B2C
B2C
B2C
3/4, 2008
369
A multitheoretical approach for solving trust problems in B2C e-commerce Siddhi Pittayachawan*, Mohini Singh and Brian Corbitt
School of Business Information Technology RMIT University G.P.O. Box 2476V, Melbourne 3001 Victoria, Australia E-mail: siddhi.pittayachawan@rmit.edu.au E-mail: mohini.singh@rmit.edu.au E-mail: brian.corbitt@rmit.edu.au *Corresponding author
Abstract: Trust has been identified as a major barrier in online shopping, especially in the B2C e-commerce model. It has been studied for several years, but there is no indicator that a satisfactory solution for trust in online shopping has been achieved. A trust model is proposed in this paper in order to address this issue. It is uniquely based on five current issues (cybercrime, security, control, web interface, and a trusted third party) that impact trust, guided by four supportive theories: Semiotics, Trust in Signs, Simmelian Model of Trust and Trustworthiness. The research was accomplished with an online survey to collect data from online shoppers around the world. Structural Equation Modelling (SEM) was used to validate the trust model revealing that privacy and security of information are most important factors affecting trust in B2C e-commerce followed by web interface and control. Keywords: B2C trust model; e-commerce trust issues; online shopping solution for e-vendors. Reference to this paper should be made as follows: Pittayachawan, S., Singh, M. and Corbitt, B. (2008) A multitheoretical approach for solving trust problems in B2C e-commerce, Int. J. Networking and Virtual Organisations, Vol. 5, Nos. 3/4, pp.369395. Biographical notes: Siddhi Pittayachawan is a lecturer in the School of Business Information Technology at RMIT University. He received his PhD degree addressing trust issues in B2C e-commerce. His research interests are online shopping, trust, security, and other consumer issues. Mohini Singh is a Professor of Information Technology and E-business in the School of Business Information Technology at RMIT University. She earned her PhD from Monash University, and has published widely in the areas of e-business and new technology and innovation management. Her publications comprise books, book chapters, journal and conference papers. She is the principal Editor of two highly regarded books on e-business and serves as a member on the editorial boards of several international journals.
370
Introduction
Trust is an important barrier discouraging consumers to transact online, especially in Business-to-Consumer (B2C) model, although e-commerce has expanded and grown in the last five years. The issue of trust in e-commerce is widely addressed, however, a satisfactory solution is yet to be achieved. On the contrary, it is reported that trust in online shopping is not improving, in fact, becoming a bigger problem for electronic vendors (e-vendors), leading to a decline in online shopping (NECTEC, 2006). The aim of this paper is to provide e-vendors a simple trust model to address trust problems in B2C e-commerce. Trust is known to be very complex and multidimensional (McKnight and Chervany, 2001), and therefore, it entails several variables which e-vendors should be aware of. This paper includes a discussion on current trends in online business on the issues of trust and a critical review of literature on trust models from previous research. From an extensive review of literature on trust issues (e.g., cybercrime, security and web interface), 21 propositions were developed to establish consumer issues in online trust. An online survey establishing consumer perception guided by Semiotics (Chandler, 2002), Trust in Signs (Bacharach and Gambetta, 2001), Simmelian Model of Trust (Mllering, 2001), and Trustworthiness (Hardin, 1996) theories was undertaken to develop a trust model for e-vendors. Data analysis based on SEM identifying privacy of information and secure transactions to be the most important components of trust form the gist of this paper.
B2C e-commerce
B2C e-commerce has become a popular method for sale of goods and services to consumers in the last ten years. It enables vendors to access customers globally (Miniwatts, 2006), to generate higher income (comScore, 2006), to gain a competitive advantage (Lederer et al., 2000), to enhance and integrate business processes (Piris et al., 2004), and to improve customer service (Lovett, 2003). McGann (2004) advocates that the benefits of B2C e-commerce to consumers include faster transaction (78%), cheaper prices (51%), more selection of similar products or services (43%), simpler shipping process (40%), more customisable products (28%), and more product information (20%). Due to these benefits, B2C e-commerce is a trend widely adopted and is constantly growing since 1995 (Netcraft, 2007). Despite its rapid growth and popularity, trust is a
A multitheoretical approach for solving trust problems in B2C e-commerce 371 critical problem discouraging the use of B2C e-commerce (CMO Council, 2006; Grazioli and Jarvenpaa, 2000; Hsiung et al., 2001; NECTEC, 2006; Tsiakis et al., 2004; Wang and Emurian, 2005).
2.2.1 Cybercrime
Cybercrime is an activity that utilises computing and communication technologies as tools to carry out a crime (Smith, 2004). Identity theft and fraud are two main types of cybercrime that affect consumer decisions to shop online (Hoffman et al., 1999a; Taylor Nelson Sofres & TRUSTe, 2005). Identity theft (i.e., stealing information) leads to fraud (Foley et al., 2004), and this causes fear among consumers (Farrell et al., 2000), and discourage them from shopping online (Entrust, 2005). Cybercrime is perceived risk affecting consumer behaviour (Gefen et al., 2003a) on the internet. Since cybercrime affects trust (Farrell et al., 2000), it generates a negative impact on consumer trust and shopping behaviour in e-commerce (Krebsbach, 2006).
372
2.2.2 Security
Security refers to data protection in e-transactions, and is recognised to be a fundamental component in e-commerce (Aldridge et al., 1997; IDC, 2003; Turban et al., 2006). It scrambles text (e.g., e-transactions or financial details) into something unreadable (i.e., an encrypted message) by intruders (e.g., opportunists and criminals) in order to establish secure information exchange. Since scrambled contents generated by security are extremely difficult to decipher, it can deter cybercrime activities (ITU Telecommunication Standardization Sector, 1997; Turban et al., 2006), and thus, foster consumer trust (Farrell et al., 2003; Kini and Choobineh, 1998). McKnight and Chervany (2001) clarify that security makes consumers perceive assurance, helping them to complete transactions without risks. In spite of this, the internet does not naturally support security in online shopping, and subsequently, e-vendors must recognise the importance of security in B2C e-commerce and properly deploy it in their online businesses (Bhimani, 1996). Specifically, four critical aspects of security must be met including authentication (i.e., identities of transacting parties are genuine), confidentiality (i.e., e-transactions are secret to outsiders), integrity (i.e., e-transactions are not compromised) and non-repudiation (i.e., e-transactions are undeniable by relevant parties) in order to establish secure e-transactions (ITU Telecommunication Standardization Sector, 1997). This clearly requires technical knowledge, and thus, it can be notably challenging for e-vendors to correctly utilise security in online shopping. Implementing it wrongly can result in security breaches, and consequently, destroy consumer trust in e-vendors and B2C e-commerce (BBC, 2007; CMO Council, 2006). Several researchers (Chan and Lee, 2003; Gefen et al., 2003b; Lee and Turban, 2001) are of the opinion that security improves trust and intention to shop online. It also helps consumer to trust e-vendors (McKnight and Chervany, 2005). Although Ratnasingam and Phan (2003) state that security is a success factor in e-commerce, Katsikas et al. (2005) argue that security issues need to be further explored in e-commerce.
2.2.3 Control
Control in this paper implies consumers abilities to control, influence, or monitor the online environment and information (Hoffman et al., 1999b; Robles et al., 2001). If control exists, then consumers tend to commit to transactions even if trust is not adequate (Tan and Thoen, 2002). Since a lack of trust and the rise of cybercrime cause consumers to fear e-commerce and to raise concern for the safety of their information, control is recognised as another factor contributing to trust (Yoon, 2002). A lack of control in the online environment create disputes between consumers and e-vendors (Olivero and Lunt, 2004). This is due to the fact that the nature of e-commerce is such that it does not automatically give power to consumers (Yoon, 2002). Therefore, e-vendors must understand what kinds of control should be given to the customers to win their confidence in this environment. Not allowing a consumer to unsubscribe from a mailing list, an e-mail sent to them without consent, inability to change information and inability to close an account (TRUSTe, 2006) are examples of control issues in B2C e-commerce. Silverpop (2006b) suggests that consumers should be able to control content and decide how often they want to receive e-mails about products. Continuously sending e-mails without allowing consumers to unsubscribe from a mailing list generates a
A multitheoretical approach for solving trust problems in B2C e-commerce 373 negative impact on brand reputation and trust (Lee and Turban, 2001; Silverpop, 2006a). Furthermore, spam e-mails are on the rise and more difficult to be detected by anti-spam software, which frequently carry malware, searching and capturing shopping information for cybercriminals (Anti-Phishing Working Group, 2007; Sophos, 2006). This further discourages consumers from shopping online (Taylor Nelson Sofres & TRUSTe, 2005). Hence, it is clear that cybercrime raises the need for more control over e-commerce (Gauzente, 2004).
374
To further understand regarding trust factors in B2C e-commerce, a review of trust models addressing one or more aspects of B2C e-commerce are presented in the following section.
376
Table 1 Study
Stewart (2003)
Attitude toward using Behavioural intention to use Perceived strength of control Trust
Actual use
Too heavily based on security, however, trust also involves non-technical variables which this study left out Partially addressed web interface and ignored cybercrime, control and TTP
Familiarity Trust Cost to switch vendor Customer trust Perceived risk with vendor Service quality
Not always applicable to B2C e-commerce Too heavily based on service quality and less emphasis on trust
Attention to assurance seals Attitude toward e-retailer Disposition to trust Perceived risk Trust in e-retailer
Intention to purchase
Too focused on a trusted seal and failed to address trust issues in relation to it
Characteristics of consumer Characteristics of website Perceptions of website trust Navigation functionality Personal variables Transaction security Website awareness Website properties Website satisfaction Website trust
Yoon (2002)
Only focused on security and web interface and failed to address cybercrime, control and TTP
378
to a person that perceives. For example, Alice (i.e., interpretant) perceives a lock sign (i.e., representamen) on her web browser while shopping online, and then refers to it as security (i.e., object).
Figure 1 A semiotic triangle
Object (Security)
Interpretant (Alice)
Sources: Adapted from Chandler (2002, p.32) and Echtner (1999, p.48)
Trust in Signs (Bacharach and Gambetta, 2001) is a theory that explains how one trusts others based on a hidden property (i.e., krypta), which is translated from the targets appearance (i.e., manifesta), as shown in Figure 2. For example, during shopping online, Alice knows that there is encryption (i.e., krypta) supporting e-commerce websites because she sees a lock sign (i.e., manifesta) on her web browser.
Figure 2 Trust in signs (see online version for colours)
Trustee (person or thing)
Trustor (Alice)
Simmelian Model of Trust (Mllering, 2001) is a theory explaining three-step process of trust. These steps are interpretation, suspension and expectation, as shown in Figure 3. Interpretation signifies the process when one perceives something and interprets it into something else based on incomplete knowledge. No one is able to know and understand everything (Weber, 1913), and subsequently, interpretation always contains
A multitheoretical approach for solving trust problems in B2C e-commerce 379 uncertainty. According to Mllerings (2001) discussion on the work of Simmel (1964) regarding the three-step process of trust, suspension signifies the process when one must ignore uncertainty in interpretation, because one does not have complete knowledge or information about what one perceives. By ignoring uncertainty, interpretation is temporarily valid. Expectation signifies the process when one expects that the interpretation is correct and suspension is the right thing to do. The outcome after these three steps is either trust or distrust. For example, Alice interprets a lock sign as security even though she does not understand anything at all about cryptography. The lack of knowledge about cryptography causes uncertainty in her interpretation. What if her interpretation is wrong? In order to trust or distrust, she must ignore this uncertainty by believing her interpretation to be correct or incorrect. For the outcome to be trust, she must believe that her interpretation is correct, and ignore any thought about her interpretation being wrong. She then expects that the interpretation and suspension are correct, and therefore, she trusts a lock sign as security.
Figure 3 Simmelian model of trust (see online version for colours)
Hm I might be wrong, but I dont care about cryptography or how secure it is. Well, I believe it is secure after all.
I believe a lock sign means security though I have no idea about cryptography at all.
Interpretation
Suspension
Expectation
Trustworthiness is a theory that represents perceived value of someone or something about how trustworthy they are. According to Hardin (1996) trustworthiness is the main component in trust, because trustworthiness must be perceived before one can either trust or distrust, as shown in Figure 4. Others (Blois, 1999; Philips, 1996) also agree that unless one demonstrates ones trustworthiness to another party, it is impossible for one to establish trust (Jones, 2002; Lewis and Weigert, 1985). To explain Hardins theory; Alice is shopping from two websites. She notices that one website has a digital certificate signed by a known TTP, because a lock sign appears without any pop-up warning message. Another shopping website also has a digital certificate, but it is signed by an unknown TTP, and a lock sign appears with a pop-up warning message. Based on her knowledge, the second website might be fraudulent since it is verified by an unknown TTP. Accordingly, she decides to purchase from the first one. Alices decision may sound simple but is it logical?
380
Figure 4
Trustee (E-vendor)
Trustor (Alice)
Although each of the above theories provides useful insights into trust or perception, none of them completely address all issues. Semiotics does not explain trust at all. It only focuses on perception (i.e., interpretant, representamen, and object). Trust in Signs only explains how one perceives a physical sign and interprets it. It does not describe how trust is established. Simmelian Model of Trust explains the trust processes without adequate detail. Trustworthiness only explains two core components trustworthiness and trust. It does not clarify how trust is developed and what is involved. Therefore, to address trust issues from the consumer and the e-vendor points of view, the above four theories are integrated to guide the study discussed in this paper. Firstly, representamen from Semiotics and manifesta from Trust in Signs are merged because they share similar definitions. While the scope of representamen covers everything that can be perceived as a sign (i.e., physical or imaginable things), manifesta only focuses on physical characteristics. Hence, in Figure 5, representamen (i.e., a sign) leads to krypta (i.e., a hidden property).
Figure 5 An integrated supportive theory (with an example)
(Correct/Incorrect) (Cryptography) Krypta
Su sp en
Uncertainty
In t
erp re ta
si on
tio n
A multitheoretical approach for solving trust problems in B2C e-commerce 381 Secondly, three-step process of trust (i.e., interpretation, suspension and expectation) from Simmelian Model of Trust is integrated to establish the relationships between representamen, krypta and object. As shown in Figure 5, interpretation points from interpretant to krypta indicating that a person interprets a representamen to be krypta. Since there is always uncertainty in interpretation, the arrow pointing from representamen to krypta is labelled as uncertainty, which signifies that the representamen may not have the krypta as it is interpreted by interpretant. Also, Suspension points to uncertainty because interpretant needs to ignore uncertainty for the relationship between representamen and krypta temporarily being certain. Expectation points from interpretant to object signifying that interpretant expects interpretation to be true and suspension to be correct. In other words, by perceiving representamen, interpreting it into krypta, and suspending uncertainty, interpretant expects that representamen and krypta lead to the correct object. Thirdly, the integration of three theories Semiotics, Trust in Signs and Simmelian Model of Trust forms two triads of trustworthiness and trust. With the theory of trustworthiness explained by Hardin (1996), these two triads can be seen as two concepts. The triad of trustworthiness clarifies how trustworthiness is established, and the triad of trust explains how trust is developed. According to Hardin (1996) since trust is more visible than trustworthiness, triad of trust is drawn with a continuous line while trustworthiness is drawn with a dashed line in Figure 5. These two triads are closely connected together illustrating the trustworthiness theory of Hardin (1996), which states that, in order to improve trust, one must improves trustworthiness. To illustrate Figure 5 as a representation of trust in B2C e-commerce, Alice (i.e., interpretant) looks for something that can be referred to as security (i.e., object) before making a transaction. She perceives that there is the lock sign (i.e., representamen) on her web browser as soon as the front page of a shopping website is loaded. Based on her knowledge (i.e., interpretant), she interprets that the lock sign means encryption (i.e., krypta), but also is aware that the lock sign on the screen might not be genuine due to fraudulent websites (i.e., uncertainty). However, in order to make a decision to shop, she must ignore (i.e., suspension) this uncertainty and believe that the lock sign is legitimate or fraudulent. Presumably, based on her personality (i.e., interpretant) she believes that the lock sign is legitimate, and thus believes that her perception, interpretation and suspension is correct (i.e., expectation). Therefore, she trusts that the lock sign leads to security. Conversely, if she interprets that the lock sign is not legitimate, then her interpretation leads to insecurity, and therefore, the result is that she distrusts the lock sign. To accomplish the research discussed in this paper, relevant variables (i.e., cybercrime, security, control, web interface, and TTP), which impact trust in online shopping were identified from the literature. However, addressing all the issues in Figure 5 was beyond the scope of this research. Therefore, in answering the research question which factor is perceived to be trustworthy by a consumer when shopping online only representamen is the focus of this study.
382
From a review of relevant literature, 21 propositions (including subpropositions) were established to address representamen in relation to trust in online business: P1 P2 Trust will positively affect consumer intention to shop online. Cybercrime will negatively affect consumer trust. P2a P2b P3 P4 Cybercrime will negatively affect consumer trust in e-transactions. Cybercrime will negatively affect consumer trust in e-commerce websites.
Cybercrime will negatively affect consumer intention to shop online. Security will positively affect consumer trust. P4a P4b P4c Security will positively affect consumer trust in e-transactions. Security will positively affect consumer trust in e-vendors. Security will positively affect consumer trust in e-commerce websites.
P5 P6
Security will positively affect consumer intention to shop online. Cybercrime will positively affect the need for control. P6a P6b Cybercrime will positively affect the need for online environment control. Cybercrime will positively affect the need for information control.
P7 P8 P9
Control will positively affect consumer trust in e-vendors. Web interface will positively affect consumer intention to shop online. Web interface will positively affect consumer trust. P9a P9b Web interface will positively affect consumer trust in e-vendors. Web interface will positively affect consumer trust in e-commerce websites.
P10 Web interface will positively affect security. P11 Web interface will positively affect control. P12 A TTP will positively impact web interface.
A multitheoretical approach for solving trust problems in B2C e-commerce 383 Figure 6 shows the proposed research model including the 21 propositions. There are five representamens (i.e., cybercrime, security, control, web interface, and TTP) perceived by consumers according to the literature review. All these representamens directly affect trust either positively or negatively, and also impact one another.
Figure 6 The research model (see online version for colours)
Representamens P8(+) Web Interface y Graphics y Structure y Content y Social-cue P10(+) Security P9(+) P11(+) Control y Environment y Information P7(+) Trust y E-transaction y E-vendor y Website Intention to Shop Online P5(+) P4(+)
P12(+)
P1(+)
Research method
The study was undertaken via an online survey with consumers to establish their perceptions of trust in B2C e-commerce. The advantages of online survey are fast, convenient, access to online consumers worldwide, ability to obtain a response to every question and easy to transfer responses from a database to statistical software (Corbitt et al., 2003; Singh and Burgess, 2007; Singh and Byrne, 2005). The questionnaire was firstly developed with Microsoft Word to focus on creating each question carefully. The questionnaire was divided into two sections. The first section contains a question directed to online shopping experience on a categorical scale. Respondents were asked about their online experiences to ensure that they were real online shoppers. The second section consisted of 65 questions to establish trust issues in online shopping on a 5-point Likert scale, based on the research propositions and literature. The questionnaire was then rewritten in formats of Extensible Hypertext Markup Language (XHTML) and Cascading Style Sheet (CSS) to ensure compatibility with popular web browsers such as Microsoft Internet Explorer and Mozilla Firefox. It was developed with Notepad to minimise loading time of online questionnaire. XHTML and CSS code of questionnaire was validated with World Wide Web Consortium (W3C) online validators to ensure that it complied with the standards. The online questionnaire was presented in a single page to provide for simple navigation. The respondents provided answers by clicking on radio buttons and hitting a SUBMIT button upon completion. Questionnaire responses were transmitted to a database created in MySQL format, which was hosted by RMIT University. A server supported a secure connection to guarantee privacy of respondents. The online questionnaire was then pilot tested with academics and students at RMIT University.
384
University students, graduates and faculties are likely to shop online more than other population (Canadian Internet Project, 2005; Cheeseman Day et al., 2003; Dessewffy et al., 2003; Findahl, 2003; Research Center for Social Development, 2005), and therefore, 22 universities across the globe were contacted to participate in this survey. In addition, since all these participants were educated, it was assumed that they were familiar with internet technology and e-commerce issues. Of these, 19 universities agreed to participate in the survey from which 540 valid responses were generated and stored in a MySQL database. The survey data were then imported and collated in SPSS.
Owing to the fact that some propositions did not have enough data to be analysed with SEM, five propositions were not tested. Dropping these did not affect the objective of this research, which is to establish a trust model, and not an intention model. For SEM, two-step approach analysis suggested by Anderson and Gerbing (1988) was performed. Firstly, an Exploratory Factor Analysis (EFA) was completed with the use of SPSS. Then, a Confirmatory Factor Analysis (CFA) was carried out with Analysis of Moment Structures (AMOS), which is a software developed especially for SEM (Byrne, 2001; Hair et al., 2006). Kaiser-Meyer-Olkin (KMO) and Bartletts test were used to determine collated data was adequate to be analysed with EFA. The value of KMO was .913 and Bartletts test was p = .000. According to Hair et al. (2006) and Brace et al. (2006), KMO > .8 means that the data is meritorious, and p < .05 indicates that the data is suitable for analysing with EFA. Based on EFA, the data was extracted with Maximum Likelihood (ML) and rotated with oblimin in order to examine the data dimensionality and to develop a measurement model. A combination of two tests Eigenvalues (>1) and scree plot generated by EFA were used to justify the number of extracted factors (i.e., a group of similar items) from the data. Subsequently, eight factors were extracted with 57% variance. These were Trust, Security, Control, Fraud, Privacy, Design-V, Design-W and Warranty, presented in Figure 7. Cronbachs was used to assess the reliability of each factor, results of which are presented in column 3 of Table 3. Nunnally (1978) recommends that the value of Cronbachs higher than .7 indicates a good reliability suggesting that all factors in this analysis are reliable. These eight factors were then put together according to the research model (Figure 6) in order to establish the measurement model (Figure 7), which was used for CFA analysis.
Design-W
Warranty
Trust
Fraud
Privacy
Control
According to AMOS, the survey data is not multivariate normally distributed. Therefore, bootstrapping with Maximum Likelihood (ML) was used to assess the measurement model. Bootstrapping is a statistical technique that allows the model to be assessed under the condition multivariate normal distribution (Byrne, 2001). Row 2 of Table 2 indicates the goodness-of-fit values of measurement model. By comparing this result with the requirements of goodness-of-fit values (Row 4 of Table 2), the model is moderately supported.
Table 2 Model Original Modified Requirement The goodness-of-fit values
2 (bootstrap)
1455.808 307.733 = df
2
2/df
1.259 1.216 <2
The measurement model (Figure 7) was then modified based on Modification Indices (MI) generated with AMOS that indicated which items can be dropped from the analysis. The model was carefully rectified by dropping one item at a time. The model modification was also thoroughly revised to ensure theoretical sense. The goodness-of-fit values were improved, as shown in Row 3 of Table 2. Although the requirement of p value is >.05, our model obtained p < .002. The p value can be inaccurate with a higher number of sample (Byrne, 2001), and therefore, other goodness-of-fit values must be used to justify validity. Based on the values of 2/df, RMSEA, IFI and CFI presented in Table 2, this research model is well supported by the SEM analysis. Column 4 of Table 3 shows that the reliability of each factor after dropping a few items still hold a high reliability factor (>.7).
386
Table 3 Factor Trust Fraud Privacy Security Control
Discussion
It is evident from column 2 of Table 3 that, by exploring the dimensionality in the survey data with EFA, the findings reveal that two factors (i.e., Cybercrime and Web Interface) are multidimensional: 1 Cybercrime, in the viewpoint of consumers, appears to contain two factors Fraud and Privacy. Furthermore, the correlation between these two factors is extremely low (.102), which indicates two different types of problems in cybercrime. This finding is different from the literature review (Anti-Phishing Working Group, 2007; Federal Trade Commission, 2007), which indicates three issues of cybercrime (identity theft, fraud and privacy). The implication from this research finding is that consumers perceive identity theft associated with fraud, and privacy to be a separate factor. Regarding Web Interface, consumers also see two different issues, which are design/functionality (Design-V and Design-W) and credibility/assurance (Warranty). The difference between Design-V and Design-W is that, the former factor contains items used to validate the relationship between web interface and trust in e-vendors while the latter factor contains items used to validate the relationship between web interface and trust in shopping websites. Warranty contains items related to a trusted seal, a security and privacy statement and information credibility. Regardless of their differences, the findings show moderate correlation between Design-V, Design-W and Warranty (>.4). A possible explanation for this is that even though design/functionality and credibility/assurance are different issues, consumers still observe these issues from the same source, which is the web interface.
To establish trust issues in a greater depth, propositions 2, 4 and 6 presented in Table 4 were tested in groups of two or three based on how closely they were related. Particularly, they are the subpropositions established to address the same issues. The findings of the study presented in Figure 8 indicate the following regarding trust in B2C e-commerce: Privacy and security are most important issues in consumer trust. The regression weight values of .225 (Privacy Trust) and .192 (Security Trust) indicate their impact on trust to be higher than the impact of other factors. The p values < .005
A multitheoretical approach for solving trust problems in B2C e-commerce 387 show that this is significant. This finding confirms the opinions of Belanger et al. (2002) that privacy and security are important factors for winning consumer trust in online business. Web design (Design-V Trust = .170) and control (Control Trust = .162) together impact trust. Data analysis also reveals that web design (Design-V Security = .161) impacts security which then affects trust. It is also evident that privacy (Privacy Control = .369) impacts control which affects trust. This finding supports the views of Wang and Emurian (2005) and Olivero and Lunt (2004) that web interface and control are important components fostering consumer trust. Warranty impacts security (Warranty Security = .202) and control (Warranty Control = .275). A trusted seal, a security and privacy statement and credible information help consumers perceive a greater security and control which lead to trust in the B2C e-commerce. Identity theft and fraud (Fraud Security = .172) have negative impact on security. This finding is similar to the view that customers perceive less security if their information has been compromised (CMO Council, 2006; Taylor Nelson Sofres & TRUSTe, 2005). A likely outcome of this is that the consumer will not commit to a purchase in such circumstances.
Summary of tested propositions Relationship Fraud Trust Privacy Trust 4a + 4b + 4c 6a + 6b Security Trust Fraud Control Privacy Control 7 9a Control Trust Design-V Trust Warranty Trust 9b Design-W Trust Warranty Trust 10 Design-V Security Design-W Security Warranty Security 11 Design-V Control Design-W Control Warranty Control Result Not supported Supported Supported Not supported Supported Supported Supported Not supported Not supported Not supported Supported Not supported Supported Not supported Not supported Supported
Table 4 Propositions 2a + 2b
388
Figure 8
Design-V
Security
.683 **** n.s. .540 **** .192 **** n.s. n.s. .630 **** .202 **
.289 ****
Design-W
Warranty
.275 *** .172 ****
n.s.
Trust
Fraud
n.s. .138 ** .225 **** .162 **
* p < .1 ** p < .05 *** p < .01 **** p < .005 n.s. p > .1
Privacy
.369 ****
Control
Applying the findings discussed above to a B2C e-consumer: Alice will look for privacy and security on the shopping website. Privacy will tell Alice how her information will be protected by an e-vendor, and security will ensure secure transaction. She will then explore web design and determine legitimacy of the e-vendor, and also look for controls that will protect her information from further use either for marketing or by other online sellers. Warranty such as a trusted seal will further enhance Alices trust on the e-vendor. However, before committing to a purchase, Alice will also explore the existence of identity theft and fraud problems with this e-vendor. Perhaps, she will ask her friends who are knowledgeable about security and risks in online shopping, or search e-commerce news on the internet. For instance, E-commerce Times4 that is an online e-commerce newspaper reports security breach issues in a daily basis. If Alice finds that the database containing millions of credit card numbers kept by this e-vendor has a history of getting hacked and there is no evidence of any security improvement, this will negatively impact security and then trust on this particular e-vendor.
Implication
This paper suggests that the four theories (i.e., Semiotics, Trust in Signs, Simmelian Model of Trust and Trustworthiness) are a good guide to address trust problems in B2C e-commerce. They helped answering the question what factors impact consumer trust in B2C e-commerce. The scope of this research allowed us to focus on trust from the e-vendors point of view. Based on the findings in this paper, it is suggested that an e-vendor should focus on addressing privacy (e.g., information and spam e-mails) and security (e.g., secure connection) since they have most impact on trust than other factors. After that, web design (e.g., functionality and ease of use) and control (e.g., consumer consents and monitor) should be considered to foster greater trust. Although warranty (e.g., a trusted
A multitheoretical approach for solving trust problems in B2C e-commerce 389 seal and a security and privacy statement) does not have any direct impact on trust, it improves consumers perceptions of security and control. Lastly, an e-vendor should avoid having any negative history regarding identity theft and fraud (e.g., credit card detail is stolen via database hacking), because these indicate to consumers that security used by an e-vendor is inadequate. Particularly, with the internet, consumers can easily search for news, consumer comments and feedback, and e-commerce review websites regarding e-vendors and their websites. In addition, they may ask their friends who are well-informed about security breaches in online shopping.
Limitations
The results presented in this paper are still in a preliminary stage of analysis, and the research is in progress. The goodness-of-fit values indicate that the model is well supported, and therefore, it indicates high construct validity of the research model. However, discriminant validity is still the problem of this model, because Design-V, Design-W and Warrantee are moderately correlated with one another at the values of higher than .540. In addition, the findings reveal that Design-W is statistically insignificant. In order to improve the model parsimony, this factor must be taken off and the model must be reanalysed (Hair et al., 2006). It is expected that the p values of each regression path may be changed due to the absence of this factor, and the conclusion for each relationship (i.e., regression weight values) may also be different from this paper. Therefore, the reader should use the findings with caution.
Conclusion
Trust is widely addressed as an important issue in B2C e-commerce. This research identified important trust issues that e-vendors can implement to enhance trust. The findings of this study include consumer issues analysed statistically to identify trust issues pertinent for all e-vendors. This paper reports that, by addressing trust issues from multiple angles including privacy, security, web design, control, warranty and fraud, e-vendors are able to win consumer confidence and enhance B2C e-commerce. Since this paper aims to propose a trust model, the relationships between the representamens (i.e., cybercrime, security, control, web interface, and TTP) and intention to shop online were not investigated. It is not known how these representamens affect intention to shop online, and therefore, further research is required to validate the proposed model with this factor. The in-depth study of how consumer personality and knowledge affect perception (i.e., exploration of interpretant) and what representamens are interpreted into (i.e., exploration of object) are also other possible new directions of the research.
390
References
Akhter, F., Hobbs, D. and Maamar, Z. (2004) Determining the factors which engender customer trust in Business-to-Consumer (B2C) electronic commerce, proceedings of the IEEE International Conference on E-commerce Technology, IEEE, San Diego, California, USA, 69 July, pp.291294. Aldridge, A., White, M. and Forcht, K. (1997) Security considerations of doing business via the internet: cautions to be considered, Internet Research: Electronic Networking Applications and Policy, Vol. 7, No. 1, pp.915. Anderson, J.C. and Gerbing, D.W. (1988) Structural equation modeling in practice: a review and recommended two-step approach, Psychological Bulletin, Vol. 103, No. 3, pp.411423. Ang, L. and Lee, B-C. (2000) Influencing perceptions of trustworthiness in internet commerce: a rational choice framework, Proceedings of the 5th Collaborative Electronic Commerce Technology and Research (CollECTer) Conference, Brisbane, QLD, Australia, pp.112. Anti-Phishing Working Group (2007) APWG Phishing trends reports, Anti-Phishing Working Group, http://www.antiphishing.org/phishReportsArchive.html (viewed 2 April 2007). Antoci, A., Galeotti, M., Russu, P. and Zarri, L. (2006) Generalized trust and sustainable coexistence between socially responsible firms and nonprofit organizations, Chaos, Solitons & Fractals, Vol. 29, No. 3, pp.783802. Bacharach, M. and Gambetta, D. (2001) Trust in signs, in K.S. Cook (Ed.) Trust in Society, New York: Russell Sage Foundation, pp.148184. BBC (2007) Consumers shun hacked stores, BBC News, 17 April (Technology section). Belanger, F., Hiller, J.S. and Smith, W.J. (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, Journal of Strategic Information Systems, Vol. 11, Nos. 34, pp.245270. Bhattacherjee, A. (2002) Individual trust in online firms: scale development and initial trust, Journal of Management Information Systems, Vol. 19, No. 1, pp.211241. Bhimani, A. (1996) Securing the commercial internet, Communications of the ACM, Vol. 39, No. 6, pp.2935. Blois, K.J. (1999) Trust in business to business relationships: an evaluation of its status, Journal of Management Studies, Vol. 36, No. 2, pp.197215. Brace, N., Kemp, R. and Snelgar, R. (2006) SPSS for Psychologists, 3rd ed., New York: Palgrave Macmillan. Bryant, A. and Colledge, B. (2002) Trust in electronic commerce business relationships, Journal of Electronic Commerce Research, Vol. 3, No. 2, pp.3239. Byrne, B.M. (2001) Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming, Mahwah: Lawrence Erlbaum Associates, Inc. Canadian Internet Project (2005) Canada online: a comparative analysis of internet users and non-users in Canada and the world: behaviour, attitudes and trends 2004, Canadian Internet Project, Toronto, October, http://www.cipic.ca/en/documents/Canada%20Online%20Final% 20English%20Version%2010302005.pdf. Chan, J.K.Y. and Lee, M.K.O. (2003) SME e-procurement adoption in Hong Kong the roles of power, trust and value, Proceedings of the 36th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, USA, 69 January, pp.179188. Chandler, D. (2002) Semiotics: The Basics, London: Routledge. Chau, P.Y.K., Au, G. and Tam, K.Y. (2000) Impact of information presentation modes on online shopping: an empirical evaluation of a broadband interactive shopping service, Journal of Organisational Computing and Electronic Commerce, Vol. 10, No. 1, pp.122. Cheeseman Day, J., Janus, A. and Davis, J. (2003) Computer and internet use in the United States: 2003, U.S. Census Bureau, October, http://www.census.gov/prod/2005pubs/p23-208.pdf.
392
Gefen, D., Srinivasan Rao, V. and Tractinsky, N. (2003b) The conceptualization of trust, risk and their relationship in electronic commerce: the need for clarifications, Proceedings of the 36th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, 69 January, pp.192201. Grazioli, S. and Jarvenpaa, S.L. (2000) Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers, IEEE Transactions on System, Man, and Cybernetics Part A: Systems and Humans, Vol. 30, No. 4, pp.395410. Hair, J.F., Jr., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L. (2006) Multivariate Data Analysis, 6th ed., Upper Saddle River: Pearson Education, Inc. Hardin, R. (1996) Trustworthiness, Ethics, Vol. 107, No. 1, pp.2642. Hardin, R. (2002) Trust and Trustworthiness, Russell Sage Foundation. Hoffman, D.L., Novak, T.P. and Peralta, M. (1999a) Building consumer trust online, Communications of the ACM, Vol. 43, No. 4, pp.8085. Hoffman, D.L., Novak, T.P. and Peralta, M. (1999b) Information privacy in the marketspace: implications for the commercial uses of anonymity on the web, The Information Society, Vol. 15, No. 2, pp.129140. Hoyle, R.H. (1995) Structural Equation Modeling: Concepts, Issues, and Applications, Thousand Oaks: SAGE Publications, Inc. Hsiung, H., Scheurich, S. and Ferrante, F. (2001) Bridging e-business and added trust: keys to e-business growth, IT Professional, Vol. 3, No. 2, pp.4145. Hu, X., Lin, Z. and Zhang, H. (2004) Myth or reality: effect of trust-promoting seals in electronic markets, in O. Petrovic, M. Ksela, M. Fallenbck and C. Kittl (Eds.) Trust in Network Economy, Springer, pp.143150. IDC (2003) Security, continuity top IT spending priorities, PrintOnDemand, Framingham, 25 September, http://www.printondemand.com/MT/archives/001335.html. ITU Telecommunication Standardization Sector (1997) Information technology open systems interconnection the directory: authentication framework, Recommendation X.509, International Telecommunication Union. Jarvenpaa, S.L., Tractinsky, N. and Vitale, M. (2000) Consumer trust in an internet store, Internet Technology and Management, Vol. 1, Nos. 12, pp.4571. Jones, A.J.I. (2002) On the concept of trust, Decision Support Systems, Vol. 33, No. 3, pp.225232. Jutla, D.N., Kelloway, E.K. and Saifi, S. (2004) Evaluation of user intervention mechanisms for privacy on SME online trust, Proceedings of the IEEE International Conference on E-Commerce Technology, IEEE, San Diego, California, 69 July, pp.281288. Katsikas, S.K., Lopez, J. and Pernul, G. (2005) Trust, privacy and security in e-business: requirements and solutions, Proceedings of the 10th Panhellenic Conference on Informatics, Volos, Greece: Springer, November, pp.548558. Keen, P.G.W. (1997) Are you ready for trust economy, Computerworld, Vol. 31, No. 16, p.80. Kim, Y.H. and Kim, D.J. (2005) A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction, Proceedings of the 38th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, USA, 36 January. Kimery, K.M. and McCord, M. (2002) Third-party assurances: the road to trust in online retailing, Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE, Waikoloa, Hawaii, 710 January. Kini, A. and Choobineh, J. (1998) Trust in electronic commerce: definition and theoretical considerations, Proceedings of the 31st Hawaii International Conference on System Sciences, IEEE, Kohala Coast, Hawaii, 69 January, pp.5161. Koufaris, M. and Hampton-Sosa, W. (2004) The development of initial trust in an online company by new customers, Information & Management, Vol. 41, No. 3, pp.377397. Krebsbach, K. (2006) As data-breach fears grow, banks need to inspire calm, U.S. Banker.
394
Riegelsberger, J., Sasse, M.A. and McCarthy, J.D. (2003) Shiny happy people building trust?: photos on e-commerce websites and consumer trust, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Florida, USA: ACM Press, pp.121128. Rivest, R.L. and Lampson, B. (1996) SDSI a simple distributed security infrastructure, http://theory.lcs.mit.edu/~rivest/sdsi10.ps (viewed 11 August 2006). Robles, S., Poslad, S., Borrell, J. and Bigham, J. (2001) Adding security and privacy to agents acting in a marketplace: a trust model, Proceedings of the 35th International Carnahan Conference on Security Technology, IEEE, London, England, 1619 October, pp.235239. Salam, A.F., Rao, H.R. and Pegels, C.C. (2003) Consumer-perceived risk in e-commerce transactions, Communications of the ACM, Vol. 46, No. 12, pp.325331. Silverpop (2006a) Email marketers missing out on opt-outs, Silverpop, Atlanta, 20 March, http://www.silverpop.com/news/press/03_20_06.html. Silverpop (2006b) Silverpops 2006 list growth survey: comparing UK/EU tactics with US/Canadian methods, Silverpop, Atlanta, 24 July, http://www.silverpop.com/news/press/ 07_24_06.html. Simmel, G. (1964) The Sociology of Georg Simmel, New York: Free Press. Singh, M. and Burgess, S. (2007) Electronic data collection methods, in R.A. Reynolds, R. Woods and J.D. Baker (Eds.) Handbook of Research on Electronic Surveys and Measurements, Idea Group Reference, Hershey, pp.2843. Singh, M. and Byrne, J. (2005) Performance evaluation of e-business in Australia, The Electronic Journal of Information Systems Evaluation, Vol. 8, No. 1, pp.7180. Smith, R.G. (2004) Impediments to the success investigation of transnational high tech crime, Australian Institute of Criminology, October, http://www.aic.gov.au/publications/tandi2/ tandi285.html. Sophos (2006) Sophos security threat management report, Sophos, July, http://www.sophos.com/ virusinfo/whitepapers/sophos-security-report-jun06-srus. Stewart, K.J. (2003) Trust transfer on the World Wide Web, Organization Science, Vol. 14, No. 1, pp.517. Stockdale, R. and Standing, C. (2003) Framework for participants recognition of key success factors in electronic marketplaces, in K.V. Andersen, S. Elliot, P. Swatman, E. Trauth and N. Bjrn-Andersen (Eds.) Seeking Success in E-business: A Multidisciplinary Approach, London: Kluwer Academic Publishers, pp.345364. Suh, B. and Han, I. (2003) The impact of customer trust and perception of security control on the acceptance of electronic commerce, International Journal of Electronic Commerce, Vol. 7, No. 3, pp.135161. Sultan, F., Urban, G., Shankar, V. and Bart, I. (2002) Determinants and Role of Trust in E-business: A Large Scale Empirical Study, MIT Sloan School of Management, http://hdl.handle.net/1721.1/1826 (viewed 5 December 2006). Sztompka, P. (2000) Trust: A Sociological Theory, Cambridge: Cambridge University Press. Tan, Y-H. and Thoen, W. (2002) Formal aspects of a generic model of trust for electronic commerce, Decision Support Systems, Vol. 33, No. 3, pp.233246. Taylor Nelson Sofres & TRUSTe (2005) TNS/TRUSTe holiday shopping survey shows identity theft, spam and spyware to be top concerns with shopping online, Taylor Nelson Sofres plc, London, 23 March, http://www.tns-global.com/corporate/Doc/0/ 4OSFN8JBMCB4N688PVHU4UD1B7/TNS_TRUSTeHoliday2005.pdf. Thatcher, J.B. and George, J.F. (2004) Commitment, trust, and social involvement: an exploratory study of antecedents to web shopper loyalty, Journal of Organizational Computing & Electronic Commerce, Vol. 14, No. 4, pp.243268. TRUSTe (2006) Watchdog report, TRUSTe, San Francisco, http://www.truste.org/consumers/ reports/June2006.html.
Notes
1 2 3 4 http://www.verisign.com http://www.geotrust.com http://www.truste.org http://www.ecommercetimes.com