Understanding Consumers' Attitudes Toward Controversial Information Technologies: A Contextualization Approach

Controversial information technologies, such as biometrics and radio frequency identification, are perceived as having the potential to both benefit and undermine the well-being of the user. Given the type and/or amount of information these technologies have the capability to capture, there have been some concerns among users and potential users. However, prominent technology adoption models tend to focus on only the positive utilities associated with technology use. This research leverages net valence theories, which incorporate both positive and negative utilities, and context of use literature to propose a general framework that can be used for understanding consumer acceptance of controversial information technologies. The framework also highlights the importance of incorporating contextual factors that reflect the nuances of the controversial technologies and their specific context of use. We apply the framework to consumer acceptance of biometric identity authentication for banking transactions thro...

[1]  Detmar W. Straub,et al.  Validating Instruments in MIS Research , 1989, MIS Q..

[2]  Gurpreet Dhillon,et al.  A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..

[3]  S. Schwartz Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries , 1992 .

[4]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[5]  Gregory N. Connolly,et al.  Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers , 2014, J. Am. Medical Informatics Assoc..

[6]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[7]  Richard Baskerville,et al.  Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..

[8]  G. Johns The Essential Impact of Context on Organizational Behavior , 2006 .

[9]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Viswanath Venkatesh,et al.  Model of Adoption and Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle , 2005, MIS Q..

[11]  Milena M. Head,et al.  Computer use by older adults: A multi-disciplinary review , 2010, Comput. Hum. Behav..

[12]  Erik Rolland,et al.  Knowledge-sharing in virtual communities: familiarity, anonymity and self-determination theory , 2012, Behav. Inf. Technol..

[13]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[14]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[15]  J. R. Landis,et al.  The measurement of observer agreement for categorical data. , 1977, Biometrics.

[16]  M. Hui,et al.  The Ecological Validity of Photographic Slides and Videotapes in Simulating the Service Setting , 1992 .

[17]  Shumaila Y. Yousafzai,et al.  A proposed model of e-trust for electronic banking , 2003 .

[18]  Irina Sakharova Payment card fraud: Challenges and solutions , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[19]  E. Straub Understanding Technology Adoption: Theory and Future Directions for Informal Learning , 2009 .

[20]  M. Herie,et al.  Knowledge diffusion in social work: a new approach to bridging the gap. , 2002, Social work.

[21]  C. Morosan Customers' Adoption of Biometric Systems in Restaurants: An Extension of the Technology Acceptance Model , 2011 .

[22]  Ann Majchrzak,et al.  A Longitudinal Study of Adjustment to Technological Change: From Mass To Computer-Automated Batch Production , 1988 .

[23]  J. P. Peter,et al.  A Comparative Analysis of Three Consumer Decision Strategies , 1975 .

[24]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[25]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[26]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[27]  Milena M. Head,et al.  Manipulating perceived social presence through the web interface and its impact on attitude towards online shopping , 2007, Int. J. Hum. Comput. Stud..

[28]  C. Morosan Theoretical and Empirical Considerations of Guests’ Perceptions of Biometric Systems in Hotels , 2012 .

[29]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[30]  L. Bredahl Determinants of Consumer Attitudes and Purchase Intentions With Regard to Genetically Modified Food – Results of a Cross-National Survey , 2001 .

[31]  Annie I. Antón,et al.  Towards understanding user perceptions of authentication technologies , 2007, WPES '07.

[32]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[33]  Paul Norman,et al.  Predicting adherence to eye patching in children with amblyopia: an application of protection motivation theory. , 2003, British journal of health psychology.

[34]  Tiago Oliveira,et al.  Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context , 2013, Decis. Support Syst..

[35]  Richard Clodfelter Biometric technology in retailing: Will consumers accept fingerprint authentication? , 2010 .

[36]  Y. Fried,et al.  Location, location, location: contextualizing organizational research* , 2001 .

[37]  S. Fournier,et al.  Paradoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies , 1998 .

[38]  John Ennis,et al.  Swapping PINs for palms – the potential of biometric technology in retail banking , 2012 .

[39]  Vincenzo Esposito Vinzi,et al.  PLS Path Modeling: From Foundations to Recent Developments and Open Issues for Model Assessment and Improvement , 2010 .

[40]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[41]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[42]  Michel Tenenhaus,et al.  PLS path modeling , 2005, Comput. Stat. Data Anal..

[43]  Louis M. Gomez,et al.  Learning to Use a Text Editor: Some Learner Characteristics that Predict Success , 1987, SGCH.

[44]  Eduardo Torres,et al.  The influence of corporate image on consumer trust: A comparative analysis in traditional versus internet banking , 2005, Internet Res..

[45]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[46]  Geoffrey S. Hubona,et al.  Cultural Impacts on Acceptance and Adoption of Information Technology in a Developing Country , 2010, J. Glob. Inf. Manag..

[47]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[48]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[49]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[50]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[51]  Mohammad Alamgir Hossain Exploring the Perceived Measures of Privacy: RFID in Public Applications , 2014, Australas. J. Inf. Syst..

[52]  Sookeun Byun,et al.  Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters , 2013, Behav. Inf. Technol..

[53]  Reza Barkhi,et al.  Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model , 2006, J. Organ. End User Comput..

[54]  D. Whetten An Examination of the Interface between Context and Theory Applied to the Study of Chinese Organizations , 2009, Management and Organization Review.

[55]  Rosalie L. Tung,et al.  Share of wallet in retail banking : a comparison of Caucasians in Canada and Australia vis-à-vis Chinese in China and overseas Chinese , 2012 .

[56]  Cristian Morosan,et al.  Understanding the Antecedents of Perceived Value of Registered Traveler Biometric Systems , 2012 .

[57]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[58]  Vinay Kanetkar,et al.  Toward a measure of service convenience: multiple‐item scale development and empirical test , 2008 .

[59]  Gordon C. Bruner,et al.  Toward a unified theory of consumer acceptance technology , 2007 .

[60]  Manon Arcand,et al.  The impact of reading a web site's privacy statement on perceived control over privacy and perceived trust , 2007, Online Inf. Rev..

[61]  Wynne W. Chin How to Write Up and Report PLS Analyses , 2010 .

[62]  Yogesh Kumar Dwivedi,et al.  What improves citizens' privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach , 2014, Int. J. Inf. Manag..

[63]  Cristian Morosan,et al.  Voluntary Steps toward Air Travel Security , 2012 .

[64]  R. Oliver A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions , 1980 .

[65]  Jiang Wu,et al.  4th-generation Wireless Infrastructures: Scenarios and Research Challenges , 2001, IEEE Wirel. Commun..

[66]  J. Lassen,et al.  Societal aspects of genetically modified foods. , 2004, Food and chemical toxicology : an international journal published for the British Industrial Biological Research Association.