JSSM  Vol.6 No.2 , June 2013
Effects of RFID in Retailing on Customer Trust
Author(s) Hsiaoping Yeh
ABSTRACT

Radio frequency identification (RFID) has become an increasingly widespread technology. However, there has been limited research on it with regard to customer-related issues. This paper proposes a theoretical model to investigate customer perceptions of privacy risk and trust for the retail stores with all RFID tagged items. The results suggest that customers with high sensitivity to privacy risk have a lower degree of trust in RFID applications. However, benefits to customers are incentives for retailers to both mitigate customer worries about their privacy being invaded and increase their trust in retailers. One way to do this is by implementing strong data security systems. This research thus presents a set of guidelines to help retailers successfully apply this technology in their stores.


Cite this paper
H. Yeh, "Effects of RFID in Retailing on Customer Trust," Journal of Service Science and Management, Vol. 6 No. 2, 2013, pp. 143-150. doi: 10.4236/jssm.2013.62014.
References
[1]   T. S. H. Toe, S. C. Srivastava, C. Ranganathan and J. W. K. Loo, “A Framework for Stakeholder Oriented Mindfulness: Case of RFID Implementation at YCH Group, Singapore,” European Journal of Information Systems, Vol. 20, No. 2, 2011, pp. 201-220. doi:10.1057/ejis.2010.58

[2]   S. Liu, “IT Professional in 2011,” IT Professional, Vol. 13, No. 1, 2011, pp. 4-5.

[3]   O. Günther and S. Spiekermann, “RFID and the Perception of Control: The Consumer’s View,” Communications of the ACM, Vol. 48, No. 9, 2005, pp. 73-76. doi:10.1145/1081992.1082023

[4]   A. R. Peslak, “An Ethical Exploration of Privacy and Radio Frequency Identification,” Journal of Business Ethics, Vol. 59, No. 4, 2005, pp. 327-345. doi:10.1007/s10551-005-2928-8

[5]   S. Sackmann, J. Struker and R. Accorsi, “Personalization in Privacy-Aware Highly Dynamic Systems,” Communications of the ACM, Vol. 49, No. 9, 2006, pp. 32-38. doi:10.1145/1151030.1151052

[6]   M. Rothensee and S. Spiekermann, “Between Extreme Rejection and Cautious Acceptance: Consumers’ Reactions to RFID-Based IS in Retail,” Social Science Computer Review, Vol. 26, No. 1, 2008, pp. 75-86. doi:10.1177/0894439307307687

[7]   F. Thiesse, “RFID, Privacy and the Perception of Risk: A Strategic Framework,” Journal of Strategic Information Systems, Vol. 16, No. 2, 2007, pp. 214-232. doi:10.1016/j.jsis.2007.05.006

[8]   R. C. Mayer, J. H. Davis and F. D. Schoorman, “An Integrative Model of Organizational Trust,” Academy of Management Review, Vol. 20, No. 3, 1995, pp. 709-734.

[9]   Global Retail RFID Market 2011-2015 Report, “Research and Markets Adds Report: Global Retail RFID Market 2011-2015,” Wireless News, 15 May 2012.

[10]   H. Galanxhi-Janaqi and F. F.-H. Nah, “U-Commerce: Emerging Trends and Research Issues,” Industrial Management & Data Systems, Vol. 104, No. 9, 2004, pp. 744-755. doi:10.1108/02635570410567739

[11]   R. Angeles, “An Empirical Study of the Anticipated Consumer Response to RFID Product Item Tagging,” Indus trial Management & Data Systems, Vol. 107, No. 4, 2007, pp. 461-483. doi:10.1108/02635570710740643

[12]   M. Ohkubo, K. Suzuki and S. Kinoshita, “RFID Privacy Issues and Technical Challenges,” Communications of the ACM, Vol. 48, No. 9, 2005, pp. 66-71. doi:10.1145/1081992.1082022

[13]   E. R. Foxman and P. Kilcoyne, “Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issue,” Journal of Public & Marketing, Vol. 12, No. 1, 1993, pp. 106-119.

[14]   C. Flavián and M. Guinalíu, “Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site,” Industrial Management & Data Systems, Vol. 106, No. 5, 2006, pp. 601-620. doi:10.1108/02635570610666403

[15]   R. Bennett and S. Savani, “Retailers’ Preparedness for the Introduction of Third Wave (Ubiquitous) Computing Applications: A Survey of UK Companies,” International Journal of Retail & Distribution Management, Vol. 39, No. 5, 2011, pp. 306-325. doi:10.1108/02635570610666403

[16]   M. S. Featherman, A. D. Miyazaki and D. E. Sprott, “Reducing Online Privacy Risk to Facilitate E-Service Adoption: The Influence of Perceived Ease of Use and Corporate Credibility,” The Journal of Services Marketing, Vol. 24, No. 3, 2010, pp. 219-229. doi:10.1108/08876041011040622

[17]   M. Maury and D. Kleiner, “E-Commerce: Ethical Commerce,” Journal of Business Ethics, Vol. 36, No. 1-2, 2002, pp. 21-31. doi:10.1023/A:1014274301815

[18]   P. A. Pavlou, “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model,” International Journal of Electronic Commerce, Vol. 7, No. 3, 2003, pp. 101-134.

[19]   S. Sen and C.B. Bhattacharya, “Does Doing Good Al ways Lead to Doing Better? Consumer Reactions to Corporate Social Responsibility,” Journal of Marketing Research, Vol. 38, No. 2, 2001, 225-243. doi:10.1509/jmkr.38.2.225.18838

[20]   T. J. Brown and P. A. Dacin, “The Company and the Product: Corporate Associations and Consumer Product Responses,” Journal of Marketing, Vol. 61, No. 1, 1997, pp. 68-84. doi:10.2307/1252190

[21]   J. T. Resnick, “Corporate Reputation: Managing Corporate Reputation-Applying Rigorous Measures to a Key Asset,” The Journal of Business Strategy, Vol. 25, No. 6, 2004, pp. 30-38. doi:10.1108/02756660410569175

[22]   L. Mui, M. Mohtashemi and A. Halberstadt, “A Computational Model of Trust and Reputation,” Proceedings of the 35th Hawaii International Conference on System Sciences, Big Island, 7-10 January 2002, pp. 2431-2439. doi:10.1109/HICSS.2002.994181

[23]   D. B. Turban and D. M. Cable, “Firm Reputation and Application Pool Characteristics,” Journal of Organizational Behavior, Vol. 24 No. 6, 2003, pp. 733-751. doi:10.1002/job.215

[24]   E. Aivaloglou and S. Gritzalis, “Hybrid Trust and Reputation Management for Sensor Networks,” Wireless Net work, Vol. 16, No. 5, 2010, pp. 1493-1510. doi:10.1007/s11276-009-0216-8

[25]   R. Cohen and R. Kerr, “TREET: The Trust and Reputation Experimentation and Evaluation Tested,” Electronic Commerce Research, Vol. 10, No. 3-4, 2010, pp. 271-290. doi:10.1007/s10660-010-9056-y

[26]   F. G. Mármol and G. M. Pérez, “Trust and Reputation Models Comparison,” Internet Research, Vol. 21, No. 2, 2011, pp. 138-153. doi:10.1108/10662241111123739

[27]   Z. Noorian and M. Ulieru, “The State of the Art in Trust and Reputation Systems: A Framework for Comparison,” Journal of Theoretical and Applied Electronic Commerce Research, Vol. 5, No. 2, 2010, pp. 97-117. doi:10.4067/S0718-18762010000200007

[28]   F. Fukuyama, “Social Capital and Global Economy,” Foreign Affairs, Vol. 74, No. 5, 1995, pp. 89-103. doi:10.2307/20047302

[29]   D. L. Hoffman, T. Novak and M. A. Peralta, “Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web,” Information Society, Vol. 15, No. 2, 1999, pp. 129-139. doi:10.1080/019722499128583

[30]   L. T. Hosmer, “Trust: The Connection Link between Organizational Theory and Philosophical Ethics,” The Academy of Management Review, Vol. 20, No. 2, 1995, pp. 337-362.

[31]   M. I. Eid, “Determinants of E-Commerce Customer Satisfaction, Trust, and Loyalty in Saudi Arabia,” Journal of Electronic Commerce Research, Vol. 12, No. 1, 2011, pp. 78-93.

[32]   M. Koller, “Risk as a Determinant of Trust,” Basic and Applied Social Psychology, Vol. 9, No. 4, 1988, pp. 265-276. doi:10.1207/s15324834basp0904_2

[33]   J. Zheng, E. Bakker and L. Knight, “A Strategic Case for E-Adoption in Healthcare Supply Chains,” International Journal of Information Management, Vol. 26, No. 4, 2006, pp. 290-301. doi:10.1016/j.ijinfomgt.2006.03.010

[34]   M. A. Islam, M. A. Khan, T. Ramayah and M. M. Hossain, “The Adoption of Mobile Commerce Service among Employed Mobile Phone Users in Bangladesh: Self-Efficacy as a Moderator,” International Business Research, Vol. 4, No. 2, 2011, pp. 80-89. doi:10.5539/ibr.v4n2p80

[35]   R. Larzelere and T. Huston, “The Dyadic Trust Scale: Toward Understanding Interpersonal Trust in Close Relationships,” Journal of Marriage and the Family, Vol. 42, No. 3, 1980, pp. 595-604. doi:10.2307/351903

[36]   J. Cook and T. Wall, “New Work Attitude Measures of Trust, Organizational Commitment, and Personal Need Nonfulfillment,” Journal of Occupational Psychology, Vol. 53, No. 1, 1980, pp. 39-52. doi:10.1111/j.2044-8325.1980.tb00005.x

[37]   A. P. Jones, L. R. James and J. R. Bruni, “Perceived Leadership Behavior and Employee Confidence in the Leader as Moderated by Job Involvement,” Journal of Applied Psychology, Vol. 60, No. 1, 1975, pp. 146-149. doi:10.1037/h0076359

[38]   R. Gulati, “Does Familiarity Breed Trust? The Implications of Repeated Ties for Contractual Choice in Alliances,” Academy of Management Journal, Vol. 38, No. 1, 1995, pp. 85-112. doi:10.2307/256729

[39]   M. J. Culnan, “Consumer Awareness of Name Removal Procedures: Implications for Direct Marketing,” Journal of Direct Marketing, Vol. 9, No. 2, 1995, pp. 10-19. doi:10.1002/dir.4000090204

[40]   M. J. Culnan and P. K. Armstrong, “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation,” Organization Science, Vol. 10, No. 1, 1999, pp. 104-115. doi:10.1287/orsc.10.1.104

[41]   S. M. Lee, S.-H. Park, S. N. Yoon and S.-J. Yeon, “RFID Based Ubiquitous Consumer Trust,” Industrial Management & Data Systems, Vol. 107, No. 5, 2007, pp. 605-617. doi:10.1108/02635570710750381

[42]   K.-P. Wiedmann, N. Hennigs, D. Varelmann and M.-O. Reeh, “Determinants of Consumers’ Perceived Trust in IT-Ecosystems,” Journal of Theoretical and Applied Electronic Commerce Research, Vol. 5, No. 2, 2010, pp. 137-154. doi:10.4067/S0718-18762010000200009

[43]   L. V. Casaló, C. Flavián and M. Guinaliíu, “The Role of Security, Privacy, Usability and Reputation in the Development of Online Banking,” Online Information Review, Vol. 31, No. 5, 2007, pp. 583-603. doi:10.1108/14684520710832315

[44]   M. V. Nepomuceno, M. Laroche, R. Marie-Odile and A. Eggert, “Relationship between Intangibility and Perceived Risk: Moderating Effect of Privacy, System Security and General Security Concerns,” The Journal of Consumer Marketing, Vol. 29, No. 3, 2012, pp. 176-189. doi:10.1108/07363761211221701

[45]   M. Eurich, N. Oertel and R. Boutellier, “The Impact of Perceived Privacy Risks on Organizations’ Willingness to Share Item-level Event Data across the Supply Chain,” Electronic Commerce Research, Vol. 10, No. 3-4, 2010, pp. 423-440. doi:10.1007/s10660-010-9062-0

[46]   M. Taleghani, A. S. Sharifi and S. Gilaninia, “The Role of Key Factors in E-Banking for New Enterprises (Concepts & Applications),” Interdisciplinary Journal of Con temporary Research in Business, Vol. 3, No. 3, 2011, pp. 999-1006.

[47]   S. Taylor and P. A. Todd, “Assessing IT Usage: The Role of Prior Experience,” MIS Quarterly, Vol. 19, No. 4, 1995, pp. 561-570. doi:10.2307/249633

[48]   M. T. Elliott and S. Speck, “Factors that Affect Attitude toward a Retail Web Site,” Journal of Marketing Theory and Practice, Vol. 13, No. 1, 2005, pp. 40-51.

[49]   L. S. Strickland and L. E. Hunt, “Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions,” Journal of the American Society for Information Science and Technology, Vol. 56, No. 3, 2005, pp. 221-234. doi:10.1002/asi.20122

[50]   P. A. Pavlou and D. Gefen, “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research, Vol. 15, No. 1, 2004, pp. 37-59. doi:10.1287/isre.1040.0015

[51]   M. Alkailani and R. Kumar, “Investigating Uncertainty Avoidance and Perceived Risk for Impacting Internet Buying: A Study in Three National Cultures,” International Journal of Business and Management, Vol. 6, No. 5, 2011, pp. 76-92.

[52]   Y.-J. Hu, “Exploring the Relationship between Customer Involvement, Brand Equity, Perceived Risk and Customer Loyalty: The Case of Electrical Consumer Products,” The International Journal of Organizational Innovation, Vol. 4, No. 1, 2011, pp. 111-127.

[53]   S. H. Lim and C. E. Koh, “RFID Implementation Strategy: Perceived Risks and Organizational Fits,” Industrial Management & Data Systems, Vol. 109, No. 8, 2009, pp. 1017-1036. doi:10.1108/02635570910991274

[54]   E. W. T. Ngai, K. K. L. Moon, F. J. Riggins and Y. Y. Candace, “RFID Research: An Academic Literature Re view (1995-2005) and Future Research Directions,” International Journal of Production Economics, Vol. 112, No. 2, 2008, pp.510-520. doi:10.1016/j.ijpe.2007.05.004

[55]   L. Lee, “RFID for Everyday People,” Perspectives in Business, Vol. 3, No. 2, 2005, pp. 25-31.

[56]   R. L. Juban and D. C. Wyld, “Would You Like Chips with That? Consumer Perspectives of RFID,” Management Research News, Vol. 27, No. 11-12, 2004, pp. 29-44. doi:10.1108/01409170410784653

 
 
Top