Elgar original reference
Edited by Fergus Lyon, Guido Möllering and Mark N.K. Saunders
Chapter 16: Using Critical Incident Technique in Trust Research
Robert Münscher and Torsten M. Kühlmann INTRODUCTION The critical incident technique provides a number of advantages for researching trust and trust dynamics in specific contexts or relationships, and for realising comparative (including cross-cultural) studies on trust. In this chapter we show that it is especially suited to collecting data on the behaviours involved in creating, strengthening or destroying trust. Trust is not easy to research empirically. Trust phenomena, like the development of trust or the assessment of trustworthiness, are often not reflected on or take place subconsciously in everyday life. A well-tried and sound way to collect and analyse rich data on such phenomena is the critical incident technique (CIT). Since its introduction by Flanagan (1954), CIT has proven valuable in quite a number of research disciplines, and has become increasingly important for trust research. Focusing on behavioural sequences in specific contexts, CIT helps to avoid researching subjects’ folk psychological theories about trust, but instead collects detailed descriptions of real-life situations in which trust is created, strengthened or destroyed. To date, few methodological reflections on CIT are available, but with the method being adapted more and more to new research contexts, the literature is slowly growing (Chell, 1998; Gremler, 2004; Kemppainen, 2000). DESCRIPTION OF THE METHOD Basics of the Approach When deciding whether to trust someone, the partner’s behaviour is a most valuable source of information. From a research point of view, it thus appears promising to ask respondents for a report of those incidents involving their own...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.