IDEAS home Printed from https://ideas.repec.org/a/inm/orisre/v28y2017i4p760-774.html
   My bibliography  Save this article

Understanding Consumers’ Attitudes Toward Controversial Information Technologies: A Contextualization Approach

Author

Listed:
  • Michael Breward

    (Faculty of Business and Administration, University of Winnipeg, Winnipeg, Manitoba R3B 2E9, Canada)

  • Khaled Hassanein

    (DeGroote School of Business, McMaster University, Hamilton, Ontario L8S 4M4, Canada)

  • Milena Head

    (DeGroote School of Business, McMaster University, Hamilton, Ontario L8S 4M4, Canada)

Abstract

Controversial information technologies, such as biometrics and radio frequency identification, are perceived as having the potential to both benefit and undermine the well-being of the user. Given the type and/or amount of information these technologies have the capability to capture, there have been some concerns among users and potential users. However, prominent technology adoption models tend to focus on only the positive utilities associated with technology use. This research leverages net valence theories, which incorporate both positive and negative utilities, and context of use literature to propose a general framework that can be used for understanding consumer acceptance of controversial information technologies. The framework also highlights the importance of incorporating contextual factors that reflect the nuances of the controversial technologies and their specific context of use. We apply the framework to consumer acceptance of biometric identity authentication for banking transactions through automated teller machines. To that end, we contextualize the core construct of perceived benefits and concerns to this domain in a qualitative study of 402 participants, determine the appropriate contextual factors that are antecedents of the contextualized core constructs by examining relevant past research, and then develop and validate a contextualized research model in a quantitative study of 437 participants. Findings support the validity of our framework, with the model explaining 77.6% of the variance in consumers’ attitudes toward using biometrics for identity authentication at automated teller machines.

Suggested Citation

  • Michael Breward & Khaled Hassanein & Milena Head, 2017. "Understanding Consumers’ Attitudes Toward Controversial Information Technologies: A Contextualization Approach," Information Systems Research, INFORMS, vol. 28(4), pages 760-774, December.
  • Handle: RePEc:inm:orisre:v:28:y:2017:i:4:p:760-774
    DOI: 10.1287/isre.2017.0706
    as

    Download full text from publisher

    File URL: https://doi.org/10.1287/isre.2017.0706
    Download Restriction: no

    File URL: https://libkey.io/10.1287/isre.2017.0706?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Mick, David Glen & Fournier, Susan, 1998. "Paradoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 25(2), pages 123-143, September.
    2. Bateson, John E G & Hui, Michael K, 1992. "The Ecological Validity of Photographic Slides and Videotapes in Simulating the Service Setting," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 19(2), pages 271-281, September.
    3. Whetten, David A., 2009. "An Examination of the Interface between Context and Theory Applied to the Study of Chinese Organizations," Management and Organization Review, Cambridge University Press, vol. 5(1), pages 29-56, March.
    4. Wanda J. Orlikowski & C. Suzanne Iacono, 2001. "Research Commentary: Desperately Seeking the “IT” in IT Research—A Call to Theorizing the IT Artifact," Information Systems Research, INFORMS, vol. 12(2), pages 121-134, June.
    5. Caroline Lancelot Miltgen & Ales Popovic & Tiago Oliveira, 2013. "Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context," Post-Print hal-01116141, HAL.
    6. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
    7. Clodfelter, Richard, 2010. "Biometric technology in retailing: Will consumers accept fingerprint authentication?," Journal of Retailing and Consumer Services, Elsevier, vol. 17(3), pages 181-188.
    8. Peter, J Paul & Tarpey, Lawrence X, Sr, 1975. "A Comparative Analysis of Three Consumer Decision Strategies," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 2(1), pages 29-37, June.
    9. Allen S. Lee & Richard L. Baskerville, 2003. "Generalizing Generalizability in Information Systems Research," Information Systems Research, INFORMS, vol. 14(3), pages 221-243, September.
    10. Mary J. Culnan & Pamela K. Armstrong, 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, INFORMS, vol. 10(1), pages 104-115, February.
    11. Tenenhaus, Michel & Vinzi, Vincenzo Esposito & Chatelin, Yves-Marie & Lauro, Carlo, 2005. "PLS path modeling," Computational Statistics & Data Analysis, Elsevier, vol. 48(1), pages 159-205, January.
    12. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Piotrowska Anna Iwona, 2024. "Determinants of consumer adoption of biometric technologies in mobile financial applications," Economics and Business Review, Sciendo, vol. 10(1), pages 81-100, April.
    2. A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
    3. Meyer, Patrick & Roth, Angela & Gutknecht, Klaus, 2023. "Service robots in organisational frontlines—A retail managers’ perspective," Journal of Retailing and Consumer Services, Elsevier, vol. 70(C).
    4. Cao, Guangming & Duan, Yanqing & Edwards, John S. & Dwivedi, Yogesh K., 2021. "Understanding managers’ attitudes and behavioral intentions towards using artificial intelligence for organizational decision-making," Technovation, Elsevier, vol. 106(C).
    5. Ruzita Abdul-Rahim & Siti Aisah Bohari & Aini Aman & Zainudin Awang, 2022. "Benefit–Risk Perceptions of FinTech Adoption for Sustainability from Bank Consumers’ Perspective: The Moderating Role of Fear of COVID-19," Sustainability, MDPI, vol. 14(14), pages 1-24, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Liu, Yu-li & Wu, Yanfei & Li, Changyan & Song, Chuling & Hsu, Wen-yi, 2024. "Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo," Telecommunications Policy, Elsevier, vol. 48(5).
    2. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    3. Nils Koester & Patrick Cichy & David Antons & Torsten Oliver Salge, 2022. "Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2333-2355, December.
    4. Rouven-B. Wiegard & Michael H. Breitner, 2019. "Smart services in healthcare: A risk-benefit-analysis of pay-as-you-live services from customer perspective in Germany," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(1), pages 107-123, March.
    5. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
    6. Valerie Graf-Drasch & Maximilian Röglinger & Annette Wenninger & Sabiölla Hosseini, 2022. "A Contextualized Acceptance Model for Proactive Smart Services," Schmalenbach Journal of Business Research, Springer, vol. 74(3), pages 345-387, September.
    7. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
    8. Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
    9. Pizzi, Gabriele & Scarpi, Daniele, 2020. "Privacy threats with retail technologies: A consumer perspective," Journal of Retailing and Consumer Services, Elsevier, vol. 56(C).
    10. Amita Goyal Chin & Mark A. Harris & Robert Brookshire, 2022. "An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework," Information Systems Frontiers, Springer, vol. 24(1), pages 329-347, February.
    11. Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
    12. Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
    13. repec:dgr:rugsom:04f04 is not listed on IDEAS
    14. Paul, Michael & Hennig-Thurau, Thorsten & Groth, Markus, 2015. "Tightening or loosening the “iron cage”? The impact of formal and informal display controls on service customers," Journal of Business Research, Elsevier, vol. 68(5), pages 1062-1073.
    15. Yuan Sun & Shuyue Fang & Yujong Hwang, 2019. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce," Sustainability, MDPI, vol. 11(12), pages 1-27, June.
    16. Jabbar, Abdul & Geebren, Ahmed & Hussain, Zahid & Dani, Samir & Ul-Durar, Shajara, 2023. "Investigating individual privacy within CBDC: A privacy calculus perspective," Research in International Business and Finance, Elsevier, vol. 64(C).
    17. Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
    18. Matemba, Elizabeth D. & Li, Guoxin, 2018. "Consumers' willingness to adopt and use WeChat wallet: An empirical study in South Africa," Technology in Society, Elsevier, vol. 53(C), pages 55-68.
    19. Sun, Shiwei & Zhang, Jin & Zhu, Yiwei & Jiang, Mian & Chen, Shuhui, 2022. "Exploring users' willingness to disclose personal information in online healthcare communities: The role of satisfaction," Technological Forecasting and Social Change, Elsevier, vol. 178(C).
    20. Renata Benigna Gonçalves & Júlio César Bastos Figueiredo, 2022. "Effects of perceived risks and benefits in the formation of the consumption privacy paradox: a study of the use of wearables in people practicing physical activities," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(3), pages 1485-1499, September.
    21. Hoon S. Cha & Jong Hyun Wi & Chanhi Park & Taeha Kim, 2021. "Sustainability Calculus in Adopting Smart Speakers—Personalized Services and Privacy Risks," Sustainability, MDPI, vol. 13(2), pages 1-18, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:28:y:2017:i:4:p:760-774. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.