, Volume 45, Issue 1, pp 53–66 | Cite as

Vertrauen in digitale Transaktionen

  • Otto Petrovic
  • Markus Fallenböck
  • Christian Kittl
  • Thomas Wolkinger
WI - State-of-the-Art

The role of trust in digital transactions


Digital transactions are full of uncertainties and risks. The willingness to accept these uncertainties depends on whether we trust the other party, on the systems that support the transactions and the relevant controls. This article provides a framework for analyzing the ways in which trust works in the digital environment. It also categorizes existing approaches in the field of technological and legal systems of control and within trust enhancing services. Finally, it summarizes current issues that should be addressed by future research.


trust uncertainty security law business models competitive advantage digital economy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Barn91]
    Barney, J.B.: Firm resources and sustained competitive advantage? In: Journal of Management (1991) 17, S. 99–120.Google Scholar
  2. [BaHa94]
    Barney, J.B.; Hansen, M.H.: Trustworthiness as a source of competitive advantage. In: Strategic Management Journal (1994) 15, S. 175–190.Google Scholar
  3. [BaWZ99]
    Ba, Sulin; Whinston, A. B.; Zhang, H.: Building Trust in the Electronic Market Through an Economic Incentive Mechanism. Proceedings of The 20th Anniversary International Conference on Information Systems (ICIS). Charlotte, North Carolina, Dec. 12–15, 1999.Google Scholar
  4. [Bech02]
    Bechtold, S.: Vom Urheber- zum Informationsrecht. Implikationen des Digital Rights Management. München 2002.Google Scholar
  5. [BeSa89]
    Besen, S. M.; Saloner, G.: The Economics of Telecommunications Standards. In: Crandall, R.W.; Flamm, K. (Hrsg.): Changing the Rules: Technological Change, International Competition, and Regulation in Communications. Washington 1989, S. 177–220.Google Scholar
  6. [BiKa02]
    Biskup, J.; Karabulut, Y.: A hybrid PKI model with an application for secure mediation. Proceedings fot the 16th Annual IFIP WG 11.3 Working Conference. Cambridge 2002 im Erscheinen.Google Scholar
  7. [Bran00]
    Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates. Cambridge-London 2000.Google Scholar
  8. [BrPo00]
    Brenn, C.; Posch, R.: Signaturverordnung. Wien 2000.Google Scholar
  9. [Brun00]
    Brun, B.: Nature et impacts juridiques de la certification dans le commerce electronique sur Internet. In: Lex Electronica (2001) 7. Abruf am 2002–06–19.Google Scholar
  10. [Dema01]
    DeMaio, H. B.: B2B and beyond: New business models built on trust. New York et al 2001, S. 310–324.Google Scholar
  11. [Egge01]
    Egger, F. N.: Affective Design of E-Commerce User Interfaces: How to Maximise Perceived Trustworthiness. Proceedings of the International Conference on Affective Human Factors Design. London 2001.Google Scholar
  12. [EiGW00]
    Einwiller, S.; Geissler, U.; Will, M.: Engendering Trust in Internet Businesses Using Elements of Corporate Branding. In: Chung, M.: Proceedings of the 2000 Americas Conference on Information Systems. S. 733-739.Google Scholar
  13. [Fall01]
    Fallenböck, M.: Internet und Internationales Privatrecht. evolaris Band 1, Wien, New York 2001.CrossRefGoogle Scholar
  14. [FaHa02]
    Fallenböck, M.; Haberler, M.: Technische Schutzmaßnahmen und Urheberrecht in der Informationsgesellschaft. In: ecolex (2002) 4, S. 262–266.Google Scholar
  15. [FaHa01]
    Fallenböck, M.; Haberler, M.: Urheberrecht in der Digitalen Ökonomie, Arbeitspapier der evolaris Privatstiftung. Graz 2001.Google Scholar
  16. [FaSc99]
    Fallenböck, M.; Schwab, G.: Zu der Charakteristik und den Rechtswirkungen elektronischer Signaturen: Regelungsmodelle in den USA und Europa. In: Medien und Recht (MR) (1999) 6, S. 370–375.Google Scholar
  17. [FoMR00]
    Foresti, G.; Mahonen, Petri; Regazzoni, C. (Hrsg.): Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions. Kluwer Academic Publishers 2000.Google Scholar
  18. [Fuku02]
    Fukuyama, F.: Der große Aufbruch. München 2002.Google Scholar
  19. [Geor00]
    Georgi, D.: Kundenbindungsmanagement im Kundenbeziehungslebenszyklus. In: Bruhn, M.; Homburg, C. (Hrsg.): Handbuch Kundenbindungsmanagement. Wiesbaden 2000, S. 227–247.Google Scholar
  20. [GrKroJ]
    Grabner-Kräuter, S.: Die Bedeutung von Vertrauen im elektronischen Handel. In: Arnold, V. (Hrsg.): Wirtschaftsethische Perspektiven. Berlin im Erscheinen.Google Scholar
  21. [GTHM01]
    Günther, O.; Tamm, G.; Hansen, L.; Meseg, T.: Application Service Providers: Angebot, Nachfrage und langfristige Perspektiven. In: Wirtschaftsinformatik 43 (2001) 6, S. 555–567.Google Scholar
  22. [Hani16]
    Hanifan, L.J.: The Rural School and Community Center. In: Annals of the American Academy of Political and Social Science 67 (1916), S. 130–138.Google Scholar
  23. [HeHa01]
    Henning-Thurau, Th.; Hansen, U.: Relationship Marketing: Gaining Competitive Advantage Through Customer Satisfaction and Customer Retention. Berlin-Heidelberg 2001.Google Scholar
  24. [HeKi00]
    Heussen, B.; Kilian, W.: Computerrechtshandbuch. München 2000.Google Scholar
  25. [HoSi01]
    Hoeren, T.; Sieber, U.: Handbuch Multimedia-Recht. München 2001.Google Scholar
  26. [JaGJ97]
    Jacobson, I.; Griss, M.; Jonsson, P.: Software Reuse: Architecture Process and Organization for Business Success. Addison-Wesley 1997.Google Scholar
  27. [KiPo01]
    Killmann, W.; Posch, R.: Sichere Signaturerstellung — Basis europaweit anerkannter elektronsicher Signaturen. Proceedings of Smartcard-Workshop 2001, GMD. Darmstadt 2001.Google Scholar
  28. [KlCA78]
    Klein, B.; Crawford, R. A.; Alchian, A. A.: Vertical integration, appropriable rents, and the competitive contracting process. In: Journal of Law and Economics 21 (1978), S. 297–326.Google Scholar
  29. [Koch00]
    Koch, F.: Computervertragsrecht. Berlin 2000.Google Scholar
  30. [Kösz01]
    Köszegi, S.: Vertrauen in virtuellen Unternehmen. Wiesbaden 2001.Google Scholar
  31. [Lano97]
    Lano, K.: Formal Object-Oriented Development. Springer 1997.Google Scholar
  32. [Luhm00]
    Luhmann, N.: Vertrauen. Ein Mechanismus zur Reduktion sozialer Komplexität. Stuttgart 2000.Google Scholar
  33. [Marl00]
    Marly, J.: Softwareü berlassungsverträge. München 2000.Google Scholar
  34. [MaYB87]
    Malon, T. W.; Yates, J. A.; Benjamin, R. I.: Electronic markets and electronic hierarchies. In: Communications of the ACM 30 (1987) 6, S. 484–497.Google Scholar
  35. [McCh00]
    McKnight, D.H.; Chervany, N.L.: What is Trust? A Conceptual Analysis and an Interdisciplinary Model. In: M.H. Chung (Hrsg.): Proceedings of the 2000 Americas Conference on Information Systems, Aug. 10-13, Long Beach, CA.Google Scholar
  36. [Meta01]
    Meta Group: Security im E-Business Zeitalter. 2001.Google Scholar
  37. [MoDr02]
    Moritz, H.-W.; Dreier, T.: Rechts-Handbuch zum E-Commerce. Köln 2002.Google Scholar
  38. [NoLe02]
    Nolde, V.; Leger, L. (Hrsg.): Biometrische Verfahren. Deutscher Wirtschaftsdienst, 2002.Google Scholar
  39. [OMTy97]
    OMalley, L.; Tynan, C.: A Reappraisal of Relationship Marketing Constructs of Commitment and Trust. In: AMA (Hrsg.): New and Evolving Paradigms. The Emerging Future of Marketing}, Dublin 1997, S. 486–503.Google Scholar
  40. [Pavl00]
    Pavlicek, R.: Embracing Insanity: Open Source Software Development. Sams, 2000.Google Scholar
  41. [PeKT01]
    Petrovic, O.; Kittl, C.; Teksten, R. D.: Developing Business Models for eBusiness. Proceedings of the International Conference on Electronic Commerce, 31.10.2001-4.11.2001. Vienna 2001.Google Scholar
  42. [Pelt01]
    Peltier, Thomas R.: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press 2001.CrossRefGoogle Scholar
  43. [Pete96]
    Petermann, F.: Psychologie des Vertrauens. Göttingen et al. 1996.Google Scholar
  44. [Pete97]
    Peter, S. I.: Kundenbindung als Marketingziel: Identifikation und Analyse zentraler Determinanten. Wiesbaden 1997.Google Scholar
  45. [PiDF99]
    Picot, A.; Dietl, H; Frank, E.: Organisation: eine ökonomische Perspektive. Stuttgart 1999, S. 67f.Google Scholar
  46. [PiRW01]
    Picot, A.; Reichwald, R.; Wigand, R. T.: Die grenzenlose Unternehmung: Information, Organisation und Management. Wiesbaden 2001.Google Scholar
  47. [PoLe01]
    Posch, R.; Leitold, H.: Digitale Signaturen in der Praxis. In: Informatik 2001, Wirtschaft und Wissenschaft in der Network Economy -Visionen und Wirklichkeit, Tagungsband zur Jahrestagung der OCG. Wien 2001.Google Scholar
  48. [Port01]
    Porter, M.: Strategy and the Internet. In: Harvard Business Review (2001) 3, S. 63–78.Google Scholar
  49. [Prad96]
    Pradhan, D. K.: Fault-Tolerant Computer System Design. Prentice Hall, 1996.Google Scholar
  50. [Pric00]
    PricewaterhouseCoopers und Information-Week, IT-Security: Wo sind Ihre Schwachstellen? 2000.Google Scholar
  51. [Pütz01]
    Pützhoven, A.: Europäischer Verbraucherschutz im Fernabsatz. München 2001.Google Scholar
  52. [Resn00]
    Resnick, P.; et al: Reputations Systems. In: Comunications of the ACM 43 (2000) 12, S. 45–48.Google Scholar
  53. [RePM02]
    Reitsma, R; Pearce F.; de Montign, E.: Experience: The Key to Online Security Issues. Forrester Research Inc. 2002.Google Scholar
  54. [Resc00]
    Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison Wesley Professional 2000.Google Scholar
  55. [Ripp98]
    Ripperger, T.: Ökonomik des Vertrauens. Analyse eines Organisationsprinzips. Tübingen 1998.Google Scholar
  56. [RoSi98]
    Rousseau, D.M.; Sitkin, S.B.: Not so different after all: A cross-discipline of trust. In: Academy of Management Review (1998) 23, Juli, S. 393–404.Google Scholar
  57. [Schm01]
    Schmeh, K.: Kryptografie und Public-Key Infrastrukturen im Internet. dpunkt-Verlag, Heidelberg 2001.Google Scholar
  58. [Schu00]
    Schubert, P.: The Pivotal Role of Community Building in Electronic Commerce. Proceedings of the Hawaii International Conference on Systems Sciences 2000.Google Scholar
  59. [ScMD02]
    Schuster, F.; Müller U.; Drewes, S.: Entwicklung des Internet- und Multimediarechts von April bis Dezember 2001. In: MultiMedia und Recht (MMR) (2002) 3, S. 3ff.Google Scholar
  60. [ShVa99]
    Shapiro, C.; Varian, H. R.: Information rules: A strategic Guide to the Network Economy. Boston, MA, 1999.Google Scholar
  61. [Sitt01]
    Sitte, G.: Technology Branding. Strategische Markenpolitik für Investitionsgüter. Wiesbaden 2001.Google Scholar
  62. [Spin01]
    Spindler, G.: Grenzüberschreitende elektronische Rechtsgeschäfte. In: Hohloch, G (Hrsg.): Recht und Internet, Baden-Baden 2001.Google Scholar
  63. [Spre88]
    Spremann, K.: Reputation, Garantie, Information. In: ZfB, 58 (1988) 5/6, S. 613–629.Google Scholar
  64. [Sydo96]
    Sydow, J.: Virtuelle Unternehmung. Erfolg als Vertrauensorganisation? In: Office Ma-nagement.44 (1996) 7/8, S. 10–13.Google Scholar
  65. [TaTh00]
    Tan, Y.-H.; Thoen, W.: A Logical Model of Trust in Electronic Commerce. In: Electronic Markets 10(4) (2000), S. 258–263Google Scholar
  66. [Voge01]
    Vogel, C.: Urheberrechtsschutz im digitalen Zeitalter. Diplomarbeit an der Technischen Universität Graz 2001.Google Scholar
  67. [Walg00]
    Walgenbach, P.: Das Konzept der Vertrauensorganisation. In: Die Betriebswirtschaft 60 (2000) 6, S. 707–720.Google Scholar
  68. [Wand01]
    Wand, P.: Technische Schutzmaßnahmen und Urheberrecht. München 2001.Google Scholar
  69. [Will85]
    Williamson, O. E.: The Economic Institutions of Capitalism. New York 1985.Google Scholar


  1. [Alco02]
    Alcove:, Abruf am 2002–06–25.Google Scholar
  2. [AsSW96]
    Askona, N.; Schuntner, M.; Waidner, M.: Optimistic Protocols for fair exchange., Abruf am 2002–14–09.Google Scholar
  3. [Amaz02]
    Amazon Sicherheitsgarantie:, Abruf am 2002–06–26.Google Scholar
  4. [asig02]
    a-sign:, Abruf am 2002–06–25.Google Scholar
  5. [Boni02]
    Bonitrus:, Abruf am 2002–06–19.Google Scholar
  6. [CENI02]
    CEN/ISSS:,Abrufam2002–06–01.Google Scholar
  7. [Comm02]
    CommerceNet: Barriers to Electronic Commerce., Abruf am 2002–03–15.Google Scholar
  8. [Cryp02]
    Cryp Tool:, Abruf am 2002–06–25.Google Scholar
  9. [DATA02]
    DATAKOM Austria GmbH:, Abruf am 2002–06–24.Google Scholar
  10. [Date02]
    Datenschutz-Gütesiegel „Vom Datenschutz empfohlen”, Schleswig Holstein:, Abruf am 2002–06–19.Google Scholar
  11. [Dell02]
    Dell Computer Corporation:, Abruf am 2002–06–19.Google Scholar
  12. [Deut02]
    Deutsche Bank 24:, Abruf am 2002–06–25.Google Scholar
  13. [eBay02a]
    eBay:, Abruf am 2002–06–19.Google Scholar
  14. [eBay02b]
    eBay, Integration von iloxx Safetrade:, Abruf am 2002–07–01.Google Scholar
  15. [EBTW02]
    eBusiness Transition Working Group:, Abruf am 2002–06–24.Google Scholar
  16. [EBTW02a]
    eBusiness Transition Working Group:, Abruf am 2002–06–24.Google Scholar
  17. [ebXM02]
    ebXML Joint Coordination Committee:, Abruf am 2002–06–24.Google Scholar
  18. [Enge02]
    Engel, Ch.: Vertrauen: ein Versuch. Preprints aus der Max-Planck-Projektgruppe Recht der Gemeinschaftsgüter., Abruf am 2002–03–15.Google Scholar
  19. [EESS02]
    European Electronic Signature Standardization Initiative:, Abruf am 2002–06–24.Google Scholar
  20. [Epin02], Abruf am 2002–06–19.Google Scholar
  21. [Fair02]
    Fair Pay:, Abruf: 2002–06–25.Google Scholar
  22. [FME02]
    Formal Methods Europe:, Abrufam2002–06–22.Google Scholar
  23. [FME02]
    Formal Methods Europe:, Abruf am 2002–06–22.Google Scholar
  24. [Forr02]
    Forrester Research:, Abruf am 2002–06–26.Google Scholar
  25. [FSF02]
    Free Software Foundation Inc.:, Abruf am 2002–06–24.Google Scholar
  26. [FSF02a]
    Free Software Foundation Inc.:, Abruf am 2002–06–24.Google Scholar
  27. [GI02]
    Gesellschaft für Informatik e.V.:, Abruf am 2002–09–14.Google Scholar
  28. [Hewl02]
    Hewlett-Packard Company:, Abruf am 2002–06–26.Google Scholar
  29. [HuZh02]
    Hu, X.; Lin, Z., Zhang, H.: Myth or Reality: Effect of Trust-Promoting Seals in Electronic Markets. In: The Proceedings of WITS 2001, 15.12.−16.12. 2001, New Orleans, pp. 65-70., Abruf am 2002–06–19.Google Scholar
  30. [HuWZ02]
    Hu, X.; Lin, Z.; Whinston, A.; Zhang, H.: Perceived Risk and Escrow Adoption: An Economic Analysis in Online Consumer-to-Consumer Auction Markets. In: The Proceedings of WITS 2001, 15.12.−16.12. 2001, New Orleans, pp. 71-76., Abruf am 2002–06–18.Google Scholar
  31. [Hypo02]
    HypoVereinsbank:, Abrufam2002–06–25.Google Scholar
  32. [IACR02]
    International Association for Cryptologic Research:, Abruf am 2002–06–23.Google Scholar
  33. [IFIP02]
    International Federation for Information Processing:, Abruf am 2002–06–22.Google Scholar
  34. [ISSE02]
    International Systems Security Engineering Association:, Abruf am 2002–06–25.Google Scholar
  35. [ITU02]
    International Telecommunication Union:, Abruf am 2002–06–24.Google Scholar
  36. [Insu02]
    Insuretrust:, Abruf am 2002–06–25.Google Scholar
  37. [Kuwa02]
    Kuwabara, K.: Linux: A Bazaar at the Edge of Chaos. In: First Monday (2000) 3,, Abruf am 2002–06–18.Google Scholar
  38. [Micr02]
    Microsoft Corporation:, Abruf am 2002–06–19.Google Scholar
  39. [Micr02a]
    MicrosoftDeveloper Network:, Abruf am 2002–06–25.Google Scholar
  40. [Nets02]
    Netscape:, Abruf am 2002–06–24.Google Scholar
  41. [NIAP02]
    National Information Assurance Partnership:, Abruf am 2002–06–25.Google Scholar
  42. [Noki02]
    Nokia:, Abruf am 2002–06–19. Nokia erzielte beim „Trusted Brand Survey”, der 2002 in 18 Ländern Europas durch-gefü hrt wurde, die hö chste Einzelwertung (Readers Digest „Trusted Brand”: Scholar
  43. [OBI02]
    OBI Consortium:, Abruf am 2002–06–24.Google Scholar
  44. [OSI02]
    Open Source Initiative:, Abruf am 2002–06–24.Google Scholar
  45. [OSI02a]
    Open Source Initiative:, Abruf am 2002–06–24.Google Scholar
  46. [Open02]
    OpenPGP:, Abruf am 2002–06–25.Google Scholar
  47. [Netw02]
    Network Associates:, Abruf am 2002–06–24.Google Scholar
  48. [Pich02]
    Pichler, R.: Trust and Reliance-Enforcement and Compliance: Enhancing Consumer Confidence in the Electronic Marketplace. Dissertation an der Stanford Law School, Mai 2000,, Abruf am 2002–06–25.Google Scholar
  49. [RöPe99]
    Röhm, A.; Pernul, G.: COPS: A Model and Infrastructure for Secure and Fair Electronic Markets., Abruf amGoogle Scholar
  50. [SCC02]
    Supply-Chain Council Inc.:, Abruf am 2002–06–25.Google Scholar
  51. [ScMD02]
    Schuster, F.; Müller, Ulf; Drewes S.: Entwicklung des Internet- und Multimediarechts von April bis Dezember 2001: In: MultiMedia und Recht-Beilage (MMR) (2002) 3, S. 3-44.Google Scholar
  52. [SITT02]
    Sparkassen Internet Treuhand Transaktionen:, Abruf am 2002–06–25.Google Scholar
  53. [Squa02]
    SquareTrade: www., Abruf am 2002–06–19.Google Scholar
  54. [SUN02]
    Sun Microsystems Inc.:, Abruf am 2002–06–24.Google Scholar
  55. [Trus02]
    Trusted Shops:, Abruf am 2002–04–18.Google Scholar
  56. [Trus02]
    Trusted Trade:, Abruf am 2002–06–25.Google Scholar
  57. [UDDI02]
    UDDI Program Management Team:, Abruf am 2002–06–24.Google Scholar
  58. [VHeu02]
    van den Heuvel, E.: Online Dispute Resolution as a Solution to Cross-Border E-Disputes. An Introduction to ODR. Joint Conference of the OECD Building Trust in the Online Environment: Business-to-Consumer Dispute Resolution, 11.12.−12.12.2000, The Hague,, Abruf am 2002–06–18.Google Scholar
  59. [Visa02]
    Visa, Zero Liability Policy:, Abruf am 2002-06-26.Google Scholar
  60. [Webt02]
    WebTrust:, Abruf am 2002-06-19.Google Scholar
  61. [Worl02]
    WorldPay: german, Abruf am 2002-06-25.Google Scholar
  62. [WWWC02]
    World Wide Web Consortium:, Abruf am 2002-06-24.Google Scholar
  63. [WWWC02a]
    World Wide Web Consortium:, Abruf am 2002-06-24.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2003

Authors and Affiliations

  • Otto Petrovic
    • 1
  • Markus Fallenböck
    • 1
  • Christian Kittl
    • 1
  • Thomas Wolkinger
    • 1
  1. 1.Karl-Franzens-Universität Graz und evolaris PrivatstiftungGrazÖsterreich

Personalised recommendations