Design Science and eTrust: Designing Organizational Artifacts as Nexus of Social and Technical Interactions

Chapter
Part of the Lecture Notes in Information Systems and Organisation book series (LNISO, volume 2)

Abstract

Our research aims to investigate an open problem: the difficulty to build a virtual system in which trust-relationships can be created and managed. To address this problem in a manner consistent with the Design Science (DS) approach, we design a model for trust-based interactions in online distributed networks (e.g., online collaborative environments) that takes into consideration both technical and social factors. Simultaneously considering artifact’s characteristics and individual behavior, we build our model on the consideration that technology and social aspects are not dichotomous, but rather inseparable [1]. The proposed model would offer a conceptual contribution in addressing the problem of generating and managing trust in distributed settings.

Keywords

Design science Digital trust eTrust Virtual collaboration Virtual teams 

References

  1. 1.
    Lee, A. (2000). Systems thinking, design science and paradigms. keynote address at the 11th ICIM. http://www.people.vcu.edu/~aslee/ICIM-keynote-2000.
  2. 2.
    Giustiniano, L., & Bolici, F. (2012). Organizational trust in a networked world: Analysis of the interplay between social factors and information and communication technology. Journal of Information, Communication and Ethics in Society, 10(3), 187–202.CrossRefGoogle Scholar
  3. 3.
    Simon, H. A. (1996). The sciences of the artificial. Cambridge: MIT Press.Google Scholar
  4. 4.
    Takeda, H., Veerkamp, P., & Yoshikawa, H. (1990). Modeling design process. AI magazine, 11(4), 37.Google Scholar
  5. 5.
    Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. Mis Quarterly, 28(1), 75–105.Google Scholar
  6. 6.
    Pries-Heje, J., & Baskerville, R. (2008). The design theory nexus. MISQ, 32(4), 731.Google Scholar
  7. 7.
    Carroll, J. M., & Kellogg, W. A. (1989). Artifact as theory-nexus: Hermeneutics meets theory-based design (Vol. 20). ACM.Google Scholar
  8. 8.
    March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision support systems, 15(4), 251–266.CrossRefGoogle Scholar
  9. 9.
    Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. JMIS, 24(3), 45–77.Google Scholar
  10. 10.
    Luhmann, N. (1979). Trust and power. New York: Wiley.Google Scholar
  11. 11.
    Thomas, R. (1994). What machines can’t do: Politics and technology in the industrial enterprise. CA: University of California Press.Google Scholar
  12. 12.
    Walsham, G. (2001). Knowledge management: The benefits and limitations of computer systems. European Management Journal, 19(6), 599–608.CrossRefGoogle Scholar
  13. 13.
    Kramer, R. M., & Tyler, T. R. (Eds.). (1996). Trust in organizations: Frontiers of theory and research. CA: Sage Publications.Google Scholar
  14. 14.
    McDermott, R. (2000). Why information technology inspired but cannot deliver knowledge management. In E. L. Lesser, M. A. Fontaine, & J. A. Slusher (Eds.), Knowledge and communities. Woburn: Butterworth-Heinemann.Google Scholar
  15. 15.
    Rousseau, D., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23, 393–404.CrossRefGoogle Scholar
  16. 16.
    Walsham, G., & Hayes, N. (2001). Participation in groupware-mediated communities of practice: A sociopolitical analysis of knowledge sharing. Information and Organization, 11, 263–288.CrossRefGoogle Scholar
  17. 17.
    Fehr, E. (2009). On the economics and biology of trust. Journal of the European Economic Association, 7(2–3), 235–266.CrossRefGoogle Scholar
  18. 18.
    Uslaner, E. (2004). Trust online, trust offline. Communications of the ACM, 47(4), 28–29.CrossRefGoogle Scholar
  19. 19.
    Brower, H. H., Scott, W., Lester, M., Korsgaard, A., & Dineen, B. R. (2009). A closer look at trust between managers and subordinates: Understanding the effects of both trusting and being trusted on subordinate outcomes. Journal of Management, 35(2), 327–347.CrossRefGoogle Scholar
  20. 20.
    Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.Google Scholar
  21. 21.
    Mcevily, B., Perrone, V., & Zaheer, A. (2003). Trust as an organizing principle. Organization Science, 14(1), 91–103.CrossRefGoogle Scholar
  22. 22.
    Chaudhuri, A., & Holbrook, M. B. (2001). The chain of effects from brand trust and brand affect to brand performance: The role of brand loyalty. The Journal of Marketing, 81–93.Google Scholar
  23. 23.
    Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding online purchase intentions: Contributions from technology and trust perspectives. European Journal of Information Systems, 12(1), 41–48.CrossRefGoogle Scholar
  24. 24.
    Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly, 30(3), 679–704.Google Scholar
  25. 25.
    Barber, B. (1983). The logic and limits of trust. New Brunswick: Rutgerts University Press.Google Scholar
  26. 26.
    Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Cambridge: Polity Press.Google Scholar
  27. 27.
    Giddens, A. (1990). The consequences of modernity. Cambridge: Polity Press.Google Scholar
  28. 28.
    Huff, L., & Kelley, L. (2003). Levels of organizational trust in individualist versus collectivist societies: A seven-nation study. Organization Science, 14(1), 81–91.CrossRefGoogle Scholar
  29. 29.
    Benbasat, I., Gefen, D., & Pavloua, A. (2008). Trust in online environments [special issue]. Journal of Management Information Systems, 24(4), 5–11, (spring).Google Scholar
  30. 30.
    Carnall, C. A. (1986). Toward a theory for the evaluation of organizational change. Human Relations, 39(8), 745–766.CrossRefGoogle Scholar
  31. 31.
    Markus, M. L., & Robey, D. (1988). Information technology and organizational change: Causal structure in theory and research. Management Science, 34(5), 583–598.CrossRefGoogle Scholar
  32. 32.
    Schoenberger, E. (1988). From Fordism to flexible accumulation: Technology, competitive strategies, and international location. Environment and Planning D: Society and Space, 6, 245–262.CrossRefGoogle Scholar
  33. 33.
    Bolici, F. (2011). The role of information sharing and social community in the evolution of collaborative food networks. Agribusiness and Information Management, 3(1), 1–10.Google Scholar
  34. 34.
    Weill, P., & Broadbent, M. (1998). Leveraging the new infrastructure. Cambridge: Harvard Business School Press.Google Scholar
  35. 35.
    Weiss, H. M., & Rupp, D. E. (2011). Envisioning a person-centric work psychology. Industrial and Organizational Psychology, 4(1), 138–143.CrossRefGoogle Scholar
  36. 36.
    Knoke, D., & Kuklinski, J. (1982). Network Analysis. CA: Sage.Google Scholar
  37. 37.
    Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in human behavior, 21(1), 105–125.CrossRefGoogle Scholar
  38. 38.
    Priem, R. L., & Nystrom, P. (2011). Exploring the dynamics of workgroup fracture: Common ground, trust-with-trepidation, and warranted distrust. June: Journal of Management.Google Scholar
  39. 39.
    Festré, A., & Giustiniano, L. (2011). Relational capital and appropriate incentives: A recipe for human resources sustainability. In Proceedings of the 2011 International Conference on Human Resources Development (pp. 101–112). 28–30 Sept 2011, Taiwan. Google Scholar
  40. 40.
    Rocco, E. (1998). Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact. In C. M. Karat, et al. (Eds.), Proceedings of the SIGCHI conference on Human factors in computing systems (CHI ‘98) (pp. 496–502). New York: ACM Press/Addison-Wesley Publishing Co.CrossRefGoogle Scholar
  41. 41.
    Wilson, J. M., Straus, S. G., & Mcevily, B. (2006). All in due time: The development of trust in computer-mediated and face-to-face teams. Organizational Behavior and Human Decision Processes, 99(1), 16–33.CrossRefGoogle Scholar
  42. 42.
    Bos N. et al. (2002). Effects of four computer-mediated communications channels on trust development. In Proceedings of the SIGCHI conference on Human factors in computing systems: Changing our world, changing ourselves (CHI ‘02) (pp. 135–140). ACM: New York.Google Scholar
  43. 43.
    Kimble, C. (2011). Building effective virtual teams: How to overcome the problems of trust and identity in virtual teams. Global Business and Organizational Excellence, 30(2), 6–15.CrossRefGoogle Scholar
  44. 44.
    Taddeo, M. (2009). Defining trust and E-trust: Old theories and new problems. International Journal of Technology and Human Interaction, 5(2), 23–35.CrossRefGoogle Scholar
  45. 45.
    Brown, J. S., & Duguid, P. (2001). Knowledge and organization: A social-practice perspective. Organization science, 198–213.Google Scholar
  46. 46.
    Jøsang, A., & Bewsell, G. (2010). Trust and trust management [special issue]. Journal of Theoretical and Applied Electronic Commerce Research, 5(2), I–II.Google Scholar
  47. 47.
    Deng, L., & Poole, M. S. (2010). Affect in web interfaces: A study of the impacts of web page visual complexity and order. MIS Quartely, 34, 711–730.Google Scholar
  48. 48.
    Vance, A., Alie-Dit-Cosaque, C., & Straub, D. (2008). Examining trust in information technology artifacts: The effects of system quality and culture. Journal of Management Information Systems, 24(4), 73–100.CrossRefGoogle Scholar
  49. 49.
    Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13–45.CrossRefGoogle Scholar
  50. 50.
    Neveen, F., & Ragowsky, A. (2008). Establishing trust in electronic commerce through online word of mouth: An examination across genders. Journal of Management Information Systems, 24(4), 101–121.CrossRefGoogle Scholar
  51. 51.
    Sia, L., Lim, K., Leung, K., Lee, M., & Benbasat, I. (2009). Web strategies to promote internet shopping: Is cultural-customization needed? MISQ, 33(3), 491–512.Google Scholar
  52. 52.
    Sun, T. (2011). The roles of trust and experience in consumer confidence in conducting e-commerce: A cross-cultural comparison between France and Germany. International Journal of Consumer Studies, 35, 330–337.CrossRefGoogle Scholar
  53. 53.
    Yoon, C. (2009). The effects of national cultural values on consumer acceptance of e-commerce. Online shoppers in China. Information and Management, 46, 294–301.CrossRefGoogle Scholar
  54. 54.
    Joinson, A. N., & Paine, C. B. (2007). Self- disclosure, privacy and the internet. In A. N. Joinson, K. McKenna, T. Postmes, & U. Reips (Eds.), Oxford handbook of internet psychology (pp. 237–252). Oxford: Oxford University Press.Google Scholar
  55. 55.
    Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26(3), 406–418.CrossRefGoogle Scholar
  56. 56.
    Tang, Z., Hu, Y., & Smith, M. D. (2008). Gaining trust through online privacy protection: Self-Regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24(4), 153–173.CrossRefGoogle Scholar
  57. 57.
    Verhagen, T., Meents, S., & Tan, Y. H. (2006). Perceived risk and trust associated with purchasing at electronic marketplaces. EJIS, 15, 542–555.Google Scholar
  58. 58.
    Gefen, D., Benbasat, I., & Pavlou, P. A. (2008). A research agenda for trust in online environments. Journal of Management Information Systems, 24(4), 275–286.CrossRefGoogle Scholar
  59. 59.
    Durante, M. (2010). What is the model of trust for multi-agent systems? Whether or not e-trust applies to autonomous agents. Knowledge, Technology, and Policy, 23(3–4), 347–366.CrossRefGoogle Scholar
  60. 60.
    Grodzinsky, F., Miller, K., & Wolf, M. (2011). Developing artificial agents worthy of trust: Would you buy a used car from this artificial agent? Ethics and information technology, 13(1), 17–27.CrossRefGoogle Scholar
  61. 61.
    Orlikowski, W. (1992). The duality of technology: Rethinking the concept of technology in organizations. Organization Science, 3(3), 398–427.CrossRefGoogle Scholar
  62. 62.
    Zuboff, S. (1988). In the age of the smart machine. New York: Basic Book.Google Scholar
  63. 63.
    Ciborra, C., & Hanseth, O. (2000). Introduction: From control to drift. In C. Ciborra, K. Braa, & A. Cordella (Eds.), From control to drift (pp. 1–11). Oxford: Oxford University Press.Google Scholar
  64. 64.
    Hanseth, O., & Monteiro, E. (1995). Social shaping of information infrastructure. In W. Orlikowski, et al. (Eds.), Information technology and changes in organizational work (pp. 325–343). London: Chapman and Hall.Google Scholar
  65. 65.
    Cropanzano, R. (2009). Writing nonempirical articles for Journal of Management: General thoughts and suggestions. Journal of Management, 35(6), 1304–1311.CrossRefGoogle Scholar
  66. 66.
    Murdoch, J. (1995). Actor-networks and the evolution of economic forms: Combining description and explanation in theories of regulation, flexible specialization, and networks. Environment and Planning A, 27(5), 731–757.CrossRefGoogle Scholar
  67. 67.
    Callon, M. (1986). Some elements of a sociology of translation. In J. Law (Ed.), Power, action, belief: A new sociology of knowledge? (pp. 196–233). London: Routledge and Kegan Paul.Google Scholar
  68. 68.
    Latour, B. (1987). Science in action. Milton Keynes: Open University Press.Google Scholar
  69. 69.
    Law, J. (1994). Organizing modernity. Oxford: Basil Blackwell.Google Scholar
  70. 70.
    Callon, M. (1991). Techno-economic networks and irreversibility. In J. Law (Ed.), A sociology of monsters: Essays on power technology and domination (pp. 132–161). London: Routledge.Google Scholar
  71. 71.
    Bolici, F. (2005), “Analyzing the link between technology and organizational knowledge from a social-practice perspective, Proceedings of EGOS’05 (European Group on Organizational Studies) (pp. 1–20). June 30th–July 2nd, Berlin.Google Scholar
  72. 72.
    Amin, A., & Thrift, N. (1992). Neo-Marshallian nodes in global networks. International Journal of Urban and Regional Research, 16, 571–587.CrossRefGoogle Scholar
  73. 73.
    Spagnoletti, P., Za, S., & D’Atri, A. (2007). Institutional trust and security, new boundaries for Virtual Enterprises. Paper presented at the 2nd International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems. 26 Mar 2007. Madeira, Portugal.Google Scholar
  74. 74.
    Webster, J. (1991). Advanced manufacturing technologies: Work organisation and social relations crystallized. In J. Law (Ed.), A sociology of monsters: Essays on power technology and domination (pp. 192–222). London: Routledge.Google Scholar
  75. 75.
    Dosi, G., & Salvatore, R. (1992). The structure of industrial production and the boundaries between firms and markets. In M. Storper & A. Scott (Eds.), Pathways to industrialization and regional development (pp. 171–195). London: Routledge.Google Scholar
  76. 76.
    Nelson, R., & Winter, S. (1982). An evolutionary theory of economic change. London: Harvard University Press.Google Scholar
  77. 77.
    Ciborra, C. U. (1996). Platform organization: Recombining strategies, structures, and surprises. Organization Science, 7(2), 103–118.CrossRefGoogle Scholar
  78. 78.
    Barret, M., Grant, D., & Wales, N. (2006). ICT and organizational change. The Journal of Applied Behavioral Science, 42(1), 6–22.CrossRefGoogle Scholar
  79. 79.
    Orlikowski, W. J., & Barley, S. R. (2001). Technology and institutions: What can research on information technology and research on organizations learn from each other? MIS Quarterly, 25(2), 145–165.CrossRefGoogle Scholar
  80. 80.
    Bauer, T. N., & Erdogan, B. (2010). Differentiated leader-member exchanges: The buffering role of justice climate. Journal of Applied Psychology, 95(6), 1104–1120.CrossRefGoogle Scholar
  81. 81.
    Clarioni, G., & Giustiniano, L. (2011). Outsourcing, business performance and vertical integration boundaries: An empirical analysis. Proceedings of the World Business and Social Science Research Conference. 27–28 Oct 2011, Las Vegas, USA, Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.DIAM-Orgalb, Visiting at IESEG Business SchoolUniversità degli Studi di Cassino e del Lazio MeridionaleParis-LilleItaly
  2. 2.DIMLuiss Guido Carli UniversityRomeItaly

Personalised recommendations