Electronic Commerce Research

, Volume 14, Issue 4, pp 459–496 | Cite as

An examination of trust assurances adopted by top internet retailers: unveiling some critical determinants



This paper investigates the different trust assurances adopted by internet retailers and tries to identify a link between the characteristics of an online vendor (i.e., cost of merchandise sold, reputation, offline presence, etc...) and the specific types of trust assurances applied. The findings demonstrate that e-retailers with a relatively stronger reputation rely more on internally provided e-assurance mechanisms, such as a privacy policy or a money back guarantee, and that they make less use of third party trust endorsements. Internally-provided e-assurances also appear to be utilized more by e-retailers putting more expensive products on the market and less by those selling cheaper products. The findings regarding externally-provided e-assurances also show that third party trust endorsements such as privacy seals, security seals and award seals are adopted almost exclusively by e-retailers who sell more expensive products as compared to those selling products lower in monetary value. The results demonstrate that these findings regarding the impact of the ‘monetary value of goods traded’ on the adoption of externally-provided e-assurances remain valid when controlling for ‘reputation’ and ‘offline presence’. The results also reveal that total seal investments are higher among e-commerce companies with a weaker ‘reputation’, among those ‘without offline presence’, and among e-tailers selling relatively ‘more expensive merchandise’.


Trust assurances Trust seals B2C e-commerce Content analysis 



We would like to thank the anonymous reviewers and the editor for their helpful and constructive suggestions. Special thanks for Prof. dr. Jaafar El-Murad (Head of Department of Business Strategy and Marketing at University of Westminster, London) for proofreading and correcting the English.


  1. 1.
    Aljukhadar, M., Senecal, S., & Ouellette, D. (2010). Can the media richness of a privacy disclosure enhance outcome? A multifaceted view of trust in rich media environments. International Journal of Electronic Commerce, 14(4), 103–126.CrossRefGoogle Scholar
  2. 2.
    Antón, A. I., Bertino, E., Li, N., & Yu, T. (2007). A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7), 109–116.CrossRefGoogle Scholar
  3. 3.
    Arthur, C., & Halliday, J. (2010). Amazon UK goes offline amid threats of cyber attacks. Guardian.co.uk (December 12, 2010). http://www.guardian.co.uk/technology/2010/dec/12/amazon-uk-offline-christmas. Accessed 20 December 2010.
  4. 4.
    Ba, S., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behaviour. MIS Quarterly, 26(3), 243–268.CrossRefGoogle Scholar
  5. 5.
    Bahmanziari, T., Odom, M. D., & Ugrin, J. C. (2009). An experimental evaluation of the effects of internal and external e-Assurance on initial trust formation in B2C e-commerce. International Journal of Accounting Information Systems, 10(3), 152–170.CrossRefGoogle Scholar
  6. 6.
    BBBOnline.com. (2011). Accredited membership fees for retail & service industry. http://manitoba.bbb.org/WWWRoot/SitePage.aspx?site=159&id=85f5430f-5705-41e2-8720-c1196a33acf9. Accessed 31 August 2011.
  7. 7.
    Bhatnagar, A., Misra, S., & Rao, H. R. (2000). On risk, convenience, and Internet shopping behavior. Communications of the ACM, 43(11), 98–105.CrossRefGoogle Scholar
  8. 8.
    Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision Support Systems, 50(3), 602–613.CrossRefGoogle Scholar
  9. 9.
    Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117–141.CrossRefGoogle Scholar
  10. 10.
    Chen, S. C., & Dhillon, G. S. (2003). Interpreting dimensions of consumer trust in e-commerce. Information Technology and Management, 4(2), 303–318.CrossRefGoogle Scholar
  11. 11.
    Chen, J., & Dibb, S. (2010). Consumer trust in the online retail context: Exploring the antecedents and consequences. Psychology and Marketing, 27(4), 323–346.CrossRefGoogle Scholar
  12. 12.
    Clemons, E. K. (2007). An empirical investigation of third-party seller rating systems in e-commerce: The case of buySAFE. Journal of Management Information Systems, 24(2), 43–71.CrossRefGoogle Scholar
  13. 13.
    Demangeot, C., & Broderick, A. J. (2010). Consumer perceptions of online shopping environments: A gestalt approach. Psychology & Marketing, 27(2), 117–140.CrossRefGoogle Scholar
  14. 14.
    Demery, P. (2010a). Hackers attack e-retailers on peak shopping days. InternetRetailer.com (December 16, 2010). http://www.internetretailer.com/2010/12/16/hackers-attack-e-retailers-peak-shopping-days. Accessed 20 December 2010.
  15. 15.
    Demery, P. (2010b). Return policies can win over customers, and there’s more than one path to success. InternetRetailer.com (March 31, 2010). http://www.internetretailer.com/2010/03/31/get-back. Accessed 20 January 2011.
  16. 16.
    Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of price, brand, and store information on buyers’ product evaluations. Journal of Marketing Reseearch, 28(3), 307–319.CrossRefGoogle Scholar
  17. 17.
    Eastlick, M. A., & Lotz, S. (2011). Cognitive and institutional predictors of initial trust toward an online retailer. International Journal of Retail & Distribution Management, 39(4), 234–255.CrossRefGoogle Scholar
  18. 18.
    Fisher, R., & Chu, S. Z. (2009). Initial online trust formation: The role of company location and web assurance. Managerial Auditing Journal, 24(6), 542–563.CrossRefGoogle Scholar
  19. 19.
    Ganguly, B., Dash, B. S., Cyr, D., & Head, M. (2010). The effects of website design on purchase intention in online shopping: The mediating role of trust and the moderating role of culture. International Journal of Electronic Business, 8(4/5), 302–330.CrossRefGoogle Scholar
  20. 20.
    Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127–140.CrossRefGoogle Scholar
  21. 21.
    Gavish, B., & Tucci, C. L. (2008). Reducing internet action fraud. Communications of the ACM, 51(5), 89–97.CrossRefGoogle Scholar
  22. 22.
    Gavish, B., & Sobol, M. (2010). Warranty policy impact on net revenues as a function of part replacements and optional purchases. International Journal of Information Technology & Decision Making, 9(4), 507–523.CrossRefGoogle Scholar
  23. 23.
    Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.Google Scholar
  24. 24.
    Griffith, E. (2008). Amazon.com web site down. AppScout.com (June 6, 2008). http://www.appscout.com/2008/06/amazoncom_web_site_down.php. Accessed 20 December 2010.
  25. 25.
    Hackett, L. (2009). Consumer Reports survey: One in five online consumers has been victims of cybercrime. Consumer Reports (May 4, 2009). http://www.consumersunion.org/pub/core_financial_services/011331.html. Accessed 01 February 2011.
  26. 26.
    Hahn, K. H., & Kim, J. (2009). The effect of offline brand trust and perceived internet confidence on online shopping intention in the integrated multi-channel context. International Journal of Retail & Distribution Management, 37(2), 126–141.CrossRefGoogle Scholar
  27. 27.
    Hayes, A. F., & Krippendorff, K. (2007). Answering the call for a standard reliability measure for coding data. Communication Methods and Measures, 1(1), 77–89.CrossRefGoogle Scholar
  28. 28.
    Head, M. M., & Hassanein, K. (2002). Trust in e-commerce: Evaluating the impact of third-party seals. Quarterly Journal of Electronic Commerce, 3(3), 307–325.Google Scholar
  29. 29.
    Herzberg, A., & Jbara, A. (2008). Security and identification indicators for browsers against spoofing and phishing attacks. ACM Transactions on Internet Technology, 8(4), 1–35.CrossRefGoogle Scholar
  30. 30.
    Hiller, J. S. (2010). The regulatory framework for privacy and security. In J. Hunsinger, L. Klastrup, & A. Matthew (Eds.), International Handbook of Internet Research (pp. 251–266). Virginia, USA: Springer.Google Scholar
  31. 31.
    Hu, Z., Lin, Z., & Zhang, H. (2002). Trust-promoting seals in electronic markets: An exploratory study of their effectiveness for online sales promotion. Journal of Promotion Management, 9(1–2), 163–180.Google Scholar
  32. 32.
    Hu, X., Wu, G., Wu, Y., & Zhang, H. (2010). The effects of Web assurance seals on consumers’ initial trust in an online vendor: A functional perspective. Decision Support Systems, 48(2), 407–418.Google Scholar
  33. 33.
    Huang, P., Lurie, N. H., & Mitra, S. (2009). Searching for experience on the Web: An empirical examination of consumer behavior for search and experience goods. Journal of Marketing, 73(2), 55–69.CrossRefGoogle Scholar
  34. 34.
    Huffman, M. (2010). Software company sold children’s chats to marketers. ConsumerAffairs.com (September 15, 2010). http://www.consumeraffairs.com/news04/2010/09/software_company_sold_childrens_chats_to_marketers.html. Accessed 04 February 2011.
  35. 35.
    Internet Crime Complaint Center. (IC3) Internet crime report. FBI IC3 (2009). http://www.ic3.gov/media/annualreports.aspx. Accessed 20 December 2010.
  36. 36.
    InternetRetailer. (2010). Top 500 Guide. http://www.internetretailer.com/top500/list/. Accessed 23 August 2010.
  37. 37.
    Jack, E. P., Powers, T. L., & Skinner, L. (2009). Reverse logistics capabilities: Antecedents and cost savings. International Journal of Physical Distribution and Logistics Management, 40(3), 228–246.Google Scholar
  38. 38.
    Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1(1/2), 45–71.CrossRefGoogle Scholar
  39. 39.
    Kaplan, S. E., & Nieschwietz, R. J. (2003). A Web assurance model of trust for B2C e-commerce. International Journal of Accounting Information Systems, 4(2), 95–114.CrossRefGoogle Scholar
  40. 40.
    Karimov, F. P., & Brengman, M. (2011). Adoption of social media by online retailers: Assessment of current practices and future directions. International Journal of E-Entrepreneurship and Innovation, 2(1), 26–45.CrossRefGoogle Scholar
  41. 41.
    Kim, D., & Benbasat, I. (2006). The effects of trust-assuring arguments on consumer trust in Internet stores: Application of Toulmin’s Model of Argumentation. Information Systems Research, 17(3), 286–300.CrossRefGoogle Scholar
  42. 42.
    Kim, D., & Benbasat, I. (2010). Designs for effective implementation of trust assurances in Internet stores. Communications of the ACM, 53(2), 121–126.CrossRefGoogle Scholar
  43. 43.
    Kim, K., & Kim, J. (2010). Third-party privacy certification as an online advertising strategy: An investigation of the factors affecting the relationship between third-party certification and initial trust. Journal of Interactive Marketing, 25(3), 145–158.CrossRefGoogle Scholar
  44. 44.
    Kim, D. J., Sivasailam, N., & Rao, H. R. (2004). Information assurance in B2C websites for information goods/services. Electronic Markets, 14(4), 344–359.CrossRefGoogle Scholar
  45. 45.
    Kim, C., Tao, W., Shin, N., & Kim, K.-S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications, 9(1), 84–95.CrossRefGoogle Scholar
  46. 46.
    Kimery, K. M., & McCord, M. (2002). Third-party assurances: Mapping the road to trust in e-retailing. Journal of Information Technology Theory and Application, 4(2), 63–82.Google Scholar
  47. 47.
    Krippendorff, K. (2004). Content analysis: Introduction to its methodology (2nd ed., p. 18). Beverley Hills, CA: Sage Publications Inc.Google Scholar
  48. 48.
    Kuan, H.-H., & Bock, G.-W. (2007). Trust transference in brick and click retailers: An investigation of the before-online-visit phase. Information & Management, 44(2), 175–187.CrossRefGoogle Scholar
  49. 49.
    Kukar-Kinney, M., & Close, A. G. (2010). The determinants of consumers\(^{\prime } \)online shopping cart abandonment. Journal of the Academy of Marketing Science, 38(2), 240–250.CrossRefGoogle Scholar
  50. 50.
    Lauer, T. W., & Deng, X. (2007). Building online trust through privacy practices. International Journal of Information Security, 6(5), 323–331.CrossRefGoogle Scholar
  51. 51.
    Laurent, G., & Kapferer, J.-N. (1985). Measuring consumer involvement profiles. Journal of Marketing Research, 22(1), 41–53.CrossRefGoogle Scholar
  52. 52.
    Lawton, C. (2008). The war on returns. The Wall Street Journal (May 8, 2008). http://online.wsj.com/article/SB121020824820975641.html. Accessed 25 December 2010.
  53. 53.
    Lee, C. H., & Cranage, D. A. (2010). Personalisation–privacy paradox: The effects of personalisation and privacy assurance on customer responses to travel Web sites. Tourism Management, 32(5), 987–994.CrossRefGoogle Scholar
  54. 54.
    Lee, S. M., & Lee, S. (2005-2006). Consumers’ initial trust toward second-hand products in the electronic market. Journal of Computer Information Systems, 46(2), 85–98.Google Scholar
  55. 55.
    Lee, C. H., Eze, U. C., & Ndubisi, N. O. (2011a). Analyzing key determinants of online repurchase intentions. Asia Pacific Journal of Marketing and Logistics, 23(2), 200–221.CrossRefGoogle Scholar
  56. 56.
    Lee, J., Park, D.-H., & Han, I. (2011b). The different effects of online consumer reviews on consumers’ purchase intentions depending on trust in online shopping malls: An advertising perspective. Internet Research, 21(2), 187–206.CrossRefGoogle Scholar
  57. 57.
    LexisNexis. (2010). True cost of fraud study. LexisNexis (2010). http://img.en25.com/Web/LexisNexis/2010%20True%20Cost%20of%20Retail%20Fraud%20Study.pdf. Accessed 25 December 2010.
  58. 58.
    Lian, J.-W., & Lin, T.-Z. (2008). Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior, 24(1), 48–65.Google Scholar
  59. 59.
    Lim, N. (2003). Consumers’ perceived risk: Sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216–228.CrossRefGoogle Scholar
  60. 60.
    Liu, L., & Arnett, P. (2002). An examination of privacy policies in Fortune 500 Web Sites. Mid-American Journal of Business, 17(1), 13–21.CrossRefGoogle Scholar
  61. 61.
    Liu, C., Marchewka, J. T., Lu, J., & Yu, Ch-Sh. (2004). Beyond concern: A privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 127–142.CrossRefGoogle Scholar
  62. 62.
    López-Bonilla, J. N., & López-Bonilla, L. M. (2008). Sensation seeking and e-shoppers. Electronic Commerce Research, 8(3), 143–154.CrossRefGoogle Scholar
  63. 63.
    Lowengart, O., & Tractinsky, N. (2001). Differential effects of product category on shoppers’ selection of web-based stores: A probabilistic modeling approach. Journal of Electronic Commerce Research, 2(4), 142–156.Google Scholar
  64. 64.
    Maheswaran, D., & Chaiken, S. (1991). Promoting systematic processing in low-motivation settings: Effect of incongruent information on processing and judgment. Journal of Personality and Social Psychology, 61(1), 13–25.CrossRefGoogle Scholar
  65. 65.
    Martín, S. S., & Camarero, C. (2008). Consumer trust to a Web site: Moderating effect of attitudes toward online shopping. Cyberpsychology and Behavior, 11(5), 549–554.CrossRefGoogle Scholar
  66. 66.
    Mascha, M. F., Miller, C. L., & Janvrin, D. J. (2011). The effect of encryption on Internet purchase intent in multiple vendor and product risk settings. Electronic Commerce Research, 11(4), 401–419.CrossRefGoogle Scholar
  67. 67.
    Maynard, M., & Tian, Y. (2004). Between global and global: Content analysis of the Chinese Web Sites of the 100 top global brands. Public Relations Review, 30(3), 285–291.CrossRefGoogle Scholar
  68. 68.
    McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.Google Scholar
  69. 69.
    McKnight, D. H., Kachmar, C. J., & Choudhury, V. (2004). Shifting factors and the ineffectiveness of third party assurance seals: A two-stage model of initial trust in a Web business. Electronic Markets, 14(3), 252–266.CrossRefGoogle Scholar
  70. 70.
    McMullen, T. (2010). New York Attorney General alleges online retail fraud. abcNEWS (January 29, 2010). http://abcnews.go.com/Business/ny-attorney-general-alleges-online-retail-fraud/story?id=9697913. Accessed 05 February 2011.
  71. 71.
    Miyazaki, A. D., Grewal, D., & Goodstein, R. C. (2005). The effect of multiple extrinsic cues on quality perceptions: A matter of consistency. Journal of Consumer Research, 32(1), 146–153.CrossRefGoogle Scholar
  72. 72.
    Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. Journal of Economic Perspectives, 23(3), 3–20.CrossRefGoogle Scholar
  73. 73.
    Mukhopadhyay, S. K., & Setoputro, R. (2005). Optimal return policy and modular design for build-to-order products. Journal of Operations Management, 23(5), 496–506.CrossRefGoogle Scholar
  74. 74.
    Muylle, S., & Basu, A. (2004). Online support for commerce processes and survivability of Web retailers. Decision Support Systems, 38(1), 101–113.CrossRefGoogle Scholar
  75. 75.
    Nöteberg, A., Christiaanse, E., & Wallage, P. (2003). Consumer trust in electronic channels: The impact of electronic commerce assurance on consumers’ purchasing likelihood and risk perceptions. E-Service Journal, 2(2), 46–67.CrossRefGoogle Scholar
  76. 76.
    Olson, J. C., & Jacoby, J. (1972). Cue utilization in the quality perception process. In M. Venkatesan (Ed.), Proceedings of the third annual conference of the association for consumer research (pp. 167–79). Association for Consumer Research: Iowa City.Google Scholar
  77. 77.
    Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331–338.CrossRefGoogle Scholar
  78. 78.
    Patton, M. A., & Josang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.CrossRefGoogle Scholar
  79. 79.
    Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37–59.CrossRefGoogle Scholar
  80. 80.
    Pennington, R., Wilcox, H. D., & Grover, V. (2003-2004). The role of system trust in business-to-consumer transactions. Journal of Management Informaiion Systems, 20(3), 197–226.Google Scholar
  81. 81.
    Ramanathan, R. (2010). E-commerce success criteria: Determining which criteria count most. Electronic Commerce Research, 10(2), 191–208.CrossRefGoogle Scholar
  82. 82.
    Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391–412.CrossRefGoogle Scholar
  83. 83.
    Ries, B. (2010). Hackers’ most destructive attacks. TheDailyBeast.com (December 13, 2010). http://www.thedailybeast.com/blogs-and-stories/2010-12-11/hackers-10-most-famous-attacks-worms-and-ddos-takedowns/. Accessed 20 December 2010.
  84. 84.
    Rifon, N. J., La Rose, R., & Choi, S. M. (2005). Your privacy is sealed: Effects of Web privacy seals on trust and personal disclosures. Journal of Consumer Affairs, 39(2), 339–62.CrossRefGoogle Scholar
  85. 85.
    Rigoli, E. (2011). Credit fraud: Cosmetics Company Lush shuts down UK website, speaks directly to hacker. PrivateWifi.com (January 25, 2011). http://www.privatewifi.com/credit-fraud-cosmetics-company-lush-shuts-down-uk-website-speaks-directly-to-hacker/. Accessed 02 February 2011.
  86. 86.
    Robinson, S. (1999). CD software said to gather data on users. New York Times (November 01, 1999). http://www.nytimes.com/1999/11/01/business/cd-software-said-to-gather-data-on-users.html. Accessed 02 February 2011.
  87. 87.
    Rossiter, J. R., & Percy, L. (1985). Advertising communication models. Advances in Consumer Research, 12, 510–524.Google Scholar
  88. 88.
    Runyan, B., Smith, K. T., & Smith, L. M. (2008). Implications of Web assurance services on e-commerce. Accounting Forum, 32(1), 46–61.CrossRefGoogle Scholar
  89. 89.
    Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006). Converting Web site visitors into buyers: How Web site investment increases consumer trusting beliefs and online purchase intentions. Journal of Marketing, 70(2), 133–48.CrossRefGoogle Scholar
  90. 90.
    Serban, C., Chen, Y., Zhang, W., & Minsky, N. (2008). The concept of decentralized and secure electronic marketplace. Electronic Commerce Research, 8(1–2), 79–101.CrossRefGoogle Scholar
  91. 91.
    Shahibi, M. S., & Bakar, Z. A. (2010). E-commerce interaction and the elements of trust. The Business and Management Quarterly Review, 1(4), 1–7.Google Scholar
  92. 92.
    Sherr, I. & Schatz, A. (2011). Sony Details Hacker Attack. The Wall Street Journal (May 5, 2011). http://online.wsj.com/article/SB10001424052748703849204576302970153688918.html. Accessed 22 June 2011.
  93. 93.
    Shim, S., & Lee, B. (2010). An economic model of optimal fraud control and the aftermarket for security services in online marketplaces. Electronic Commerce Research and Applications, 9(5), 435–445.CrossRefGoogle Scholar
  94. 94.
    Sinclaire, J. K., Simon, J. C., & Wilkes, R. B. (2010). A prediction model for initial trust formation in electronic commerce. International Business Research, 3(4), 17–27.CrossRefGoogle Scholar
  95. 95.
    Sivasailam, N., Kim, D. J., & Rao, H. R. (2002). What companies are(n’t) doing about Web site assurance. IEEE IT Professional, 4(3), 33–40.CrossRefGoogle Scholar
  96. 96.
    Skinner, L. R., Bryant, P. T., & Richey, G. (2008). Examining the impact of reverse logistics disposition strategies. International Journal of Physical Distribution and Logistics Management, 38(7), 518–539.CrossRefGoogle Scholar
  97. 97.
    Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRefGoogle Scholar
  98. 98.
    Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2005). Managing the performance impact of Web security. Electronic Commerce Research, 5(1), 99–116.CrossRefGoogle Scholar
  99. 99.
    Su, X. (2009). Consumer returns policies and supply chain performance. Manufacturing and Service Operations Management, 11(4), 595–612.CrossRefGoogle Scholar
  100. 100.
    Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223.CrossRefGoogle Scholar
  101. 101.
    VeriSign.com. (2011). Cpmpare SSL Certificates. http://www.verisign.com/ssl/buy-ssl-certificates/compare-ssl-certificates/index.html. Accessed 31 August 2011.
  102. 102.
    Vincent, O. R., Folorunso, O., & Akinde, A. D. (2010). Improving e-payment security using Elliptic Curve Cryptosystem. Electronic Commerce Research, 10(1), 27–41.CrossRefGoogle Scholar
  103. 103.
    Wakefield, R. L., Stocks, M. H., & Wilder, W. M. (2004). The role of Web site characteristics in initial trust formation. Journal of Computer Information Systems, 45(1), 94–103.Google Scholar
  104. 104.
    Wang, S., Beatty, S. E., & Foxx, W. (2004). Signaling the trustworthiness of small online retailers. Journal of Interactive Marketing, 18(1), 53–69.CrossRefGoogle Scholar
  105. 105.
    Weathers, D., Sharma, S., & Wood, S. L. (2007). Effects of online communication practices on consumer perceptions of performance uncertainty for search and experience goods. Journal of Retailing, 83(4), 393–401.CrossRefGoogle Scholar
  106. 106.
    Wu, G., Hu, X., & Wu, Y. (2010). Effects of perceived interactivity, perceived Web assurance and disposition to trust on initial online trust. Journal of Computer-Mediated Communication, 16(1), 1–26.CrossRefGoogle Scholar
  107. 107.
    Yang, Sh-Ch., Hung, W-Ch., Sung, K., & Farn, Ch-K. (2006). Investigating initial trust toward e-tailers from the elaboration likelihood model perspective. Psychology and Marketing, 23(5), 429–445.CrossRefGoogle Scholar
  108. 108.
    Yoon, S.-J. (2002). The antecedents and consequences of trust in online-purchase decisions. Journal of Interactive Marketing, 16(2), 47–63.CrossRefGoogle Scholar
  109. 109.
    Zhao, J. J., & Zhao, S. Y. (2004). Internet technologies used by INC. 500 corporate websites. Issues in Information Systems, 5(1), 366–372.Google Scholar
  110. 110.
    Zhang, H. (2005). Trust-promoting seals in electronic markets: Impact on online shopping decisions. Journal of Information Technology Theory and Application, 6(4), 29–40.Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Department of BusinessWestminster International University in TashkentTashkentUzbekistan
  2. 2.Department of Business (BUSI) – Marketing and Consumer Behavior Research UnitVrije Universiteit BrusselBrusselsBelgium

Personalised recommendations