2,223
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Adopting information systems at work: a longitudinal examination of trust dynamics, antecedents, and outcomes

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 1096-1128 | Received 15 Jul 2022, Accepted 03 Mar 2023, Published online: 27 Apr 2023

References

  • Acemyan, C. Z., and P. Kortum. 2012. “The Relationship Between Trust and Usability in Systems.” Proceedings of the Human Factors and Ergonomics Society, 1842–1846. doi:10.1177/1071181312561371.
  • Ashraf, M., J. Ahmad, W. Sharif, A. A. Raza, M. Salman Shabbir, M. Abbas, and R. Thurasamy. 2020. “The Role of Continuous Trust in Usage of Online Product Recommendations.” Online Information Review 44 (4): 745–766. doi:10.1108/OIR-05-2018-0156.
  • Audrey Korsgaard, M. 2018. “Reciprocal Trust. A Self-Reinforcing Dynamic Process.” In The Routledge Companion to Trust. 1st ed., edited by R. H. Searle, A.-M. I. Nienaber, and S. B. Sitkin, 14–18. London: Routledge.
  • Audrey Korsgaard, M., J. Kautz, P. Bliese, K. Samson, and P. Kostyszyn. 2018. “Conceptualising Time as a Level of Analysis: New Directions in the Analysis of Trust Dynamics.” Journal of Trust Research 8 (2): 142–165. doi:10.1080/21515581.2018.1516557.
  • Bahmanziari, T., M. Pearson, and L. Crosby. 2003. “Is Trust Important in Technology Adoption? A Policy Capturing Approach.” Journal of Computer Information Systems 43 (4): 46–54. doi:10.1080/08874417.2003.11647533.
  • Bakker, A. B., and E. Demerouti. 2007. “The job Demands-Resources Model: State of the Art.” Journal of Managerial Psychology 22 (3): 309–328. doi:10.1108/02683940710733115.
  • Baroudi, J. J., and W. J. Orlikowski. 1988. “A Short-Form Measure of User Information Satisfaction: A Psychometric Evaluation and Notes on Use.” Journal of Management Information Systems 4 (4): 44–59. doi:10.1080/07421222.1988.11517807.
  • Barry, A. E. 2005. “How Attrition Impacts the Internal and External Validity of Longitudinal Research.” Journal of School Health 75 (7): 267–270. doi:10.1111/j.1746-1561.2005.00035.x.
  • Beldad, A., M. de Jong, and M. Steehouder. 2010. “How Shall I Trust the Faceless and the Intangible? A Literature Review on the Antecedents of Online Trust.” Computers in Human Behavior 26 (5): 857–869. doi:10.1016/j.chb.2010.03.013.
  • Bentler, P. M. 1990. “Comparative fit Indexes in Structural Models.” Psychological Bulletin 107 (2): 238–246. doi:10.1037/0033-2909.107.2.238.
  • Bentler, P. M., and D. G. Bonett. 1980. “Significance Tests and Goodness of fit in the Analysis of Covariance Structures.” Psychological Bulletin 88 (3): 588–606. doi:10.1037/0033-2909.88.3.588.
  • Biesanz, J. C., N. Deeb-Sossa, A. A. Papadakis, K. A. Bollen, and P. J. Curran. 2004. “The Role of Coding Time in Estimating and Interpreting Growth Curve Models.” Psychological Methods 9 (1): 30–52. doi:10.1037/1082-989X.9.1.30.
  • Bijlsma, K., and P. Koopman. 2003. “Introduction: Trust Within Organisations.” Personnel Review 32 (5): 543–555. doi:10.1108/00483480310488324.
  • Bollen, K. A. 1989. “A New Incremental fit Index for General Structural Equation Models.” Sociological Methods & Research 17 (3): 303–316. doi:10.1177/0049124189017003004.
  • Brauner, P., R. Philipsen, A. Calero Valdez, and M. Ziefle. 2019. “What Happens When Decision Support Systems Fail? The Importance of Usability on Performance in Erroneous Systems.” Behaviour & Information Technology 38 (12): 1225–1242. doi:10.1080/0144929X.2019.1581258.
  • Bravo, E. R., M. Santana, and J. Rodon. 2015. “Information Systems and Performance: The Role of Technology, the Task and the Individual.” Behaviour & Information Technology 34 (3): 247–260. doi:10.1080/0144929X.2014.934287.
  • Bresnen, M., A. Goussevskaia, and J. Swan. 2005. “Organizational Routines, Situated Learning and Processes of Change in Project-Based Organizations.” Project Management Journal 36 (3): 27–41. doi:10.1177/875697280503600304.
  • Buurman, M., J. Delfgaauw, R. Dur, and S. van den Bossche. 2012. “Public Sector Employees: Risk Averse and Altruistic?” Journal of Economic Behavior & Organization 83 (3): 279–291. doi:10.1016/j.jebo.2012.06.003.
  • Cabiddu, F., L. Moi, G. Patriotta, and D. G. Allen. 2022. “Why Do Users Trust Algorithms? A Review and Conceptualization of Initial Trust and Trust Over Time.” European Management Journal. doi:10.1016/j.emj.2022.06.001.
  • Campbell, R. H., and M. Grimshaw. 2016. “User Resistance to Information System Implementations: A Dual-Mode Processing Perspective.” Information Systems Management 33 (2): 179–195. doi:10.1080/10580530.2016.1155951.
  • Carlsson, F., D. Daruvala, and H. Jaldell. 2012. “Do Administrators Have the Same Priorities for Risk Reductions as the General Public?” Journal of Risk and Uncertainty 45 (1): 79–95. doi:10.1007/s11166-012-9147-3.
  • Cavanaugh, M. A., W. R. Boswell, M. Roehling, and J. W. Boudreau. 2000. “An Empirical Examination of Self-Reported Work Stress among U.S. Managers.” Journal of Applied Psychology 85 (1): 65–74. doi:10.1037/0021-9010.85.1.65.
  • Chang, L. J., B. B. Doll, M. van ‘t Wout, M. J. Frank, and A. G. Sanfey. 2010. “Seeing is Believing: Trustworthiness as a Dynamic Belief.” Cognitive Psychology 61 (2): 87–105. doi:10.1016/j.cogpsych.2010.03.001.
  • Chasin, F., D. M. Riehle, and M. Rosemann. 2019. “Trust Management – an Information Systems Perspective.” Proceedings of the 27th European Conference on Information Systems, 1–13, Stockholm, Sweden.
  • Chen, H., R. H. L. Chiang, and V. C. Storey. 2012. “Business Intelligence and Analytics: From Big Data to Big Impact.” MIS Quarterly 36 (4): 1165–1188. doi:10.2307/41703503.
  • Chen, G., and R. J. Klimoski. 2003. “The Impact of Expectations on Newcomer Performance in Teams as Mediated by Work Characteristics, Social Exchanges, and Empowerment.” Academy of Management Journal 46 (5): 591–607. doi:10.2307/30040651.
  • Cheung, C. M. K., and M. K. O. Lee. 2006. “Understanding Consumer Trust in Internet Shopping: A Multidisciplinary Approach.” Journal of the American Society for Information Science and Technology 57 (4): 479–492. doi:10.1002/asi.20312.
  • Cheung, G. W., and R. B. Rensvold. 2002. “Evaluating Goodness-of-fit Indexes for Testing Measurement Invariance.” Structural Equation Modeling: A Multidisciplinary Journal 9 (2): 233–255. doi:10.1207/S15328007SEM0902_5.
  • Costante, E., J. den Hartog, and M. Petkovic. 2011. “Online Trust Perception: What Really Matters.” In Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST ‘11), 52–59. doi:10.1109/STAST.2011.6059256.
  • Crisp, C. B., and S. L. Jarvenpaa. 2013. “Swift Trust in Global Virtual Teams: Trusting Beliefs and Normative Actions.” Journal of Personnel Psychology 12 (1): 45–56. doi:10.1027/1866-5888/a000075.
  • Cyr, D. 2008. “Modeling web Site Design Across Cultures: Relationships to Trust, Satisfaction, and e-Loyalty.” Journal of Management Information Systems 24 (4): 47–72. doi:10.2753/MIS0742-1222240402.
  • Davison, R. M., and M. G. Martinsons. 2016. “Context is King! Considering Particularism in Research Design and Reporting.” Journal of Information Technology 31 (3): 241–249. doi:10.1057/jit.2015.19.
  • de Jonge, J., and C. Dormann. 2006. “Stressors, Resources, and Strain at Work: A Longitudinal Test of the Triple-Match Principle.” Journal of Applied Psychology 91 (6): 1359–1374. doi:10.1037/0021-9010.91.5.1359.
  • DeLone, W. H., and E. R. McLean. 2003. “The DeLone and McLean Model of Information Systems Success: A Ten-Year Update.” Journal of Management Information Systems 19 (4): 9–30. doi:10.1080/07421222.2003.11045748.
  • de Rijk, A. E., P. M. le Blanc, W. B. Schaufeli, and J. de Jonge. 1998. “Active Coping and Need for Control as Moderators of the Job Demand-Control Model: Effects on Burnout.” Journal of Occupational and Organizational Psychology 71 (1): 1–18. doi:10.1111/j.2044-8325.1998.tb00658.x.
  • Dietz, G., and D. N. den Hartog. 2006. “Measuring Trust Inside Organisations.” Personnel Review 35 (5): 557–588. doi:10.1108/00483480610682299.
  • Eisinga, R., M. te Grotenhuis, and B. Pelzer. 2013. “The Reliability of a Two-Item Scale: Pearson, Cronbach, or Spearman-Brown?” International Journal of Public Health 58 (4): 637–642. doi:10.1007/s00038-012-0416-3.
  • Emad, G. R. 2010. “Introduction of Technology into Workplace and the Need for Change in Pedagogy.” Procedia Social and Behavioral Sciences 2 (2): 875–879. doi:10.1016/j.sbspro.2010.03.119.
  • Enders, C. K., and D. L. Bandalos. 2001. “The Relative Performance of Full Information Maximum Likelihood Estimation for Missing Data in Structural Equation Models.” Structural Equation Modeling 8 (3): 430–457. doi:10.1207/S15328007SEM0803_5.
  • Etezadi-Amoli, J., and A. F. Farhoomand. 1996. “A Structural Model of End User Computing Satisfaction and User Performance.” Information & Management 30 (2): 65–73. doi:10.1016/0378-7206(95)00052-6.
  • Fogg, B. J., and H. Tseng. 1999. “The Elements of Computer Credibility.” In CHI ‘99: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 80–87. doi:10.1145/302979.303001.
  • Fornell, C., and D. F. Larcker. 1981. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.” Journal of Marketing Research 18 (1): 39. doi:10.2307/3151312.
  • Fulmer, C. A., and K. Dirks. 2018. “Multilevel Trust: A Theoretical and Practical Imperative.” Journal of Trust Research 8 (2): 137–141. doi:10.1080/21515581.2018.1531657.
  • Galambos, N. L., E. T. Barker, and H. J. Krahn. 2006. “Depression, Self-Esteem, and Anger in Emerging Adulthood: Seven-Year Trajectories.” Developmental Psychology 42 (2): 350–365. doi:10.1037/0012-1649.42.2.350.
  • Gefen, D. 2002. “Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems 33 (3): 38–53. doi:10.1145/569905.569910.
  • Gefen, D., I. Benbasat, and P. A. Pavlou. 2008. “A Research Agenda for Trust in Online Environments.” Journal of Management Information Systems 24 (4): 275–286. doi:10.2753/MIS0742-1222240411.
  • Gefen, D., E. Karahanna, and D. W. Straub. 2003. “Trust and TAM in Online Shopping: An Integrated Model.” MIS Quarterly 27 (1): 51–90. doi:10.2307/30036519.
  • Gill, H., K. Boies, J. E. Finegan, and J. McNally. 2005. “Antecedents of Trust: Establishing a Boundary Condition for the Relation Between Propensity to Trust and Intention to Trust.” Journal of Business and Psychology 19 (3): 287–302. doi:10.1007/s10869-004-2229-8.
  • Glikson, E., and A. W. Woolley. 2020. “Human Trust in Artificial Intelligence: Review of Empirical Research.” Academy of Management Annals 14 (2): 627–660. doi:10.5465/annals.2018.0057.
  • Govindan, K., and P. Mohapatra. 2012. “Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey.” IEEE Communications Surveys & Tutorials 14 (2): 279–298. doi:10.1109/SURV.2011.042711.00083.
  • Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson. 2010. Multivariate Data Analysis. 7th ed. New York: Pearson Prentice Hall.
  • Hair, J. F., G. T. M. Hult, C. M. Ringle, and M. Sarstedt. 2014. A Primer on Partial Least Squares Structural Equation Modelling (PLS-SEM). Thousand Oaks, CA: SAGE Publications.
  • Hertel, G., U. Konradt, and B. Orlikowski. 2004. “Managing Distance by Interdependence: Goal Setting, Task Interdependence, and Team-Based Rewards in Virtual Teams.” European Journal of Work and Organizational Psychology 13 (1): 1–28. doi:10.1080/13594320344000228.
  • Hertel, G., S. M. Meeßen, D. M. Riehle, M. T. Thielsch, C. Nohe, and J. Becker. 2019. “Directed Forgetting in Organisations: The Positive Effects of Decision Support Systems on Mental Resources and Well-Being.” Ergonomics 62 (5): 597–611. doi:10.1080/00140139.2019.1574361.
  • Hoehle, H., S. Huff, and S. Goode. 2012. “The Role of Continuous Trust in Information Systems Continuance.” Journal of Computer Information Systems 52 (4): 1–9. doi:10.1080/08874417.2012.11645571.
  • Hoff, K. A., and M. Bashir. 2015. “Trust in Automation: Integrating Empirical Evidence on Factors That Influence Trust.” Human Factors 57 (3): 407–434. doi:10.1177/0018720814547570.
  • Homburg, C., J. Wieseke, and C. Kuehnl. 2010. “Social Influence on Salespeople’s Adoption of Sales Technology: A Multilevel Analysis.” Journal of the Academy of Marketing Science 38 (2): 159–168. doi:10.1007/s11747-009-0157-x.
  • Hu, W.-L., K. Akash, T. Reid, and N. Jain. 2019. “Computational Modeling of the Dynamics of Human Trust During Human–Machine Interactions.” IEEE Transactions on Human-Machine Systems 49 (6): 485–497. doi:10.1109/THMS.2018.2874188.
  • Kappelman, L., V. Johnson, C. Maurer, E. McLean, R. Torres, A. David, and Q. Nguyen. 2018. “The 2017 SIM IT Issues and Trends Study.” MIS Quarterly Executive 17 (1): 53–88.
  • Kassim, E. S., S. F. A. K. Jailani, H. Hairuddin, and N. H. Zamzuri. 2012. “Information System Acceptance and User Satisfaction: The Mediating Role of Trust.” Procedia – Social and Behavioral Sciences 57: 412–418. doi:10.1016/j.sbspro.2012.09.1205.
  • Kim, N., B. Koo, J. Yoon, and K. Cho. 2016. “Understanding the Formation of User’s First Impression on an Interface Design from a Neurophysiological Perspective-EEG Pilot Study.” In HCIK '16: Proceedings of HCI Korea, 139–145. doi:10.17210/hcik.2016.01.139.
  • Kim, H.-W., and S. L. Pan. 2006. “Towards a Process Model of Information Systems Implementation: The Case of Customer Relationship Management (CRM).” ACM SIGMIS Database 37 (1): 59–76. doi:10.1145/1120501.1120506.
  • Körner, A., M. Geyer, M. Roth, M. Drapeau, G. Schmutzer, C. Albani, S. Schumann, and E. Brähler. 2008. “Persönlichkeitsdiagnostik mit dem NEO-Fünf-Faktoren-Inventar: Die 30-Item-Kurzversion (NEO-FFI-30).” PPmP: Psychotherapie Psychosomatik Medizinische Psychologie 58: 238–245. doi:10.1055/s-2007-986199.
  • Korpelainen, E., and M. Kira. 2013. “Systems Approach for Analysing Problems in IT System Adoption at Work.” Behaviour & Information Technology 32 (3): 247–262. doi:10.1080/0144929X.2011.624638.
  • Lance, C. E., R. J. Vandenberg, and R. M. Self. 2000. “Latent Growth Models of Individual Change: The Case of Newcomer Adjustment.” Organizational Behavior and Human Decision Processes 83 (1): 107–140. doi:10.1006/obhd.2000.2904.
  • Lankton, N. K., D. H. McKnight, and J. Tripp. 2015. “Technology, Humanness, and Trust: Rethinking Trust in Technology.” Journal of the Association for Information Systems 16 (10): 880–918. doi:10.17705/1jais.00411.
  • Lee, J. D., and J. Gao. 2005. “Trust, Information Technology, and Cooperation in Supply Chains.” Supply Chain Forum: International Journal 6 (2): 82–89. doi:10.1080/16258312.2005.11517150.
  • Lee, J. D., and K. A. See. 2004. “Trust in Automation: Designing for Appropriate Reliance.” Human Factors 46 (1): 50–80. doi:10.1518/hfes.46.1.50.30392.
  • Lewicki, R. J., and C. Brinsfield. 2017. “Trust Repair.” Annual Review of Organizational Psychology and Organizational Behavior 4: 287–313. doi:10.1146/annurev-orgpsych-032516-113147.
  • Lewicki, R. J., E. C. Tomlinson, and N. Gillespie. 2006. “Models of Interpersonal Trust Development: Theoretical Approaches, Empirical Evidence, and Future Directions.” Journal of Management 32 (6): 991–1022. doi:10.1177/0149206306294405.
  • Lewis, J. R., B. S. Utesch, and D. E. Maher. 2013. “UMUX-LITE: When There’s No Time for the SUS.” In CHI’13: Proceedings of the SIGHI Conference on Human Factors in Computing Systems, 2099–2102. doi:10.1145/2470654.2481287.
  • Li, X., T. J. Hess, and J. S. Valacich. 2008. “Why Do We Trust New Technology? A Study of Initial Trust Formation with Organizational Information Systems.” The Journal of Strategic Information Systems 17 (1): 39–71. doi:10.1016/j.jsis.2008.01.001.
  • Lin, J., B. Wang, N. Wang, and Y. Lu. 2014. “Understanding the Evolution of Consumer Trust in Mobile Commerce: A Longitudinal Study.” Information Technology and Management 15 (1): 37–49. doi:10.1007/s10799-013-0172-y.
  • Lindgaard, G., C. Dudek, D. Sen, L. Sumegi, and P. Noonan. 2011. “An Exploration of Relations Between Visual Appeal, Trustworthiness and Perceived Usability of Homepages.” ACM Transactions on Computer-Human Interaction 18 (1). doi:10.1145/1959022.1959023.
  • Lindkvist, L., M. Bengtsson, D. M. Svensson, and L. Wahlstedt. 2017. “Replacing Old Routines: How Ericsson Software Developers and Managers Learned to Become Agile.” Industrial and Corporate Change 26 (4): 571–591. doi:10.1093/icc/dtw038.
  • Lippert, S. K. 2007. “Investigating Postadoption Utilization: An Examination into the Role of Interorganizational and Technology Trust.” IEEE Transactions on Engineering Management 54 (3): 468–483. doi:10.1109/TEM.2007.900792.
  • Lippert, S. K., and M. Davis. 2006. “A Conceptual Model Integrating Trust into Planned Change Activities to Enhance Technology Adoption Behavior.” Journal of Information Science 32 (5): 434–448. doi:10.1177/0165551506066042.
  • Lippert, S. K., and P. M. Swiercz. 2005. “Human Resource Information Systems (HRIS) and Technology Trust.” Journal of Information Science 31 (5): 340–353. doi:10.1177/0165551505055399.
  • Little, R. J. A. 1988. “A Test of Missing Completely at Random for Multivariate Data with Missing Values.” Journal of the American Statistical Association 83 (404): 1198–1202. doi:10.1080/01621459.1988.10478722.
  • Lu, Y., S. Yang, P. Y. K. Chau, and Y. Cao. 2011. “Dynamics Between the Trust Transfer Process and Intention to use Mobile Payment Services: A Cross-Environment Perspective.” Information & Management 48 (8): 393–403. doi:10.1016/j.im.2011.09.006.
  • MacKenzie, S. B., and P. M. Podsakoff. 2012. “Common Method Bias in Marketing: Causes, Mechanisms, and Procedural Remedies.” Journal of Retailing 88 (4): 542–555. doi:10.1016/j.jretai.2012.08.001.
  • Mayer, R. C., J. H. Davis, and F. D. Schoorman. 1995. “An Integrative Model of Organizational Trust.” Academy of Management Review 20 (3): 709–734. doi:10.5465/amr.1995.9508080335.
  • Mazzola, J. J., and R. Disselhorst. 2019. “Should We be ‘Challenging’ Employees?: A Critical Review and Meta-Analysis of the Challenge-Hindrance Model of Stress.” Journal of Organizational Behavior 40 (8): 949–961. doi:10.1002/job.2412.
  • McClelland, M. M., A. C. Acock, and F. J. Morrison. 2006. “The Impact of Kindergarten Learning-Related Skills on Academic Trajectories at the End of Elementary School.” Early Childhood Research Quarterly 21 (4): 471–490. doi:10.1016/j.ecresq.2006.09.003.
  • McKnight, D. H. 2005. “Trust in Information Technology.” In The Blackwell Encyclopedia of Management, edited by G. B. Davis, 329–331. Malden, MA: Blackwell.
  • McKnight, D. H., M. Carter, J. B. Thatcher, and P. F. Clay. 2011. “Trust in a Specific Technology: An Investigation of Its Components and Measures.” ACM Transactions on Management Information Systems 2 (2): 1–25. doi:10.1145/1985347.1985353.
  • McKnight, D. H., V. Choudhury, and C. Kacmar. 2002. “The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: A Trust Building Model.” The Journal of Strategic Information Systems 11: 297–323. doi:10.1016/S0963-8687(02)00020-3.
  • McKnight, D. H., L. L. Cummings, and N. L. Chervany. 1998. “Initial Trust Formation in New Organizational Relationships.” The Academy of Management Review 23 (3): 473–490. doi:10.5465/amr.1998.926622.
  • Meeßen, S. M., M. T. Thielsch, and G. Hertel. 2020. “Trust in Management Information Systems (MIS): A Theoretical Model.” Zeitschrift Für Arbeits- Und Organisationspsychologie 64 (1): 6–16. doi:10.1026/0932-4089/a000306.
  • Meeßen, S. M., M. T. Thielsch, D. M. Riehle, and G. Hertel. 2020. “Trust is Essential: Positive Effects of Information Systems on Users’ Memory Require Trust in the System.” Ergonomics 63 (7): 909–926. doi:10.1080/00140139.2020.1758797.
  • Mortensen, C. R., and R. B. Cialdini. 2010. “Full-Cycle Social Psychology for Theory and Application.” Social and Personality Psychology Compass 4 (1): 53–63. doi:10.1111/j.1751-9004.2009.00239.x.
  • Mou, J., D. H. Shin, and J. Cohen. 2017. “Understanding Trust and Perceived Usefulness in the Consumer Acceptance of an E-Service: A Longitudinal Investigation.” Behaviour & Information Technology 36 (2): 125–139. doi:10.1080/0144929X.2016.1203024.
  • Muir, B. M. 1994. “Trust in Automation: Part I. Theoretical Issues in the Study of Trust and Human Intervention in Automated Systems.” Ergonomics 37 (11): 1905–1922. doi:10.1080/00140139408964957.
  • Müller, L. S., S. M. Meeßen, M. T. Thielsch, C. Nohe, D. M. Riehle, and G. Hertel. 2020. “Do Not Disturb!: Trust in Decision Support Systems Improves Work Outcomes Under Certain Conditions.” In MuC’20: Proceedings of the Conference on Mensch Und Computer, 229–237. doi:10.1145/3404983.3405515.
  • Neyer, F. J., J. Felber, and C. Gebhardt. 2012. “Entwicklung und Validierung einer Kurzskala zur Erfassung von Technikbereitschaft.” Diagnostica 58 (2): 87–99. doi:10.1026/0012-1924/a000067.
  • O’Brien, J. A., and G. M. Marakas. 2010. Management Information Systems. 10th ed. New York: McGraw-Hill/Irwin.
  • Pavlou, P. A., and D. Gefen. 2004. “Building Effective Online Marketplaces with Institution-Based Trust.” Information Systems Research 15 (1): 37–59. doi:10.1287/isre.1040.0015.
  • Petter, S., W. DeLone, and E. McLean. 2008. “Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships.” European Journal of Information Systems 17 (3): 236–263. doi:10.1057/ejis.2008.15.
  • Ployhart, R. E., and R. J. Vandenberg. 2010. “Longitudinal Research: The Theory, Design, and Analysis of Change.” Journal of Management 36 (1): 94–120. doi:10.1177/0149206309352110.
  • Prat, N., and S. Madnick. 2008. “Measuring Data Believability: A Provenance Approach.” In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 393. doi:10.1109/HICSS.2008.243.
  • Putnick, D. L., and M. H. Bornstein. 2016. “Measurement Invariance Conventions and Reporting: The State of the Art and Future Directions for Psychological Research.” Developmental Review 41: 71–90. doi:10.1016/j.dr.2016.06.004.
  • Rainer, R. K., and B. Prince. 2021. Introduction to Information Systems. Hoboken, NJ: John Wiley & Sons.
  • Rousseau, D. M., S. B. Sitkin, R. S. Burt, and C. Camerer. 1998. “Not so Different After all: A Cross-Discipline View of Trust.” The Academy of Management Review 23 (3): 393–404. doi:10.5465/AMR.1998.926617.
  • Sasse, M. A. 2005. “Usability and Trust in Information Systems.” In Trust and Crime in Information Societies, edited by R. Mansell and B. Collins, 319–348. Cheltenham: Edward Elgar.
  • Scheer, A. W. 2015. Whitepaper - Hochschule 4.0. https://www.researchgate.net/publication/281116948_Whitepaper_-_Hochschule_40.
  • Schoorman, F. D., R. C. Mayer, and J. H. Davis. 2007. “An Integrative Model of Organizational Trust: Past, Present, and Future.” The Academy of Management Review 32 (2): 344–354. doi:10.5465/amr.2007.24348410.
  • Seckler, M., K. Opwis, and A. N. Tuch. 2015. “Linking Objective Design Factors with Subjective Aesthetics: An Experimental Study on How Structure and Color of Websites Affect the Facets of Users’ Visual Aesthetic Perception.” Computers in Human Behavior 49: 375–389. doi:10.1016/j.chb.2015.02.056.
  • Sharma, S. K., and M. Sharma. 2019. “Examining the Role of Trust and Quality Dimensions in the Actual Usage of Mobile Banking Services: An Empirical Investigation.” International Journal of Information Management 44: 65–75. doi:10.1016/j.ijinfomgt.2018.09.013.
  • Shi, S., and W. S. Chow. 2015. “Trust Development and Transfer in Social Commerce: Prior Experience as Moderator.” Industrial Management & Data Systems 115 (7): 1182–1203. doi:10.1108/IMDS-01-2015-0019.
  • Shin, D. 2020. “How Do Users Interact with Algorithm Recommender Systems? The Interaction of Users, Algorithms, and Performance.” Computers in Human Behavior 109: 106344. doi:10.1016/j.chb.2020.106344.
  • Shin, D. 2021. “The Effects of Explainability and Causability on Perception, Trust, and Acceptance: Implications for Explainable AI.” International Journal of Human Computer Studies 146. doi:10.1016/j.ijhcs.2020.102551.
  • Shin, D. 2022. “Expanding the Role of Trust in the Experience of Algorithmic Journalism: User Sensemaking of Algorithmic Heuristics in Korean Users.” Journalism Practice 16 (6): 1168–1191. doi:10.1080/17512786.2020.1841018.
  • Shin, D. H., S. Lee, and Y. Hwang. 2017. “How Do Credibility and Utility Play in the User Experience of Health Informatics Services?” Computers in Human Behavior 67: 292–302. doi:10.1016/j.chb.2016.11.007.
  • Söllner, M., and P. A. Pavlou. 2016. “A Longitudinal Perspective on Trust in IT Artefacts.” In 24th European Conference on Information Systems (ECIS). Istanbul, Turkey.
  • Stanton, J. M., W. K. Balzer, P. C. Smith, L. F. Parra, and G. Ironson. 2001. “A General Measure of Work Stress: The Stress in General Scale.” Educational and Psychological Measurement 61 (5): 866–888. doi:10.1177/00131640121971455.
  • Steiger, J. H. 1990. “Structural Model Evaluation and Modification: An Interval Estimation Approach.” Multivariate Behavioral Research 25 (2): 173–180. doi:10.1207/s15327906mbr2502_4.
  • Stone, R. W., D. J. Good, and L. Baker-Eveleth. 2007. “The Impact of Information Technology on Individual and Firm Marketing Performance.” Behaviour and Information Technology 26 (6): 465–482. doi:10.1080/01449290600571610.
  • Streiner, D. L. 2003. “Starting at the Beginning: An Introduction to Coefficient Alpha and Internal Consistency.” Journal of Personality Assessment 80 (1): 99–103. doi:10.1207/S15327752JPA8001_18.
  • Suh, B., and I. Han. 2002. “Effect of Trust on Customer Acceptance of Internet Banking.” Electronic Commerce Research and Applications 1 (3–4): 247–263. doi:10.1016/S1567-4223(02)00017-0.
  • Tam, C., A. Loureiro, and T. Oliveira. 2019. “The Individual Performance Outcome Behind E-Commerce: Integrating Information Systems Success and Overall Trust.” Internet Research 30 (2): 439–462. doi:10.1108/INTR-06-2018-0262.
  • Thatcher, J. B., D. H. McKnight, E. W. Baker, R. E. Arsal, and N. H. Roberts. 2011. “The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems.” IEEE Transactions on Engineering Management 58 (1): 56–70. doi:10.1109/TEM.2009.2028320.
  • Thielsch, M. T., and G. Hirschfeld. 2019. “Facets of Website Content.” Human-Computer Interaction 34 (4): 279–327. doi:10.1080/07370024.2017.1421954.
  • Thielsch, M. T., S. M. Meeßen, and G. Hertel. 2018. “Trust and Distrust in Information Systems at the Workplace.” PeerJ 2018: 9. doi:10.7717/peerj.5483.
  • Turel, O., and D. Gefen. 2013. “The Dual Role of Trust in System Use.” Journal of Computer Information Systems 54 (1): 2–10. doi:10.1080/08874417.2013.11645666.
  • Turetken, O., J. Ondracek, and W. Ijsselsteijn. 2019. “Influential Characteristics of Enterprise Information System User Interfaces.” Journal of Computer Information Systems 59 (3): 243–255. doi:10.1080/08874417.2017.1339367.
  • Vandenberg, R. J., and C. E. Lance. 2000. “A Review and Synthesis of the Measurement Invariance Literature: Suggestions, Practices, and Recommendations for Organizational Research.” Organizational Research Methods 3 (1): 4–70. doi:10.1177/109442810031002.
  • van der Heijden, H., T. Verhagen, and M. Creemers. 2003. “Understanding Online Purchase Intentions: Contributions from Technology and Trust Perspectives.” European Journal of Information Systems 12 (1): 41–48. doi:10.1057/palgrave.ejis.3000445.
  • van der Werff, L., and F. Buckley. 2017. “Getting to Know You: A Longitudinal Examination of Trust Cues and Trust Development During Socialization.” Journal of Management 43 (3): 742–770. doi:10.1177/0149206314543475.
  • Van Der Werff, L.,.A. Legood, F. Buckley, A. Weibel, and D. De Cremer. 2019. “Trust Motivation: The Self-Regulatory Processes Underlying Trust Decisions.” Organizational Psychology Review 9 (2-3): 99–123. doi:10.1177/2041386619873616.
  • Venkatesh, V., and F. D. Davis. 2000. “Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies.” Management Science 46 (2): 186–204. doi:10.1287/mnsc.46.2.186.11926.
  • Venkatesh, V., J. Y. L. Thong, F. K. Y. Chan, P. J.-H. Hu, and S. A. Brown. 2011. “Extending the Two-Stage Information Systems Continuance Model: Incorporating UTAUT Predictors and the Role of Context.” Information Systems Journal 21 (6): 527–555. doi:10.1111/j.1365-2575.2011.00373.x.
  • Wang, S. W., W. Ngamsiriudom, and C. H. Hsieh. 2015. “Trust Disposition, Trust Antecedents, Trust, and Behavioral Intention.” The Service Industries Journal 35 (10): 555–572. doi:10.1080/02642069.2015.1047827.
  • Willett, J. B., and A. G. Sayer. 1994. “Using Covariance Structure Analysis to Detect Correlates and Predictors of Individual Change Over Time.” Psychological Bulletin 116 (2): 363–381. doi:10.1037/0033-2909.116.2.363.
  • Wothke, W. 2000. “Longitudinal and Multi-Group Modeling with Missing Data.” In Modeling Longitudinal and Multilevel Data: Practical Issues, Applied Approaches and Specific Examples, edited by T. D. Little, K. U. Schnabel, and J. Baumert, 219–240. Mahwah, NJ: Lawrence Erlbaum Associates, Inc.
  • Yoon, M., and R. E. Millsap. 2007. “Detecting Violations of Factorial Invariance Using Data-Based Specification Searches: A Monte Carlo Study.” Structural Equation Modeling: A Multidisciplinary Journal 14 (3): 435–463. doi:10.1080/10705510701301677.
  • Yu, P. L., M. S. Balaji, and K. W. Khong. 2015. “Building Trust in Internet Banking: A Trustworthiness Perspective.” Industrial Management & Data Systems 115 (2): 235–252. doi:10.1108/IMDS-09-2014-0262.
  • Zheng, Z., P. A. Pavlou, and B. Gu. 2014. “Latent Growth Modeling for Information Systems: Theoretical Extensions and Practical Applications.” Information Systems Research 25 (3): 547–568. doi:10.1287/isre.2014.0528.