Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers

Page created by Enrique Fischer
 
CONTINUE READING
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 4, JULY 2000                                           395

  Perils of Internet Fraud: An Empirical Investigation
   of Deception and Trust with Experienced Internet
                       Consumers
                                                    Stefano Grazioli and Sirkka L. Jarvenpaa

    Abstract—How well can experienced Internet shoppers detect                     pages, or 2% of the total pages on the web [47]. There are
new forms of seller deception on the Internet? This study examines                 signs that the occurrence and damage of consumer deception is
consumer evaluations of a real commercial web site and a fraudu-                   increasing with the growth of Internet commerce. The public
lent site that imitates it. The forged site contains malicious manip-
ulations designed to increase trust in the site, decrease perceived                sensitivity to the issues of Internet business misconduct is on
risk, and ultimately increase the likelihood that visitors would buy               the rise [57]. The Internet Fraud Watch, a site sponsored by
from it. Besides measuring the consumer’s willingness to buy from                  a consumer league with ties to the U.S. government, receives
the site, this study recorded the actual ordering of a laptop. Re-                 an average of 1000 fraud reports per month [30]. Examples of
sults show that most subjects failed to detect the fraud manipula-                 deception include purchasing defective or nonexisting goods
tions, albeit a few succeeded. The fraud has the effect of increasing
the consumers’ reliance in assurance mechanisms and trust mech-                    [62], investing in underperforming securities [59], and paying
anisms, which in turn decrease perceived risk and increase trust in                in advance for services that will never be rendered [50].
the store. The study confirms hypothesized relationships between                      Security technologies, such as encryption and digital certifi-
purchase behavior, willingness to buy, attitudes toward the store,                 cates, are designed to avoid third-party tampering and eaves-
risk, and trust that are consistent with other trust models found                  dropping and help protect the privacy and integrity of the com-
in the literature. Past research is augmented by showing that per-
ceived risk and trust interact in their effects on consumer attitudes,             munications between parties. However, these technologies are
by distinguishing between the notions of assurance and trust, and                  not the only area that requires the attention of practitioners and
by identifying the effects of perceived deception on risk and trust.               researchers interested in e-commerce. To an extent, the Internet
Overall, the study sheds light on consumers’ vulnerability to attack               security technologies may even create a false sense of safety,
by hackers posing as a legitimate site.                                            since on-line consumers may have 100% secure communica-
                                                                                   tions with a dishonest merchant.
                            I. INTRODUCTION                                           Internet consumer deception—a term that includes the nar-
                                                                                   rower legal concept of “consumer fraud”—is defined as the ma-
I   MAGINE: you are on the Internet, shopping for a particular
    good or looking for information on a topic of interest. As
you browse, you find a link that bears either a familiar com-
                                                                                   licious manipulation of information presented on the Internet
                                                                                   for the purpose of inducing on-line consumers to act in ways
pany name, or perhaps the description of exactly what you were                     that unfairly benefit the provider of the manipulated informa-
looking for. As you click it, the link diverts you away from the                   tion (i.e., the seller). The key word in the definition is “un-
site you are seeking and brings you into a “parallel web,” one                     fairly”—emphasizing that consumers are subject to harm or in-
where the sites are not what they purport to be, but are faithful                  jury without counterbalancing benefits.
reproductions of the original sites. These reproductions are cre-                     The specific nature of Internet technology makes it difficult
ated by hackers to observe your behaviors, steal information                       to evaluate the trustworthiness of a merchant because it lowers
about you, and damage the reputation of the original sites by                      the cost of sending market signals and levels their quality. On
inserting inappropriate content and by not executing purchase                      the surface, an untrustworthy site may look just as glitzy and just
orders placed through the cloned sites. You might not even no-                     as legitimate as Microsoft’s or IBM’s. The consumer’s inability
tice that you’re not where you believe you are. After a while,                     to discriminate a fraudulent site from a legitimate site is a se-
you are ported back to the “true” web, completely unaware of                       rious problem for the sustained viability of Internet commerce.
what has happened.                                                                 The damage done by even a minority of opportunistic merchants
   Science fiction? Think again. This Internet fraud scheme,                       may have far-reaching consequences. The Internet might be-
called “page-jacking,” is estimated to have affected 25 million                    come the next “lemons market”: in an environment where it is
                                                                                   difficult to tell the difference between good and bad products,
                                                                                   the bad ones poison the market and drive away the good products
   Manuscript received November 11, 1999; revised March 22, 2000. This paper       and eventually the consumers [1]. Alternatively, the increase in
was recommended by Associate Editor C. Hsu.                                        the occurrence of reported cases of fraud might encourage gov-
   S. Grazioli is with the Department of Management Science and Informa-
tion Systems, University of Texas at Austin, TX 78712-1175 USA (e-mail:            ernmental regulation and oversight mechanisms which may in
grazioli@mail.utexas.edu).                                                         turn increase the cost of doing business online and decrease the
   S. L. Jarvenpaa is with the Center for Business, Technology, and Law, Depart-   channel’s competitiveness. Furthermore, an increase in the oc-
ment of Management Science and Information Systems, University of Texas at
Austin, TX 78712-1175 USA (e-mail: sjarvenpaa@mail.utexas.edu).                    currence of consumer deception might increase the entry bar-
   Publisher Item Identifier S 1083-4427(00)05145-6.                               riers to new businesses. Less well-known businesses may be
                                                               1083–4427/00$10.00 © 2000 IEEE
396                           IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 4, JULY 2000

perceived as riskier, more deceptive, and less trustworthy, which        In general, deception is hard to detect [21]. It has been argued
will result in conferring an advantage to incumbent companies         that the likelihood of successful detection is dependent on its
and possibly decreasing competition in the channel.                   frequency of occurrence: the more frequent the occurrence of a
   This paper explores the following research question: Are ex-       deceit, the more likely the victims are to learn how to circumvent
perienced Internet consumers able to detect Internet deceptions?      it ([45]; [1]). Yet, successful detection has been observed even
More specifically: Are they able to detect manipulations that are     in domains where the frequency of occurrence of the detection
somewhat unique to the Internet and are aimed at increasing           of deception is low [36]. To explain this success in unfamiliar
the level of consumer trust and assurance in the site even if         or novel situations, it has been proposed that individuals apply
they introduce strong internal inconsistencies as well? What are      to novel situations what they have learned about deception in
some of the mechanisms by which these manipulations affect            the course of their daily lives [7]. From exposure to a variety
perceived risk and trust in the site? Trust is defined here as the    of instances of deception and its detection across domains and
expectation that the promise of another can be relied upon and        experiences, individuals extract a small number of schemata1
that, in unforeseen circumstances, the other will act in the spirit   describing general tactics for deceiving others, as well as a cor-
of goodwill and in a benign fashion toward the trustor [28]. By       responding set of schemata describing general ways to detect
contrast, assurance exists when the seller will not cheat because     that one or more of the tactics are used by others against them.
of the fear of penalty [61].                                          Work by Dennett [16] and Johnson et al. [35] has proposed that
   The next section develops the conceptual background, the           potential victims solve the problem of detecting deception by
model, and the hypotheses that we developed to investigate the        identifying anomalies in the environment that has been manipu-
research question. The methodology designed to test the hy-           lated by the deceiver, and by interpreting these anomalies in the
potheses (a lab experiment) and the statistical analysis of the       light of the deceiver’s adversarial goals the deceiver’s possible
data is discussed in the Section III. A discussion of the results     actions.
and their limitations follows.                                           The diffusion of Internet transactions has opened a new
                                                                      forum for performing social exchanges as well as new opportu-
                                                                      nities to cheat. As the agents involved in Internet transactions
                II. CONCEPTUAL BACKGROUND                             do not have established psychological histories, we can expect
   This section begins by reviewing Cosmides and Tooby ’s “So-        that they will attempt to fall back to what they know from
cial Exchange” theory [10]. Social Exchange Theory focuses on         previous experiences with similar transactions, and in particular
how individuals detect forms of ‘cheating’ in social interactions     the physical counterparts of these transactions. Accordingly, we
and is used here to provide conceptual underpinnings for under-       expect to observe Internet variation of well-known deception
standing how consumers may detect instances of deception that         schemes, such as pyramid schemes, phony IPO’s, scholarship
are found in Internet commerce. Next, we highlight a few in-          scams, deceptive travel programs, false weight-loss claims,
stances of Internet deception, including Internet “page-jacking.”     questionable business opportunities, work-at-home schemes,
Lastly, we introduce a model of Internet consumer behavior that       prizes and sweepstakes, and credit card offers [23]
relates the concepts of perceived deception, trust, and risk.            More interestingly, however, the intrinsic nature of the In-
                                                                      ternet medium seems also to enable novel forms of deception,
A. Deception and Social Exchange Theory                               which were previously virtually impossible to execute. Page-
                                                                      jacking—the focus of this study—is a fraudulent scheme that
   Cosmides and Tooby’s Social Exchange Theory is rooted in           does not have an obvious equivalent in traditional channels.
a growing body of research that argues that human information         Page-jacking consists of redirecting a browser from the target
processing is tuned to the demands that originate from social         location intended by the user, to another location determined by
interactions (e.g., [66]; [10]; [12]; [6]; [8]; [40]). Examples of    the deceiver.
these demands include the need to predict the intentions of ad-          A particularly pernicious form of page-jacking occurs when
versaries ([64]; [29]; [16]; [31]), and the need to reason about      the unsuspecting user is redirected to a location difficult to dis-
permissions, obligations [8], and social exchanges [11].              tinguish from the intended site. Users who believe that they are
   Social Exchange Theory focuses on the detection of                 interacting with a friendly site, not the one to which they are
“cheating” in ‘”ocial exchanges.” A social exchange is broadly        actually connected, may behave in ways that are rather inappro-
defined as an interaction in which one party is obligated to          priate. For instance, a user might believe that she is accessing
satisfy a requirement of some kind, usually at some cost, in          her bank account on her bank web site, while in fact, she is re-
order to receive a benefit from some other party. “Cheating” is       vealing her username and password to a hacker site that is posing
the violation of the social contract and consists of taking the       as her bank. In addition, if, after stealing the information, the
benefit without satisfying the requirement.                           site simulates a system glitch, reconnects the user to the true
   The structure of social exchange encourages individuals to
                                                                         1Readers more familiar with traditional attribution theory and the work by
develop knowledge that allows for detecting efficiently and ef-
                                                                      Kelley may find similarities between the schemata describing the deception tac-
fectively whether someone is “cheating” them [10]. A series of        tics and the “causal schemata” described by Kelley [41]. Kelley’s schemata are
laboratory experiments (e.g., [27]; [12]) have found that this de-    abstractions from experience that we extract to interpret the environment, inclu-
tection knowledge can be general enough to enable efficient de-       sive of other agents and ourselves. According to his theory, schemata are partic-
                                                                      ularly useful when available information is insufficient, unclear or derived from
tection of instances of cheating that are unfamiliar, or that have    an infrequently occurring event [25], which is the case when a potential victim
not been encountered before by the detector.                          attempts to explain an identified anomaly that results from the deceit.
GRAZIOLI AND JARVENPAA: PERILS OF INTERNET FRAUD                                                                                        397

site, asks her to re-enter username and password, and therefore        that individuals have deep-seated tendencies with which they
establishes a true session with the bank, there is a good chance       are born or to which they are socialized early in life and that
that she will never know about the theft. Page-jacking is an inno-     make them either trust or not trust others. The characteristics of
vative scheme because the Internet medium makes it relatively          the trustee (seller) refer to the buyer’s beliefs in the integrity,
easy and inexpensive to simulate web sites owned by others (a          ability, and benevolence of the seller. The second mode is
“mimicking” tactic [35]), which was virtually impossible (or at        the process mode and relates to the trustor’s experience and
least much harder) to implement in the physical world.                 direct interactions with the trustee. Trust increases over time
    According to the arguments proposed above, one might sus-          as the trustor accumulates information about the seller through
pect that consumers will be particularly susceptible to be victim-     repeated encounters. The third mode is called the institutional
ized by page-jacking. Its relative novelty implies that consumers      mode and relates to established guidelines, either legislative
cannot tap into previous (non-Internet) experiences with similar       or unwritten, and the expectation that if the trust is violated,
schemes. The lack of similar experiences means that there is           penalties are forthcoming. McKnight et al. [52] developed a
little or no basis for learning how to detect it, which lead us to     model of initial trust formation and emphasized that in new
hypothesize that even relatively Internet-savvy consumers will         relationships there is no interaction with which to support the
have a high average rate of failure at detecting this specific form    process mode. In first-time encounters, trust is largely based on
of deception. We also hypothesize that frauds designed to en-          the characteristics of the trustor, assumptions made about the
gender trust in the malicious merchant, and mask his/her op-           traits of the trustee, and the institutional factors.
portunism by giving a sense of normality (“business as usual,”
acceptable risk) are most difficult to detect. That is, Internet de-   C. Perceived Risk and Uncertainty
ception is most perilous when the deceiver has constructed an             Risk refers to a consumer’s perceptions of uncertainty and
environment (e.g., website) that engenders trust and assurance         adverse consequences of engaging in an activity [20]; [44].
in the relationship between the consumer and the deceiver. The         When risk is present, trust is needed before a buyer is willing
next subsection will examine the concepts of trust and risk and        to transact with a seller. The greater the negative consequences
describe a model of consumer behavior that relates perceived           that a buyer faces from the seller’s failure to act trustworthily
deception, risk, and trust.                                            (i.e., the higher the risk), the higher the need for trust. Con-
                                                                       versely, if there is nothing to risk, there is no possibility for
B. Trust and Trust Building                                            exploitation, and consequently there is no need for trust [42].
   Kramer [44] defines trust as “a state of perceived vulner-          Risk presents a “test of trust” (Dasgupta, 1988).
ability or risk that is derived from individual’s uncertainty             Perceptions of risk have been found to be higher when con-
regarding the motives, intentions, and prospective actions of          sumers purchase products through direct rather than in-store
others on whom they depend.” Although acknowledging that               channels [58]. This is because the consumers lose the ability to
trust can include affective and social components, we shall            engage in direct observation of the seller behavior. More gener-
focus on the cognitive processes of trust and view trust as a          ally, the specific characteristics of the Internet arguably increase
choice process. Choice can depend on a calculative rationale or        both perceived and substantive risk via a variety of mechanisms:
can be based on heuristics (e.g., “everything is in proper order”)     for instance, the Internet reduces and in many cases eliminates
when interpreting motives and actions of other individuals. In         face-to-face interactions between sellers and consumers; lowers
particular, trust in a target is expected to be high when there is     the market costs of new entrants, possibly increasing the number
an expectation that the target behaves as expected without the         of fly-by-night operations and making it harder to separate le-
presence of any monitoring or surveillance [5].                        gitimate businesses from con men. In addition, the Internet al-
   Mayer et al. [51] proposed a general model of trust as a dyadic     lows firms from different legal and regulatory environments to
relationship between trustor and trustee. Although this model          present their offerings without a strong international legal and
assumes that the target of trust is an individual, other researchers   consumer protection system.
have argued that individuals can also hold expectations about the         The possibility that a seller withholds information about the
motives and behavior of a group or an organization [69]. In this       quality of a product or service, or about the performance of a
paper, we consider a situation where the trustor is a consumer         company, is a source of risk for potential buyers. Yamagishi et
who reaches a web store about which he/she has no prior knowl-         al. [67] refer to this situation as “social uncertainty.” Social un-
edge; the trustee is a website that sells goods and services on the    certainty exists when 1) the seller has an incentive to act in a way
web. The consumer has neither prior knowledge about any of the         that imposes costs (or harm) on the consumer; and 2) the buyer
store’s characteristics, nor has visited the site before or has had    does not have enough information to predict if the seller will
the opportunity to observe directly the seller’s behavior in terms     in fact act in such a way. Uncertainty increases when the buyer
of order confirmation, delivery, after sales support, and so forth.    cannot observe the quality of the product or the performance
Rather, the consumer is making a judgment of the merchant’s            and is therefore dependent on information that is provided by
trustworthiness based on the situational information that he/she       the seller.
gathers from the web site.                                                These conditions characterize many service and product
   Zucker [70] presented three different modes that produce            transactions on the Internet and can lead to the classic lemon
trust. The first mode pertains to the characteristics of the           problem [1]. Buyers cannot tell the real quality of the mer-
trustor (buyer) and trustee (seller). The characteristics of the       chandise displayed on a website. Furthermore, the seller has
trustor (buyer) are general dispositions. That is, we assume           an incentive to act dishonestly because the buyers’ knowledge
398                             IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 4, JULY 2000

Fig. 1. Model of Interent consumer behavior.

of the possibility of getting a lemon depresses their price             the consumer toward the website. That is, the effect of risk on
offerings, hence reducing the incentive for the seller to sell          attitudes toward a seller is mitigated because trust generates con-
quality merchandise and providing an incentive to sell lower            fidence that a consumer can deal with the seller successfully re-
quality merchandise (i.e., the lemons).                                 gardless of the potential negative consequences [14]. This hap-
   In situations where the sellers have incentives to act dishon-       pens because trust creates confidence in the buyer and this con-
estly, the less information the buyer has about the seller’s real in-   fidence might allow a consumer favorably consider a high-risk
tentions, the higher the need for the buyer to trust the seller. Kol-   purchase situation. When trust is high, risk considerations have
lock [43] examined trust in exchange relationships with varying         less of an impact on the formation of attitudes about the site.
levels of uncertainty. He found that people in the “high uncer-         Positive attitudes are expected to promote both purchase be-
tainty” condition rated their trading partners’ trustworthiness         havior and reported willingness to shop.
higher on average than did people in the low uncertainty con-              Fig. 1 presents a model of consumer behavior that relates de-
ditions (“certain” condition). Moreover, people in the high un-         ception, risk and trust. We do not expect the fraud to directly
certainty condition rated their best trading partner exceptionally      affect the consumer purchase behavior or the declared willing-
high on trust, much higher than those in the certainty condition.       ness to buy. Rather, we draw from the Theory of Reasoned Ac-
Overall, it was found that high social uncertainty is conductive        tion [24], and assume that the buyers’ beliefs about a site affect
of exchange relations only with the most trusted parties.               the buyers’ attitudes toward the site. Attitudes are either favor-
                                                                        able or unfavorable evaluations of the site. Attitudes toward the
D. Consequences of Trust                                                site in turn influence behavioral intention (i.e., willingness to
   The importance of trust in exchange relationships has long           buy), and behavior (i.e., actual purchase). Hence, we formally
been noted by marketing researchers (e.g., [26]). In consumer           hypothesize that purchase from a web store depends on the con-
product channels of distribution, trust has been found to im-           sumer’s attitude toward the web store (hypothesis H1a). Also,
pact attitudes, purchase intentions, and purchase behavior ([13];       willingness to buy from a web store depends on the consumer’s
[26]; [53]). One of the most valuable consequences of trust is the      attitude toward the web store (hypothesis H1b). In turn, con-
spontaneity in forming new exchange relationships [44]. Trust           sumers’ attitude is determined by trust (hypothesis H2a) and
“plays the role of a booster rocket that helps one to take off the      perceived risk (H2b). Finally, trust moderates the relationship
secure ground of committed relationships” [68]. Trust is the so-        between risk and attitude (H2c).
cial lubricant that facilitates the meeting of consumers and un-
familiar firms on the Internet.                                         E. Assurance Mechanisms and Deception
   Web stores that engender trust not only can improve the con-            Assurance mechanisms are designed to reduce the seller’s
sumers’ attitude toward shopping at the store, they can also mod-       incentive for opportunism. In a sense, assurance mechanisms
erate the relationship between risk and attitudinal orientation of      allow the consumers to give up control without losing control
GRAZIOLI AND JARVENPAA: PERILS OF INTERNET FRAUD                                                                                       399

[61]. Assurance mechanisms deal with conditions that reduce            accessible mechanisms to inform the public what the seals
the probability of deceitful behavior or increase the penalty for      meant. Something that is relatively easy to do on the Internet.
detected opportunistic behavior. Here we examine four forms of            Warranties are another form of safeguard or safety net. War-
assurance mechanism: seals, warranties, news clips, and phys-          ranties can be legally enforced. In certain industries, such as
ical location.                                                         computer manufacturing, warranties are expected by the con-
   The use of third-party seals is a form of structural assurance.     sumers. Companies are expected to stand behind their products.
An Internet seal is a means of authenticating the identity of a site   Potential harm on a company’s reputation or court litigation
and of assuring that the site possesses some desirable property        should reduce the incentive to act dishonestly with respect to
(e.g., high security standards) that has been verified by a trusted    warranties. Research reports mixed effects of the warranties on
third-party. For instance, the “CPA WebTrust” Seal issued by           product attitudes—some providing positive effects on reliability
the American Institute of CPA symbolizes that a CPA firm has           and quality ([39], [65]) and other reporting no effects on product
audited the web site and that the outcome of the audit has been        attitudes, risk, and intention to buy ([19], [22]).
satisfactory. AICPA Internet audits are performed at regular in-          News clips are also a form of a structural assurance like seals
tervals of time (as short as 90 days) and cover business prac-         and warranties. News clips provide third-party endorsement al-
tices, accounting controls, and information privacy protection.        beit less independent than seals. Consumers use news services
Another example is the seal made available by the Bureau of            and trade magazines as “second-hand” knowledge on others
Better Business. The “BBBOnLine” seal attests that the com-            with whom they interact. The assurance effect of news clips is,
pany owning the site has been in operation for at least a year,        however, less straightforward than seals and warranties. Many
has agreed to BBB advertising standards, and is a BBB member.          publications are known to be partial and tend to make only par-
In addition, information on the company and complaints raised          tial disclosures of what is paid advertisement and what is inde-
against it can be easily obtained at the BBB site. Other exam-         pendent review. Moreover, the effect of the news clips is likely
ples include the “SureServer” seal by Wells Fargo and the “Se-         to depend on the reader’s association with the magazine itself.
cureSite” seal by Verisign. These seals indicate that the site dis-    Finally, news clips provide less of a legal recourse than seals
playing it adopts up-to-date security technology and is regis-         and warranties. Still, sellers might be expected to try to live-up
tered with either the bank or the Internet Company. Seals are          to the descriptions in the news magazine out of fear of getting a
based on digital certificate technology.                               bad reputation or public sanction.
   A seal assures consumers of their expectations regarding the           Physical location also provides structural assurance. Phys-
other party’s behavior. Theoretically, seals should allow the          ical presence refers to investments in physical buildings, facil-
seal-sponsoring organizations (certificate authority) to act as        ities, and personnel. Greater resource investments might be in-
“go-betweens” in new relationships between the consumer and            terpreted to mean more stable relationships and business with
seller. A consumer should be able to transfer the confidence           other consumers and greater commitment by the seller to their
they have in the seal-sponsoring organization to the seller            current business. Commitment in turn should provide assurance
[18]. McKnight et al. [52] noted that structural assurances            to the consumer that the retailer will stay in business for some
can also be effective from a cognitive consistency perspective.        time. Physical location conveys what McKnight et al. [52 ] call
The consumer can infer that the seller will probably act in            “situational normality.” Situational normality involves a prop-
conformance with the seal because the site has gone through            erly ordered setting that appears likely to facilitate a successful
the trouble of obtaining and displaying the seal.                      interaction. A building helps convey professional appearance,
   Marketing researchers have studied the impact of third-party        prosperity, and security. These attributes can assure customer of
certification seals since 1950. Taylor [63] found no effect,           the reduced risk in engaging in a transaction.
but Parkinson [56] found a strong effect, suggesting that                 Assurance mechanisms are a form of control mechanism that
seals’ longevity of exposure might have an effect. Moreover,           reduces the likelihood of the seller taking advantage of the con-
Parkinson found that consumers attributed a great deal more            sumer and are therefore expected to reduce the level of risk per-
meaning to the presence of seals than what was justified (e.g.,        ceived by the consumer. Hence, we hypothesize that the level
consumers incorrectly believe that certain seals mean that the         of perceived risk is determined by the presence of assurance
endorsed products had been laboratory tested). Studies in later        mechanisms (seals, warranties, news clips, and physical loca-
years found that seals had a positive effect on the reputation         tion) (hypothesis H3a [see Fig. 1]). However, if a consumer
of new companies that were unfamiliar to consumers [46]                suspects that the assurance mechanisms themselves have been
or dealt with products unfamiliar to the consumers [38]. A             maliciously manipulated, we expect that the influence of these
positive impact was found if the sponsoring organization was a         mechanisms on perceived risk will be increased. That is, we ex-
professional organization or an independent testing organiza-          pect that the perceived deceptiveness of the web store moder-
tion rather than a government ([60], [49], [9], [38]). Although        ates the relationship between assurance mechanisms and risk
several studies report that seals are considered believable,           (H3c). Furthermore, we expect that this perception of deception
they also seem to report a decline in the comprehension of             directly influences the perceived risk of the web store (H3b).
seals. Recent work by Beltramini and Stafford [4] found that              We expect that perceived deception increases the strength
consumers do not know what seals represent and do not use              of the relationship between assurance mechanism and reduced
them in assessing the believability of advertising claims. The         risk. This is explained by the confirmation bias that suggests that
fundamental problem identified by Beltramini and Stafford              people tend to heed information that is consistent with their prior
was that the seal-sponsoring organizations had no readily              beliefs (Fiske and Taylor, 1984). Experienced Internet shop-
400                          IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 4, JULY 2000

pers are expected to have relatively strong beliefs of the general    store, the longer it is perceived to have consistently fulfilled its
safety of shopping on the Internet. A high level of perceived         promises and more likely it is to do so in the future.
deception will cause people to pay more attention to assurance           Hence, trust mechanisms are expected to increase the level of
mechanisms. The greater attention to structural safeguards will       trust perceived by the consumer. We hypothesize that the level
make them more convinced of any validating information that           of trust is determined by the presence of trust mechanisms (rep-
the site is secure to do business with. Hence, we expect per-         utation, customer testimonials, and size) (hypothesis H4a—see
ceived deception to result in consumers seeking cues about safe-      Fig. 1). As we argued above for perceived risk, we also specu-
guards. Finding validating information on assurances and penal-       late that trust is affected by the perceived deceptiveness of the
ties will confirm their beliefs and will help people assure them-     site (H4b) and that perceived deceptiveness moderates the rela-
selves that “things are okay.” Even a slight effort at confirmation   tionship between trust mechanisms and risk (H4c).
has been found to over inflate one’s confidence that reduced risk        We expect perceived deception to reduce the strength of the
is warranted [52].                                                    relationship between trust mechanisms and trust (H4c) because
                                                                      the suspicion that the trust mechanisms may have been inten-
F. Trust Mechanisms and Deception                                     tionally manipulated is likely to decrease the reliance on them.
   Trust mechanisms convey benign and goodwill intent by the          Many have noted the fragile nature of trust ([3], [54], [52]).
seller. That is, trust mechanisms engender a belief that a seller     “Trust is easier to destroy than create” [44]. Trust erodes when it
will act in the interest of the consumer and hence make the con-      is clear that the other party has multiple, particularly adversarial,
sumer willing to be vulnerable to the actions by the seller. We       motives [17]. According to McKnight et al. [52], trust will be
examined three forms of trust mechanisms: seller reputation,          fragile at the start of any exchange relationship because trust at
customer testimonials, and seller size.                               that point is based less on evidence of trustworthy behavior than
   Reputation is the extent to which buyers believe a seller is       on lack of contrary evidence. As behavioral evidence cumulates,
honest and concerned about its customers [18]. Reputation con-        it quickly replaces the illusions of indirectly obtained informa-
veys information about the seller’s past performance with other       tion. When the other party is a seller previously unknown to
buyers. To establish a good reputation, the seller is assumed         the consumer, suspicion of other motives might be triggered by
to have refrained from questionable behavior in the past. Rep-        forewarnings that a party might be untrustworthy or by situa-
utation captures the estimation of the seller’s willingness and       tional cues that suggest that the seller might have ulterior mo-
ability to perform an activity in a consistent fashion [48]. Firms    tives. This might suggest that even small contradictions or in-
with good reputation are known to be reluctant to jeopardize          consistencies in the seller’s claims should reduce the effect of
their reputation assets. Hence, reputation helps to estimate the      trust mechanisms on the consumer trust in a seller.
motives of the merchant in future exchanges and hence should             Finally, we expect that the fraud will have the effect of in-
build consumer trust in the seller.                                   creasing the credibility of the assurance mechanisms (H5a) and
   Customers testimonials similarly can help convey to the            the trust mechanisms (H5b). This is because attributes of the
consumer the seller’s concern for the consumers in general and        fraudulent site are deliberately manipulated to increase the per-
the seller’s willingness and ability to transact in a trustworthy     ceived presence of the assurance and trust mechanisms. The
manner. Customer testimonials might also promote trust                greater presence is expected to result in individuals to notice,
building based on stereotyping. According to McKnight et al.          study, and believe these mechanisms.
[52], people tend to infer a stereotype from one or two positive
attributes of the target and carry it over to other attributes of
the target, including trust. Positive stereotyping can quickly                                   III. METHOD
form positive trusting beliefs about other individuals. Positive         The hypotheses described above were evaluated by means of
statements by other customers on factors other than trust tend        a laboratory experiment. This section introduces and discusses
to color other perceptions and inferences about the other site        the subject sample, the experimental design, the measures, and
characteristics such as trustworthiness, particularly early in the    the models used to test them.
interaction with the web site.
   Customer testimonials can be seen as a form of consensus
                                                                      A. Subjects
information, a topic that has been examined by researchers in
social cognition [25]. Research in this field has shown that when        Eighty MBA students from sections of an IT class taught at a
information about an issue is poor or ambiguous, people are           major U.S. university participated in the experiment (58 males
especially susceptible to social influence, albeit the results of     and 22 females). Subjects were volunteers. As an incentive for
studies on consensus typically show that people use consensus         their participation, each received a 5% chance of winning $100
information in complex ways [25]. For instance, testimonials          and the opportunity to share the research results with the authors
that that are detrimental to a product might influence individuals    in a restricted-attendance meeting.
more than positive information about the product.                        All subjects—with one exception—owned a laptop (an
   Large organizational size suggests that other buyers trust the     academic requirement at the research site) with advanced
organization and conduct business successfully with it. Large         networking capabilities. On average, the subjects have been
size also signals that the seller has made investments in cus-        using the Internet for about four and a half years; 97.5% of
tomer services [18]. Larger stores might also be considered by        them have bought on-line at last an item and 41.1% buy over
customers to have been around longer. That is, the larger the         the net at least once a month.
GRAZIOLI AND JARVENPAA: PERILS OF INTERNET FRAUD                                                                                                401

B. Experimental Task                                                              trust and decrease perceived risk of the site, and ultimately in-
   All subjects were asked to assume that a friend of theirs                      crease the likelihood that visitors would buy from it.
(“Tom Dexter”) has decided to buy a used laptop because the                          The forged site was built from a copy of the original site.
one he owns is broken. Tom has identified a web site that sells                   Six modifications were made to the real site for the purpose
used laptops, and has selected one machine that suits well his                    of including a variety of assurance and trust-building mech-
needs (a Compaq 5100). He has made up his mind about the                          anisms. The specific modifications were developed from
laptop he wants, but not about buying it on-line. So, he is asking                either previous research (Jarvenpaa et al., 1999; Jarvenpaa and
the subject for a “second opinion” on the site. If the subject                    Tractinsky, 1999), from official documents (e.g., Federal Trade
feels comfortable with the site, he/she is also asked to purchase                 Commission releases) and practitioner press.
the laptop by using Tom’s credit card and personal information.                      1) Seal: a well-known third-party seal (Bureau of Better
The full text of the scenario is presented in Appendix A.                               Business) was accurately reproduced and inserted in the
   The subjects visited the site using their own laptops. If they                       home page of the fraudulent site. The third-party seal was
felt comfortable, they also purchased the laptop using the site’s                       linked to a faithfully reproduced report by the BBB that
secure on-line order entry facility. After that, the subjects were                      stated that the company’s business record is satisfactory.
instructed to minimize their browser windows and to perform                             The forged URL of the report suggested that the report
four additional steps:                                                                  was stored on a BBB server. The report was itself linked
   1) fill out the first part of a questionnaire;                                       to a variety of authentic BBB resources.
   2) go back to the site, purchase the laptop if they had not                       2) Warranty: the warranty offered by the store was modi-
       done so already;                                                                 fied so as to make it extreme (e.g., complete refund, no
   3) examine five specific features of the site (seals, news                           question asked, no time limit).
       clips, etc.), if they had not done so already;and                             3) News clips: False quotes from professional magazines
   4) fill out the rest of the questionnaire.                                           were created. The quotes stated that the site was excel-
   The task was performed at the University, under the supervi-                         lent both by itself and by comparison with the competi-
sion of the researchers. No time limits were imposed on com-                            tion. The quotes had links to the actual web sites of the
pletion. In general, the task took about one and a half hours to                        quoted magazines. For instance:
perform. Network connections were fast and reliable.                                  “Used Laptops.com ranked above Laptopcloseout.com,
   The scenario and task used in the experiment have several                        Innovative computers,... and Laptops for Le$$
properties that make it attractive in terms of experimental re-                     www.getadeal.com
alism:
                                                                                                         Mobile computing magazine,
   1) The site is a real commercial site that agreed to collab-                     May 1998—www.mobilecomputing.com
       orate in the study. The Compaq 5100 laptop mentioned
       in the scenario was actually in their inventory. The site                       “Used Laptops.com prices are ‘rock bottom’.”
       agreed to process the entry of the orders placed on behalf                                                     Computer Shopper,
       of Tom Dexter as any other order.                                            Jan. 1997—computershopper.zdnet.com
   2) The purchase price is significant enough to plausibly war-                     4) Physical location: a generic picture of a store was
       rant the need for a second opinion, given that the site does                     inserted in the site with a caption that identified it as
       not enjoy a well-known name;                                                     the company’s store, together with a randomly selected
   3) Subjects are familiar with the purchased merchandise.                             Seattle address. The real company has no physical store.
       They own laptops and they use them professionally on a                        5) Size: the site size and sales were grossly exaggerated (by
       daily basis. More than half of the subjects have purchased                       one order of magnitude):
       three or more computers in their lifetime. Almost all sub-
       jects purchased their current laptop on line.                                   “Our company has been in business over 5 years,
   4) At the research site, several instances of broken or stolen                   serving over twenty-five thousand customers.” [The
       laptops have occurred.                                                       words in boldface here were in boldface and in high-con-
                                                                                    trast color]
C. Design and Manipulations                                                          6) Customer Testimonials: Existing endorsements from
                                                                                        customers were substantively inflated by adding hy-
   Participants were randomly assigned to one of two condi-
                                                                                        perboles and taking out negative comments. Made-up
tions. Half of the subjects accessed the real commercial site,
                                                                                        names and domiciles (city) were added when missing or
and the other half accessed a copy of the site forged by the ex-
                                                                                        incomplete in the original site.
perimenters2 . The forged site is hosted on a different server and
contains several malicious manipulations designed to increase                          “We did receive the two laptops on 1-21-99 in great
                                                                                    shape: they looked brand new! Thank you again for the ex-
  2In either conditions, the students accessed the same url using their own         traordinary service and care in sending these laptops to us.
browsers. For the subjects in the ‘forged site’ condition, the browser requests     It was much appreciated. If we need anything else we will
were systematically diverted to another server, hosting the forged site. The        call on you again.
mechanism was transparent to the users. Access time to the real and forged site
was fast and virtually undistinguishable.                                              Pam Allman, Paris, PA”
402                             IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 4, JULY 2000

                                                                  TABLE I
                                               DESCRIPTIVE STATISTICS FOR THE MAIN CONSTRUCTS

D. Detectability of the Deception                                       and the control variables were computed as the mean of the rat-
                                                                        ings assigned to the items associated with each construct.
 The fraud could have been detected by identifying one or                  Purchase behavior was measured by asking the subjects
more of the following inconsistencies:                                  whether they had placed the order for the laptop (yes/no
      1) Seal: exploration of the BBB site leads to their searchable    answer). Measures of willingness to buy from the store
         database. Searching for the name of the company reveals        were derived from Jarvenpaa et al. (1999) and Jarvenpaa and
         that the company is not registered with the BBB and there      Tractinsky (1999). Four items asked to evaluate the likelihood
         is no report on them.                                          that the subject would “consider” buying from the store; the
      2) News clips: following the links to the magazines and           likelihood to “buy,” to “return” to the store, and the likelihood
         searching the databases of article reveals that the quoted     to “tell a friend about the store”. A fifth item, asking to evaluate
         articles do not exist.                                         the likelihood of making “a good bargain” was dropped because
      3) Testimonials: one person (same name and address) is            of inconsistent loading. Measures of positive attitude toward
         quoted twice.                                                  shopping at the store were culled from Jarvenpaa et al. (1999)
      4) Size: based on the information presented above the stores      and Jarvenpaa and Tractinsky (1999). Subject were asked to
         should be selling approximately fourteen computers a           agree that they “like” the idea of shopping at the web store, and
         day, 356 days a year. The store current inventory includes     that is an “appealing” or “good idea” (three items).
         only five computers.                                              The questionnaire included nine measures of trust, taken
      5) Physical location: The picture does not contain any iden-      from Jarvenpaa et al. (1999) and Jarvenpaa and Tractinsky
         tifiable sign. The store address is in Seattle, WA while the   (1999). Subjects were asked to agree with the statement that the
         store phone number has a California area code.                 store is “trustworthy,” “keeps its promises and commitments,”
      6) Warranty: the warranty is simply too good to be true. For      “keeps its customers’ best interest in mind,” and “can be relied
         instance, no expiration date is specified.                     upon.” Three items (the store “has good intentions,” “cares
                                                                        about doing things right,” and “will do a good job at handing
                                                                        any problems that might arise”) were dropped as they aligned
E. Measures                                                             to form a second factor, possibly due to method bias (the three
                                                                        items were the last three of a list of 20). Finally, two items: “I
   A questionnaire using 7-point scales was employed to col-            find it necessary to be cautious with this store” and “this store
lect measures for the main constructs and several control vari-         might not keep its promises and expectations” were dropped
ables. Whenever possible, items from previous published re-             because they cross-loaded with measures of perceived risk.
search were employed. Occasionally, the items were modified                Risk perception was measured by three items as found in Jar-
to adapt them to the specific experimental context. Appendix B          venpaa et al. (1999) and Jarvenpaa and Tractinsky (1999). Risk
contains the final items used for the constructs.                       items asked subjects to characterize the decision to buy at the
   Table I presents the main constructs in the study, descriptive       store as either an “opportunity” or a “risk,” a “high potential for
statistics and a measure of reliability (Cronbach’s alpha). No          loss” or a “gain,” and a “positive situation” or a “negative situa-
alpha was less than 0.85 for the main constructs and 0.63 for the       tion.” The last item cross-loaded with attitudes toward the store
control variables. Factor analyzes were conducted to verify that        and was dropped. Examination of the loadings also suggested
the items included in each construct load in a consistent fashion       to include an item dropped from another construct: “I feel that
and without strong cross loading. The values for the constructs         ordering the laptop is risky.”
GRAZIOLI AND JARVENPAA: PERILS OF INTERNET FRAUD                                                                                                403

   Perceived deception was measured by asking the subject to          store affects their purchase behavior and their willingness to
evaluate the extent in which they felt that the quality of in-        buy. Risk and trust are expected to affect the attitudes toward
formation about the store is “accurate” versus “misleading,”          shopping at the web store, with trust moderating the effect of
“truthful’ versus “deceptive,” and “factual” versus “distorted”       risk on attitudes. Perceived deception is expected to affect trust
(three items). These measures were found in [55]. As with other       and risk, and to moderate the relationship between trust and
items, responses to these items were summed to form a single          the trust mechanisms, and risk and the assurance mechanisms.
measure of perceived deception where higher scores indicate           Trust mechanisms included in the deceptive manipulation are
greater levels of perceived deception.                                expected to increase consumers’ trust in the web store, and as-
   Perceived reliance on assurance mechanisms was measured            surance mechanisms are expected to reduce the consumer’s per-
by scales that asked subject to evaluate how “believable,”            ceived risk of buying from it (see Fig. 1).
“convincing,” and “impartial” were the third-party seals and
the news clips provided by the site (            items), and how      A. Detection Success
“believable,” “convincing,” and “fair” (three items) were the            The data suggest that most of the subjects were not able to
warranties. The items were adapted from [4]. In addition, two         detect the page-jacking deception. Only eight individuals out
items asked whether the store had a physical presence (two            of a sample of eighty believed that they were visiting a fraudu-
items). Physical presence items were constructed for this study       lent site. Of these eight cases, seven are correct detections (i.e.,
and are presented in Appendix B.                                      rating the forged site as highly deceptive), and one is a false
   Perceived reliance on trust-building mechanisms was mea-           alarm (i.e., rating the legitimate site as highly deceptive). This
sured by asking subject to evaluate how “convincing,” “believ-        high ratio of successes to false alarms suggests that the sub-
able,” and “biased” (three items) was the information about           jects were not simply guessing the deceptiveness of the site (chi
company size, and how “convincing,” “believable,’” and “im-           square test             ), and that detection is possible, albeit in-
partial” were the customer testimonials (three items), and to as-     frequent.
sess the “good reputation,” of the store (two items), how “well          At the same time, 33 individuals out of the forty who ex-
known” it is, and whether is has a “good name.” These items           amined the fraudulent site (82%), did not detect the deception.
were adapted from [4].                                                Furthermore, 25 of these 33 (76%) actually ordered the com-
   Control variables include attitude toward computers, toward        puter from the forged site. The observation of such a widespread
web shopping in general, and attitude toward risk. Positive at-       failure to detect is consistent with other studies of deception de-
titude toward computers was measured by asking the level of           tection (e.g., Johnson et al., 1992) and the prediction from social
agreement with statement describing how subjects “enjoy” com-         exchange theory.
puter use as “fun,” and “interesting” (Jarvenpaa et al., 1999; Jar-      As expected, on average the fraud does not have a direct im-
venpaa and Tractinsky, 1999). Attitude to trust Internet stores       pact on either the purchase behavior (chi square:                ) or
was measured by asking the subjects to agree with statement           the consumer’s willingness to buy (ANOVA:                    ). This
that “most sites” are “honest,” “can be counted on,” and “tell        is consistent with the notion of a widespread failure to detect,
the truth.” These items were constructed for this study.              and justifies the need to explore in more details the relationships
   Positive attitude toward Internet safety was the target of         contained in the model of consumer behavior depicted in Fig. 1.
three items measuring the level of agreement with feeling “safe
completing commercial transactions over the Internet,” with           B. Purchase, Willingness to Buy and Attitude
the statement “the Internet is secure,” and “it is best to avoid
shopping from the Internet” (reversed scale). Positive attitude          We have hypothesized that purchase behavior (H1a) and will-
toward virtual stores was measured by assessing agreement that        ingness to buy from the store (H1b) depend on the attitude to-
“buying from web-only stores is more risky’” (reversed scale),        ward the web store. Both hypotheses were accepted with
“may cause more problems than buying from sites that do have                 . Given the dichotomous nature of purchase behavior as
a physical store,” and it is “risky” (both reversed scales). These    dependent variable, hypothesis H1a was tested by means of lo-
items were specifically developed for this study. A variety of        gistic regression. Hypotheses H1b and all other hypotheses were
demographic information were also collected.                          tested by means of linear regressions. The results of these ana-
   The main analysis was conducted by means of linear regres-         lyzes are summarized in Table II.
sions, specified by the model presented in Fig. 1. The sample            Since willingness to buy was not normally distributed, a trans-
size             makes the use of structural equation modeling        formation was applied (tangent) to restore normality. One case
techniques not viable (Kline, 1998).                                  was excluded from the analysis as an outlier3 . Among the con-
                                                                      trol variables, only general attitudes toward the web had a sig-
                                                                      nificant coefficient                  in the linear regression, and
                          IV. RESULTS                                 none is significant in the logistic regression. The logistic model
                                                                      correctly predicts 83% of the observed purchase behavior. The
   The order of presentation of the results corresponds to the
                                                                      linear model explains 75% of the observed variability in the
order in which the hypotheses are discussed in the theory sec-
                                                                      willingness to buy.
tion. We begin by presenting evidence that most of our subjects
                                                                         As a validity check, we asked the subjects whether they would
were not able to detect the page-jacking fraud. We then present
                                                                      recommend the site to a friend. One-way ANOVA’s confirmed
results on the determinants of their purchasing behavior. We ex-
pect to find that the consumers’ attitude toward shopping at the        3The   observation was more than three standard deviations from the mean.
404                             IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 30, NO. 4, JULY 2000

that those who ordered the laptop had higher willingness to buy          C. Risk, Assurance Mechanisms and Perceived Deception
 mean              than those who did not mean
                                                                            The third regression tested whether the assurance mech-
        . The same applies for those who would recommend the
                                                                         anisms present in the web site have an effect on risk (H3a),
site to a friend, (mean            and                  ).
                                                                         and whether perceived deception affects risk (H3b) and has
   The second regression tested whether positive attitude toward
                                                                         a moderating effect on the relationship between assurance
the specific store depended on trust (H2a) and perceived risk
                                                                         mechanisms and risk (H3c). H3c was tested using the same
(H2b), and whether there are moderating effects of trust on risk
                                                                         technique illustrated above [(1)–(3)].
(H2c). Trust and risk are correlated                            , but
                                                                            All three hypotheses were accepted. Assurance mechanisms
distinct constructs. Exploratory factor analysis identified two
                                                                         have the expected negative impact on risk                   . Per-
separate factors (no cross-loading above 0.350). As before, the
                                                                         ceived deception has the expected impact on risk                 :
dependent variable was transformed to restore normality, and a
                                                                         the higher the perceived deception, the higher the risk. Also as
set of control variables was included in the regression equation.
                                                                         expected, the level of perceived deception moderates the rela-
One case was identified as an outlier and excluded from the
                                                                         tionship between assurance mechanisms and risk. When the per-
regression (see footnote 2).
                                                                         ceived deceptiveness of a site is high, the impact of assurance
   All three hypotheses were accepted. The standardized co-
                                                                         mechanisms on risk becomes stronger                  , which cor-
efficients of trust and risk were significant (                  and
                                                                         respond to the intuitive notion that subjects seek more assurance
            , respectively), relatively large, and with the expected
                                                                         when they perceive that the information about the site might
sign. Among the control variables, only attitude toward Internet
                                                                         have been maliciously manipulated. Altogether, the deception
security had a significant impact                    on the attitude
                                                                         and assurance mechanisms explain 52% of the observed vari-
toward the specific store.
                                                                         ability of risk.
   A two-step procedure was employed to test whether trust
has a moderating effect on risk. First, a dummy variable
(HITRUST) was created. HITRUST is equal to 1 if trust is                 D. Effects of the Fraud
above its mean (3.60), and 0 otherwise. Then, for each subject,             ANOVA shows that the fraud treatment has a significant ef-
the value of risk was multiplied by HITRUST. The resulting               fect on the perceived reliance on the assurance mechanisms
variable, RISK BY HITRUST, assumes the value of risk when                              . On average, the effect of the fraud was to increase
trust is high, and zero otherwise. Ignoring for simplicity the           the perception of assurance, which again suggests that most sub-
other variables included in the model, the resulting regression          jects did not detect it.
equation is                                                                 Four additional analyzes—more exploratory in nature—were
                                                                         conducted to identify the effect of the treatment (fraud) on each
           ATTITUDE          constant   RISK                             individual assurance mechanism. The first analysis examined
                                 RISK BY HITRUST                  (1)    the third-party seal as an assurance mechanism. Marginally sig-
                                                                         nificant results suggest that more subjects in the fraud condi-
or, equivalently                                                         tion heeded the BBB seal than subjects in the control condition
         ATTITUDE         constant                                       heeded a no-name seal                    . Seal credibility has the ef-
                                                                         fect of decreasing perceived risk                                   and
                               RISK      when trust is low        (2)    overall deceptiveness of the site                                 .
and                                                                         Since warranties were provided in both the fraudulent and
                                                                         legitimate site, no significant difference was expected in the
      ATTITUDE       constant                                            number of subjects that heeded warranty information in either
                                   RISK when trust is high (3)           condition. In fact, none was found. Subjects in the fraud treat-
                                                                         ment judged the manipulated warranties more assuring than the
   The coefficient of RISK BY HITRUST            can be interpreted      original warranties                  . In turn, the perceived degree
as the change in the impact of risk on attitudes that occurs when        of assurance of the warranties was significantly correlated to the
trust is high. We expect the coefficient to be positive in sign, i.e.,   perceived risk                                 and overall deceptive-
to reduce the negative slope of the relationship between risk and        ness of the site                                .
attitude, which correspond to the intuitive notion that when trust          Subjects in the fraud condition heeded more the forged news
is high, risk considerations have less effect on the formation of        clips                 , but did not found them on average more
attitudes.                                                               assuring                  , than subjects in the control condition.
   The test of the coefficient of RISK BY HITRUST confirms the           Qualitative analysis suggests that this result might be explained
intuition                . The coefficient of perceived risk is re-      by the higher dispersion of the responses in the fraud condition:
duced to about half when the level of trust is high. Overall, risk,      the forged clip elicited both higher assurance and lower assur-
trust and the control variables in the second regression explain         ance judgments, leaving the mean statistically unaffected. The
71% of the observed variability of the positive attitude toward          assurance of the news clips was significantly correlated to both
the store. A plot of the residuals of the regression suggests that a     risk and deceptiveness of the site (                              , and
significant variable might been left out from the specification of                                   , respectively).
the equation. Several attempts were made to identify the missing            The experimental manipulation designed to elicit the percep-
variable, without success.                                               tion that the site had a physical presence (a picture of the ‘store,’
You can also read