Advertisement

To Believe or Not to Believe a Call to Action: An Empirical Investigation of Source Credibility

  • Craig ClaybaughEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9191)

Abstract

How well can individuals detect deception from information sources? This study examines consumer evaluations of a real CRM product brochure and a fraudulent one that imitates it. The forged brochure contains malicious manipulations designed to decrease trust in the product and oversell the abilities of the CRM system. This study seeks to see how manipulations of the material are perceived by the individuals and how that impacts their willingness to believe the source credibility of a message.

Keywords

Source credibility Deception Trust Media assurance 

References

  1. 1.
    Arora, R., Stoner, C., Arora, A.: Using framing and credibility to incorporate exercise and fitness in individuals’ lifestyle. J. Consum. Mark. 23(4), 199–207 (2006)CrossRefGoogle Scholar
  2. 2.
    Bond, G.D.: Deception detection expertise. Law Hum. Behav. 32(4), 339 (2008)CrossRefGoogle Scholar
  3. 3.
    Brockner, J.: Making sense of procedural fairness: how high procedural fairness can reduce or heighten the influence of outcome favorability. Acad. Manag. Rev. 27(1), 58–76 (2002)Google Scholar
  4. 4.
    Burgoon, J.K., Buller, D.B., Guerrero, L.K., Afifi, W.A., Feldman, C.M.: Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages. Commun. Monogr. 63(1), 50–69 (1996)CrossRefGoogle Scholar
  5. 5.
    Cheung, C.M., Thadani, D.R.: The impact of electronic word-of-mouth communication: a literature analysis and integrative model. Decis. Support Syst. 54(1), 461–470 (2012)CrossRefGoogle Scholar
  6. 6.
    Chopra, S., Sodhi, M.S.: Managing risk to avoid supply-chain breakdown. MIT Sloan Manag. Rev. (Fall 2004) (2012)Google Scholar
  7. 7.
    Clark, J.K., Wegener, D.T., Habashi, M.M., Evans, A.T.: Source expertise and persuasion the effects of perceived opposition or support on message scrutiny. Pers. Soc. Psychol. Bull. 38(1), 90–100 (2012)CrossRefGoogle Scholar
  8. 8.
    Claybaugh, C.C., Haseman, W.D.: Understanding professional connections in linkedin–a question of trust. J. Comput. Inf. Syst. 54(1) (2013)Google Scholar
  9. 9.
    Claybaugh, C.C., Srite, M.: Factors contributing to the information technology vendor-client relationship. J. Inf. Technol. Theory Appl. (JITTA) 10(2), 3 (2009)Google Scholar
  10. 10.
    Clow, K.E., James, K.E., Kranenburg, K.E., Berry, C.T.: The relationship of the visual element of an advertisement to service quality expectation and source credibility. J. Serv. Mark. 20(6), 404–411 (2006)CrossRefGoogle Scholar
  11. 11.
    Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909 (2007)CrossRefGoogle Scholar
  12. 12.
    Dowling, G.R., Staelin, R.: A model of perceived risk and intended risk-handling activity. J. Consum. Res. 21(1), 119–134 (1994)CrossRefGoogle Scholar
  13. 13.
    Erdem, T., Swait, J.: Brand equity as a signaling phenomenon. J. Consum. Psychol. 7(2), 131–157 (1998)CrossRefGoogle Scholar
  14. 14.
    Erdem, T., Swait, J., Valenzuela, A.: Brands as signals: a cross-country validation study. J. Mark. 70(1), 34–49 (2006)CrossRefGoogle Scholar
  15. 15.
    Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)Google Scholar
  16. 16.
    Fiske, S.T., Taylor, S.E.: Social Cognition: From Brains to Culture. Sage, Beverly Hills (2013)CrossRefGoogle Scholar
  17. 17.
    Grazioli, S., Jarvenpaa, S.L.: Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Trans. Syst. Man Cyber. Part A Syst. Hum. 30(4), 395–410 (2000)CrossRefGoogle Scholar
  18. 18.
    Hastak, M., Mazis, M.B.: Deception by implication: a typology of truthful but misleading advertising and labeling claims. J. Public Policy Mark. 30(2), 157–167 (2011)CrossRefGoogle Scholar
  19. 19.
    Herbig, P., Milewicz, J.: The relationship of reputation and credibility to brand success. J. Consum. Mark. 12(4), 5–10 (1995)CrossRefGoogle Scholar
  20. 20.
    Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an internet store: a cross-cultural validation. J. Comput. Med. Commun. 5(2), 0–0 (1999)Google Scholar
  21. 21.
    Johnston, A., Warkentin, M.: The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions. In: Dwivedi, A., Clarke, S. (eds.) End-User Computing, Development, and Software Engineering: New Challenges: New Challenges, p. 312. Information Science Reference, Hershey (2012)CrossRefGoogle Scholar
  22. 22.
    Kim, M., Ahn, J.: Comparison of trust sources of an online market-maker in the E-marketplace: buyer’s and seller’s perspectives. J. Comput. Inf. Syst. 47(1), 84–94 (2006)Google Scholar
  23. 23.
    Ko, D.-G., Kirsch, L.J., King, W.R.: Antecedents of knowledge transfer from consultants to clients in enterprise system implementations. MIS Q. 29(1), 59–85 (2005)Google Scholar
  24. 24.
    Kramer, R.M.: Trust and distrust in organizations: emerging perspectives, enduring questions. Annu. Rev. Psychol. 50(1), 569–598 (1999)CrossRefGoogle Scholar
  25. 25.
    Kuhn, G., Tatler, B.W., Findlay, J.M., Cole, G.G.: Misdirection in magic: implications for the relationship between eye gaze and attention. Vis. Cogn. 16(2–3), 391–405 (2008)CrossRefGoogle Scholar
  26. 26.
    Lafferty, B.A., Goldsmith, R.E.: How influential are corporate credibility and endorser attractiveness when innovators react to advertisements for a new high-technology product? Corp. Reputation Manag. 7(1), 24–36 (2004)CrossRefGoogle Scholar
  27. 27.
    Lafferty, B.A., Goldsmith, R.E., Newell, S.J.: The dual credibility model: the influence of corporate and endorser credibility on attitudes and purchase intentions. J. Market. Theor. Pract. 10(3), 1–12 (2002)Google Scholar
  28. 28.
    Li, X., Hess, T.J., Valacich, J.S.: Why do we trust new technology? a study of initial trust formation with organizational information systems. J. Strateg. Inf. Syst. 17(1), 39–71 (2008)CrossRefGoogle Scholar
  29. 29.
    Metzger, M.J., Flanagin, A.J., Zwarun, L.: College student web use, perceptions of information credibility, and verification behavior. Comput. Educ. 41(3), 271–290 (2003)CrossRefGoogle Scholar
  30. 30.
    Oh, H., Jasper, C.R.: Processing of apparel advertisements: The extension of the elaboration likelihood model. Clothing Text. Res. J. 24(1), 15–32 (2006)CrossRefGoogle Scholar
  31. 31.
    Pornpitakpan, C.: The persuasiveness of source credibility: a critical review of five decades’ evidence. J. Appl. Soc. Psychol. 34(2), 243–281 (2004)CrossRefGoogle Scholar
  32. 32.
    Priester, J.R., Petty, R.E.: Source attributions and persuasion: perceived honesty as a determinant of message scrutiny. Pers. Soc. Psychol. Bull. 21(6), 637–654 (1995)CrossRefGoogle Scholar
  33. 33.
    Sparks, J.R., Rapp, D.N.: Readers’ reliance on source credibility in the service of comprehension. J. Exp. Psychol. Learn. Mem. Cogn. 37(1), 230 (2011)CrossRefGoogle Scholar
  34. 34.
    Teacy, W.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Auton. Agent. Multi-agent Syst. 12(2), 183–198 (2006)CrossRefGoogle Scholar
  35. 35.
    Teo, T.S.H., Liu, J.: Consumer trust in e-commerce in the United States, Singapore and China. Omega 35(1), 22–38 (2007)CrossRefGoogle Scholar
  36. 36.
    Van Slyke, C., Shim, J.T., Johnson, R., Jiang, J.: Concern for information privacy and online consumer purchasing. J. Assoc. Inf. Syst. 7(6), 415–444 (2006)Google Scholar
  37. 37.
    Xie, G.X., Boush, D.M.: How susceptible are consumers to deceptive advertising claims? a retrospective look at the experimental research literature. Mark. Rev. 11(3), 293–314 (2011)CrossRefGoogle Scholar
  38. 38.
    Westerman, D., Spence, P.R., Van Der Heide, B.: Social media as information source: recency of updates and credibility of Information. J. Comput. Med. Commun. 19(2), 171–183 (2014)CrossRefGoogle Scholar
  39. 39.
    Zinn, J. (ed.): Social Theories of Risk and Uncertainty: an Introduction, pp. 18–49. Blackwell Publishing, Oxford (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Missouri University of Science and TechnologyRollaUSA

Personalised recommendations