This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Angst C and Agarwal R (2009) Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Quarterly 33 (2), 339–370.
Arcand M, Nantel J, Arles-Dufour M and Vincent A (2007) The impact of reading a web site’s privacy statement on perceived control over privacy and perceived trust. Online Information Review 31 (5), 661–681.
Arnold HJ (1982) Moderator variables: a clarification of conceptual, analytic, and psychometric issues. Organizational Behavior and Human Performance 29 (2), 143–174.
Awad NF and Krishnan MD (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30 (1), 13–28.
Bassili JN (1996) Meta-judgmental versus operative indices of psychological properties: the case of measures of attitude and strength. Journal of Personality and Social Psychology 71 (4), 637–653.
Bhattacherjee A and Sanford C (2006) Influence processes for information technology acceptance: an elaboration likelihood model. MIS Quarterly 30 (4), 805–825.
Boudreau M-C, Gefen D and Straub DW (2001) Validation in information systems research: a state-of-the-art assessment. MIS Quarterly 25 (1), 1–16.
Carte TA and Russell CJ (2003) In pursuit of moderation: nine common errors and their solutions. MIS Quarterly 27 (3), 479–501.
Chaiken S and Maheswaran D (1994) Heuristic processing can bias systematic processing: effects of source credibility, argument ambiguity, and task importance on attitude judgment. Journal of Personality and Social Psychology 66 (3), 460–473.
Cheung CM-Y, Sia C-L and Kuan KKY (2012) Is this review believable? A study of factors affecting the credibility of online consumer reviews from an ELM perspective. Journal of the Association for Information Systems 13 (8), 618–635.
Chin WW, Johnson N and Schwarz A (2008) A fast form approach to measuring technology acceptance and other constructs. MIS Quarterly 32 (4), 687–703.
Clarkson JJ, Hirt ER, Jia L and Alexander MB (2010) When perception is more than reality: the effects of perceived versus actual resource depletion on self-regulatory behavior. Journal of Personality and Social Psychology 98 (1), 29–46.
Culnan MJ (2000) Protecting privacy online: is self-regulation working? Journal of Public Policy & Marketing 19 (1), 20–26.
Culnan MJ and Bies RJ (2003) Consumer privacy: balancing economic and justice considerations. Journal of Social Issues 59 (2), 323–342.
Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transaction. Information Systems Research 17 (1), 61–80.
Earp JB, Antón AI, Aiman-Smith L and Stufflebeam WH (2005) Examining internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management 52 (2), 227–237.
Eastlick MA, Lotz SL and Warrington P (2006) Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59, 877–886.
Federal Trade Commission. (2000) Privacy online: fair information practices in the electronic marketplace. [WWW document] http://www.ftc.gov/os/2000/05/testimonyprivacy.htm (accessed 23 November 2012).
Fogg BJ et al (2001) What makes web sites credible? A report on a large quantitative study. In Proceedings of the CHI 2001 Conference on Human Factors and Computing Systems, Seattle, WA.
Fogg BJ, Soohoo C, Danielson D, Marable L, Stanford J and Tauber ER (2002) How do people evaluate a web site’s credibility? Results from a large study. [WWW document] http://simson.net/ref/2002/stanfordPTL.pdf (accessed 18 August 2013).
Gefen D, Karahanna E and Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly 27 (1), 51–90.
Gefen D and Pavlou PA (2012) The boundaries of trust and risk: the quadratic moderating role of institutional structures. Information Systems Research 23 (3), 940–959.
Gefen D, Rigdon EE and Straub DW (2011) An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly 35 (2), iii–iv.
Gefen D and Straub DW (1997) Gender differences in the perception and use of e-mail: an extension to the technology acceptance model. MIS Quarterly 21 (4), 389–400.
Gefen D, Straub DW and Boudreau M-C (2000) Structural equation modeling and regression: guidelines for research practice. Communications of Association for Information Systems 4 (1–79), 1–77.
Gefen D, Wyss S and Lichtenstein Y (2008) Business familiarity as risk mitigation in software development outsourcing contracts. MIS Quarterly 32 (3), 531–551.
Greiner ME and Wang H (2010–2011) Building consumer-to-consumer trust in e-finance marketplaces: an empirical analysis. International Journal of Electronic Commerce 15 (2), 105–136.
Hui K-L, Teo H-H and Lee S-YT (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly 31 (1), 19–33.
Jarvenpaa SL, Tractinsky N and Vitale M (2000) Consumer trust in an internet store. Information Technology Management 1 (1–2), 45–71.
Kim D and Benbasat I (2003) Trust-related arguments in internet stores: a framework for evaluation. Journal of Electronic Commerce Research 4 (2), 49–64.
Kim D and Benbasat I (2006) The effects of trust-assuring arguments on consumer trust in internet stores: application of Toulmin’s model of argumentation. Information Systems Research 17 (3), 286–300.
Kim D and Benbasat I (2009–2010) Trust-assuring arguments in B2C e-commerce: impact of content, source, and price on trust. Journal of Management Information Systems 26 (3), 175–206.
Kim DJ (2008) Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems 24 (4), 13–45.
Kim DJ, Steinfield C and Lai Y-J (2008) Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems 44 (4), 1000–1015.
Kukar-Kinney M and Close AG (2010) The determinants of consumers online shopping cart abandonment. Academy of Marketing Science Journal 38 (2), 240–250.
Kwon SJ and Chung N (2010) The moderating effects of psychological reactance and product involvement on online shopping recommendation mechanisms based on a causal map. Electronic Commerce Research and Applications 9 (6), 522–536.
Lauer TW and Deng X (2007) Building online trust through privacy practices. International Journal of Information Security 6 (5), 323–331.
Lee D-J, Ahn J-H and Bang Y (2011) Managing consumer privacy concerns in personalization: a strategic analysis of privacy protection. MIS Quarterly 35 (2), 423–444.
Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems 28 (May), 453–496.
Liu C, Marchewka JT and Ku C (2004) American and taiwanese perceptions concerning privacy, trust, and behavioral intentions in electronic commerce. Journal of Global Information Management 12 (1), 18–40.
Liu C, Marchewka JT, Lu J and Yu C (2005) Beyond concern – a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42 (2), 289–304.
Loiacono E, Watson R and Goodhue D (2007) Webqual: an instrument for consumer evaluation of web sites. International Journal of Electronic Commerce 11 (3), 51–87.
Loraas TM and Diaz MC (2011) Learning new technologies: the effect of ease of learning. Journal of Information Systems 25 (2), 171–194.
Lowry PB, Moody G, Vance A, Jensen M, Jenkins J and Wells T (2012) Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society for Information Science and Technology 63 (4), 755–776.
Luo X (2002) Trust production and privacy concerns on the internet: a framework based on relationship marketing and social exchange theory. Industrial Management & Data Systems 31 (2), 111–118.
Mak B, Schmitt BH and Lynntinen K (1997) User participation in knowledge update of expert systems. Information & Management 32 (2), 55–63.
Malhotra NK, Kim SS and Agarwal J (2004) Internet users’ internet information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research 15 (4), 336–355.
Martín SS, Camarero C and San José R (2011) Does involvement matter in online shopping satisfaction and trust? Psychology & Marketing 28 (2), 145–167.
Maurer SD and Cook DP (2011) Using company web sites to e-recruit qualified applicants: a job marketing based review of theory-based research. Computers in Human Behavior 27 (1), 106–117.
Mayer RC, Davis JH and Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20 (3), 709–734.
Mayer RN, Huh J and Cude BJ (2005) Cues of credibility and price performance of life insurance comparison web sites. The Journal of Consumer Affairs 39 (1), 71–94.
McKinney V, Yoon K and Zahedi FM (2002) The measurement of web-customer satisfaction: an expectation and disconfirmation approach. Information Systems Research 13 (3), 296–315.
McKnight DH, Choudhury V and Kacmar C (2002) Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research 13 (3), 334–359.
Metzger MJ (2006) Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Communication Research 33 (3), 155–179.
Milne GR and Culnan MJ (2002) Using the content of online privacy notices to inform public policy: a longitudinal analysis of the 1998–2001 U.S. web surveys. The Information Society 18, 345–359.
Milne GR and Culnan MJ (2004) Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing 18 (3), 15–29.
Milne GR and Gordon ME (1993) Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing 12 (2), 206–215.
Miyazaki AD and Krishnamurthy S (2002) Internet seals of approval: effects of online privacy policies and consumer perceptions. The Journal of Computer Affairs 36 (1), 28–49.
Muthén LK and Muthén BO (1998–2012) Mplus User’s Guide, 7th edn, Muthén & Muthén, Los Angeles, CA.
Nicolaou A and McKnight DH (2006) Perceived information quality in data exchanges: effects on risk, trust, and intention to use. Information Systems Research 17 (4), 332–351.
Pan Y and Zinkhan GM (2006) Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing 82 (4), 331–338.
Parboteeah DV, Valacich JS and Wells JD (2009) The influence of website characteristics on a consumer’s urge to buy impulsively. Information Systems Research 20 (1), 60–78.
Pavlou PA (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce 7 (3), 101–134.
Pavlou PA and Dimoka A (2006) The nature and role of feedback text comments in online marketplaces: implications for trust building, price premiums, and seller differentiation. Information Systems Research 17 (4), 392–414.
Pavlou PA and Gefen D (2005) Psychological contract violation in online marketplaces: antecedents, consequences, and moderating role. Information Systems Research 16 (4), 372–399.
Peslak AR (2006) Internet privacy policies of the largest international companies. Journal of Electronic Commerce in Organizations 4 (3), 46–62.
Peterson D, Meinert D, Criswell J II and Crossland M (2007) Consumer trust: privacy policies and third-party seals. Journal of Small Business and Enterprise Development 14 (4), 654–669.
Petty RE and Cacioppo JT (1984) Source factors and the elaboration likelihood model of persuasion. Advances in Consumer Research 11, 668–672.
Petty RE and Cacioppo JT (1986a) Communication and Persuasion: Central and Peripheral Routes to Attitude Change. Springer-Verlag, New York.
Petty RE and Cacioppo JT (1986b) The elaboration likelihood model of persuasion. Advances in Experimental Social Psychology 19, 123–205.
Petty RE, Cocioppo JT and Goldman R (1981) Personal inolvement as a determinant of argument-based persuassion. Journal of Personality and Social Psychology 41 (5), 847–855.
Petty RE and Wegener DT (1999) The elaboration likelihood model: current status and controversies. In Dual-Process Theories in Social Psychology (Chaiken S and Trope Y, Eds), pp 41–72, Guilford Press, New York.
Podsakoff PM, Mackenzie SB, Lee JY and Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology 88 (5), 879–903.
Policinski G (2012) First amendment column: petraeus affair reveals privacy’s limits, Green Bay Press Gazette 3 December. [WWW document] http://www.greenbaypressgazette.com/article/20121128/GPG0706/311280127/First-Amendment-column-Petraeus-affair-reveals-privacy-s-limits (accessed 4 December 2012).
Qureshi I and Compaeu D (2009) Assessing between-group differences in information systems research: a comparison of covariance- and component-based SEM. MIS Quarterly 33 (1), 197–214.
Qureshi I, Fang Y, Ramsey E, Mccole P, Ibbotson P and Compeau D (2009) Understanding online customer repurchasing intention and the mediating role of trust – an empirical investigation in two developed countries. European Journal of Information Systems 18 (3), 205–222.
Ryker R, Lafleur E, Mcmanis B and Cox KC (2002) Online privacy policies: an assessment of the fortune e-50. The Journal of Computer Information Systems 42 (4), 15–20.
Segars AH (1997) Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research. Omega 25 (1), 107–121.
Smith HJ, Dinev T and Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35 (4), 992–1015.
Smith HJ, Milberg SJ and Burke SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly 20 (2), 167–196.
Solove (2011) Why privacy matters even if you have ‘nothing to hide’. [WWW document] http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ (accessed September 2013).
Son J-Y and Kim SS (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Quarterly 32 (3), 503–529.
Song J and Zahedi FM (2005) A theoretical approach to web design in e-commerce: a belief reinforcement model. Management Science 51 (8), 1219–1235.
Song J and Zahedi FM (2007) Trust in health infomediaries. Decision Support Systems 43 (2), 390–407.
Stewart KA and Segars AH (2002) An empirical examination of the concern for information privacy instrument. Information Systems Research 13 (1), 36–49.
Storey VC, Kane GC and Schwaig KS (2009) The quality of online privacy policies: a resource-dependency perspective. Journal of Database Management 20 (2), 19–37.
Straub D, Boudreau M-C and Gefen D (2004) Validation heuristics for IS positivist research. Communications of the Association for Information Systems 14, 380–426.
Sussman SW and Siegal WS (2003) Informational influence in organizations: an integrated approach to knowledge adoption. Information Systems Research 14 (1), 47–65.
Tam KY and Ho SY (2005) Web personalization as a persuasion strategy: an elaboration likelihood model perspective. Information Systems Research 16 (3), 271–293.
Taylor SE (1981) The interface of cognitive and social psychology. In Cognition, Social Behavior, and The Environment (Harvey JH, Eds), pp 189–211, Earlbaum, Hillsdale, NJ.
Teo TSH and Liu J (2007) Consumer trust in e-commerce in the united states, singapore and china. Omega 35 (1), 22–38.
The Center for the Digital Future. (2009) Highlights: the 2009 digital future project – Year eight, USC Annenberg School for Communication & Journalism. [WWW document] http://www.digitalcenter.org/pdf/2009_Digital_Future_Project_Release_Highlights.pdf (accessed 23 November 2012).
The Center for the Digital Future. (2011) Highlights: the 2011 digital future project – Year ten, USC Annenberg School for Communication & Journalism. [WWW document] http://annenberg.usc.edu/News%20and%20Events/News/110603CDF/110603hilites.aspx (accessed 23 November 2012).
Tsai JY, Egelman S, Cranor L and Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research 22 (2), 254–268.
VanDyke TP, Midha V and Nemati H (2007) The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets 17 (1), 68–81.
Venkatraman N (1989) The concept of fit in strategy research: toward verbal and statistical correspondence. Academy of Managemenf Review 14 (3), 423–444.
Wakefield RL, Stocks MH and Wilder WM (2004) The role of website characteristics in initial trust formation. The Journal of Computer Information Systems 45 (1), 94–103.
Wang S, Beatty SE and Foxx W (2004) Signaling the trustworthiness of small online retailers. Journal of Interactive Marketing 18 (1), 53–69.
Wells JD, Valacich JS and Hess TJ (2011) What signal are you sending? How website quality influences perceptions of product quality and purchase intentions. MIS Quarterly 35 (2), 373–396.
Westin AF (1967) Privacy and Freedom. Atheneum, New York.
Xu H, Crossler RE and Bélanger F (2012a) A value sensitive design investigation of privacy enhancing tools in web browsers. Decision Support Systems 54 (1), 424–433.
Xu H, Teo H-H, Tan BCY and Agarwal R (2012b) Research note: effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research 23 (4), 1342–1363.
Yang S-C, Wan-Chiao H, Sung K and Cheng-Kiang F (2006) Investigating initial trust toward e-tailers from the elaboration likelihood model perspective. Psychology & Marketing 23 (5), 429–445.
Yi MY, Yoon JJ, Davis JM and Lee T (2013) Untangling the antecedents of initial trust in web-based health information: the roles of argument quality, source expertise, and user perceptions of information quality and risk. Decision Support Systems 55 (1), 284.
Zahedi FM and Song J (2008) Dynamics of trust revision: using health infomediaries. Journal of Management Information Systems 24 (4), 225–248.
Rights and permissions
About this article
Cite this article
Bansal, G., Zahedi, F. & Gefen, D. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. Eur J Inf Syst 24, 624–644 (2015). https://doi.org/10.1057/ejis.2014.41
- information privacy concern
- elaboration likelihood model
- privacy assurance cues