You are here: Home Contents V4 N1 V4N1_Jensen.html
Personal tools

Mitigating Consumer Perceptions of Privacy and Security Risks with the Use of Residual RFID Technologies through Governmental Trust

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 4, Number 1 (2008)
Pages 4165
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Andrew S. Jensen — University of North Carolina at Charlotte, USA
Joseph A. Cazier — Appalachian State University, USA
Dinesh S. Dave — Appalachian State University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

Many organizations are adopting radio frequency identification (RFID) technologies. These technologies can provide many benefits to the organizations that use them. However, many of these RFID tags remain active after the consumers purchase them. We call these RFID tags, placed in a product for one purpose and left in the product after it has served that purpose, Residual RFIDs. Residual RFID technology can have many positive and negative affects on consumers, business, and society. In this study, we outline some of the likely advantages and disadvantages of Residual RFID from the consumer perspective, then follow up with an in-depth survey of consumer perceptions. In the survey, we attempt to ascertain how consumers will react to the pending implementation of Residual RFID technologies on a mass scale. Specifically, we explore how consumers’ perceptions of trust, privacy risk likelihood and privacy risk harm impact their intentions to use the technology, particularly as it pertains to the perceived role of government in the regulation of RFID and the protection of consumer privacy.

 

 

Keywords

Government, Privacy, Privacy Risk, Security Risk, RFID, Residual RFID, Technology Adoption

 

 

References

Abramson, L. (2004), “Radio Frequency IDs”, National Public Radio (NPR), Morning Edition, 26 March 2004. <http://www.npr.org/templates/story/story.php?storyId=1792847>

Attaran, M. (2006), “RFID pays off .” Industrial Engineer, 38 (9): 46.

Battacherjee, A. (2002), “Individual Trust in Online Firms: Scale Development and Initial Test”, Journal of Management Information Systems, 19 (1): 213-243.

Cazier, J. A. (2006), Value Congruence and Trust Online: Their Impact on Privacy and Price Premiums, Cambria Press, Youngstown, New York.

Cazier, J. A. (2007), “Projecting Values Online: An E-Tailing Goldmine?”, International Journal of Electronic Marketing and Retailing, 1 (3): 217-235.

Cazier, J. A., Shao, B. B. M. and St. Louis, R. D. (2006), “E-business differentiation through value-based trust”, Information and Management, 43: 718-727.

Cazier, J. A., Wilson, E. and Medlin, B. D. (2007), “The Role of Privacy Risk in IT Acceptance: An Empirical Study” forthcoming in International Journal of Information Security and Privacy.

Conca, C., Medlin, D. and Dave, D. (2005), “Technology-based security threats: taxonomy of sources, targets and a process model of alleviation,” International Journal Information Technology Management, 4 (2) 166-177.

Dinev, T. and Hart, P. (2006), “An Extended Privacy Calculus Model for E-Commerce Transactions”, Information Systems Research, 17 (1) 61-80. 

Eckfeldt, B. (2005), “What Does RFID do for the Consumer?”, Communications of the ACM, 48 (9): 77-79.

Featherman, M. S., Valacich, J. S. and Wells, J. D. (2006), “Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters”, Information Systems Journal, 16: 107-134.

Garfinkel, R., Gopal, R. and Goes, P. (2002), “Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat”, Management Science, 48 (6): 749-764.

Hoffman, D.L., Novak, T.P. and Peralta, M. (1999), “Building consumer trust online”, Communications of the ACM, 42 (4): 80-86.

IBM (2006), ‘IBM Survey: Consumers Think Cybercrime Now Three Times More Likely Than Physical Crime: Changing Nature of Crime Leads to Significant Behavior-Changes’,  IBM.com, 27 January 2006.

Juels, A. (2005), “RFID Security and Privacy: A Research Survey”, RSA Laboratories, 1-19.

Mayer, R. C., Davis, J. H, and Schoorman, F. D. (1995), “An integrative model of organizational trust,” Academy of Management Review, 30 (3): 709-734.

McKnight, D.H., Choudhury, V. and Kacmar, C. (2002), “Developing and Validating Trust Measures for e-Commerce: An Integrative Typology,” Information Systems Research, 13 (3): 334–359.

Milne, G. R. and Culnan, M. J. (2004), “Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices”, Journal of Interactive Marketing, 18 (3): 15-29.

Raab, C. D., and Bennett, C. J. (1998), “The Distribution of Privacy Risks: Who Needs Protection?” The Information Society, 14: 263-274.

Spiekermann, S. and Ziekow, H. (2005), “RFID: A 7-Point Plan to Ensure Privacy”, Thirteenth European Conference on Information Systems, Regensburg, Germany, May 26-28.

Straub, D. W. and Welke, R. J. (1998), “Coping with systems risk: Security planning models for management decision making,” MIS Quarterly, 22 (4): 441-469.

Sweat, J. (2000), “Privacy Paradox: Constomers Want Control – and Coupons,” Informationweek, April 2000, 781: 52.  

Wyld, D. C. (2006), “RFID 101: the next big thing for management,”  Management Research News, 29 (4): 154.