718
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

“Just how risky is it anyway?” The role of risk perception and trust on click-through intention

&

References

  • Abbasi, A., Zhang, Z., Zimbra, D, Chen, H, & Nunamaker, J. F. Jr. (2010). Detecting fake websites: The contribution of statistical learning theory. MIS Quarterly, 435–461. doi:10.2307/25750686
  • Agarwal, R., Sambamurthy, V., & Stair, R. M. (2000). Research report: The evolving relationship between general and specific computer self-efficacy — An empirical assessment. Information Systems Research, 11(4), 418–430. doi:10.1287/isre.11.4.418.11876
  • Anderson, C., & Agarwal, R., (2010). Practicing Safe Computing: A multimethod empirical examination of home computer user security behavioral intentionst. MIS Quartely, 34(3), 613–643.
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. doi:10.1016/0749-5978(91)90020-T
  • Akhawe, D., & Felt, A. P. (2013). Alice in warningland: A large-scale field study of browser security warning effectiveness. Paper presented at the Usenix Security.
  • Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web, 5(2), 58–71. doi:10.1016/j.websem.2007.03.002
  • Bandura, A. (1998). Health promotion from the perspective of social cognitive theory. Psychology and Health, 13(4), 623–649. doi:10.1080/08870449808407422
  • Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. doi:10.1016/j.dss.2010.01.010
  • Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19(1), 211–241. doi:10.1080/07421222.2002.11045715
  • Briggs, R., & Hollis, N. (1997). Advertising on the web: Is there response before click-through? Journal of Advertising Research, 37(2), 33–46.
  • Chang, C.-M., Hsu, M.-H., & Lee, Y.-J. (2015). Factors influencing knowledge-sharing behavior in virtual communities: A longitudinal investigation. Information Systems Management, 32(4), 331–340. doi:10.1080/10580530.2015.1080002
  • Chen, R., Wang, J., Herath, T., & Rao, H. R. (2011). An investigation of email processing from a risky decision making perspective. Decision Support Systems, 52(1), 73–81. doi:10.1016/j.dss.2011.05.005
  • Chin, W. W. (1998). Commentary: Issues and opinion on structural equation modeling. MIS Quarterly,22(1), vii–xvi.
  • Cho, J., & Lee, J. (2006). An integrated model of risk and risk-reducing strategies. Journal of Business Research, 59(1), 112–120. doi:10.1016/j.jbusres.2005.03.006
  • Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 189–211. doi:10.2307/249688
  • Computer Security Institute. (2011). Computer crime and security survey. 3 April 2015 from http://analytics.informationweek.com/abstract/21/7377/Security/research-2010-2011-csisurvey.html
  • ComputerWorld. (2010). Don’t click that link, but if you do. Retrieved May 25, 2016, from http://www.computerworld.com/article/2468755/microsoft-windows/don-t-click-that-link–but-if-you-do—.html
  • D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98. doi:10.1287/isre.1070.0160
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008
  • DELL. (2015). How to spot a fake website and not get phished Retrieved August 4, 2016, from http://www.dell.com/downloads/ca/support/spot_fake_website_not_get_phished_dell_en.pdf
  • DHS. (2017). Stop.Think.Connect. Homeland Security. Retrieved May 11, 2017, from https://www.dhs.gov/stopthinkconnect
  • Diamantopoulos, A. (2006). The error term in formative measurement models: interpretation and modeling implications. Journal of Modelling in Management, 1(1), 7–17.
  • Dillard, A. J., Ferrer, R. A., Ubel, P. A., & Fagerlin, A. (2012). Risk perception measures’ associations with behavior intentions, affect, and cognition following colon cancer screening messages. Health Psychology, 31(1), 106. doi:10.1037/a0024787
  • Dinev, T. (2006). Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 76–82. doi:10.1145/1164394
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. doi:10.1287/isre.1060.0080
  • Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451–474. doi:10.1016/S1071-5819(03)00111-3
  • Financial Services Rountable. (2011). Malware risks and mitigation report. Retrieved November 25 from http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf.
  • Fukuyama, F. (1995). Trust: The social virtues and the creation of prosperity. New York, NY: Free Press.
  • Furnell, S. (2004). E-commerce security: A question of trust. Computer Fraud & Security, 2004(10), 10–14.
  • Gambetta, D. (Ed.). (2000). Can we trust trust. In Trust: Making and breaking cooperative relations (pp. 213–237). New York, NY: Blackwell.
  • Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56–63. doi:10.1109/MIC.2011.50
  • Gardner, M., & Steinberg, L. (2005). Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: An experimental study. Developmental Psychology, 41(4). doi:10.1037/0012-1649.41.4.625
  • Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725–737. doi:10.1016/S0305-0483(00)00021-9
  • Gefen, D., Benbasat, I., & Pavlou, P. (2008). A research agenda for trust in online environments. Journal of Management Information Systems, 24(4), 275–286. doi:10.2753/MIS0742-1222240411
  • Gefen, D., Rao, V. S., & Tractinsky, N. (2003). The conceptualization of trust, risk and their electronic commerce: The need for clarifications. Paper presented at the System Sciences. Proceedings of the 36th Annual Hawaii international conference on.
  • Gefen, D., & Straub, D. W. (2004). Consumer trust in B2C e-commerce and the importance of social presence: Experiments in e-products and e-services. Omega, 32(6), 407–424. doi:10.1016/j.omega.2004.01.006
  • GO-Gulf. (2015). How people spend their time online Retrieved November 25, 2015, from http://www.go-gulf.com/blog/online-time/
  • Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395–410. doi:10.1109/3468.852434
  • Grazioli, S., & Jarvenpaa, S. L. (2003). Consumer and business deception on the Internet: Content analysis of documentary evidence. International Journal of Electronic Commerce, 7(4), 93–118.
  • Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010). @ spam: The underground on 140 characters or less. Paper presented at the Proceedings of the 17th ACM Conference on Computer And Communications Security.
  • Gupta, A., Su, B.-C., & Walter, Z. (2004). An empirical study of consumer switching from traditional to electronic channels: A purchase-decision process perspective. International Journal of Electronic Commerce, 8(3), 131–161.
  • Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. doi:10.1057/ejis.2009.6
  • Holmes, J. G. (1991). Trust and the appraisal process in close relationships. In W. H. J. D. Perlman (Ed.), Advances in personal relationships: A research annual (Vol. 2, pp. 57–104). Oxford, England: Jessica Kingsley Publishers.
  • Hong, W., Chan, F. K., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2013). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136. doi:10.1287/isre.2013.0501
  • Hosmer, L. T. (1995). Trust: The connecting link between organizational theory and philosophical ethics. Academy of Management Review, 20(2), 379–403. doi:10.5465/amr.1995.9507312923
  • Im, I., Jun, J., Oh, W., & Jeong, S.-O. (2016). Deal-seeking versus brand-seeking: Search behaviors and purchase propensities in sponsored search platforms. MIS Quarterly, 40(1). doi:10.25300/MISQ
  • Jackson, C., & Barth, A. (2008). Forcehttps: Protecting high-security web sites from network attacks. Paper presented at the Proceedings of the 17th International Conference on World Wide Web.
  • Jansen, B. J., Brown, A., & Resnick, M. (2007). Factors relating to the decision to click on a sponsored link. Decision Support Systems, 44(1), 46–59. doi:10.1016/j.dss.2007.02.009
  • Janz, N. K., & Becker, M. H. (1984). The health belief model: A decade later. Health Education & Behavior, 11(1), 1–47.
  • Jianakoplos, N. A., & Bernasek, A. (1998). Are women more risk averse? Economic Inquiry, 36(4), 620–630. doi:10.1111/ecin.1998.36.issue-4
  • Joachims, T., Granka, L., Pan, B., Hembrooke, H., & Gay, G. (2005). Accurately interpreting clickthrough data as implicit feedback. Paper presented at the Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development In Information Retrieval.
  • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3),A544–A549. doi:10.2307/25750691
  • Keil, M., Bernard, C. Y. T., Wei, K.-K., Saarinen, T., Tuunainen, V., & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24(2), 299–325. doi:10.2307/3250940
  • Keller, S., Powell, A., Horstmann, B., Predmore, C., & Crawford, M. (2005). Information security threats and practices in small businesses. Information Systems Management, 22(2), 7–19. doi:10.1201/1078/45099.22.2.20050301/87273.2
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564. doi:10.1016/j.dss.2007.07.001
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information Systems Research, 20(2), 237–257. doi:10.1287/isre.1080.0188
  • Knapp, K. J., & Boulton, W. R. (2006). Cyber-warfare threatens corporations: Expansion into commercial environments. Information Systems Management, 23(2). doi:10.1201/1078.10580530/45925.23.2.20060301/92675.8
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi:10.1287/isre.1040.0032
  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734. doi:10.5465/amr.1995.9508080335
  • McKinney Jr, E. H., & Yoos, C. J. (2010). Information about information: A taxonomy of views. MIS Quarterly, 329–344. doi:10.2307/20721430
  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359. doi:10.1287/isre.13.3.334.81
  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. The Journal of Strategic Information Systems, 11(3–4), 297–323. doi:10.1016/S0963-8687(02)00020-3
  • McKnight, H., & Chervany, N. (2001). What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35–59. doi:10.1080/10864415.2001.11044235
  • McKnight, H., Cummings, L., & Chervany, N. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490. doi:10.5465/amr.1998.926622
  • Moores, T. T., & Chang, -J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 167–180. doi:10.2307/25148722
  • Panzano, P. C., & Billings, R. S. (1997). An organizational-level test of a partially mediated model of risky decision making behavior. Paper presented at the Academy of Management Proceedings. doi:10.5465/ambpp.1997.4984251
  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.
  • Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37–59. doi:10.1287/isre.1040.0015
  • Pew Research. (2015). Americans’ Internet Access: 2000-2015. Retrieved November 25, 2015, from http://www.pewinternet.org/2015/06/26/americans-internet-access-2000-2015/
  • Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597–611. doi:10.1016/j.cose.2011.12.010
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5). doi:10.1037/0021-9010.88.5.879
  • Quelch, J. A., & Klein, L. R. (1996). The Internet and international marketing. Sloan Management Review, 37(3), 60–75.
  • Ratnasingam, P., & Phan, D. D. (2003). Trading partner trust in B2B e-commerce: A case study. Information Systems Management, 20(3), 39–50. doi:10.1201/1078/43205.20.3.20030601/43072.5
  • Reuters. (2014). Cyber crime costs global economy $445 billion a year: Report. Retrieved December 18, 2015, Retrieved from http://www.reuters.com/article/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609#97FYxHC7fv5UKZsz.97
  • Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826. doi:10.1016/j.cose.2009.05.008
  • Richardson, M., Dominowska, E., & Ragno, R. (2007). Predicting clicks: Estimating the click-through rate for new ads. Paper presented at the proceedings of the 16th international conference on World Wide Web.
  • Sasse, M. A., & Kirlappos, I. (2011). Familiarity breeds con-victims: Why we need more effective trust signaling Trust Management V (pp. 9–12): Springer.
  • Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131–136.
  • Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487. doi:10.2307/25750688
  • Sitkin, S. B., & Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. Academy of Management Review, 17(1), 9–38. doi:10.5465/amr.1992.4279564
  • Sitkin, S. B., & Weingart, L. R. (1995). Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38(6), 1573–1592.
  • Smith, J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016. doi:10.2307/41409970
  • Son, J.-Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529. doi:10.2307/25148854
  • Sunden, A. E., & Surette, B. J. (1998). Gender differences in the allocation of assets in retirement savings plans. The American Economic Review, 88(2), 207–211.
  • Symantec. (2014). Internet security threat report 2014. Retrieved November 25, 2015 from http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf
  • Trevino, L. K. (1992). Experimental approaches to studying ethical-unethical behavior in organizations. Business Ethics Quarterly, 2(2), 121–136. doi:10.2307/3857567
  • Van Slyke, C., Shim, J., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 16.
  • Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198. doi:10.1016/j.im.2012.04.002
  • Venkatesh, V., & Agarwal, R. (2006). Turning visitors into customers: A usability-centric perspective on purchase behavior in electronic channels. Management Science, 52(3), 367–382. doi:10.1287/mnsc.1050.0442
  • Venkatesh, V., Morris, M. G., Gordon, B. D., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. doi:10.2307/30036540
  • Weber, J. (1992). Scenarios in business ethics research: Review, critical assessment, and recommendations. Business Ethics Quarterly, 2(2), 137–160. doi:10.2307/3857568
  • Webster, J., & Trevino, L. K. (1995). Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies. Academy of Management Journal, 38(6), 1544–1572.
  • Whetten, D. A. (1989). What constitutes a theoretical contribution? Academy of Management Review, 14(4), 490–495. doi:10.5465/amr.1989.4308371
  • Williamson, O. E. (1993). Calculativeness, trust, and economic organization. The Journal of Law and Economics, 36(1, Part 2), 453–486. doi:10.1086/467284
  • Wolfinbarger, M., & Gilly, M. C. (2001). Shopping online for freedom, control, and fun. California Management Review, 43(2), 34–55. doi:10.2307/41166074
  • Workman, M. (2007). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315–331. doi:10.1080/10658980701788165
  • Zahedi, F. M., & Song, J. (2008). Dynamics of trust revision: Using health infomediaries. Journal of Management Information Systems, 24(4), 225–248. doi:10.2753/MIS0742-1222240409
  • Zhou, T., Lu, Y., & Wang, B. (2009). The relative importance of website design quality and service quality in determining consumers’ online repurchase behavior. Information Systems Management, 26(4), 327–337. doi:10.1080/10580530903245663

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.