Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers

Privacy concerns can greatly hinder consumers’ intentions to interact with a website. The success of a website therefore depends on its ability to improve consumers’ perceptions of privacy assurance. Seals and assurance statements are mechanisms often used to increase this assurance; however, the findings of the extant literature regarding the effectiveness of these tools are mixed. We propose a model based on the elaboration likelihood model (ELM) that explains conditions under which privacy assurance is more or less effective, clarifying the contradictory findings in previous literature. We test our model in a free-simulation online experiment, and the results of the analysis indicate that the inclusion of assurance statements and the combination, understanding, and assurance of seals influence privacy assurance. Privacy assurance is most effective when seals and statements are accompanied by the peripheral cues of website quality and brand image and when counter-argumentation - through transaction risk - is minimized. Importantly, we show ELM to be an appropriate theoretical lens to explain the equivocal results in the literature. Finally, we suggest theoretical and practical implications.

[1]  Detmar W. Straub,et al.  Diffusing the Internet in the Arab world: the role of social norms and technological culturation , 2003, IEEE Trans. Engineering Management.

[2]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[3]  A. A. Lumsdaine Communication and persuasion , 1954 .

[4]  F. White,et al.  The role of persuasive arguments in changing affirmative action attitudes and expressed behavior in higher education. , 2008, The Journal of applied psychology.

[5]  P. Lachenbruch Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .

[6]  Detmar W. Straub,et al.  Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..

[7]  Trevor T. Moores,et al.  Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.

[8]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[9]  William R. King,et al.  Antecedents of Knowledge Transfer from Consultants to Clients in Enterprise System Implementations , 2005, MIS Q..

[10]  Elaine G. Mauldin,et al.  An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce , 2002, J. Inf. Syst..

[11]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[12]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[13]  D. R. Danielson,et al.  How do users evaluate the credibility of Web sites?: a study with over 2,500 participants , 2003, DUX '03.

[14]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[15]  Ronald E. Rice,et al.  Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..

[16]  Sang-Gun Lee,et al.  The Impact of a Third-Party Assurance Seal in Customer Purchasing Intention , 2004 .

[17]  J. Cacioppo,et al.  Effects of message repetition and position on cognitive response, recall, and persuasion. , 1979 .

[18]  J. Hartwick,et al.  The Effects of Advertiser Reputation and Extremity of Advertising Claim on Advertising Effectiveness , 1990 .

[19]  Terence A. Shimp,et al.  The Use of Extrinsic Cues to Facilitate Product Adoption , 1982 .

[20]  P. Kalbfleisch Credibility for the 21st Century: Integrating Perspectives on Source, Message, and Media Credibility in the Contemporary Media Environment , 2003 .

[21]  Chanthika Pornpitakpan The Persuasiveness of Source Credibility: A Critical Review of Five Decades' Evidence , 2004 .

[22]  Sirkka L. Jarvenpaa,et al.  Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[23]  Miriam J. Metzger Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure , 2006, Commun. Res..

[24]  Kathryn M. Kimery,et al.  THIRD-PARTY ASSURANCES: MAPPING THE ROAD TO TRUST IN E-RETAILING , 2002 .

[25]  Richard E Petty,et al.  Thought confidence as a determinant of persuasion: the self-validation hypothesis. , 2002, Journal of personality and social psychology.

[26]  Kevin Lane Keller Conceptualizing, Measuring, and Managing Customer-Based Brand Equity , 1993 .

[27]  Stephanie Watts,et al.  Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption , 2003, Inf. Syst. Res..

[28]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[29]  Franziska Marquart,et al.  Communication and persuasion : central and peripheral routes to attitude change , 1988 .

[30]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[31]  Wendy Wood,et al.  Access to attitude-relevant information in memory as a determinant of persuasion: The role of message attributes , 1985 .

[32]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[33]  Miriam J. Metzger,et al.  Credibility for the 21st Century: Integrating Perspectives on Source, Message, and Media Credibility in the Contemporary Media Environment , 2003 .

[34]  Xiaolan Fu,et al.  Effects of culture, social presence, and group composition on trust in technology‐supported decision‐making groups , 2010, Inf. Syst. J..

[35]  I. Ajzen The theory of planned behavior , 1991 .

[36]  Anol Bhattacherjee,et al.  Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..

[37]  Paul Herbig,et al.  The relationship of reputation and credibility to brand success , 1993 .

[38]  Jorgen P. Bansler,et al.  Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..

[39]  Guohua Wu,et al.  The effects of Web assurance seals on consumers' initial trust in an online vendor: A functional perspective , 2010, Decis. Support Syst..

[40]  Gurpreet Dhillon,et al.  Do privacy seals in e-commerce really work? , 2003, CACM.

[41]  Kim Kwang-Hoon,et al.  A Role-driven Security and Access Control Model for Secured Business Process Management Systems , 2005 .

[42]  Charles J. Kacmar,et al.  Shifting Factors and the Ineffectiveness of Third Party Assurance Seals: A Two-Stage Model of Initial Trust in a Web Business , 2004, Electron. Mark..

[43]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[44]  David Gefen,et al.  Customer Loyalty in E-Commerce , 2002, J. Assoc. Inf. Syst..

[45]  R. Petty,et al.  Elaboration as a Determinant of Attitude Strength: Creating Attitudes That Are Persistent, Resistant, and Predictive of Behavior , 1995 .

[46]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[47]  Brian R. Kovar,et al.  Consumer Responses to the CPA WEBTRUST™ Assurance , 2000, J. Inf. Syst..

[48]  Detmar W. Straub,et al.  Inexperience and experience with online stores: the importance of TAM and trust , 2003, IEEE Trans. Engineering Management.

[49]  Varun Grover,et al.  The Role of System Trust in Business-to-Consumer Transactions , 2003, J. Manag. Inf. Syst..

[50]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[51]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[52]  Kenton O'Hara,et al.  Social Impact , 2019, Encyclopedia of Food and Agricultural Ethics.

[53]  Anthony D. Miyazaki,et al.  Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions , 2002 .

[54]  Izak Benbasat,et al.  Trust-Related Arguments in Internet Stores: A Framework for Evaluation , 2003, J. Electron. Commer. Res..

[55]  S. Chaiken,et al.  Heuristic processing can bias systematic processing: effects of source credibility, argument ambiguity, and task importance on attitude judgment. , 1994, Journal of personality and social psychology.

[56]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[57]  Detmar W. Straub,et al.  Reconceptualizing System Usage: An Approach and Empirical Test , 2006, Inf. Syst. Res..

[58]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[59]  Adam N. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[60]  Clark Leavitt,et al.  The Persuasive Effect of Source Credibility: Tests of Cognitive Response , 1978 .

[61]  R. Lennox,et al.  Conventional wisdom on measurement: A structural equation perspective. , 1991 .

[62]  Paul Benjamin Lowry,et al.  Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites , 2007, J. Manag. Inf. Syst..

[63]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[64]  Sejung Marina Choi,et al.  Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .

[65]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[66]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[67]  John T. Cacioppo,et al.  The Elaboration Likelihood Model of Persuasion , 1986, Advances in Experimental Social Psychology.

[68]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[69]  D. Sandy Staples,et al.  A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organizations , 1999, J. Comput. Mediat. Commun..

[70]  Dan Jong Kim,et al.  Revisiting the role of web assurance seals in business-to-consumer electronic commerce , 2008, Decis. Support Syst..

[71]  Shuk Ying Ho,et al.  Web Personalization as a Persuasion Strategy: An Elaboration Likelihood Model Perspective , 2005, Inf. Syst. Res..

[72]  Richard D. Johnson,et al.  The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time , 2007, J. Assoc. Inf. Syst..

[73]  K. Giffin The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. , 1967, Psychological bulletin.

[74]  A. Greenwald 6 – Cognitive Learning, Cognitive Response to Persuasion, and Attitude Change1 , 1968 .

[75]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[76]  James B. Stiff Cognitive processing of persuasive message cues: A meta‐analytic review of the effects of supporting information on attitudes , 1986 .

[77]  Lee S. Strickland,et al.  Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..

[78]  H. Winklhofer,et al.  Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .

[79]  Izak Benbasat,et al.  Quo vadis TAM? , 2007, J. Assoc. Inf. Syst..

[80]  J. Cacioppo,et al.  Attitudes and Persuasion: Classic and Contemporary Approaches , 1981 .

[81]  Rajshekhar G. Javalgi,et al.  Awareness of Sponsorship and Corporate Image: An Empirical Investigation , 1994 .

[82]  John T. Cacioppo,et al.  Source and message factors in persuasion: A reply to stiff's critique of the elaboration likelihood model , 1987 .

[83]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[84]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[85]  Joseph P. Cannon,et al.  An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .

[86]  B. J. Fogg,et al.  What makes Web sites credible?: a report on a large quantitative study , 2001, CHI.

[87]  Kai H. Lim,et al.  Web strategies to promote internet shopping: is cultural-customization needed? , 2009 .

[88]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[89]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[90]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[91]  Mark A. Fuller,et al.  Designing Interfaces with Social Presence: Using Vividness and Extraversion to Create Social Recommendation Agents , 2009, J. Assoc. Inf. Syst..

[92]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[93]  C. Farn,et al.  Investigating Initial Trust Toward E-tailers from the Elaboration Likelihood Model Perspective , 2006 .