An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns

U-commerce represents “anytime, anywhere” commerce. U-commerce can provide a high level of personalization, which can bring significant benefits to customers. However, customers’ privacy is a major concern and obstacle to the adoption of u-commerce. As customers’ intention to adopt u-commerce is based on the aggregate effect of perceived benefits and risk exposure (e.g., privacy concerns), this research examines how personalization and context can impact on customers’ perceived benefits and privacy concerns, and how this aggregated effect in turn affects u-commerce adoption intention.

[1]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[2]  Keng Siau,et al.  Mobile Commerce: Promises, Challenges and Research Agenda , 2001, J. Database Manag..

[3]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[4]  Jiang Wu,et al.  4th-generation Wireless Infrastructures: Scenarios and Research Challenges , 2001, IEEE Wirel. Commun..

[5]  Richard T. Watson,et al.  The U-Constructs: Four Information Drives , 2006, Commun. Assoc. Inf. Syst..

[6]  Holtjona Galanxhi-Janaqi,et al.  Privacy Issues in the Era of Ubiquitous Commerce , 2006, Electron. Mark..

[7]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[8]  Ray Bert,et al.  Book Review: \IThe World Is Flat: A Brief History of the Twenty-First Century\N by Thomas L. Friedman. New York: Farrar, Straus and Giroux, 2005 , 2006 .

[9]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[10]  Alok Gupta,et al.  GIST: A Model for Design and Management of Content and Interactivity of Customer-Centric Web Sites , 2004, MIS Q..

[11]  Bernard J. Jaworski,et al.  E-Commerce , 2021, Strategic International Restaurant Development.

[12]  R. Belk Situational Variables and Consumer Behavior , 1975 .

[13]  Andrew E. Fano,et al.  The future of business services in the age of ubiquitous computing , 2002, CACM.

[14]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[15]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[16]  Keng Siau,et al.  Values of Silent Commerce: A Study Using Value-Focused Thinking Approach , 2005, AMCIS.

[17]  George Roussos,et al.  Mobile Identity Management: An Enacted View , 2003, Int. J. Electron. Commer..

[18]  Stefan Figge,et al.  Situation-dependent services—a challenge for mobile network operators , 2004 .

[19]  Kris Ven,et al.  The Impact of Ideology on the Organizational Adoption of Open Source Software , 2008, J. Database Manag..

[20]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[21]  Lei-da Chen,et al.  Nomadic Culture: Cultural Support for Working Anytime, Anywhere , 2005, Inf. Syst. Manag..

[22]  Maxime Flament,et al.  A 4 th-Generation Wireless Infrastructures : Scenarios and Research Challenges , .

[23]  Martti Mäntylä,et al.  Assessing Legal Challenges on the Mobile Internet , 2003, Int. J. Electron. Commer..

[24]  G. Keppel,et al.  Design and Analysis: A Researcher's Handbook , 1976 .

[25]  Laurie J. Kirsch,et al.  The Impact of Data Integration on the Costs and Benefits of Information Systems , 1992, MIS Q..

[26]  Steve Sawyer,et al.  Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing , 2004, Commun. Assoc. Inf. Syst..

[27]  R. Watson,et al.  U-commerce: Expanding the universe of marketing , 2002 .

[28]  Alan R. Dennis,et al.  Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis , 2001, MIS Q..

[29]  John Vergo,et al.  A user-centered design approach to personalization , 2000, CACM.

[30]  Dongsong Zhang,et al.  Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology , 2003, Commun. Assoc. Inf. Syst..

[31]  Rahul C. Basole THE VALUE AND IMPACT OF MOBILE INFORMATION AND COMMUNICATION TECHNOLOGIES , 2004 .

[32]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[33]  Holtjona Galanxhi-Janaqi,et al.  U-commerce: emerging trends and research issues , 2004, Ind. Manag. Data Syst..

[34]  Thomas A. Horan,et al.  Devising a Web-Based Ontology for Emerging Wireless Systems: The Case of Emergency Management Systems , 2003, AMCIS.

[35]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[36]  Adam LeBrocq Style Guide for the Journal of the Association for Information Systems , 2022 .

[37]  Tamara Dinev,et al.  Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..

[38]  R. Bharat Rao,et al.  Evolution of mobile location-based services , 2003, CACM.

[39]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[40]  R. Keeney,et al.  The Value of Internet Commerce to the Customer , 1999 .

[41]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[42]  George M. Giaglis,et al.  A case study in pervasive retail , 2002, WMC '02.

[43]  M. Weiser,et al.  Hot topics-ubiquitous computing , 1993 .

[44]  Jeong Hee Hwang,et al.  Context-based preference analysis method in ubiquitous commerce , 2005, International Workshop on Ubiquitous Data Management.

[45]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[46]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[47]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[48]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[49]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[50]  Sumit Sarkar,et al.  The Role of the Management Sciences in Research on Personalization , 2003, Manag. Sci..

[51]  Amit Sharma,et al.  Communicating Price Information through Semantic Cues: The Moderating Effects of Situation and Discount Size , 1996 .

[52]  Hock-Hai Teo,et al.  Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.

[53]  Daniel Robey,et al.  Human agency in a wireless world: Patterns of technology use in nomadic computing environments , 2005, Inf. Organ..

[54]  Brian Detlor,et al.  Intelligent mobile crisis response systems , 2005, CACM.

[55]  Mark S. Ackerman,et al.  Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.

[56]  Gediminas Adomavicius,et al.  Personalization technologies: A process-oriented perspective , 2006, Wirtschaftsinf..

[57]  Priscilla M. Regan,et al.  Emergency Response Systems and the Creeping Legibility of People and Places , 2004, Inf. Soc..

[58]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[59]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[60]  Yves Pigneur,et al.  A Comparative Analysis of Published Scenarios for M-Business , 2004 .

[61]  Kalle Lyytinen,et al.  Research Commentary: The Next Wave of Nomadic Computing , 2002, Inf. Syst. Res..

[62]  Michael D. Reilly,et al.  Effects of Unexpected Situations on Behavior-Intention Differences: A Garbology Analysis , 1985 .

[63]  R. Belk An Exploratory Assessment of Situational Effects in Buyer Behavior , 1974 .

[64]  Norbert A. Streitz,et al.  Building disappearing computers , 2005, CACM.

[65]  Rafael Accorsi,et al.  Personalization in privacy-aware highly dynamic systems , 2006, CACM.

[66]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[67]  David Garlan,et al.  Context is key , 2005, CACM.

[68]  Marshall Scott Poole,et al.  What Is Personalization? Perspectives on the Design and Implementation of Personalization in Information Systems , 2006, J. Organ. Comput. Electron. Commer..

[69]  Xueming Luo Trust production and privacy concerns on the Internet , 2002 .

[70]  Matti Rossi,et al.  The Impact of Use Situation and Mobility on the Acceptance of Mobile Ticketing Services , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[71]  Richard T. Watson,et al.  U-commerce: the ultimate , 2000, UBIQ.

[72]  Izak Benbasat,et al.  Empirical Research in Information Systems: The Practice of Relevance , 1999, MIS Q..

[73]  Hangjung Zo,et al.  Personalization vs. Customization: Which Is More Effective in E-Services? , 2003, AMCIS.

[74]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[75]  Per Capita,et al.  About the authors , 1995, Machine Vision and Applications.

[76]  Gregory D. Abowd,et al.  Prototypes and paratypes: designing mobile and ubiquitous computing applications , 2005, IEEE Pervasive Computing.

[77]  Donald R. Cooper,et al.  Business Research Methods , 1980 .

[78]  Ann M. Trousdale Who's afraid of the big, bad wolf? , 1989 .

[79]  Timothy H. Greer,et al.  Web Personalization: The Impact of Perceived Innovation Characteristics on the Intention to Use Personalization , 2003, J. Comput. Inf. Syst..

[80]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[81]  Bill Anckar,et al.  VALUE CREATION IN MOBILE COMMERCE: FINDINGS FROM A CONSUMER SURVEY , 2002 .

[82]  Barton A. Weitz,et al.  Self-Disclosure on the Web: the Impact of Privacy Policy, Reward, and Company Reputation , 2002 .

[83]  Richard T. Watson,et al.  U-Commerce: A Conceptual Extension of E-Commerce and M-Commerce , 2003, ICIS.

[84]  Gerald Quirchmayr,et al.  Through-Walls Communication for Medical Emergency Services , 2003, Int. J. Hum. Comput. Interact..

[85]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[86]  Marshall Scott Poole,et al.  Perspectives on Personalization , 2003, AMCIS.

[87]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[88]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[89]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[90]  A. Sunmade The World is Flat: A Brief History of the Twenty-First Century , 2008 .

[91]  Pertti Huuskonen,et al.  Context Awareness Perspectives for Mobile Personal Media , 2005, Inf. Syst. Manag..

[92]  L. Mosley,et al.  The World Is Flat: A Brief History of the Twenty-First Century , 2005 .

[93]  Munir Mandviwalla,et al.  Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..

[94]  Michael Shaw,et al.  Managing Coordination in Emergency Response Systems with Information Technologies , 2004, AMCIS.

[95]  Doug Riecken,et al.  Introduction: personalized views of personalization , 2000, CACM.

[96]  Marc L. Resnick,et al.  Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features in an Online Web Store , 2003, Int. J. Hum. Comput. Interact..

[97]  Robert C. Nickerson,et al.  Wireless Telecommunications Issues: Cell Phone TV, Wireless Networks in Disaster Management, Ubiquitous Computing, and Adoption of Future Wireless Applications , 2007, Commun. Assoc. Inf. Syst..

[98]  R. Teas,et al.  The effects of extrinsic product cues on consumers’ perceptions of quality, sacrifice, and value , 2000 .