{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T05:23:38Z","timestamp":1770960218878,"version":"3.50.1"},"reference-count":47,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2007,10,2]],"date-time":"2007-10-02T00:00:00Z","timestamp":1191283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10,2]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this research is to study the impact of reading a web site's privacy statement on the perceptions of control over privacy and trust in a cyber merchant.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Two experiments were designed to monitor the actual reading of the privacy statement. Study one compares the influence of actual reading with self\u2010reported claims. Study two manipulated the format of the privacy statement (opt\u2010in or opt\u2010out) and included a control condition to assess the influence of the presence of a privacy statement and the influence of the format on the dependent variables.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The findings show that the mere presence of a privacy statement has a positive influence on perceived control. However, reading the privacy statement does not necessarily have a positive influence on perceived control and trust, contrary to commonly held assumptions. Participants who read the opt\u2010in format felt significantly more control and trust than the participants who read the opt\u2010out format. The opt\u2010out format decreases perceived control compared with the group that did not read the privacy statement when it was available.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The sample size for both experiments was relatively modest, which limits the generalisability of the findings.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Cyber merchants should devote particular attention to the strategic role of the format of the privacy statement.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>In contrast to other studies that relied on surveys, this paper assesses the impact of the actual reading of the privacy statement via an experimental approach. Moreover, the impact of the format of the privacy statement has been empirically tested.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710832342","type":"journal-article","created":{"date-parts":[[2007,10,13]],"date-time":"2007-10-13T07:06:19Z","timestamp":1192259179000},"page":"661-681","source":"Crossref","is-referenced-by-count":60,"title":["The impact of reading a web site's privacy statement on perceived control over privacy and perceived trust"],"prefix":"10.1108","volume":"31","author":[{"given":"Manon","family":"Arcand","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Nantel","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Arles\u2010Dufour","sequence":"additional","affiliation":[]},{"given":"Anne","family":"Vincent","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020520443507000_b1","doi-asserted-by":"crossref","unstructured":"Ackerman, M.S., Cranor, L.F. and Reagle, J. (1999), \u201cPrivacy in e\u2010commerce: examining user scenarios and privacy preferences\u201d, Proceedings of the ACM Conference on Electronic Commerce EC'99.","DOI":"10.1145\/336992.336995"},{"key":"key2022020520443507000_b2","doi-asserted-by":"crossref","unstructured":"Bateson, J.E.G. and Hui, M.K. (1992), \u201cThe ecological validity of photographic slides and videotapes in simulating the service setting\u201d, Journal of Consumer Research, Vol. 19 No. 2, pp. 271\u201082.","DOI":"10.1086\/209301"},{"key":"key2022020520443507000_b3","doi-asserted-by":"crossref","unstructured":"Bigley, G.A. and Pearce, J.L. (1998), \u201cStraining for shared meaning in organization science: problems of trust and distrust\u201d, Academy of Management Review, Vol. 23 No. 3, pp. 405\u201021.","DOI":"10.5465\/amr.1998.926618"},{"key":"key2022020520443507000_b4","unstructured":"Boatright, J.R. (2000), Ethics and the Conduct of Business, 3rd. ed., Prentice Hall, Englewood Cliffs, NJ."},{"key":"key2022020520443507000_b5","unstructured":"Buchholz, R.A. and Rosenthal, S. (2002), \u201cinternet privacy: individual rights and the common good\u201d, S.A.M. Advances Management Journal, Vol. 67 No. 1, pp. 34\u201041."},{"key":"key2022020520443507000_b6","doi-asserted-by":"crossref","unstructured":"Brandeis, L. and Warren, S. (1890), \u201cThe right to privacy\u201d, Harvard Law Review, Vol. 4, p. 193.","DOI":"10.2307\/1321160"},{"key":"key2022020520443507000_b7","doi-asserted-by":"crossref","unstructured":"Carlson, D., Kacmar, K.M. and Williams, L.J. (2000), \u201cConstruction and initial validation of a multidimensional measure of work\u2010family conflict\u201d, Journal of Vocational Behaviour, Vol. 56 No. 2, pp. 249\u201076.","DOI":"10.1006\/jvbe.1999.1713"},{"key":"key2022020520443507000_b8","doi-asserted-by":"crossref","unstructured":"Caudill, E.M. and Murphy, P.E. (2000), \u201cConsumer online privacy: legal and ethical issues\u201d, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 7\u201019.","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"key2022020520443507000_b9","doi-asserted-by":"crossref","unstructured":"Cheung, C.M.K. and Lee, M.K.O. (2001), \u201cTrust in internet shopping: instrument development and validation through classical and modern approaches\u201d, Journal of Global Information Management, July\u2010September, pp. 23\u201035.","DOI":"10.4018\/jgim.2001070103"},{"key":"key2022020520443507000_b10","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. and Armstrong, P.K. (1999), \u201cInformation privacy concern, procedural fairness, and impersonal trust: an empirical investigation\u201d, Organization Science, Vol. 10 No. 1, pp. 103\u201015.","DOI":"10.1287\/orsc.10.1.104"},{"key":"key2022020520443507000_b11","unstructured":"DeMaio, T.J. (1984), \u201cSocial desirability and survey measurement: a review\u201d, in Turner, C.F. and Martin, E. (Eds), Surveying Subjective Phenomena,Vol. 2, Russell Sage Foundation, New York, NY, pp. 257\u201081."},{"key":"key2022020520443507000_b12","doi-asserted-by":"crossref","unstructured":"Deutskens, E., De Ruyter, K., Wetzels, M. and Oosterveld, P. (2004), \u201cResponse rate and response quality of internet\u2010based surveys: an experimental study\u201d, Marketing Letters, Vol. 15 No. 1, pp. 21\u201036.","DOI":"10.1023\/B:MARK.0000021968.86465.00"},{"key":"key2022020520443507000_b13","doi-asserted-by":"crossref","unstructured":"Doney, P.M. and Cannon, J.P. (1997), \u201cAn examination of the nature of trust in buyer\u2010seller relationships\u201d, Journal of Marketing, Vol. 61 No. 2, pp. 35\u201061.","DOI":"10.2307\/1251829"},{"key":"key2022020520443507000_b14","unstructured":"E\u2010Marketer (2006a), \u201cWeb sales growth remains strong as consumers spend more across a wider range of online product categories\u201d, Census Bureau of the US Department of Commerce. available at: www.emarketer.com\/article.aspx?1004126."},{"key":"key2022020520443507000_b15","unstructured":"E\u2010Marketer (2006b), \u201cUS retail e\u2010commerce (excluding travel) as a percent of total retail sales\u201d, 2000\u20102006, eMarketer Database, January, available at: www.emarketer.com\/chart.aspx?50944."},{"key":"key2022020520443507000_b16","unstructured":"E\u2010Marketer (2006c), \u201cOnline privacy and security: the fear factor\u201d, eMarketer Database, April, available at: www.emarketer.com\/Reports\/Viewer.aspx?privacy_retail_apr06&autodetect=Y."},{"key":"key2022020520443507000_b17","unstructured":"E\u2010Marketer (2003), \u201cAmount of time US adults spend reading website privacy policies\u201d, Harris Interactive\/Privacy Leadership Initiative, December 2001, eMarketerDatabase, available at: www.emarketer.com\/products\/chart.php?31594."},{"key":"key2022020520443507000_b18","unstructured":"E\u2010Marketer (2002), \u201cFrequency of reading online privacy policies among US consumers\u201d, EBrain Market Research\/Consumer Electronics Association, May, eMarketer Database, available at: www.emarketer.com\/products\/chart.php?26317."},{"key":"key2022020520443507000_b19","doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D.F. (1981), \u201cEvaluating structural equation models with unobservable variables and measurement error\u201d, Journal of Marketing Research, Vol. 18, pp. 39\u201050.","DOI":"10.1177\/002224378101800104"},{"key":"key2022020520443507000_b20","doi-asserted-by":"crossref","unstructured":"Frey, J.H. (1986), \u201cAn experiment with a confidentiality reminder in a telephone survey\u201d, Public Opinion Quarterly, Vol. 50, pp. 267\u20109.","DOI":"10.1086\/268980"},{"key":"key2022020520443507000_b21","unstructured":"FTC Report to Congress (2000), \u201cPrivacy online: fair information practices in the electronic marketplace\u201d, available at: www.ftc.gov\/reports\/privacy2000.pdf."},{"key":"key2022020520443507000_b22","doi-asserted-by":"crossref","unstructured":"Gefen, D. and Straub, D.W. (2004), \u201cConsumer trust in B2C e\u2010commerce and the importance of social presence: experiments in e\u2010products and e\u2010services\u201d, Omega: International Journal of Management Science, Vol. 32 No. 6, pp. 404\u201027.","DOI":"10.1016\/j.omega.2004.01.006"},{"key":"key2022020520443507000_b23","doi-asserted-by":"crossref","unstructured":"George, J.F. (2002), \u201cInfluence on the intent to make internet purchases\u201d, internet Research: Electronic Networking Applications and Policy, Vol. 12 No. 2, pp. 165\u201080.","DOI":"10.1108\/10662240210422521"},{"key":"key2022020520443507000_b24","doi-asserted-by":"crossref","unstructured":"George, J.F. (2004), \u201cThe theory of planned behaviour and internet purchasing\u201d, internet Research, Vol. 14 No. 3, pp. 198\u2010212.","DOI":"10.1108\/10662240410542634"},{"key":"key2022020520443507000_b25","unstructured":"Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998), Multivariate Data Analysis with Readings."},{"key":"key2022020520443507000_b26","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L., Novak, T.P. and Peralta, M. (1999), \u201cBuilding consumer trust online\u201d, Communications of the ACM, Vol. 42 No. 4, pp. 80\u20105.","DOI":"10.1145\/299157.299175"},{"key":"key2022020520443507000_b27","doi-asserted-by":"crossref","unstructured":"Hui, M.K. and Bateson, J.E.G. (1991), \u201cPerceived control and the effects of crowding and consumer choice on the service experience\u201d, Journal of Consumer Research, Vol. 18 No. 2, pp. 174\u201085.","DOI":"10.1086\/209250"},{"key":"key2022020520443507000_b28","doi-asserted-by":"crossref","unstructured":"Kaplowitz, M., Hadlock, T.D. and Levine, R. (2004), \u201cA comparison of web and mail survey response rates\u201d, Public Opinion Quarterly, Vol. 68, pp. 94\u2010101.","DOI":"10.1093\/poq\/nfh006"},{"key":"key2022020520443507000_b29","doi-asserted-by":"crossref","unstructured":"Lee, M.K.O. and Turban, E. (2001), \u201cA trust model for consumer internet shopping\u201d, International Journal of Electronic Commerce, Vol. 6 No. 1, pp. 75\u201091.","DOI":"10.1080\/10864415.2001.11044227"},{"key":"key2022020520443507000_b30","doi-asserted-by":"crossref","unstructured":"Liu, C., Marchewka, J.T., Lu, J. and Yu, C\u2010S. (2005), \u201cBeyond concern: a privacy\u2010trust\u2010behavioral intention model of electronic commerce\u201d, Information and Management, Vol. 42 No. 1, pp. 127\u201042.","DOI":"10.1016\/j.im.2004.01.002"},{"key":"key2022020520443507000_b31","doi-asserted-by":"crossref","unstructured":"Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), \u201cAn integrative model of organizational trust\u201d, Academy of Management Review, Vol. 20 No. 3, pp. 709\u201034.","DOI":"10.5465\/amr.1995.9508080335"},{"key":"key2022020520443507000_b32","doi-asserted-by":"crossref","unstructured":"McKnight, H.D., Cummings, L.L. and Chervany, N.L. (1998), \u201cInitial trust formation in new organizational relationships\u201d, Academy of Management Review, Vol. 23 No. 3, pp. 473\u201090.","DOI":"10.5465\/amr.1998.926622"},{"key":"key2022020520443507000_b33","doi-asserted-by":"crossref","unstructured":"McKnight, H.D., Choudhury, V. and Kacmar, C. (2002), \u201cDeveloping and validating trust measures for e\u2010commerce: an integrative typology\u201d, Information Systems Research, Vol. 13 No. 3, pp. 334\u201059.","DOI":"10.1287\/isre.13.3.334.81"},{"key":"key2022020520443507000_b34","doi-asserted-by":"crossref","unstructured":"Milne, G.R. and Boza, M\u2010E. (1999), \u201cTrust and concern in consumers' perceptions of marketing information management practices\u201d, Journal of Interactive Marketing, Vol. 13 No. 1, pp. 5\u201024.","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9"},{"key":"key2022020520443507000_b35","doi-asserted-by":"crossref","unstructured":"Milne, G.R. and Rohm, A.J. (2000), \u201cConsumer privacy and name removal across direct marketing channels: exploring opt\u2010in and opt\u2010out alternatives\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 2, pp. 238\u201049.","DOI":"10.1509\/jppm.19.2.238.17136"},{"key":"key2022020520443507000_b36","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.D. and Fernandez, A. (2000), \u201cinternet privacy and security: an examination of online retailer disclosure\u201d, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 54\u201062.","DOI":"10.1509\/jppm.19.1.54.16942"},{"key":"key2022020520443507000_b37","doi-asserted-by":"crossref","unstructured":"Moorman, C., Zaltman, G. and Deshpande, R. (1992), \u201cRelationships between providers and users of market research: the dynamics of trust within and between organizations\u201d, Journal of Market Research, Vol. 29, August, pp. 314\u201028.","DOI":"10.1177\/002224379202900303"},{"key":"key2022020520443507000_b38","doi-asserted-by":"crossref","unstructured":"Nakra, P. (2001), \u201cConsumer privacy rights: CPR and the age of the internet\u201d, Management Decision, Vol. 39 No. 4, pp. 272\u20109.","DOI":"10.1108\/EUM0000000005462"},{"key":"key2022020520443507000_b39","doi-asserted-by":"crossref","unstructured":"Pan, Y. and Zinkhan, G.M. (2006), \u201cExploring the impact of online privacy disclosures on consumer trust\u201d, Journal of Retailing, Vol. 82 No. 4, pp. 331\u20108.","DOI":"10.1016\/j.jretai.2006.08.006"},{"key":"key2022020520443507000_b40","doi-asserted-by":"crossref","unstructured":"Parker, L.E. and Price, R.H. (1994), \u201cEmpowered managers and empowered workers: the effects of managerial support and managerial perceived control on workers' sense of control over decision making\u201d, Human Relations, Vol. 47 No. 8, pp. 911\u201028.","DOI":"10.1177\/001872679404700803"},{"key":"key2022020520443507000_b41","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A. (2003), \u201cConsumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model\u201d, International Journal of Electronic Commerce, Vol. 7 No. 3, pp. 101\u201034.","DOI":"10.1080\/10864415.2003.11044275"},{"key":"key2022020520443507000_b42","doi-asserted-by":"crossref","unstructured":"Pennington, R., Wilcox, H. and Grover, V. (2003), \u201cThe role of system trust in business\u2010to\u2010consumer transactions\u201d, Journal of Management Information Systems, Vol. 20 No. 3, pp. 197\u2010226.","DOI":"10.1080\/07421222.2003.11045777"},{"key":"key2022020520443507000_b43","doi-asserted-by":"crossref","unstructured":"Schwarz, N. (1999), \u201cSelf\u2010reports: how the questions shape the answers\u201d, American Psychologist, Vol. 54 No. 2, pp. 93\u2010105.","DOI":"10.1037\/0003-066X.54.2.93"},{"key":"key2022020520443507000_b44","unstructured":"Shoeman, F. (1984), Philosophical Dimensions of Privacy, Cambridge University Press, Cambridge."},{"key":"key2022020520443507000_b45","doi-asserted-by":"crossref","unstructured":"Singer, E., Hippler, H.\u2010J. and Schwarz, N. (1992), \u201cConfidentiality assurances in surveys: reassurance or threat?\u201d, International Journal of Public Opinion Research, Vol. 4, pp. 256\u201068.","DOI":"10.1093\/ijpor\/4.3.256"},{"key":"key2022020520443507000_b46","doi-asserted-by":"crossref","unstructured":"Singer, E., Von Thurn, D.R. and Miller, E.R. (1995), \u201cConfidentiality assurances and response: a quantitative review of the experimental literature\u201d, Public Opinion Quarterly, Vol. 59 No. 1, pp. 66\u201077.","DOI":"10.1086\/269458"},{"key":"key2022020520443507000_b47","unstructured":"Westin, A. (1996), Harris\u2010Equifax Consumer Privacy Survey, Equifax Inc., Atlanta, GA."}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710832342","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710832342\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710832342\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:52Z","timestamp":1753404052000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/5\/661-681\/314605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,10,2]]}},"alternative-id":["10.1108\/14684520710832342"],"URL":"https:\/\/doi.org\/10.1108\/14684520710832342","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2007,10,2]]}}}