An integrated model for online transactions: illuminating the black box

– The purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned action, and to test it in a non US/UK context such as Greece., – Structural equation modeling was used to survey data from 376 household respondents from two residential departments of the city of Thessaloniki in Greece in order to examine causal inferences., – The results of the model, where the trust‐risk‐subjective norms framework mediated the impact of information privacy on actual transactions, indicated that the individual's attitude toward using technology, through the intention to submit individual information, resulted in positive actual transaction outcomes., – Cross‐section data were used for testing the model. However, for properly investigating causality time‐series or longitudinal data should be employed., – For increasing online transactions, organizations should make their websites as simple and attractive as possible, develop their image that they do care about customers and are trustworthy, and develop privacy‐friendly policies for gaining competitive advantage., – This study proposes and empirically validates an integrative framework for online transactions at the individual level by adapting information privacy concerns and trust‐risk‐subjective norm beliefs and relates them to attitudes of individuals. Thus, the proposed integrative framework is critically engaging and well established but with limited information models.

[1]  Paul Jen-Hwa Hu,et al.  Investigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories , 2002, Inf. Manag..

[2]  Cynthia K. Riemenschneider,et al.  Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests , 1997, Inf. Syst. Res..

[3]  Steven Furnell,et al.  Preventative Actions for Enhancing Online Protection and Privacy , 2011, Int. J. Inf. Technol. Syst. Approach.

[4]  J. Christopher Westland,et al.  Lower bounds on sample size in structural equation modeling , 2010, Electron. Commer. Res. Appl..

[5]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[6]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[7]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[8]  Timothy M. Gardner,et al.  THE RELATIONSHIP BETWEEN HR PRACTICES AND FIRM PERFORMANCE: EXAMINING CAUSAL ORDER , 2005 .

[9]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[10]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[11]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[12]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[13]  Detmar W. Straub,et al.  Validating Instruments in MIS Research , 1989, MIS Q..

[14]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[15]  Juani Swart,et al.  Understanding the people and performance link: Unlocking the black box , 2003 .

[16]  Kenneth A. Bollen,et al.  Structural Equations with Latent Variables , 1989 .

[17]  I. Ajzen The theory of planned behavior , 1991 .

[18]  Alessandro Acquisti,et al.  Nudging Privacy: The Behavioral Economics of Personal Information , 2009, IEEE Security & Privacy.

[19]  Rolph E. Anderson,et al.  Multivariate Data Analysis with Readings , 1979 .

[20]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[21]  E. B. Andersen,et al.  Modern factor analysis , 1961 .

[22]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[23]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[24]  David J. Phillips Privacy policy and PETs , 2001, New Media Soc..

[25]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[26]  J. Nunnally,et al.  Psychometric Theory: NY. , 1978 .

[27]  Paul A. Pavlou,et al.  Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..

[28]  R. Vallerand Toward A Hierarchical Model of Intrinsic and Extrinsic Motivation , 1997 .

[29]  M. Hill,et al.  Consumer privacy and the Internet in Europe: a view from Germany , 2003 .

[30]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[31]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[32]  S. E. Kruck,et al.  Protecting personal privacy on the Internet , 2002, Inf. Manag. Comput. Secur..

[33]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[34]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[35]  Hichang Cho,et al.  A multinational study on online privacy: global concerns and local responses , 2009, New Media Soc..

[36]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[37]  Jakob B. Madsen Book review: Basic Econometrics, Damodar N. Gujarati, McGraw-Hill, New York, 1995 , 1998 .

[38]  L. Cronbach Coefficient alpha and the internal structure of tests , 1951 .

[39]  Vasilios Katos,et al.  An Integrated Model for Online Transactuions: Methodological Issues and Challenges , 2010 .

[40]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[41]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[42]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[43]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[44]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[45]  Shirley Atkinson,et al.  Improving protection mechanisms by understanding online risk , 2007, Inf. Manag. Comput. Secur..

[46]  Vincent S. Lai,et al.  Literature derived reference models for the adoption of online shopping , 2005, Inf. Manag..

[47]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[48]  David Gefen,et al.  Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .

[49]  H. Harman Modern factor analysis , 1961 .