Understanding Consumers’ Attitudes Toward Controversial Information Technologies: A Contextualization Approach
Author
Abstract
Suggested Citation
DOI: 10.1287/isre.2017.0706
Download full text from publisher
References listed on IDEAS
- Mick, David Glen & Fournier, Susan, 1998. "Paradoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 25(2), pages 123-143, September.
- Bateson, John E G & Hui, Michael K, 1992. "The Ecological Validity of Photographic Slides and Videotapes in Simulating the Service Setting," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 19(2), pages 271-281, September.
- Allen S. Lee & Richard L. Baskerville, 2003. "Generalizing Generalizability in Information Systems Research," Information Systems Research, INFORMS, vol. 14(3), pages 221-243, September.
- Whetten, David A., 2009. "An Examination of the Interface between Context and Theory Applied to the Study of Chinese Organizations," Management and Organization Review, Cambridge University Press, vol. 5(1), pages 29-56, March.
- Wanda J. Orlikowski & C. Suzanne Iacono, 2001. "Research Commentary: Desperately Seeking the “IT” in IT Research—A Call to Theorizing the IT Artifact," Information Systems Research, INFORMS, vol. 12(2), pages 121-134, June.
- Mary J. Culnan & Pamela K. Armstrong, 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, INFORMS, vol. 10(1), pages 104-115, February.
- Tenenhaus, Michel & Vinzi, Vincenzo Esposito & Chatelin, Yves-Marie & Lauro, Carlo, 2005. "PLS path modeling," Computational Statistics & Data Analysis, Elsevier, vol. 48(1), pages 159-205, January.
- Caroline Lancelot Miltgen & Ales Popovic & Tiago Oliveira, 2013. "Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context," Post-Print hal-01116141, HAL.
- Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
- Clodfelter, Richard, 2010. "Biometric technology in retailing: Will consumers accept fingerprint authentication?," Journal of Retailing and Consumer Services, Elsevier, vol. 17(3), pages 181-188.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
- Peter, J Paul & Tarpey, Lawrence X, Sr, 1975. "A Comparative Analysis of Three Consumer Decision Strategies," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 2(1), pages 29-37, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Meyer, Patrick & Roth, Angela & Gutknecht, Klaus, 2023. "Service robots in organisational frontlines—A retail managers’ perspective," Journal of Retailing and Consumer Services, Elsevier, vol. 70(C).
- Cao, Guangming & Duan, Yanqing & Edwards, John S. & Dwivedi, Yogesh K., 2021. "Understanding managers’ attitudes and behavioral intentions towards using artificial intelligence for organizational decision-making," Technovation, Elsevier, vol. 106(C).
- Piotrowska Anna Iwona, 2024. "Determinants of consumer adoption of biometric technologies in mobile financial applications," Economics and Business Review, Sciendo, vol. 10(1), pages 81-100, April.
- Ruzita Abdul-Rahim & Siti Aisah Bohari & Aini Aman & Zainudin Awang, 2022. "Benefit–Risk Perceptions of FinTech Adoption for Sustainability from Bank Consumers’ Perspective: The Moderating Role of Fear of COVID-19," Sustainability, MDPI, vol. 14(14), pages 1-24, July.
- A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
- Teng Yu & Ai Ping Teoh & Chengliang Wang & Qing Bian, 2024. "Convenient or risky? Investigating the behavioral intention to use facial recognition payment in smart hospitals," Palgrave Communications, Palgrave Macmillan, vol. 11(1), pages 1-20, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Liu, Yu-li & Wu, Yanfei & Li, Changyan & Song, Chuling & Hsu, Wen-yi, 2024. "Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo," Telecommunications Policy, Elsevier, vol. 48(5).
- Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
- Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
- Valerie Graf-Drasch & Maximilian Röglinger & Annette Wenninger & Sabiölla Hosseini, 2022. "A Contextualized Acceptance Model for Proactive Smart Services," Schmalenbach Journal of Business Research, Springer, vol. 74(3), pages 345-387, September.
- Amita Goyal Chin & Mark A. Harris & Robert Brookshire, 2022. "An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework," Information Systems Frontiers, Springer, vol. 24(1), pages 329-347, February.
- Nils Koester & Patrick Cichy & David Antons & Torsten Oliver Salge, 2022. "Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2333-2355, December.
- Rouven-B. Wiegard & Michael H. Breitner, 2019. "Smart services in healthcare: A risk-benefit-analysis of pay-as-you-live services from customer perspective in Germany," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(1), pages 107-123, March.
- Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
- Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
- Pizzi, Gabriele & Scarpi, Daniele, 2020. "Privacy threats with retail technologies: A consumer perspective," Journal of Retailing and Consumer Services, Elsevier, vol. 56(C).
- Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
- Jabbar, Abdul & Geebren, Ahmed & Hussain, Zahid & Dani, Samir & Ul-Durar, Shajara, 2023. "Investigating individual privacy within CBDC: A privacy calculus perspective," Research in International Business and Finance, Elsevier, vol. 64(C).
- Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
- Matemba, Elizabeth D. & Li, Guoxin, 2018. "Consumers' willingness to adopt and use WeChat wallet: An empirical study in South Africa," Technology in Society, Elsevier, vol. 53(C), pages 55-68.
- Renata Benigna Gonçalves & Júlio César Bastos Figueiredo, 2022. "Effects of perceived risks and benefits in the formation of the consumption privacy paradox: a study of the use of wearables in people practicing physical activities," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(3), pages 1485-1499, September.
- Idris Adjerid & Alessandro Acquisti & George Loewenstein, 2019. "Choice Architecture, Framing, and Cascaded Privacy Choices," Management Science, INFORMS, vol. 67(5), pages 2267-2290, May.
- Pallant, Jason I. & Pallant, Jessica L. & Sands, Sean J. & Ferraro, Carla R. & Afifi, Eslam, 2022. "When and how consumers are willing to exchange data with retailers: An exploratory segmentation," Journal of Retailing and Consumer Services, Elsevier, vol. 64(C).
- Lu Xu & Yanhui Li & Qi Yao, 2022. "Information security investment and purchase decision for personalized products," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(6), pages 2619-2635, September.
- Tawfiq Alashoor & Mark Keil & H. Jeff Smith & Allen R. McConnell, 2023. "Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing," Information Systems Research, INFORMS, vol. 34(4), pages 1415-1436, December.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
More about this item
Keywords
controversial information technology; user acceptance of IT; contextualization; biometric identity authentication;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:28:y:2017:i:4:p:760-774. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.