• Title/Summary/Keyword: Control Trust

Search Result 323, Processing Time 0.028 seconds

Investigating Relationship between Control Mechanisms, Trust and Channel Outcome in Franchise System

  • YI, Ho-Taek;FORTUNE, Amenuvor Edem;YEO, Chan-Koo
    • Journal of Distribution Science
    • /
    • v.17 no.9
    • /
    • pp.67-81
    • /
    • 2019
  • Purpose - The overarching aim of this study is to empirically test the effect of ex-post control mechanisms on multi-dimensional trust and channel performance in franchise systems. Although the franchise system is a vertical marketing channel based on trust between the franchisor and the franchisees, issues related to franchisee's opportunistic behavior have persisted and thus requires research into the effective control system of franchise headquarters. Research design, data, and methodology - In this study, data was collected from 150 franchises to identify the effect of two types of franchising headquarters' control system on the multi-dimensional trust and franchise channel outcome between franchisor and franchisee. To test the hypotheses intended to achieve this aim, structural equations modeling technique is utilized. Results - The results of this research reveal that among the two formal control systems studied (output and process control), output control positively and significantly affects multidimensional trust. Additionally, among the three dimensions of trust employed in this study, only expertise has a positive and significant effect on contract compliance. Equally, only expertise and integrity have a negative and significant effect on opportunistic behavior. Conclusions - The study provides managerial and theoretical insights into understanding ex-post control mechanisms, trust, compliance and opportunistic behaviors in franchise systems.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

The Relationship between Control Mechanism and Commitment in Information Systems Outsourcing : The Mediating effects of Trust (아웃소싱 기업간 통제와 관계 몰입에 있어서 신뢰 매개 역할에 관한 연구)

  • Choi, Jae Woong;Han, Man Yong;Jung, Byoung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.251-265
    • /
    • 2010
  • Recently, with increasing interest in the subject of interfirm relationship mechanism, some information systems researchers point out that existing outsourcing theories are limited in explaining the choice of governance mechanisms in interfirm relational exchanges. Recognizing the importance of trust-commitment, this study focuses on the relationship of between control mechanism and commitment. Especially the role of trust as mediator is mainly researched. A mediation model was suggested on the basis of theoretical linkages from prior relevant studies. The research model was empirically tested with 73 IS outsourcing projects. The findings have significant impactions for further research and practice. Findings are as follows: First, outcome control, process control, social control had positive effects on trust and commitment. Second, inter-organizational trust played as a partial mediator on the relationship between control mechanisms and commitment. Based on these findings, the implication and the limitation of the study were presented including some directions for future studies.

A Study on the Factors Affecting Continuous Intention and Expansion of Communication Channels in Social Network Service (소셜네트워크서비스에서 지속사용의도 및 관계채널확장에 영향을 미치는 요인에 관한 연구)

  • Park, Seon-Hwa;Gim, Gwang-Yong
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.319-337
    • /
    • 2012
  • To stress the importance of privacy in social networking, I presented an analysis on how information control and information management vulnerability influence trust and privacy concerns in social networking, and how trust and privacy concerns influence the sustainable usage intention of social network services. I also analyzed the factors affecting privacy concerns to present the method to alleviate social network users' concerns about privacy. Information collection control, information processing control and information management vulnerability were chosen and analyzed as the factors affecting privacy concerns. The results showed that information collection control and information management vulnerability significantly affected trust and privacy concerns; and information processing control did not significantly affect privacy concerns. The relationship between trust and privacy concerns, and sustainable usage intention was statistically significant; and the relationship between trust and expansion of communication channels was also statistically significant.

Trust Building in Cyberspace (사이버 공간에서의 신뢰성 확보 방안 - 기업 내부관점에서 -)

  • Park, Gyeong-Hwan
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.403-415
    • /
    • 2003
  • This study is performed to examine the relationships between trust and antecedents in cyberspace. Trust is the major control system in cyberspace. Different time, different spaces, different cultures, indistinct boundaries, flexible structure, separation of information from matters, cybernetics, difficulty of control are differential characteristics between cyberspace and physical space. Providing fit information, use of effective electronic channels, previous trust management, feedback system about output, flexible culture, self-regulation, off-line meeting, providing information about tasks and roles, ability, and justice are supposed to have effects on trust in cyberspace. By electronic mediated systems, the company will have more business opportunity. But trust will be conditional factors of expanding business in cyberspace.

  • PDF

The Effect of Perception on the Quality of Nosocomial Infection Control on the Intention to Revisit : Focusing on the Mediating Effect of Perceived Risk and Trust (병원감염관리 질에 대한 인식이 재이용의도에 미치는 영향 -지각된 위험과 신뢰의 매개효과를 중심으로-)

  • Kang, Jae-Shin;Kim, Kwang-Jum
    • Korea Journal of Hospital Management
    • /
    • v.24 no.3
    • /
    • pp.11-26
    • /
    • 2019
  • Objectives: The purpose of this study was to investigate the effect of the perception on the quality of nosocomial infection control on perceived risk, trust, and the intention to revisit among the medical consumers. Method: 361 patients and their guardians who were hospitalized in women's hospital, Gangnam-gu, Seoul, participated in this study. The data was analyzed using SPSS Statistics 21.0. Results: The perception on the quality of nosocomial infection control had a negative(-) effect on perceived risk, a positive(+) effect on trust, a positive(+) effect on the intention to revisit. The perceived risk had a negative(-) effect on trust, a negative(-) effect on the intention to revisit. The trust had a positive(+) effect on the intention to revisit. The perceived risk was partially mediated by the perception on the quality of nosocomial infection control and the intention to revisit, while the trust was fully mediated by the perception on the quality of nosocomial infection control and the intention to revisit. Thus, it indicated that the perceived risk and trust had dual mediated effects as well as full mediated effects in the relationship between the perception on the quality of nosocomial infection control and the intention to revisit. Conclusions: The nosocomial infection control can be an important factor to contribute to hospital management by attract the loyal medical customers, not just cost-expenditure. The nosocomial infection control can help hospital revenue and customer management strategy. Thus, it will contribute to the effective marketing strategy in the medical field.

A TRUST REGION METHOD FOR SOLVING THE DECENTRALIZED STATIC OUTPUT FEEDBACK DESIGN PROBLEM

  • MOSTAFA EL-SAYED M.E.
    • Journal of applied mathematics & informatics
    • /
    • v.18 no.1_2
    • /
    • pp.1-23
    • /
    • 2005
  • The decentralized static output feedback design problem is considered. A constrained trust region method is developed that solves this optimal control problem when a complete set of state variables is not available. The considered problem is interpreted as a non-linear (non-convex) constrained matrix optimization problem. Then, a decentralized constrained trust region method is developed for this problem class exploiting the diagonal structure of the problem and using inexact computations. Finally, numerical results are given for the proposed method.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Antecedents and Consequences of Intention to Become a Customer: A Case Study of Islamic Banks in Indonesia

  • WARDANA, Miko Andi;RAHYUDA, I Ketut;SUKAATMADJA, I Putu Gde;GIANTARI, I Gusti Ayu Ketut
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.827-839
    • /
    • 2021
  • The aim of the study was to examine the effect of trust, awareness, attitude, subjective norms, and behavioural control on intention and examine the mediating role of trust in the relationship between awareness and attitude. The population was Muslims in Bali Province, with a sample of 150 respondents. Quantitative analysis is used based on multivariate analysis using the SEM model with a variance-based PLS. The results are as follows: (1) knowledge has a significant positive effect on attitude. (2) Awareness has no significant effect on attitude. (3) Awareness has a significant positive effect on trust. (4) Trust has a significant positive effect on attitude. (5) Attitude has no significant effect on intention. (6) Subjective norm has a significant positive effect on intention. (7) Behaviour control has a significant positive effect on intention. (8) The role of trust is a conscious mediation that impacts attitude. The study provides insight into Islamic bank managers to meet prospective customers' expectations and identify their intention to become customers through managing trust, awareness, attitude, subjective norms, behavioural control, and intention in one unified whole as internal resource. This study enriches empirical evidence on the Theory of Planned Behaviour, which examines knowledge, awareness, and belief.

Authentication and Trust Relationship Chaining for Resource Sharing Community (자원 공유 커뮤니티를 위한 인증 기술과 신뢰관계사슬)

  • Kim, Jeong Gon;Kim, Shin Kon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.55-69
    • /
    • 2010
  • This article proposed the authentication protocol for peer-to-peer resource sharing community. The proposed protocol does not require a priori information for generating and exchanging authentication key. Also this protocol can provide the delicate access control by allowing the user(authenticator) to assign the trust level to the authentication supplicant, which can be used to decide if the resource providing node will accept the resource sharing request from a resource requesting node. Trust Relationship Chaining provides the environment where trust levels (included in the trust table) of nodes in the resource sharing community are propagated among nodes when trust tables are exchanged between two nodes engaged in mutual authentication process and authentication refresh so that any two nodes which are not directly mutual-authenticated can assign the trust level each other for the access control for resource sharing. In the proposed protocol a node can implements the authentication refresh continuously to verify the effectiveness of authentication after mutual authentication so that the authentication of new node or authentication revocation(effectiveness cancellation) of the departed node can be propagated to the all the nodes in RSC and eventually safe resource sharing community is configured.