Trust violation and repair: The information privacy perspective

被引:99
作者
Bansal, Gaurav [1 ]
Zahedi, Fatemeh Mariam [2 ]
机构
[1] Univ Wisconsin, Austin E Cofrin Sch Business, Green Bay, WI 54311 USA
[2] Univ Wisconsin, Sheldon B Lubar Sch Business, Milwaukee, WI 53211 USA
关键词
Trust violation; Trust repair; Privacy concern; Hacking; Unauthorized sharing; WEB SITE DESIGN; ORGANIZATIONAL TRUST; METAANALYTIC TEST; FIT INDEXES; E-COMMERCE; JUSTICE; COMPETENCE; INTEGRITY; MODEL; TRUSTWORTHINESS;
D O I
10.1016/j.dss.2015.01.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the pervasive use of the Internet, customer information privacy violation is on the rise and companies could suffer by losing their customers' trust. While previous literature has identified factors that influence trust, less attention has been paid to how trust may be rebuilt after it is violated by negative events regarding customer information privacy. The study synthesized two salient theories (the attribution theory and the organizational justice theory) to investigate the process by which trust is violated by privacy breaches and the extent of its repair by company responses. We examine the moderating effects of two types of privacy violation hacking and unauthorized sharing on the trust violation and repair process. We investigate the efficacy of three response types apology, denial and no response. Data were gathered using a controlled, scenario-based lab experiment. Our results showed the significant-moderating impact of violation type on the process of trust violation and repair. Apology emerged as a universally effective response, although its reparative power was far less in unauthorized sharing than in hacking. Denial emerged as a complex response. Furthermore, the results showed that trustworthiness beliefs (ability, integrity, and benevolence) are differently impacted in the violation-repair process. Details of theoretical and managerial implications are discussed. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:62 / 77
页数:16
相关论文
共 50 条
[31]   Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults [J].
Given-Wilson, Thomas ;
Legay, Axel ;
Sedwards, Sean .
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 :90-109
[32]   Information security in practices: Exploring privacy and trust in computer and internet surveillance [J].
Chang, Shuchih Ernest ;
Liu, Anne Yenching .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2016, 31 (02) :147-155
[33]   Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found and Lost [J].
Bansal, Gaurav .
AMCIS 2012 PROCEEDINGS, 2012,
[34]   Institutional trust and repurchase intention in the sharing economy: The moderating roles of information privacy concerns and security concerns [J].
Lu, Baozhou ;
Yi, Xiaoyang .
JOURNAL OF RETAILING AND CONSUMER SERVICES, 2023, 73
[35]   An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site [J].
Lo, Janice ;
Riemenschneider, Cindy .
AMCIS 2010 PROCEEDINGS, 2010,
[36]   How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study [J].
Mashatan, Atefeh ;
Sangari, Mohamad Sadegh ;
Dehghani, Milad .
IEEE ACCESS, 2022, 10 :69441-69454
[37]   TRUST VIOLATION IN ELECTRONIC COMMERCE: CUSTOMER CONCERNS AND REACTIONS [J].
Goles, Tim ;
Lee, Simon ;
Rao, Srinivasan V. ;
Warren, John .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2009, 49 (04) :1-9
[38]   The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online [J].
Bansal, Gaurav ;
Zahedi, Fatemeh Mariam ;
Gefen, David .
DECISION SUPPORT SYSTEMS, 2010, 49 (02) :138-150
[39]   Benefits First: Consumer Trust Repair in Mobile Commerce [J].
Zhang, He-Da ;
Chen, Shih-Chih ;
Ruangkanjanases, Athapol .
JOURNAL OF THEORETICAL AND APPLIED ELECTRONIC COMMERCE RESEARCH, 2021, 16 (04) :1079-1096
[40]   Understanding Information Security Policy Violation from a Situational Action Perspective [J].
Li, Han ;
Luo, Xin ;
Chen, Yan .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03) :739-772