Consumer Acceptance of RFID Technology: An Exploratory Study

Radio frequency identification (RFID) technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigates the factors that affect consumer acceptance of RFID technology. The purpose of this effort is to develop and test a theoretical model that contextualizes the technology acceptance model (TAM) within the context of RFID technology. The research model proposes that convenience, culture, privacy, regulation, and security are the principal factors influencing the consumerspsila acceptance of RFID. However, the results show that convenience, culture, and security are significant predictors. This study is the first in the RFID literature to use the TAM for explaining consumer acceptance of RFID technology. The findings suggest that: (1) higher perceived convenience of RFID technology leads to greater acceptance of this technology; (2) societal beliefs, value systems, norms, and/or behaviors influence the extent of consumer acceptance of RFID technology; and (3) higher perceived importance of and less willingness to sacrifice personal information security lead to lower intention to use RFID technology. Contextualization of TAM to RFID technology makes this study relevant to practitioners because the results can provide insight to organizations using or exploring the use of RFID technology.

[1]  Annie I. Antón,et al.  Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.

[2]  David Hillier,et al.  Radio frequency identification in retailing and privacy and public policy issues , 2004 .

[3]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[4]  Elisa Bertino,et al.  Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.

[5]  Brian M. Jones,et al.  An Examination of the Technology Acceptance Model in Uruguay and the US: A Focus on Culture , 2005 .

[6]  David C. Wyld,et al.  Would you like chips with that?: consumer perspectives of RFID , 2004 .

[7]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[8]  Christian Hirt Radio Frequency Identification - RFID , 2004 .

[9]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[10]  Donna Weaver McCloskey,et al.  Evaluating Electronic Commerce Acceptance with the Technology Acceptance Model , 2004, J. Comput. Inf. Syst..

[11]  Victor R. Prybutok,et al.  A consumer perspective of E-service quality , 2005, IEEE Transactions on Engineering Management.

[12]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[13]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[14]  Alan Robert Peslak,et al.  An Ethical Exploration of Privacy and Radio Frequency Identification , 2005 .

[15]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[16]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[17]  John R. Nevin,et al.  The Differential Effects of Exercised and Unexercised Power Sources in a Marketing Channel , 1985 .

[18]  Pin Luarn,et al.  AIS Electronic Library (AISeL) , 2017 .

[19]  Albert H. Segars,et al.  Re-examining perceived ease of use and usefulness , 1993 .

[20]  Gilbert A. Churchill A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .

[21]  Alan D. Smith,et al.  Exploring radio frequency identification technology and its impact on business systems , 2005, Inf. Manag. Comput. Security.

[22]  Melinda Korzaan,et al.  Going with the Flow: Predicting Online Purchase Intentions , 2003, J. Comput. Inf. Syst..

[23]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[24]  Yi-Shun Wang,et al.  The adoption of electronic tax filing systems: an empirical study , 2003, Gov. Inf. Q..

[25]  Victor R. Prybutok,et al.  An empirical study of online shopping: a service perspective , 2004, Int. J. Serv. Technol. Manag..

[26]  Vallabh Sambamurthy,et al.  Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment , 2000, Inf. Syst. Res..

[27]  Detmar W. Straub,et al.  Testing the technology acceptance model across cultures: A three country study , 1997, Inf. Manag..

[28]  Anthony R. Hendrickson,et al.  Using Davis's Perceived Usefulness and Ease-of-use Instruments for Decision Making: A Confirmatory and Multigroup Invariance Analysis , 1998 .

[29]  C. Kluckhohn 2. VALUES AND VALUE-ORIENTATIONS IN THE THEORY OF ACTION: AN EXPLORATION IN DEFINITION AND CLASSIFICATION , 1951 .

[30]  A. Burns,et al.  The antecedents of preventive health care behavior: An empirical study , 1998 .

[31]  Andrew Whinston,et al.  Frontiers of Electronic Commerce , 1996 .

[32]  Peter A. Todd,et al.  Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..

[33]  Victor R. Prybutok,et al.  The Role of Impulsiveness in a TAM-Based Online Purchasing Behavior , 2006, Inf. Resour. Manag. J..

[34]  Roy Want,et al.  RFID. A key to automating everything. , 2004, Scientific American.

[35]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[36]  Lei-da Chen,et al.  Enticing online consumers: an extended technology acceptance perspective , 2002, Inf. Manag..

[37]  G. Hofstede,et al.  Culture′s Consequences: International Differences in Work-Related Values , 1980 .

[38]  Victor R. Prybutok,et al.  TAM: The Moderating Effect of Gender on Online Shopping , 2003 .

[39]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[40]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[41]  Wynne W. Chin,et al.  On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .

[42]  I. Ajzen The theory of planned behavior , 1991 .