• Title/Summary/Keyword: Required Trust Level

Search Result 41, Processing Time 0.022 seconds

The Effects of Product Involvement on Required Trust Level and the Online Merchant Choice (제품관여도가 요구 신뢰수준 및 온라인 상인의 선택에 미치는 영향)

  • Lee, Jung-Min;Cho, Hwi-Hyung;Seo, Yong-Won;Hong, Il-Yoo
    • Information Systems Review
    • /
    • v.13 no.2
    • /
    • pp.17-41
    • /
    • 2011
  • A review of the related literature indicates that consumers' risk perceptions are largely affected by product involvement. This study investigates the impact of product involvement on required trust level and the online merchant choice. We developed a conceptual model that depicts the nomological relationships among product involvement, required trust level, and the online merchant choice, and formulated three hypotheses based on the conceptual model. An empirical study designed to accomplish the research objectives has been conducted using a questionnaire survey with 230 students in a university in Korea. The findings indicated that high-involvement products have higher trust level as required by consumers than low-involvement products, that consumers buying high-involvement products prefer digital storefronts, and that consumers buying low-involvement products prefer B2C e-marketplaces. The paper offers implications for academics as well as practitioners, based on the research results.

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

Public Trust in Community Pharmacists in South Korea: A Survey Study

  • Yoon, Sung Won;Han, Hye Sung;Park, Hae-Young;Sohn, Hyun Soon
    • Korean Journal of Clinical Pharmacy
    • /
    • v.31 no.4
    • /
    • pp.301-310
    • /
    • 2021
  • Background: Trust is a key component for the good relationship between patients and healthcare professionals but trust for community pharmacists has not been studied much. Objectives: This study aimed to measure public trust in community pharmacists and to investigate variables that affect trust level in South Korea. Methods: A total of 25 questions, including 13-items for three dimensions of trust (pharmacists' behavior/attitude, technical competence, communication skills) and 1-item for overall trust were developed. The survey was conducted online and the data from 416 respondents were analyzed with a t-test, an ANOVA and a multiple linear regression analysis. Results: The average scores (mean ± standard deviation) for the three dimensions of trust in community pharmacists were 3.47±1.05 (out of 5 points) for pharmacists' behavior/attitude, 3.67 ± 0.99 for technical competence, and 3.66±0.99 for communication skills. The average of the 13 items incorporating all parameters was 3.56±1.02 and the overall trust level was 7.16±1.62 (out of 10 points). The total sum of the 13 items differed significantly by age group (p=0.02) and frequency of pharmacy visits (p=0.04). Each dimension had an independent impact on the trust level, and pharmacists' behavior/attitude had the greatest impact on trust levels. Conclusions: This study showed that pharmacists' behavior/attitude had the most significant impact on the trust level. However, the level of trust in pharmacists' behavior/attitude is not yet sufficiently satisfactory, and further improvements are required to increase trust in community pharmacists.

The Effect of Trust on the Usage of Internet Shopping Mall (신뢰형성이 인터넷쇼핑몰의 이용에 미치는 영향)

  • Son Dal-Ho;Cha Yeong-Han
    • The Journal of Information Systems
    • /
    • v.15 no.3
    • /
    • pp.131-157
    • /
    • 2006
  • A lack of trust in the technical and institutional environments surrounding the web can hinder e-commerce adoption, because Internet social cues are minimal and trust is difficult th establish. Web vendors must act purposefully to overcome consumer perceptions of uncertainty and risk by building trust-both in their own web sites and in the broader Internet environments. Trust makes consumers comfortable by sharing personal information making purchases, and acting on web vendor advice-behaviors essential to wide-spread adoption of e-commerce. Understanding the nature and antecedents of trust is, therefore, a major issue for both Internet researchers and practitioners. Prior research on e-commerce trust has used diverse, incomplete, and inconsistent definitions of trust therefore, making it difficult to compare results across studies. This study tried to and the empirical relationships among the trust-related factors on the usage of Internet shooing mall. The model includes five high-level constructs-disposition to trust institution-based trust trusting beliefs, trusting intention and environmental factors. The results showed that the disposition to trust and the environmental factors had a significant effect on the web site trust however, their effect was not consistent Moreover, the model suggested in this study need to be extended including with the more sociological factors and results in this study required to be verified with those extended model.

  • PDF

Discovery Elbow System arthroplasty polyethylene bearing exchange: outcomes and experience

  • Daniel L J Morris;Katherine Walstow;Lisa Pitt;Marie Morgan;Amol A Tambe;David I Clark;Timothy Cresswell;Marius P Espag
    • Clinics in Shoulder and Elbow
    • /
    • v.27 no.1
    • /
    • pp.18-25
    • /
    • 2024
  • Background: The Discovery Elbow System (DES) utilizes a polyethylene bearing within the ulnar component. An exchange bearing requires preoperative freezing and implantation within 2 minutes of freezer removal to allow insertion. We report our outcomes and experience using this technique. Methods: This was an analysis of a two-surgeon consecutive series of DES bearing exchange. Inclusion criteria included patients in which exchange was attempted with a minimum 1-year follow-up. Clinical and radiographic review was performed 1, 2, 3, 5, 8 and 10 years postoperative. Outcome measures included range of movement, Oxford Elbow Score (OES), Mayo Elbow Performance Score (MEPS), complications and requirement for revision surgery. Results: Eleven DESs in 10 patients were included. Indications were bearing wear encountered during humeral component revision (n=5); bearing failure (n=4); and infection treated with debridement, antibiotics and implant retention (DAIR; n=2). Bearing exchange was conducted on the first attempt in 10 cases. One case required a second attempt. One patient developed infection postoperatively managed with two-stage revision. Mean follow-up of the bearing exchange DES was 3 years. No further surgery was required, with no infection recurrence in DAIR cases. Mean elbow flexion-extension and pronosupination arcs were 107°(±22°) and 140° (±26°). Mean OES was 36/48 (±12) and MEPS was 83/100 (±19). Conclusions: Our results support the use of DES bearing exchange in cases of bearing wear with well-fixed stems or acute infection. This series provides surgeons managing DES arthroplasty with management principles, successful and reproducible surgical techniques and expected clinical outcomes in performing DES polyethylene bearing exchange. Level of evidence: IV.

Chest wall perforator flaps for partial breast reconstruction: Surgical outcomes from a multicenter study

  • Soumian, Soni;Parmeshwar, Rishikesh;Chandarana, Mihir;Marla, Sekhar;Narayanan, Sankaran;Shetty, Geeta
    • Archives of Plastic Surgery
    • /
    • v.47 no.2
    • /
    • pp.153-159
    • /
    • 2020
  • Background Perforator artery flaps based on the branches of intercostal arteries and lateral thoracic artery can be used for reconstruction after breast-conserving surgery (BCS). Although described more than a decade ago, these have not been adopted widely in clinical practice. We report on short-term and long-term surgical outcomes of partial breast reconstruction using chest wall perforator flaps from a prospective multicenter audit. Methods All patients operated for BCS and partial breast reconstruction using intercostal artery perforator or lateral thoracic artery perforator flaps from January 2015 to October 2018 were included in the analysis. Oncoplastic breast surgeons with appropriate level of training performed all tumor excisions and reconstructions as a single-stage procedure. Patient characteristics, treatment details and surgical outcomes were noted. Specific outcomes recorded were margin re-excision and complication rates. Results One hundred and twelve patients underwent the procedure in the given study period. The median age was 54 years. Median specimen weight was 62.5 g and median volume of excision was 121.4 mL. Fifteen patients (13.39%) underwent a margin re-excision for close or positive margins without additional morbidity. One patient required a completion mastectomy. Eight patients (7.14%) had an early complication. None of the patients required a contralateral symmetrization procedure. The results were comparable across the participating centers. Conclusions Chest wall artery perforator-based flaps are an excellent option for lateral and inferior quadrant partial breast reconstructions. The short and long-term surgical outcomes are comparable across sites and can be performed with minimal morbidity. Patient-reported outcome measures need to be studied.

The Effects of the Types of Source-Based Trust on Knowledge Sharing of Public Employees: Based on Officials' Perceptions in Local Government (공공조직 구성원의 신뢰기반에 따른 신뢰유형이 지식공유에 미치는 영향 - 지방공무원의 인식수준을 중심으로 -)

  • Kim, Gu
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.23-50
    • /
    • 2013
  • The main purpose of this study is to empirically examine and to develop the optimal model about an influential relationship between the types of source-based trust and knowledge sharing of local government officials. Procedural and distributive justice-based calculative trust in organization, cognition-based trust in organization, cognition-based trust in supervisor, cognition-based trust in coworkers, and emotion-based trust in coworkers were set up as independent variables of this research model, and sharing of tacit knowledge and explicit knowledge based on the knowledge content as dependent variables. The research results shows that the suitability of each model has approximate value to the required level, and that emotion-based trust in coworkers significantly affects knowledge sharing for both the individual and integrated factors in hypothetical influential relationship. This study is expected to help to enable knowledge sharing in various situations by dividing the concepts of trust that affect knowledge sharing into a few types, and deriving the influential model of knowledge sharing by types.

  • PDF

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

A Study on the Security Requirements Analysis to Build a Zero Trust-Based Remote Work Environment (제로트러스트 기반의 원격 근무 환경을 구축하기 위한 보안요구사항 분석 연구)

  • Hae-na Kim;Ye-jun Kim;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.83-102
    • /
    • 2024
  • Recently, as the use of the cloud increases year by year and remote work within the enterprise has become one of the new types of work, the security of the cloud-based remote work environment has become important. The introduction of zero trust is required due to the limitations of the existing perimeter security model that assumes that everything in the internal network is safe. Accordingly, NIST and DoD published standards related to zero trust architecture, but the security requirements of that standard describe only logical architecture at the abstract level. Therefore, this paper intends to present more detailed security requirements compared to NIST and DoD standards by performing threat modeling for OpenStack clouds. After that, this research team performed a security analysis of commercial cloud services to verify the requirements. As a result of the security analysis, we identified security requirements that each cloud service was not satisfied with. We proposed potential threats and countermeasures for cloud services with zero trust, which aims to help build a secure zero trust-based remote working environment.

Exploring the Moderating Effect of Security Awareness on Trust and Service Value in Website (품질 관점에서 웹사이트의 신뢰와 서비스가치, 그리고 보안인식의 조절효과)

  • Park, Jun-Gi;Lee, Hyejung;Kim, Gibum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1217-1232
    • /
    • 2017
  • Because websites contain personal information such as address, contact information, etc., Attention about website security is required. This research is a study to examine that user's security awareness has a moderating effect on the relationship between website quality factors and trust, information and service value on websites holding personal information. As a result of questionnaire survey of the secondary school students and parents 635 people, website quality factors excluding usability positively affected trust of the website. Information quality on the website had a positive influence on service value and service value also affected trust. User's security awareness about the website has a moderating effect on the relationship between information and service value. The result of this research means that users are not continuously using websites with a low security level. Based on the results of this research, we presented theoretical and practical suggestions for the stakeholders of websites.