{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:26:40Z","timestamp":1777854400170,"version":"3.51.4"},"reference-count":97,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2005,10]]},"abstract":"<jats:p>Scholars in many disciplines have considered the antecedents and consequences of various forms of trust. This paper generates 11 propositions exploring the relationship between Human Resource Information Systems (HRIS) and the trust an individual places in the inanimate technology (technology trust) and models the effect of those relationships on HRIS implementation success. Specifically, organizational, technological, and user factors are considered and modeled to generate a set of testable propositions that can subsequently be investigated in various organizational settings. Eleven propositions are offered suggesting that organizational trust, pooled interdependence, organizational community, organizational culture, technology adoption, technology utility, technology usability, socialization, sensitivity to privacy, and predisposition to trust influence an individual\u2019s level of trust in the HRIS technology (technology trust) and ultimately the success of an HRIS implementation process. A summary of the relationships between the key constructs in the model and recommendations for future research are provided.<\/jats:p>","DOI":"10.1177\/0165551505055399","type":"journal-article","created":{"date-parts":[[2005,8,16]],"date-time":"2005-08-16T11:08:32Z","timestamp":1124190512000},"page":"340-353","source":"Crossref","is-referenced-by-count":109,"title":["Human resource information systems (HRIS) and technology trust"],"prefix":"10.1177","volume":"31","author":[{"given":"Susan K.","family":"Lippert","sequence":"first","affiliation":[{"name":"Department of Management, LeBow College of Business, Drexel University,                         Philadelphia, USA,"}]},{"given":"Paul","family":"Michael Swiercz","sequence":"additional","affiliation":[{"name":"Department of Management Science, School of Business and Public                         Management, The George Washington University, Washington DC, USA"}]}],"member":"179","published-online":{"date-parts":[[2005,10,1]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1177\/009102600203100410"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.2307\/248811"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015869"},{"key":"atypb4","volume-title":"Leading Organizations through Transition","author":"S.A. Deetz","year":"2000"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000005979"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00134-3"},{"key":"atypb7","author":"B. Patterson","year":"2003","journal-title":"HR Magazine"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-050X(199722)36:2<261::AID-HRM7>3.0.CO;2-V"},{"key":"atypb9","first-page":"598","volume-title":"Proceedings of High Performance Computing and Networking, International Conference and Exhibition (HPCN) Europe 1998, Amsterdam, April 21-23 1998","author":"K.A. Hawick"},{"key":"atypb10","unstructured":"S.K. Lippert,\n                      An Exploratory Study Into The Relevance of Trust in the                     Context of Information Systems Technology\n                      (Doctoral Dissertation, The                 George Washington University, Washington, DC, 2001)."},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-148-3.ch005"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1177\/009102609902800208"},{"issue":"1","key":"atypb13","first-page":"27","volume":"41","author":"S.I. Tannenbaum","year":"1990","journal-title":"Journal of Systems Management"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005735506589"},{"key":"atypb15","volume-title":"Human Resource Development","author":"D.M. Harris","year":"1994"},{"issue":"5","key":"atypb16","first-page":"10","volume":"77","year":"2000","journal-title":"HR Focus"},{"issue":"2","key":"atypb17","first-page":"18","volume":"15","author":"E.E. O\u2019Daniell","year":"1999","journal-title":"Benefits Quarterly"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1007\/s12122-003-1002-5"},{"issue":"4","key":"atypb19","first-page":"161","volume":"44","author":"M. Martinez","year":"1999","journal-title":"HR Magazine"},{"issue":"8","key":"atypb20","first-page":"30","volume":"43","author":"R.E. Thaler-Carter","year":"1998","journal-title":"HR Magazine"},{"key":"atypb21","volume-title":"Mid-market ERP: it\u2019s not just about ERP anymore. AMR research report, 2002","author":"C. Niven","year":"2004"},{"key":"atypb22","volume-title":"HR on the Web: New Realities in Service Delivery (2001)","author":"Towers Perrrin","year":"2004"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1177\/009102600203100102"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1080\/10580539608906974"},{"key":"atypb25","author":"B. Saporito","year":"2005","journal-title":"Time Magazine Archives"},{"key":"atypb26","doi-asserted-by":"publisher","DOI":"10.1037\/h0024833"},{"key":"atypb27","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(87)80013-5"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.1.95"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1080\/00140139408964957"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1080\/00140139608964474"},{"key":"atypb31","volume-title":"The Logic and Limits of Trust","author":"B. Barber","year":"1983"},{"key":"atypb32","doi-asserted-by":"publisher","DOI":"10.1177\/002200275800200401"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9507312923"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926620"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"atypb36","volume-title":"Trust and Power","author":"N. Luhmann","year":"1979"},{"key":"atypb37","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"atypb38","doi-asserted-by":"publisher","DOI":"10.2307\/351903"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.2307\/256727"},{"key":"atypb40","series-title":"MISRC Working Paper Series","volume-title":"The Meanings of Trust","author":"D.H. McKnight","year":"1996"},{"issue":"2","key":"atypb41","first-page":"28","volume":"20","author":"J.K. Rempel","year":"1986","journal-title":"Psychology Today"},{"key":"atypb42","volume-title":"Proceedings of the 2002 Academy of Business and Information Technology Meeting","author":"S.K. Lippert"},{"key":"atypb43","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1967.tb01454.x"},{"key":"atypb44","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2000.2791606"},{"key":"atypb45","volume-title":"Human Resource Information Systems: Development & Application","author":"M.J. Kavanagh","year":"1999"},{"key":"atypb46","doi-asserted-by":"publisher","DOI":"10.1177\/001872679905200107"},{"issue":"10","key":"atypb47","first-page":"28","volume":"43","author":"J. Parker-Matz","year":"1998","journal-title":"HR Magazine"},{"key":"atypb48","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"atypb49","first-page":"302","volume-title":"Trust in Organizations","author":"L.L. Cummings","year":"1996"},{"key":"atypb50","doi-asserted-by":"publisher","DOI":"10.2307\/1251829"},{"key":"atypb51","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.9.2.141"},{"key":"atypb52","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1999.2202136"},{"key":"atypb53","first-page":"963","volume-title":"Proceedings of the 2002 Informing Science + IT Education Conference","author":"S.K. Lippert"},{"key":"atypb54","doi-asserted-by":"publisher","DOI":"10.4135\/9781452243610.n7"},{"key":"atypb55","doi-asserted-by":"publisher","DOI":"10.4135\/9781452243610.n4"},{"key":"atypb56","first-page":"290","volume-title":"Interpersonal Behavior: Communication and Understanding in Relationships","author":"J. Gabarro","year":"1978"},{"key":"atypb57","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926619"},{"key":"atypb58","volume-title":"Organizations in Action","author":"J.D. Thompson","year":"1967"},{"key":"atypb59","doi-asserted-by":"publisher","DOI":"10.1108\/02683940210415924"},{"key":"atypb60","first-page":"251","volume-title":"Academy of Management Journal, Best Paper Proceedings 1995","author":"T.B. Lawrence"},{"key":"atypb61","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005766631092"},{"key":"atypb62","doi-asserted-by":"publisher","DOI":"10.1177\/017084069301400402"},{"key":"atypb63","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.4.3.478"},{"key":"atypb64","doi-asserted-by":"publisher","DOI":"10.2307\/2393715"},{"key":"atypb65","doi-asserted-by":"publisher","DOI":"10.2307\/2393240"},{"key":"atypb66","first-page":"68","volume-title":"Anti-Social Behavior in Organizations","author":"S.L. Grover","year":"1997"},{"key":"atypb67","doi-asserted-by":"publisher","DOI":"10.1177\/016555159702300307"},{"key":"atypb68","doi-asserted-by":"publisher","DOI":"10.1177\/016555150102700302"},{"issue":"6","key":"atypb69","first-page":"9","volume":"10","author":"K. Day","year":"2001","journal-title":"Pension Benefits"},{"key":"atypb70","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000295"},{"key":"atypb71","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(98)00013-9"},{"key":"atypb72","doi-asserted-by":"publisher","DOI":"10.1109\/47.911131"},{"key":"atypb73","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1992.4279062"},{"key":"atypb74","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(01)00013-5"},{"key":"atypb75","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.5.530"},{"key":"atypb76","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.1997070103"},{"key":"atypb77","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1988.4307424"},{"key":"atypb78","volume-title":"Innovation, Organizational Change and Technology","author":"P. Jackson","year":"1997"},{"key":"atypb79","doi-asserted-by":"publisher","DOI":"10.1504\/IJTM.1993.025769"},{"key":"atypb80","first-page":"113","author":"M. Radnor","year":"1991","journal-title":"International Journal of Technology Management"},{"key":"atypb81","doi-asserted-by":"publisher","DOI":"10.1080\/09537320050130633"},{"key":"atypb82","doi-asserted-by":"publisher","DOI":"10.1177\/016555159502100102"},{"key":"atypb83","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.32.5.554"},{"key":"atypb84","doi-asserted-by":"publisher","DOI":"10.2307\/248682"},{"key":"atypb85","doi-asserted-by":"publisher","DOI":"10.1177\/0165551504041674"},{"key":"atypb86","first-page":"209","volume-title":"Research in Organizational Behavior 1","author":"J. Van Maanen","year":"1979"},{"key":"atypb87","doi-asserted-by":"publisher","DOI":"10.2307\/3069430"},{"key":"atypb88","doi-asserted-by":"publisher","DOI":"10.1348\/096317902321119583"},{"key":"atypb89","doi-asserted-by":"publisher","DOI":"10.1177\/0165551504042804"},{"key":"atypb90","doi-asserted-by":"publisher","DOI":"10.1177\/016555158100300602"},{"key":"atypb91","doi-asserted-by":"publisher","DOI":"10.1177\/016555158200400102"},{"issue":"6","key":"atypb92","first-page":"471","volume":"60","author":"S. Briggs","year":"1981","journal-title":"Personnel Journal"},{"key":"atypb93","doi-asserted-by":"publisher","DOI":"10.1177\/016555158501100303"},{"key":"atypb94","doi-asserted-by":"publisher","DOI":"10.1177\/016555159602200603"},{"key":"atypb95","volume-title":"Examining Individual Level Antecedents Affecting Post-adoption Behavior of Supply Chain Affiliates","author":"S.K. Lippert","year":"2004"},{"key":"atypb96","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1994.11518035"},{"key":"atypb97","doi-asserted-by":"publisher","DOI":"10.2307\/2393552"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551505055399","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551505055399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:07:00Z","timestamp":1777504020000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551505055399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10]]},"references-count":97,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,10]]}},"alternative-id":["10.1177\/0165551505055399"],"URL":"https:\/\/doi.org\/10.1177\/0165551505055399","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10]]}}}