A nomological model of RFID privacy concern

Purpose – Radio frequency identification (RFID) can bring a lot of benefits to supply chain management. However, privacy issues caused by RFID surface constantly and can impede widespread implementation of RFID. The purpose of this paper is to propose a theoretical model to explicate the construct of concern for information privacy (CFIP).Design/methodology/approach – The authors review and synthesize the extant and pertinent literature on RFID and privacy issues. Starting with previous theorization of CFIP, its four constituent dimensions are examined – collection, unauthorized secondary use, improper access, and errors – within the context of RFID‐related privacy issues.Findings – The authors situate CFIP within a nomological model, which advances that: awareness of the RFID technology itself, awareness of information security risks entailed by RFID use, and awareness of privacy protective measures are direct antecedent to CFIP; and CFIP directly influences a person's trust in the RFID technology.Social...

[1]  Fred H. Cate,et al.  Privacy in the Information Age , 1997 .

[2]  Akemi Takeoka Chatfield,et al.  A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments , 2009, Eur. J. Inf. Syst..

[3]  Christine Perakslis,et al.  Social acceptance of RFID as a biometric security method , 2006, IEEE Technology and Society Magazine.

[4]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[5]  Jens Strüker,et al.  RFID adoption and the role of organisational size , 2010, Bus. Process. Manag. J..

[6]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[7]  Stefan Seuring,et al.  From a literature review to a conceptual framework for sustainable supply chain management , 2008 .

[8]  Sonja Grabner-Kräuter,et al.  Consumer acceptance of internet banking: the influence of internet trust , 2008 .

[9]  Pauline Ratnasingam The impact of collaborative commerce and trust in Web services , 2004, J. Enterp. Inf. Manag..

[10]  Yuzhu Li,et al.  Interorganisational trust in B2B commerce , 2009, Int. J. Netw. Virtual Organisations.

[11]  P. Ring,et al.  Developmental Processes of Cooperative Interorganizational Relationships , 1994 .

[12]  Susan K. Lippert,et al.  Human resource information systems (HRIS) and technology trust , 2005, J. Inf. Sci..

[13]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[14]  G. Scott Erickson,et al.  International Aspects of Radio Frequency Identification Tags: Different Approaches to Bridging the Technology/Privacy Divide , 2007 .

[15]  Sung-Hee Jang Effect of Purchase Intention of Location-Based Services: Focused on Privacy-Trust-Behavioral Intention Model , 2014 .

[16]  Rafael Accorsi,et al.  Personalization in privacy-aware highly dynamic systems , 2006, CACM.

[17]  Frédéric Thiesse,et al.  RFID, privacy and the perception of risk: A strategic framework , 2007, J. Strateg. Inf. Syst..

[18]  Selwyn Piramuthu,et al.  Challenges associated with RFID tag implementations in supply chains , 2009, Eur. J. Inf. Syst..

[19]  Jack R. Meredith,et al.  Theory Building through Conceptual Methods , 1993 .

[20]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[21]  Regina Connolly,et al.  Empirical Research on Technology-Related Privacy Concerns: A Review and Critical Assessment , 2008, ECIS.

[22]  R. Bunduchi,et al.  The costs of adoption of RFID technologies in supply networks , 2010 .

[23]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[24]  Irvine Clarke,et al.  RFID and Consumer Privacy , 2008 .

[25]  Kenneth W. Goodman,et al.  Chips, tags and scanners: Ethical challenges for radio frequency identification , 2007, Ethics and Information Technology.

[26]  Pauline Ratnasingam The importance of technology trust in Web services security , 2002, Inf. Manag. Comput. Secur..

[27]  Seung-Jun Yeon,et al.  RFID based ubiquitous commerce and consumer trust , 2007, Ind. Manag. Data Syst..

[28]  Victor R. Prybutok,et al.  Consumer Acceptance of RFID Technology: An Exploratory Study , 2008, IEEE Transactions on Engineering Management.

[29]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[30]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[31]  Dag Slettemeås,et al.  RFID—the “Next Step” in Consumer–Product Relations or Orwellian Nightmare? Challenges for Research and Policy , 2009 .

[32]  Ganesh Vaidyanathan,et al.  Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges , 2008, J. Theor. Appl. Electron. Commer. Res..

[33]  John P. T. Mo,et al.  RFID implementation with virtual infrastructures , 2010, Bus. Process. Manag. J..

[34]  Pawel Rotter,et al.  RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.

[35]  Mohan V. Tatikonda,et al.  Radio Frequency Identification and the Ethics of Privacy , 2007 .

[36]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[37]  Frank Thornton,et al.  RFID Security , 2005 .

[38]  D. C. Twist,et al.  The impact of radio frequency identification on supply chain facilities , 2005 .

[39]  Susan K. Lippert,et al.  A supply chain study of technology trust and antecedents to technology internalization consequences , 2006 .

[40]  W. Ryan,et al.  Privacy and freedom: Alan F. Westin Atheneum Publishers, $10 , 1967 .

[41]  P. Ratnasingam E‐Commerce relationships: The impact of trust on relationship continuity , 2005 .

[42]  T. Graeff,et al.  Collecting and using personal data: consumers’ awareness and concerns , 2002 .

[43]  David M. Wasieleski,et al.  An enquiry into the ethical efficacy of the use of radio frequency identification technology , 2008, Ethics and Information Technology.

[44]  Tony Yu-Ju Tu,et al.  Reducing False Reads in RFID-Embedded Supply Chains , 2008, J. Theor. Appl. Electron. Commer. Res..

[45]  Susan K. Lippert Investigating Postadoption Utilization: An Examination Into the Role of Interorganizational and Technology Trust , 2007, IEEE Transactions on Engineering Management.

[46]  Scott P. Muir RFID security concerns , 2007, Libr. Hi Tech.

[47]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[48]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[49]  A. Zaheer,et al.  Does Trust Matter? Exploring the Effectsof Interorganizational and Interpersonaltrust on Performance , 1998 .

[50]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[51]  Dennis Brown RFID Implementation , 2006 .

[52]  Jonathan D. Linton,et al.  The challenge of cyber supply chain security to research and practice – An introduction , 2014 .

[53]  Simson L. Garfinkel,et al.  RFID: Applications, Security, and Privacy , 2005 .

[54]  Selwyn Piramuthu,et al.  RFID and Information Security in Supply Chains , 2008, 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks.

[55]  Jack R. Meredith,et al.  A Longitudinal Study of the Role of Manufacturing Technology in Business Strategy , 1993 .

[56]  Rebecca Angeles,et al.  Rfid Technologies: Supply-Chain Applications and Implementation Issues , 2004, Inf. Syst. Manag..

[57]  Nabil Y. Razzouk,et al.  Consumer Concerns regarding Rfid Privacy: An Empirical Study , 2008 .

[58]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[59]  Joseph Barjis,et al.  Organizational and business impacts of RFID technology , 2010, Bus. Process. Manag. J..

[60]  Fataneh Taghaboni-Dutta,et al.  RFID Technology Is Revolutionary: Who Should Be Involved in this Game of Tag? , 2006 .

[61]  David C. Wyld,et al.  Would you like chips with that?: consumer perspectives of RFID , 2004 .

[62]  Joseph A. Cazier,et al.  The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies , 2008, Commun. Assoc. Inf. Syst..

[63]  Katerina Pramatari,et al.  Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits , 2009, Eur. J. Inf. Syst..

[64]  Katina Michael,et al.  Privacy-value-control harmonization for RFID adoption in retail , 2009, IBM J. Res. Dev..

[65]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.

[66]  R. Lamming,et al.  Supply management: is it a discipline? , 2006 .

[67]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.