skip to main content
research-article
Free Access

Designs for effective implementation of trust assurances in internet stores

Published:01 February 2010Publication History
Skip Abstract Section

Abstract

Introduction

Improving customer trust in an internet store is an important goal in B2C electronic commerce because it leads to outcomes important for the success of an Internet store, such as reduced customer risk perceptions in transacting with the store and increased willingness to buy from the store. Therefore, one of the critical success factors for Internet stores is to convince customers of the store's trustworthiness, which refers to a set of customers' beliefs regarding the ability, integrity, and benevolence of the online merchant. One mechanism by which such perceptions of trustworthiness on the part of stores can be established is to provide trust assurances on a store's Web site. Trust assurance refers to "a claim and its supporting statements used in an Internet store to address trust-related concerns." An example of trust assurance statements found in internet stores is:

We are so confident in our security that we guarantee you'll pay nothing if unauthorized charges are made to your credit card as a result of shopping at circuitcity.com."

        (Excerpted from a checkout page of www.circuitcity.com)

Trust assurances can be provided by an Internet store itself, by customers, or by a third party organization. For example, Simplycheap.com, shown in Figure 1, displays both a store's self-proclaimed assurance (such as "safe shopping our security guarantee") and a third-party assurance (such as Hacker Safe).

In this article, we first review finding in previous studies regarding trust assurance. Then we provide a snapshot regarding how often Internet stores use trust assurances and what concerns are addressed in such trust assurances by reporting current usage of trust assurances based on observations of 85 Internet stores. We expect that this snapshot will help business managers to understand how other companies use trust assurances. Second, we suggest two design guidelines for effective implementation of trust assurances for Web developers.

Before reporting our findings based on observations from 85 Internet stores, we briefly review the findings of several previous studies regarding trust assurances.

First, many studies have reported that displaying trust assurances increases the trustworthiness of an Internet store. A store's own assurance enhances the trustworthiness of an Internet store if they are well-structured. Third-party assurances (or trustmarks), such as TRUSTe and BBBOnLine seals positively influence the favorableness of a store's privacy policies, and are more influential in improving a firm's trustworthiness than a rating by Consumer Reports magazine is. Among third-party assurances, the WebTrust seal appeared to be more influential than BBBOnLine when people chose a vendor. Interestingly, third-party assurances were not considered as important as "security features," such as SET (Secure Electronic Transaction), SSL (Secure Sockets Layer), and a lock symbol, in customer's decisions to buy on the World Wide Web.

Second, detailed design/ usability guidelines for building a Web site are already available. For example, best practices in Interaction Design can be accessed at van Welie's Web site (http://www.welie.com/patterns/). In respect to specific implementations of trust assurances, ease of access to assurances was suggested as one of several design considerations. For example, van Duyne et al. suggested that Internet stores needed to make their privacy policy available on each of their Web pages. The finding that only 54% of licensees of the top 500 Internet consumer Web sites display their privacy seal of approval information on both their home and privacy pages indicates that the other 46% has room to improve their customers' ease of access to trust assurances.

In this study, based on van Duyne et al. we examine ease of access to trust assurances. In addition, we examine the application of ease of return to the original checkout screen that customer was working on before accessing trust assurances which is important for customers to easily complete the checkout process. These two implementation issues (for example, ease of access and ease of return) are examined in the assurance delivery modes section.

References

  1. Aiken, K.D. and Boush, D.M. Trustmarks, objective-source ratings, and implied investments in advertising: Investigating online trust and the context-specific nature of Internet signals. Journal of the Academy of Marketing Science 34, 3, (2006), 308--232.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bélanger, F., Hiller, J.S. and Smith, W.J. Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems 11, 3, (2002), 245--270.Google ScholarGoogle ScholarCross RefCross Ref
  3. Dayal, S., Landesberg, H., Zeisser, M. How to build trust online. Marketing Management 8, 3, (1999), 64--71.Google ScholarGoogle Scholar
  4. Kim, D. and Benbasat, I. The effects of trust-assuring arguments on consumer trust in internet stores: Application of Toulmin's model of argumentation. Information Systems Research 17, 3, (2006b), 289--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kim, D. and Benbasat, I. Trust-Assuring arguments in B2C e-commerce: Impact of content, source and price of trust. J. of Management Information Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Kim, D. and Benbasat, I. Trust-Related arguments in internet stores: A framework for evaluation. Journal of Electronic Commerce Research 4, 2, (2003), 49--64.Google ScholarGoogle Scholar
  7. Lala, V., Arnold, V., Sutton, S., and Guan, L. The impact of relative information quality of E-commerce assurance seals on Internet purchasing behavior. International Journal of Accounting Information Systems, 3, (2002,) 237--253.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mao, J. and Benbasat, I. The effects of contextualized access to explanatory knowledge on judgment. International Journal of Human-Computer Studies 55, 5, (Nov. 2001), 787--814. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Miyazaki, A.D. and Krishnamurthy, S. Internet seals of approval: Effects on online privacy policies and consumer perceptions. Journal of Consumer Affairs 36, 1, (2002), 28--49.Google ScholarGoogle ScholarCross RefCross Ref
  10. Toulmin, S.E. The Use of Argument, Cambridge University Press, Cambridge, England, 1958.Google ScholarGoogle Scholar
  11. UCLA Center for Communication Policy. The UCLA Internet Report: Surveying the Digital Future Year Three, 2003; http://www.digitalcenter.org/pdf/InternetReportYearThree.pdf.Google ScholarGoogle Scholar
  12. van Duyne, D.K.V., Landay, J., and Hong J.I. The Design of Sites: Principles, Processes and Patterns for Crafting a Customer-centered Web Experience. Addison-Wesley, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Designs for effective implementation of trust assurances in internet stores

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 53, Issue 2
        February 2010
        147 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1646353
        Issue’s Table of Contents

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 February 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format