RFID in retail: a framework for examining consumers' ethical perceptions

Radio Frequency Identification's (RFID) possible negative impact on consumers has rendered much attention, regardless of its cost-efficiency benefits. The intention of this proposed framework is to incite awareness of privacy and ethics concerns for the use of RFID in retail. It draws from a variety of theories in different disciplines attempting to construct a comprehensive research model. Detailed introductions on theories regarding trust, privacy, self-regulation, social exchange, planned behaviour, deterrence and information assurance are provided to explain their causal effects on people's ethical perceptions of the use of RFID. Managerial implications are discussed in the hope of shedding light on practical issues in industry.

[1]  Sugata Sanyal,et al.  Information Assurance and Security , 2005, J. Univers. Comput. Sci..

[2]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[3]  R. Kramer,et al.  Trust in Organizations: Frontiers of Theory and Research , 1995 .

[4]  Peter Jones,et al.  The benefits, challenges and impacts of radio frequency identification technology (RFID) for retailers in the UK , 2005 .

[5]  C. Colwill,et al.  Information Assurance , 2001 .

[6]  Gregory J. Pottie,et al.  Privacy in the global e-village , 2004, CACM.

[7]  Alan Robert Peslak,et al.  An Ethical Exploration of Privacy and Radio Frequency Identification , 2005 .

[8]  David Wyld,et al.  RFID 101: The Next Big Thing for Management , 2006, IEEE Engineering Management Review.

[9]  K. Vohs,et al.  Self-regulation and the extended now: controlling the self alters the subjective experience of time. , 2003, Journal of personality and social psychology.

[10]  Lori N. K. Leonard,et al.  Attitude toward ethical behavior in computer use: a shifting model , 2005, Ind. Manag. Data Syst..

[11]  Dan M. Kahan,et al.  The Secret Ambition of Deterrence , 1999, Deterrence.

[12]  Ken Reich FDA is taking baby steps toward an RFID mandate , 2006 .

[13]  H. Markus,et al.  Culture and the self: Implications for cognition, emotion, and motivation. , 1991 .

[14]  David B. Montgomery,et al.  Deterrence, reputations and competitive cognition , 1993 .

[15]  D. V. Poel,et al.  Consumer Acceptance of the Internet as a Channel of Distribution , 1999 .

[16]  Peter M. Gollwitzer,et al.  From weighing to willing: Approaching a change decision through pre- or postdecisional mentation , 1990 .

[17]  Robert J. Kauffman,et al.  Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID , 2007, Inf. Technol. Manag..

[18]  Ryan E Rhodes,et al.  Ethnicity and the theory of planned behavior in the exercise domain. , 2003, American journal of health behavior.

[19]  R. Mason Four ethical issues of the information age , 1986 .

[20]  J. R. Williams,et al.  A practical approach to measuring assurance , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[21]  Michael D. McDonald,et al.  Putting Severity of Punishment Back in the Deterrence Package , 2001 .

[22]  Alex R. Piquero,et al.  An Application of Stafford and Warr's Reconceptualization of Deterrence to Drinking and Driving , 1998 .

[23]  Richard T. DeGeorge,et al.  The Ethics of Information Technology and Business , 2002 .

[24]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[25]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[26]  David C. Wyld,et al.  Would you like chips with that?: consumer perspectives of RFID , 2004 .

[27]  Motoki Watabe,et al.  Uncertainty, Trust, and Commitment Formation in the United States and Japan1 , 1998, American Journal of Sociology.

[28]  Cathleen A. Berrick AVIATION SECURITY: EFFORTS TO MEASURE EFFECTIVENESS AND STRENGTHEN SECURITY PROGRAMS , 2003 .

[29]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[30]  J. H. Davis,et al.  An integrative model of organizational trust, Academy of Management Review, : . , 1995 .

[31]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[32]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[33]  Christer Carlsson,et al.  Adoption of 3G+ services in Finland , 2006, Int. J. Mob. Commun..

[34]  Suvojit Choton Basu,et al.  Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis , 2005 .

[35]  R. E. Miles,et al.  Causes of Failure in Network Organizations , 1992 .

[36]  Charles R. Tittle,et al.  Gender and Perceived Chances of Arrest , 1981 .

[37]  Colin Camerer,et al.  Not So Different After All: A Cross-Discipline View Of Trust , 1998 .

[38]  Binshan Lin,et al.  RFID tags: privacy and security aspects , 2005, Int. J. Mob. Commun..

[39]  I. Ajzen The theory of planned behavior , 1991 .

[40]  Jürgen Beckmann,et al.  Dissonance and Action Control , 1985 .

[41]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[42]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[43]  Nancy Cantor,et al.  Personal construal of life tasks: Those who struggle for independence , 1990 .

[44]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[45]  Allen M. Weiss,et al.  Vendor Consideration and Switching Behavior for Buyers in High-Technology Markets , 1995 .

[46]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[47]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[48]  Meg McGinity RFID: is this game of tag fair play? , 2004 .

[49]  Sally S. Simpson,et al.  Corporate Crime, Law, and Social Control , 2002 .

[50]  Shelley E. Taylor,et al.  Social cognition, 2nd ed. , 1991 .

[51]  Bernd Carsten Stahl,et al.  Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? , 2004, J. Organ. End User Comput..

[52]  Giles D'Souza,et al.  Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .

[53]  Dennis Longley,et al.  Data & Computer Security: Dictionary of Standards Concepts and Terms , 1987 .

[54]  Timothy Paul Cronan,et al.  Have you met your organization's computer usage policy? , 2005, Ind. Manag. Data Syst..

[55]  SpiekermannSarah,et al.  RFID and the perception of control , 2005 .

[56]  A. Bandura,et al.  Self-regulatory mechanisms governing the impact of social comparison on complex decision making. , 1991 .