Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A Design Theory for Certification Presentations

Published: 04 August 2023 Publication History

Abstract

Prior information system research remains inconsistent of the effects of system certifications. In their current use, certifications are often reduced to graphical seals. This approach fails to incorporate detailed assurance information emanating from the certification process. To address this gap, we adopt a design science approach and deploy a four-phase research design to clarify how to design impactful IS certification presentations. First, we identify sources of users' limited understanding of seals and formulate a design proposal for a certification presentation by drawing upon the elaboration likelihood model. In the second phase, we formulate and validate a set of design meta-requirements and guidelines to improve certification presentation, using cognitive load theory and Toulmin's model of argumentation as kernel theories. In the third phase, new certification presentations that comply with the proposed guidelines are developed and evaluated for their effectiveness. We show that presentations that augment seal-based certification presentations with richer assurance information improve certification effectiveness. This increases users' assurance and trust perceptions when the presentations align with the users' cognitive information processing needs in ways that reduce their cognitive load and enhance argument quality of assurance information.

References

[1]
Adam, M., Niehage, L., Lins, S., Benlian, A., & Sunyaev, A. (2020). Stumbling over the trust tipping point: The effectiveness of web seals at different levels of website trustworthiness. In Proceedings of the 28th European Conference on Information Systems (ECIS), An Online AIS Conference.
[2]
Aiken, K. D., & Boush, D. M. (2006). Trustmarks, objective-source ratings, and implied investments in advertising: Investigating online trust and the context-specific nature of Internet signals. Journal of the Academy of Marketing Science, 34(3), 308--323. https://doi.org/10.1177/0092070304271004
[3]
Akerlof, G. A. (1970). The market for lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3), 488--500. https://doi.org/10.2307/1879431
[4]
Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339--370.
[5]
Arazy, O., Kumar, N., & Shapira, B. (2010). A theory-driven design framework for social recommender systems. Journal of the Association for Information Systems, 11(9), 455--490.
[6]
Archimi, C. S., Reynaud, E., Yasin, H. M., & Bhatti, Z. A. (2018). How perceived corporate social responsibility affects employee cynicism: The mediating role of organizational trust. Journal of Business Ethics, 151(4), 907--921. https://doi.org/10.1007/s10551-018--3882--6
[7]
Areni, C. S., & Lutz, R. J. (1988). The role of argument quality in the elaboration likelihood model. Advances in Consumer Research(15), 197--203.
[8]
Baddeley, A. (2003). Working memory and language: An overview. Journal of Communication Disorders, 36(3), 189--208. https://doi.org/10.1016/S0021--9924(03)00019--4
[9]
Balboni, P., & Dragan, T. (2018). Controversies and challenges of trustmarks: Lessons for privacy and data protection seals. In R. Rodrigues & V. Papakonstantinou (Eds.), Information Technology and Law Series. Privacy and Data Protection Seals (Vol. 28, pp. 83--111). T.M.C. Asser Press. https://doi.org/10.1007/978--94--6265--228--6_6
[10]
Baskerville, R. (2008). What design science is not. European Journal of Information Systems, 17(5), 441--443. https://doi.org/10.1057/ejis.2008.45
[11]
Baskerville, R., Kaul, M., & Storey, V. C. (2018). Aesthetics in design science research. European Journal of Information Systems, 27(2), 140--153. https://doi.org/10.1080/0960085X.2017.1395545
[12]
Behrend, T., Sharek, D., Meade, A., & Wiebe, E. (2011). The viability of crowdsourcing for survey research. Behavior Research Methods, 43(3), 800--813. https://doi.org/10.3758/s13428-011-0081-0
[13]
Benlian, A., Kettinger, W. J., Sunyaev, A., & Winkler, T. J. (2018). Special section: The transformative value of cloud computing: A decoupling, platformization, and recombination theoretical framework. Journal of Management Information Systems, 35(3), 719--739. https://doi.org/10.1080/07421222.2018.1481634
[14]
Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information technology acceptance: An elaboration likelihood model. MIS Quarterly, 30(4), 805--825.
[15]
Britt, M., & Gabrys, G. (2002). Implications of document-level literacy skills for web site design. Behavior Research Methods, Instruments, & Computers, 34(2), 170--176. https://doi.org/10.3758/BF03195439
[16]
Buchanan, T., Paine, C., Joinson, A. N., & Reips, U.D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157--165. https://doi.org/10.1002/asi.20459
[17]
Chi, M. T. H., Glaser, R., & Rees, E. (1982). Expertise in problem solving. In R. Sternberg (Ed.), Advances in the Psychology of Human Intelligence (pp. 7--76). Erlbaum.
[18]
Danylak, P., Greulich, M., Lins, S., & Sunyaev, A. (2022). Toward a unified framework for information systems certification internalization. In Proceedings of the 24th IEEE International Conference on Business Informatics (CBI), Amsterdam, The Netherlands.
[19]
DeStefano, D., & LeFevre, J.A. (2007). Cognitive load in hypertext reading: A review. Computers in Human Behavior, 23(3), 1616--1641. https://doi.org/10.1016/j.chb.2005.08.012
[20]
DiMaggio, P. (1997). Culture and cognition. Annual Review of Sociology, 23(1), 263--287. https://doi.org/10.1146/annurev.soc.23.1.263
[21]
Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Harcourt Brace Jovanovich College Publishers.
[22]
Evans, J. S. B. T. (1984). Heuristic and analytic processes in reasoning. British Journal of Psychology, 75(4), 451--468. https://doi.org/10.1111/j.2044--8295.1984.tb01915.x
[23]
Fisher, R., & Chu, Z. S. (2009). Initial online trust formation: The role of company location and web assurance. Managerial Auditing Journal, 24(6), 542--563. https://doi.org/10.1108/02686900910966521
[24]
Flynn, L. R., & Goldsmith, R. E. (1999). A short, reliable measure of subjective knowledge. Journal of Business Research, 46(1), 57--66. https://doi.org/10.1016/S0148--2963(98)00057--5
[25]
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39--50. https://doi.org/10.2307/3151312
[26]
Gaskin, J. (2016). Common method bias (CMB). http://statwiki.kolobkreations.com/index.php?title=Confirmatory_Factor_Analysis#Common_Method_Bias_.28CMB.29
[27]
Gaskin, J., & Lim, J. (2017). CFA Tool. http://statwiki.kolobkreations.com
[28]
Gefen, D. (2000). E-Commerce: The role of familiarity and trust. Omega, 28(6), 725--737.
[29]
Gerjets, P., Scheiter, K., & Catrambone, R. (2004). Can learning from molar and modular worked examples be enhanced by providing instructional explanations and prompting self-explanations? Learning and Instruction, 16(2), 104--121.
[30]
Gregor, S., & Hevner, A. R. (2013). Positioning and presenting design science research for maximum impact. MIS Quarterly, 37(2), 337--356.
[31]
Gregor, S., & Jones, D. (2007). The anatomy of a design theory. Journal of the Association for Information Systems, 8(5), 312--335.
[32]
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017). A primer on partial least squares structural equation modeling (PLS-SEM) (Second edition). SAGE.
[33]
Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2--24. https://doi.org/10.1108/EBR-11--2018-0203
[34]
Hart, S. G., & Staveland, L. E. (1988). Development of NASA-TLX (task load index): Results of empirical and theoretical research. In P. A. Hancock & N. Meshkati (Eds.), Advances in Psychology: Human Mental Workload (Volume 52, pp. 139--183). North-Holland. https://doi.org/10.1016/S0166--4115(08)62386--9
[35]
Henseler, J., Ringle, C. M., & Sarstedt, M. (2014). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115--135. https://doi.org/10.1007/s11747-014-0403--8
[36]
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75--105.
[37]
Hoffmann, C. P., Lutz, C., & Meckel, M. (2015). Digital natives or digital immigrants? The impact of user characteristics on online trust. Journal of Management Information Systems, 31(3), 138--171. https://doi.org/10.1080/07421222.2014.995538
[38]
Houston, R. W., & Taylor, G. K. (1999). Consumer perceptions of CPA WebTrustSM assurances: Evidence of an expectation gap. International Journal of Auditing, 3(2), 89--105. https://doi.org/10.1111/1099--1123.00051
[39]
Hsu, C., Lee, J.N., & Straub, D. W. (2012). Institutional influences on information systems security innovations. Information Systems Research, 23(3-part-2), 918--939. https://doi.org/10.1287/isre.1110.0393
[40]
Hu, X., Wu, G., Wu, Y., & Zhang, H. (2010). The effects of web assurance seals on consumers' initial trust in an online vendor: A functional perspective. Decision Support Systems, 48(2), 407--418. https://doi.org/10.1016/j.dss.2009.10.004
[41]
Kim, D. J. (2008). Self-Perception-Based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13--45. https://doi.org/10.2753/MIS0742--1222240401
[42]
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544--564. https://doi.org/10.1016/j.dss.2007.07.001
[43]
Kim, D. J., Steinfield, C., & Lai, Y.J. (2008). Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems, 44(4), 1000--1015. https://doi.org/10.1016/j.dss.2007.11.007
[44]
Kim, D. J., Yim, M.S., Sugumaran, V., & Rao, H. R. (2017). Web assurance seal services, trust and consumers' concerns. European Journal of Information Systems, 25(3), 252--273. https://doi.org/10.1057/ejis.2015.16
[45]
Kim, D., & Benbasat, I. (2006). The effects of trust-assuring arguments on consumer trust in Internet stores: Application of Toulmin's model of argumentation. Information Systems Research, 17(3), 286--300. https://doi.org/10.1287/isre.1060.0093
[46]
Kim, D., & Benbasat, I. (2010). Designs for effective implementation of trust assurances in Internet stores. Commun. ACM, 53(2), 121. https://doi.org/10.1145/1646353.1646386
[47]
Kim, K., & Kim, J. (2011). Third-party privacy certification as an online advertising strategy: An investigation of the factors affecting the relationship between third-party certification and initial trust. Journal of Interactive Marketing, 25(3), 145--158. https://doi.org/10.1016/j.intmar.2010.09.003
[48]
Kimery, K. M., & McCord, M. (2006). Signals of trustworthiness in e-commerce: Consumer understanding of third-party assurance seals. Journal of Electronic Commerce in Organizations, 4(4), 52--74.
[49]
Kimery, K. M., & McCord, M. (2008). Seals on retail web sites: A signaling theory perspective on third-party assurances. In M. Khosrow-Pour (Ed.), Web Technologies for Commerce and Services Online (pp. 111--134). IGI Global. https://doi.org/10.4018/978--1--59904--822--2.ch007
[50]
Kock, N. (2015). Common method bias in PLS-SEM. International Journal of E-Collaboration, 11(4), 1--10. https://doi.org/10.4018/ijec.2015100101
[51]
Kock, N., & Lynn, G. (2012). Lateral collinearity and misleading results in variance-based SEM: An illustration and recommendations. Journal of the Association for Information Systems, 13(7), 546--580. https://doi.org/10.17705/1jais.00302
[52]
Kovar, S. E., Burke, K. G., & Kovar, B. R. (2000). Consumer responses to the CPA WEBTRUST? assurance. Journal of Information Systems, 14(1), 17--35. https://doi.org/10.2308/jis.2000.14.1.17
[53]
Kuechler, B., & Vaishnavi, V. (2008). On theory development in design science research: Anatomy of a research project. European Journal of Information Systems, 17(5), 489--504. https://doi.org/10.1057/ejis.2008.40
[54]
Lala, V., Arnold, V., Sutton, S. G., & Guan, L. (2002). The impact of relative information quality of e-commerce assurance seals on Internet purchasing behavior. International Journal of Accounting Information Systems, 3(4), 237--253. https://doi.org/10.1016/S1467-0895(02)00069--6
[55]
Lansing, J., Benlian, A., & Sunyaev, A. (2018). Unblackboxing" decision makers' interpretations of IS certifications in the context of cloud service certifications. Journal of the Association for Information Systems, 19(11), 1064--1096.
[56]
Lansing, J., Siegfried, N., Sunyaev, A., & Benlian, A. (2019). Strategic signaling through cloud service certifications: Comparing the relative importance of certifications' assurances to companies and consumers. The Journal of Strategic Information Systems, 28(4), 1--23. https://doi.org/10.1016/j.jsis.2019.101579
[57]
Laurent, G., & Kapferer, J.N. (1985). Measuring consumer involvement profiles. Journal of Marketing Research, 22(1), 41--53. https://doi.org/10.2307/3151549
[58]
Leppink, J., Paas, F., van der Vleuten, C. P. M., van Gog, T., & van Merriënboer, J. J. G. (2013). Development of an instrument for measuring different types of cognitive load. Behavior Research Methods, 45(4), 1058--1072. https://doi.org/10.3758/s13428-013-0334--1
[59]
Lins, S., Grochol, P., Schneider, S., & Sunyaev, A. (2016). Dynamic certification of cloud services: Trust, but verify! IEEE Security & Privacy, 14(2), 66--71. https://doi.org/10.1109/MSP.2016.26
[60]
Lins, S., Kromat, T., Löbbers, J., Benlian, A., & Sunyaev, A. (2020). Why don't you join in? A typology of information system certification adopters. Decision Sciences, 53(3), 452--485. https://doi.org/10.1111/deci.12488
[61]
Lins, S., Schneider, S., & Sunyaev, A. (2018). Trust is good, control is better: Creating secure clouds by continuous auditing. IEEE Transactions on Cloud Computing, 6(3), 890--903. https://doi.org/10.1109/TCC.2016.2522411
[62]
Lins, S., Schneider, S., Szefer, J., Ibraheem, S., & Sunyaev, A. (2019). Designing monitoring systems for continuous certification of cloud services: Deriving meta-requirements and design guidelines. Communications of the Association for Information Systems, 44(Paper 25), 406--510. https://doi.org/10.17705/1CAIS.04425
[63]
Lins, S., & Sunyaev, A. (2017). Unblackboxing IT certifications: A theoretical model explaining IT certification effectiveness. In Proceedings of the 38th International Conference on Information Systems (ICIS 2017), Seoul, South Korea.
[64]
Lins, S., & Sunyaev, A. (2022). Advancing the presentation of IS certifications: Theory-driven guidelines for designing peripheral cues to increase users' trust perceptions. Behaviour & Information Technology, forthcoming. https://doi.org/10.1080/0144929X.2022.2113432
[65]
Löbbers, J., & Benlian, A. (2019). The effectiveness of IS certification in E-commerce: does personality matter? Journal of Decision Systems, 28(3), 233--259. https://doi.org/10.1080/12460125.2019.1684867
[66]
Löbbers, J., Lins, S., Kromat, T., Benlian, A., & Sunyaev, A. (2022). A multi-perspective lens on web assurance seals: Contrasting vendors' intended and consumers' perceived effects. Electronic Commerce Research, 22, 1573--1615. https://doi.org/10.1007/s10660-020-09415--2
[67]
Lowry, P. B., Moody, G., Vance, A., Jensen, M., Jenkins, J., & Wells, T. (2012). Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society for Information Science and Technology, 63(4), 755--776. https://doi.org/10.1002/asi.21705
[68]
Lynn, T., van der Werff, L., Hunt, G., & Healy, P. (2016). Development of a cloud trust label: A Delphi approach. Journal of Computer Information Systems, 56(3), 185--193. https://doi.org/10.1080/08874417.2016.1153887
[69]
Mak, B., & Lyytinen, K. (1997). A model to assess the behavioral impacts of consultative knowledge based systems. Information Processing & Management, 33(4), 539--550. https://doi.org/10.1016/S0306--4573(97)00015-0
[70]
Mavlanova, T., Benbunan-Fich, R., & Lang, G. (2016). The role of external and internal signals in e-commerce. Decision Support Systems, 87, 59--68. https://doi.org/10.1016/j.dss.2016.04.009
[71]
Mayer, R. E., & Moreno, R. (2003). Nine ways to reduce cognitive load in multimedia learning. Educational Psychologist, 38(1), 43--52.
[72]
McKnight, D. H., Choudhury, V., & Kacmar, C. J. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334--359. https://doi.org/10.1287/isre.13.3.334.81
[73]
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. The Academy of Management Review, 23(3), 473--490.
[74]
McKnight, D. H., Kacmar, C. J., & Choudhury, V. (2004). Shifting factors and the ineffectiveness of third party assurance seals: A two-stage model of initial trust in a web business. Electronic Markets, 14(3), 252--266. https://doi.org/10.1080/1019678042000245263
[75]
Mongeau, P. A., & Stiff, J. B. (1993). Specifying causal relationships in the elaboration likelihood model. Communication Theory, 3(1), 65--72. https://doi.org/10.1111/j.1468--2885.1993.tb00057.x
[76]
Moores, T. (2005). Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM, 48(3), 86--91. https://doi.org/10.1145/1047671.1047674
[77]
Nunamaker, J. F., Chen, M., & Purdin, T. D. (1990). Systems development in information systems research. Journal of Management Information Systems, 7(3), 89--106. https://doi.org/10.1080/07421222.1990.11517898
[78]
Nunnally, J. C. (1978). Psychometric Theory (2d ed). McGraw-Hill series in psychology. McGraw-Hill.
[79]
Odom, M. D., Kumar, A., & Saunders, L. (2002). Web assurance seals: How and why they influence consumers' decisions. Journal of Information Systems, 16(2), 231--250.
[80]
Österle, H., Becker, J., Frank, U., Hess, T., Karagiannis, D., Krcmar, H., Loos, P., Mertens, P., Oberweis, A., & Sinz, E. J. (2011). Memorandum on design-oriented information systems research. European Journal of Information Systems, 20(1), 7--10. https://doi.org/10.1057/ejis.2010.55
[81]
Özpolat, K., Gao, G., Jank, W., & Viswanathan, S. (2013). Research note-The value of third-party assurance seals in online retailing: An empirical investigation. Information Systems Research, 24(4), 1100--1111. https://doi.org/10.1287/isre.2013.0489
[82]
Paas, F., Renkl, A., & Sweller, J. (2004). Cognitive load theory: Instructional implications of the interaction between information structures and cognitive architecture. Instructional Science, 32(1/2), 1--8. https://doi.org/10.1023/B:TRUC.0000021806.17516.d0
[83]
Paas, F., Tuovinen, J. E., Tabbers, H., & van Gerven, P. W. M. (2003). Cognitive load measurement as a means to advance cognitive load theory. Educational Psychologist, 38(1), 63--71. https://doi.org/10.1207/S15326985EP3801_8
[84]
Peer, E., Vosgerau, J., & Acquisti, A. (2014). Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior Research Methods, 46(4), 1023--1031. https://doi.org/10.3758/s13428-013-0434-y
[85]
Peffers, K., Tuunanen, T., & Niehaves, B. (2018). Design science research genres: Introduction to the special issue on exemplars and criteria for applicable design science research. European Journal of Information Systems, 27(2), 129--139. https://doi.org/10.1080/0960085X.2018.1458066
[86]
Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45--77. https://doi.org/10.2753/MIS0742--1222240302
[87]
Petter, S., Khazanchi, D., & Murphy, J. D. (2010). A design science based evaluation framework for patterns. ACM SIGMIS Database, 41(3), 9--26. https://doi.org/10.1145/1851175.1851177
[88]
Petty, R. E., & Cacioppo, J. T. (Eds.). (1986). Communication and persuasion. Springer New York. https://doi.org/10.1007/978--1--4612--4964--1
[89]
Petty, R. E., Cacioppo, J. T., & Goldman, R. (1981). Personal involvement as a determinant of argument-based persuasion. Journal of Personality and Social Psychology, 41(5), 847--855. https://doi.org/10.1037/0022--3514.41.5.847
[90]
Petty, R. E., & Wegener, D. (1999). The elaboration likelihood model: Current status and controversies. In S. Chaiken & Y. Trope (Eds.), Dual-Process Theories in Social Psychology. Guilford Press.
[91]
Podsakoff, P. M., MacKenzie, S. B., Lee, J.?Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879--903. https://doi.org/10.1037/0021--9010.88.5.879
[92]
Pollock, E., Chandler, P. A., & Sweller, J. (2002). Assimilating complex information. Learning and Instruction, 12(1), 61--86.
[93]
Portz, K., Strong, J. M., Busta, B., & Schneider, K. (2000). Do consumers understand what WebTrust means? CPA Journal, 70(10), 46--52.
[94]
Racherla, P., Mandviwalla, M., & Connolly, D. J. (2012). Factors affecting consumers' trust in online product reviews. Journal of Consumer Behaviour, 11(2), 94--104. https://doi.org/10.1002/cb.385
[95]
Renner, M., Lins, S., & Sunyaev, A. (2021). A taxonomy of IS certification's characteristics. In ICIEB'21: 2021 2nd International Conference on Internet and E-Business, Barcelona, Spain.
[96]
Riedl, R., Hubert, M., & Kenning, P. (2010). Are there neural gender differences in online trust? An fMRI study on the perceived trustworthiness of Ebay offers. MIS Quarterly, 34(2), 397--428.
[97]
Rifon, N., La Rose, R., & Choi, S. M. (2005). Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures. Journal of Consumer Affairs, 39(2), 339--362. https://doi.org/10.1111/j.1745--6606.2005.00018.x
[98]
Ringle, C. M., Wende, S., & Becker, J.?M. (2015). SmartPLS 3 (Version 3) [Computer software]. SmartPLS GmbH, www.smartpls.com. Boenningstedt, Germany. www.smartpls.com
[99]
Schneider, S., & Sunyaev, A. (2016). Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology, 31(1), 1--31. https://doi.org/10.1057/jit.2014.25
[100]
Shah, M. H., Peikari, H. R., & Yasin, N. M. (2014). The determinants of individuals' perceived e-security: Evidence from Malaysia. International Journal of Information Management, 34(1), 48--57. https://doi.org/10.1016/j.ijinfomgt.2013.10.001
[101]
Siegfried, N., Winkler, N., & Benlian, A. (2020). Do bad experiences loom larger than good ones? The role of prior purchase experiences on the effectiveness of IS certifications. Journal of Decision Systems, 29(2), 79--101. https://doi.org/10.1080/12460125.2020.1766235
[102]
Simon, H. A. (1996). The sciences of the artificial (3rd ed.). MIT Press. https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=49230
[103]
Singh, R. I., Sumeeth, M., & Miller, J. (2011). A user-centric evaluation of the readability of privacy policies in popular web sites. Information Systems Frontiers, 13(4), 501--514. https://doi.org/10.1007/s10796-010--9228--2
[104]
Sloman, S. A. (1996). The empirical case for two systems of reasoning. Psychological Bulletin, 119, 3--22.
[105]
Smith, G. F., Benson, P. G., & Curley, S. P. (1991). Belief, knowledge, and uncertainty: A cognitive perspective on subjective probability. Organizational Behavior and Human Decision Processes, 48(2), 291--321. https://doi.org/10.1016/0749--5978(91)90016-M
[106]
Speier, C., & Morris, M. G. (2003). The influence of query interface design on decision-making performance. MIS Quarterly, 27(3), 397--423.
[107]
Statista Survey. (2017). Do you know what seals of approval for online shops are? https://www.statista.com/statistics/705448/awareness-about-seal-of-approval-for-online-shopping-in-the-us/
[108]
Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355--378.
[109]
Stegmann, K., Weinberger, A., & Fischer, F. (2007). Facilitating argumentative knowledge construction with computer-supported collaboration scripts. International Journal of Computer-Supported Collaborative Learning, 2(4), 421--447. https://doi.org/10.1007/s11412-007--9028-y
[110]
Stewart, K. J. (2003). Trust transfer on the World Wide Web. Organization Science, 14(1), 5--17. https://doi.org/10.1287/orsc.14.1.5.12810
[111]
Sturm, B., & Sunyaev, A. (2019). Design principles for systematic search systems: A holistic synthesis of a rigorous multi-cycle design science research journey. Business & Information Systems Engineering, 61(1), 91--111. https://doi.org/10.1007/s12599-018-0569--6
[112]
Sunyaev, A., & Schneider, S. (2013). Cloud services certification. Communications of the ACM, 56(2), 33--36. https://doi.org/10.1145/2408776.2408789
[113]
Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257--285. https://doi.org/10.1016/0364-0213(88)90023--7
[114]
Sweller, J. (1994). Cognitive load theory, learning difficulty, and instructional design. Learning and Instruction, 4(4), 295--312. https://doi.org/10.1016/0959--4752(94)90003--5
[115]
Sweller, J. (2004). Instructional design consequences of an analogy between evolution by natural selection and human cognitive architecture. Instructional Science, 32(1--2), 9--31. https://doi.org/10.1023/B:TRUC.0000021808.72598.4d
[116]
Sweller, J. (2010). Element interactivity and intrinsic, extraneous, and germane cognitive load. Educational Psychology Review, 22(2), 123--138. https://doi.org/10.1007/s10648-010--9128--5
[117]
Sweller, J., van Merrienboer, J. G., & Paas, F. W. C. (1998). Cognitive architecture and instructional design. Educational Psychology Review, 10(3), 251--296. https://doi.org/10.1023/A:1022193728205
[118]
Sweller, J., van Merriënboer, J. J. G., & Paas, F. (2019). Cognitive architecture and instructional design: 20 years later. Educational Psychology Review, 31(2), 261--292. https://doi.org/10.1007/s10648-019-09465--5
[119]
Thüring, M., Hannemann, J., & Haake, J. M. (1995). Hypermedia and cognition: Designing for comprehension. Communications of the ACM, 38(8), 57--66. https://doi.org/10.1145/208344.208348
[120]
Toulmin, S. E. (1958). The use of argument. Cambridge University Press.
[121]
Trenz, M., Huntgeburth, J., & Veit, D. (2018). Uncertainty in cloud service relationships: Uncovering the differential effect of three social influence processes on potential and current users. Information & Management, 55(8), 971--983. https://doi.org/10.1016/j.im.2018.05.002
[122]
Vaishnavi, V., & Kuechler, W. (2015). Design science research methods and patterns: Innovating information and communication technology (Second edition). CRC Press LLC. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=935839
[123]
Vaishnavi, V., Kuechler, W., & Petter, S. (2017). Design science research in information systems. www.desrist.org/design-research-in-information-systems/
[124]
Van Merriënboer, J. J. G., & Sweller, J. (2010). Cognitive load theory in health professional education: Design principles and strategies. Medical Education, 44(1), 85--93. https://doi.org/10.1111/j.1365--2923.2009.03498.x
[125]
van Merriënboer, J. J., & Sweller, J. (2005). Cognitive load theory and complex learning: Recent developments and future directions. Educational Psychology Review, 17(2), 147--177. https://doi.org/10.1007/s10648-005--3951-0
[126]
Venable, J., Pries-Heje, J., & Baskerville, R. (2016). FEDS: A framework for evaluation in design science research. European Journal of Information Systems, 25(1), 77--89. https://doi.org/10.1057/ejis.2014.36
[127]
VerLinden, J. G. (1998). Verifiers in everyday argument: An expansion of the Toulmin model. http://cfile232.uf.daum.net/attach/186A5C4E5022069C2FC796
[128]
Voorhees, C. M., Brady, M. K., Calantone, R., & Ramirez, E. (2015). Discriminant validity testing in marketing: An analysis, causes for concern, and proposed remedies. Journal of the Academy of Marketing Science, 44(1), 119--134. https://doi.org/10.1007/s11747-015-0455--4
[129]
Walls, J. G., Widmeyer, G. R., & El Sawy, O. A. (1992). Building an information system design theory for vigilant EIS. Information Systems Research, 3(1), 36--59.
[130]
Winter, R. (2008). Design science research in Europe. European Journal of Information Systems, 17(5), 470--475. https://doi.org/10.1057/ejis.2008.44
[131]
Yang, S.C., Hung, W.C., Sung, K., & Farn, C.K. (2006). Investigating initial trust toward e-tailers from the elaboration likelihood model perspective. Psychology & Marketing, 23(5), 429--445.
[132]
Ye, L. R., & Johnson, P. E. (1995). The impact of explanation facilities on user acceptance of expert systems advice. MIS Quarterly, 19(2), 157--172. https://doi.org/10.2307/249686
[133]
Yi, M. Y., Yoon, J. J., Davis, J. M., & Lee, T. (2013). Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk. Decis. Support Syst., 55(1), 284--295. https://doi.org/10.1016/j.dss.2013.01.029 Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840--1920. Research in Organizational Behavior, 8, 53--111.

Cited By

View all
  • (2024)Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution TakingInformation Systems Research10.1287/isre.2021.0528Online publication date: 8-Jan-2024
  • (2024)Using ISO 14001 certification to signal sustainability equivalence: an examination of the critical success factorsProduction Planning & Control10.1080/09537287.2024.2358059(1-28)Online publication date: 29-May-2024
  • (2024)Why so skeptical? Investigating the emergence and consequences of consumer skepticism toward web sealsInformation and Management10.1016/j.im.2024.10392061:2Online publication date: 25-Jun-2024
  • Show More Cited By

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMIS Database: the DATABASE for Advances in Information Systems
ACM SIGMIS Database: the DATABASE for Advances in Information Systems  Volume 54, Issue 3
August 2023
154 pages
ISSN:0095-0033
EISSN:1532-0936
DOI:10.1145/3614178
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 August 2023
Published in SIGMIS Volume 54, Issue 3

Check for updates

Author Tags

  1. assurance seal
  2. certification
  3. cognitive load theory
  4. design science
  5. elaboration likelihood model
  6. toulmin's model of argumentation

Qualifiers

  • Article

Funding Sources

  • German Research Foundation (DFG)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)64
  • Downloads (Last 6 weeks)12
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution TakingInformation Systems Research10.1287/isre.2021.0528Online publication date: 8-Jan-2024
  • (2024)Using ISO 14001 certification to signal sustainability equivalence: an examination of the critical success factorsProduction Planning & Control10.1080/09537287.2024.2358059(1-28)Online publication date: 29-May-2024
  • (2024)Why so skeptical? Investigating the emergence and consequences of consumer skepticism toward web sealsInformation and Management10.1016/j.im.2024.10392061:2Online publication date: 25-Jun-2024
  • (2023)Web Seal Image Analysis for Evaluating User Trust and Privacy Protection2023 Seventh International Conference on Image Information Processing (ICIIP)10.1109/ICIIP61524.2023.10537723(714-720)Online publication date: 22-Nov-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media