418
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

The Process of Trust Formation in E-Business: Insights from Case Studies of Two Small Firms

&

REFERENCES

  • Aldrich, H. E. and C. M. Fiol (1994). Fools rush in? The institutional context of industry creation. Academy of Management Review 19(4):645–670.
  • Andersen, S. M. and A. H. Schwartz (1992). Intolerance of ambiguity and depression: A cognitive vulnerability factor linked to hopelessness. Social Cognition 10(3): 271–298.
  • Argote, L., B. McEvily, and R. Reagans (2003). Managing knowledge in organizations: An integrative framework and review of emerging themes. Management Science 49(4): 571–582.
  • Attewell, P. (1992). Technology diffusion and organisational learning: The case of business computing. Organization Science 3(1): 1–19.
  • Bagozzi, R. P. and E. A. Edwards (2000). Goal-striving and the implementation of goal intentions in the regulation of body weight. Psychology and Health 15(2):255–270.
  • Bagozzi, R. P. and S. K. Kimmel (1995). A comparison of leading theories for the prediction of goal-directed behaviors. British Journal of Social Psychology 34(4):437–461.
  • Bagozzi, R. P. and P. R. Warshaw (1990). Trying to consume. Journal of Consumer Research 17(2):127–140.
  • Banerjee, P., K. K. Wei, and L. Ma (2012). Role of trialability in B2B e-business adoption: Theoretical insights from two case studies. Behaviour & Information Technology 31(9): 815–827.
  • Banerjee, P. K. and L. Ma (2012). Routinisation of B2B e-commerce by small firms: A process perspective. Information Systems Frontiers 14(5): 1033–1046.
  • Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly 25(3): 351–370.
  • Bhattacherjee, A. and G. Premkumar (2004). Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test. MIS Quarterly 28(2): 229–254.
  • Chen, W. and R. Hirschheim (2004). A paradigmatic and methodological examination of information systems research from 1991 to 2001. Information Systems Journal 14(3): 197–235.
  • Child, J. (2001). Trust: The fundamental bond in global transactions. Organisational Dynamics 29(4): 272–288.
  • Chiles, T. H. and J. F. McMackin (1996). Integrating variable risk preferences, trust, and transaction cost economics. The Academy of Management Review 21(1):73–99.
  • Chwelos, P., I. Benbasat, and A. S. Dexter (2001). Research report: Empirical test of an EDI adoption model. Information Systems Research 12(3): 304–322.
  • Creswell, J. W. (1998). Qualitative inquiry and research design: Choosing among five traditions. Thousand Oaks, CA: SAGE Publications.
  • Cullen, J. B., J. L. Johnson, and T. Sakano (1995). Japanese and local partner commitment to IJVs: Psychological consequences of outcomes and investments in the IJV relationship. Journal of International Business Studies 26(1): 95–115.
  • Doolin, B. (1998). Information technology as disciplinary technology: Being critical in interpretive research on information systems. Journal of Information Technology 13: 301–311.
  • Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review 14(4): 532–550.
  • Gefen, D., Karahanna, E., and Straub, D. W. (2003). Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on Engineering Management 50(3): 307–321.
  • Gill, M. A. and Z. Wu (2001, August). E-markets: Failed business model or barriers to diffusion of innovation? Paper presented at Seventh Americas Conference on Information Systems, Boston, Massachusetts.
  • Glick, W. H., G. P. Huber, H. D. Doty, and K. M. Sutcliffe (1990). Studying changes in organizational design and effectiveness: retrospective event histories and periodic assessment. Organisation Science 1(1): 293–312.
  • Grabner-Kraeuter, S. (2002). The role of consumers’ trust in online shopping. Journal of Business Ethics 39(1/2): 43–50.
  • Grewal, R., J. Comer, and R. Mehta (2001). An investigation into the antecedents of organizational participation in business-to-business electronic markets. Journal of Marketing 65(3): 17–33.
  • Hamel, G. and C. K. Prahalad (1996). Competing in the new economy: Managing out of bounds. Strategic Management Journal 17(3): 237–242.
  • Heide, J. B. and G. John (1992). Do norms matter in marketing relationships? Journal of Marketing 56(2): 32–44.
  • Hirshleifer, J. and J. G. Riley (1979). The analytics of uncertainty and information: An expository survey. Journal of Economic Literature 17(4): 1375–1421.
  • Joshi, A. W. and S. J. Arnold (1997). The impact of buyer dependence on buyer opportunism in buyer–supplier relationships: The moderating role of relational norms. Psychology and Marketing 14(8): 823–845.
  • Kaufmann, P. J. and R. P. Dant (1992). The dimensions of commercial exchange. Marketing Letters 3(2): 171–185.
  • Khalifa, M., P. Banerjee, and L. Ma (2003, January). Strategies for successful deployment of e-markets: Lessons in the china context. Paper presented at the 36th Hawaii International Conference on Computer Systems, Big Island, Hawaii.
  • Kim, K. and B. Prabhakar (2000). Initial trust, perceived risk, and the adoption of internet banking. Paper presented at the Twenty First International Conference on Information Systems, Brisbane, Australia.
  • Klein, H. K and M. D. Myers (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly 23(1): 67–93.
  • Lee, A. S. (1991). Integrating positivist and interpretive approaches to organizational research. Organization Science 2(4): 342–365.
  • Light, B. and A. Papazafeiropoulou (2004, June). Reasons behind ERP package adoption: A diffusion of innovations perspective. Paper presented at European Conference on Information Systems, Turku, Finland.
  • Mathur, A. (1998). Examining trying as a mediator and control as a moderator of intention-behavior relationship. Psychology & Marketing 15(3: 241–259.
  • Mayer, R., J. Davis, and F. Shoorman (1995). An integrative model of organizational trust. The Academy of Management Review 20(3): 709–734.
  • McKnight, D. H. and N. L. Chervany (2002). What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce and Business Media 6(2): 35–59.
  • Miles, M. B. and A. M. Huberman (1994). Qualitative data analysis (2nd ed.). New York: Sage Publications.
  • Mysen, T., G. Svensson, and N. Hogevold (2012). Relationship quality–relationship value and power balance in business relationships: Descriptives and propositions. Journal of Business-to-Business Marketing 19(3): 248–285.
  • Nabeel, A. (2007). Research trilogy into e-commerce adoption in small businesses in New Zealand. Electronic Markets 17(4): 263–285.
  • Nicolaou, A. I. and D. H. McKnight (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information Systems Research 17(4): 332–333.
  • Paulin, M. and J. R. Ferguson (2010). Relational norms in inter-firm exchanges: From transactional cost economics to the service-dominant logic. Journal of Business-to-Business Marketing 17(4): 365–405.
  • Pavlou, P. (2001, August). Integrating trust in electronic commerce with the technology acceptance model: Model development and validation. Paper presented at Seventh AMCIS Proceedings, Boston, Massachusetts.
  • Pavlou, P. A., H. Liang, and Y. Xue (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal–agent perspective. MIS Quarterly 31(1): 105–136.
  • Reimenschneider, C. K. and V. R. McKinney (1999). Assessing the adoption of web-based e-commerce for business. Electronic Markets 9(1/2): 9–13.
  • Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York: The Free Press.
  • Schoder, D. and P. L. Yin (2000). Building firm trust online. Communications of the ACM 43(12): 73–79.
  • Serva, M. A., J. S. Benamati, and M. A. Fuller (2005). Trustworthiness in B2C e-commerce: An examination of alternative models. Database for Advances in Information Systems 36(3): 89–108.
  • Shapiro, S. P. (1987). The social control of impersonal trust. American Journal of Social Psychology 93(3): 623–658.
  • Suchman, M. C. (1995). Managing legitimacy: Strategic and institutional approaches. Academy of Management Review 20(3): 571–610.
  • Tan, Y. H. and W. Thoen (2000); A logical model of trust in electronic commerce. Electronic Markets 10(4): 258–263.
  • Teo, H. H., B. C. Tan, and K. K. Wei (1995, December). Innovation diffusion theory as a predictor of adoption intention for financial EDI. Paper presented at the 16th International Conference on Information Systems, Amsterdam, the Netherlands.
  • Theron, E., N. Terblanche, and C. Boshoff (2011). The antecedents of trust in business-to-business financial services. Journal of Business-to-Business Marketing 18(2): 188–213.
  • Truong, D., T. T. Le, S. Senecal, and S. S. Rao (2012). Electronic marketplace: A distinct platform for business-to-business (b-to-b) procurement. Journal of Business-to-Business Marketing 19(3): 216–247.
  • Verhagen, T., Y. Tan, and S. Meents (2004, June). An empirical exploration of trust and risk associated with purchasing at electronic marketplaces. Paper presented at the 17th Bled e-Commerce Conference-eGlobal, Bled, Slovenia.
  • Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems 4(2): 74–81.
  • Wang, R. and J. Song (2011). Business marketing in China: Review and prospects. Journal of Business-to-Business Marketing 18(1): 1–49.
  • Williamson, O. (1991). Comparative economic organization: The analysis of discrete structural alternatives. Administrative Science Quarterly 36(2):269–296.
  • Yin, R. K. (2003). Case study research-design and methods. Thousand Oaks, CA: SAGE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.