Skip to main content
Top
Published in: Ethics and Information Technology 2/2016

02-03-2016 | Original Paper

Building theory from consumer reactions to RFID: discovering Connective Proximity

Authors: Anna Margulis, Harold Boeck, Ygal Bendavid, Fabien Durif

Published in: Ethics and Information Technology | Issue 2/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Academic research into RFID technology has largely neglected ethics. What scarce research was being performed has now dwindled despite having some consumers continue to express their ethical concerns. This article aims at reducing this apparent void by exploring the antecedents that cause the public to react when consumers are targeted by RFID technology. Through the analysis of 11 real RFID implementations used to target consumers, our research indicates that several factors can influence consumer response through the distinct nature of the technology, namely, (1) Customization of communications, (2) Imposition of tag use, (3) Segmentation and targeting, (4) Modified role of the sales representative, (5) Physical distance between the consumer and the tag, and (6) Security of transactions. The article then proposes a construct to determine the risk of raising consumer ethical concerns. The construct of “Connective Proximity” and its three components (physical proximity, exposure time, and information proximity) are defined. Our research highlights the need for further studies on the ethical considerations of tagging humans and specifically tracking consumers when performing marketing activities with RFID technology. Our article aims at invigorating research on this topic, which has a lot to contribute to both society and corporations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Barnes, B. (2013). At Disney Parks, a Bracelet Meant to Build-Loyalty (and Sales). New York Times. Barnes, B. (2013). At Disney Parks, a Bracelet Meant to Build-Loyalty (and Sales). New York Times.
go back to reference Desmarais, C. (2012). Texas school uses RFID badges to track student locations. PCWorld. Desmarais, C. (2012). Texas school uses RFID badges to track student locations. PCWorld.
go back to reference IDTechEx Knowledge Database. (2006). Prada apparel item level New York USA. IDTechEx Knowledge Database. (2006). Prada apparel item level New York USA.
go back to reference IDTechEx Knowledge Database. (2007). GeDenim Cards France. IDTechEx Knowledge Database. (2007). GeDenim Cards France.
go back to reference IDTechEx Knowledge Database. (2008). McDonlad’s Phone Payment Japan.pdf. IDTechEx Knowledge Database. (2008). McDonlad’s Phone Payment Japan.pdf.
go back to reference IDTechEx Knowledge Database. (2010a). McDonald’s Phone Vouchers Japan. IDTechEx Knowledge Database. (2010a). McDonald’s Phone Vouchers Japan.
go back to reference IDTechEx Knowledge Database. (2010b). Smug Coffee LLC Coffee Mugs USA. IDTechEx Knowledge Database. (2010b). Smug Coffee LLC Coffee Mugs USA.
go back to reference Johnson, C. (2013a). RFID-embedded smart mug makes coffee shops even more smug. Switched. Johnson, C. (2013a). RFID-embedded smart mug makes coffee shops even more smug. Switched.
go back to reference Johnson, J. R. (2011a). Vail extends rfid social media program; nba, nhl and mlb may be next to adopt. RFID 24-7. Johnson, J. R. (2011a). Vail extends rfid social media program; nba, nhl and mlb may be next to adopt. RFID 24-7.
go back to reference Johnson, J. R. (2011b). Tampa Bay lightning boost sales with RFID-enables team Jerseys. RFID 24-7. Johnson, J. R. (2011b). Tampa Bay lightning boost sales with RFID-enables team Jerseys. RFID 24-7.
go back to reference Johnson, J. R. (2012). Social media and RFID: A golden opportunity for retailers. RFID 24-7. Johnson, J. R. (2012). Social media and RFID: A golden opportunity for retailers. RFID 24-7.
go back to reference Johnson, J. R. (2013b). Disney fires back at privacy concerns over mymagic+. RFID 24-7. Johnson, J. R. (2013b). Disney fires back at privacy concerns over mymagic+. RFID 24-7.
go back to reference Johnson, J. R. (2013c). Sunglass hut deploys RFID to boost consumer engagement. RFID 24-7. Johnson, J. R. (2013c). Sunglass hut deploys RFID to boost consumer engagement. RFID 24-7.
go back to reference Montgomery, K. (2010). Smart Coffee Mug Features RFID Chip for Easy Purchases. PC Magazine. Montgomery, K. (2010). Smart Coffee Mug Features RFID Chip for Easy Purchases. PC Magazine.
go back to reference Oremus, W. (2013). Student loses lawsuit challenging Texas school’s RFID tracking program. Slate. Oremus, W. (2013). Student loses lawsuit challenging Texas school’s RFID tracking program. Slate.
go back to reference Staggs, T. (2013, March 10). Taking the Disney Guest Experience to the Next Level. DisneyParks Blog. Staggs, T. (2013, March 10). Taking the Disney Guest Experience to the Next Level. DisneyParks Blog.
go back to reference Swedberg, C. (2010). To reduce waste, smug customers use RFID coffee mugs. RFID Journal, pp. 1–2. Swedberg, C. (2010). To reduce waste, smug customers use RFID coffee mugs. RFID Journal, pp. 1–2.
go back to reference Zara, C. (2013). Disney World’s RFID tracking bracelets are a slippery slope, Warns Privacy Advocate. International Business Times. Zara, C. (2013). Disney World’s RFID tracking bracelets are a slippery slope, Warns Privacy Advocate. International Business Times.
go back to reference Aluri, A., & Palakurthi, R. (2011). The influence of demographic factors on consumer attitudes and intentions to use RFID technologies in the US hotel industry. Journal of Hospitality and Tourism Technology, 2(3), 188–203.CrossRef Aluri, A., & Palakurthi, R. (2011). The influence of demographic factors on consumer attitudes and intentions to use RFID technologies in the US hotel industry. Journal of Hospitality and Tourism Technology, 2(3), 188–203.CrossRef
go back to reference Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.CrossRef Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.CrossRef
go back to reference Astani, M., & Bjorke, J. (2007). Radio frequency identification technology and consumer privacy. Issues in Information Systems, VIII(2), 341–347. Astani, M., & Bjorke, J. (2007). Radio frequency identification technology and consumer privacy. Issues in Information Systems, VIII(2), 341–347.
go back to reference Barnes, B. (2013). At Disney Parks, a Bracelet Meant to Build-Loyalty (and Sales). New York Times. Barnes, B. (2013). At Disney Parks, a Bracelet Meant to Build-Loyalty (and Sales). New York Times.
go back to reference Beitelspacher, L. S., Hansen, J. D., Johnston, A. C., & Deitz, G. D. (2012). Exploring consumer privacy concerns and RFID technology: The impact of fear appeals on consumer behaviors. The Journal of Marketing Theory and Practice, 20(2), 147–160.CrossRef Beitelspacher, L. S., Hansen, J. D., Johnston, A. C., & Deitz, G. D. (2012). Exploring consumer privacy concerns and RFID technology: The impact of fear appeals on consumer behaviors. The Journal of Marketing Theory and Practice, 20(2), 147–160.CrossRef
go back to reference Bendavid, Y., Boeck, H., & Philippe, R. (2012). RFID-enabled traceability system for consignment and high value products: A case study in the healthcare sector. Journal of Medical Systems, 36(6), 3473–3489.CrossRef Bendavid, Y., Boeck, H., & Philippe, R. (2012). RFID-enabled traceability system for consignment and high value products: A case study in the healthcare sector. Journal of Medical Systems, 36(6), 3473–3489.CrossRef
go back to reference Bentham, J. (1791). Panopticon or the inspection house, 2. Bentham, J. (1791). Panopticon or the inspection house, 2.
go back to reference Black, J. (2004). Shutting shopping bags to prying eyes. Business Week. Black, J. (2004). Shutting shopping bags to prying eyes. Business Week.
go back to reference Boeck, H., Roy, J., Durif, F., & Gregoire, M. (2011). The effect of perceived intrusion on consumers’ attitude towards using an RFID-based marketing program. Procedia Computer Science, 5, 841–848.CrossRef Boeck, H., Roy, J., Durif, F., & Gregoire, M. (2011). The effect of perceived intrusion on consumers’ attitude towards using an RFID-based marketing program. Procedia Computer Science, 5, 841–848.CrossRef
go back to reference Boeck, H., & Wamba, S. F. (2008). RFID and buyer–seller relationships in the retail supply chain. International Journal of Retail & Distribution Management, 36(6), 433–460.CrossRef Boeck, H., & Wamba, S. F. (2008). RFID and buyer–seller relationships in the retail supply chain. International Journal of Retail & Distribution Management, 36(6), 433–460.CrossRef
go back to reference Brey, P. (2005). Editorial introduction—Surveillance and privacy. Ethics and Information Technology, 7(4), 183–184.CrossRef Brey, P. (2005). Editorial introduction—Surveillance and privacy. Ethics and Information Technology, 7(4), 183–184.CrossRef
go back to reference CASPIAN. (2003a). Boycott Gillette—Fight Back. Caspian. CASPIAN. (2003a). Boycott Gillette—Fight Back. Caspian.
go back to reference CASPIAN. (2003b). Send Benetton a message: Don’t buy clothing with tracking devices! Caspian. CASPIAN. (2003b). Send Benetton a message: Don’t buy clothing with tracking devices! Caspian.
go back to reference Clarke, R. (2001). Person location and person tracking—Technologies, risks and policy implications. Information Technology & People, 14(2), 206–231.CrossRef Clarke, R. (2001). Person location and person tracking—Technologies, risks and policy implications. Information Technology & People, 14(2), 206–231.CrossRef
go back to reference Clifford, S., & Hardy, Q. (2013). Attention, shoppers: Store is tracking your cell. The New York Times, pp. 5–9. Clifford, S., & Hardy, Q. (2013). Attention, shoppers: Store is tracking your cell. The New York Times, pp. 5–9.
go back to reference Corbin, J., & Strauss, A. (2008). Basics of qualitative research. Los Angeles: Sage Publi. Corbin, J., & Strauss, A. (2008). Basics of qualitative research. Los Angeles: Sage Publi.
go back to reference Daly, E. (2010). Personal autonomy in the travel panopticon. Ethics and Information Technology, 12(2), 97–108.CrossRef Daly, E. (2010). Personal autonomy in the travel panopticon. Ethics and Information Technology, 12(2), 97–108.CrossRef
go back to reference De George, R. T. (2008). The ethics of information technology and business. New York: Wiley. De George, R. T. (2008). The ethics of information technology and business. New York: Wiley.
go back to reference Dean, D. H. (2013). Anticipating consumer reaction to RFID-enabled grocery checkout. Services Marketing Quarterly, 34(1), 86–101.CrossRef Dean, D. H. (2013). Anticipating consumer reaction to RFID-enabled grocery checkout. Services Marketing Quarterly, 34(1), 86–101.CrossRef
go back to reference DeCew, J. W. (2004). Privacy and policy for genetic research. Ethics and Information Technology, 6(1), 5–14.CrossRef DeCew, J. W. (2004). Privacy and policy for genetic research. Ethics and Information Technology, 6(1), 5–14.CrossRef
go back to reference Denning, T., Borning, A., Friedman, B., Gill, B. T., Tadayoshi, K., & Maise, W. H. (2010). Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the SIGCHI conference on human factors in computing systems, ACM, pp. 917–926. Denning, T., Borning, A., Friedman, B., Gill, B. T., Tadayoshi, K., & Maise, W. H. (2010). Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the SIGCHI conference on human factors in computing systems, ACM, pp. 917–926.
go back to reference Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532–550. Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532–550.
go back to reference Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 7(4), 185–200.CrossRef Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 7(4), 185–200.CrossRef
go back to reference Gartner Research. (2015). Gartner identifies the top 10 strategic technology trends for 2015. Gartner Research. (2015). Gartner identifies the top 10 strategic technology trends for 2015.
go back to reference Gilbert, A., & Shim, R. (2003). Wal-Mart cancels ‘smart shelf’ trial. CNET News. Gilbert, A., & Shim, R. (2003). Wal-Mart cancels ‘smart shelf’ trial. CNET News.
go back to reference Gioia, D. A., & Pitre, E. (1990). Multiparadigm perspectives on theory building. The Academy of Management Review, 15(4), 584–602. Gioia, D. A., & Pitre, E. (1990). Multiparadigm perspectives on theory building. The Academy of Management Review, 15(4), 584–602.
go back to reference Glasser, D. J., Goodman, K. W., & Einspruch, N. G. (2007). Chips, tags and scanners: Ethical challenges for radio frequency identification. Ethics and Information Technology, 9, 101–109.CrossRef Glasser, D. J., Goodman, K. W., & Einspruch, N. G. (2007). Chips, tags and scanners: Ethical challenges for radio frequency identification. Ethics and Information Technology, 9, 101–109.CrossRef
go back to reference Goel, R. (2007). Managing RFID consumer privacy and implementation barriers. Information Systems Security, 16(4), 217–223.CrossRef Goel, R. (2007). Managing RFID consumer privacy and implementation barriers. Information Systems Security, 16(4), 217–223.CrossRef
go back to reference Guillemette, M. G., Fontaine, I., & Caron, C. (2008). Hybrid RFID-GPS real-time location system for human resources: Development, impacts and perspectives. In Proceedings of the annual Hawaii international conference on system sciences, pp. 1–10. Guillemette, M. G., Fontaine, I., & Caron, C. (2008). Hybrid RFID-GPS real-time location system for human resources: Development, impacts and perspectives. In Proceedings of the annual Hawaii international conference on system sciences, pp. 1–10.
go back to reference Günther, O., & Spiekermann, S. (2005). RFID and the perception of control: The consumer’s view. Communications of the ACM, 48(9), 73–76.CrossRef Günther, O., & Spiekermann, S. (2005). RFID and the perception of control: The consumer’s view. Communications of the ACM, 48(9), 73–76.CrossRef
go back to reference Hassan, T., & Chatterjee, S. (2006). A taxonomy for RFID. In Proceedings of the 39th Hawaii international conference on system sciences. Hassan, T., & Chatterjee, S. (2006). A taxonomy for RFID. In Proceedings of the 39th Hawaii international conference on system sciences.
go back to reference Heath, H., & Cowley, S. (2004). Developing a grounded theory approach: a comparison of Glaser and Strauss. International Journal of Nursing Studies, 41, 141–150.CrossRef Heath, H., & Cowley, S. (2004). Developing a grounded theory approach: a comparison of Glaser and Strauss. International Journal of Nursing Studies, 41, 141–150.CrossRef
go back to reference Hsu, C.-H., Chao, H.-C., & Park, J. H. (2011). Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems. Information Systems Frontiers, 13(4), 471–480. Hsu, C.-H., Chao, H.-C., & Park, J. H. (2011). Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems. Information Systems Frontiers, 13(4), 471–480.
go back to reference IDTechEx Knowledge Database. (2006), Prada Apparel Item Level New York USA. IDTechEx Knowledge Database. (2006), Prada Apparel Item Level New York USA.
go back to reference IDTechEx Knowledge Database. (2008). McDonlad’s Phone Payment Japan.pdf. IDTechEx Knowledge Database. (2008). McDonlad’s Phone Payment Japan.pdf.
go back to reference Introna, L. D. (2005). Disclosive ethics and information technology: Disclosing facial recognition systems. Ethics and Information Technology, 7(2), 75–86.CrossRef Introna, L. D. (2005). Disclosive ethics and information technology: Disclosing facial recognition systems. Ethics and Information Technology, 7(2), 75–86.CrossRef
go back to reference Jaccard, J., & Jacoby, J. (2010). Theory construction and model-building skills. A practical guide for social scientists. New York: The Guilfo. Jaccard, J., & Jacoby, J. (2010). Theory construction and model-building skills. A practical guide for social scientists. New York: The Guilfo.
go back to reference Johnson, J. R. (2013). Disney Fires Back at Privacy Concerns Over MyMagic+. RFID 24-7. Johnson, J. R. (2013). Disney Fires Back at Privacy Concerns Over MyMagic+. RFID 24-7.
go back to reference Johnson, J. R. (2014). Marks and Spencer Expands RFID Rollout; Will Tag 400M Items in 2014. RFID 24-7. Johnson, J. R. (2014). Marks and Spencer Expands RFID Rollout; Will Tag 400M Items in 2014. RFID 24-7.
go back to reference Johnson, R. (2012). Transcript: JC Penney CEO Ron Johnson. CNNMoney. Johnson, R. (2012). Transcript: JC Penney CEO Ron Johnson. CNNMoney.
go back to reference Katz, J. E., & Rice, R. E. (2009). Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. International Journal of Medical Informatics, 78, 104–114.CrossRef Katz, J. E., & Rice, R. E. (2009). Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. International Journal of Medical Informatics, 78, 104–114.CrossRef
go back to reference Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v. privacy rights. Industrial Management & Data Systems, 105(6), 703–713.CrossRef Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v. privacy rights. Industrial Management & Data Systems, 105(6), 703–713.CrossRef
go back to reference Krotov, V., & Junglas, I. (2008). RFID as a disruptive innovation. Journal of theoretical and applied electronic commerce research, 3(2), 44–59.CrossRef Krotov, V., & Junglas, I. (2008). RFID as a disruptive innovation. Journal of theoretical and applied electronic commerce research, 3(2), 44–59.CrossRef
go back to reference Lefebvre, L. A., Lefebvre, É., Bendavid, Y., Fosso Wamba, S., & Boeck, H. (2006). RFID as an Enabler of B-to-B e-Commerce and its impact on business processes: A pilot study of a supply chain in the retail industry. In 39th annual Hawaii international conference on system sciences (HICSS’06), IEEE, pp. 1–10. Lefebvre, L. A., Lefebvre, É., Bendavid, Y., Fosso Wamba, S., & Boeck, H. (2006). RFID as an Enabler of B-to-B e-Commerce and its impact on business processes: A pilot study of a supply chain in the retail industry. In 39th annual Hawaii international conference on system sciences (HICSS’06), IEEE, pp. 1–10.
go back to reference Li, X., Liu, J., Sheng, Q. Z., Zeadally, S., & Zhong, W. (2011). TMS-RFID: Temporal management of large-scale RFID applications. Information Systems Frontiers, 13(4), 481–500. Li, X., Liu, J., Sheng, Q. Z., Zeadally, S., & Zhong, W. (2011). TMS-RFID: Temporal management of large-scale RFID applications. Information Systems Frontiers, 13(4), 481–500.
go back to reference Lockton, V., & Rosenberg, R. S. (2005). RFID: The next serious threat to privacy. Ethics and Information Technology, 7, 221–231.CrossRef Lockton, V., & Rosenberg, R. S. (2005). RFID: The next serious threat to privacy. Ethics and Information Technology, 7, 221–231.CrossRef
go back to reference Lopez, T. S., Ranasinghe, D. C., Patkai, B., & McFarlane, D. (2011). Taxonomy, technology and applications of smart objects. Information Systems Frontiers Special Issue on RFID, 13(2), 281–300. Lopez, T. S., Ranasinghe, D. C., Patkai, B., & McFarlane, D. (2011). Taxonomy, technology and applications of smart objects. Information Systems Frontiers Special Issue on RFID, 13(2), 281–300.
go back to reference Martinko, M. J., Henry, J. W., & Zmud, R. W. (1996). An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behaviour & Information technology, 15(5), 313–330.CrossRef Martinko, M. J., Henry, J. W., & Zmud, R. W. (1996). An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behaviour & Information technology, 15(5), 313–330.CrossRef
go back to reference McLean, A. (2011). Ethical frontiers of ICT and older users: Cultural, pragmatic and ethical issues. Ethics and Information Technology, 13, 313–326.CrossRef McLean, A. (2011). Ethical frontiers of ICT and older users: Cultural, pragmatic and ethical issues. Ethics and Information Technology, 13, 313–326.CrossRef
go back to reference Michael, K. (2010). RFID implantable devices for humans and the risk versus reward. PerAda Workshop on Security, Trust and Privacy, Universita di Roma “La Sapienza”, Rome, Italy. Michael, K. (2010). RFID implantable devices for humans and the risk versus reward. PerAda Workshop on Security, Trust and Privacy, Universita di Roma “La Sapienza”, Rome, Italy.
go back to reference Michael, M. G., & Michael, K. (2010). Toward a State of Überveillance [Special Section Introduction]. IEEE on Technology and Society Magazine, 29(2), 9–16.MathSciNetCrossRef Michael, M. G., & Michael, K. (2010). Toward a State of Überveillance [Special Section Introduction]. IEEE on Technology and Society Magazine, 29(2), 9–16.MathSciNetCrossRef
go back to reference Penders, J. (2004). Privacy in (mobile) telecommunications services. Ethics and Information Technology, 6(4), 247–260.CrossRef Penders, J. (2004). Privacy in (mobile) telecommunications services. Ethics and Information Technology, 6(4), 247–260.CrossRef
go back to reference Peslak, A. R. (2005). An ethical exploration of privacy and radio frequency identification. Journal of Business Ethics, 59, 327–345.CrossRef Peslak, A. R. (2005). An ethical exploration of privacy and radio frequency identification. Journal of Business Ethics, 59, 327–345.CrossRef
go back to reference Prahalad, C. K., & Ramaswamy, V. (2003). The new frontier of experience innovation. MIT Sloan Management Review, 44(4), 12–18. Prahalad, C. K., & Ramaswamy, V. (2003). The new frontier of experience innovation. MIT Sloan Management Review, 44(4), 12–18.
go back to reference Pramatari, K., & Theotokis, A. (2009). Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits. European Journal of Information Systems, Palgrave Macmillan, 18(6), 541–552.CrossRef Pramatari, K., & Theotokis, A. (2009). Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits. European Journal of Information Systems, Palgrave Macmillan, 18(6), 541–552.CrossRef
go back to reference Privacy Rights Clearinghouse. (2014, March 10). RFID Position Statement of Consumer Privacy and Civil Liberties Organizations. Privacy Rights Clearinghouse. Privacy Rights Clearinghouse. (2014, March 10). RFID Position Statement of Consumer Privacy and Civil Liberties Organizations. Privacy Rights Clearinghouse.
go back to reference Razzouk, N. Y., Seitz, V., & Nicolaou, M. (2008). Consumer concerns regarding RFID Privacy: An empirical study. Journal of Global Business and Technology, 4(1), 69–79. Razzouk, N. Y., Seitz, V., & Nicolaou, M. (2008). Consumer concerns regarding RFID Privacy: An empirical study. Journal of Global Business and Technology, 4(1), 69–79.
go back to reference Reiman, J. H. (1995). Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Santa Clara Computer & high Tech LJ, 11, 27. Reiman, J. H. (1995). Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Santa Clara Computer & high Tech LJ, 11, 27.
go back to reference Resatsch, F., Sandner, U., Leimeister, J. M., & Krcmar, H. (2008). Do point of sale RFID-based information services make a difference? Analyzing consumer perceptions for designing smart product information services in retail business. Electronic Markets, 18(3), 216–231.CrossRef Resatsch, F., Sandner, U., Leimeister, J. M., & Krcmar, H. (2008). Do point of sale RFID-based information services make a difference? Analyzing consumer perceptions for designing smart product information services in retail business. Electronic Markets, 18(3), 216–231.CrossRef
go back to reference Rispal, M. H. (2002). La méthode des cas: Application à la recherche en gestion. De Boeck S. Rispal, M. H. (2002). La méthode des cas: Application à la recherche en gestion. De Boeck S.
go back to reference Roberti, M. (2003). The real scandal. RFID Journal. Roberti, M. (2003). The real scandal. RFID Journal.
go back to reference Rogers, E. M. (2003). Diffusion of innovations. Fifth Edit: Free Press. Rogers, E. M. (2003). Diffusion of innovations. Fifth Edit: Free Press.
go back to reference Saldana, J. (2009). The coding manual for qualitative researchers. Los Angeles, CA: SAGE. Saldana, J. (2009). The coding manual for qualitative researchers. Los Angeles, CA: SAGE.
go back to reference Sheng, Q. Z., Zeadally, S., Luo, Z., Jung, J.-Y., & Maamar, Z. (2010). Ubiquitous RFID: Where are we? Information Systems Frontiers Special Issue on RFID, 12(5), 485–490.CrossRef Sheng, Q. Z., Zeadally, S., Luo, Z., Jung, J.-Y., & Maamar, Z. (2010). Ubiquitous RFID: Where are we? Information Systems Frontiers Special Issue on RFID, 12(5), 485–490.CrossRef
go back to reference Shepherd, D. A., & Sutcliffe, K. M. (2011). Inductive top-down theorizing: A source of new theories of organization. The Academy of Management Review, 36(2), 361–380. Shepherd, D. A., & Sutcliffe, K. M. (2011). Inductive top-down theorizing: A source of new theories of organization. The Academy of Management Review, 36(2), 361–380.
go back to reference Slettemeas, D. (2009). RFID—The ‘Next Step’ in consumer–product relations or orwellian nightmare? Challenges for research and policy. Journal of Consumer Policy, 32(3), 219–244.CrossRef Slettemeas, D. (2009). RFID—The ‘Next Step’ in consumer–product relations or orwellian nightmare? Challenges for research and policy. Journal of Consumer Policy, 32(3), 219–244.CrossRef
go back to reference Sreastman. (2013). San Antonio schools withdraw student RFID chip. Before it’s News. Sreastman. (2013). San Antonio schools withdraw student RFID chip. Before it’s News.
go back to reference Staggs, T. (2013, March 10). Taking the Disney Guest Experience to the Next Level. DisneyParks Blog. Staggs, T. (2013, March 10). Taking the Disney Guest Experience to the Next Level. DisneyParks Blog.
go back to reference Swedberg, C. (2013). NFC-enabled refrigerator shares data with mobile phones. RFID Journal. Swedberg, C. (2013). NFC-enabled refrigerator shares data with mobile phones. RFID Journal.
go back to reference Taghaboni-Dutta, F., & Velthouse, B. (2014). RFID technology is revolutionary: Who should be involved in this game of tag? Academy of Management Perspectives, 20(4), 65–78.CrossRef Taghaboni-Dutta, F., & Velthouse, B. (2014). RFID technology is revolutionary: Who should be involved in this game of tag? Academy of Management Perspectives, 20(4), 65–78.CrossRef
go back to reference Trocchia, P., & Ainscough, T. (2012). Consumer attitudes toward RFID tracking in the retail environment. Review of Business Information, 16(2), 67–73. Trocchia, P., & Ainscough, T. (2012). Consumer attitudes toward RFID tracking in the retail environment. Review of Business Information, 16(2), 67–73.
go back to reference Uhrich, F., Sandner, U., Resatsch, F., Leimeister, J. M., & Krcmar, H. (2008). RFID in retailing and customer relationship management. The Communications of the Association for Information Systems, 23(13), 219–234. Uhrich, F., Sandner, U., Resatsch, F., Leimeister, J. M., & Krcmar, H. (2008). RFID in retailing and customer relationship management. The Communications of the Association for Information Systems, 23(13), 219–234.
go back to reference Vance, A. (2003), Wal-Mart turns customers into RFID lab rats. The Register. Vance, A. (2003), Wal-Mart turns customers into RFID lab rats. The Register.
go back to reference Vara-Orta, F. (2013). Northside ISD drops student tracking program. MySA San Antonio’s Home Page. Vara-Orta, F. (2013). Northside ISD drops student tracking program. MySA San Antonio’s Home Page.
go back to reference Violino, B. (2003). Benetton talks about RFID plans. RFID Journal. Violino, B. (2003). Benetton talks about RFID plans. RFID Journal.
go back to reference Wamba, S. F., & Boeck, H. (2008). Enhancing information flow in a retail supply chain using RFID and the EPC network: A proof-of-concept approach. Journal of Theoretical and Applied Electronic Commerce Research, 3(1), 92–105. Wamba, S. F., & Boeck, H. (2008). Enhancing information flow in a retail supply chain using RFID and the EPC network: A proof-of-concept approach. Journal of Theoretical and Applied Electronic Commerce Research, 3(1), 92–105.
go back to reference Wang, J. L., & Loui, M. C. (2009). Privacy and ethical issues in location-based tracking systems. In International Symposium on Technology and Society, Proceedings, pp. 2–5. Wang, J. L., & Loui, M. C. (2009). Privacy and ethical issues in location-based tracking systems. In International Symposium on Technology and Society, Proceedings, pp. 2–5.
go back to reference Warren and Brandeis. (1890). The right to privacy. Harvard Law Review, IV(5), 1890. Warren and Brandeis. (1890). The right to privacy. Harvard Law Review, IV(5), 1890.
go back to reference Wasieleski, D. M., & Gal-Or, M. (2008). An enquiry into the ethical efficacy of the use of radio frequency. Ethics and Information Technology, 10, 27–40.CrossRef Wasieleski, D. M., & Gal-Or, M. (2008). An enquiry into the ethical efficacy of the use of radio frequency. Ethics and Information Technology, 10, 27–40.CrossRef
go back to reference Van Wel, L., & Royakkers, L. (2004). Ethical issues in web data mining. Ethics and Information Technology, 6, 129–140.CrossRef Van Wel, L., & Royakkers, L. (2004). Ethical issues in web data mining. Ethics and Information Technology, 6, 129–140.CrossRef
go back to reference Winter, J. S. (2014). Surveillance in ubiquitous network societies: Normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things. Ethics and Information Technology, 16(1), 27–41.CrossRef Winter, J. S. (2014). Surveillance in ubiquitous network societies: Normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things. Ethics and Information Technology, 16(1), 27–41.CrossRef
go back to reference Wu, Y. A., Prybutok, V. R., Koh, C. E., & Habus, B. (2012). A nomological model of RFID privacy concern. Business Process Management Journal, 18(3), 420–444.CrossRef Wu, Y. A., Prybutok, V. R., Koh, C. E., & Habus, B. (2012). A nomological model of RFID privacy concern. Business Process Management Journal, 18(3), 420–444.CrossRef
go back to reference Yin, R. K. (2003). Case study research, design and methods (Vol. 5). Los Angeles, CA: SAGE. Yin, R. K. (2003). Case study research, design and methods (Vol. 5). Los Angeles, CA: SAGE.
go back to reference Zara, C. (2013), “Disney World’s RFID Tracking Bracelets Are A Slippery Slope, Warns Privacy Advocate”, International Business Times. Zara, C. (2013), “Disney World’s RFID Tracking Bracelets Are A Slippery Slope, Warns Privacy Advocate”, International Business Times.
go back to reference Ziekow, H., & Gunther, O. (2010). Sharing RFID and complex event data among organizations. Information Systems Frontiers, 12(5), 541–549. Ziekow, H., & Gunther, O. (2010). Sharing RFID and complex event data among organizations. Information Systems Frontiers, 12(5), 541–549.
go back to reference Zimmer, M. (2005). Surveillance, privacy and the ethics of vehicle safety communication technologies. Ethics and Information Technology, 7(4), 201–210.CrossRef Zimmer, M. (2005). Surveillance, privacy and the ethics of vehicle safety communication technologies. Ethics and Information Technology, 7(4), 201–210.CrossRef
Metadata
Title
Building theory from consumer reactions to RFID: discovering Connective Proximity
Authors
Anna Margulis
Harold Boeck
Ygal Bendavid
Fabien Durif
Publication date
02-03-2016
Publisher
Springer Netherlands
Published in
Ethics and Information Technology / Issue 2/2016
Print ISSN: 1388-1957
Electronic ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-016-9388-y

Other articles of this Issue 2/2016

Ethics and Information Technology 2/2016 Go to the issue

Original Paper

AI assisted ethics

Premium Partner