Skip to main content
Log in

It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis

  • EMPIRICAL RESEARCH
  • Published:
European Journal of Information Systems

Abstract

Trust and distrust are considered crucial elements affecting online relationships – particularly those involving electronic transactions. Although some studies propose that they are distinct, others claim that they are merely opposite ends of one continuum. Further adding to the debate is the possibility of ambivalence, a topic that has not been examined in electronic transaction relationships. Unfortunately, current models of trust and distrust have limitations that impede explanations of how – or even if – ambivalence is generated by feelings of trust and distrust and how these two constructs can best coexist. We thus propose a hybrid model which considers the limitations and strengths of previous models. Namely, we posit that trust and distrust can coexist as separate components with related continua. We use polynomial regression analysis (PRA) and response surface analysis (RSA) to test these complex relationships. Using an empirical study of online consumer behaviour with 521 experienced online consumers, strong empirical validation is found for the model. We examine the effects of ambivalence on the truster’s intentions towards a website and find a small positive effect which increases such intentions. PRA and RSA confirm that trust and distrust are most likely separate components – not opposite ends of a continuum – with related continua. The continua within the subconstructs of trust and distrust likely have more complex and interesting relationships than have been considered previously. These findings lead to interesting future research opportunities on trust, distrust and ambivalence using advanced techniques such as PRA and RSA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3

Similar content being viewed by others

Notes

  1. Trusting beliefs is composed of three subconstructs, namely benevolence, competence and integrity (McKnight et al., 2002). Benevolence is exhibited by an organisation that cares about the individual and attempts to act in his/her best interests. Competence is exhibited by an organisation that has the capability to perform the desired behaviour. Finally, a firm with high integrity is honest in its interactions with the individual and will fulfil its promises to him/her.

  2. This body of literature defines feelings as the emotional response and attachments which an individual ascribes to other individuals or objects (Kachadourian et al, 2005); beliefs are the logically held information regarding the characteristics of other individuals or objects (Kachadourian et al, 2005). Feelings thus involve affect, whereas beliefs involve cognition; thus, these concepts can also be referred to as affective beliefs and cognitive beliefs (Trafimow & Sheeran, 1998). Finally, behaviours are actions that are performed by an individual (Kachadourian et al, 2005) that are intended to reflect the held feelings and beliefs of the individual.

  3. For example, an online consumer can have trust in the TurboTax® website (the trustee) and believe that it has competent advice to assist consumers in the completion and filing of an accurate tax return. However, a consumer may simultaneously distrust advice from the website regarding money management software, largely because the company sells a product in that category. Thus, the proper response to whether an online consumer trusts the organisation should not be ‘yes’ or ‘no’ but ‘to do what?’ (Hardin, 1993). In complex relationships, which only magnify when introducing organisations as the object of trust, it is most important to refer to specifics to understand whether a consumer trusts an organisation via its website. For example, consumers are likely to trust that online orders to Apple’s iTunes online store will be conducted without risking their future credit card transactions on other websites. However, they might also believe that their shopping history on the iTunes store might result in future target marketing. The various facets that make up a relationship allow trust and distrust to coexist, and thus support the bidimensional model of trust and distrust.

  4. For example, if an online consumer believes that Amazon.com will ship a purchased item in a timely manner, the consumer cannot also believe the item will not be shipped in a timely manner. Information that is used to form the positive or negative expectations that will lead to trust or distrust cannot be inherently contradictory: Either the information will lead to a positive expectation that the trustee will perform some exact behaviour (e.g., ship an item), or it will lead to a negative expectation (e.g., not ship the item).

  5. For example, consumers of Delta Airlines will value information regarding Delta Airlines from the official website differently than information posted on websites such as DeltaReallySucks.com or other travel review websites.

  6. For example, a consumer who uses YouSendIt.com for the transmission of files to various colleagues around the globe might believe that the organisation is able to receive and host these files. By using the service, the consumer accepts this belief and disregards the potential negative belief that the organisation is not able to receive and host the same files. Ultimately, the consumer either believes that the organisation is competent or incompetent in relation to this action. The various cues that are present on the website can be used to form both trust and distrust towards YouSendIt.com.

  7. Ability is defined by the subdimensions competence and incompetence. Ability forms the assessment of the seller’s proficiency (or lack thereof) to complete a given task (i.e., competence and incompetence).

  8. Orientation is defined by the subdimensions benevolence and malevolence. Orientation is the idea that the seller intends to do harm or good to the buyer.

  9. Dependability is defined by the subdimensions integrity and deceit. Dependability is the notion that a buyer expects a seller to adhere to a set of guiding principles of being honest, or expects the seller to deceive him or her.

  10. Of the subjects, 59% were male and 41% female. The average age was 28.1 years, with a standard deviation of 5.6. The respondents reported an average of 7.1 completed collegiate semesters, with a standard deviation of 1.9.

  11. The use of such participants for this type of study follows the precedents set forth in past e-commerce research (Dinev & Hart, 2006; Pavlou & Fygenson, 2006; Lowry et al, 2008; Parboteeah et al, 2009; Lowry et al, 2012). Participants in this young but educated demographic had extensive experience with e-commerce, the Internet, and various computing technologies – particularly as users and consumers – which qualifies them as excellent targets for this study.

  12. Because of the nature of formative measures, reliability checks cannot be reasonably made for formative measures (Diamantopoulos & Winklhofer, 2001). To establish reliability, which refers to the degree to which a scale yields consistent and stable measures over time (Straub, 1989), PLS computes a composite reliability score as part of its integrated model analysis. This score is a more accurate measurement of reliability than Cronbach’s α because it does not assume that loadings or error terms of the items to be equal (Chin et al, 2003). However, as a conservative check, Cronbach’s α can also be used as a basis of comparison (Fornell & Larcker, 1981; Nunnally & Bernstein, 1994).

  13. The height of the dependent variable (z) is represented by the graphical display, and augmented with colour. Warmer colours (those near the red spectrum) represent higher scores for the dependent variable, while the cooler colours (those near the blue spectrum) represent lower scores.

References

  • Almirall E and Casedesus-Masanell R (2010) Open versus closed innovation: A model of discovery and divergence. Academy of Management Review 35(1), 27–47.

    Article  Google Scholar 

  • Arrow KJ (1974) Limited knowledge and economic analysis. American Economic Review 61(1), 1–10.

    Google Scholar 

  • Ba SL (2001) Establishing online trust through a community responsibility system. Decision Support Systems 31(3), 323–336.

    Article  Google Scholar 

  • Ba SL and Pavlou PA (2002) Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly 26(3), 243–268.

    Article  Google Scholar 

  • Bagozzi RP (1994) Structural equation models in marketing research: Basic principles. In Principles of Marketing Research (Bagozzi RP, Ed.), pp 317–385, Blackwell, Oxford.

    Google Scholar 

  • Bagozzi RP, Tybout AM, Craig CS and Sternthal B (1979) The construct validity of the tripartite classification of attitudes. Journal of Marketing Research 16(1), 88–95.

    Article  Google Scholar 

  • Barber B (1983) The Logic and Limits of Trust. Rutgers University Press, New Brunswick, NJ.

    Google Scholar 

  • Benamati J, Serva MA and Fuller MA (2006) Are trust and distrust distinct constructs? An empirical study of the effects of trust and distrust among online banking users. In 39th Annual Hawaii International Conference on System Sciences (HICSS’06), IEEE, Kauai, HI.

  • Bollen K and Lennox R (1991) Conventional wisdom on measurement: A structural equation perspective. Psychological Bulletin 110(2), 305–314.

    Article  Google Scholar 

  • Brooks ME, Highhouse S, Russell SS and Mohr DC (2003) Familiarity, ambivalence, and firm reputation: Is corporate fame a double-edged sword? Journal of Applied Psychology 88(5), 904–914.

    Article  Google Scholar 

  • Cacioppo JT and Bernston GG (1994) Relationship between attitudes and evaluative space: A critical review, with emphasis on the separability of positive and negative substrates. Psychological Bulletin 115(3), 401–423.

    Article  Google Scholar 

  • Cenfetelli RT and Bassellier G (2009) Interpretation of formative measurement in information systems research. MIS Quarterly 33(4), 689–707.

    Google Scholar 

  • Chin WW, Marcolin BL and Newsted PR (1996) A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and voice mail emotion/adoption study. In 17th International Conference on Information Systems (Degross JI, Jarvenpaa S and Srinivasan A, Eds.), pp 21–41, AIS, Cleveland, OH.

    Google Scholar 

  • Chin WW, Marcolin BL and Newsted PR (2003) A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research 14(2), 189–217.

    Article  Google Scholar 

  • Clemons EK, Hann I-H and Hitt LM (2002) Price dispersion and differentiation in online travel: An empirical investigation. Management Science 48(4), 534–549.

    Article  Google Scholar 

  • Compeau DR, Marcolin HK and HIGGINS CA (2012) Generalizability of information systems research using student subjects—A reflection on our practices and recommendations for future research. Information Systems Research 23(4), 1093–1109.

    Article  Google Scholar 

  • Conner M, Sparks P, Povey R, James R, Shepherd R, et al. (2002) Moderator effects of attitudinal ambivalence on attitude-behaviour relationships. European Journal of Social Psychology 32(5), 705–718.

    Article  Google Scholar 

  • Cook TD and Campbell DT (1979) Quasi-Experimentation: Design and Analysis for Field Settings. Rand McNally, Chicago, IL.

    Google Scholar 

  • Dellarocas C (2003) The digitization of word of mouth: promise and challenges of online feedback mechanisms. Management Science 49(10), 1407–1424.

    Article  Google Scholar 

  • Dellarocas C (2006) How often should reputation mechanisms update a trader’s reputation profile? Information Systems Research 17(3), 271–285.

    Article  Google Scholar 

  • Dennis AR, Robert JR LP, Curtis AM, Kowalczyk ST and Hasty BK (2012) Research note: Trust is in the eye of the beholder: A vignette study of postevent behavioral controls’ effects on individual trust in virtual teams. Information systems research 23(2), 546–558.

    Article  Google Scholar 

  • Deutsch M (1958) Trust and suspicion. Journal of Conflict Resolution 2(4), 265–279.

    Article  Google Scholar 

  • Deutsch M (1960) The effect of motivational orientation upon trust and suspicion. Human Relations 13(2), 123–139.

    Article  Google Scholar 

  • Diamantopoulos A and Siguaw JA (2006) Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management 17(4), 263–282.

    Article  Google Scholar 

  • Diamantopoulos A and Winklhofer HM (2001) Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research 38(2), 269–277.

    Article  Google Scholar 

  • Dimoka A (2010) What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 34(2), 373–396.

    Google Scholar 

  • Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17(1), 61–80.

    Article  Google Scholar 

  • Edwards JR (2002) Alternatives to difference scores: Polynomial regression analysis and response surface methodology. In Advances in Measurement and Data Analysis (Drasgow F and Schmitt NW, Eds.), pp 350–400. Jossey-Bass, San Francisco, CA.

    Google Scholar 

  • Everard A and Galletta D (2005) How presentation flaws affect perceived site quality, trust, and intentions to purchase from an on-line store. Journal of Management Information Systems 22(3), 55–95.

    Google Scholar 

  • Fang Y, Qureshi I, Sun H, Mccole P, Ramsey E, et al. (2014) Trust, satisfaction, and online repurchase intention: The moderating role of perceived effectiveness of e-commerce institutional mechanisms. MIS Quarterly 38(2), 407–427.

    Google Scholar 

  • Festinger L (1957) A Theory of Cognitive Dissonance. Stanford University Press, Stanford, CA.

    Google Scholar 

  • Fornell C and Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39–50.

    Article  Google Scholar 

  • Gefen D (2002) Customer loyalty in e-commerce. Journal of the Association for Information Systems 3(2), 27–51.

    Google Scholar 

  • Gefen D, Karahanna E and Straub DW (2003) Trust and TAM in online shopping: An integrated model. MIS Quarterly 27(1), 51–90.

    Google Scholar 

  • Gefen D and Pavlou PA (2012) The boundaries of trust and risk: The quadratic moderating role of institutional structures. Information Systems Research 23(3-part-2), 940–959.

  • Gefen D and Straub DW (2004) Consumer trust in B2C e-commerce and the importance of social presence: Experiments in e-products and e-services. Omega: The International Journal of Management Science 32(6), 407–424.

    Google Scholar 

  • Gefen D and Straub DW (2005) A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the AIS 16(5), 91–109.

    Google Scholar 

  • Gordon ME, Slade LA and Schmitt N (1986) The ‘Science of the sophomore’ revisited: From conjecture to empiricism. Academy of Management Review 11(1), 191–207.

    Google Scholar 

  • Graebner ME (2009) Caveat venditor: Trust asymmetries in acquisitions of entrepreneurial firms. Academy of Management Journal 52(3), 435–472.

    Article  Google Scholar 

  • Hann I-H, Hui K-L, Lee S-YT and Png IPL (2007) Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems 24(2), 13–42.

    Article  Google Scholar 

  • Hardin R (1993) The street-level epistemology of trust. Politics & Society 21, 505–529.

    Article  Google Scholar 

  • Howell JM and Hall-Merenda KE (1999) The ties that bind: The impact of leader-member exchange, transformational and transactional leadership, and distance on predicting follower performance. Journal of Applied Psychology 84(5), 680–694.

    Article  Google Scholar 

  • Jarvenpaa SL and Majchrzak A (2010) Research commentary-Vigilant interaction in knowledge collaboration: Challenges of online user participation under ambivalence. Information Systems Research 21(4), 773–784.

    Article  Google Scholar 

  • Jarvenpaa SL and Tractinsky N (1999) Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication 5(2), 1–35.

    Google Scholar 

  • Jonas K, Diehl M and Bromer P (1997) Effects of attitudinal ambivalence on information processing and attitude-intention consistency. Journal of Experimental Social Psychology 33(2), 190–210.

    Article  Google Scholar 

  • Kachadourian LK, Fincham F and Davila J (2005) Attitudinal ambivalence, rumination, and forgiveness of partner transgressions in marriage. Personality and Social Psychology Bulletin 31(5), 334–342.

    Article  Google Scholar 

  • Kahneman D and Tversky A (1979) Prospect theory: An analysis of decision under risk. Econometrica 47(2), 263–291.

    Article  Google Scholar 

  • Kaplan KJ (1972) On the ambivalence-indifference problem in attitude theory and measurement: A suggested modification of the semantic differential technique. Psychological Bulletin 77(5), 361–372.

    Article  Google Scholar 

  • Kelley HH (1973) The process of causal attribution. American Psychologist 28(2), 107–128.

    Article  Google Scholar 

  • Kenny DA and Milan S (2011) Identification: A non-technical discussion of a technical issue. In Handbook of Structural Equation Modeling (Hoyle R, Kaplan D, Marcoulides G and West S, Eds.). Guilford Press, New York, NY.

    Google Scholar 

  • King WR and He J (2006) A meta-analysis of the technology acceptance model. Information & Management 43(6), 740–755.

    Article  Google Scholar 

  • Klein G, Jian JJ and Cheney P (2009) Resolving difference score issues in information systems research. MIS Quarterly 33(4), 811–826.

    Google Scholar 

  • Komiak S and Benbasat I (2008) A two-process view of trust and distrust building in recommendation agents: A process-tracing study. Journal of the Association for Information Systems 9(12), 727–747.

    Google Scholar 

  • Kramer RM (1999) Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology 50(1), 569–598.

    Article  Google Scholar 

  • Krishnan R, Martin X and NOORDERHAVEN NG (2006) When does trust matter in alliance performance? Academy of Management Journal 49(5), 894–917.

    Article  Google Scholar 

  • Levin DT and Simons DJ (1997) Failure to detect changes to attended objects in motion pictures. Psychonomic Bulletin and Review 4(4), 501–506.

    Article  Google Scholar 

  • Levin DZ and Cross R (2004) The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer. Management Science 50(11), 1477–1490.

    Article  Google Scholar 

  • Lewicki RJ and Bunker BB (1996) Developing and maintaining trust in work relationships. In Trust in Organizations (Kramer RM and Tyler TR, Eds.), pp 114––139. Sage, Thousand Oaks, CA.

    Google Scholar 

  • Lewicki RJ, Mcallister DJ and Bies RJ (1998) Trust and distrust: New relationships and realities. Academy of Management Review 23(3), 438–458.

    Google Scholar 

  • Lewicki RJ, Tomlinson EC and Gillespie N (2006) Models of interpersonal trust development: Theoretical approaches, empirical evidence, and future directions. Journal of Management 32(6), 991–1022.

    Article  Google Scholar 

  • Lewis JD and Weigert A (1984) Trust as a social reality. Social Forces 63(4), 967–984.

    Article  Google Scholar 

  • Liang H, Saraf N, Hu Q and Xue Y (2007) Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly 31(1), 59–87.

    Google Scholar 

  • Lim ET, Tan C-W, Cyr D, Pan SL and Xiao B (2012) Advancing public trust relationships in electronic government: The Singapore e-filing journey. Information Systems Research 23(4), 1110–1130.

    Article  Google Scholar 

  • Liu BQ and Goodhue DL (2012) Two worlds of trust for potential e-commerce users: Humans as cognitive misers. Information Systems Research 23(4), 1246–1262.

    Article  Google Scholar 

  • Lowry PB and Gaskin J (2014) Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it,. IEEE Transactions on Professional Communication 57(2), 123–146.

    Article  Google Scholar 

  • Lowry PB, Moody G, Vance A, Jensen M, Jenkins JL, et al. (2012) Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society for Information Science and Technology 63(4), 755–766.

    Article  Google Scholar 

  • Lowry PB, Romano NC, Jenkins JL and Guthrie RW (2009) The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups. Journal of Management Information Systems 26(1), 159–200.

    Article  Google Scholar 

  • Lowry PB, Schuetzler RM, Giboney JS and Gregory TA (2015) Is trust always better than distrust? The potential value of distrust in newer virtual teams engaged in short-term decision making. Group Decision and Negotiation 24(4), 723–752.

    Article  Google Scholar 

  • Lowry PB, Vance A, Moody G, Beckman B and Read A (2008) Explaining and predicting the impact of branding alliances and Web site quality on initial consumer trust of e-commerce Web sites. Journal of Management Information Systems 24(4), 201–227.

    Article  Google Scholar 

  • Lowry PB, Wilson DW and Haig WL (2014) A picture is worth a thousand words: Source credibility theory applied to logo and website design for heightened credibility and consumer trust. International Journal of Human-Computer Interaction 30(1), 63–93.

    Article  Google Scholar 

  • Lowry PB, Zhang D, Zhou L and Fu X (2010) Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups. Information Systems Journal 20(3), 297–315.

    Article  Google Scholar 

  • Luhmann N (1979) Trust and Power. John Wiley, New York, NY.

    Google Scholar 

  • Macdonald TK and Hynie M (2008) Ambivalence and unprotected sex: Failure to predict sexual activity and decreased condom use. Journal of Applied Social Psychology 38(4), 1092–1107.

    Article  Google Scholar 

  • Macdonald TK and Zanna MP (1998) Cross-dimension ambivalence toward social groups: Can ambivalence affect intentions to hire feminists? Personality and Social Psychology Bulletin 24(4), 427–441.

    Article  Google Scholar 

  • Mackenzie SB, Podsakoff PM and Podsakoff NP (2011) Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly 35(2), 293–334.

    Google Scholar 

  • Maio GR, Bell DW and Esses VM (1996) Ambivalence and persuasion: The processing of messages about immigrant groups. Journal of Experimental Social Psychology 32(6), 512–536.

    Article  Google Scholar 

  • Marakas GM, Johnson RD and Clay PF (2007) The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability, and stability over time. Journal of the Association for Information Systems 8(1), 16–46.

    Google Scholar 

  • Mayer R, Davis J and Schoorman F (1995) An integrative model of organizational trust. The Academy of Management Review 20(3), 709–734.

    Google Scholar 

  • Mcallister DJ (1995) Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal 38(1), 24–59.

    Article  Google Scholar 

  • Mccormack D, Casimir G, Djurkovic N and Yang L (2009) Workplace bullying and intention to leave among schoolteachers in China: The mediating effect of affective commitment. Journal of Applied Social Psychology 39(9), 2106–2127.

    Article  Google Scholar 

  • Mcknight DH and Chervany NL (2001) While trust is cool and collected, distrust is fiery and frenzied: A model of distrust concepts. In 7th Americas Conference on Information Systems, pp 883–888. Association for Information Systems, Boston, MA.

    Google Scholar 

  • Mcknight DH and Choudhury V (2006) Distrust and trust in B2C e-commerce: Do they differ? In Proceedings of the Eighth International Conference on Electronic Commerce (ICEC’06) (Spencer B, Fox MS, Du W, Du D and Buffett S, Eds.), pp 482-491, Fredericton, New Brunswick, Canada.

  • Mcknight DH, Choudhury V and Kacmar CJ (2002) Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research 13(3), 334–359.

    Article  Google Scholar 

  • Mcknight DH, Cummings L and Chervany N (1998) Initial trust formation in new organizational relationships. Academy of Management Review 23(3), 473–490.

    Google Scholar 

  • Mcknight DH, Kacmar C and Choudhury V (2003) Whoops… did I use the wrong concepts to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts. In 36th Hawaii International Conference on System Sciences (HICSS’36), pp 182–191, Big Island, HI.

  • Mcknight DH, Kacmar C and Choudhury V (2004) Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions. E-Service Journal 3(2), 35–58.

    Article  Google Scholar 

  • Moody GD, Galletta DF and Lowry PB (2014) When trust and distrust collide: The engendering and role of ambivalence in online consumer behavior. Electronic Commerce Research and Applications 13(4), 266–282.

    Article  Google Scholar 

  • Naquin CE and Paulson GD (2003) Online bargaining and interpersonal trust. Journal of Applied Psychology 88(1), 113–120.

    Article  Google Scholar 

  • Nunnally JC and Bernstein IH (1994) Psychometric Theory. McGraw-Hill, New York.

    Google Scholar 

  • Oreg S and Sverdlik N (2011) Ambivalence toward imposed change: The conflict between dispositional resistance to change and the orientation toward the change agent. Journal of Applied Psychology 96(2), 337–349.

    Article  Google Scholar 

  • Ou CX and Sia CL (2010) Consumer trust and distrust: An issue of website design. International Journal of Human-Computer Studies 68(12), 913–934.

    Article  Google Scholar 

  • Parboteeah DV, Valacich JS and Wells JD (2009) The influence of website characteristics on a consumers’ urge to buy impulsively. Information Systems Research 20(1), 60–78.

    Article  Google Scholar 

  • Pavlou P, Liang H and Xue Y (2007) Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly 31(1), 105–136.

    Google Scholar 

  • Pavlou PA and Fygenson M (2006) Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly 30(1), 115–143.

    Google Scholar 

  • Petter S, Straub DW and Rai A (2007) Specifying formative constructs in information systems research. MIS Quarterly 31(4), 623–656.

    Google Scholar 

  • Petty RE, Brinol P and Demarree KG (2007) The meta-cognitive model (MCM) of attitudes: Implications for attitude measurement, change, and strength. Social Cognition 25(5), 657–686.

    Article  Google Scholar 

  • Petty RE, Tormala ZL, Brinol P, Jarvis W and Blair G (2006) Implicit ambivalence from attitude change: An exploration of the PAST model. Journal of Personality and Social Psychology 90(1), 21–41.

    Article  Google Scholar 

  • Podsakoff PM, Mackenzie SB, Lee JY and Podsakoff NP (2003) Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879–903.

    Article  Google Scholar 

  • Porter CE and Donthu N (2008) Cultivating trust and harvesting value in virtual communities. Management Science 54(1), 113–128.

    Article  Google Scholar 

  • Priester JR and Petty RE (1996) The gradual threshold model of ambivalence: Relating the positive and negative bases of attitudes to subjective ambivalence. Journal of Personality and Social Psychology 71(3), 431–449.

    Article  Google Scholar 

  • Priester JR, Petty RE and Park K (2007) Whence univalent ambivalence? From the anticipation of conflicting reactions. Journal of Consumer Research 34(1), 11–21.

    Article  Google Scholar 

  • Puranam P and Vanneste BS (2009) Trust and governance: Untangling a tangled web. Academy of Management Review 34(1), 11–31.

    Article  Google Scholar 

  • Qiu L and Benbasat I (2009) Evaluating anthropomorphic product recommendation agents: A social relationship perspective to designing information systems. Journal of Management Information Systems 25(4), 145–181.

    Article  Google Scholar 

  • Riedl R, Hubert M and Kenning P (2010) Are there neural gender differences in online trust? An fMRI study on the perceived trustworthiness of eBay offers. MIS Quarterly 34(2), 397–428.

    Google Scholar 

  • Ringle CM, Wende S and Will S (2005) SmartPLS 2.0 (M3) Beta. September 17, 2010, http://www.smartpls.de.

  • Rosenberg M and Hovland CI (1960) Cognitive, affective and behavioral components of attitudes. In Attitude Organization and Change (Rosenberg M, Ed.), pp 1–14. Yale University Press, New Haven, CT.

    Google Scholar 

  • Ross L (1977) The intuitive psychologist and his shortcomings: Distortions in the attribution process. In Advances in Experimental Social Psychology (Berkowitz L, Ed.), Vol 10, pp 173–220. Academic Press, New York, NY.

    Google Scholar 

  • Rotter JB (1980) Interpersonal trust, trustworthiness, and gullibility. American Psychologist 35(1), 1–7.

    Article  Google Scholar 

  • Schoorman FD, Mayer RC and Davis JH (2007) An integrative model of organizational trust: Past, present, and future. Academy of Management Review 32(2), 344–354.

    Article  Google Scholar 

  • Schul Y, Mayo R and Burnstein E (2008) The value of distrust. Journal of Experimental Social Psychology 44(5), 1293–1302.

    Article  Google Scholar 

  • Silverman M and Mack A (2006) Priming by change blindness: When it does and does not occur. Consciousness and Cognition 15(2), 409–422.

    Article  Google Scholar 

  • Simon H (1957) A behavioral model of rational choice. In Models of Man: Social and Rational: Mathematical Essays on Rational Human Behavior in a Social Setting (SIMON H, Ed.), pp 99–118. Wiley, New York.

    Google Scholar 

  • Simon H (1991) Bounded rationality and organizational learning. Organization Science 2(1), 125–134.

    Article  Google Scholar 

  • Sparks P, Hedderley D and Shepherd R (1992) An investigation into the relationship between perceived control, attitude variability and the consumption of two common foods. European Journal of Social Psychology 22(1), 55–71.

    Article  Google Scholar 

  • Straub DW (1989) Validating instruments in MIS research. MIS Quarterly 13(2), 147–169.

    Article  Google Scholar 

  • Straub DW, Boudreau MC and Gefen D (2004) Validation guidelines for IS positivist research. Communications of the AIS 14, 380–426.

    Google Scholar 

  • Thompson MM and Zanna MP (1995) The conflicted individual: Personality-based and domain-specific antecedents of ambivalent social attitudes. Journal of Personality 63(2), 259–288.

    Article  Google Scholar 

  • Tomlinson EC and Mayer RC (2009) The role of causal attribution dimensions in trust repair. Academy of Management Review 34(1), 85–104.

    Article  Google Scholar 

  • Trafimow D and Sheeran P (1998) Some tests of the distinction between cognitive and affective beliefs. Journal of Experimental Social Psychology 34(4), 378–397.

    Article  Google Scholar 

  • van Harreveld F, van der Pligt J and de Liver YN (2009) The agony of ambivalence and ways to resolve it: Introducing the MAID model. Personality and Social Psychology Review 13(1), 45–61.

    Article  Google Scholar 

  • Vance A (2008) Trusting IT artifacts: How trust affects our use of technology. Unpublished, doctoral dissertation, Computer Information Systems Department, Georgia State University.

  • Wells JD, Valacich JS and Hess TJ (2011) What signals are you sending? How website quality influences perceptions of product quality and purchase intentions. MIS Quarterly 35(2), 373–396.

    Google Scholar 

  • Williams M (2001) In whom we trust: Group membership as an affective context for trust development. Academy of Management Review 26(3), 377–396.

    Google Scholar 

  • Williams P and Aaker JL (2002) Can mixed emotions peacefully coexist? Journal of Consumer Research 28(3), 636–649.

    Article  Google Scholar 

  • Wu B, Goel V and Davison BD (2006) Propagating trust and distrust to demote web spam. In Models of Trust for the Web Workshop (MTW06) of 15th International World Wide Web Conference, pp 1–9. Edinburgh, Scotland, UK.

    Google Scholar 

  • Xiao B and Benbasat I (2007) E-Commerce product recommendation agents: Use, characteristics, and impact MIS Quarterly 31(1), 137–209.

    Google Scholar 

  • Yakovleva M, Reilly RR and Werko R (2010) Why do we trust? Moving beyond individual to dyadic perceptions. Journal of Applied Psychology 95(1), 79–91.

    Article  Google Scholar 

  • Ziegler R, Hagen B and Diehl M (2012) Relationship between job satisfaction and job performance: Job ambivalence as a moderator. Journal of Applied Social Psychology 42(8), 2019–2040.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul Benjamin Lowry.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (PDF 4186 kb)

Appendices

Appendix 1

See Table 14.

Table 14 Instrument detail

Appendix 2

See online Appendix 2.

Appendix 3: factorial validity and analysis support

Assessing construct validity

In this section, we assess several key elements of construct validity, including determining which constructs are formative and which are reflective (Diamantopoulos and Winklhofer, 2001); assessing factorial validity as determined by discriminant validity and convergent validity (Straub et al, 2004); evaluating multicollinearity (Cenfetelli and Bassellier, 2009); and checking for common methods bias (Podsakoff et al, 2003). We used partial least squares (PLS), employing SmartPLS version 2.0 (Ringle et al, 2005) for model validation and analysis because PLS is especially adept at validation of mixed models of formative and reflective indicators (Chin et al, 1996; Diamantopoulos and Winklhofer, 2001; Chin et al, 2003; Gefen and Straub, 2005; Lowry and Gaskin, 2014).

Determining which constructs are formative and which are reflective

A key step of preparation for assessing factorial validity is to determine which constructs are formative and which are reflective (Diamantopoulos and Winklhofer, 2001). The basic difference is that items within formative constructs are theoretically distinct, and thus cannot be replaced with other items in the same construct; meanwhile, the items in reflective constructs are theoretically similar, and thus are replaceable (Diamantopoulos and Winklhofer, 2001). This theoretical and methodological distinction has recently become a serious issue in IS research, where it has been discovered that many previous IS studies were mis-specified because they did not distinguish between reflective and formative constructs (Petter et al, 2007). Such mis-specification can lead to problems in empirical results and theoretical interpretations, including a potential increase in both Type I and Type II errors (Petter et al, 2007).

We used the latest leading recommendations (Diamantopoulos and Winklhofer, 2001; Petter et al, 2007; Cenfetelli and Bassellier, 2009; Lowry and Gaskin, 2014) to determine how to analyse our constructs. Notably, constructs are not inherently reflective or formative; it is up to the researcher and the literature to make that determination and to choose appropriate items for the conceptualisation (MacKenzie et al, 2011). Our conceptualisation and measurement, along with formal model specification, followed the latest conventions (e.g., MacKenzie et al, 2011) Trust and distrust beliefs and the dispositions to trust and distrust have previously been theorised, modelled and validated as second-order constructs, composed of first-order reflective subconstructs (McKnight et al, 1998; McKnight et al, 2004; McKnight and Choudhury, 2006). We have neither theoretical nor methodological reasons to contradict these previous construct conceptualisations, and thus we have validated and modelled our constructs accordingly.

Establishing factorial validity

Factorial validity is established through both convergent and discriminant validity, which are two highly interrelated concepts which must coexist. Convergent validity is the basic idea that measurement items which should be related are related. It is established ‘when items thought to reflect a construct converge, or show significant, high correlations with one another, particularly when compared to the convergence of items relevant to other constructs, irrespective of method’ (Straub et al, 2004, p. 391). Discriminant validity is the basic idea that items that should not be related are in fact not related. Thus, it can be established when items thought to diverge show insignificant, low correlations with one another, particularly compared to items in other constructs (Straub et al, 2004). Importantly, factorial validity is established in different ways for reflective and formative constructs; thus, we address these analyses separately.

Factorial validity of reflective constructs

To establish the factorial validity of our reflective constructs, we followed procedures by Gefen and Straub (2005) and Lowry et al (2014), and further demonstrated in (Lowry et al, 2008; Lowry et al, 2009). For an especially conservative analysis, we used two established techniques to establish convergent validity and two established techniques to establish discriminant validity.

Convergent validity of reflective constructs

First, we examined the outer model loadings. Convergent validity can be established when the t-values of the outer model loadings are significant. In all cases but one (one ambivalence item), each latent variable’s indicators strongly converged on the latent variable and was highly significant, as summarised in Table 15. As a second check, we correlated the latent variable scores against the indicators as a form of factor loadings, and then examined the indicator loadings and cross-loadings to establish convergent validity. Although this approach is typically used to establish discriminant validity, convergent validity and discriminant validity are interdependent and help to establish each other. Convergent validity is also established when each loading for a latent variable is substantially higher than those for other latent variables. This is done by correlating the latent variable scores against the indicators as a form of factor loadings. Table 16 illustrates the loadings in italics. Based on this analysis, only the same indicator in ambivalence showed poor loading on its intended construct, in comparison to all other constructs.

Table 15 Outer-model weights t values of reflective items to test convergent validity
Table 16 Items in latent variable analysis for discriminant validity

Discriminant validity of reflective constructs

We also used two approaches to establish discriminant validity. First, like with convergent validity, we examined the factor loadings, but this time, wanted to ensure significant that overlap did not exist between the constructs (see Table 16). All loadings, excluding an item from following advice, were appropriate, given the dropped ambivalence indicator in the previous step.

Second, we used the approach of examining the square roots of the average variances extracted (AVEs), as summarised in Table 17. The basic standard followed here is that the square root of the AVE for any given construct (latent variable) should be higher than any of the correlations involving the construct. The numbers are shown in the diagonal for constructs (bolded). Strong discriminant validity was shown for all constructs.

Table 17 AVE analysis to establish discriminant validity

Factorial validity of formative constructs

Establishing factorial validity for formative indicators is more challenging than validating reflective indicators, because the established procedures which exist to determine the validity of reflective measures do not apply to formative measures (Gefen and Straub, 2004; Petter et al, 2007). Moreover, the procedures for validating formative measures are less known or well-established (Diamantopoulos and Winklhofer, 2001), although standards are beginning to emerge in IS research (Cenfetelli and Bassellier, 2009).

Validating items within formative measures is particularly challenging because these items can move in different directions from one another. Whereas reflective indicators must demonstrate considerably high correlations with each other (i.e., high conceptual overlap) to be valid internally, the indicators of a formative construct need not meet this criterion, and instead need to represent distinct facets of the overall construct being modelled (Bollen and Lennox, 1991; Diamantopoulos and Winklhofer, 2001; Petter et al, 2007). Reflective items are interchangeable, but formative items are not; hence, reliability measurements are not appropriate for formative constructs (Diamantopoulos and Winklhofer, 2001). Specifically, internal consistency examinations of formative constructs with Cronbach’s α and AVE calculations are not methodologically appropriate (Bagozzi, 1994; Marakas et al, 2007; Petter et al, 2007; Cenfetelli and Bassellier, 2009).

Researchers have traditionally used theoretical reasoning alone to support the validity of formative constructs (Diamantopoulos and Winklhofer, 2001). Over time, methodological approaches have emerged to improve the validation of formative constructs, such as the modified multitrait–multimethod approach and assessment of multicollinearity (Straub et al, 2004; Marakas et al, 2007; Petter et al, 2007). This foundation has been improved on in work by Cenfetelli and Bassellier (2009), which we follow for our validation process.

As an initial step, we assessed the absolute indicator contributions (i.e., zero-order correlations) of the individual items for service quality against the overall average of service quality. The idea is to improve internal validity by removing items not exhibiting a significant association with the overall construct (Diamantopoulos and Winklhofer, 2001; Cenfetelli and Bassellier, 2009). All of the items exhibited significant associations with the overall measure at the 0.05 level of significance. We also performed inter-item correlational diagnostics to assess whether there were high correlations among the formative indicators, as these can significantly weaken formative measures (Diamantopoulos and Siguaw, 2006). However, the biggest potential issue that must be addressed is multicollinearity (Cenfetelli and Bassellier, 2009). We thus we assessed the possibility of multicollinearity amongst all of the indicators (reflective and formative) in the model. Variance inflation factors (VIFs) less than 10 are traditionally viewed as justification for a model’s lack of multicollinearity, with 5.0 being ideal, but formative methodologists have recently called for a more stringent cut-off of less than 3.3 (Diamantopoulos and Siguaw, 2006; Petter et al, 2007; Cenfetelli and Bassellier, 2009).

A number of concerns emerged from this analysis. While all of the reflective indicators had VIFs of 5.0 or less, a few of the formative indicators were above the more stringent 3.3 cut-off. All such instances were found in trusting beliefs and trusting intentions, but these were second-order formative constructs made up of reflective subconstructs. However, given the extensive use and theory backing the second-order formative nature of these two constructs, we retained them in the model as specified by research, noting that small amounts of multicollinearity may obfuscate the results.

Establishing a lack of common-methods bias

To diminish the likelihood of common methods bias occurring in our data collection, we randomised items within the instrument so that participants would be less apt to detect underlying constructs, another potential source of common method bias (Cook and Campbell, 1979; Straub et al, 2004). However, all data were collected using a similar-looking online survey; thus, we still needed to test for common methods bias to establish that it was not a likely negative factor in the data remaining for our analysis. We used two approaches to increase validity and rigor.

The traditional approach to establishing lack of common methods bias is to conduct a Harman’s single factor test; however, the validity of this approach is increasingly under attack, and thus, we used a couple of stronger methods instead (Podsakoff et al, 2003; Pavlou et al, 2007).

The first approach was suggested by Podsakoff et al (2003), and adapted for PLS by Liang et al (2007). The objective of this technique is to measure the influence of a common latent method factor on each individual indicator in the model versus the influence of each indicator’s corresponding construct. To perform this technique in PLS, constructs of the theoretical model and their relationships are modelled as is normally conducted with two major additions: (1) A single-indicator construct is created for each indicator in the measurement model. Each subconstruct is then linked to each of the single-indicator constructs which comprise the subconstruct. This effectively makes each subconstruct in the model a second-order reflective construct. (2) A construct representing the method is created, reflectively composed of all indicators of the instrument. The method construct (the latent method factor) is then linked to each single-item construct. Based on this analysis the average substantively explained variance of the items is .833, while the average method-based variance is −.001. This results in a ratio of 637:1. In addition, most of the relationships between the items and the method-based construct were insignificant—indicating a lack of common-methods bias.

However, this approach by Liang et al (2007) is now under increase dispute as to its effectiveness. Thus, we used a second approach, which to simply examine a correlation matrix of the constructs and determine whether any of the correlations were above 0.90, which would be evidence that common method bias may exist (Pavlou et al, 2007). To be conservative, we conducted this analysis for the constructs and for the subconstructs. All construct correlations were below this threshold.

Manipulation checks

Two approaches were used for manipulation checks, as follows: (1) asking the participants if they noticed the manipulation and (2) statistical manipulation checks to see whether the treatments provided the desired manipulations. To assess the manipulation validity of the experiment, questions were added to the post-test to determine whether participants perceived their treatment manipulations. This elucidated whether the participants had noticed the process abnormalities, website design abnormalities and informational abnormalities. Table 18 shows the results of these manipulation questions. As can be seen, when asked whether participants perceived the manipulations, a majority was aware of it. However, a substantial portion of the manipulations were not perceived/remembered by the participants (see below). Nevertheless, these data were retained because they provide a more realistic test of our data. Straub et al suggest that although unmanipulated participants add additional variance to results, data for these participants may profitably be retained in the dataset to provide ‘a more robust testing of the hypotheses’ (2004, p. 408).

Table 18 Summary of manipulation checks – qualitative assessment

Several of the manipulations were relatively weak in comparison to the majority that was correctly perceived (the highlights in italics indicate the manipulations that were perceived with less than 50% accuracy). The most frequently under-perceived manipulation was the request for sexual orientation and mother’s maiden name (information abnormalities for treatments #4, 7 and 8). This manipulation was only accurately recalled once (treatment #3, 59%). Interestingly, while participants largely did not recall this manipulation, later analysis revealed that this type of abnormality did produce changes in overall trust. This shows that several of our manipulations were subtle, but in the end effective, providing all the more reason to retain all data, not just data which were properly perceived. Perhaps other manipulations of this type of abnormality would be more blatant and produce stronger results (e.g., Everard and Galletta, 2005). The downside of more blatant manipulations is giving up realism.

Two other treatments had less than expected perceived manipulations for informational abnormalities (#5 and 6). For the fifth treatment group, participants did not perceived the subtle shift from an Amazon shopping cart to that of Google, which is akin to a finding in the literature on change blindness (e.g., Levin and Simons, 1997; Silverman and Mack, 2006). Change blindness refers to individuals’ inability to notice changes in their current settings. Perhaps the change between two of the most major e-commerce shopping carts was too subtle for participants to perceive; again, later analysis indicates an effect from this manipulation despite the participants’ inability to perceive it. Likewise, participants did not correctly recall that no informational abnormalities existed, potentially because various other abnormalities were present. It is possible that the mixed signals in other areas resulted in a faulty recall of this one area that was not anomalous.

Higher than market prices were also incorrectly perceived in two treatment groups (#5 and 7), while they were correctly perceived in two other treatments (#2 and 8). Perhaps since the manipulation of high price was only marginal in comparison to low price, participants incorrectly perceived this manipulation (50% of the total), whereas all low price manipulations were correctly perceived. In the instances where the high price manipulation was not perceived, it is possible that such a manipulation may be due to other abnormalities present in the process which may have interfered with participants’ memories regarding price.

Finally, half of the treatment groups incorrectly recalled whether production-related information was being manipulated (treatments #2, 3, 4 and 6). Treatments #2, 3 and 4 incorrectly recalled that information was present about their products, despite the absence of such information (or the inclusion of information focussing deliberately on the wrong product– a car battery). Such inattention to detail may be attributed to the nature of the product being ‘purchased’ by the participants (i.e., rechargeable AA batteries). As participants are expected to be highly familiar with such items, it is possible that they largely ignored this information, as it would not factor into their buying decision.

Given that large portions of the participant sample were not aware of specific manipulations, this study also relies upon mean comparisons between treatment groups to assess the effectiveness of the manipulations. We conducted several rounds of comparative analysis, summarised in Tables 19, 20 and 21, which establish that the treatments mainly worked in the directions as intended.

Table 19 Summary of situational abnormality manipulation tests
Table 20 Summary of trust manipulations
Table 21 Summary of distrust manipulations

The means of the relevant constructs that were manipulated by the treatment groups are shown in Table 19. Each of the treatments significantly altered the levels of situational abnormality, which followed the study design. Specifically, the abnormality treatments (#2–5) reported even higher scores for situational abnormalities than the ambivalence treatments (#6–8). Table 19 indicates that all abnormality manipulations were significant and in the correct direction.

The same procedure was used to verify the trust manipulations found in treatments #3–5. These results are shown in Tables 20 and 21. Tables 20 and 21 indicate that all trust manipulations were significant and in the intended direction. For clarity, the trust dimension is highlighted with the corresponding manipulation, which is expected to be the lowest mean in the given column.

These results indicate that, with the notable exception of the deceit manipulation on integrity, the manipulations tended to produce the most pronounced results in their intended subdimensions of both trust and distrust. However, we note that all manipulations that contained some distrusting or negative cue (i.e., treatments #2–8) resulted in higher levels of distrust when compared with the control treatment. This indicates that the effects of the manipulation for a specific subdimension of distrust tend to bleed over to other subdimensions. This supports the assumption that intra-attribute ambivalence is likely not to be present in such relationships, as trusters do not distinguish between the subdimensions in great detail required for such ambivalence.

A multivariate analysis of variance of our manipulations onto trust, distrust and ambivalence shows that the manipulations significantly affected each of the dimensions of trust, distrust and ambivalence at the p = 0.000 level with the exception of price. Price showed significant results only with Roy’s largest root on these constructs (R = 0.032, F = 6.0, p = 0.016), whereas all other estimates were insignificant (Wilks’ lambda = 0.966, F = 12.0, p = 0.148; Lawley-Hoteling trace = 0.0354, F = 12.0, p = 0.146; Pillal’s trace = 0.034, F = 12.0, p = 0.151). Although price is not clearly shown to affect the results of trust, distrust or ambivalence, we retain it in our model due to the results shown above, and the significant effects it is found to have on the various dimensions in isolation.

We also regressed the effects of each manipulation of the study on the variables of interest to show the partial effects that each manipulation has on each dimension. The summarised results of these regressions are shown in Table 22. We note that the majority of the effects are highly significant.

Table 22 Regression results of manipulations on trust and distrust dimensions and ambivalence

Manipulations


The manipulations targeted process, information and website design abnormalities (i.e., mistakes). Each was manipulated as present – containing the listed errors, or absent– having no such errors. It was not the purpose of this study to explore what specific error causes what changes in a trust or distrust subdimension, but rather to ascertain that such a line of inquiry would be beneficial for future research. Based on previous literature (Everard and Galletta, 2005; Ou and Sia, 2010) and the results of our first pilot study, we identified the three general types of abnormalities that can be present on websites.

  1. 1.

    Process abnormality: an aspect of the typical buying process is disrupted.

    • Present: The buying process involves providing additional information that is not usually collected (e.g., mother’s maiden name, sexual orientation)

    • Absent: Shopping cart with credit card payment option as typically offered through most sites.

  2. 2.

    Information abnormality: information regarding the desired item/service is abnormal.

    • Present: Extremely low or high price in comparison to listed other sellers, missing product description, highly negative review and rating score, product description and name do not match displayed picture, or no sales history for the given seller

    • Absent: Comparable price to other listed sellers, commonly available description, expected customer reviews and ratings (average for sellers of this product)

  3. 3.

    Website design abnormality: can include extremely poor website design, errors and/or broken links that are not specifically relevant to the product/service information.

    • Present: Frequent and blatant misspellings, look-and-feel of webpage changes during the process

    • Absent: Consistent appearance throughout the entire process

Distrust manipulations consists of three levels: malevolence, incompetence and deceit. These were manipulated by providing customer feedback on the feedback page of the experiment which specifically manipulated that dimension only.

More details on experimental description

Participants were recruited from the two readily available subject pools at a large, public eastern US university. Initially, they were asked to complete a pre-experiment survey to gather stable personality characteristics (e.g., demographics, Internet experience and the dispositions to trust and distrust). Once participants completed the initial survey, they proceeded to an online survey containing the experimental manipulations, manipulation checks and post-manipulation survey.

Participants were told to imagine that they were buyers of a given product (i.e., battery pack) and that a given search provided the following scenario. They were asked to review the indicated screenshots and to respond to several questions concerning the attitudes and intentions that they would have if they had been making such a purchase. Each webpage was listed and described in the order that it appeared (screen shots of the webpages are given in Appendix 2).

First, participants viewed the main product page for the item that he or she was purchasing. This page contained an item picture, price, description and so on normally found on a product page. An initial view of the page was presented; then, additional zoomed-in portions of the page were presented to ensure that subjects became familiar with the information there (i.e., product description, price and seller information).

Second, customer reviews and ratings were displayed along with several comments from previous customers, such as those commonly found on Amazon.com. Like the product information page, portions of the customer ratings were zoomed into increase the likelihood of subjects being familiar with those portions of that page.

Third, subjects were shown a buyer’s information page, which requested personal and shipping information.

Fourth, subjects were shown a page where buyers would enter credit card and billing information. Finally, they were then shown a product confirmation page, which summarised the item, price, shipping and billing information.

To increase the likelihood of coexisting rival attitudes and potential ambivalence, several different yet important product attributes and dimensions were manipulated to be either normal or abnormal. Following research in ambivalence, several versions of the purchase process were utilised to focus on an overall attempted manipulation for normality, abnormality and ambivalence rather than focussing on specific manipulations of website factors. The abnormality manipulation groupings are summarised in Table 23.

Table 23 Summary of experimental manipulations

Finally, subjects proceeded to the instruments to respond to questions about distrusting and trusting beliefs, intentions and ambivalence in regards to this situation if they imagined themselves being buyers in this situation. They were also asked to provide their intentions concerning the seller and the website.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moody, G.D., Lowry, P.B. & Galletta, D.F. It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. Eur J Inf Syst 26, 379–413 (2017). https://doi.org/10.1057/s41303-016-0027-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41303-016-0027-9

Keywords

Navigation