Skip to main content
Log in

A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Transaction cost economics can explain the mechanism by which network security technologies may reduce the interexchange costs between businesses in the supply chain and between businesses and customers in the digital economy. This paper develops the construct of technology-based electronic trust, where interpersonal, or “real” trust between people can be amplified and enhanced with the use of network security information technologies. The paper formally models an electronic commerce trust typology based on minimizing the cost of establishing trust in transactions, balanced against maximizing the potential user value from successfully completing transactions in the digital economy, suggesting that there is an optimal amount of acceptable risk in electronic commerce transactions. Sophisticated deployments of security information technologies may increase levels of interpersonal trust while lowering transaction costs in electronic commerce, thus promoting the long run development of neutral, interorganizational electronic markets and growth in the digital economy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bakos, Y. and E. Brynjolfsson. (1993). “Information Technology, Incentives, and the Optimal Number of Suppliers.” Journal of Management of Information Systems (Fall).

  2. Bakos, Y. and E. Brynjolfsson. (1993). “From Vendors to Partners: Information Technology and Incomplete Contracts in Buyer-Supplier Relationships.” Journal of Organizational Computing (December).

  3. Bakos, Y. and E. Brynjolfsson. (1997). “Organizational Partnerships and the Virtual Corporation.” In C. Kemerer (ed.), Information Technology and Industrial Competitiveness: How Information Technology Shapes Competition. Kluwer Academic Publishers.

  4. Barua, A., C. Kriebel, and T. Mukhopadhyay. (1995). “Information Technologies and Business Value—An Analytic and Empirical Investigation.” Information Systems Research 6(1), 3–23.

    Google Scholar 

  5. Brynjolfsson, E. (1993). “The Productivity Paradox of Information Technology.” Communications of the ACM 36(12), 67–77.

    Google Scholar 

  6. Brynjolfsson, E., T. Malone, V. Gurbaxani, and A. Kambil. (1994). “Does Information Technology Lead to Smaller Firms?” Management Science 40(12).

  7. Caruso, D. (1999). “Digital Commerce: Online Companies Squander the Public's Trust.” The New York Times November 8, Business Section.

  8. Cheskin Research. (2000). Trust in the Wired Americas. Redwood Shores, CA. http://www.cheskin.com/think/studies/trust2.html.

  9. Child, G. (1993). Mixed Emotions: Mountaineering Writings of Greg Child. Seattle, WA: The Mountaineers.

    Google Scholar 

  10. Clemons, E., S. Reddi, and M.C. Row. (1993). “The Impact of Information Technology on the Organization of Economic Activity: The 'Move to the Middle' Hypothesis.” Journal of Management of Information Systems 10(2), 9–35.

    Google Scholar 

  11. Clemons, E. and M. Row. (1989). “Information Technology and Economic Reorganization.” In Proceedings of the Tenth Annual Conference on Information Systems Boston, MA.

  12. Coase, R.H. (1937). “The Nature of the Firm.” Economica IV, 386–405.

    Google Scholar 

  13. Coase, R.H. (1988). The Firm, the Market and the Law. Chicago and London: The University of Chicago Press.

    Google Scholar 

  14. Deitel, H.M., P.J. Deitel, and T.R. Nieto. (2001). E-Business & e-Commerce: How to Program. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  15. Denning, D.E. (1999). Information Warfare and Security. Reading, MA: Addison-Wesley, ACM Press.

    Google Scholar 

  16. Eisenhardt, K.M. (1989). “Agency Theory: An Assessment and Review.” Academy of Management Review 14(1), 57–74.

    Google Scholar 

  17. Froomkin, M.A. (1996). “The Essential Role of Trusted Third Parties in Electronic Commerce.” Oregon Law Review 49.

  18. Fukuyama, F. (2001). “E_Commerce and the Challenge of Trust.” The Merrill Lynch Forum, http://www.ml.com/woml/forum/ecommerce1.htm.

  19. Grossman, S.J. and O.D. Hart. (1986). “The Costs and Benefits of Ownership: A Theory of Vertical and Lateral Integration.” Journal of Political Economy 94(4).

  20. Grotta, S.W. (2001). “Bio-Keys,” PC Magazine June 12, 163-174.

  21. Gurbaxani, V. and S. Whang. (1991). “The Impact of Information Systems on Organizations and Markets.” Communications of the ACM 34(1), 59–73.

    Google Scholar 

  22. Hart, O. and J. Moore. (1990). “Property Rights and the Nature of the Firm.” Journal of Political Economy 98(6), 1119–1158.

    Google Scholar 

  23. Hennart, J.-F. (1993). “Explaining the Swollen Middle: Why Most Transactions are a Mix of “Market” and “Hierarchy”. Organization Science 4(4), 529–547.

    Google Scholar 

  24. Hess, C.M. and C.F. Kemerer. (1994). “Computerized Loan Origination Systems: A Case Study of the Electronic Markets Hypothesis.” MIS Quarterly 18(3), 251–275.

    Google Scholar 

  25. Hitt, L.M. (December 15, 1996). “Information Technology and Firm Boundaries: Evidence From Panel Data.” In Workshop on Information Systems and Economics Cleveland, OH.

  26. Jarillo, J.C. (1988). “On Strategic Networks.” Strategic Management Journal 9, 31–41.

    Google Scholar 

  27. Jarvenpaa, S.L., N. Tractinsky, L. Saarinen, and M. Vitale. (1999). “Consumer Trust in an Internet Store: A Cross Cultural Validation.” Journal of Computer Mediated Communication 5(2), http://www.ascusc.org/jcmc/vol5/issue2/jarvenpaa.html#concept.

  28. Jensen, M.C. and W.H. Meckling. (1973). “The Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure.” Journal of Financial Economics 3, 305–360.

    Google Scholar 

  29. Kleist, V., I.H. Frieze, and W.R. King. (2001). “Information Technology Intensity, Information Goods Intensity and the Vertical Boundaries of Firms,” Working Paper, University of Pittsburgh.

  30. Lee, H.G. (1998). “Do Electronic Marketplaces Lower the Price of Goods?” Communications of the ACM 41(1), 72–80.

    Google Scholar 

  31. Lee, J.S. (2002). “Making Losers of Auction Winners.” New York Times March 7, C1, http://www.nytimes.com/2002/03/07/technology/circuits/07FRAU.html.

  32. Levy, S. (2001). Crypto. New York: Viking Press.

    Google Scholar 

  33. Lessig, L. (1999). Code and Other Laws of Cyberspace. New York: Basic Books.

    Google Scholar 

  34. Lewis, T.G. (1997). The Friction Free Economy: Marketing Strategies for a Wired World. NewYork: Harper Business.

    Google Scholar 

  35. Liebowitz, S.J. and S.E. Margolis. (1995). “Are Network Externalities a New Source of Market Failure?” Research in Law and Economics.

  36. Lukose, R.M. and B.A. Huberman. (2000). “A Methodology for Managing Risk in Electronic Transactions over the Internet.” Netnomics 2, 25–36.

    Google Scholar 

  37. Malone, T., Yates, J., and Benjamin, R. (1987). “Electronic Markets and Electronic Hierarchies.” Communications of the ACM 30(6).

  38. Milgrom, P. and J. Roberts. (1992). Economics, Organization and Management. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  39. Moitra, S.D. and S.L. Konda. (2000). “The Survivability of Network Systems: An Empirical Analysis.” CMU/SEI Technical Report, ESC-TR-2000-021, CarnegieMellon Software Engineering Institute.

  40. Nichols, R.K. (1999). ICSA Guide to Cryptography. New York: McGraw-Hill.

    Google Scholar 

  41. Northcutt, S. and J. Novak. (2001). Network Intrusion Detection: An Analyst's Handbook 2nd Edition. Indianapolis, IN: New Riders.

    Google Scholar 

  42. Rappa, M. (2001). “Trust in Cyberspace.” In Managing the Digital Enterprise. North Carolina State University, http://ecommerce.ncsu.edu/topics/trust/trust.html.

  43. Rayport, J. (1999). “The Truth About Internet Business Models.” Strategy and Business 3rd Quarter.

  44. Reagle, J.M., Jr. (1996). “Trust in Electronic Markets: The Convergence of Cryptographers and Economists.” First Monday 1(2), http://www.firstmonday.dk/issues/issue2/markets/index.html.

  45. Ring, P.S. and A.H. Van de Ven. (1992). “Structuring Cooperative Relationships Between Organizations.” Strategic Management Journal 13, 483–498.

    Google Scholar 

  46. Rose, F. (1998). Information Age Economy: The Economics, Concept and Design of Information Intermediaries. Heidelberg: Physica-Verlag.

    Google Scholar 

  47. Sabo, D. (1998). “Electronic Commerce Barriers Survey Results.” Arlington, VA: Information Techology Association of America, http://www.itaa.org/software/research/indpulse/bartext.htm.

    Google Scholar 

  48. Sawhney, M. and S. Kaplan. (1999). “Let's Get Vertical.” Business 2.0.

  49. Scambray, J., S. McClure, and G. Kurtz. (2001). Hacking Exposed: Network Security Secrets and Solutions 2nd Edition. Berkeley, CA: Osborne-McGrawHill.

    Google Scholar 

  50. Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World. New York: Wiley.

    Google Scholar 

  51. Schwartau, W. (2000). Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Destruction. New York: Thunder's Mouth Press.

    Google Scholar 

  52. Singh, S. (1999). The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. New York: Doubleday.

    Google Scholar 

  53. Smith, M., J. Bailey, and E. Brynjolfsson. (1999). “Understanding Digital Markets: Review and Assessment.” In R. Kahin and E. Brynjolfsson (eds.), Understanding the Digital Economy. Boston, MA: MIT Press.

    Google Scholar 

  54. Williamson, O.E. (1967). “Hierarchical Control and Optimal Firm Size.” Journal of Political Economy (April), 123-138.

  55. Williamson, O.E. (1975). Markets and Hierarchies: Analysis and Antitrust Implications, A Study in the Economics of Internal Organization. New York: The Free Press.

    Google Scholar 

  56. Williamson, O.E. (1991). “Introduction.” In O.E. Williamson and S.G. Winter (eds.), The Nature of the Firm: Origins, Evolution and Development. New York: Oxford University Press, pp. 3–17.

    Google Scholar 

  57. Wolverton, T. (2000). “Feedback System's Weaknesses May Hurt Online Auctions.” CNET News.com March 31, http://news.cnet.com/news/0-1007-202-1619138.html.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kleist, V.F. A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy. Electronic Commerce Research 4, 41–57 (2004). https://doi.org/10.1023/B:ELEC.0000009281.05504.93

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:ELEC.0000009281.05504.93

Navigation