کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
553440 1451073 2015 16 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Trust violation and repair: The information privacy perspective
ترجمه فارسی عنوان
تخلف اعتماد و تعمیر: دیدگاه حفظ حریم خصوصی اطلاعات
کلمات کلیدی
تخلف اعتماد، تعمیر اعتماد، نگرانی خصوصی هک شدن اشتراک گذاری غیر مجاز
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر سیستم های اطلاعاتی
چکیده انگلیسی


• Examines two types of privacy violation—unauthorized sharing and hacking.
• Investigates the efficacy of three types of response that companies could offer—apology, denial and no response.
• Provides a theoretical framework for trust violation and its repair process in the context of privacy violations.
• Examines the moderating influence of unauthorized sharing and hacking on trust violation and trust repair.
• Reports novel findings regarding how trust and trust beliefs are impacted as the result of privacy violation.
• Reports novel findings regarding the differential efficacy of companies’ responses in repairing the violated trust.

With the pervasive use of the Internet, customer information privacy violation is on the rise and companies could suffer by losing their customers' trust. While previous literature has identified factors that influence trust, less attention has been paid to how trust may be rebuilt after it is violated by negative events regarding customer information privacy. The study synthesized two salient theories (the attribution theory and the organizational justice theory) to investigate the process by which trust is violated by privacy breaches and the extent of its repair by company responses. We examine the moderating effects of two types of privacy violation—hacking and unauthorized sharing—on the trust violation and repair process. We investigate the efficacy of three response types—apology, denial and no response. Data were gathered using a controlled, scenario-based lab experiment. Our results showed the significant moderating impact of violation type on the process of trust violation and repair. Apology emerged as a universally effective response, although its reparative power was far less in unauthorized sharing than in hacking. Denial emerged as a complex response. Furthermore, the results showed that trustworthiness beliefs (ability, integrity, and benevolence) are differently impacted in the violation–repair process. Details of theoretical and managerial implications are discussed.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Decision Support Systems - Volume 71, March 2015, Pages 62–77
نویسندگان
, ,