1 Establishing the context 1
2 Security and trust in cyber space 30
3 Resource-based view and theory 82
4 Methodology and development of hypotheses 127
5 Data collection and empirical results 169
6 Conclusion, recommendations, and future research 213