This version is not peer-reviewed.
Submitted:
12 April 2025
Posted:
14 April 2025
You are already at the latest version
DT | Digital trust |
WoS | Web of Science |
Nr | Definition | Source | Quoted in |
---|---|---|---|
Thematical Group 1 | |||
1 | “In the digital context, trust refers to users' confidence and reliability in the systems, services, and organizations they interact with. Users must trust that their personal information will be handled responsibly, that their privacy will be respected, and that the systems they rely on are secure from malicious actors.” | [27], (p.360) | N/A14/04/2025 13:15:00 |
2 | “The perceived confidence individuals have in the ability of people, technology, and processes to build a secure digital environment.” | [73] | [42], (p.4329) |
3 | “A concept that defines confidence in the reliability of all components of digital interaction: users, processes, devices, technologies and vendors” | [74] | [12], (p.433) |
4 | “Digital Trust can be defined as the confidence that users have in processes, technology and people to create a secure digital world.” | [51], (p.1) | N/A |
5 | “Digital trust underpins every digital interaction by measuring and quantifying the expectation that an entity is who or what it claims to be and that it will behave in an expected manner.” | [75] | [76], (p.179) |
6 | “The general belief that technology, people, and processes act or are aligned in ways that will fulfill people's digital expectations, such as sense of confidence, security, or control to support the creation of a secure digital environment.” | [75] | [77], (p.30) |
7 | “Digital trust implies a sufficient level of confidence in people, processes, and technology to build a secure digital world” | [47], (p.245) | N/A |
8 | “Confidence in the creation of a secure digital world” | [78] | [38], (p.539) |
9 | “DTrust is associated with trust in digital institutions, digital technologies and platforms, which, in other words, means the user's trust in the capability of digital institutions, companies, technologies and processes to create a safe digital world.” | [57], (p.490) | N/A |
10 | “Digital trust can be referred to as the confidence of stakeholders on the competence of actors, technologies, and processes for establishing reliable and secure business networks.” | [23], (p.3) | N/A |
11 | “Digital trust has been defined in practitioner circles as the confidence users have in the ability of people, technology, and processes to create a secure digital world. Yet the basis of trust placed in people, technology (e.g., devices, platforms), and processes (e.g., systems, institutions) will likely differ across digital contexts.” | [79] | [80], (p.668) |
12 | “DT represents stakeholders' confidence in the competence of actors, technologies, platforms and processes of establishing a reliable network.” | [81] | [48], (p.74) |
Thematical Group 2 | |||
13 | “Digital trust represents the acquisition and retention of customers and shareholder value via providing confidence in the digital services with digital channels” | [35] | [36], (p.6) |
14 | “Reliability of information provided by trade partners, or the safety and security of the data managed by a central authority” | [82] | [40], (p.19) |
15 | “The confidence that a digital society attains in terms of data protection and privacy protection” | [83] | [33], (p.168) |
16 | “Confidence in the counterparty that stores and use consumers’ digital information in such a way that this meets the expectations of consumers” | [84] | [12], (p.433) |
17 | “Digital trust is assumed to be the measure of confidence which workers, consumers/buyers, partners and other stakeholders have in the ability of an organisation to protect data and the privacy of individuals” | [2], (p.65) | N/A |
18 | “The confidence placed in an organisation to collect, store, and use the digital information” | [85] | [2], (p.65) |
19 | “Digital trust stems from a combination of different factors (...): security, identifiability, and traceability. Quite often, however, the presence of these features can be too difficult for an individual to evaluate – and especially so in a digital environment.” | [86] | [2], (p.65) |
20 | “Digital trust can be seen as insurance placed by data owners in an actor empowered to manage their digital data. This means that data owners feel secure with their data, by securely controlling their distribution. Their consent is required to access this data.” | [87], (p.262) | N/A |
21 | “Digital trust refers to the belief that technology and information systems can be relied upon, secure, and well-integrated into business processes”. | [88] | [89], (p.4) |
22 | “Digital trust, which is the users' confidence in the safety, privacy, security, reliability, and ethical handling of data by companies in the digital environment, correlates with the perceived value of the information conveyed” | [89], (p.6) | N/A |
Thematical Group 3 | |||
23 | Digital trust is maintained through technologies like blockchain and smart contracts, replacing traditional 'implicit trust' with 'technically expressed trust'. | [90] | [91], (p.6) |
24 | The consumer’s belief that the service is technically capable of ensuring the successful execution of the transaction | [28] | [12], (p.433) |
25 | “The concepts of digital trust are represented as a layered model by dividing the system into trust, credentials, control data, and trust storage abstraction levels.” | [52], (p.582) | N/A |
26 | “Trust in the technology environment, digital trust (DT) in other words, as the belief of an individual towards a digital system regarding its reliability and punctuality in performing commercial and operational transactions.” | [44], (p.7) | N/A |
27 | “The extent to which users believe that a platform provides reliable services and maintains a trustworthy status within relevant verification organizations.” | [92] | [93], (p.5) |
28 | “The reliability of the system involves a shift from physical to digital and human to machine, which we refer to as digital trust, reflecting users' positive beliefs about accepting and using voice-assisted AI systems.” | [94] | [49], (p.203) |
29 | “DT reflects the user's confidence in the digital platform's consistency and punctuality when executing operational and commercial transactions.” | [44,95] | [96], (p.235) |
Thematical Group 4 | |||
30 | “Trust is a mental state comprising (1) expectancy: the trustor expects a specific behaviour of the trustee such as providing valid information or effectively performing cooperative actions; (2) belief: the trustor believes that the expected behavior will occur, based on the evidence of the trustee’s competence, good intention, and integrity; (3) willingness to take a risk: the trustor is willing to take the risk for (or be vulnerable) that belief in a specific context, where there is an expectation for the specific behaviour of the trustee.” | [97] | [64], (p.107) |
31 | “Digital trust in blockchain can be defined as enabling user heuristics made between security and privacy that reflect their level of confidence. Digital trust is a kind of user heuristics in blockchain. (…)Digital trust as cognitive heuristics constitute information processing methods to make decisions more quickly and with less effort than more complex methods, and thus they reduce cognitive load during security assessment.” | [29], (p.2) | N/A |
32 | “A trust based either on past experience or evidence that an entity has behaved and/or will behave in accordance with the self-stated behaviour.” | [61], (p.885) | N/A |
33 | “The combination of cognitive trust and emotional trust. Cognitive trust includes practicality, commitment to execution, honesty, benevolence, and so on. Emotional trust includes likes, beliefs, and so on.” | [59], (p.4) | N/A |
34 | “Digital trust is defined as a ''measurable belief and/or confidence'' that is ''accumulated from past experiences'' and is an ''expecting value for the future''.” | [98] | [99], (p.106745) |
35 | “The willingness to rely on digitally presented information when there is limited means of verification” | [34], (p.1) | N/A |
Thematical Group 5 | |||
36 | “The confidence that causes users to exercise a choice to interact, transact, and consume online. Fundamentally, it determines the quality of the interaction between those who give trust and those who guarantee to uphold said trust.” | [100], (p.25) | [101], (p.3) |
37 | “Trust in interactions that take place in an environment where human actors and/or technological elements are involved.” | [60], (p.2) | N/A |
38 | “Specific beliefs about the way that technology operates through a work environment” | [102] | [44], (p.7) |
39 | “Digital trust is a third dimension that affects digital B2B relationships. It specifically refers to trust between digital partners and it can also be influenced by the perception of the tools used. For instance, the opportunity to use technology that simulates real in-person contact reinforces trust, while only chatting has the opposite effect. According to this vision, technology represents an enabler of the relationship that can influence the formation of trust in a techno-mediated environment.” | [103], (p.2107) | N/A |
Thematical Group 6 | |||
40 | “Digital trust, or "e-trust," is characterized as one's set of specific beliefs in the e-vendor, including integrity, benevolence, ability, and predictability, that results in behavioral intentions.” | [104] | [41], (p.1361) |
41 | “The digital trust category is also used as a general term to describe behavioral and cultural principles, including privacy, security, protection and data management” | [37] | [38], (p.544) |
42 | Is consumer’s confidence in a digital partner’s, business’ or institution’s commitment (written/unwritten) to prevent all sources of harm that may arise in transacting business between the two parties (consumer and partner/business/ institution). | [105] | N/A |
Group nr. | Main group’s theme |
---|---|
Group 1 (n=12) | Confidence in people, processes and technology to create a secure digital environment |
Group 2 (n=8) | Trust in data protection, privacy, security, and ethical information handling |
Group 3 (n=8) | Trust in the technical capability and reliability of technology |
Group 4 (n=7) | Trust as a mental state involving cognitive, emotional, and experiential factors |
Group 5 (n=4) | Trust as an enabler in digital relationships, interactions, and business networks |
Group 6 (n=3) | Trust based on ethical behaviour and cultural principles |
Category 1: Ability | Source |
---|---|
1.Competence and reliable performance (cumulative n=19) | |
1.1. Competence (n=2) | [39,44] |
1.2. Performance (n=2) | [39,45] |
1.3. System’s reliability (incl. safety and quality) (n=8) | [14,33,42,43,46,47,48,49] |
1.4. Operational stability (incl. availability, resilience and business continuity) (n=7) | [14,36,39,42,45,47,49] |
2. Security and control (cumulative n=25) | |
2.1. Identity and access management (inc. authentication, authorization, safe credentials and identifiability) (n=6) | [2,36,39,50,51,52] |
2.2. Confidentiality (incl. data protection and control over own data) (n=9) | [38,39,40,42,50,52,53,54,55] |
2.3. Integrity of data (incl. immutability) (n=10) | [27,32,39,42,43,45,49,50,56,57] |
3. Secure system architecture (cumulative n=8) | [39,56] |
3.1. Automation (n=2) | |
3.2. Decentralisation (incl. consensus algorithms, permissionless access, censorship resistance and cryptographic functions / protocols) (n=5) | [32,39,42,43,56] |
3.3. Interoperability (n=1) | [39] |
Category 2: Benevolence | Source |
---|---|
1. Relational credibility (cumulative n=10) | |
1.1. Goodwill (incl. benevolence, fairness and honesty) (n=3) | [41,58,59] |
1.2. Reliability (predictability of or confidence in service provider) (n=3) | [2,41,49] |
1.3. Reputation (incl. credibility) (n=4) | [2,57,60,61] |
2. User experience and support (cumulative n=12) | |
2.1. Satisfaction of customer service and support (incl. prompt resolution of the issues) (n=6) | [27,44,45,46,48,49] |
2.2. Positive past experience (n=3) | [47,60,61] |
2.3. Usability (n=3) | [39,59,60] |
Category 3: Integrity | Source |
---|---|
1. Core ethical principles (cumulative n=14) | |
1.1. Integrity (the principle of the organization) (n=1) | [39] |
1.2. Data ethics (incl. responsible use and privacy) (n=12) | [26,29,33,36,39,42,47,50,53,54,61,62] |
1.3. Sustainability (n=1) | [24] |
2. Governance and compliance (cumulative n=13) | |
2.1. Accountability (n=6) | [27,32,36,39,40,63] |
2.2. Compliance with regulations (n=6) | [15,39,40,55,62,63] |
2.3. Application of standards (n=1) | [60] |
Category 4: Openness (cumulative n=23) | Source |
---|---|
1. Transparency (n=11) | [27,32,36,39,40,43,47,50,58,63,64] |
2. Auditability (incl. certification and independent verification) (n=6) | [24,32,39,47,50,61] |
3. Traceability (incl. data provenance) (n=6) | [2,39,40,50,51,64] |
Code | Category | Operationalised description |
---|---|---|
Category 1: Ability | ||
F1 | 1.Competence and performance | The entity demonstrates competence and reliably delivers services or products. |
F2 | 2. Security and control | The entity ensures secure access, protects data, and maintains its integrity. |
F3 | 3. Secure system architecture | The entity employs a secure architecture and processes to ensure efficiency, control, and integration. |
Category 2: Benevolence | ||
F4 | 1. Relational credibility | The entity demonstrates fairness, honesty, and reliability, building a strong reputation. |
F5 | 2. User experience and support | The entity ensures a positive user experience and provides responsive support. |
Category 3: Integrity | ||
F6 | 1. Core ethical principles | The entity demonstrates integrity, protects data privacy, and adopts sustainable practices. |
F7 | 2. Governance and compliance | The entity ensures governance and compliance in accordance with regulations and standards. |
Category 4: Openness | ||
F8 | 1. Auditability | The entity ensures compliance through certifications, audits, and supervision. |
F9 | 2. Traceability | The entity ensures traceability by providing information about data origins. |
Language | N | % | Age | N | % | Education | N | % |
---|---|---|---|---|---|---|---|---|
English | 47 | 47,5% | 18-24 | 21 | 21,2% | High school diploma or equivalent | 20 | 20,2% |
Latvian | 52 | 52,5% | 25-34 | 28 | 28,3% | College | 10 | 10,1% |
35-44 | 34 | 34,3% | Bachelor's degree | 26 | 26,3% | |||
45-54 | 13 | 13,3% | Master's degree | 43 | 43,4% | |||
55-64 | 3 | 3,0% |
Code | Category | SD | p | Rating | htc |
---|---|---|---|---|---|
F1 | Competence and performance | 1.173 | <.001 | 4.18 | 0.84 |
F2 | Security and control | 0.969 | <.001 | 4.41 | 0.88 |
F3 | Secure system architecture | 0.959 | <.001 | 4.28 | 0.86 |
F4 | Relational credibility | 0.956 | <.001 | 4.32 | 0.86 |
F5 | User experience and support | 1.082 | <.001 | 4.18 | 0.84 |
F6 | Core ethical principles | 1.036 | <.001 | 4.26 | 0.85 |
F7 | Governance and compliance | 0.873 | <.001 | 4.48 | 0.90 |
F8 | Auditability | 1.152 | <.001 | 4.17 | 0.83 |
F9 | Traceability | 0.894 | <.001 | 4.34 | 0.87 |
Overall | 4.29 | 0.86 |
Code | Category | D2 SD | D2 p | D3 SD | D3 p | D4 SD | D4 p |
---|---|---|---|---|---|---|---|
F1 | Competence and performance | 1.003 | <.001 | 1.035 | <.001 | 1.082 | <.001 |
F2 | Security and control | 0.955 | <.001 | 1.218 | <.001 | 1.204 | <.001 |
F3 | Secure system architecture | 1.082 | <.001 | 1.051 | <.001 | 1.109 | <.001 |
F4 | Relational credibility | 1.069 | <.001 | 1.190 | <.001 | 1.063 | <.001 |
F5 | User experience and support | 1.094 | <.001 | 1.123 | <.001 | 1.071 | <.001 |
F6 | Core ethical principles | 1.041 | <.001 | 1.211 | <.001 | 1.023 | <.001 |
F7 | Governance and compliance | 1.114 | <.001 | 1.228 | <.001 | 1.161 | <.001 |
F8 | Auditability | 1.264 | <.001 | 1.229 | <.001 | 1.159 | <.001 |
F9 | Traceability | 1.161 | <.001 | 1.123 | <.001 | 1.218 | <.001 |
Code | Category | D1 Rating | D2 Rating | D2 htd | D3 Rating | D3 htd | D4 Rating | D4 htd |
---|---|---|---|---|---|---|---|---|
F1 | Competence and performance | 4.18 | 3,65 | 0,13 | 3,36 | 0,21 | 3,53 | 0,16 |
F2 | Security and control | 4.41 | 3,62 | 0,20 | 3,31 | 0,28 | 3,59 | 0,21 |
F3 | Secure system architecture | 4.28 | 3,47 | 0,20 | 3,43 | 0,21 | 3,35 | 0,23 |
F4 | Relational credibility | 4.32 | 3,41 | 0,23 | 3,15 | 0,29 | 3,48 | 0,21 |
F5 | User experience and support | 4.18 | 3,13 | 0,26 | 3,27 | 0,23 | 3,71 | 0,12 |
F6 | Core ethical principles | 4.26 | 3,42 | 0,21 | 3,06 | 0,30 | 3,35 | 0,23 |
F7 | Governance and compliance | 4.48 | 3,23 | 0,31 | 3,11 | 0,34 | 3,17 | 0,33 |
F8 | Auditability | 4.17 | 3,21 | 0,24 | 3,00 | 0,29 | 3,06 | 0,28 |
F9 | Traceability | 4.34 | 3,17 | 0,29 | 3,06 | 0,32 | 2,92 | 0,36 |
Overall | 4.29 | 3,37 | 0,23 | 3,20 | 0,27 | 3,35 | 0,24 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
Downloads
27
Views
18
Comments
0
Subscription
Notify me about updates to this article or when a peer-reviewed version is published.
© 2025 MDPI (Basel, Switzerland) unless otherwise stated