Abstract
Transaction cost economics can explain the mechanism by which network security technologies may reduce the interexchange costs between businesses in the supply chain and between businesses and customers in the digital economy. This paper develops the construct of technology-based electronic trust, where interpersonal, or “real” trust between people can be amplified and enhanced with the use of network security information technologies. The paper formally models an electronic commerce trust typology based on minimizing the cost of establishing trust in transactions, balanced against maximizing the potential user value from successfully completing transactions in the digital economy, suggesting that there is an optimal amount of acceptable risk in electronic commerce transactions. Sophisticated deployments of security information technologies may increase levels of interpersonal trust while lowering transaction costs in electronic commerce, thus promoting the long run development of neutral, interorganizational electronic markets and growth in the digital economy.
Similar content being viewed by others
References
Bakos, Y. and E. Brynjolfsson. (1993). “Information Technology, Incentives, and the Optimal Number of Suppliers.” Journal of Management of Information Systems (Fall).
Bakos, Y. and E. Brynjolfsson. (1993). “From Vendors to Partners: Information Technology and Incomplete Contracts in Buyer-Supplier Relationships.” Journal of Organizational Computing (December).
Bakos, Y. and E. Brynjolfsson. (1997). “Organizational Partnerships and the Virtual Corporation.” In C. Kemerer (ed.), Information Technology and Industrial Competitiveness: How Information Technology Shapes Competition. Kluwer Academic Publishers.
Barua, A., C. Kriebel, and T. Mukhopadhyay. (1995). “Information Technologies and Business Value—An Analytic and Empirical Investigation.” Information Systems Research 6(1), 3–23.
Brynjolfsson, E. (1993). “The Productivity Paradox of Information Technology.” Communications of the ACM 36(12), 67–77.
Brynjolfsson, E., T. Malone, V. Gurbaxani, and A. Kambil. (1994). “Does Information Technology Lead to Smaller Firms?” Management Science 40(12).
Caruso, D. (1999). “Digital Commerce: Online Companies Squander the Public's Trust.” The New York Times November 8, Business Section.
Cheskin Research. (2000). Trust in the Wired Americas. Redwood Shores, CA. http://www.cheskin.com/think/studies/trust2.html.
Child, G. (1993). Mixed Emotions: Mountaineering Writings of Greg Child. Seattle, WA: The Mountaineers.
Clemons, E., S. Reddi, and M.C. Row. (1993). “The Impact of Information Technology on the Organization of Economic Activity: The 'Move to the Middle' Hypothesis.” Journal of Management of Information Systems 10(2), 9–35.
Clemons, E. and M. Row. (1989). “Information Technology and Economic Reorganization.” In Proceedings of the Tenth Annual Conference on Information Systems Boston, MA.
Coase, R.H. (1937). “The Nature of the Firm.” Economica IV, 386–405.
Coase, R.H. (1988). The Firm, the Market and the Law. Chicago and London: The University of Chicago Press.
Deitel, H.M., P.J. Deitel, and T.R. Nieto. (2001). E-Business & e-Commerce: How to Program. Upper Saddle River, NJ: Prentice Hall.
Denning, D.E. (1999). Information Warfare and Security. Reading, MA: Addison-Wesley, ACM Press.
Eisenhardt, K.M. (1989). “Agency Theory: An Assessment and Review.” Academy of Management Review 14(1), 57–74.
Froomkin, M.A. (1996). “The Essential Role of Trusted Third Parties in Electronic Commerce.” Oregon Law Review 49.
Fukuyama, F. (2001). “E_Commerce and the Challenge of Trust.” The Merrill Lynch Forum, http://www.ml.com/woml/forum/ecommerce1.htm.
Grossman, S.J. and O.D. Hart. (1986). “The Costs and Benefits of Ownership: A Theory of Vertical and Lateral Integration.” Journal of Political Economy 94(4).
Grotta, S.W. (2001). “Bio-Keys,” PC Magazine June 12, 163-174.
Gurbaxani, V. and S. Whang. (1991). “The Impact of Information Systems on Organizations and Markets.” Communications of the ACM 34(1), 59–73.
Hart, O. and J. Moore. (1990). “Property Rights and the Nature of the Firm.” Journal of Political Economy 98(6), 1119–1158.
Hennart, J.-F. (1993). “Explaining the Swollen Middle: Why Most Transactions are a Mix of “Market” and “Hierarchy”. Organization Science 4(4), 529–547.
Hess, C.M. and C.F. Kemerer. (1994). “Computerized Loan Origination Systems: A Case Study of the Electronic Markets Hypothesis.” MIS Quarterly 18(3), 251–275.
Hitt, L.M. (December 15, 1996). “Information Technology and Firm Boundaries: Evidence From Panel Data.” In Workshop on Information Systems and Economics Cleveland, OH.
Jarillo, J.C. (1988). “On Strategic Networks.” Strategic Management Journal 9, 31–41.
Jarvenpaa, S.L., N. Tractinsky, L. Saarinen, and M. Vitale. (1999). “Consumer Trust in an Internet Store: A Cross Cultural Validation.” Journal of Computer Mediated Communication 5(2), http://www.ascusc.org/jcmc/vol5/issue2/jarvenpaa.html#concept.
Jensen, M.C. and W.H. Meckling. (1973). “The Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure.” Journal of Financial Economics 3, 305–360.
Kleist, V., I.H. Frieze, and W.R. King. (2001). “Information Technology Intensity, Information Goods Intensity and the Vertical Boundaries of Firms,” Working Paper, University of Pittsburgh.
Lee, H.G. (1998). “Do Electronic Marketplaces Lower the Price of Goods?” Communications of the ACM 41(1), 72–80.
Lee, J.S. (2002). “Making Losers of Auction Winners.” New York Times March 7, C1, http://www.nytimes.com/2002/03/07/technology/circuits/07FRAU.html.
Levy, S. (2001). Crypto. New York: Viking Press.
Lessig, L. (1999). Code and Other Laws of Cyberspace. New York: Basic Books.
Lewis, T.G. (1997). The Friction Free Economy: Marketing Strategies for a Wired World. NewYork: Harper Business.
Liebowitz, S.J. and S.E. Margolis. (1995). “Are Network Externalities a New Source of Market Failure?” Research in Law and Economics.
Lukose, R.M. and B.A. Huberman. (2000). “A Methodology for Managing Risk in Electronic Transactions over the Internet.” Netnomics 2, 25–36.
Malone, T., Yates, J., and Benjamin, R. (1987). “Electronic Markets and Electronic Hierarchies.” Communications of the ACM 30(6).
Milgrom, P. and J. Roberts. (1992). Economics, Organization and Management. Englewood Cliffs, NJ: Prentice-Hall.
Moitra, S.D. and S.L. Konda. (2000). “The Survivability of Network Systems: An Empirical Analysis.” CMU/SEI Technical Report, ESC-TR-2000-021, CarnegieMellon Software Engineering Institute.
Nichols, R.K. (1999). ICSA Guide to Cryptography. New York: McGraw-Hill.
Northcutt, S. and J. Novak. (2001). Network Intrusion Detection: An Analyst's Handbook 2nd Edition. Indianapolis, IN: New Riders.
Rappa, M. (2001). “Trust in Cyberspace.” In Managing the Digital Enterprise. North Carolina State University, http://ecommerce.ncsu.edu/topics/trust/trust.html.
Rayport, J. (1999). “The Truth About Internet Business Models.” Strategy and Business 3rd Quarter.
Reagle, J.M., Jr. (1996). “Trust in Electronic Markets: The Convergence of Cryptographers and Economists.” First Monday 1(2), http://www.firstmonday.dk/issues/issue2/markets/index.html.
Ring, P.S. and A.H. Van de Ven. (1992). “Structuring Cooperative Relationships Between Organizations.” Strategic Management Journal 13, 483–498.
Rose, F. (1998). Information Age Economy: The Economics, Concept and Design of Information Intermediaries. Heidelberg: Physica-Verlag.
Sabo, D. (1998). “Electronic Commerce Barriers Survey Results.” Arlington, VA: Information Techology Association of America, http://www.itaa.org/software/research/indpulse/bartext.htm.
Sawhney, M. and S. Kaplan. (1999). “Let's Get Vertical.” Business 2.0.
Scambray, J., S. McClure, and G. Kurtz. (2001). Hacking Exposed: Network Security Secrets and Solutions 2nd Edition. Berkeley, CA: Osborne-McGrawHill.
Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World. New York: Wiley.
Schwartau, W. (2000). Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Destruction. New York: Thunder's Mouth Press.
Singh, S. (1999). The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. New York: Doubleday.
Smith, M., J. Bailey, and E. Brynjolfsson. (1999). “Understanding Digital Markets: Review and Assessment.” In R. Kahin and E. Brynjolfsson (eds.), Understanding the Digital Economy. Boston, MA: MIT Press.
Williamson, O.E. (1967). “Hierarchical Control and Optimal Firm Size.” Journal of Political Economy (April), 123-138.
Williamson, O.E. (1975). Markets and Hierarchies: Analysis and Antitrust Implications, A Study in the Economics of Internal Organization. New York: The Free Press.
Williamson, O.E. (1991). “Introduction.” In O.E. Williamson and S.G. Winter (eds.), The Nature of the Firm: Origins, Evolution and Development. New York: Oxford University Press, pp. 3–17.
Wolverton, T. (2000). “Feedback System's Weaknesses May Hurt Online Auctions.” CNET News.com March 31, http://news.cnet.com/news/0-1007-202-1619138.html.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Kleist, V.F. A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy. Electronic Commerce Research 4, 41–57 (2004). https://doi.org/10.1023/B:ELEC.0000009281.05504.93
Issue Date:
DOI: https://doi.org/10.1023/B:ELEC.0000009281.05504.93