300
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

Development of a Cloud Trust Label: A Delphi Approach

, , &

REFERENCES

  • Ahuja MK. 2002. Women in the information technology profession: a literature review, synthesis and research agenda. Eur J Inf Syst. 11:20–34.
  • Aiken D, Boush DM. 2006. Trustmarks, objective-sources ratings, and implied investments in advertising: investigating online trust and the context-specific nature of Internet signals. J Acad Market Sci. 32:308–323.
  • Aiken D, Osland G, Liu B, Mackoy R. 2003. Developing internet consumer trust: exploring trustmarks as third-party signals. In: Henderson GR, Moore MC, editors. Marketing theory and applications, Vol. 14. Chicago: American Marketing Association; p. 145–146.
  • Barney J, Hansen M. 1994. Trustworthiness as a source of competitive advantage. Strategic Manage J. 15:175–190.
  • Beldad A, De Jong M, Steehouder M. 2010. How shall I trust the faceless and the intangible? A literature review on the antecedents on municipal websites. Govern Inf Quart. 27:238–244.
  • Bell SS, Holbrook MB, Solomon MR. 1991. Combining esthetic and social value to explain preferences for product styles with the incorporation of personality and ensemble effect. J Soc Behav Person. 6:243–273.
  • Bhattacherjee A. 2002. Individual trust in online firms: scale development and initial test. J Manage Inf Syst. 19:211–241.
  • Boyd J. 2003. The rhetorical construction of trust online. Commun Theory. 13:392–410.
  • Chen KC. 2004. Decision support system for tourism development: system dynamics approach. J Comput Inf Syst. 45:104.
  • Cohoon JM, Aspray W. 2006. Women and information technology: research on underrepresentation. Cambridge, MA: The MIT Press.
  • Corbitt B, Thanasankit T, Yi H. 2003. Trust and e-commerce: a study of consumer perceptions. Electron Commerce Res Appl. 2:203–215.
  • Cox DS, Cox AD. 2002. Beyond first impressions: the effects of repeated exposure on consumer liking of visually complex and simple product designs. J Acad Market Sci. 30:119–130.
  • Cyr D, Head M, Larios H. 2010. Colour appeal in website design within and across cultures: a multi-method evaluation. Int J Hum-Comput Stud. 68:1–21.
  • Delbecq AL, Van de Ven AH, Gustafson DH. 1975. Group techniques for program planning: a guide to nominal and Del-phi processes. Scott, Foresman and Co., Glenview, IL. IN Powell, C. (2003). The Delphi technique: myths and realities. J Adv Nurs. 41:376–382.
  • Dutta A, Guo Chao AP, Choudhary A. 2013. Risks in enterprise cloud computing: the perspective of it experts. J Comput Inf Syst. 53:39–48.
  • European Commission. 2014. Potential and impacts of cloud computing services and social network websites. Available from: http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/513546/IPOL-JOIN_ET(2014)513546_EN.pdf
  • Gefen D, Straub DW. 2004. Consumer trust in B2C e-commerce and the importance of social presence: experiments in e-products and e-services. Omega. 32:407–424.
  • Grabner-Krauter S, Kaluscha EA. 2003. Empirical research in on-line trust: a review and critical assessment. Int J Hum-Comput Stud. 58:783–812.
  • Gurhan-Canli Z, Maheswaran D. 2000. Determinants of country-of-origin evaluations. J Consum Res. 27:96–108.
  • Habib SM, Rics S, Muhlhauser M. 2010. Cloud computing landscape and research challenges regarding trust and reputation. In: Ubiquitous intelligence & computing and 7th International Conference on Autonomic & Trusted Computing; p. 410–415. IEEE.
  • Head M, Hassanein K. 2002. Trust in e-commerce: evaluating the impact of third-party seals. Quart J Electron Commerce. 3:307–325.
  • Hwang K, Li D. 2010. Trusted cloud computing with secure resources and data coloring. Internet Comput IEEE. 14:14–22.
  • Kelley PG, Bresee J, Cranor LF, Reeder RW. 2009. A nutrition label for privacy. Symposium on Usable Privacy and Security (SOUPS), Mountain View, CA, July 2009.
  • Ko RK, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang Q, Lee BS. TrustCloud: a framework for accountability and trust in cloud computing. 2011 IEEE World Congress on Services (SERVICES); p. 584–588. IEEE.
  • Krippendorff K. 2004. Content analysis: an introduction to its methodology. 2nd ed. Thousand Oaks, CA: Sage; p. 413.
  • Lee BC, Ang L, Dubelaar C. 2004. Lemons on the web: a signalling approach to the problem of trust in internet commerce. Woolongong, Australia: Department of Economics, University of Wollongong.
  • Lewicki RJ, Bunker BB. 1996. Developing and maintaining trust in work relationships. In: Kramer RM, Tyler TR, editors. Trust in organizations: frontiers of theory and research. London: Sage; p. 114–139.
  • Li YM, Yeh YS. 2010. Increasing trust in mobile commerce through design aesthetics. Comput Hum Behav. 26:673–684.
  • Linstone HA, Turoff M, editors. 1975. The Delphi method. Reading, MA: Addison-Wesley; p. 3–12.
  • Luhmann N. 1979. Trust; and, power: two works by Niklas Luhmann. Chichester: Wiley.
  • Luhmann N. 2000. Familiarity, confidence, trust: problems and alternatives. Trust Making Breaking Cooperative Relat. 6:94–107.
  • Lynn T, Healy P, McClatchey R, Morrison J, Pahl C, Lee B. 2013. The case for cloud service trustmarks and assurance-as-a-service. 3rd International Conference on Cloud Computing and Services Science Closer’13, Aachen, Germany, May 2013.
  • Mayer RC, Davis JH, Schoorman FD. 1995. An integrative model of organizational trust. Acad Manage Rev. 20:709–734.
  • McEvily B, Perrone V, Zaheer A. 2003. Trust as an organizing principle. Org Sci. 14:91–103.
  • McKenna H. 1994. The Delphi technique: a worthwhile approach to nursing? J Adv Nurs. 19:1221–1225.
  • Mcknight DH, Carter M, Thatcher JB, Clay PF. 2011. Trust in a specific technology: an investigation of its components and measures. ACM Trans Manage Inf Syst 2:12.
  • McKnight DH, Cummings LL, Chervany NL. 1998. Initial trust formation in new organizational relationships. Acad Manage Rev. 23:473–490.
  • McKnight DH, Choudhury V, Kacmar C. 2002. The impact of initial consumer trust on intentions to transact with a web site: a trust building model. J Strategic Inf Syst. 11:297–323.
  • McKnight DH, Kacmar CJ, Choudhury V. 2004. Dispositional trust and distrust distinctions in predicting high- and low-risk internet expert advice site perception. e-Serv J. 3:35–55.
  • Mell P, Grance T. 2011. The NIST definition of cloud computing. Gaithersburg, MD: National Institute of Standards and Technology.
  • Metzger MJ, Flanagin AJ. 2013. Trusting expert-versus user-generated ratings online: the role of information volume, valence, and consumer characteristics. Comput Hum Behav. 29:1626–1634.
  • Noor TH, Sheng QZ, Ngu AHH, Alfazi A, Law J. 2013. Cloud armor: a platform credibility-based trust management of cloud services. The 22nd ACM Conference on Information and Knowledge Management, San Francisco, CA, October–November 2013.
  • Herbjørn N, Pederson PE, Thorbjørnsen H. 2005. Intentions to use mobile services: antecedents and cross-service comparisons. J Acad Market Sci. 33:330–346.
  • Okoli C, Pawlowski SD. 2004. The Delphi method as a research tool: an example, design considerations and applications. Inf Manage. 42:15–29.
  • Pavlou PA, Dimoka A. 2006. The nature and role of feedback text comments in online marketplaces: implications for trust building, price premiums, and seller differentiation. Inf Syst Res. 17:392–414.
  • Pavlou PA, Gefen D. 2004. Building effective online market places with institution based trust. Inf Syst Res. 15:37–59.
  • Pavlou PA. 2003. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int J Electron Commerce. 7:101–134.
  • Pearson S. 2011. Toward accountability in the cloud. IEEE Internet Comput. 15:64–69
  • Pengnate S, Antonenko P. 2013. A multimethod evaluation of online trust and its interaction with metacognitive awareness: an emotional design perspective. Int J Hum-Comput Interact. 29:582–593.
  • Pill J. 1971. The Delphi method: substance, context, a critique and an annotated bibliography. Socio-Econ Plann Sci. 5:57–71.
  • Powell C. 2003. The Delphi technique: myths and realities. J Adv Nurs. 41:376–382.
  • Resnick P, Zeckhauser R. 2002. Trust among strangers in Internet transactions: empirical analysis of eBay’s reputation system. Adv Appl Microecon. 11:127–157.
  • Reid S, Kilster H. 2011. Sizing the cloud. Forrester Research Report.
  • Rousseau DM, Sitkin SB, Burt RS, Camerer C. 1998. Not so different after all: a cross-discipline view of trust. Acad Manage Rev. 23:393–404.
  • Rowe E. 1994. Enhancing judgement and decision making: a critical and empirical investigation of the Delphi technique. Unpublished PhD Thesis, University of Western England, Bristol. IN Powell C ( 2003). The Delphi technique: myths and realities. J Adv Nurs. 41:376–382.
  • Sabater J, Sierra C. 2005. Review on computational trust & reputation models. Artif Intell Rev. 24:33–60.
  • Shek SPW, Sia C, Lim KH. 2003. A preliminary assessment of different trust formation models: the effect of third party endorsements on online shopping. Proceedings of the 36th Hawaii International Conference on System Sciences, Big Island, HI, January 2003.
  • Söllner M, Pavlou P, Leimeister JM. 2013. Understanding trust in IT artifacts – a new conceptual approach. Academy of Management Proceedings, Florida, January 2013; p. 11412.
  • Stewart KJ. 2006. Trust transfer on the world wide web. Org Sci. 14:5–17.
  • Treiblmaier H, Pinterits A. 2010. Developing metrics for web sites. J Comput Inf Syst. 50:1.
  • Tuch AN, Bargas-Avila JA, Opwis K. 2010. Symmetry and aesthetics in website design: it’s a man’s business. Comput Hum Behav. 26:1831–1837.
  • Tybout Alice M, Sternthal Brian, Malaviya Prashant, Bakamitsos Georgios A, Park Sebum. 2005. Information accessibility as a moderator of judgments: the role of content versus retrieval ease. J Consum Res. 32:76–85.
  • Van Der Werff L, Lynn T, Xiaong H, Hunt G, Morrison J, Healy P, Corcoran D. 2014. Building trust in the cloud environment – towards a consumer cloud trust label. International Conference on Digital Society, Barcelona, Spain, March 2014.
  • Wang W, Benbasat I. 2008. Attributions of trust in decision support technologies: a study of recommendation agents for e-commerce. J Manage Inf Syst. 24:249–273.
  • Wang YD, Emurian HH. 2005. An overview of online trust: concepts, elements, and implications. Comput Hum Behav. 21:105–125.
  • Ware C. 2012. Information visualization: perception for design. San Francisco, CA: Elsevier.
  • Willis J, Todorov A. 2006. First impressions making up your mind after a 100-ms exposure to a face. Psychol Sci. 17:592–598.
  • Yeoh W, Koronios A. 2010. Critical success factors for business intelligence systems. J Comput Inf Syst. 50:23.
  • Yoon SJ. 2002. The antecedents and consequences of trust in online purchase decisions. J Interact Market. 16:47–63.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.