{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:21:27Z","timestamp":1774398087157,"version":"3.50.1"},"reference-count":94,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T00:00:00Z","timestamp":1344556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8,10]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Trust is a social factor at the foundations of human action. The pervasiveness of trust explains why it has been studied by a large variety of disciplines, and its complexity justifies the difficulties in reaching a shared understanding and definition. As for all the social factors, trust is continuously evolving as a result of the changes in social, economic and technological conditions. The internet and many other Information and Communication Technologies (ICT) solutions have changed organizational and social life. Such mutated scenarios challenged what researchers know about trust, thus several studies tried to investigate the difference between online and traditional (physical) environments. The purpose of this paper is to solve this multi\u2010dimensional puzzle by presenting a conceptual framework that will take into consideration the complexity of ICT mediated\u2010trust.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The extant literature still lacks a homogeneous framework and presents a large amount of different perspectives, each one addressing a very specific issue. By using the methodology suggested by Short and Cropanzano the paper proposes a conceptual model for understanding the dynamics of trust in online settings. In doing so the authors' adopted the Actor Network Theory conceptual frame for disentangling the ambiguous role of technology in its relation with trust.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>This paper provides an ultimate conceptual model on trust in virtual settings.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The proposed model will help systematize the extant contributions and also identify the gaps that can be addressed by future researches.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The model permits the understanding of the dynamics of trust in online settings.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961211261076","type":"journal-article","created":{"date-parts":[[2012,8,4]],"date-time":"2012-08-04T07:10:23Z","timestamp":1344064223000},"page":"187-202","source":"Crossref","is-referenced-by-count":16,"title":["Organizational trust in a networked world"],"prefix":"10.1108","volume":"10","author":[{"given":"Luca","family":"Giustiniano","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Bolici","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012420210349200_b1","doi-asserted-by":"crossref","unstructured":"Amin, A. and Thrift, N. (1992), \u201cNeo\u2010Marshallian nodes in global networks\u201d, International Journal of Urban and Regional Research, Vol. 16, pp. 571\u201087.","DOI":"10.1111\/j.1468-2427.1992.tb00197.x"},{"key":"key2022012420210349200_b2","unstructured":"Arnold, D.M. and Tavani, H.T. (2011), \u201cTrust and privacy in our networked world\u201d, Information, Vol. 2 No. 1, pp. 140\u201065."},{"key":"key2022012420210349200_b3","unstructured":"Barber, B. (1983), The Logic and Limits of Trust, Rutgerts University Press, New Brunswick, NJ."},{"key":"key2022012420210349200_b4","doi-asserted-by":"crossref","unstructured":"Barret, M., Grant, D. and Wales, N. (2006), \u201cICT and organizational change\u201d, The Journal of Applied Behavioral Science, Vol. 42 No. 1, pp. 6\u201022.","DOI":"10.1177\/0021886305285299"},{"key":"key2022012420210349200_b5","doi-asserted-by":"crossref","unstructured":"Bauer, T.N. and Erdogan, B. (2010), \u201cDifferentiated leader\u2010member exchanges: the buffering role of justice climate\u201d, Journal of Applied Psychology, Vol. 95 No. 6, pp. 1104\u201020.","DOI":"10.1037\/a0020578"},{"key":"key2022012420210349200_b6","doi-asserted-by":"crossref","unstructured":"Benbasat, I., Gefen, D. and Pavloua, A. (2008), \u201cTrust in online environments\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 5\u201011 (special issue).","DOI":"10.2753\/MIS0742-1222240400"},{"key":"key2022012420210349200_b8","unstructured":"Bolici, F. (2005), \u201cAnalyzing the link between technology and organizational knowledge from a social\u2010practice perspective\u201d, Proceedings of EGOS'05 (European Group on Organizational Studies), Berlin, June 30\u2010July 2, pp. 1\u201020."},{"key":"key2022012420210349200_b7","unstructured":"Bolici, F. (2011), \u201cThe role of information sharing and social community in the evolution of collaborative food networks\u201d, Agribusiness and Information Management, Vol. 3 No. 1, pp. 1\u201010."},{"key":"key2022012420210349200_b9","doi-asserted-by":"crossref","unstructured":"Bos, N., Olson, J., Gergle, D., Olson, G. and Wright, Z. (2002), \u201cEffects of four computer\u2010mediated communications channels on trust development\u201d, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Changing Our World, Changing Ourselves (CHI '02), ACM, New York, NY, pp. 135\u201040.","DOI":"10.1145\/503376.503401"},{"key":"key2022012420210349200_b10","doi-asserted-by":"crossref","unstructured":"Brower, H.H., Scott, W., Lester, M., Korsgaard, A. and Dineen, B.R. (2009), \u201cA closer look at trust between managers and subordinates: understanding the effects of both trusting and being trusted on subordinate outcomes\u201d, Journal of Management, Vol. 35 No. 2, pp. 327\u201047.","DOI":"10.1177\/0149206307312511"},{"key":"key2022012420210349200_b11","doi-asserted-by":"crossref","unstructured":"Brown, A.D. (1998), \u201cNarrative, politics and legitimacy in IT implementation\u201d, Journal of Management Studies, Vol. 35 No. 1, pp. 35\u201058.","DOI":"10.1111\/1467-6486.00083"},{"key":"key2022012420210349200_b12","doi-asserted-by":"crossref","unstructured":"Butler, J.K. (1991), \u201cToward understanding and measuring conditions of trust: evolution of a conditions of trust inventory\u201d, Journal of Management, Vol. 17 No. 3, pp. 643\u201063.","DOI":"10.1177\/014920639101700307"},{"key":"key2022012420210349200_b13","unstructured":"Callon, M. (1986), \u201cSome elements of a sociology of translation\u201d, in Law, J. (Ed.), Power, Action, Belief: A New Sociology of Knowledge?, Routledge and Kegan Paul, London, pp. 196\u2010233."},{"key":"key2022012420210349200_b14","doi-asserted-by":"crossref","unstructured":"Callon, M. (1991), \u201cTechno\u2010economic networks and irreversibility\u201d, in Law, J. (Ed.), A Sociology of Monsters: Essays on Power, Technology and Domination, Routledge, London, pp. 132\u201061.","DOI":"10.1111\/j.1467-954X.1990.tb03351.x"},{"key":"key2022012420210349200_b15","doi-asserted-by":"crossref","unstructured":"Carnall, C.A. (1986), \u201cToward a theory for the evaluation of organizational change\u201d, Human Relations, Vol. 39 No. 8, pp. 745\u201066.","DOI":"10.1177\/001872678603900803"},{"key":"key2022012420210349200_b16","doi-asserted-by":"crossref","unstructured":"Ciborra, C.U. (1996), \u201cPlatform organization: recombining strategies, structures, and surprises\u201d, Organization Science, Vol. 7 No. 2, pp. 103\u201018.","DOI":"10.1287\/orsc.7.2.103"},{"key":"key2022012420210349200_b17","unstructured":"Ciborra, C.U. and Hanseth, O. (2000), \u201cIntroduction: from control to drift\u201d, in Ciborra, C., Braa, K. and Cordella, A. (Eds), From Control to Drift, Oxford University Press, Oxford, pp. 1\u201011."},{"key":"key2022012420210349200_b18","unstructured":"Clarioni, G. and Giustiniano, L. (2011), \u201cOutsourcing, business performance and vertical integration boundaries: an empirical analysis\u201d, Proceedings of the World Business and Social Science Research Conference, Las Vegas, NV, USA, October 27\u201028."},{"key":"key2022012420210349200_b19","doi-asserted-by":"crossref","unstructured":"Cropanzano, R. (2009), \u201cWriting nonempirical articles for Journal of Management: general thoughts and suggestions\u201d, Journal of Management, Vol. 35 No. 6, pp. 1304\u201011.","DOI":"10.1177\/0149206309344118"},{"key":"key2022012420210349200_b22","doi-asserted-by":"crossref","unstructured":"DeLong, D. and Fahey, L. (2000), \u201cDiagnosing cultural barriers to knowledge management\u201d, Academy of Management Executive, Vol. 14 No. 4, pp. 113\u201027.","DOI":"10.5465\/ame.2000.3979820"},{"key":"key2022012420210349200_b23","doi-asserted-by":"crossref","unstructured":"Deng, L. and Poole, M.S. (2010), \u201cAffect in web interfaces: a study of the impacts of web page visual complexity and order\u201d, MIS Quarterly, Vol. 34, pp. 711\u201030.","DOI":"10.2307\/25750702"},{"key":"key2022012420210349200_b24","doi-asserted-by":"crossref","unstructured":"deVries, W.A. (2011), \u201cSome forms of trust\u201d, Information, Vol. 2, pp. 1\u201016.","DOI":"10.3390\/info2010001"},{"key":"key2022012420210349200_b25","unstructured":"Dosi, G. and Salvatore, R. (1992), \u201cThe structure of industrial production and the boundaries between firms and markets\u201d, in Storper, M. and Scott, A. (Eds), Pathways to Industrialization and Regional Development, Routledge, London, pp. 171\u201095."},{"key":"key2022012420210349200_b26","doi-asserted-by":"crossref","unstructured":"Durante, M. (2010), \u201cWhat is the model of trust for multi\u2010agent systems? Whether or not e\u2010trust applies to autonomous agents\u201d, Knowledge, Technology, & Policy, Vol. 23 Nos 3\/4, pp. 347\u201066.","DOI":"10.1007\/s12130-010-9118-4"},{"key":"key2022012420210349200_b28","unstructured":"Festr\u00e9, A. and Giustiniano, L. (2011), \u201cRelational capital and appropriate incentives: a recipe for human resources sustainability\u201d, Proceedings of the 2011 International Conference on Human Resources Development, Taipei, Taiwan, September 28\u201030, pp. 101\u201012."},{"key":"key2022012420210349200_b29","unstructured":"Gambetta, D. (1990), Trust: Making and Breaking Cooperative Relations, Blackwell, Oxford."},{"key":"key2022012420210349200_b30","doi-asserted-by":"crossref","unstructured":"Gefen, D., Benbasat, I. and Pavlou, P.A. (2008), \u201cA research agenda for trust in online environments\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 275\u201086.","DOI":"10.2753\/MIS0742-1222240411"},{"key":"key2022012420210349200_b31","unstructured":"Giddens, A. (1984), The Constitution of Society: Outline of the Theory of Structuration, Polity Press, Cambridge."},{"key":"key2022012420210349200_b32","unstructured":"Giddens, A. (1990), The Consequences of Modernity, Polity Press, Cambridge."},{"key":"key2022012420210349200_b33","doi-asserted-by":"crossref","unstructured":"Grodzinsky, F., Miller, K. and Wolf, M. (2011), \u201cDeveloping artificial agents worthy of trust: would you buy a used car from this artificial agent?\u201d, Ethics and Information Technology, Vol. 13 No. 1, pp. 17\u201027.","DOI":"10.1007\/s10676-010-9255-1"},{"key":"key2022012420210349200_b34","unstructured":"Hanseth, O. and Monteiro, E. (1995), \u201cSocial shaping of information infrastructure\u201d, in Orlikowski, W., Walsham, G., Jones, M.R. and DeGross, J. (Eds), Information Technology and Changes in Organizational Work, Chapman & Hall, London, pp. 325\u201043."},{"key":"key2022012420210349200_b35","unstructured":"Hayes, N. and Walsham, G. (2000), \u201cSafe enclaves, political enclaves and knowledge working\u201d, in Prichard, C., Hull, R., Chumer, M. and Willmott, H. (Eds), Managing Knowledge: Critical Investigations of Work and Learning, Macmillan, Basingstoke, pp. 69\u201087."},{"key":"key2022012420210349200_b36","doi-asserted-by":"crossref","unstructured":"Hossain, L. and Wigand, R.T. (2004), \u201cICT enabled virtual collaboration through trust\u201d, Journal of Computer\u2010Mediated Communication, Vol. 10 No. 1, pp. 22\u201031.","DOI":"10.1111\/j.1083-6101.2004.tb00233.x"},{"key":"key2022012420210349200_b37","doi-asserted-by":"crossref","unstructured":"Huff, L. and Kelley, L. (2003), \u201cLevels of organizational trust in individualist versus collectivist societies: a seven\u2010nation study\u201d, Organization Science, Vol. 14 No. 1, pp. 81\u201091.","DOI":"10.1287\/orsc.14.1.81.12807"},{"key":"key2022012420210349200_b38","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.L., Knoll, K. and Leidner, D.E. (1998), \u201cIs anybody out there? Antecedents of trust in global virtual teams\u201d, Journal of Management of Information Systems, Vol. 14 No. 4, pp. 29\u201064.","DOI":"10.1080\/07421222.1998.11518185"},{"key":"key2022012420210349200_b39","unstructured":"Joinson, A.N. and Paine, C.B. (2007), \u201cSelf\u2010disclosure, privacy and the internet\u201d, in Joinson, A.N., McKenna, K., Postmes, T. and Reips, U. (Eds), Oxford Handbook of Internet Psychology, Oxford University Press, Oxford, pp. 237\u201052."},{"key":"key2022012420210349200_b40","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A. and Bewsell, G. (2010), \u201cTrust and trust management\u201d, Journal of Theoretical and Applied Electronic Commerce Research, Vol. 5 No. 2, pp. I\u2010II (special issue).","DOI":"10.4067\/S0718-18762010000200001"},{"key":"key2022012420210349200_b41","doi-asserted-by":"crossref","unstructured":"Kasper\u2010Fuehrera, E.C. and Ashkanasy, N.M. (2001), \u201cCommunicating trustworthiness and building trust in interorganizational virtual organizations\u201d, Journal of Management, Vol. 27 No. 3, pp. 235\u201054.","DOI":"10.1177\/014920630102700302"},{"key":"key2022012420210349200_b42","doi-asserted-by":"crossref","unstructured":"Kimble, C. (2011), \u201cBuilding effective virtual teams: how to overcome the problems of trust and identity in virtual teams\u201d, Global Business & Organizational Excellence, Vol. 30 No. 2, pp. 6\u201015.","DOI":"10.1002\/joe.20364"},{"key":"key2022012420210349200_b43","doi-asserted-by":"crossref","unstructured":"Klein, H. and Myers, M. (1999), \u201cA set of principles for conducting and evaluating interpretive field studies in information systems\u201d, MIS Quarterly, Vol. 23 No. 1, pp. 67\u201094.","DOI":"10.2307\/249410"},{"key":"key2022012420210349200_b45","unstructured":"Knoke, D. and Kuklinski, J. (1982), Network Analysis, Sage, Beverly Hills, CA."},{"key":"key2022012420210349200_b46","doi-asserted-by":"crossref","unstructured":"Kramer, R.M. and Tyler, T.R. (Eds) (1996), Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA.","DOI":"10.4135\/9781452243610"},{"key":"key2022012420210349200_b47","unstructured":"Latour, B. (1986), \u201cThe powers of association\u201d, in Law, J. (Ed.), Power, Action and Belief: A New Sociology of Knowledge?, Routledge and Kegan Paul, London, pp. 264\u201080."},{"key":"key2022012420210349200_b48","unstructured":"Latour, B. (1987), Science in Action, Open University Press, Milton Keynes."},{"key":"key2022012420210349200_b50","doi-asserted-by":"crossref","unstructured":"Law, J. (1986), \u201cOn the methods of long\u2010distance control: vessels, navigation, and the Portuguese route to India\u201d, in Law, J. (Ed.), Power, Action and Belief: A New Sociology of Knowledge?, Routledge and Kegan Paul, London, pp. 234\u201063.","DOI":"10.1111\/j.1467-954X.1984.tb00114.x"},{"key":"key2022012420210349200_b51","unstructured":"Law, J. (1994), Organizing Modernity, Blackwell, Oxford."},{"key":"key2022012420210349200_b49","unstructured":"Law, J. and Whittaker, J. (1988), \u201cOn the art of representation: notes on the politics of visualization\u201d, in Fyfe, G. and Law, J. (Eds), Picturing Power: Visual Depiction and Social Relations, Routledge, London, pp. 160\u201083."},{"key":"key2022012420210349200_b52","doi-asserted-by":"crossref","unstructured":"Lewicki, R.J., Tomlinson, E.C. and Gillespie, N. (2006), \u201cModels of interpersonal trust development: theoretical approaches, empirical evidence, and future directions\u201d, Journal of Management, Vol. 32 No. 6, pp. 991\u20101022.","DOI":"10.1177\/0149206306294405"},{"key":"key2022012420210349200_b53","doi-asserted-by":"crossref","unstructured":"Lin, A. and Silva, L. (2005), \u201cThe social and political construction of technological frames\u201d, European Journal of Information Systems, Vol. 14 No. 1, pp. 49\u201059.","DOI":"10.1057\/palgrave.ejis.3000521"},{"key":"key2022012420210349200_b55","unstructured":"Luhmann, N. (1979), Trust and Power, Wiley, New York, NY."},{"key":"key2022012420210349200_b59","doi-asserted-by":"crossref","unstructured":"McDermott, R. (2000), \u201cWhy information technology inspired but cannot deliver knowledge management\u201d, in Lesser, E.L., Fontaine, M.A. and Slusher, J.A. (Eds), Knowledge and Communities, Butterworth\u2010Heinemann, Woburn, MA.","DOI":"10.1016\/B978-0-7506-7293-1.50005-6"},{"key":"key2022012420210349200_b60","doi-asserted-by":"crossref","unstructured":"McEvily, B., Perrone, V. and Zaheer, A. (2003), \u201cTrust as an organizing principle\u201d, Organization Science, Vol. 14 No. 1, pp. 91\u2010103.","DOI":"10.1287\/orsc.14.1.91.12814"},{"key":"key2022012420210349200_b56","doi-asserted-by":"crossref","unstructured":"Markus, M.L. and Robey, D. (1988), \u201cInformation technology and organizational change: causal structure in theory and research\u201d, Management Science, Vol. 34 No. 5, pp. 583\u201098.","DOI":"10.1287\/mnsc.34.5.583"},{"key":"key2022012420210349200_b57","unstructured":"Matsuo, Y., Tomobe, H., Hasida, K. and Ishizuka, M. (2004), \u201cFinding social network for trust calculation\u201d, Proceedings of the European Conference on Artificial Intelligence."},{"key":"key2022012420210349200_b58","doi-asserted-by":"crossref","unstructured":"Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), \u201cAn integrative model of organizational trust\u201d, Academy of Management Review, Vol. 20 No. 3, pp. 709\u201034.","DOI":"10.5465\/amr.1995.9508080335"},{"key":"key2022012420210349200_b61","doi-asserted-by":"crossref","unstructured":"Mitchell, A. and Zigurs, I. (2009), \u201cTrust in virtual teams: solved or still a mystery?\u201d, SIGMIS Database, Vol. 40 No. 3, pp. 61\u201083.","DOI":"10.1145\/1592401.1592407"},{"key":"key2022012420210349200_b62","doi-asserted-by":"crossref","unstructured":"Murdoch, J. (1995), \u201cActor\u2010networks and the evolution of economic forms: combining description and explanation in theories of regulation, flexible specialization, and networks\u201d, Environment & Planning A, Vol. 27 No. 5, pp. 731\u201057.","DOI":"10.1068\/a270731"},{"key":"key2022012420210349200_b63","unstructured":"Nelson, R. and Winter, S. (1982), An Evolutionary Theory of Economic Change, Harvard University Press, London."},{"key":"key2022012420210349200_b64","doi-asserted-by":"crossref","unstructured":"Neveen, F. and Ragowsky, A. (2008), \u201cEstablishing trust in electronic commerce through online word of mouth: an examination across genders\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 101\u201021.","DOI":"10.2753\/MIS0742-1222240404"},{"key":"key2022012420210349200_b65","doi-asserted-by":"crossref","unstructured":"Nosko, A., Wood, E. and Molema, S. (2010), \u201cAll about me: disclosure in online social networking profiles: the case of FACEBOOK\u201d, Computers in Human Behavior, Vol. 26 No. 3, pp. 406\u201018.","DOI":"10.1016\/j.chb.2009.11.012"},{"key":"key2022012420210349200_b67","doi-asserted-by":"crossref","unstructured":"Orlikowski, W.J. (1992), \u201cThe duality of technology: rethinking the concept of technology in organizations\u201d, Organization Science, Vol. 3 No. 3, pp. 398\u2010427.","DOI":"10.1287\/orsc.3.3.398"},{"key":"key2022012420210349200_b68","doi-asserted-by":"crossref","unstructured":"Orlikowski, W.J. (2000), \u201cUsing technology and constituting structures: a practical lens for studying technology in organizations\u201d, Organization Science, Vol. 11 No. 4, pp. 404\u201028.","DOI":"10.1287\/orsc.11.4.404.14600"},{"key":"key2022012420210349200_b66","doi-asserted-by":"crossref","unstructured":"Orlikowki, W.J. and Barley, S.R. (2001), \u201cTechnology and institutions: what can research on information technology and research on organizations learn from each other?\u201d, MIS Quarterly, Vol. 25 No. 2, pp. 145\u201065.","DOI":"10.2307\/3250927"},{"key":"key2022012420210349200_b69","unstructured":"Priem, R.L. and Nystrom, P.C. (2011), \u201cExploring the dynamics of workgroup fracture: common ground, trust\u2010with\u2010trepidation, and warranted distrust\u201d, Journal of Management, available at: http:\/\/jom.sagepub.com\/content\/early\/2011\/06\/25\/0149206311412191.full.pdf (in press).."},{"key":"key2022012420210349200_b70","doi-asserted-by":"crossref","unstructured":"Qureshi, I., Fang, Y., Ramsey, E., McCole, P., Ibbotson, P. and Compeau, D. (2009), \u201cUnderstanding online customer repurchasing intention and the mediating role of trust \u2013 an empirical investigation in two developed countries\u201d, European Journal of Information Systems, Vol. 18, pp. 205\u201022.","DOI":"10.1057\/ejis.2009.15"},{"key":"key2022012420210349200_b71","doi-asserted-by":"crossref","unstructured":"Rocco, E. (1998), \u201cTrust breaks down in electronic contexts but can be repaired by some initial face\u2010to\u2010face contact\u201d, in Karat, C.M., Lund, A., Coutaz, J. and Karat, J. (Eds), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '98), ACM Press, New York, NY, pp. 496\u2010502.","DOI":"10.1145\/274644.274711"},{"key":"key2022012420210349200_b72","doi-asserted-by":"crossref","unstructured":"Rousseau, D.M., Sitkin, S.B., Burt, R.S. and Camerer, C. (1998), \u201cNot so different after all: a cross\u2010discipline view of trust\u201d, Academy of Management Review, Vol. 23, pp. 393\u2010404.","DOI":"10.5465\/amr.1998.926617"},{"key":"key2022012420210349200_b73","doi-asserted-by":"crossref","unstructured":"Schoenberger, E. (1988), \u201cFrom Fordism to flexible accumulation: technology, competitive strategies, and international location\u201d, Environment and Planning D: Society and Space, Vol. 6, pp. 245\u201062.","DOI":"10.1068\/d060245"},{"key":"key2022012420210349200_b74","doi-asserted-by":"crossref","unstructured":"Schoorman, F.D., Mayer, R.C. and Davis, J.H. (2007), \u201cAn integrative model of organizational trust: past, present, and future\u201d, Academy of Management Review, Vol. 32 No. 2, pp. 344\u201054.","DOI":"10.5465\/amr.2007.24348410"},{"key":"key2022012420210349200_b75","doi-asserted-by":"crossref","unstructured":"Short, J. (2009), \u201cThe art of writing a review article\u201d, Journal of Management, Vol. 35 No. 6, pp. 1312\u201017.","DOI":"10.1177\/0149206309337489"},{"key":"key2022012420210349200_b76","doi-asserted-by":"crossref","unstructured":"Sia, L.C., Lim, K.H., Leung, K., Lee, M. and Benbasat, I. (2009), \u201cWeb strategies to promote internet shopping: is cultural\u2010customization needed?\u201d, MIS Quarterly, Vol. 33 No. 3, pp. 491\u2010512.","DOI":"10.2307\/20650306"},{"key":"key2022012420210349200_b77","unstructured":"Spagnoletti, P., Za, S. and D'Atri, A. (2007), \u201cInstitutional trust and security, new boundaries for virtual enterprises\u201d, paper presented at the 2nd International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems, Madeira, March 26."},{"key":"key2022012420210349200_b78","doi-asserted-by":"crossref","unstructured":"Srite, M. and Karahanna, E. (2006), \u201cThe role of espoused national cultural values in technology acceptance\u201d, MIS Quarterly, Vol. 30 No. 3, pp. 679\u2010704.","DOI":"10.2307\/25148745"},{"key":"key2022012420210349200_b79","unstructured":"Sun, H. and Zhang, P. (2006), \u201cApplying Markus and Robey's causal structure to examine user technology acceptance research: a new approach\u201d, Journal of Information Technology Theory and Application, Vol. 8 No. 2, pp. 21\u201040."},{"key":"key2022012420210349200_b80","doi-asserted-by":"crossref","unstructured":"Sun, T. (2011), \u201cThe roles of trust and experience in consumer confidence in conducting e\u2010commerce: a cross\u2010cultural comparison between France and Germany\u201d, International Journal of Consumer Studies, Vol. 35, pp. 330\u20107.","DOI":"10.1111\/j.1470-6431.2010.00938.x"},{"key":"key2022012420210349200_b82","doi-asserted-by":"crossref","unstructured":"Taddeo, M. (2009), \u201cDefining trust and e\u2010trust: old theories and new problems\u201d, International Journal of Technology and Human Interaction, Vol. 5 No. 2, pp. 23\u201035.","DOI":"10.4018\/jthi.2009040102"},{"key":"key2022012420210349200_b81","doi-asserted-by":"crossref","unstructured":"Tang, Z., Hu, Y. and Smith, M.D. (2008), \u201cGaining trust through online privacy protection: self\u2010regulation, mandatory standards, or caveat emptor\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 153\u201073.","DOI":"10.2753\/MIS0742-1222240406"},{"key":"key2022012420210349200_b83","doi-asserted-by":"crossref","unstructured":"Thomas, R. (1994), What Machines Can't Do: Politics and Technology in the Industrial Enterprise, University of California Press, Berkley, CA.","DOI":"10.1525\/9780520915077"},{"key":"key2022012420210349200_b84","doi-asserted-by":"crossref","unstructured":"Vance, A., Alie\u2010Dit\u2010Cosaque, C. and Straub, D. (2008), \u201cExamining trust in information technology artifacts: the effects of system quality and culture\u201d, Journal of Management Information Systems, Vol. 24 No. 4, pp. 73\u2010100.","DOI":"10.2753\/MIS0742-1222240403"},{"key":"key2022012420210349200_b85","doi-asserted-by":"crossref","unstructured":"Verhagen, T., Meents, S. and Tan, Y.H. (2006), \u201cPerceived risk and trust associated with purchasing at electronic marketplaces\u201d, European Journal of Information Systems, Vol. 15, pp. 542\u201055.","DOI":"10.1057\/palgrave.ejis.3000644"},{"key":"key2022012420210349200_b86","doi-asserted-by":"crossref","unstructured":"Walsham, G. (2001), \u201cKnowledge management: the benefits and limitations of computer systems\u201d, European Management Journal, Vol. 19 No. 6, pp. 599\u2010608.","DOI":"10.1016\/S0263-2373(01)00085-8"},{"key":"key2022012420210349200_b87","doi-asserted-by":"crossref","unstructured":"Walsham, G. and Hayes, N. (2001), \u201cParticipation in groupware\u2010mediated communities of practice: a sociopolitical analysis of knowledge sharing\u201d, Information and Organization, Vol. 11, pp. 263\u201088.","DOI":"10.1016\/S1471-7727(01)00005-7"},{"key":"key2022012420210349200_b88","doi-asserted-by":"crossref","unstructured":"Webster, J. (1991), \u201cAdvanced manufacturing technologies: work organisation and social relations crystallized\u201d, in Law, J. (Ed.), A Sociology of Monsters: Essays on Power, Technology and Domination, Routledge, London, pp. 192\u2010222.","DOI":"10.1111\/j.1467-954X.1990.tb03353.x"},{"key":"key2022012420210349200_b89","unstructured":"Weill, P. and Broadbent, M. (1998), Leveraging the New Infrastructure, Harvard Business School Press, Cambridge, MA."},{"key":"key2022012420210349200_b90","doi-asserted-by":"crossref","unstructured":"Weiss, H.M. and Rupp, D.E. (2011), \u201cEnvisioning a person\u2010centric work psychology\u201d, Industrial and Organizational Psychology, Vol. 4 No. 1, pp. 138\u201043.","DOI":"10.1111\/j.1754-9434.2010.01313.x"},{"key":"key2022012420210349200_b91","doi-asserted-by":"crossref","unstructured":"Wilson, J.M., Straus, S.G. and McEvily, B. (2006), \u201cAll in due time: the development of trust in computer\u2010mediated and face\u2010to\u2010face teams\u201d, Organizational Behavior and Human Decision Processes, Vol. 99 No. 1, pp. 16\u201033.","DOI":"10.1016\/j.obhdp.2005.08.001"},{"key":"key2022012420210349200_b92","unstructured":"Winfield, I. (1991), Organisations and Information Technology: Systems, Power and Job Design, Blackwell, Carlton."},{"key":"key2022012420210349200_b93","doi-asserted-by":"crossref","unstructured":"Yoon, C. (2009), \u201cThe effects of national cultural values on consumer acceptance of e\u2010commerce: online shoppers in China\u201d, Information &Management, Vol. 46, pp. 294\u2010301.","DOI":"10.1016\/j.im.2009.06.001"},{"key":"key2022012420210349200_b94","unstructured":"Zuboff, S. (1988), In the Age of the Smart Machine, Basic Book, New York, NY."},{"key":"key2022012420210349200_frd1","unstructured":"D'Atri, A. (2003), \u201cOrganising and managing virtual enterprises: the ECB framework\u201d, in Camarinha\u2010Matos, L.M. and Afsarmanesh, H. (Eds), Processes and Foundations for Virtual Organisations, Kluwer Academic, Boston, MA."},{"key":"key2022012420210349200_frd2","doi-asserted-by":"crossref","unstructured":"D'Atri, A., Ferrara, M., George, J.F. and Spagnoletti, P. (Eds) (2011), Information Technology and Innovation Trends in Organizations, Springer, Heidelberg.","DOI":"10.1007\/978-3-7908-2632-6"},{"key":"key2022012420210349200_frd3","doi-asserted-by":"crossref","unstructured":"Emery, F. and Trist, E. (1965), \u201cThe causal texture of organizational environments\u201d, Human Relations, Vol. 18, pp. 21\u201032.","DOI":"10.1177\/001872676501800103"},{"key":"key2022012420210349200_frd4","doi-asserted-by":"crossref","unstructured":"Kling, R. (1977), \u201cThe social dynamics of technical innovation in the computing world\u201d, Symbolic Interaction, Vol. 1 No. 1, pp. 132\u201046.","DOI":"10.1525\/si.1977.1.1.132"},{"key":"key2022012420210349200_frd5","doi-asserted-by":"crossref","unstructured":"Lionel, R.P., Alan, D.R. and Yu\u2010Ting, H.C. (2009), \u201cIndividual swift trust and knowledge\u2010based trust in face\u2010to\u2010face and virtual team members\u201d, Journal of Management Information Systems, Vol. 26 No. 2, pp. 241\u201079.","DOI":"10.2753\/MIS0742-1222260210"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961211261076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211261076\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211261076\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:20Z","timestamp":1753402400000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/10\/3\/187-202\/221794"}},"subtitle":["Analysis of the interplay between social factors and Information and Communication Technology"],"editor":[{"given":"Antonio","family":"Marturano","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2012,8,10]]},"references-count":94,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,8,10]]}},"alternative-id":["10.1108\/14779961211261076"],"URL":"https:\/\/doi.org\/10.1108\/14779961211261076","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,8,10]]}}}