Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers
Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
41 Pages Posted: 24 Oct 2011 Last revised: 30 Jun 2013
Date Written: October 23, 2011
Abstract
Privacy concerns can greatly hinder consumers’ intentions to interact with a website. The success of a website therefore depends on its ability to improve consumers’ perceptions of privacy assurance. Seals and assurance statements are mechanisms often used to increase this assurance; however, the findings of the extant literature regarding the effectiveness of these tools are mixed. We propose a model based on the elaboration likelihood model (ELM) that explains conditions under which privacy assurance is more or less effective, clarifying the contradictory findings in previous literature. We test our model in a free-simulation online experiment, and the results of the analysis indicate that the inclusion of assurance statements and the combination, understanding, and assurance of seals influence privacy assurance. Privacy assurance is most effective when seals and statements are accompanied by the peripheral cues of website quality and brand image and when counter-argumentation - through transaction risk - is minimized. Importantly, we show ELM to be an appropriate theoretical lens to explain the equivocal results in the literature. Finally, we suggest theoretical and practical implications.
Keywords: Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk
Suggested Citation: Suggested Citation
0 References
0 Citations
Do you have a job opening that you would like to promote on SSRN?
Recommended Papers
-
By Clay Posey, Paul Benjamin Lowry, ...
-
By Paul Benjamin Lowry, Anthony Vance, ...
-
By Paul Benjamin Lowry, Dongsong Zhang, ...
-
Location-Sharing Technologies: Privacy Risks and Controls
By Janice Tsai, Patrick Gage Kelley, ...
-
By Paul Benjamin Lowry, David Wilson, ...
-
Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use
By Paul Benjamin Lowry, Kamel Rouibah, ...
-
By Paul Benjamin Lowry, Jeffrey L. Jenkins, ...
-
By Mark J. Keith, Jeffry Babb, ...
-
By Paul Benjamin Lowry, Noelle Teh, ...
-
Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior
By Mark J. Keith, Samuel Thompson, ...