Signals of Trustworthiness in E-Commerce: Consumer Understanding of Third-Party Assurance Seals

Signaling theory provides the framework to address three main research questions: (1) How accurately do consumers notice and recollect TPA seals on retail Web sites? (2) How familiar are consumers with major TPA seals? and (3) How accurately do consumers understand the assurances represented by the TPA seals? Results of this study of three major TPA seals (TRUSTe, BBBOnLine Reliability, and VeriSign) reveal that subjects have poor recall of TPA seals viewed on a Web site, have limited familiarity with TPA programs, and have incomplete and largely inaccurate perceptions of the assurances that TPA seals represent. These results suggest that TPA seals may not fulfill their potential to influence consumer trust in e-commerce because the signals are not noticed on merchant Web sites or adequately understood by consumers.

[1]  Luis F. Luna-Reyes,et al.  E-Mexico: Collaborative Structures in Mexican Public Administration , 2007 .

[2]  Lai Xu,et al.  Outsourcing and Multi-Party Business Collaborations Modeling , 2007, J. Electron. Commer. Organ..

[3]  Lejla Vrazalic,et al.  E-commerce in Regional Small to Medium Enterprises , 2007 .

[4]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[5]  M. Khosrowpour Advanced Topics in Electronic Commerce , 2005 .

[6]  Christine Legner,et al.  The Evolution of B2B E-Services from First Generation E-Commerce Solutions to Multichannel Architectures , 2008, J. Electron. Commer. Organ..

[7]  Mehdi Khosrow-Pour,et al.  Encyclopedia of E-commerce, E-government and Mobile Commerce , 2006 .

[8]  Eileen M. Trauth,et al.  Women and Social Capital Networks in the IT Workforce , 2006 .

[9]  Annie Becker,et al.  Electronic Commerce: Concepts, Methodologies, Tools and Applications , 2007 .

[10]  James Backhouse,et al.  Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce , 2000, J. Organ. End User Comput..

[11]  Manuel Mogollon,et al.  Cryptography and Security Services: Mechanisms and Applications , 2007 .

[12]  Sushil Jajodia,et al.  Secure Multicast for Mobile Commerce Applications: Issues and Challenges , 2008 .

[13]  Lei-da Chen,et al.  An Empirical Examination of the Impact of Wireless Local Area Networks on Organization of Users , 2006, J. Electron. Commer. Organ..

[14]  Pauline Ratnasingham,et al.  A SWOT Analysis for B2C E-Commerce: The Case of Amazon.com , 2006 .

[15]  Robert Hinson,et al.  E-Business Triggers: An Exploratory Study of Ghanaian Nontraditional Exporters (NTEs) , 2007, J. Electron. Commer. Organ..

[16]  Bijan Fazlollahi,et al.  Strategies for eCommerce Success , 2002 .

[17]  Beverley G. Hope,et al.  Beauty is More than Skin Deep: Organisational Strategies for Online Consumer Risk Mitigation in Apparel Retailing , 2005 .

[18]  Jeff Barnett The Impact of Privacy Legislation on Patient Care , 2008, Int. J. Inf. Secur. Priv..

[19]  Arthur Tatnall,et al.  Adoption of Internet Technology by the Banking Industry in Oman: A Study Informed by the Australian Experience , 2008, J. Electron. Commer. Organ..

[20]  Robert Hauptman Encyclopedia of Information Ethics and Security , 2007, Encyclopedia of Information Ethics and Security.

[21]  Letha H. Etzkorn,et al.  A Parallel Methodology for Reduction of Coupling in Distributed Business-to-business E-commerce Transactions , 2007, J. Electron. Commer. Organ..