{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:08:46Z","timestamp":1754158126356,"version":"3.41.2"},"reference-count":29,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2009,8,7]],"date-time":"2009-08-07T00:00:00Z","timestamp":1249603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8,7]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to examine the credibility of internet shopping. Credibility, which refers to the believability of information, is an important consideration of internet shopping.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The evaluation is conducted by incorporating Fogg's 10 Stanford Guidelines for Web Credibility into Nielsen's heuristic evaluation. Furthermore, security and individualisation are considered as additional heuristics. Evaluation criteria are developed based on these 12 heuristics. Three UK car insurance web sites are selected for evaluation, including the AA, Norwich Union and Tesco.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results show that the Norwich Union site seems to be the most credible while the Tesco site appears to be the least credible. The most significant credibility problems are found to lie in the areas of \u201ctrustworthiness\u201d, \u201cexpertise\u201d and \u201creal\u2010world feel\u201d. In other words, these three areas are key issues for future improvement of these sites.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper contributes to the literature by providing a set of credibility design guidelines, which can be used to support the improved development of future internet shopping designs, especially car insurance web sites.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520910985738","type":"journal-article","created":{"date-parts":[[2009,10,5]],"date-time":"2009-10-05T10:28:39Z","timestamp":1254738519000},"page":"805-826","source":"Crossref","is-referenced-by-count":10,"title":["Evaluation of the credibility of internet shopping in the UK"],"prefix":"10.1108","volume":"33","author":[{"given":"Natalie","family":"Clewley","sequence":"first","affiliation":[]},{"given":"Sherry Y.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012120482306200_b1","doi-asserted-by":"crossref","unstructured":"Beier, B. and Vaughan, M.W. (2003), \u201cThe bull's\u2010eye: a framework for web application user interface design guidelines\u201d, Proceedings of CHI2003, pp. 489\u2010496.","DOI":"10.1145\/642611.642697"},{"key":"key2022012120482306200_b2","doi-asserted-by":"crossref","unstructured":"Belanger, F., Hiller, J.S. and Smith, W.J. (2002), \u201cTrustworthiness in electronic commerce: the role of privacy, security and site attributes\u201d, Journal of Strategic Information Systems, Vol. 11 No. 1, pp. 245\u201070.","DOI":"10.1016\/S0963-8687(02)00018-5"},{"key":"key2022012120482306200_b3","doi-asserted-by":"crossref","unstructured":"Chen, S.Y. and Macredie, R.D. (2005), \u201cThe assessment of usability of electronic shopping: a heuristic evaluation\u201d, International Journal of Information Management, Vol. 25 No. 6, pp. 516\u201032.","DOI":"10.1016\/j.ijinfomgt.2005.08.008"},{"key":"key2022012120482306200_b4","doi-asserted-by":"crossref","unstructured":"Cheung, C.M.K. and Lee, M.K.O. (2006), \u201cUnderstanding consumer trust in internet shopping: a multidisciplinary approach\u201d, Journal of the American Society for Information Science and Technology, Vol. 57 No. 4, pp. 479\u201092.","DOI":"10.1002\/asi.20312"},{"key":"key2022012120482306200_b5","unstructured":"Consumer WebWatch (2002), Consumer WebWatch Guidelines, (online), Consumers Union, available at: www.consumerwebwatch.org\/consumer\u2010reports\u2010webwatch\u2010guidelines.cfm (accessed 20 August 2007)."},{"key":"key2022012120482306200_b6","doi-asserted-by":"crossref","unstructured":"Dong, X. (2003), \u201cSearching information and evaluation of internet: Chinese academic library users\u201d, International Information & Library Review, Vol. 35 No. 2, pp. 63\u2010187.","DOI":"10.1080\/10572317.2003.10762599"},{"key":"key2022012120482306200_b7","doi-asserted-by":"crossref","unstructured":"Egger, F.N. (2000), \u201cTrust me, I'm an online vendor: towards a model of trust for e\u2010commerce system design\u201d, CHI '00 Extended Abstracts on Human Factors in Computing Systems, ACM, New York, NY, pp. 101\u20102.","DOI":"10.1145\/633292.633352"},{"key":"key2022012120482306200_b8","doi-asserted-by":"crossref","unstructured":"Flanagin, A.J. and Metzger, M.J. (2003), \u201cThe perceived credibility of web site information as influenced by the sex of the source\u201d, Computers in Human Behavior, Vol. 19 No. 1, pp. 683\u2010701.","DOI":"10.1016\/S0747-5632(03)00021-9"},{"key":"key2022012120482306200_b9","doi-asserted-by":"crossref","unstructured":"Flanagin, A.J. and Metzger, M.J. (2007), \u201cThe role of site features, user attributes, and information verification behaviors on the perceived credibility of web\u2010based information\u201d, New Media Society, Vol. 9 No. 2, pp. 319\u201042.","DOI":"10.1177\/1461444807075015"},{"key":"key2022012120482306200_b10","unstructured":"Fogg, B.J. (2002), Stanford Guidelines for Web Credibility, A Research Summary from the Stanford Persuasive Technology Lab, Stanford University, Stanford, CA, available at: www.webcredibility.org\/guidelines."},{"key":"key2022012120482306200_b11","doi-asserted-by":"crossref","unstructured":"Fogg, B.J. (2003), \u201cProminence\u2010interpretation theory: explaining how people assess credibility online\u201d, CHI '03 Extended Abstracts on Human Factors in Computing Systems, ACM, New York, NY, pp. 722\u20103.","DOI":"10.1145\/765891.765951"},{"key":"key2022012120482306200_b12","doi-asserted-by":"crossref","unstructured":"Fogg, B.J. and Tseng, H. (1999), \u201cThe elements of computer credibility\u201d, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: the CHI Is the Limit, Pittsburgh, PA, 15\u201020 May, pp. 80\u201087.","DOI":"10.1145\/302979.303001"},{"key":"key2022012120482306200_b16","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J. and Tauber, E.R. (2003), \u201cHow do users evaluate the credibility of web sites?, A study with over 2,500 participants\u201d, Proceedings of the 2003 Conference on Designing For User Experiences, San Francisco, CA, 6\u20107 June, pp. 1\u201015.","DOI":"10.1145\/997078.997097"},{"key":"key2022012120482306200_b13","unstructured":"Fogg, B.J., Kameda, T., Boyd, J., Marshall, J., Sethi, R., Sockol, M. and Trowbridge, T. (2002), \u201cStanford\u2010Makovsky web credibility study 2002: investigating what makes web sites credible today\u201d, A Research Report by the Stanford Persuasive Technology Lab & Makovsky & Company, Stanford University, Stanford, CA, available at: www.webcredibility.org."},{"key":"key2022012120482306200_b14","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Marshall, J., Kameda, T., Solomon, J., Rangnekar, A., Boyd, J. and Brown, B. (2001), \u201cWeb credibility research: a method for online experiments and early study results\u201d, in CHI '00 Extended Abstracts on Human Factors in Computing Systems, The Hague, The Netherlands, 1\u20106 April, pp. 295\u2010296.","DOI":"10.1145\/634067.634242"},{"key":"key2022012120482306200_b15","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Marshall, J., Osipovich, A., Varma, C., Laraki, O., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P. and Treinen, M. (2000), \u201cElements that affect web credibility: early results from a self\u2010report study\u201d, CHI 2000, pp. 287\u2010288.","DOI":"10.1145\/633292.633460"},{"key":"key2022012120482306200_b17","doi-asserted-by":"crossref","unstructured":"Huang, Z., Chung, W. and Chen, H. (2003), \u201cA graph model for e\u2010commerce recommender systems\u201d, Journal of the American Society for Information Science and Technology, Vol. 55 No. 3, pp. 259\u201074.","DOI":"10.1002\/asi.10372"},{"key":"key2022012120482306200_b18","doi-asserted-by":"crossref","unstructured":"Liu, C. and Arnett, P.K. (2000), \u201cExploring the factors associated with web site success in the context of electronic commerce\u201d, Information and Management, Vol. 38 No. 1, pp. 23\u201033.","DOI":"10.1016\/S0378-7206(00)00049-5"},{"key":"key2022012120482306200_b19","doi-asserted-by":"crossref","unstructured":"McKnight, H. and Macmar, C. (2006), \u201cFactors of information credibility for an internet advice site\u201d, Proceedings of the 39th Hawaii International Conference on System Sciences, Vol. 6 pp. 113\u2010114.","DOI":"10.1109\/HICSS.2006.181"},{"key":"key2022012120482306200_b20","unstructured":"Metzger, M.J. (2005) in Weingarten, R. and Eisenberg, M. (Eds), \u201cUnderstanding how internet users make sense of credibility: a review of the state of our knowledge and recommendations for theory, policy, and practice\u201d, Proceedings of the Internet Credibility and the User Symposium, Seattle, WA, available at: www.ischool.washington.edu\/credibility\/Metzger%20Skills.pdf."},{"key":"key2022012120482306200_b21","doi-asserted-by":"crossref","unstructured":"Metzger, M.J., Flanagin, A.J. and Zwarun, L. (2003), \u201cCollege student web use, perceptions of information credibility, and verification behavior\u201d, Computers & Education, Vol. 41 No. 3, pp. 271\u201090.","DOI":"10.1016\/S0360-1315(03)00049-6"},{"key":"key2022012120482306200_b22","doi-asserted-by":"crossref","unstructured":"Nathan, R.J., Yeow, P.H.P. and Murugesan, S. (2008), \u201cKey usability factors of service\u2010oriented web sites for students: an empirical study\u201d, Online Information Review, Vol. 32 No. 3, pp. 302\u201024.","DOI":"10.1108\/14684520810889646"},{"key":"key2022012120482306200_b23","doi-asserted-by":"crossref","unstructured":"Nielsen, J. (1994), \u201cEnhancing the explanatory power of usability heuristics\u201d, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Celebrating interdependence, Boston, MA, 24\u201028 April, pp. 152\u2010158.","DOI":"10.1145\/191666.191729"},{"key":"key2022012120482306200_b24","doi-asserted-by":"crossref","unstructured":"Nielsen, J. and Molich, R. (1990), \u201cHeuristic evaluation of user interfaces\u201d, Proceedings of the ACM CHI'90 Conference, Seattle, WA, 1\u20105 April, pp. 249\u2010256.","DOI":"10.1145\/97243.97281"},{"key":"key2022012120482306200_b25","doi-asserted-by":"crossref","unstructured":"Robins, D. and Holmes, J. (2007), \u201cAesthetics and credibility in web site design\u201d, Information Processing and Management, Vol. 44 No. 1, pp. 386\u201099.","DOI":"10.1016\/j.ipm.2007.02.003"},{"key":"key2022012120482306200_b26","unstructured":"Schneider, G.P. and Perry, J.T. (2000), Electronic Commerce, Course Technology, Cambridge, MA."},{"key":"key2022012120482306200_b27","unstructured":"Self, C.S. (1996), \u201cCredibility\u201d, in Salwen, M.M. and Stacks, D. (Eds), An Integrated Approach To Communication Theory And Research, Lawrence Erlbaum, Mahwah, NJ."},{"key":"key2022012120482306200_b28","doi-asserted-by":"crossref","unstructured":"Sillence, E., Briggs, P., Fishwick, L. and Harris, P. (2004), \u201cTrust and mistrust of online health sites\u201d, Proceedings of CHI' 2004, pp. 663\u2010670.","DOI":"10.1145\/985692.985776"},{"key":"key2022012120482306200_b29","doi-asserted-by":"crossref","unstructured":"Walther, J.B., Wang, Z. and Loh, T. (2004), \u201cThe effect of top\u2010level domains and advertisements on health web site credibility\u201d, Journal of Medical Internet Research, Vol. 6 No. 3, pp. 24\u201032.","DOI":"10.2196\/jmir.6.3.e24"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520910985738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520910985738\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520910985738\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:41:19Z","timestamp":1753404079000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/33\/4\/805-826\/314670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,7]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,8,7]]}},"alternative-id":["10.1108\/14684520910985738"],"URL":"https:\/\/doi.org\/10.1108\/14684520910985738","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2009,8,7]]}}}