IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v10y2008i1d10.1007_s10796-007-9035-6.html
   My bibliography  Save this article

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation

Author

Listed:
  • Janice C. Sipior

    (Villanova University)

  • Burke T. Ward

    (Villanova University)

Abstract

The class of software which is “surreptitiously installed on a user’s computer and monitors a user’s activity and reports back to a third party on that behavior” is referred to as spyware “(Stafford and Urbaczewski in Communications of the AIS 14:291–306, 2004)”. It is a strategic imperative that software vendors, who either embed surreptitious data collection and other operations in legitimate software applications or whose software is unwittingly used as a delivery vehicle for surreptitious operations, understand users’ perceptions of trust, privacy, and legal protection of such software to remain competitive. This paper develops and tests a research model to explore application software users’ perceptions in the use of software with embedded surreptitious operations. An experiment was undertaken to examine whether the presence of spyware in application software impacts users’ perceptions and beliefs about trustworthiness of the application software, privacy control of the software vendor, United States legal protection, and overall trust of the software vendor. The results indicate users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi-dimensional construct reveals a software vendor’s competence in appropriately using private user information collected and the user’s belief that the vendor will abide by acceptable principles in information exchange are important influences in gaining users’ overall trust in a vendor. User trust in software utilization is critical for a software vendor’s success because without it, users may avoid a vendor’s software should the presence of spyware be discovered. Software vendors should respond to the strategic necessity to gain users’ trust. Vendors must institute proactive and protective measures to demonstrate that their software should be trusted. These protections could take the form of technological approaches or government legislation, or both.

Suggested Citation

  • Janice C. Sipior & Burke T. Ward, 2008. "Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation," Information Systems Frontiers, Springer, vol. 10(1), pages 3-18, March.
  • Handle: RePEc:spr:infosf:v:10:y:2008:i:1:d:10.1007_s10796-007-9035-6
    DOI: 10.1007/s10796-007-9035-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-007-9035-6
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-007-9035-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Gefen, David & Straub, Detmar W., 2004. "Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services," Omega, Elsevier, vol. 32(6), pages 407-424, December.
    2. Gefen, David, 2000. "E-commerce: the role of familiarity and trust," Omega, Elsevier, vol. 28(6), pages 725-737, December.
    3. William H. DeLone & Ephraim R. McLean, 1992. "Information Systems Success: The Quest for the Dependent Variable," Information Systems Research, INFORMS, vol. 3(1), pages 60-95, March.
    4. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. I. Reay & P. Beatty & S. Dick & J. Miller, 2013. "Privacy policies and national culture on the internet," Information Systems Frontiers, Springer, vol. 15(2), pages 279-292, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Alisa Frik & Luigi Mittone, 2016. "Factors Influencing the Perceived Websites' Privacy Trustworthiness and Users' Purchase Intentions," CEEL Working Papers 1609, Cognitive and Experimental Economics Laboratory, Department of Economics, University of Trento, Italia.
    2. Chetan A. Jhaveri & Jitendra M. Nenavani, 2020. "Evaluation of eTail Services Quality: AHP Approach," Vision, , vol. 24(3), pages 310-319, September.
    3. Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
    4. Timm Teubner & Marc T. P. Adam & Florian Hawlitschek, 2020. "Unlocking Online Reputation," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 62(6), pages 501-513, December.
    5. Juan F. Tavera Mesías & Juan C. Sánchez Giraldo & Bernardo Ballesteros Díaz, 2011. "Aceptación del E-Commerce en Colombia: un estudio para la ciudad de Medellín," Revista Facultad de Ciencias Económicas, Universidad Militar Nueva Granada, December.
    6. Lucia-Palacios, Laura & Pérez-López, Raúl, 2021. "Effects of Home Voice Assistants' Autonomy on Instrusiveness and Usefulness: Direct, Indirect, and Moderating Effects of Interactivity," Journal of Interactive Marketing, Elsevier, vol. 56(C), pages 41-54.
    7. Matej Kovač & Vesna Žabkar, 2020. "Do Social Media and E-Mail Engagement Impact Reputation and Trust-Driven Behavior?," Tržište/Market, Faculty of Economics and Business, University of Zagreb, vol. 32(1), pages 9-25.
    8. Ronald Baganzi & Antonio K. W. Lau, 2017. "Examining Trust and Risk in Mobile Money Acceptance in Uganda," Sustainability, MDPI, vol. 9(12), pages 1-22, December.
    9. Nasser Hamidi & Tahmineh Torabi Rad & Alireza Jahany, 2012. "Evaluation Of Factors Influencing Tendency Towards E- Banking In Bank Customers," Far East Journal of Marketing and Management, Far East Research Centre, vol. 2(3), pages 25-42, August.
    10. Rajković, Borislav & Đurić, Ivan & Zarić, Vlade & Glauben, Thomas, 2021. "Gaining trust in the digital age: The potential of social media for increasing the competitiveness of small and medium enterprises," EconStor Open Access Articles and Book Chapters, ZBW - Leibniz Information Centre for Economics, vol. 13(4).
    11. Yunji Moon & Deborah J. Armstrong, 2020. "Service quality factors affecting customer attitudes in online-to-offline commerce," Information Systems and e-Business Management, Springer, vol. 18(1), pages 1-34, March.
    12. Nripendra P. Rana & Yogesh K. Dwivedi & Banita Lal & Michael D. Williams & Marc Clement, 2017. "Citizens’ adoption of an electronic government system: towards a unified view," Information Systems Frontiers, Springer, vol. 19(3), pages 549-568, June.
    13. Yubao Cui & Luca Cacciolatti & Patrick Woock & Yinghua Liu & Xuehe Zhang, 2016. "A Qualitative Exploratory Investigation on the Purchase Intention of Consumers Affected by Long-term Negative Advertising: A Case from the Chinese Milk Sector," Economia agro-alimentare, FrancoAngeli Editore, vol. 18(3), pages 263-282.
    14. Lian, Jiunn-Woei & Li, Ji, 2021. "The dimensions of trust:An investigation of mobile payment services in Taiwan," Technology in Society, Elsevier, vol. 67(C).
    15. Xuequn Wang & Mina Tajvidi & Xiaolin Lin & Nick Hajli, 2020. "Towards an Ethical and Trustworthy Social Commerce Community for Brand Value Co-creation: A trust-Commitment Perspective," Journal of Business Ethics, Springer, vol. 167(1), pages 137-152, November.
    16. Bonsón Ponte, Enrique & Carvajal-Trujillo, Elena & Escobar-Rodríguez, Tomás, 2015. "Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents," Tourism Management, Elsevier, vol. 47(C), pages 286-302.
    17. Shirazi, Farid & Hajli, Nick & Sims, Julian & Lemke, Fred, 2022. "The role of social factors in purchase journey in the social commerce era," Technological Forecasting and Social Change, Elsevier, vol. 183(C).
    18. Kyung Hwa Seo, 2020. "A Study on the Application of Kiosk Service as the Workplace Flexibility: The Determinants of Expanded Technology Adoption and Trust of Quick Service Restaurant Customers," Sustainability, MDPI, vol. 12(21), pages 1-16, October.
    19. Xusen Cheng & Fei Guo & Jin Chen & Kejiang Li & Yihui Zhang & Peng Gao, 2019. "Exploring the Trust Influencing Mechanism of Robo-Advisor Service: A Mixed Method Approach," Sustainability, MDPI, vol. 11(18), pages 1-20, September.
    20. Chieh-Peng Lin & Shwu-Chuan Chen & Chou-Kang Chiu & Wan-Yu Lee, 2011. "Understanding Purchase Intention During Product-Harm Crises: Moderating Effects of Perceived Corporate Ability and Corporate Social Responsibility," Journal of Business Ethics, Springer, vol. 102(3), pages 455-471, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:10:y:2008:i:1:d:10.1007_s10796-007-9035-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.