Skip to main content
Erschienen in: Information Systems Frontiers 2/2016

01.04.2016

Consumer adoption of RFID-enabled services. Applying an extended UTAUT model

verfasst von: Herbjørn Nysveen, Per Egil Pedersen

Erschienen in: Information Systems Frontiers | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this article, an extended version of the unified theory of acceptance and use of technology (UTAUT) is applied to explore the significance of various antecedents of acceptance of eight versions of a radio frequency identification (RFID) enabled service. The results show significant influences from performance expectancy, effort expectancy and technology anxiety on attitude to use RFID-enabled services, while facilitating conditions and attitude to use both have significant influences on intention to use the services. Looking into potential moderating influences, gender moderates most of the relationships in the model while age and experience with identification technology do not seem to be relevant moderators. Exploring the potential moderating influence of context experience, experience of the service context is found to moderate some of the relationships in the model. Managerial implications point to the importance of developing useful and user-friendly services and of communicating the user friendliness to potential customers to avoid the potential negative influence of technology anxiety. Service development and market communication should be sensitive to gender and context experience.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
See the special issue of Information Systems Frontiers on RFID technology (No. 12, 2010) for further insight.
 
Literatur
Zurück zum Zitat Agarwal, R., & Prasad, J. (1997). the role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28(3), 557–582.CrossRef Agarwal, R., & Prasad, J. (1997). the role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28(3), 557–582.CrossRef
Zurück zum Zitat Agarwal, R., & Karahanna, E. (2000). Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. MIS Quarterly, 24, 665–694. Agarwal, R., & Karahanna, E. (2000). Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. MIS Quarterly, 24, 665–694.
Zurück zum Zitat Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef
Zurück zum Zitat Arning, K., & Ziefle, M. (2007). Understanding age differences in PDA acceptance and performance. Computers in Human Behavior, 23, 2904–2927.CrossRef Arning, K., & Ziefle, M. (2007). Understanding age differences in PDA acceptance and performance. Computers in Human Behavior, 23, 2904–2927.CrossRef
Zurück zum Zitat Astani, M., & Bjorke, J. (2007). radio frequency identification technology and consumer privacy. Issues in Information Systems, 8(2), 341–347. Astani, M., & Bjorke, J. (2007). radio frequency identification technology and consumer privacy. Issues in Information Systems, 8(2), 341–347.
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). The inter!net of things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The inter!net of things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef
Zurück zum Zitat Batra, R., & Ahtola, O. (1991). Measuring the hedonic and utilitarian sources of consumer attitudes. Marketing Letters, 2(2), 159–170.CrossRef Batra, R., & Ahtola, O. (1991). Measuring the hedonic and utilitarian sources of consumer attitudes. Marketing Letters, 2(2), 159–170.CrossRef
Zurück zum Zitat Berger, C. R., & Calabrese, R. J. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1, 99–112.CrossRef Berger, C. R., & Calabrese, R. J. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1, 99–112.CrossRef
Zurück zum Zitat Bergeron, F., Rivard, S., & De Serre, L. (1990). Investigating the support role of the information center. MIS Quarterly, 14(3), 247–259.CrossRef Bergeron, F., Rivard, S., & De Serre, L. (1990). Investigating the support role of the information center. MIS Quarterly, 14(3), 247–259.CrossRef
Zurück zum Zitat Bozionelos, N. (2001). Computer anxiety: Relationship with computer experience and prevalence. Computers in Human Behavior, 17, 213–224.CrossRef Bozionelos, N. (2001). Computer anxiety: Relationship with computer experience and prevalence. Computers in Human Behavior, 17, 213–224.CrossRef
Zurück zum Zitat Broos, A. (2005). Gender and information and communication technologies (ICT) anxiety: Male self-assurance and female hesitation. CyberPsychology and Behavior, 8(1), 21–31.CrossRef Broos, A. (2005). Gender and information and communication technologies (ICT) anxiety: Male self-assurance and female hesitation. CyberPsychology and Behavior, 8(1), 21–31.CrossRef
Zurück zum Zitat Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9–53.CrossRef Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9–53.CrossRef
Zurück zum Zitat Byrne, B. M. (2010). Structural equations modeling with AMOS: Basic concepts, applications and programming. New York: Routledge. Byrne, B. M. (2010). Structural equations modeling with AMOS: Basic concepts, applications and programming. New York: Routledge.
Zurück zum Zitat Carbonell, P., Rodríguez-Escudero, A. I., & Pujari, D. (2009). Customer involvement in new service development: An examination of antecedents and outcomes. Journal of Product Innovation Management, 26, 536–550.CrossRef Carbonell, P., Rodríguez-Escudero, A. I., & Pujari, D. (2009). Customer involvement in new service development: An examination of antecedents and outcomes. Journal of Product Innovation Management, 26, 536–550.CrossRef
Zurück zum Zitat Cazier, J. A., Jensen, A. S., & Dave, D. S. (2008). The Impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies. Communications of the Association for Information Systems, 23(14), 235–256. Cazier, J. A., Jensen, A. S., & Dave, D. S. (2008). The Impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies. Communications of the Association for Information Systems, 23(14), 235–256.
Zurück zum Zitat Cenfetelli, R. T., & Schwartz, A. (2011). Identifying and testing the inhibitors of technology usage intentions. Information Systems Research, 22(4), 808–823.CrossRef Cenfetelli, R. T., & Schwartz, A. (2011). Identifying and testing the inhibitors of technology usage intentions. Information Systems Research, 22(4), 808–823.CrossRef
Zurück zum Zitat Chang, I.-C., Hwang, H.-G., Hung, W.-F., & Li, Y.-C. (2007). Physicians‘acceptance of pharmacokinetics-based clinical decision support systems. Expert Systems with Applications, 33, 296–303.CrossRef Chang, I.-C., Hwang, H.-G., Hung, W.-F., & Li, Y.-C. (2007). Physicians‘acceptance of pharmacokinetics-based clinical decision support systems. Expert Systems with Applications, 33, 296–303.CrossRef
Zurück zum Zitat Chesbrough, H. (2006). Open innovation: A new paradigm for understanding industrial innovation. In H. Chesbrough, W. Vanhaverbeke, & J. West (Eds.), Open innovation. Researching a new paradigm. New York: Oxford University Press Inc. Chesbrough, H. (2006). Open innovation: A new paradigm for understanding industrial innovation. In H. Chesbrough, W. Vanhaverbeke, & J. West (Eds.), Open innovation. Researching a new paradigm. New York: Oxford University Press Inc.
Zurück zum Zitat Cheung, B. C. F., Ting, S. L., Tsang, A. H. C., and Lee, W. B. (forthcoming): A Methodological Approach to Optimizing RFID Deployment, Information Systems Frontiers, DOI 10.1007/s10796-012-9391-8. Cheung, B. C. F., Ting, S. L., Tsang, A. H. C., and Lee, W. B. (forthcoming): A Methodological Approach to Optimizing RFID Deployment, Information Systems Frontiers, DOI 10.1007/s10796-012-9391-8.
Zurück zum Zitat Chitturi, R., Raghunathan, R., & Mahajan, V. (2008). Delight by design: The role of hedonic versus utilitarian benefits. Journal of Marketing, 72, 48–63.CrossRef Chitturi, R., Raghunathan, R., & Mahajan, V. (2008). Delight by design: The role of hedonic versus utilitarian benefits. Journal of Marketing, 72, 48–63.CrossRef
Zurück zum Zitat Compeau, D. R., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computer technology: A longitudinal study. MIS Quarterly, 23(2), 145–158.CrossRef Compeau, D. R., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computer technology: A longitudinal study. MIS Quarterly, 23(2), 145–158.CrossRef
Zurück zum Zitat Corston, R., & Colman, A. M. (1996). Gender and social facilitation effects on computer competence and attitudes toward computers. Journal of Educational Computing Research, 14(2), 171–183.CrossRef Corston, R., & Colman, A. M. (1996). Gender and social facilitation effects on computer competence and attitudes toward computers. Journal of Educational Computing Research, 14(2), 171–183.CrossRef
Zurück zum Zitat Curtin, J., Kauffman, R. J., & Riggins, F. J. (2007). Making the “MOST“out of RFID technology: A research agenda for the study of the adoption, usage and Impact of RFID. Information Technology Management, 8, 87–110.CrossRef Curtin, J., Kauffman, R. J., & Riggins, F. J. (2007). Making the “MOST“out of RFID technology: A research agenda for the study of the adoption, usage and Impact of RFID. Information Technology Management, 8, 87–110.CrossRef
Zurück zum Zitat Czaja, S. J., Charness, N., Fisk, A. D., Hertzog, C., Nair, S. N., Rogers, W. A., & Sharit, J. (2006). Factors predicting the use of technology: Findings from the center for research and education on aging and technology enhancement (CREATE). Psychology and Aging, 21(2), 333–352.CrossRef Czaja, S. J., Charness, N., Fisk, A. D., Hertzog, C., Nair, S. N., Rogers, W. A., & Sharit, J. (2006). Factors predicting the use of technology: Findings from the center for research and education on aging and technology enhancement (CREATE). Psychology and Aging, 21(2), 333–352.CrossRef
Zurück zum Zitat Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–339.CrossRef Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–339.CrossRef
Zurück zum Zitat Dommeyer, C. J., & Gross, B. L. (2003). What consumers know and what they do: An investigation of consumers knowledge, awareness, and use of privacy protection strategies. Journal of Interactive Marketing, 17(2), 34–51.CrossRef Dommeyer, C. J., & Gross, B. L. (2003). What consumers know and what they do: An investigation of consumers knowledge, awareness, and use of privacy protection strategies. Journal of Interactive Marketing, 17(2), 34–51.CrossRef
Zurück zum Zitat Durndell, A., & Hag, Z. (2002). Computer self-efficacy, computer anxiety, attitudes towards the internet and reported experience with the internet, by gender, in an East European sample. Computers in Human Behavior, 18, 521–535.CrossRef Durndell, A., & Hag, Z. (2002). Computer self-efficacy, computer anxiety, attitudes towards the internet and reported experience with the internet, by gender, in an East European sample. Computers in Human Behavior, 18, 521–535.CrossRef
Zurück zum Zitat Eckfeldt, B. (2005). What does RFID do for the consumer? Communication of the ACM, 48(9), 77–79.CrossRef Eckfeldt, B. (2005). What does RFID do for the consumer? Communication of the ACM, 48(9), 77–79.CrossRef
Zurück zum Zitat Fagan, M. H., Neill, S., and Woolridge, B. R. (2003–2004). An Empirical Investigation into the Relationship between Computer Self-Efficacy, Anxiety, Experience, Support and Usage, Journal of Computer Information Systems, Winter, 95–104. Fagan, M. H., Neill, S., and Woolridge, B. R. (2003–2004). An Empirical Investigation into the Relationship between Computer Self-Efficacy, Anxiety, Experience, Support and Usage, Journal of Computer Information Systems, Winter, 95–104.
Zurück zum Zitat Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley Publishing Company. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley Publishing Company.
Zurück zum Zitat Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153–160.CrossRef Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153–160.CrossRef
Zurück zum Zitat Foon, Y. S., & Fah, B. C. Y. (2011). Internet banking in Kuala Lumpur: An application of UTAUT model. International Journal of Business and Management, 6(4), 161–167. Foon, Y. S., & Fah, B. C. Y. (2011). Internet banking in Kuala Lumpur: An application of UTAUT model. International Journal of Business and Management, 6(4), 161–167.
Zurück zum Zitat Füller, J. (2010). Refining virtual co-creation from a consumer perspective. California Management Review, 52(2), 98–122.CrossRef Füller, J. (2010). Refining virtual co-creation from a consumer perspective. California Management Review, 52(2), 98–122.CrossRef
Zurück zum Zitat Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.CrossRef Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57, 768–775.CrossRef
Zurück zum Zitat Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis, 6th edn. Upper Saddle River, NJ: Pearson Prentice Hall. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis, 6th edn. Upper Saddle River, NJ: Pearson Prentice Hall.
Zurück zum Zitat Hall, D., & Mansfield, R. (1975). Relationships of age and seniority with career variables of engineers and scientists. Journal of Applied Psychology, 60(2), 201–210.CrossRef Hall, D., & Mansfield, R. (1975). Relationships of age and seniority with career variables of engineers and scientists. Journal of Applied Psychology, 60(2), 201–210.CrossRef
Zurück zum Zitat Harris, C. R., Jenkins, M., & Glaser, D. (2006). Gender differences in risk assessment: Why do women take fewer risks than men? Judgement and Decision Making, 1(1), 48–63. Harris, C. R., Jenkins, M., & Glaser, D. (2006). Gender differences in risk assessment: Why do women take fewer risks than men? Judgement and Decision Making, 1(1), 48–63.
Zurück zum Zitat Heim, G. R., Wentworth, W. R., Jr., & Peng, X. (2009). The value to the customer of RFID in service applications. Decision Sciences, 40(3), 477–512.CrossRef Heim, G. R., Wentworth, W. R., Jr., & Peng, X. (2009). The value to the customer of RFID in service applications. Decision Sciences, 40(3), 477–512.CrossRef
Zurück zum Zitat Hossain, M. M., & Prybutok, V. R. (2008). Consumer acceptance of RFID technology: An exploratory study. IEEE Transactions on Engineering Management, 55(2), 316–328.CrossRef Hossain, M. M., & Prybutok, V. R. (2008). Consumer acceptance of RFID technology: An exploratory study. IEEE Transactions on Engineering Management, 55(2), 316–328.CrossRef
Zurück zum Zitat Iigbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega, 23(6), 587–605.CrossRef Iigbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega, 23(6), 587–605.CrossRef
Zurück zum Zitat Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption testing the UTAUT model. Information and Management, 48, 1–8.CrossRef Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption testing the UTAUT model. Information and Management, 48, 1–8.CrossRef
Zurück zum Zitat Jung, Y., Peng, W., Moran, M., Jin, S.-A. A., McLaughlin, M., Cody, M., Jordan-Marsh, M., Albright, J., & Silverstein, M. (2010). Low-income minority seniors’ enrollment in a cybercafé: Psychological barriers to crossing the digital divide. Educational Gerontology, 36, 193–212.CrossRef Jung, Y., Peng, W., Moran, M., Jin, S.-A. A., McLaughlin, M., Cody, M., Jordan-Marsh, M., Albright, J., & Silverstein, M. (2010). Low-income minority seniors’ enrollment in a cybercafé: Psychological barriers to crossing the digital divide. Educational Gerontology, 36, 193–212.CrossRef
Zurück zum Zitat Khan, U. and Dhar, R. (2010). Price-Framing Effects on the Purchase of Hedonic and Utilitarian Bundles, Journal of Marketing Research, XLVII, December, 1090–1099. Khan, U. and Dhar, R. (2010). Price-Framing Effects on the Purchase of Hedonic and Utilitarian Bundles, Journal of Marketing Research, XLVII, December, 1090–1099.
Zurück zum Zitat Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544–564.CrossRef Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544–564.CrossRef
Zurück zum Zitat Laguna, K., & Babcock, R. L. (1997). Computer anxiety in young and older adults: Implications for human-computer interactions in older populations. Computers in Human Behavior, 13(3), 317–326.CrossRef Laguna, K., & Babcock, R. L. (1997). Computer anxiety in young and older adults: Implications for human-computer interactions in older populations. Computers in Human Behavior, 13(3), 317–326.CrossRef
Zurück zum Zitat Lee, J.-W. (2010). The roles of demographics on the perceptions of electronic commerce adoption. Academy of Marketing Studies Journal, 14(1), 71–89. Lee, J.-W. (2010). The roles of demographics on the perceptions of electronic commerce adoption. Academy of Marketing Studies Journal, 14(1), 71–89.
Zurück zum Zitat Ligas, M., & Chaudhuri, A. (2012). The moderating roles of shopper experience and store type on the relationship between perceived merchandise value and willingness to pay a higher price. Journal of Retailing and Consumer Services, 19, 249–258.CrossRef Ligas, M., & Chaudhuri, A. (2012). The moderating roles of shopper experience and store type on the relationship between perceived merchandise value and willingness to pay a higher price. Journal of Retailing and Consumer Services, 19, 249–258.CrossRef
Zurück zum Zitat Meuter, M. L., Ostrom, A. L., Bitner, M. J., & Roundtree, R. (2003). The influence of technology anxiety on consumer use and experiences with self-service technologies. Journal of Business Research, 56, 899–906.CrossRef Meuter, M. L., Ostrom, A. L., Bitner, M. J., & Roundtree, R. (2003). The influence of technology anxiety on consumer use and experiences with self-service technologies. Journal of Business Research, 56, 899–906.CrossRef
Zurück zum Zitat Milne, G. R., & Culnan, M. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t Read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29.CrossRef Milne, G. R., & Culnan, M. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t Read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29.CrossRef
Zurück zum Zitat Minton, H. L., & Schneider, F. W. (1980). Differential psychology. Prospect Heights: Waveland Press. Minton, H. L., & Schneider, F. W. (1980). Differential psychology. Prospect Heights: Waveland Press.
Zurück zum Zitat Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRef Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRef
Zurück zum Zitat Müller-Seitz, G., Dautzenberg, K., Creusen, U., & Stromereder, C. (2009). Customer acceptance of RFID technology: Evidence from the German electronic retail sector. Journal of Retailing and Consumer Behavior, 16, 31–39.CrossRef Müller-Seitz, G., Dautzenberg, K., Creusen, U., & Stromereder, C. (2009). Customer acceptance of RFID technology: Evidence from the German electronic retail sector. Journal of Retailing and Consumer Behavior, 16, 31–39.CrossRef
Zurück zum Zitat Nambisan, S., & Baron, R. A. (2007). Interaction in virtual customer environments: Implications for product support and customer relationship management. Journal of Interactive Marketing, 21(2), 42–62.CrossRef Nambisan, S., & Baron, R. A. (2007). Interaction in virtual customer environments: Implications for product support and customer relationship management. Journal of Interactive Marketing, 21(2), 42–62.CrossRef
Zurück zum Zitat Neufeld, D. J., Dong, L., & Higgins, C. (2007). Charismatic leadership and user acceptance of information technology. European Journal of Information Systems, 16, 494–510.CrossRef Neufeld, D. J., Dong, L., & Higgins, C. (2007). Charismatic leadership and user acceptance of information technology. European Journal of Information Systems, 16, 494–510.CrossRef
Zurück zum Zitat Ngai, E. W. T., Moon, K. K. L., Riggins, F. J., & Yi, C. Y. (2008). RFID research: An academic literature review (1995–2005) and future research directions. International Journal of Production Economics, 112, 510–520.CrossRef Ngai, E. W. T., Moon, K. K. L., Riggins, F. J., & Yi, C. Y. (2008). RFID research: An academic literature review (1995–2005) and future research directions. International Journal of Production Economics, 112, 510–520.CrossRef
Zurück zum Zitat Nysveen, H., Pedersen, P. E., & Thorbjørnsen, H. (2005). Intentions to use mobile services: Antecedents and cross-service comparisons. Journal of the Academy of Marketing Science, 33(3), 330–346.CrossRef Nysveen, H., Pedersen, P. E., & Thorbjørnsen, H. (2005). Intentions to use mobile services: Antecedents and cross-service comparisons. Journal of the Academy of Marketing Science, 33(3), 330–346.CrossRef
Zurück zum Zitat Peltier, J. W., Milne, G. R., & Phelps, J. E. (2009). Information privacy research: Framework for integrating multiple publics, information channels, and responses. Journal of Interactive Marketing, 23, 191–205.CrossRef Peltier, J. W., Milne, G. R., & Phelps, J. E. (2009). Information privacy research: Framework for integrating multiple publics, information channels, and responses. Journal of Interactive Marketing, 23, 191–205.CrossRef
Zurück zum Zitat Plude, D., & Hoyer, W. (1985). Attention and performance: Identifying and localizing age deficits. In N. Charness (Ed.), Aging and Human Performance (pp. 47–99). New York: John Wiley & Sons. Plude, D., & Hoyer, W. (1985). Attention and performance: Identifying and localizing age deficits. In N. Charness (Ed.), Aging and Human Performance (pp. 47–99). New York: John Wiley & Sons.
Zurück zum Zitat Podsakoff, P. M., MacKenzie, S., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879–903.CrossRef Podsakoff, P. M., MacKenzie, S., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879–903.CrossRef
Zurück zum Zitat Porter, L. (1963). Job attitudes in management: Perceived importance of needs as a function of job level. Journal of Applied Psychology, 47(2), 141–148.CrossRef Porter, L. (1963). Job attitudes in management: Perceived importance of needs as a function of job level. Journal of Applied Psychology, 47(2), 141–148.CrossRef
Zurück zum Zitat Pramatari, K., & Theotokis, A. (2009a). Consumer acceptance of RFID-enabled services: A model of multiple attitudes, System Characteristics and Individual Traits. European Journal of Information Systems, 18, 541–552.CrossRef Pramatari, K., & Theotokis, A. (2009a). Consumer acceptance of RFID-enabled services: A model of multiple attitudes, System Characteristics and Individual Traits. European Journal of Information Systems, 18, 541–552.CrossRef
Zurück zum Zitat Rhodes, S. R. (1983). Age-related differences in work attitude and behavior: A review and conceptual analysis. Psychological Bulletin, 93(2), 328–367.CrossRef Rhodes, S. R. (1983). Age-related differences in work attitude and behavior: A review and conceptual analysis. Psychological Bulletin, 93(2), 328–367.CrossRef
Zurück zum Zitat Ronan, R., & Kim, D.-Y. (2006). Gender differences in explicit and implicit risk attitudes: A socially facilitated phenomenon. British Journal of Social Psychology, 45, 397–419.CrossRef Ronan, R., & Kim, D.-Y. (2006). Gender differences in explicit and implicit risk attitudes: A socially facilitated phenomenon. British Journal of Social Psychology, 45, 397–419.CrossRef
Zurück zum Zitat Roussos, G. (2006). Enabling RFID in Retail, IEEE, March, 26–29. Roussos, G. (2006). Enabling RFID in Retail, IEEE, March, 26–29.
Zurück zum Zitat Sam, H. K., Othman, A. E. A., & Nordin, Z. S. (2005). Computer self-efficacy, computer anxiety, and attitudes toward the internet: A study among undergraduates in Unimas. Educational Technology and Society, 8(4), 205–219. Sam, H. K., Othman, A. E. A., & Nordin, Z. S. (2005). Computer self-efficacy, computer anxiety, and attitudes toward the internet: A study among undergraduates in Unimas. Educational Technology and Society, 8(4), 205–219.
Zurück zum Zitat Saunders, E. J. (2004). Maximizing computer use among elderly in rural senior centers. Educational Gerontology, 30, 573–585.CrossRef Saunders, E. J. (2004). Maximizing computer use among elderly in rural senior centers. Educational Gerontology, 30, 573–585.CrossRef
Zurück zum Zitat Schaupp, L. C., & Carter, L. (2010). The impact of trust, risk and optimism bias on E-File adoption. Information Systems Frontiers, 12, 299–309.CrossRef Schaupp, L. C., & Carter, L. (2010). The impact of trust, risk and optimism bias on E-File adoption. Information Systems Frontiers, 12, 299–309.CrossRef
Zurück zum Zitat Shaw, L. H., & Gant, L. M. (2002). Users divided? Exploring the gender gap in internet use. CyberPsychology and Behavior, 5(6), 517–527.CrossRef Shaw, L. H., & Gant, L. M. (2002). Users divided? Exploring the gender gap in internet use. CyberPsychology and Behavior, 5(6), 517–527.CrossRef
Zurück zum Zitat Sheehan, K. B. (1999). An investigation of gender differences in online privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.CrossRef Sheehan, K. B. (1999). An investigation of gender differences in online privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.CrossRef
Zurück zum Zitat Sheng, Q. Z., Zeadally, S., Luo, Z., Chung, J.-Y., & Maamar, Z. (2010). Ubiquitous RFID: Where Are We? Information Systems Frontiers, 12, 485–490. Sheng, Q. Z., Zeadally, S., Luo, Z., Chung, J.-Y., & Maamar, Z. (2010). Ubiquitous RFID: Where Are We? Information Systems Frontiers, 12, 485–490.
Zurück zum Zitat Sill, H. E., Fisher, S. L., & Wasserman, M. E. (2008). Consumer reactions to potential intrusiveness and benefits of RFID. International Journal of Information Technology and Management, 7(1), 76–97.CrossRef Sill, H. E., Fisher, S. L., & Wasserman, M. E. (2008). Consumer reactions to potential intrusiveness and benefits of RFID. International Journal of Information Technology and Management, 7(1), 76–97.CrossRef
Zurück zum Zitat Slettemeås, D. (2009). RFID – the “Next Step” in consumer-product relations or Orwellian nightmare?Challenges for research and policy. Journal of Consumer Policy, 32, 219–244.CrossRef Slettemeås, D. (2009). RFID – the “Next Step” in consumer-product relations or Orwellian nightmare?Challenges for research and policy. Journal of Consumer Policy, 32, 219–244.CrossRef
Zurück zum Zitat Taghaboni-Dutta, F. and Velthouse, B. (2006). RFID Technology Is Revolutionary: Who Should Be Involved in This Game og Tag?, Academy of Management Perspective, November, 65–78. Taghaboni-Dutta, F. and Velthouse, B. (2006). RFID Technology Is Revolutionary: Who Should Be Involved in This Game og Tag?, Academy of Management Perspective, November, 65–78.
Zurück zum Zitat Todman, J. (2000). Gender differences in computer anxiety among university entrants since 1992. Computers & Education, 34, 27–35.CrossRef Todman, J. (2000). Gender differences in computer anxiety among university entrants since 1992. Computers & Education, 34, 27–35.CrossRef
Zurück zum Zitat Tsai, C.-Y., & Chung, S.-H. (2012). A personalized route recommendation service for theme parks using RFID information and tourist behavior. Decision Support Systems, 52, 514–527.CrossRef Tsai, C.-Y., & Chung, S.-H. (2012). A personalized route recommendation service for theme parks using RFID information and tourist behavior. Decision Support Systems, 52, 514–527.CrossRef
Zurück zum Zitat Tsai, J. T., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.CrossRef Tsai, J. T., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.CrossRef
Zurück zum Zitat Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 45(2), 186–204.CrossRef Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 45(2), 186–204.CrossRef
Zurück zum Zitat Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115–139.CrossRef Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115–139.CrossRef
Zurück zum Zitat Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000). A longitudinal field investigation of gender differences in individual technology adoption decision making processes. Organizational Behavior and Human Decision Processes, 83(1), 33–60.CrossRef Venkatesh, V., Morris, M. G., & Ackerman, P. L. (2000). A longitudinal field investigation of gender differences in individual technology adoption decision making processes. Organizational Behavior and Human Decision Processes, 83(1), 33–60.CrossRef
Zurück zum Zitat Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Zurück zum Zitat Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
Zurück zum Zitat Want, R. (2006). An introduction to RFID technology. Pervasive Computing, 5(1), 25–33.CrossRef Want, R. (2006). An introduction to RFID technology. Pervasive Computing, 5(1), 25–33.CrossRef
Zurück zum Zitat Wilfong, J. D. (2006). Computer anxiety and anger: The impact of computer use, computer experience, and self-efficacy beliefs. Computers in Human Behavior, 22, 1001–1011.CrossRef Wilfong, J. D. (2006). Computer anxiety and anger: The impact of computer use, computer experience, and self-efficacy beliefs. Computers in Human Behavior, 22, 1001–1011.CrossRef
Zurück zum Zitat Wu, N. C., Nystrom, M. A., Lin, T. R., & Yu, H. C. (2006). Challenges to global RFID adoption. Technovation, 26(12), 1317–1323.CrossRef Wu, N. C., Nystrom, M. A., Lin, T. R., & Yu, H. C. (2006). Challenges to global RFID adoption. Technovation, 26(12), 1317–1323.CrossRef
Zurück zum Zitat Zaijicek, M. and Hall, S. (2000). Solutions for Elderly Visually Impaired People Using Internet, HCI, 299–307. Zaijicek, M. and Hall, S. (2000). Solutions for Elderly Visually Impaired People Using Internet, HCI, 299–307.
Zurück zum Zitat Zhou, T. (forthcoming): Understanding User Adoption of Location-Based Services from a Dual Perspective of Enablers and Inhibitors, Information Systems Frontiers, DOI 10.1007/s10796-013-9413-1. Zhou, T. (forthcoming): Understanding User Adoption of Location-Based Services from a Dual Perspective of Enablers and Inhibitors, Information Systems Frontiers, DOI 10.1007/s10796-013-9413-1.
Metadaten
Titel
Consumer adoption of RFID-enabled services. Applying an extended UTAUT model
verfasst von
Herbjørn Nysveen
Per Egil Pedersen
Publikationsdatum
01.04.2016
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 2/2016
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-014-9531-4

Weitere Artikel der Ausgabe 2/2016

Information Systems Frontiers 2/2016 Zur Ausgabe