Trust violation and repair: The information privacy perspective

作者:

Highlights:

• Examines two types of privacy violation—unauthorized sharing and hacking.

• Investigates the efficacy of three types of response that companies could offer—apology, denial and no response.

• Provides a theoretical framework for trust violation and its repair process in the context of privacy violations.

• Examines the moderating influence of unauthorized sharing and hacking on trust violation and trust repair.

• Reports novel findings regarding how trust and trust beliefs are impacted as the result of privacy violation.

• Reports novel findings regarding the differential efficacy of companies’ responses in repairing the violated trust.

摘要

With the pervasive use of the Internet, customer information privacy violation is on the rise and companies could suffer by losing their customers' trust. While previous literature has identified factors that influence trust, less attention has been paid to how trust may be rebuilt after it is violated by negative events regarding customer information privacy. The study synthesized two salient theories (the attribution theory and the organizational justice theory) to investigate the process by which trust is violated by privacy breaches and the extent of its repair by company responses. We examine the moderating effects of two types of privacy violation—hacking and unauthorized sharing—on the trust violation and repair process. We investigate the efficacy of three response types—apology, denial and no response. Data were gathered using a controlled, scenario-based lab experiment. Our results showed the significant moderating impact of violation type on the process of trust violation and repair. Apology emerged as a universally effective response, although its reparative power was far less in unauthorized sharing than in hacking. Denial emerged as a complex response. Furthermore, the results showed that trustworthiness beliefs (ability, integrity, and benevolence) are differently impacted in the violation–repair process. Details of theoretical and managerial implications are discussed.

论文关键词:Trust violation,Trust repair,Privacy concern,Hacking,Unauthorized sharing

论文评审过程:Received 2 January 2014, Revised 6 December 2014, Accepted 24 January 2015, Available online 31 January 2015.

论文官网地址:https://doi.org/10.1016/j.dss.2015.01.009