ArticlePDF Available

Abstract and Figures

Trust plays an important role in many Information Systems (IS)-enabled situations. Most IS research employs trust as a measure of interpersonal or person-to-firm relations, such as trust in a Web vendor or a virtual team member. Although trust in other people is important, this paper suggests that trust in the information technology (IT) itself also plays a role in shaping IT-related beliefs and behavior. To advance trust and technology research, this paper presents a set of trust in technology construct definitions and measures. We also empirically examine these construct measures using tests of convergent, discriminant, and nomological validity. This study contributes to the literature by providing: a) a framework that differentiates trust in technology from trust in people, b) a theory-based set of definitions necessary for investigating different kinds of trust in technology, and c) validated trust in technology measures useful to research and practice.
Content may be subject to copyright.
Trust in Technology: Its Components and Measures
Trust in a Specific Technology: An Investigation of its Components
and Measures
D. H. MCKNIGHT
Eli Broad College of Business, Michigan State University, U. S. A
M. CARTER
College of Business and Behavioral Sciences, Clemson University, U. S. A.
J. B. THATCHER
College of Business and Behavioral Sciences, Clemson University, U. S. A.
and
P.F. CLAY
College of Business, Washington State University, U. S. A.


  
!" ""    "  
"  "
           "               #  
" "" 
 "$%&'"
      "" ' &    "     
"
(")*$+,-./01!2(0-3145
4$67
!+-$"(* 

1. INTRODUCTION
Trust is commonly defined as an individual’s willingness to depend on another party because of the characteristics
of the other party [Rousseau et al. 1998]. This study concentrates on the latter half of this definition, the
characteristics or attributes of the trustee, usually termed ‘trust’ or ‘trusting beliefs.’ Research has found trust to be
not only useful, but also central [Golembiewski  (& 89:;<  "  
    %& "=>  2 899,?
899;<=!%89:@<7#> 
2 =899,<  %  A % B  C   "
%
#=7&899;?289:9<
                        
#%""
    # %   ' 7
#     =4DEEF?+DEE,?2   DEEG?
+"DEED?%DEEF<  AH
   =(& 8999< !        
5 "5%=I
DEE,<"="JDEE;< "
  % 
K""A 
   " (     #  
"

Trust in Technology: Its Components and Measures
!H $ * 6 +" *  !"     . J (" 
J " 3  .2"  @,,D@3 !? .$ &"L?  (
*"("JJ (3 ((D9GF@
3    !?  .$ L?  >   J   *    "  ("    J  
J   (3  ( (D9GF@ 3 !? .$ )L?   -7 (
*  .    (" J "  3 
-!998G@
3!?.$L%
#"/!%
0&%&DEE8/!M
"/!
6% /!%
&% &&J/!
 /!"/!
"""""
/!"
The primary difference between this study and prior studies is that we focus on trust in the technology itself
instead of trust in people, organizations, or human surrogates. The purpose of this study is to develop trust in
technology definitions and measures and to test how they work with a nomological network. This helps address the
problem that IT trust research focused on trust in people has not profited from additionally considering trust in the
technology itself. Just as the Technology Acceptance Model’s (TAM) perceived usefulness and ease of use
concepts directly focus on the attributes of the technology itself, so our focus is on the trust-related attributes of the
technology itself. #%"
0&%&HOur belief is that by focusing on trust in the technology, we can better determine
what it is about technology that makes the technology itself trustworthy, irrespective of the people and human
structures that surround the technology. This focus should yield new insights into the nature of how trust works in a
technological context.
" %H
#%H" 
    "      %  % % 
 "J" " 
 %"  ""  "
  J"%#
" H "    B 
                      "  K  %&
 C=>DEE;<
& #"%&
 N""
% # %" '  !% 
#%"#% "
"#%"
" "
= DE88<    "     "
%"M$What is the nomological network
surrounding trust in technology? What is the inuence of trust in technology on individuals’
post-adoptive technology use behaviors?
%"M% 
#"##
 J "" %   "      %& '
%% 
4""J "
"%& 
 % %&  #"   " '  
"
Trust in Technology: Its Components and Measures
2. THEORETICAL FOUNDATION
#A 
" 0#BC
"    
      %  5"  " 
&6%   
"$B-"C=7DEEE$
FG<##% 
""%"
%B HO%&"%%C
=7DEEE$F@< %"""%%%
 %     %   6%     
"%#% %
=+"( 899G<
          "            
"
  " 0  %   
&    "     ) "   
)H%  -"
   =+"  (  899G<        H
  "   7
 B J&PH    "  
C 6      J&    "   
 %&" 6
  " &
Different Types of Trust
/ " =2%&  J& 899G? - * DEE@< "" '
    Initial trust )"
  #  
% !#!="4DEEF?+"
DEED?IDEE,% A
  0      calculus-based trust =2%&  J& 899G< 
%#"
&#"=(899E<
J%"  "" 
H
0  %    &%"  # 
Knowledge-based trust       &%       %  "   predict
 =2%&J&899G<
 % M&%
" &%" J  
%    & 
%"=2%&J&899G<
"=- DEEF?2DEE:?
 DE88<   " &%"   "    
 "&%"  
K
"             %    
 %    #=+   DEE;<   %
 "&%"" "
  "  7   "  #   
""!#!
/&%
Trust in Technology: Its Components and Measures
M% =+"DEED< 
"
Contextual Condition
       "    &  
8& 
  "        &  =/&  89:8<  *"      M    
&    #   
%
! "%
% 7#%
     *#     
#  &     "       "
 /""
 &  " "  M        #
=J89:G<%&    
  %    6        "
  &
$((5- "
Trust in People Trust in Technology
Contextual Condition Risk, Uncertainty, Lack of total control Risk, Uncertainty, Lack of total user control
Object of Dependence People—in terms of moral agency and both volitional
and non-volitional factors
Technologies—in terms of amoral and non-volitional
factors only
Nature of the Trustor’s
Expectations
(regarding the Object of
Dependence)
1. Do things for you in a competent way. (ability
[Mayer et al. 1995])
1. Demonstrate possession of the needed functionality
to do a required task.
2. Are caring and considerate of you; are benevolent
towards you; possess the will and moral agency to
help you when needed. (benevolence [Mayer et al.
1995])
2. Are able to provide you effective help when needed
(e.g., through a help menu).
3. Are consistent in 1.-2 above. (predictability
[McKnight et al. 1998])
3. Operate reliably or consistently without failing.
Object of Dependence
            "  '                )  
  % D  
"?%      "   %
"& =%<"7#
%    "      %  "              %
" "   A     H 
%"A" & 
% " "H  A"      
%"7% 
          %    &    "    %  "
"#%"J"&
"A"H
% 
"  % . % H
"J899FJ%"
&"7
 " %  A  K"      %
"
Nature of Trustor’s Expectations
"" '
)    "
"
Trust in Technology: Its Components and Measures
#=899;<H
A "H    
) . ) "#H
'# # 
"          "    #  #    '
$
Competence vs. Functionality Q       R 
                   %      "   
=J 89,F< 7 #  # % "     
"' "1H.#
8   %  "       
 "&=+"DEE;<7#%
 
   "H  "   H  
 #
      "            H  #
H
Benevolence vs. Helpfulness Q       "  ' 
%=/89,;<"D
"""6% 
 "H   %        &
=+"DEE;<. "%%
 %  
' '   &  (M "  
  H    "   M ' 
 
Predictability/Integrity vs. ReliabilityQF%
          =4R  89G:?  +"  DEE;<    
"% 
&H !"
" A%
      J "   %   
%      "          "      
"H
Note that the above expectations are perceptual, rather than objective, in nature. Having delimited a role for the
knowledge-based trust in technology construct and described similarities and differences between trust in people and
trust in technology, we turn to developing definitions of different types of trust in technology. In each case, the trust
in technology definition corresponds to a trust in people definition in order to be based on the trust literature.
Trust in Technology: Its Components and Measures
$(((*
Trust in People Trust in Technology
Study Label Definition Label Definition
General Trusting Beliefs in People and Technology
Mayer et
al. 1995
Propensity to
trust
A general willingness to trust others. 1. Propensity to
Trust General
Technology
The general tendency to be willing to depend
on technology across a broad spectrum of
situations and technologies.
McKnight
et al. 1998
Disposition to
trust
[The] extent [to which one] demonstrates a
consistent tendency to be willing to
depend on others across a broad spectrum
of situations and persons.
McKnight
et al. 1998
Faith in
humanity
Others are typically well-meaning and
reliable.
2. Faith in General
Technology
One assumes technologies are usually
consistent, reliable, functional, and provide
the help needed.
McKnight
et al. 1998
Trusting stance Irrespective of whether people are reliable
or not, one will obtain better interpersonal
outcomes by dealing with people as
though they are well-meaning and reliable.
3. Trusting Stance-
General
Technology
Regardless of what one assumes about
technology generally, one presumes that one
will achieve better outcomes by assuming the
technology can be relied on.
Trusting Beliefs in a Context or Class of Technologies
McKnight
et al. 1998
Situational
Normality
The belief that success is likely because
the situation is normal, favorable, or well-
ordered.
4. Situational
Normality-
Technology
The belief that success with the specific
technology is likely because one feels
comfortable when one uses the general type
of technology of which a specific technology
may be an instance.
McKnight
et al. 1998
Structural
Assurance
The belief that success is likely because
contextual conditions like promises,
contracts, regulations and guarantees are in
place.
5. Structural
Assurance-
Technology
The belief that success with the specific
technology is likely because, regardless of the
characteristics of the specific technology, one
believes structural conditions like guarantees,
contracts, support, or other safeguards exist in
the general type of technology that make
success likely.
Trust in Specific Trustees or Technologies
Mayer et
al. 1995
Trust Reflects beliefs that the other party has
suitable attributes for performing as
expected in a specific situation...
irrespective of the ability to monitor or
control that other party.
6. Trust in a
specific
technology
Reflects beliefs that a specific technology has
the attributes necessary to perform as
expected in a given situation in which
negative consequences are possible.
Mayer et
al. 1995
Factor of
Trustworthiness:
Ability
That group of skills, competencies, and
characteristics that enable a party to have
influence within some specific domain.
7. Trusting belief-
specific
technology-
Functionality
The belief that the specific technology has the
capability, functionality, or features to do for
one what one needs to be done.
McKnight
and
Chervany
2001-2002
Trusting Belief -
Competence
One has the ability to do for the other
person what the other person needs to have
done. The essence of competence is
efficacy.
Mayer et
al. 1995
Factor of
Trustworthiness:
Benevolence
The extent to which a trustee is believed to
want to do good to the trustor, aside from
an egocentric profit motive.
8. Trusting belief-
specific
technology-
Helpfulness
The belief that the specific technology
provides adequate and responsive help for
users.
McKnight
and
Chervany
2001-2002
Trusting Belief -
Benevolence
One cares about the welfare of the other
person and is therefore motivated to act in
the other person’s interest….does not act
opportunistically toward the other...
McKnight
and
Chervany
2001-2002
Trusting Belief -
Predictability
One’s actions are consistent enough that
another can forecast what one will do in a
given situation.
9. Trusting belief-
specific
technology-
Reliability
The belief that the specific technology will
consistently operate properly.
Mayer et
al. 1995
Factor of
Trustworthiness:
Integrity
The extent to which a trustee adheres to a
set of principles that the trustor finds
acceptable.
3. DEFINITIONS AND RESEARCH MODEL
Rooted in the trust in people definitions offered by Mayer et al. [1995] and McKnight et al. [1998] (Table II), we
operationalize trust in technology constructs as components of three sets of concepts: a) propensity to trust general
technology b) institution-based trust in technology, a structural concept, and c) trust in a specific technology,
Trust in Technology: Its Components and Measures
referring to a person’s relationship with a particular technology (e.g., Microsoft Excel). The trust literature suggests
a causal ordering among trust constructs, such that one’s propensity to trust directly influences institution-based trust
and indirectly shapes trust in a specific technology [McKnight and Chervany 2001-2002]. Moreover, given their
specificity, we believe (differing from McKnight and Chervany) that trust in a specific technology should fully
mediate more general constructs’ influence on behavior. To evaluate trust’s nomological net, we examine trust in
technology constructs’ interrelationships as well as their relationship with two post adoption outcomes: a) intention
to explore and b) deep structure use (see Fig. 1). This also differs from the McKnight and Chervany model.
7"8"H"
Propensity to Trust in General Technology
-            8 =/
89:8<   BC ""       ' 
 " =  899;?-%DEED<-
""
"   "
""%"""
(%=+"( DEE8DEED<
" %5""
"7"" H
""D7# %
" " "    
   J  " " "    " 
%  %""
  F       "  " "  "      &   
"       ( %     %
N"""
    "  "  %         "  
%%'"
68-""% '
"
68-""%# '
"
Institution-based Trust in Technology

 &  
Trust in Technology: Its Components and Measures
#!"
"%#
      "            
   @A%
  % %#"%
"A "
"%%%"=+"
 (  DEE8DEED< 7 #     "   
 %&    M      %&" %
"
     " "
M#5"
"M5;7
#    "          )      %
 %
""
6D"% '"
6D    " % #    '  
"
Trust (Trusting Beliefs) in a Specific Technology
   H" "
"  " A      
"".#"A)"
 performing as expected in & [Mayer, et al. 1995].
McKnight, et al. defined trusting beliefs in people as a perception that another “person is benevolent, competent,
honest, or predictable in a situation” [1998: 474]. In studies of initial trust, %"
"=+"DEED<"
" "=4
  DEEF?  "    J  DEE;<                
#%S#&%""
rusting beliefs in a specific technology is reflected in three beliefs: functionality, helpfulness, and
reliability. A) Functionality refers to whether one expects a technology to have the capacity or capability to
complete a required task (see Table II, entry 7). B) Helpfulness excludes moral agency and volition (i.e., will) and
refers to a feature of the technology itself—the help function, i.e., is it adequate and responsive? (See Table II, entry
8) C) Reliability suggests one expects a technology to work consistently and predictably. The term reliable (i.e.,
without glitches or downtime) is probably used more frequently regarding technology than the terms predictable or
consistent [Balusek and Sircar 1998]. Hence, trusting belief-specific technology-reliability refers to the belief that
the technology will consistently operate properly (see Table II, entry 9). These three beliefs reflect the essence of
trust in a specific technology because they represent knowledge that users have cultivated by interacting with a
technology in different contexts, gathering data on its available features, and noticing how it responds to different
actions.
Trusting beliefs in a specific technology is a superordinate second-order construct. Superordinate implies
higher rank or status in the relationship between the trust in a specific technology and its dimensions. This means
that trusting beliefs in a specific technology exists at a deeper level than its individual trusting beliefs [Law et al.
1998], with the relationships flowing from trusting beliefs in a specific technology to its dimensions [Edwards 2001;
Serva et al. 2005]. When individuals trust more in a specific technology, they will report corresponding increases in
trusting beliefs about functionality, helpfulness, and reliability. In contrast, if the construct were aggregate, trust in a
specific technology would be formed by its dimensions which would not necessarily covary [see Polites et al.
Forthcoming]. Moreover, we believe each dimension of trust in a specific technology is reflective, and should be
conceptualized as superordinate and reflective at each level of analysis.
Because trust in specific technology is grounded in users’ knowing the technology sufficiently well that
they can anticipate how it will respond under different conditions, this construct should be positively related to post-
adoption use. We propose that users will be more willing to experiment with different features (intention to explore
Trust in Technology: Its Components and Measures
=18999<) or to use more features (deep structure use =J>DEEG<) of
a technology because they understand it well enough to believe that it has the attributes (i.e. capability, helpfulness,
and reliability) necessary to support extended use behaviors. Because trust in a specific technology is tied to
specific software applications, we anticipate it will mediate the effect of more broadly defined technology trust
concepts on post-adoption technology use.
6F"% ' H#
"#
6F"% ' H   
"#
6F           "  %      '          
""
4. METHODOLOGY
Item Development and Pilot Study
% 
" =+"   DEED<       "  
!#J!M%J%
 %% %  %%" 
 "   7#"
"%"
   " %  "    % %H  
"    %      +"      =DEED<          
"% "#%
"     "    
! "%B%&C %  

!"%
    " "   !   .# !
"(HTE,9 "
    U !I. M  4  
%  ! .# %% " 

Sample
F:G" 
%3JM
%.#""
#.#H     
N%&4 #
" 
N  " !% N% F;9

Preliminary Analysis
-  ""  &% &%
=&7899G< (H"
#E,E=72&89,8<4 
%H " 
$(
Variable Value Frequency % Respondents
Gender Male 220 61.3
Female 139 38.7
Trust in Technology: Its Components and Measures
Experience using Excel
Mean: 3.209; Median: 3.00;
S.D: 2.875
< 2 years 137 38.2
>= 2 and < 5 years 70 30.1
>= 5 years 152 31.8
Education
Mean: 2.117; Median: 2.00;
S.D: 0.645
High School 47 13.1
Some College 232 64.6
Associate’s Degree 71 19.8
Bachelor’s Degree 9 2.5
Total Subjects 359
Evaluating Validity vis-à-vis Perceived Usefulness and Computer Self-Efficacy
!    H "  7
%-" M !"
#E:E"%EFE!#(#
""@H"%E:E"
%%ED@%
1#  " 
%# 
-3 =*  89,9< %#R(.
=      DEE,<   J          8E    %  #  %
" "8!#*%%%
#""@" E:E
    EFE  7 -3 # (.   (.  
  "        "           %      
M
Evaluating the First-Order model
 %  %        
  =!  4" 89,,< 7 %   
     " .V G8H # &    
"117WE9GF(7WE9G,?/.!WEE@8?M
χ2W :F8@: W F9,? χ2KW8,@ =6  J8999< !  ! "I
.#!I.(H# !I.TE;E
αTE:E " =72&89,8< M
!I.#'"=72&89,8<"""
 7"% E:E:UEE8% 
  H  "  =6  899,<
!#.
(   %        
%"
=-&'DEEF<(%
""
=."   X DEEE<          " 
  E:E:  "UEE8 =6  899,<

Evaluating the Second-Order model
 "N%
 M %
%"=1DEEF<
"  " %   A"
 "
7 %     117 E9GF "     %
(7 E9G:   ) EE8  /.! EE@8   "   MK
    8,9    "      "          "    
""=JJ89,E<
Trust in Technology: Its Components and Measures
!I.E;,  (H  E,9  "  " #
   "       NH
 " 7M!I.
%"" !#.
1#% N"
!"%%A 
"
#    .% DEE8 ( "   % % 
"WE;EWEGF"UEE8"
    "    " "
 = 89G,<      H "    
"/YWE:,YWE:G
Y W EG@  "     7" D  & " 
 ""   A    N    
"
Evaluating the hypothesized structural model
%.VG8=!
4"  89,,<           N     "    =J  
J  89,E?  6    J  8999<  7          #  
117 W 9G8?(7W9G;? /.! WE;8?M χ2) W ;8@F@?  W
DG@? χ2KW89;   # "       
"/DWE;E7"D#%
""%
"UE;'
7""WED,UEE8"W
E88   U  E;   "    '        "     "
""        "  
              %          

7"D$/"(
Evaluating predictive validity
    %   #
6F=18999<6F=J>DEEG<
  !#  7              #      "    
!#4=JJ89,E?6J8999<!7"F"
"#" /DWE@;
        # /DW  EDD  =(  89,,<
(%
 " ' ""
Trust in Technology: Its Components and Measures
  #   H %"  ""   "  
"H
7"F$"-! 3
5. DISCUSSION
  "H
"     "   % &%"   
    "               "
&  #  "      J  "   "
%"# " 
                      %   7  
 %&""%
"'M ""
" 
/             
"" % &%"" 
" A   
 % ""    H # %  " 
&%"A"!
 " % "" H
#"
0      "    %      &%"        
"'(%=*899,?%DEEF<
  ""   #    &%  %   
        %           #  "
  7 #  "      "
 %?  
   =+"  899,<J   " 
 %     &%"   %   
&""
7 #   #    .#   
 H"       
%    &%"
""      "   
"
!"% ""' 
(.#%
) "         # "
  "    & !     #
                M        
Trust in Technology: Its Components and Measures
  7% "
"H A        !  J  
A%"%#A
&"#&%"=2%&J&899G<
    ""  &%"   "
%"=(%6899:?ZDEE8<
&"   
% 6HA
  #
&%" %"#
  A    "  [     
  
      "     & 
          %         !    
 "%&%" 
% ' =
DE88<7 #   #   %
H ""
" J#"%'
#"%
 "
!%   "     A
H              &%"      "  
 #%"
 7 # #
"% 
0R! 
J               
 % 
%               
#"%&(
 0R 6  
 A" 
"%
      M  "    " 
                "      

" HA
    +&  J =DEEG< "  
"  """ 
M#"4 #%
" A  #&%"  "
6%  %   ""   % "   '
   # "          "
"% "%
""K%
"  
6. LIMITATIONS
0%" 
 %0
* "%%&"
##%
"              "         
%""% 
Trust in Technology: Its Components and Measures
.#&%
"&7&"&4
!#"%&%"
      '  "   0    N      
"% "6% 
%  N"  "    "        
" 
 7# ' 
   %    ! *%  %
*I*6%"#
%"%"
!  "   "     H
"N6%   ""   '" 
   "   =   DEEG<    ) %
 .#% 1 
"#A"%
"N
7. CONCLUSION
 " # 
' "
      "       
J&#"
"#"#"!
""   A         %
  "    ' "    
       7     %
" %
"7#"
A% "\
0"HA\7
#M
Trust in Technology: Its Components and Measures
REFERENCES
!1*./01>(!1*4./J14*89,,.M"$! %
%-"J8EFF@88@DF
!//0+>89:@The limits of organization11%]&
J!23.+!1*/(!/899,1%&((Information Systems Management8;8@,;:
J!/J./J89,FThe logic and limits of trust/"3 -1%J%&1>
J.12./ - !1* J01. *4 89,E "   "        
Psychological Bulletin, 88,F;,,GEG
BENAMATI J., FULLER, M. A., SERVA, M.A. AND BAROUDI, J. 2010. Clarifying the integration of trust and TAM in e-commerce
environments: Implications for systems design and management. IEEE Transactions on Engineering Management, 57, 3, 380-393.
J./(6.*.899F.+66J.(!6 >6622 "
4(&.-2!-*/.Close relationships88E8G,1%]&$6
7
J6!!(6./>..!DEED $  Journal of Management
Information Systems898D88D@8
J010!I89:G(A%Behavioral Science,D8G@99;8@
J3/01>01.! !1* /!3J * DEEG/N" 3"$ ! ! . 
Information Systems
Research8:FDD,D@G
(2!/+./8999      Communications of the ACM @DD
GEG:
(60    !1* 602*.1  /  899:  %    "   $    "      Journal of
Managerial Issues9FD:;D9,
(0/J  J  >  6!1!!1+    !1*  ]  6  DEEF      $  !        
Electronic Commerce Research and ApplicationsDDEFD8;
*!I7 *89,9 - 3 - . 33 ! "
MIS Quarterly, 8FFF89F@E
*01.]-  (!1101 >- !1* 322.1  / 899, 3" A    
 The Academy of Management Review,DFFGE8GDE
.!/2.]-( 89,G- %& $#
&3."Journal of Management8D@;:@:F
.*!/*> / DEE8   "N   $  "  
%&Organizational Research Methods,@D8@@89D
.2!140I!1 !/ !1* X. >2 8999 .'    %       
 $ "    Journal of Organizational Behavior DEF F;9
F:F
70/1.22 ( !1* 2!/(+./ * 89,8 . "  M  %    
Journal of Marketing Research8,F9;E
7/.*!1J+!61-6>/!1*60.*(DEEECommunications of the ACM,@F8DF@@E
73+3]!!7899;Trust: the social virtues and the creation of prosperity7-1%]&
4.7.1*/!3J * !1*J03*/.!3 DEEEM ""$"
Communications of AIS::8:,
4.7.1*+!/!6!11!.!1*/!3J*DEEF!"$"MIS
QuarterlyD:8;89E
4771  +  89G:                              
Psychological BulletinG,D8E@8DE
402.J.+/!1*((01+. 89:; "(
42.Theories of group processes>^28F88,;
6!/>7>/!1*./01/.?!6!/ 2?^J2!(+( 899,Multivariate data analysis with readings, 5th
ed."%('1>$-6
632!1*J.12./-8999('# $ 
% Structural Equation ModelingG88;;
>!/I.1-!!2!1*2.*1./*.899,(" Organization Science,
8EG:98,8;
+ * DEE,        
$Journal of Management Information SystemsD@@8F@;
+ 4 61 J !1* 2..6 4 DEE9 3" %   " 
&"Information Systems Journal89FD,FF88
+++!1*-/!J6!+!/JDEE@JD($&"
The Data Base for Advances in Information Systems, F;D;EG;
+0!+ ] X !1*J.1J!! DEEG  .' -N 7 ! 
/!"MIS QuarterlyFE@9@89GE
+037!/  !1* 6!-010!  DEE@            %
Information and Management,@8FF::F9:
2!+014(!1*0J2.]6899,%#( Academy of
Management ReviewDF@:@8:;;
Trust in Technology: Its Components and Measures
2..    +  0  !1*  3/J!1  .  DEE8  !            "  International Journal of
Electronic CommerceG8:;98
2.(+ / > J31+./ J J 1996. Developing and "   & / Trust in Organizations:
Frontiers of Theory and Research/+."-0&(!88@8F9
2*J/01.4>!1*.6./J.>(DEEG&%%\!
 International Journal of Electronic Commerce8E@8E;8@8
2+6(600122..+0J.1J!!DEEG*%\!
%""Journal of Management Information SystemsDFDDFFDGG
2--./    +  DEE:  !"          "  %      
"#. International Journal of Technology and Management:8FG;9
236!11189:9Trust and power>1%]&
!].//(*!I> 6!1*(600/!17*899;! " "N Academy of
Management ReviewDE:E9:F@
(+146 *6 DEE;    "  *  4J . The Blackwell Encyclopedia of
Management, Management Information Systems!$J&%I:FD9FF8
(+146*6!1*(6./I!1]12899G" University of Minnesota MIS Research Center
Working Paper series-9GE@$KKK%K&"-K9GE@
(+146*6 !1*(6./I!1]1 2DEE8DEED   $ 
"International Journal of Electronic CommerceGDF;;9
(+146 * 6 (603*63/] I !1* +!(!/ ( DEED * "  "    
$" "Information Systems Research8FFFF@F;9
(+146  *  6  (314  2  2  !1*  (6./I!1]  1  2   899,          %  "N
Academy of Management ReviewDFF@:F@9E
1!J!1 !4!/!2/!1*!11/3 89990"N  "    
"MIS Quarterly, DFFFG;F9;
10!/DEEFM" Structural Equation Modeling8E@
GDDQG@:
0/2+0+>!1*!(010(DEE8*&"_H$!N"
Information Systems Research8DD8D88F@
-!32*2 !1* (*!1.2 // DEED !    '      
MIS Quarterly, D,D8,FDD:
-!I203-! DEEF ( $"" &%"
International Journal of Electronic Commerce:F8E88F@
-!I203-!!1*4.7.1*DEE@J"' &% Information
Systems Research8;8F:;9
-.111401  /  6  *  2(0X  !1*  4/0I./  I DEEF  `            
`>"DEF89:DDG
-0*!+077-!(+.1Z. J 2..>] !1*-0*!+077 1- DEEF(   
$   %    Journal of Applied Psychology, 88, ;
,:99EF
-02.42/0J./1!1*6!(6./>J(N"3"($!
/ %43European Journal of Information Systems,7"
/.-.2> + 602.> 4!1* Z!11! - 89,;   Journal of Personality and Social
Psychology@989;88D
/+./  6 89:8  1      >  . Perspectives on Social Power !-"
(("GF,8
/0./>J89:84N#American PsychologistDG;@@F@;D
/03.!3*+1JJ3//!1*(!././(899,1'$ %
Academy of Management ReviewDFFF9F@E@
.1//(+14!1*>6!DEEGJS""
Journal of Management Information systemsDF8D88DF,
./I!  ! 7322./  ! !1* J.1!! > DEE; % JD( .($ .  0
! *J! FGF
.!/+>DEEFOrganization Science,8@8;8:
36 J!1* 6!1 DEEF         
International Journal of Electronic Commerce:F8F;8G8
SUN, H. 2010. Sellers’ trust and continued use of online marketplaces. Journal of the Association for Information Systems, 11, 4, 182-211.
!J!(61(+J4!1*7*.222899GUsing multivariate statistics(3rd ed.)6(1%]&
6!(6./>J!1*-.//..-2DEED!# 
#RMIS Quarterly, DG@F,8F9G
6!(6./>J(+146*6J!+./.!/!2/!1*/0J./1"
 #$   #  &%" "  IEEE Transactions on
Engineering Management.
6!(6./ >J Z./>( 431*2!(6 > !1* (+146*6 DEE, .# *
( .R$ ! . .# IEEE Transactions on Engineering Management, ;; @GD,
G@@
THATCHER, J. B., MCKNIGHT, D. H., BAKER, E. W., AND ARSAL, R. E. 2011. The role of trust in postadoption exploration: An empirical
investigation of knowledge management systems, IEEE Transactions on Engineering Management, 58, 1, 56-70.
Trust in Technology: Its Components and Measures
I!1  *./  6.>*.1  6  I./6!4.1    !1*  (/.../    DEEF  3"      $
(" European Journal of Information Systems, 8D@8@,
I!12]+.(J.2!14./7!1*(031!2.(2DEE@7A"%"$
The Data Base for Advances in Information Systems, F;DFD@9
I!1(.! .2.*(0!V3. (!1* /!3J* DEE, .#" " $
'MJournal of Management Information SystemsD@@:F8EE
!14    !1*  J.1J!!    DEE;               " Journal of the
Association for Information SystemsGF:D8E8
22!789G,Reasoning with statistics6/1%]&
22!010.899F( "NJournal of Law and EconomicsF@@;F
;ED
Z1 !6 DEE8 /      International Journal of Service
Industry Management8DFDG9D9@
Trust in Technology: Its Components and Measures
Appendix A. Representave research on trust in MIS literature
Object of Trust Trust Attributes Roles in Model / Empirical Relationships Type of Trust Studies
Institution Structural assurances,
situational normality
Beliefs that outcomes are likely to be
successful due to the presence of supportive
situations and structures
Initial McKnight et al., 1998
Effectiveness of 3rd
party certifications,
security infrastructure
Trust Attributes. No empirical test Initial Lee and Turban, 2001
Protective legal or
technological structures
Institutional-based trust affects trust in vendor Initial McKnight et al., 2002
Situational normality,
structural assurances
Institution-based trust affects trust (in
merchant) and PEOU/PU1.
Initial Gefen et al., 2003
Situational normality,
structural assurances
System trust affects trust in vendor. Initial Pennington et al., 2003
Feedback mechanisms,
escrow services, credit
card guarantees
Effectiveness of institutional mechanisms
affects trust in the community of sellers.
Initial Pavlou and Gefen,
2004
Structural assurances Structural assurances influence trust in
mobile banking
Initial Kim et al. 2009
Technology Technical competence,
reliability, medium
understanding
Trust Attributes. No empirical test Initial Lee and Turban, 2001
Technology Information quality,
good interface design
Perceived site quality aids formation of trust
in vendor
Initial McKnight et al., 2002
Site quality, technical
trustworthiness
Perceived technical trustworthiness and
perceived site quality affects trust in web
vendor
Initial Corbitt et al., 2003
Competence,
benevolence, integrity
Trust in e-commerce environment mediates
the relationship between perceptions of
security controls and behavioral intentions
Initial Suh and Han, 2003
Correctness,
availability, reliability,
security, survivability
Trust in e-channel influences adoption of e-
banking
Initial
(based on
perceived
competence)
Kim and Prabhakar,
2004
Competence,
benevolence, and
integrity
Trust in recommendation agent influences
intention to adopt and PU
Initial Wang and Benbasat,
2005
Cognitive: Integrity,
competence
Emotional: feelings of
security and comfort
Cognitive trust influences emotional trust
(toward the behavior), which influences
intention to adopt online recommendation
agent
Initial Komiak and Benbasat,
2006
Competence,
benevolence, integrity
Trust in a website, based on experience,
influences intention to continue using the
website
Relationship Li et al., 2006
Technology Predictability,
reliability, utility
Trust in technology solution affects
perceptions of supply chain technology and
long-term interaction between supply chain
partners.
Knowledge Lippert, 2007
1 PEOU = Perceived Ease of Use; PU = Perceived Usefulness
Trust in Technology: Its Components and Measures
Object of Trust Trust Attributes Roles in Model / Empirical Relationships Type of Trust Studies
Accuracy, reliability,
safety
Initial trust in mobile banking influences
behavioral intentions
Initial Kim et al. 2009
Functionality,
dependability,
helpfulness
Trust in IT influences PU and PEOU Knowledge Thatcher et al., 2011
Online
Vendor
Ability, integrity,
benevolence
Trust in vendor (or agent of the vendor)
affects intention to use the technology
Initial Lee & Turban, 2001;
Bhattacherjee 2002;
McKnight et al., 2002;
Gefen et al., 2003;
Kim, 2008; Vance et
al., 2008
Benevolence,
credibility
Trust in vendor determines attitudes and
behavioral intentions
Initial Jarvanpaa et al., 2000;
Corbitt et al., 2003;
Pennington et al., 2003
Benevolence,
credibility
Trust in vendor, based on past transactions
and reputation, determines risk perceptions,
beliefs, and behavioral intentions
Knowledge Pavlou, 2003
Online
Vendor
Expectation of
particular action
Trust in online stores and PEOU and PU
jointly determine online purchasing
intentions
Initial Van der Heijden et al,
2003
Commitment, avoiding
excessive advantage
Trust in internet bank influences adoption of
internet banking.
Initial Kim and Prabhakar,
2004
Willingness to
customize, reputation,
size
Trust attributes. No empirical test. Initial Koufaris and
Hampton-Sosa, 2004
No separate dimensions Trust in web merchant, as well as innovation
characteristics, determine intention to use web-
based shopping
Initial Van Slyke et al., 2004
Ability, integrity,
benevolence of an
identifiable population
Trust in a community of sellers determines
transaction intentions
Knowledge Pavlou & Gefen, 2004
Cognitive: Competence,
benevolence, integrity,
predictability
Emotional: feelings of
security and comfort
Trust in the intermediary, and trust in the
community of buyers influences sellers’
intentions to use an e-marketplace again
Knowledge Sun, 2010
Trusting beliefs: ability,
integrity, benevolence
Trusting attitude: a
willingness to rely on a web
vendor
The influence of trusting beliefs in a web vendor
on intentions is fully mediated by trusting
attitude
Initial Benamati et al., 2010
IT Support
Staff
Ability Trust in IT support staff influences trust in
IT and PEOU
Knowledge Thatcher et al., 2011
Interfirm Reliability, integrity Trust in the supplier increases utilization of
new technologies
Knowledge Lippert, 2007
Trust in Technology: Its Components and Measures
Appendix B: Trust in Technology—Measures
Trusting Belief-Specific Technology—Reliability
1. Excel is a very reliable piece of software.
2. Excel does not fail me
3. Excel is extremely dependable.
4. Excel does not malfunction for me
Trusting Belief-Specific Technology—Functionality
1. Excel has the functionality I need.
2. Excel has the features required for my tasks.
3. Excel has the ability to do what I want it to do.
Trusting Belief-Specific Technology—Helpfulness
1. Excel supplies my need for help through a help function.
2. Excel provides competent guidance (as needed) through a help function.
3. Excel provides whatever help I need2.
4. Excel provides very sensible and effective advice, if needed.
Situational Normality—Technology (Adapted from McKnight et al. 2002):
1. I am totally comfortable working with spreadsheet products.
2. I feel very good about how things go when I use spreadsheet products.
3. I always feel confident that the right things will happen when I use spreadsheet products.
4. It appears that things will be fine when I utilize spreadsheet products.
Structural Assurance—Technology (Adapted from McKnight et al. 2002):
1. I feel okay using spreadsheet products because they are backed by vendor protections.
2. Product guarantees make it feel all right to use spreadsheet software.
3. Favorable-to-consumer legal structures help me feel safe working with spreadsheet products.
4. Having the backing of legal statutes and processes makes me feel secure in using spreadsheet products.
Faith in General Technology (Adapted from McKnight et al. 2002):
1. I believe that most technologies are effective at what they are designed to do.
2. A large majority of technologies are excellent.
3. Most technologies have the features needed for their domain.
4. I think most technologies enable me to do what I need to do.
Trusting Stance—General Technology (Adapted from McKnight et al. 2002):
1. My typical approach is to trust new technologies until they prove to me that I shouldn’t trust them.
2. I usually trust a technology until it gives me a reason not to trust it.
3. I generally give a technology the benefit of the doubt when I first use it.
2 This item was dropped prior to CFA
Trust in Technology: Its Components and Measures
APPENDIX C: PCA—LOADINGS AND CROSS-LOADINGS
Rotation Method: Oblique with Kaiser Normalization.
Component
Trust.
Beliefs-
reliab. Sit. Norm
Trust
Stance
Struct.
Assur
Faith in Gen.
Tech.
Trust.
Beliefs-
help.
Trust
Stance
situationalnormality2 0.97 -0.02 0.01 -0.01 -0.02 -0.02 0.02
situationalnormality1 0.96 -0.02 -0.04 0.01 0.01 0.01 0.00
situationalnormality3 0.94 0.00 0.01 0.02 0.01 0.00 -0.05
situationalnormality4 0.91 0.05 0.01 -0.01 -0.02 0.01 0.03
structuralassurance4 -0.02 0.96 -0.02 -0.02 -0.02 0.02 0.00
structuralassurance3 0.00 0.94 0.00 0.05 -0.03 0.02 -0.05
structuralassurance2 -0.01 0.92 -0.01 0.02 0.03 -0.03 0.01
structuralassurance1 0.03 0.86 0.03 -0.04 0.03 -0.01 0.05
reliability4 -0.06 0.02 0.95 -0.08 -0.04 -0.05 0.05
reliability3 -0.01 -0.02 0.92 0.05 -0.04 -0.01 -0.03
reliability1 0.01 -0.02 0.83 0.05 0.00 0.10 -0.01
reliability2 0.08 0.02 0.77 -0.01 0.10 -0.01 0.00
faithgeneraltech2 -0.03 0.01 -0.01 0.90 -0.07 0.00 -0.08
faithgeneraltech3 0.02 0.01 -0.01 0.87 0.03 0.00 -0.04
faithgeneraltech1 0.04 -0.02 -0.10 0.78 0.00 -0.01 0.15
faithgeneraltech4 -0.02 0.01 0.14 0.68 0.06 0.01 0.01
helpfulness4 -0.02 -0.03 -0.01 0.00 0.94 -0.01 0.01
helpfulness1 0.00 0.03 -0.04 -0.05 0.92 0.07 0.01
helpfulness2 0.00 0.01 0.05 0.04 0.92 -0.05 -0.03
functionality2 -0.04 -0.01 -0.03 0.04 -0.01 0.95 0.05
functionality1 0.03 0.01 -0.02 -0.01 0.03 0.91 -0.02
functionality3 0.02 0.01 0.07 -0.03 -0.02 0.90 -0.03
trustingstance2 -0.07 0.05 0.03 0.02 -0.04 0.00 0.89
trustingstance1 0.00 -0.01 -0.02 0.05 0.05 -0.03 0.88
trustingstance3 0.07 -0.04 0.02 -0.06 -0.02 0.03 0.87
Rotated Eigenvaluesa 5.18 5.62 6.12 4.35 5.23 5.66 3.52
% Variance Explaineda36.16 12.40 8.65 7.91 6,26 5.30 4.81
Extraction Method: Principal Components Analysis with Promax
Rotation converged in 6 iterations
a. When components are correlated, sums of squared loadings cannot be added to obtain a total variance
Trust in Technology: Its Components and Measures
APPENDIX D: PCA—LOADINGS AND CROSS-LOADINGS with PU and CSE
Rotation Method: Oblique with Kaiser Normalization.
Component
PU Sit Norm Struct. Assur.
Trust. Beliefs-
reliab.
Faith in Gen.
Tech CSE-internal
Trust. Beliefs-
help. Trust Stance CSE-external
Trust. Beliefs-
funct.
usefulness2 0.95 -0.05 0.00 0.03 -0.05 0.00 -0.01 0.01 0.02 -0.02
usefulness3 0.91 0.00 0.02 -0.03 -0.04 0.05 -0.01 -0.01 -0.03 0.03
usefulness1 0.89 -0.03 -0.02 0.02 0.03 -0.02 0.01 0.01 -0.01 -0.04
usefulness4 0.88 0.05 0.02 0.01 0.02 -0.03 -0.01 0.01 0.00 -0.05
situationalnormality2 0.01 0.98 -0.02 0.01 -0.01 0.00 -0.02 0.02 0.00 -0.03
situationalnormality1 0.00 0.96 -0.02 -0.04 0.01 0.01 0.02 0.00 0.01 0.01
situationalnormality3 -0.03 0.93 0.00 0.01 0.02 0.02 0.01 -0.04 0.01 0.02
situationalnormality4 0.03 0.91 0.05 0.02 -0.02 -0.03 -0.02 0.03 -0.01 -0.01
structuralassurance4 0.06 -0.01 0.96 -0.03 -0.03 -0.02 -0.03 0.00 0.01 -0.01
structuralassurance3 0.02 0.00 0.94 -0.01 0.04 0.00 -0.03 -0.05 0.01 0.02
structuralassurance2 -0.05 -0.01 0.92 0.00 0.02 -0.02 0.04 0.01 0.00 -0.01
structuralassurance1 -0.03 0.03 0.86 0.03 -0.04 0.01 0.04 0.05 -0.03 0.01
reliability4 -0.08 -0.05 0.02 0.97 -0.07 -0.06 -0.03 0.04 -0.04 -0.03
reliability3 0.07 0.00 -0.02 0.89 0.04 0.04 -0.05 -0.02 0.01 -0.02
reliability1 0.07 0.01 -0.02 0.81 0.04 0.03 -0.01 -0.01 -0.01 0.08
reliability2 -0.04 0.09 0.01 0.77 -0.01 -0.01 0.11 0.00 0.03 0.02
faithgeneraltech2 -0.05 -0.05 0.00 0.00 0.90 0.03 -0.05 -0.07 -0.05 0.03
faithgeneraltech3 0.02 0.02 0.01 -0.01 0.87 -0.02 0.02 -0.04 0.01 0.00
faithgeneraltech1 -0.01 0.04 -0.02 -0.11 0.78 -0.04 0.00 0.15 0.06 0.02
faithgeneraltech4 0.06 -0.01 0.02 0.14 0.68 -0.03 0.05 0.01 -0.09 -0.05
CSE2 0.04 -0.01 0.01 -0.05 -0.11 0.96 0.02 0.05 -0.13 0.03
CSE1 -0.01 0.05 -0.03 -0.05 0.05 0.93 -0.01 -0.02 -0.08 0.02
CSE3 -0.03 -0.06 -0.01 0.11 0.03 0.77 0.03 0.00 0.18 -0.03
helpfulness4 0.01 -0.01 -0.03 -0.02 0.00 -0.01 0.94 0.01 0.03 -0.01
helpfulness2 -0.03 0.00 0.03 -0.03 -0.04 0.03 0.93 0.01 -0.06 0.07
helpfulness1 0.05 0.01 0.02 0.03 0.04 0.01 0.90 -0.03 0.04 -0.07
trustingstance2 0.01 -0.06 0.05 0.03 0.02 -0.04 -0.04 0.89 0.05 0.00
trustingstance1 0.02 0.00 -0.01 -0.03 0.05 0.03 0.05 0.88 0.00 -0.03
trustingstance3 -0.02 0.07 -0.04 0.03 -0.05 0.03 -0.01 0.87 -0.04 0.03
CSE6 0.03 -0.02 -0.04 0.02 -0.07 -0.11 0.02 0.02 0.96 0.01
CSE5 -0.01 0.02 -0.01 -0.05 0.00 -0.06 0.02 0.00 0.96 0.05
CSE4 -0.02 0.02 0.08 0.01 0.07 0.37 -0.06 -0.03 0.60 -0.08
functionality2 0.02 -0.04 -0.01 -0.03 0.05 0.00 -0.01 0.05 -0.01 0.93
functionality1 0.00 0.02 0.01 -0.02 0.00 0.01 0.04 -0.01 0.02 0.91
functionality3 0.04 0.02 0.01 0.08 -0.03 0.01 -0.03 -0.03 0.02 0.87
Rotated Eigenvalues 7.23 5.49 6.00 7.09 4.78 2.91 6.10 3.74 2.65 6.90
% Variance Explaineda30.11 9.81 8.39 7.21 5.97 4.39 4.24 4.06 3.65 2.95
Extraction Method: Principal Components Analysis with Promax
Rotation converged in 6 iterations
a. When components are correlated, sums of squared loadings cannot be added to obtain a total variance
Trust in Technology: Its Components and Measures
APPENDIX E: Latent correlation matrices for 1st and 2nd order confirmatory factor analysis
Latent Correlation Matrix: 1st Order CFA
C.A. AVE 1 2 3 4 5 6 7 8 9 10
1.Trusting Stance 0.86 0.68 0.83
2.Faith General Tech. 0.83 0.56 0.43 0.75
3.Situational Normality 0.94 0.84 0.15 0.14 0.92
4.Structural Assurance 0.94 0.81 0.29 0.42 0.30 0.90
5.Functionality 0.91 0.78 0.29 0.37 0.44 0.42 0.88
6.Reliability 0.90 0.70 0.33 0.41 0.42 0.44 0.63 0.84
7.Helpfulness 0.93 0.77 0.13 0.31 0.40 0.43 0.50 0.51 0.88
8.Perceived Usefulness 0.92 0.76 0.27 0.36 0.24 0.33 0.62 0.56 0.50 0.87
9. Internal CSE 0.86 0.68 -.04 -.01 0.13 0.07 0.00 0.08 0.05 -.06 0.83
10. External CSE 0.84 0.67 -.07 -.05 -.02 -.03 -.11 -.02 -.04 -.06 0.31 0.82
C.A = Cronbach’s alpha; square root of AVEs given in diagonal; all correlations significant at p<0.05, unless indicated by grey shading
Means and Std. Deviaons for Constructs
Mean Std. Dev
1.Trusting Stance 4.91 0.19
2.Faith General Tech. 5.26 0.17
3.Situational Normality 3.98 0.12
4.Structural Assurance 4.37 0.07
5.Functionality 5.10 0.10
6.Reliability 5.03 0.24
7.Helpfulness 4.43 0.04
8.Perceived
Usefulness 5.51 0.20
9. Internal CSE 3.95 0.39
10. External CSE 5.50 0.24
Latent Correlation Matrix: 2nd Order CFA
C.A. AVE 1 2 3 4 5 6 7 8
1.Trusting Stance 0.86 0.68 0.83
2.Faith General Tech. 0.83 0.56 0.43 0.75
3.Situational Normality 0.94 0.84 0.15 0.14 0.92
4.Structural Assurance 0.94 0.81 0.29 0.42 0.30 0.90
5.Trust in a specific technology 0.89 0.58 0.35 0.49 0.53 0.57 0.77
6. Perceived Usefulness 0.92 0.76 0.27 0.36 0.24 0.33 0.75 0.87
7. Internal CSE 0.86 0.68 -.04 -.01 0.13 0.07 0.05 -.06 0.83
8. External CSE 0.84 0.67 -.07 -.05 -.02 -.03 -.08 -.06 0.31 0.82
C.A = Cronbach’s alpha; square root of AVEs given in diagonal; all correlations significant at p<0.05, unless indicated by grey shading
Trust in Technology: Its Components and Measures
APPENDIX F: NON-TRUST Measures
Usefulness (Adapted from Davis, 1989):
1. Using Excel would improve my ability to present data graphically
2. Using Excel for my data analysis would help me evaluate information
3. Using Excel would make it easier to perform calculations on my data.
4. I would find Excel useful for analyzing data.
Internal Computer Self-Efficacy (Adapted from Thatcher et al, 2008):
1. There was no one around to tell me what to do
2. I had never used a package like it before
3. I had just the built-in help facility for reference
External Computer Self-Efficacy (Adapted from Thatcher et al, 2008):
1. I could call someone to help if I got stuck
2. Someone showed me how to do it first.
3. Someone else helped me get started.
Intention to Explore—Specific Technology (Excel) (Adapted from Nambisan et al., 1999)
1. I intend to experiment with new Excel features for potential ways of analyzing data.
2. I intend to investigate new Excel functions for enhancing my ability to perform calculations on data.
3. I intend to spend considerable time in exploring new Excel features to help me perform calculations on data.
4. I intend to invest substantial effort in exploring new Excel functions
Deep Structure Usage (Adapted from Burton-Jones and Straub, 2006)
When I use Excel, I use features that help me
1. … analyze the data.
2. … derive insightful conclusions from the data
3. … perform calculations on my data
4. … compare and contrast aspects of the data
5. … test different assumptions in the data
Trust in Technology: Its Components and Measures
APPENDIX G: latent correlation matrix and fit indices
Nomological Validity: Latent Correlation Matrix for 2nd Order CFA
C.A. AVE 1 2 3 4 5 6 7
1.Trusting Stance 0.86 0.68 0.83
2.Faith General Tech. 0.83 0.56 0.43 0.75
3.Situational Normality 0.94 0.84 0.15 0.14 0.92
4.Structural Assurance 0.94 0.81 0.29 0.42 0.30 0.90
5.Trust in Technology 0.89 0.78 0.29 0.37 0.44 0.42 0.77
6.Deep Structure Use 0.93 0.72 0.14 0.24 0.44 0.33 0.65 0.85
7.Intention to Explore 0.94 0.80 0.08 0.20 0.25 0.22 0.44 0.35 0.89
C.A = Cronbach’s alpha; square root of AVEs given in diagonal; all correlations significant at p<0.05, unless indicated by grey shading
Nomological Validity: summary of fit indices
Model Chi-square df Chi-square/df CFI NNFI RMSEA RMSEA 90% CI
1ST Order CFA 731.468 398 1.84 0.963 0.956 0.048 0.043, 0.054
2nd Order CFA 770.332 410 1.89 0.960 0.954 0.050 0.044, 0.055
Structural Model 945.866 445 2.13 0.948 0.942 0.056 0.051, 0.061
... The salience of trust in human-technology interactions has also prompted its integration into various theoretical models, including TAM (e.g., Wu et al., 2011) and TTF (e.g., Wang et al., 2021). Despite the proliferation of trust-related inquiries in information systems research, Mcknight et al. (2011) observed that scholarly discourse predominantly centers on interpersonal trust rather than trust in technological artifacts. Thus, they proposed the Trust in Specific Technology (TST) framework to delineate a structured trust development process within human-technology interactions. ...
... All methodological procedures adhered to the ethical research protocols established by the affiliated institution, with strict compliance to the ethical tenets articulated in the Declaration of Helsinki. Table 1 presents the nine constructs adopted from the following frameworks: TAM (Davis, 1989), TTF (Goodhue & Thompson, 1995), and TST (Mcknight et al., 2011). Their definitions and corresponding measurement items in the instrument were contextualized to reflect ChatGPT usage in research writing. ...
... The degree to which researchers believe that ChatGPT (i.e., technology) can assist them in writing manuscripts (i.e., tasks) efficiently. Trust in Specific Technology-Adapted from Mcknight et al. (2011) Situational Normality ...
... This definition focuses on trust as a propensity and highlights that this intention is based on individuals' subjective assessment of the trustee-in this case, technology. It also points out that the propensity to trust depends on the situation, implying that there is some degree of uncertainty or risk for the trustor [16]. ...
... The model and scale are derived from previous research on trust in technology, which examines the dynamics of trust formation in online relationships [14], as well as definitions and measures that examine trust-related attributes within the technological artifact rather than in the associated people or organizations [16]. Although these cannot be entirely disassociated, they imply different objects. ...
... • Competence (COM) refers to a system's capability to perform its intended tasks effectively through appropriate features and functionalities, meeting expectations. The concept and items are based on notions from Mcknight and colleagues [16,26], who draw from the idea of the system's functionality in online interactions, such as e-commerce. • Benevolence (BEN) refers to the technology acting in the trustor's best interest, even when there is no obligation or reward to act in such a manner [14]. ...
Article
Full-text available
Trust in technology is a topic of growing importance in Human–Computer Interaction due to the growing impact of systems on daily lives. However, limited attention has been paid to how one’s national culture shapes their propensity to trust. This study addresses an existing gap in trust in technology research by advancing towards a more accurate tool for quantitatively measuring propensity to trust across different contexts. We specifically evaluate the psychometric properties of the human–computer trust scale (HCTS) in Brazil, Singapore, Malaysia, Estonia, and Mongolia. To accomplish this, we used the Measurement Invariance of Composite Models (MICOM), a procedure that examines the equivalency of the instrument’s psychometric properties across different groups. Our results highlight the importance of rigorous validation processes when applying psychometric instruments in cross-cultural contexts, offering insights into the differences between the countries investigated and the procedure’s potential to investigate trust across different groups.
... As a result, AI can increase the rationality of decision-makers because it can gather, aggregate, and process large amounts of data from various sources and multiple parties (Leonardi and Contractor 2018). However, with humans increasingly relying on AI in decision-making settings, trust constitutes a critical component (Glikson and Woolley 2020) as it is considered one of the primary drivers to adopt the technology and for people to willingly accept and work with its decisions (McKnight et al. 2011). Existing literature on humans and AI emphasizes the significance of trust in the adoption of AI technologies, the quality of its decisions (Glikson and Wooley 2020) and as a determining factor of effective collaboration (Chowdhury et al. 2022). ...
... Like trust in people, trust in technology involves beliefs about the context and features of technology (McKnight et al. 2011). Trust is a reflection of one's belief that the other party has the necessary qualities to behave in a certain way in a specific situation. ...
Conference Paper
This literature review examines trust in AI-augmented decision-making systems in collaborative settings. The analysis suggests that human characteristics, AI characteristics, the decision-making environment, and the collaboration setting are antecedents of human trust in AI. This literature review contributes to the theoretical knowledge of trust with a dynamic learned trust framework, which represents an integrated understanding of trust in AI in human-AI collaborative decision-making. The review also provides practical implications for AI designers and implementors for improving the trustworthiness and adoption of AI for human-AI collaboration. By providing insight for researchers and audiences in information systems, organization and management, this paper can serve as a starting point for investigating the nuances, complexities and dynamics of trust in human-AI relationships.
... New technologies like AI create anxiety and distrust due to their unpredictability (Edelman, 2019). Considering mixed sentiments and attitudes toward AI (e.g., Gessl et al., 2019), this study posits that individuals with greater faith in technology tend to show higher trust in businesses' AI usage, as a general predisposition to trust technology often translates into trust in specific AI tools (McKnight et al., 2011). Empirical findings reveal that people with high faith in technology report significantly greater trust in AI-driven services (Zarifis & Fu, 2023). ...
... Because faith in technology provides a baseline of trust, it mitigates the "confident negative expectations" that define distrust (Cho, 2006). Research suggests that individuals with low faith in technology demand more assurances before trusting a specific system, whereas those with high faith in technology are less prone to assume bias or harm (Lewicki et al., 1998;McKnight et al., 2011). As a result, they approach AI adoption with fewer suspicions, though not necessarily blindly. ...
Article
Full-text available
Current research on AI has extensively examined drivers that predict individuals’ attitudes and behavioral intentions toward AI use. Despite this, there is limited research that explores factors that influence consumers’ acceptance of AI integration into businesses. As more businesses have integrated AI systems into different aspects of their operations, consumers have experienced increasing interactions with AI systems adopted by businesses. Thus, it is critical to understand not only whether individuals trust and accept the use of AI in their everyday lives, but also whether they trust and accept the use of AI by businesses they interact with. As such, this study tests a theoretical framework developed on the basis of current research on AI and technology acceptance. This study used a survey dataset collected from a nationally representative sample of 420 Australian consumers in 2024. The findings revealed that the interplay between faith in general technology, trust and distrust in businesses' AI use, and perceived AI benefits shaped attitudes and behavioral intentions toward businesses using AI. These dynamics also contributed to the approval of businesses’ use of AI. The findings offer theoretical and practical insights on how to manage these dynamics to foster positive attitudes and behavioral intentions toward businesses that use AI.
... Given the increased use of tax software, it is important to consider whether perceptions of trust, procedural justice, and legitimacy vary when technology-based preparation methods rather than human tax preparers are used. General research on technology usage suggests that people are more likely to use software if they trust the software and technology (Mcknight et al., 2011;Söllner et al., 2016). These findings apply across a variety of domains (education: Gulati et al., 2019;online purchases: ElSayad & Mamdouh, 2024;COVID-19 tracing apps: Sousa & Kalju, 2022). ...
Article
Full-text available
Objective: The complexity of tax laws makes manual preparation difficult, leading more taxpayers to use software or accountants. This study presents an experimental analysis comparing taxpayer perceptions of trust and procedural justice when filing with tax experts versus using tax software. The study addressed four questions: (1) How do perceptions of human tax experts compare to tax software? (2) Do perceptions vary among different types of tax software? (3) Do trust and procedural justice predict filing decisions? (4) Can taxpayers effectively oversee tax preparation software? Hypotheses: We hypothesized that participants would favor professional tax experts over commercial and Internal Revenue Service (IRS) software (Hypothesis 1). We also expected higher procedural justice to correlate with greater satisfaction (Hypothesis 2), self-identified knowledge to correlate with accurate expectations (Hypothesis 3), and filing decisions to be predicted by trust in the method (Hypothesis 4a) or outcome (Hypothesis 4b). We anticipated that higher trust in software would increase the likelihood of filing with software (Hypothesis 5) and that inconsistency across methods would decrease filing likelihood (Hypothesis 6). Method: In the experiment, 146 taxpayers (64% women; 88% Hispanic; 75% White; Mage = 27.55 years) prepared their taxes using three methods: a tax professional, commercial software, and IRS software. Participants rated and ranked the trustworthiness of each method and indicated their preference. Results: As predicted, participants had the most favorable perceptions of the tax expert, followed by commercial software and IRS software (Hypothesis 1). Trust in the method, not the outcome, predicted filing decisions (Hypothesis 4a). Participants with higher trust in software were more likely to file with software (Hypothesis 5). Contrary to expectations, procedural justice did not correlate with satisfaction (Hypothesis 2), and knowledge did not correlate with accurate expectations (Hypothesis 3). Consistency across methods did not predict filing (Hypothesis 6). Conclusions: Participants generally preferred human experts, but trust in software could override this preference. Future research directions and implications are discussed.
... Consumer trust in ecommerce can affect the reputation of the platform, the quality of reviews, and the transparency of information. A high level of trust can reduce uncertainty and increase the likelihood of purchasing (McKnight et al., 2011). According to Gefen (2003), there are several indicators of trust, namely (1) Ability, (2) Integrity, and (3) Benevolence. ...
Article
Full-text available
In today’s rapidly developing digital era, people are starting to shift from conventional shopping to online shopping, making e-commerce the main choice to meet their daily needs. One of the e-commerce platforms that is widely used in Indonesia is Shoppe, which is known for its live streaming and online customer reviews features that can influence purchase intention. The purpose of this study is to study the effect of live streaming and online customer reviews on purchase intention with trust as an intervening variable. The method used in this study is a quantitative method. Data obtained from 200 respondents from the results of distributing questionnaires to several social media. The results showed that live streaming had a positive and significant effect on purchase intention, while online customer reviews did not affect purchase intention. In addition, the results showed that there was a positive and significant partial effect of live streaming and online customer reviews on purchase intention with trust as an intervening variable.
Article
Full-text available
The adoption of artificial intelligence (AI) in educational administration is gaining momentum, yet understanding the factors influencing its acceptance remains critical. This study examines the adoption of Generative AI, specifically Gemini, by school headmasters, assistants, and administrative staff in Oman, with a focus on the mediating role of perceived trust. Grounded in the Unified Theory of Acceptance and Use of Technology (UTAUT) and trust theories, the research hypothesizes that performance expectancy, effort expectancy, social influence, and facilitating conditions influence continuance intention through perceived trust. Using a sample of 293 respondents from government and private schools, the study applies Partial Least Squares Structural Equation Modeling (PLS-SEM) to analyze the relationships among these constructs. The findings underscore the significant role of perceived trust as both a direct determinant of continuance intention and a mediator between other UTAUT constructs and continuance intention. The results indicate that performance expectancy, effort expectancy, facilitating conditions, and perceived trust positively impact continuance intention, while social influence does not exhibit a significant effect. Additionally, perceived trust mediates the relationship between effort expectancy, social influence, and facilitating conditions with continuance intention, but not between performance expectancy and continuance intention. Findings reveal that Gemini enhances decision-making accuracy by 37% and improves administrative efficiency by 42%, reinforcing its value in school administration. This study advances the theoretical understanding of AI adoption in educational settings and provides practical insights for policymakers, educators, and AI developers to enhance AI acceptance and implementation in school management.
Article
The trust that users place in generative artificial intelligence (AI) can significantly influence their intentions and behaviors regarding its usage. Nonetheless, our current knowledge regarding user trust in generative AI is limited. To address this research gap, the study conducted semistructured interviews with 29 participants to investigate the factors that may influence user trust, using ChatGPT as an illustrative example. The findings led to the identification of several factors that account for user trust in ChatGPT. These factors encompass user-related aspects (such as technology attitude, innovativeness, and risk perception), information-related factors (including information source, information quality, and information values), technology-related factors (covering system quality, technology quality, and technology ethics), organization-related factors (encompassing organizational structure, brand reputation, and cultural context), and environment-related factors (involving policy environment, network environment, and social environment). In conclusion, the study formulated and presented the ChatGPT user trust framework as a theoretical model to comprehend user trust in generative AI. A thorough discussion of the framework is provided along with suggestions for future applications.
Article
The statistical tests used in the analysis of structural equation models with unobservable variables and measurement error are examined. A drawback of the commonly applied chi square test, in addition to the known problems related to sample size and power, is that it may indicate an increasing correspondence between the hypothesized model and the observed data as both the measurement properties and the relationship between constructs decline. Further, and contrary to common assertion, the risk of making a Type II error can be substantial even when the sample size is large. Moreover, the present testing methods are unable to assess a model's explanatory power. To overcome these problems, the authors develop and apply a testing system based on measures of shared variance within the structural model, measurement model, and overall model.
Article
A possible reason for the delayed acceptance of the Internet as a retail distribution channel may be the lack of trust consumers have in the electronic channel and in the Web merchants. Few prior studies on the adoption of business-to-consumer e-commerce have considered trust in information technology as an important determinant of adoption behavior. This research explicitly encompasses the electronic channel and the merchant as objects to be trusted in a specific e-commerce application, i.e. Internet banking. Our conceptual model posits that initial trust in the electronic channel as a banking medium and trust in bank are the major determinants of adoption behavior. Based on social network theory and trust theory, determinants of trust in the electronic channel such as propensity-to-trust, word-of-mouth (WOM) referrals, structural assurances, are included in the research model. The analyses of independent variables indicated that propensity-to-trust, structural assurances, and relational content of WOM were significant predictors of initial trust in the electronic channel. Our findings also indicated that a significant relationship exists between initial trust in the electronic channel and the adoption of Internet banking. However, further analysis revealed that trust could be a necessary but not a' sufficient condition for the adoption of Internet banking.