IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v10y2008i1d10.1007_s10796-007-9035-6.html
   My bibliography  Save this article

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation

Author

Listed:
  • Janice C. Sipior

    (Villanova University)

  • Burke T. Ward

    (Villanova University)

Abstract

The class of software which is “surreptitiously installed on a user’s computer and monitors a user’s activity and reports back to a third party on that behavior” is referred to as spyware “(Stafford and Urbaczewski in Communications of the AIS 14:291–306, 2004)”. It is a strategic imperative that software vendors, who either embed surreptitious data collection and other operations in legitimate software applications or whose software is unwittingly used as a delivery vehicle for surreptitious operations, understand users’ perceptions of trust, privacy, and legal protection of such software to remain competitive. This paper develops and tests a research model to explore application software users’ perceptions in the use of software with embedded surreptitious operations. An experiment was undertaken to examine whether the presence of spyware in application software impacts users’ perceptions and beliefs about trustworthiness of the application software, privacy control of the software vendor, United States legal protection, and overall trust of the software vendor. The results indicate users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi-dimensional construct reveals a software vendor’s competence in appropriately using private user information collected and the user’s belief that the vendor will abide by acceptable principles in information exchange are important influences in gaining users’ overall trust in a vendor. User trust in software utilization is critical for a software vendor’s success because without it, users may avoid a vendor’s software should the presence of spyware be discovered. Software vendors should respond to the strategic necessity to gain users’ trust. Vendors must institute proactive and protective measures to demonstrate that their software should be trusted. These protections could take the form of technological approaches or government legislation, or both.

Suggested Citation

  • Janice C. Sipior & Burke T. Ward, 2008. "Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation," Information Systems Frontiers, Springer, vol. 10(1), pages 3-18, March.
  • Handle: RePEc:spr:infosf:v:10:y:2008:i:1:d:10.1007_s10796-007-9035-6
    DOI: 10.1007/s10796-007-9035-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-007-9035-6
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-007-9035-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Gefen, David, 2000. "E-commerce: the role of familiarity and trust," Omega, Elsevier, vol. 28(6), pages 725-737, December.
    2. William H. DeLone & Ephraim R. McLean, 1992. "Information Systems Success: The Quest for the Dependent Variable," Information Systems Research, INFORMS, vol. 3(1), pages 60-95, March.
    3. Gefen, David & Straub, Detmar W., 2004. "Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services," Omega, Elsevier, vol. 32(6), pages 407-424, December.
    4. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. I. Reay & P. Beatty & S. Dick & J. Miller, 2013. "Privacy policies and national culture on the internet," Information Systems Frontiers, Springer, vol. 15(2), pages 279-292, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Alisa Frik & Luigi Mittone, 2016. "Factors Influencing the Perceived Websites' Privacy Trustworthiness and Users' Purchase Intentions," CEEL Working Papers 1609, Cognitive and Experimental Economics Laboratory, Department of Economics, University of Trento, Italia.
    2. Aladwani, Adel M. & Dwivedi, Yogesh K., 2018. "Towards a theory of SocioCitizenry: Quality anticipation, trust configuration, and approved adaptation of governmental social media," International Journal of Information Management, Elsevier, vol. 43(C), pages 261-272.
    3. Fernanda Leão Ramos & Jorge Brantes Ferreira & Angilberto Sabino de Freitas & Juliana Werneck Rodrigues, 2018. "The Effect of Trust in the Intention to Use m-banking," Brazilian Business Review, Fucape Business School, vol. 15(2), pages 175-191, March.
    4. Chetan A. Jhaveri & Jitendra M. Nenavani, 2020. "Evaluation of eTail Services Quality: AHP Approach," Vision, , vol. 24(3), pages 310-319, September.
    5. Mäenpää, Katariina & Kale, Sudhir H. & Kuusela, Hannu & Mesiranta, Nina, 2008. "Consumer perceptions of Internet banking in Finland: The moderating role of familiarity," Journal of Retailing and Consumer Services, Elsevier, vol. 15(4), pages 266-276.
    6. Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
    7. Jie Lv & Cong Cao & Qianwen Xu & Linyao Ni & Xiuyan Shao & Yangyan Shi, 2022. "How Live Streaming Interactions and Their Visual Stimuli Affect Users’ Sustained Engagement Behaviour—A Comparative Experiment Using Live and Virtual Live Streaming," Sustainability, MDPI, vol. 14(14), pages 1-18, July.
    8. Benedikt Berger & Martin Adam & Alexander Rühr & Alexander Benlian, 2021. "Watch Me Improve—Algorithm Aversion and Demonstrating the Ability to Learn," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 63(1), pages 55-68, February.
    9. Timm Teubner & Marc T. P. Adam & Florian Hawlitschek, 2020. "Unlocking Online Reputation," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 62(6), pages 501-513, December.
    10. Chang, Shuchih Ernest & Shen, Wei-Cheng & Liu, Anne Yenching, 2016. "Why mobile users trust smartphone social networking services? A PLS-SEM approach," Journal of Business Research, Elsevier, vol. 69(11), pages 4890-4895.
    11. Juan F. Tavera Mesías & Juan C. Sánchez Giraldo & Bernardo Ballesteros Díaz, 2011. "Aceptación del E-Commerce en Colombia: un estudio para la ciudad de Medellín," Revista Facultad de Ciencias Económicas, Universidad Militar Nueva Granada, December.
    12. Lucia-Palacios, Laura & Pérez-López, Raúl, 2021. "Effects of Home Voice Assistants' Autonomy on Instrusiveness and Usefulness: Direct, Indirect, and Moderating Effects of Interactivity," Journal of Interactive Marketing, Elsevier, vol. 56(C), pages 41-54.
    13. Idil ATASU & Aslıhan NASIR & Hande TURKER, 2021. "What is Important for Consumers in Wearable Medical Device (WMD) Usage Intention?," Journal of Emerging Trends in Marketing and Management, The Bucharest University of Economic Studies, vol. 1(1), pages 40-48, August.
    14. Matej Kovač & Vesna Žabkar, 2020. "Do Social Media and E-Mail Engagement Impact Reputation and Trust-Driven Behavior?," Tržište/Market, Faculty of Economics and Business, University of Zagreb, vol. 32(1), pages 9-25.
    15. Mpinganjira, Mercy & Maduku, Daniel K., 2019. "Ethics of mobile behavioral advertising: Antecedents and outcomes of perceived ethical value of advertised brands," Journal of Business Research, Elsevier, vol. 95(C), pages 464-478.
    16. Lu, Baozhou & Yi, Xiaoyang, 2023. "Institutional trust and repurchase intention in the sharing economy: The moderating roles of information privacy concerns and security concerns," Journal of Retailing and Consumer Services, Elsevier, vol. 73(C).
    17. Jeewon Cho & Insu Park, 2022. "Does Information Systems Support for Creativity Enhance Effective Information Systems Use and Job Satisfaction in Virtual Work?," Information Systems Frontiers, Springer, vol. 24(6), pages 1865-1886, December.
    18. Ronald Baganzi & Antonio K. W. Lau, 2017. "Examining Trust and Risk in Mobile Money Acceptance in Uganda," Sustainability, MDPI, vol. 9(12), pages 1-22, December.
    19. Miguens, Maria Jesús López & González-Vázquez, Encarnación & Turnes, Paloma Bernal, 2014. "Escala multinível e multidimensional para confiança on-line," RAE - Revista de Administração de Empresas, FGV-EAESP Escola de Administração de Empresas de São Paulo (Brazil), vol. 54(2), March.
    20. Nasser Hamidi & Tahmineh Torabi Rad & Alireza Jahany, 2012. "Evaluation Of Factors Influencing Tendency Towards E- Banking In Bank Customers," Far East Journal of Marketing and Management, Far East Research Centre, vol. 2(3), pages 25-42, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:10:y:2008:i:1:d:10.1007_s10796-007-9035-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.