key component in collaboration, and demonstrate how cultural sense making is useful in analyzing intercultural situations. Fourteen strategies to help managers collaborate more effectively across cultures follow.
Article
In this study, we view the contracts of top managers from an integrated agency theory-trust perspective, arguing that two conditions reflecting CEO risk bearing, top management team (TMT) behavioral uncertainty and CEO vulnerability, are negatively related to a CEO's perceptions of TMT benevolence toward him-/herself, which in turn influence the protective features of TMT contracts. Model tests on data from 122 family-owned firms in Spain support our hypotheses overall. Agency theory may be enhanced by accounting for a CEO's perceptions (as principal) of TMT benevolence and for the effect of those perceptions on contracts with TMT members (as agents).
Article
Although trust is an underdeveloped concept in sociology, promising theoretical formulations are available in the recent work of Luhmann and Barber. This sociological version complements the psychological and attitudinal conceptualizations of experimental and survey researchers. Trust is seen to include both emotional and cognitive dimensions and to function as a deep assumption underwriting social order. Contemporary examples such as lying, family exchange, monetary attitudes, and litigation illustrate the centrality of trust as a sociological reality.
Article
Despite a significant amount of theoretical and empirical attention, the connection between justice and trust remains poorly understood. Our study utilized Mayer, Davis, and Schoorman's (1995) distinction between trustworthiness (the ability, benevolence, and integrity of a trustee) and trust (a willingness to be vulnerable to the trustee) to clarify that connection. More specifically, we drew on a theoretical integration of social exchange theory, the relational model, and fairness heuristic theory to derive predictions about the relationships among justice, trustworthiness, and trust, with supervisors as the referent. A longitudinal field study stretching over two periods showed that informational justice was a significant predictor of subsequent trust perceptions, even when analyses controlled for prior levels of trust and trustworthiness. However, the relationship between justice and trustworthiness was shown to be reciprocal. Procedural and interpersonal justice were significant predictors of subsequent levels of benevolence and integrity, with integrity predicting subsequent levels of all four justice dimensions. We describe the theoretical implications of these results for future research in the justice and trust literatures.