The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern
- 634 Downloads
- Angst C and Agarwal R (2009) Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Quarterly 33 (2), 339–370.Google Scholar
- Awad NF and Krishnan MD (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30 (1), 13–28.Google Scholar
- Bhattacherjee A and Sanford C (2006) Influence processes for information technology acceptance: an elaboration likelihood model. MIS Quarterly 30 (4), 805–825.Google Scholar
- Carte TA and Russell CJ (2003) In pursuit of moderation: nine common errors and their solutions. MIS Quarterly 27 (3), 479–501.Google Scholar
- Cheung CM-Y, Sia C-L and Kuan KKY (2012) Is this review believable? A study of factors affecting the credibility of online consumer reviews from an ELM perspective. Journal of the Association for Information Systems 13 (8), 618–635.Google Scholar
- Chin WW, Johnson N and Schwarz A (2008) A fast form approach to measuring technology acceptance and other constructs. MIS Quarterly 32 (4), 687–703.Google Scholar
- Federal Trade Commission. (2000) Privacy online: fair information practices in the electronic marketplace. [WWW document] http://www.ftc.gov/os/2000/05/testimonyprivacy.htm (accessed 23 November 2012).
- Fogg BJ et al (2001) What makes web sites credible? A report on a large quantitative study. In Proceedings of the CHI 2001 Conference on Human Factors and Computing Systems, Seattle, WA.Google Scholar
- Fogg BJ, Soohoo C, Danielson D, Marable L, Stanford J and Tauber ER (2002) How do people evaluate a web site’s credibility? Results from a large study. [WWW document] http://simson.net/ref/2002/stanfordPTL.pdf (accessed 18 August 2013).
- Gefen D, Karahanna E and Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly 27 (1), 51–90.Google Scholar
- Gefen D, Rigdon EE and Straub DW (2011) An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly 35 (2), iii–iv.Google Scholar
- Gefen D, Straub DW and Boudreau M-C (2000) Structural equation modeling and regression: guidelines for research practice. Communications of Association for Information Systems 4 (1–79), 1–77.Google Scholar
- Gefen D, Wyss S and Lichtenstein Y (2008) Business familiarity as risk mitigation in software development outsourcing contracts. MIS Quarterly 32 (3), 531–551.Google Scholar
- Hui K-L, Teo H-H and Lee S-YT (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly 31 (1), 19–33.Google Scholar
- Kim D and Benbasat I (2003) Trust-related arguments in internet stores: a framework for evaluation. Journal of Electronic Commerce Research 4 (2), 49–64.Google Scholar
- Lee D-J, Ahn J-H and Bang Y (2011) Managing consumer privacy concerns in personalization: a strategic analysis of privacy protection. MIS Quarterly 35 (2), 423–444.Google Scholar
- Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems 28 (May), 453–496.Google Scholar
- Lowry PB, Moody G, Vance A, Jensen M, Jenkins J and Wells T (2012) Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society for Information Science and Technology 63 (4), 755–776.CrossRefGoogle Scholar
- Luo X (2002) Trust production and privacy concerns on the internet: a framework based on relationship marketing and social exchange theory. Industrial Management & Data Systems 31 (2), 111–118.Google Scholar
- Mayer RC, Davis JH and Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20 (3), 709–734.Google Scholar
- Milne GR and Gordon ME (1993) Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing 12 (2), 206–215.Google Scholar
- Miyazaki AD and Krishnamurthy S (2002) Internet seals of approval: effects of online privacy policies and consumer perceptions. The Journal of Computer Affairs 36 (1), 28–49.Google Scholar
- Muthén LK and Muthén BO (1998–2012) Mplus User’s Guide, 7th edn, Muthén & Muthén, Los Angeles, CA.Google Scholar
- Pavlou PA (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce 7 (3), 101–134.Google Scholar
- Petty RE and Wegener DT (1999) The elaboration likelihood model: current status and controversies. In Dual-Process Theories in Social Psychology (Chaiken S and Trope Y, Eds), pp 41–72, Guilford Press, New York.Google Scholar
- Policinski G (2012) First amendment column: petraeus affair reveals privacy’s limits, Green Bay Press Gazette 3 December. [WWW document] http://www.greenbaypressgazette.com/article/20121128/GPG0706/311280127/First-Amendment-column-Petraeus-affair-reveals-privacy-s-limits (accessed 4 December 2012).
- Qureshi I and Compaeu D (2009) Assessing between-group differences in information systems research: a comparison of covariance- and component-based SEM. MIS Quarterly 33 (1), 197–214.Google Scholar
- Ryker R, Lafleur E, Mcmanis B and Cox KC (2002) Online privacy policies: an assessment of the fortune e-50. The Journal of Computer Information Systems 42 (4), 15–20.Google Scholar
- Smith HJ, Dinev T and Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35 (4), 992–1015.Google Scholar
- Solove (2011) Why privacy matters even if you have ‘nothing to hide’. [WWW document] http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ (accessed September 2013).
- Son J-Y and Kim SS (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Quarterly 32 (3), 503–529.Google Scholar
- Straub D, Boudreau M-C and Gefen D (2004) Validation heuristics for IS positivist research. Communications of the Association for Information Systems 14, 380–426.Google Scholar
- Taylor SE (1981) The interface of cognitive and social psychology. In Cognition, Social Behavior, and The Environment (Harvey JH, Eds), pp 189–211, Earlbaum, Hillsdale, NJ.Google Scholar
- The Center for the Digital Future. (2009) Highlights: the 2009 digital future project – Year eight, USC Annenberg School for Communication & Journalism. [WWW document] http://www.digitalcenter.org/pdf/2009_Digital_Future_Project_Release_Highlights.pdf (accessed 23 November 2012).
- The Center for the Digital Future. (2011) Highlights: the 2011 digital future project – Year ten, USC Annenberg School for Communication & Journalism. [WWW document] http://annenberg.usc.edu/News%20and%20Events/News/110603CDF/110603hilites.aspx (accessed 23 November 2012).
- Venkatraman N (1989) The concept of fit in strategy research: toward verbal and statistical correspondence. Academy of Managemenf Review 14 (3), 423–444.Google Scholar
- Wakefield RL, Stocks MH and Wilder WM (2004) The role of website characteristics in initial trust formation. The Journal of Computer Information Systems 45 (1), 94–103.Google Scholar
- Wells JD, Valacich JS and Hess TJ (2011) What signal are you sending? How website quality influences perceptions of product quality and purchase intentions. MIS Quarterly 35 (2), 373–396.Google Scholar
- Westin AF (1967) Privacy and Freedom. Atheneum, New York.Google Scholar