ONLINE APPENDIX FOR EJIS-ER140052 APPENDIX A. DESCRIPTION OF MEET-U Appendix A.1. Purpose of Meet-U The aim of Meet-U is to support users in organizing and arranging meetings and events with their friends. The goal is to effectively support users in every situation, but, at the same time, the users should not feel disturbed by the IS. The users are supported not only during the planning of an event, but also on the way to an event, as well as at the event itself. They can provide private data such as their date of birth, and indicate interests to improve recommendations for events or people with similar interests. Users can register for public events or create private events where they can invite other people to join them. When planning to visit a public event, the system creates recommendations of possibly interesting events, based on private data of the users (such as their preferred leisure activities) and user-generated content that is related to the available events (such as the viewers’ rating for a movie in IMDb). Assuming users want to create a private event, the application provides recommendations on which of their friends should be invited, based on the characteristics of the event and information about their friends. When an event appointment approaches, Meet-U reminds its users and provides, e.g., navigation information. At the event site, the system recognizes available third-party services and integrates these services. Examples of such services are a ticketing service or an event map including the points of interest. 1 Appendix A.2. Dashboard of the prototype that was used by the participants Translation from German: 1 1 Name of the prototype 2 Upcoming Events 3 Name, location and date of the event 4 Active invitations 5 No active invitations 6 My Events 7 Contacts 8 My Profile 9 Search 10 History 11 Privacy Policy 12 Visibility of the current location (is on, can be turned off) and address 2 3 4 5 6 9 7 10 8 11 12 2 Appendix A.3. Screenshot showing the simulated indoor navigation used in the free simulation experiment Translation from German: 1 1 Indoor navigation 2 Name, location and time left until event begins 2 Simulation of indoor navigation during the free simulation experiment. The map is a real floor-plan of the location of the evaluation. The big dot marks the start of the navigation (the PC lab of the university) and the small dot marks the event location. Altogether, three different events were recommended to users, based on their preferences and user-generated content. In the case of outdoor navigation, GoogleMaps would be used. 3 APPENDIX B. COMMON METHOD BIAS Appendix B.1. Addressing common method bias Recently, a number of researchers have brought up the problem of common method bias in behavioural research (Podsakoff et al. 2003; Sharma et al. 2009). These publications point out that a significant amount of variance explained in a model is attributed to the measurement method rather than to the constructs the measures represent (Podsakoff et al. 2003). This holds especially true if only one data source is used and data for the independent and dependent constructs were gathered from the same participants (Podsakoff et al. 2003). A major finding from Sharma et al. (2009) is that a metaanalysis of the TAM model showed a failure of perceived usefulness to predict adoption and usage when controlling for common method bias. Aware of this fact, we used the Trust-TAM (Gefen et al. 2003) as theoretical foundation for our research model, since it was not part of their analysis (Sharma et al. 2009) but was independently tested for common method bias by Malhotra et al. (2006), with the result that common method variance does not affect the validity of Gefen et al.’s (2003) results. To further ensure that common method variance is also no issue in our study, we followed the guidelines of Podsakoff et al. (2003). According to their first recommendation, we followed the suggested procedural remedies related to questionnaire design. We used simple structured questions in simple language and avoided vague concepts and ambiguous terms. For the extreme points and the midpoints of the scales we provided verbal labels. Further, we assured anonymity to the participants by explicitly stating in the introduction of the questionnaire that all answers would be anonymous, and no relationship between any answers and a participant would be established. Second, the introduction also stated that there were no ‘right or wrong’ answers, emphasizing that we were interested in the participants' honest opinions. We developed a cover story for the questionnaire in order to make it appear to the participants that the independent and dependent constructs were unconnected. 4 Apart from the procedural remedies, we used statistical remedies afterwards. Therefore, we used common tests in IS to control common method bias: Harman’s single factor test and the unmeasured latent marker construct (ULMC) technique (Liang et al. 2007; Podsakoff et al. 2003). Regarding Harman’s single factor test, we conducted an exploratory factor analysis and defined that only one factor should be extracted, which accounted for 37.58% of the variance, and is below the threshold of 50%. Thus, according to this test, common method bias is not a serious problem in our study. The results of the ULMC analysis (see Appendices B.2 and B.3) show that the average variance explained by the respective construct is 0.8361, whereas the average variance explained by the method factor is 0.00255. Furthermore, all expected loadings are notably larger than the loadings with the method factor (the lowest difference is 0.520 for the process indicator). Furthermore, only two method factor loadings were found to be significant. Following Liang et al. (2007), this indicates that common method bias is unlikely for the detailed results of our ULMC analysis. Since only limited statistical remedies exist (see e.g., the discussion on the usefulness of the Harman’s single factor test (Podsakoff et al. 2003), and of the ULMC technique (Chin et al. 2012)), it is hardly possible to statistically ensure that common method bias is no problem at all in a study. Nevertheless, given the rigorously used procedural remedies and the good results from the statistical remedies, we expect that common method bias is not a serious problem in our study. Appendix B.2. Model including only reflective indicators 75 0.1 0.538*** 0.518*** 00 0.5 3 0.323 2* ** *** INT_USE R² = 0.581 ** * 0 .3 .s. 1n 0.26 1 0 3* . -0 * PU R² = 0.352 0.173* TRUST_IS R² = 0.482 -0.012n.s. * TRUST_INET 2 *** 0.36 * TRUST_COMM R² = 0.268 TRUST_PROV R² = 0.069 0 . 33 0 0.0 6*** 5 PEOU R² = 0.113 .s. 4n *** = p < 0.001 ** = p < 0.01 * = p < 0.05 n.s. = not significant Since Liang et al. (2007) recommend remodelling all formative indicators to reflective indicators before running the UMLC technique, we remodelled our original model. Consequently, similar to the comparison with the saturated model (see Appendix D.6), we need to evaluate the effect of this change in the significance of single paths and changes in the R² of the endogenous constructs measured by effect sizes f². The comparison of both models shows that changing the direction of the measurement models did not have a worrying impact on the model. In fact, the only change in significance can be found for the path from trust in the Internet to trust in the provider. Here, the path coefficient changes from 0.262** to 0.263***. The f² effect sizes provide similar results: f² for TRUST_COMM = (R²reflective model – R²original model)/(1 – R²reflective model) = (0.268 – 0.307)/(1 – 0.268) = -0.0533 f² for TRUST_IS = 0.0058 f² for TRUST_PROV = 0.0011 f² for PU = -0.0170 f² for PEOU = 0 f² for INT_USE = -0.0119 Since we observed only a single f² values which exceeds the limit of 0.02 (the change had a small impact on the R² of the trust in the community of Internet users construct), we can conclude that using only reflective indicators did not impact our model in a way that would make it inappropriate for testing for common method bias. Taking all results together, we can conclude that the model using only reflective indicator is suitable for being used in a UMLC analysis. Appendix B.3. UMLC technique results Following Gefen et al.’s (2011) recommendation, we used the UMLC technique to investigate whether common method bias is a serious issue in our study (Liang et al. 2007). Following Liang et al. (2007), we specified all constructs to be reflective for the UMLC analysis. This approach is suitable, since we compared our original model to the model including only reflective indicators in Appendix B.2, and 6 there were hardly any effects in terms of changes in signs, significances or R² of endogenous constructs. The results of the UMLC analysis show that the average variance explained by the respective construct is 0.8361, whereas the average variance explained by the method factor is 0.00255. Furthermore, all expected loadings are notably larger than the loadings with the method factor (the lowest difference is 0.520 for the process indicator). Moreover, only two method factor loadings were found significant. Following Liang et al. (2007), we can thus conclude that common method bias is unlikely to be a serious concern in our study. Construct Indicator situational_ normality TRUST_INT structural_ assurance comm_ability comm_ TRUST_COMM benevolence comm_ integrity performance TRUST_IS process purpose prov_ability prov_ TRUST_PROV benevolence prov_integrity PU1 PU PU2 PU3 PEOU1 PEOU PEOU2 PEOU3 INT_USE1 INT_USE INT_USE2 INT_USE3 Average *: p < 0.05 Substantive Factor Loading (R1) 0.790*** R1² 0.624 Method Factor Loading (R2) -0.001n.s. R2² 0.000 0.887*** 0.787 0.001n.s. 0.000 0.655*** 0.783*** 0.429 0.613 -0.073n.s. 0.051n.s. 0.005 0.003 0.873*** 0.762 0.003n.s. 0.000 0.695*** 0.516** 0.964*** 0.871*** 0.763*** 0.483 0.266 0.929 0.759 0.582 0.174* -0.004n.s. -0.191** -0.121n.s. 0.085n.s. 0.030 0.000 0.036 0.015 0.007 0.759*** 0.888*** 0.964*** 0.869*** 0.920*** 0.879*** 0.803*** 0.982*** 0.972*** 0.889*** 0.836 0.576 0.789 0.929 0.755 0.846 0.773 0.645 0.964 0.945 0.790 0.699 0.029n.s. 0.001 0.007n.s. 0.000 -0.026n.s. 0.001 0.020n.s. 0.000 -0.035n.s. 0.001 -0.065n.s. 0.004 0.096n.s. 0.009 -0.042n.s. 0.002 -0.022n.s. 0.000 0.063n.s. 0.004 -0.003 0.006 n.s.: not significant **: p < 0.01 ***: p < 0.001 7 APPENDIX C. INDICATORS USED IN THE STUDY Indicator Statement Mean SD Source TRUST_PROV - Trust in the Provider (formative) prov_ability The provider does a good job. 7.51 1.563 prov_benevolence It is important for the provider that ____ supports me in achieving my goals. 7.10 1.700 prov_integrity I can count on the statements of the provider. 5.79 1.997 Developed using theoretical foundations provided by Mayer et al. (1995). TRUST_INET - Trust in the Internet (formative) situational_ normality I feel good about how thing go when do activities on the Internet. 3.37 2.127 structural_ assurance I feel assured that legal and technological structures adequately protect me from problems on the Internet. 3.70 1.924 Developed using theoretical foundations provided by McKnight et al. (2002). TRUST_IS - Trust in the IS (formative) performance ____ performs well. 6.43 1.860 process I understand the inner processes ____ uses to support me. 4.11 2.174 purpose I understand why ____ was developed. 7.31 1.626 Developed using theoretical foundations provided by Lee and See (2004). TRUST_COMM - Trust in the Community of Internet Users (formative) comm_ability Information provided by other users of the Internet is valuable. 5.74 1.843 comm_benevolence Other users of the Internet offer me help when I have questions. 3.66 1.897 comm_integrity In general, I can count on the information provided by other internet users. 3.97 1.929 Developed using theoretical foundations provided by Mayer et al. (1995). PEOU - Perceived Ease of Use (reflective) PEOU1 Learning to use ____ would be easy for me. 7.15 1.687 PEOU2 It would be easy for me to become skillful at using ____. 6.92 1.710 PEOU3 ____ is ease to use. 6.34 2.162 Adapted from Kamis et al. (2008). PU - Perceived Usefulness (reflective) PU1 Using ____ improves my performance in organizing and managing events. 5.20 2.184 PU2 Using ____ improves my effectiveness in organizing and managing events. 5.47 2.181 PU3 ____ is a useful tool to support me in organizing and managing events. 6.18 1.905 Adapted from Kamis et al. (2008). INT_USE - Intention to Use (reflective) INT_USE1 Assuming I had access to ____, I intend to use it. 5.53 2.113 INT_USE2 Assuming I had access to ____, I plan to use the system. 5.59 2.223 INT_USE3 Assuming I had access to ____, I would use it to organize and manage my next event. 5.48 2.256 8 Adapted fromWang and Benbasat (2009) and Bhattacherjee and Sanford (2006). APPENDIX D. FURTHER TABLES UNDERLINING THE RESULTS Appendix D.1. Cross-loadings and composite reliability for the reflective measurement models INT_USE ρc = 0.963 AVE = 0.900 0.945 0.952 0.946 0.311 0.254 0.393 0.661 0.666 0.614 INT_USE1 INT_USE2 INT_USE3 PEOU1 PEOU2 PEOU3 PU1 PU2 PU3 PEOU ρc = 0.900 AVE = 0.750 0.356 0.381 0.331 0.894 0.821 0.880 0.328 0.394 0.383 PU ρc = 0.933 AVE = 0.824 0.665 0.624 0.733 0.329 0.285 0.424 0.894 0.942 0.886 Appendix D.2. AVE and correlation among construct scores (square root of the AVE bold in diagonals). INT_USE PEOU PU TRUST_IS TRUST_INET TRUST_PROV TRUST_COMM INT_ USE 0.948 0.375 0.713 0.632 0.172 0.455 0.064 PEOU PU TRUST_ IS TRUST_ INET TRUST_ PROV TRUST_ COMM 0.866 0.406 0.484 0.100 0.337 0.032 0.908 0.565 0.208 0.472 0.135 formative 0.157 0.629 0.085 formative 0.262 0.157 formative 0.137 formative Appendix D.3. Evaluation of the formative measurement models Construct TRUST_IS TRUST_INET TRUST_PROV TRUST_COMM Indicator VIF Factor Weights performance 1.704 0.713 < 0.001 process 1.301 0.266 < 0.01 purpose 1.363 0.310 < 0.001 situational_normality 2.023 0.640 < 0.001 structural_assurance 1.909 0.483 < 0.001 prov_ability 1.527 0.305 < 0.01 prov_benevolence 1.705 0.570 < 0.001 prov_integrity 1.821 0.365 < 0.01 comm_ability 1.775 -0.179 n.s. comm_benevolence 1.198 0.887 < 0.001 comm_integrity 1.783 0.238 n.s. 9 p-value Factor Loadings 0.115 0.643 We relied on the guidelines of Cenfetelli and Bassellier (2009) to evaluate our formative measurement models. According to the first guideline, we checked for multicollinearity by computing the Variance Inflation Factor (VIF). The results indicate that multicollinearity is not a problem in our study because the highest VIF value (2.023) is below the limit of 3.33 (Diamantopoulos and Siguaw 2006). In their second guideline, Cenfetelli and Bassellier (2009) state that a large number of indicators will cause many non-significant weights. Since we observed only two non-significant weights (at the level of 0.05, marked with “n.s.” in the table above) and their inclusion is based upon theory, we decided not to drop any indicators. This decision is based on the argument that this is the first study of its kind, and it should be checked whether this lack of significance could be observed in different studies before questioning the relevance of these indicators (Cenfetelli and Bassellier 2009). The third guideline deals with the co-occurrence of positive and negative weights. Due to the fact that the only indicator with a negative weight was not found to be significant, there was no need to worry about this point in our study (Cenfetelli and Bassellier 2009). Guideline four suggests that researchers should check the indicator loadings when observing indicators that have a low indicator weight. As a reason, Cenfetelli and Bassellier (2009) point out that the indicator could have only a small formative impact on the construct (shown by a low weight), but it still could be an important part of the construct (shown by a high loading). If this is the case, the indicator is important and should be included in the measurement model (Cenfetelli and Bassellier 2009). Chin (1998) stipulates that a loading of 0.5 is weak but still acceptable. Checking the results presented in the table above, we can see that the loadings of the two indicators with non-significant weights vary highly. Whereas the indicator comm_integrity shows a loading above the threshold (0.643 > 0.5), the indicator comm_ability shows a loading below the threshold (0.115 < 0.5). As a result, the indicator comm_ability has a non-significant weight and a low loading. Nevertheless, since this is the first study of this kind and the inclusion of the indicator is based on a solid theoretical basis, we follow Cenfetelli and Bassellier’s (2009) advice and do not drop the indicator. However, the observation that the indicator comm_ability shows a non-significant, negative weight and a low 10 loading challenges the theoretical basis. If similar results can be observed in future studies, the indicator should be dropped, and the suitability of the theoretical basis suggesting this particular relationship should be investigated. In the fifth guideline, Cenfetelli and Bassellier (2009) recommend testing for nomological network effects and construct portability. They suggest comparing the factor weights of the indicators across different studies. Due to the fact that, to the best of our knowledge, ours is the first study investigating different targets of trust in IS use and additionally following a formative measurement for each of these constructs, a comparison of factor weights across different studies is not possible. The sixth guideline cautions that the indicator weights can be slightly inflated when using the PLS technique (Cenfetelli and Bassellier 2009). As we used the PLS technique, this is a limitation of our study. In summary, the evaluation of our formative measurement models shows that the models fulfil the requirements posed by the guidelines of Cenfetelli and Bassellier (2009). Appendix D.4. Multicollinearity among the predictors of the endogenous constructs Predictors of TRUST_IS Construct VIF TRUST_INET 1.522 TRUST_COMM 1.445 TRUST_PROV 1.199 PEOU 1.129 Predictors of PU Construct VIF TRUST_IS 1.918 TRUST_PROV 1.657 PEOU 1.308 Predictors of NT_USE Construct VIF TRUST_IS 1.658 PU 1.521 PEOU 1.351 Appendix D.5. f² and q² effect sizes for the structural model Relationship f² value 0.433 f² effect size large q² value 0.338 q² effect size medium PEOU INT_USE 0.000 - 0.000 - PEOU PU 0.035 small 0.012 - PEOU TRUST_IS 0.157 medium n/a TRUST_IS INT_USE 0.162 medium 0.128 small TRUST_IS PU 0.105 small 0.078 small PU INT_USE 11 TRUST_INET TRUST_COMM 0.444 large n/a TRUST_INET TRUST_IS 0.004 - n/a TRUST_INET TRUST_PROV 0.074 small n/a TRUST_COMM TRUST_IS 0.001 - n/a TRUST_PROV TRUST_IS 0.444 large n/a TRUST_PROV PU 0.031 small 0.020 small TRUST_PROV PEOU 0.128 small 0.091 small Appendix D.6. Saturated Model According to Gefen et al. (2011), the theorized model should be compared to a saturated model (see the Figure below) regarding changes in the significance of single paths and changes in the R² of the endogenous constructs measured by effect sizes f². 0.034n.s. 0.039n.s. 0.072n.s. TRUST_IS R² = 0.482 -0.019n.s. 0.5 2 0.332* 8n 0.1 5 ** TRUST_PROV R² = 0.072 ** INT_USE R² = 0.588 0.007n.s. * 0.006n.s. * 11 TRUST_COMM R² = 0.308 3* * 0.166* * 0.531*** n. s. 04 0. 0 5* 0 .3 0.555*** 0.2 6 PU R² = 0.371 * .s. TRUST_INET 1 ** 0 . 37 0.32 00 -0. 5 *** .s. 2n PEOU R² = 0.109 -0.037n.s. -0.056n.s. 0.034n.s. *** = p < 0.001 ** = p < 0.01 * = p < 0.05 n.s. = not significant The comparison of both models shows that our original model is sound. All added structural paths were not found to be significant. Furthermore, we observed only three changes in terms of 12 significance. Two indicators went down one degree in significance, and the path between trust in the provider and perceived usefulness became insignificant (see the Table below for a summary of the results). Relationship structural_assurance TRUST_INET prov_ability TRUST_PROV TRUST_PROV PU Original Model 0.483*** t-value 3.360 Saturated Model 0.475** t-value 2.824 0.305** 2.951 0.241* 2.280 0.185* 2.034 0.158n.s. 1.779 To assess the impact of the additional structural paths on the R² values, we need to compute the f² comparing the original model and the saturated model: f² for TRUST_COMM = (R²saturated model – R²original model)/(1 – R²saturated model) = (0.308 – 0.307)/(1 – 0.308) = 0.0014 f² for TRUST_IS = 0.0032 f² for TRUST_PROV = 0.0043 f² for PU = 0.0127 f² for PEOU = -0.0045 f² for INT_USE = 0.0049 Since we only observed f² values below the threshold of 0.02, we can conclude that the additional paths did not have an alarming impact on our results (Gefen et al. 2011). Taking all results together, we can conclude that we did not omit important structural relationships. Appendix D.7 Comparison of the effects of trust in the IS and trust in the provider Dependent variable PEOU PU INT_USE Direct effects, f² effect sizes and q² effect sizes TRUST_IS TRUST_PROV Direct f² q² Direct f² q² effect effect effect effect effect effect n/a n/a n/a 0.337*** 0.128 0.091 0.369*** 0.105 0.078 0.185* 0.031 0.020 0.336*** 0.162 0.128 n/a n/a n/a 13 Total effects TRUST_ IS n/a 0.369*** 0.529*** TRUST_ PROV 0.337*** 0.474*** 0.460*** REFERENCES BHATTACHERJEE A and SANFORD C (2006) Influence Processes for Information Technology Acceptance. An Elaboration Likelihood Model. MIS Quarterly 30(4), 805–825. CENFETELLI R and BASSELLIER G (2009) Interpretation of Formative Measurement in Informations Systems Research. MIS Quarterly 33(4), 689–707. CHIN WW (1998) The Partial Least Squares Approach to Structural Equation Modeling. In Modern Methods For Business Research (MARCOULIDES GA, Ed), LEA, London. CHIN WW, THATCHER JB and WRIGHT RT (2012) Assessing common method bias: problems with the ULMC technique. MIS Quarterly 36(3), 1003–1019. DIAMANTOPOULOS A and SIGUAW JA (2006) Formative Versus Reflective Indicators in Organizational Measure Development. A Comparison and Empirical Illustration. British Journal of Management 17(4), 263–282, doi: 10.1111/j.1467-8551.2006.00500.x. GEFEN D, KARAHANNA E and STRAUB DW (2003) Trust and TAM in Online Shopping. An Integrated Model. MIS Quarterly 27(1), 51–90. GEFEN D, RIGDON EE and STRAUB DW (2011) Editor’s Comments: An Update and Extension to SEM Guidelines for Administrative Social Science Research. MIS Quarterly 35(2), iii–xiv. KAMIS A, KOUFARIS M and STERN T (2008) Using an Attribute-Based Decision Support System For User-Customized Products Online. An Experimental Investigation. MIS Quarterly 32(1), 159– 177. LEE JD and SEE KA (2004) Trust in Automation: Designing for Appropriate Reliance. Human Factors 46(1), 50–80. LIANG H, SARAF N, HU Q and XUE Y (2007) Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Quarterly 31(1), 59–87. MALHOTRA NK, KIM SS and PATIL A (2006) Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research. Management Science 52(12), 1865–1883, doi: 10.1287/mnsc.1060.0597. 14 MAYER RC, DAVIS JH and SCHOORMAN FD (1995) An Integrative Model of Organizational Trust. Academy of Management Review 20(3), 709–734. MCKNIGHT DH, CHOUDHURY V and KACMAR C (2002) Developing and Validating Trust Measures for e-Commerce. An Integrative Typology. Information Systems Research 13(3), 334–359. PODSAKOFF PM, MACKENZIE SB, LEE J and PODSAKOFF NP (2003) Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879–903, doi: 10.1037/0021-9010.88.5.879. SHARMA R, YETTON P and CRAWFORD J (2009) Estimating the Effect of Common Method Variance. The Method-Method Pair Technique with an Illustration from TAM Research. MIS Quarterly 33(3), 473-A13. WANG W and BENBASAT I (2005) Trust in and Adoption of Online Recommendation Agents. Journal of the Association for Information Systems 6(3), 72–101. WANG W and BENBASAT I (2009) Interactive Decision Aids For Consumer Decision Making In ECommerce. The Influence Of Perceived Strategy Restrictiveness. MIS Quarterly 33(2), 293–320. 15