1 - 4 of 4
ItemThe Implications of Trust in the Sharing Economy – An Empirical Analysis of Uber( 2017-01-04)Modern technologies, including mobile applications and Internet-based platforms, continuously foster the rise of the sharing economy. In this paper, we focus on Uber, a ridesharing platform that is one of the fastest growing startups worldwide. We take the perspective of a potential customer and investigate the implications of trust. In particular, we modify a research model by Gefen (2000) and investigate the influence of trust on the customers’ intentions: ‘Inquire about drivers’ and ‘Request a ride’. In this regard, we differentiate between ‘Trust in Uber’ and ‘Trust in drivers’, while incorporating the two antecedents: ‘Disposition to trust’ and ‘Familiarity with Uber’. The study employs survey data (n = 221) and structural equation modeling (CB SEM). Our results provide empirical evidence that ‘Trust in Uber’ influences the customers’ intentions, whereas the influence of ‘Trust in drivers’ is insignificant.
ItemPrivate vs. Business Customers in the Sharing Economy – The implications of Trust, Perceived Risk, and Social Motives on Airbnb( 2017-01-04)The sharing economy is continuously changing the hospitality industry while competing with incumbent businesses over the available market share. This study examines the peer-to-peer renting service Airbnb. In particular, we investigate how social motives, trust, and perceived risk of private and business customers, alter the accommodation provider’s intention to accept a booking request. Understanding the implications of private and business customers is key – not only for platform providers, but also for researchers investigating the sharing economy. In this article, we develop a questionnaire for assessing the influence of the respective customer type on trust, perceived risk, and the provider’s intention. Our pretest employs survey data (n = 53) and principal component analysis (PCA) to prepare a clean structural equation modeling.
ItemDeveloping a Mechanism to Study Code Trustworthiness( 2017-01-04)When software code is acquired from a third party or version control repository, programmers assign a level of trust to the code. This trust prompts them to use the code as-is, make minor changes, or rewrite it, which can increase costs and delay deployment. This paper discusses types of degradations to code based on readability and organization expectations and how to present that code as part of a study on programmer trust. Degradations were applied to sixteen of eighteen Java classes that were labeled as acquired from reputable or unknown sources. In a pilot study, participants were asked to determine a level of trustworthiness and whether they would use the code without changes. The results of the pilot study are presented to provide a baseline for the continuance of the study to a larger set of participants and to make adjustments to the presentation environment to improve user experience.