RFID, privacy and the perception of risk: A strategic framework

Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively early phase of the risk development, strategic options with which RFID suppliers and users can positively influence the public acceptance of the technology. We propose a strategic framework based on research findings on risk perception and technology acceptance as well as a set of options for coping with the public perception of RFID-related privacy risks.

[1]  Mark Cenite Code and Other Laws of Cyberspace , 2000 .

[2]  Ortwin Renn Strategies of risk communication: Observations from two participatory experiments , 1991 .

[3]  S. Shapiro The Social Control of Impersonal Trust , 1987, American Journal of Sociology.

[4]  Ray Kurzweil,et al.  Kurzweil vs. Dertouzos , 2001 .

[5]  Roger E. Kasperson,et al.  Communicating Risks to the Public , 1991 .

[6]  J. H. Davis,et al.  An integrative model of organizational trust, Academy of Management Review, : . , 1995 .

[7]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[8]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[9]  The Social Amplification of Risk: Searching for the public policy relevance of the risk amplification framework , 2003 .

[10]  Ari Juels,et al.  RFID PRIVACY : A TECHNICAL PRIMER FOR THE NON-TECHNICAL READER , 2005 .

[11]  Ian Byfield,et al.  Developments in RFID , 1996 .

[12]  Rodger Jamieson,et al.  Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model , 2003, ECIS.

[13]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[14]  Raktim Pal,et al.  Auto-ID: managing anything, anywhere, anytime in the supply chain , 2005, CACM.

[15]  Mare Langheinrich,et al.  Personal privacy in ubiquitous computing: Tools and system support , 2005 .

[16]  V. Venkatesh,et al.  AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .

[17]  Matthew W. Seeger,et al.  Public relations and crisis communication: Organizing and chaos , 2001 .

[18]  C. Slade Privacy and regulation , 1997 .

[19]  Paul Slovic,et al.  Risk, Media, and Stigma at Rocky Flats , 1998 .

[20]  Viswanath Venkatesh,et al.  Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation , 1999, MIS Q..

[21]  Daniel J. Solove,et al.  Information Privacy Law , 2003 .

[22]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[23]  June Lu,et al.  Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology , 2005, J. Strateg. Inf. Syst..

[24]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[25]  Ritu Agarwal,et al.  Are Individual Differences Germane to the Acceptance of New Information Technologies , 1999 .

[26]  Ortwin Renn,et al.  Credibility and trust in risk communication , 1991 .

[27]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[28]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[29]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .

[30]  R. Harding Environmental decision-making : the roles of scientists, engineers, and the public , 1998 .

[31]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[32]  David Gefen,et al.  The conceptualization of trust, risk and their electronic commerce: the need for clarifications , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[33]  E. Elliott Risk and Culture: An Essay on the Selection of Technical and Environmental Dangers , 1983 .

[34]  Katherine Albrecht,et al.  Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .

[35]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[36]  R. Spinello Privacy Rights in the Information Economy , 1998 .

[37]  Graham Murdock,et al.  The Social Amplification of Risk: After amplification: rethinking the role of the media in risk communication , 2003 .

[38]  R. Lewicki,et al.  Trust in relationships: A model of development and decline. , 1995 .

[39]  W. Atkinson Tagged: the risks and rewards of RFID technology , 2004 .

[40]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[41]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[42]  Peter P. Swire Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .

[43]  Sandra J. Milberg,et al.  Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe , 2001 .

[44]  P. Pavlou INTEGRATING TRUST IN ELECTRONIC COMMERCE WITH THE TECHNOLOGY ACCEPTANCE MODEL: MODEL DEVELOPMENT AND VALIDATION , 2001 .

[45]  Ritu Agarwal,et al.  A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..

[46]  VenkateshViswanath Determinants of Perceived Ease of Use , 2000 .

[47]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[48]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[49]  Katherine J. Strandburg,et al.  Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .

[50]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[51]  P. A. Dabholkar Consumer evaluations of new technology-based self-service options: An investigation of alternative models of service quality , 1996 .

[52]  P. Lesly Public relations handbook. , 1981, Journal of the American Medical Record Association.

[53]  Nadia Caidi,et al.  How much is too little? Privacy and smart cards in Hong Kong and Ontario , 2005, J. Inf. Sci..

[54]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[55]  Arthur Jones,et al.  Trust and Crime in Information Societies , 2006 .

[56]  Marc Langheinrich,et al.  Personal Privacy in Ubiquitous Computing , 2005 .

[57]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[58]  B. Fischhoff,et al.  How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .

[59]  R. Kasperson The social amplification of risk: progress in developing an integrative framework of risk’, in S. , 1992 .

[60]  S. Krimsky,et al.  Social Theories of Risk , 1992 .

[61]  Paul Slovic,et al.  Perception of risk: Reflections on the psychometric paradigm , 1992 .

[62]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[63]  George Roussos,et al.  Building Consumer Trust in Pervasive Retail , 2004 .

[64]  Theo Vurdubakis,et al.  Chasing Shadows: Control, Virtuality and the Production of Trust , 2001 .

[65]  P Slovic,et al.  Perceived Risk, Trust, and the Politics of Nuclear Waste , 1991, Science.

[66]  K. E. Jones BSE, risk and the communication of uncertainty: a review of Lord Phillips' report from the BSE inquiry (UK). , 2001, Canadian journal of sociology = Cahiers canadiens de sociologie.

[67]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[68]  Baruch Fischhoff,et al.  Facts and Fears: Societal Perception of Risk , 1981 .

[69]  Norman L. Chervany,et al.  Conceptualizing trust: a typology and e-commerce customer relationships model , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[70]  R. Kasperson,et al.  The Social Amplification of Risk , 2003 .

[71]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[72]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[73]  Richard,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace , 2022 .

[74]  Ing-Long Wu,et al.  An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study , 2005, Int. J. Hum. Comput. Stud..

[75]  George Gaskell,et al.  Perceptions of risk in cyber space , 2004 .

[76]  Roy Want,et al.  The Magic of RFID , 2004, ACM Queue.

[77]  TractinskyNoam,et al.  Consumer trust in an Internet store , 2000 .

[78]  Mojca Drevenšek Negotiation as the Driving Force of Environmental Citizenship , 2005 .

[79]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[80]  Günter Karjoth,et al.  Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.

[81]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[82]  Young-Gul Kim,et al.  Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..