An Empirical Study about RFID Acceptance- Focus on the Employees in Korea -

The number of the companies accepting RFID in Korea has been increased continuously due to the domestic development of information technology. The acceptance of RFID by companies in Korea enabled them to do business with many global enterprises in a much more efficient and effective way. According to a survey[33, p76], many companies in Korea have used RFID for inventory or distribution manages. But, the use of RFID in the companies in Korea is in the early stages and its potential value hasn-t fully been realized yet. At this time, it would be very important to investigate the factors that affect RFID acceptance. For this study, many previous studies were referenced and some RFID experts were interviewed. Through the pilot test, four factors were selected - Security Trust, Employee Knowledge, Partner Influence, Service Provider Trust - affecting RFID acceptance and an extended technology acceptance model(e-TAM) was presented with those factors. The proposed model was empirically tested using data collected from employees in companies or public enterprises. In order to analyze some relationships between exogenous variables and four variables in TAM, structural equation modeling(SEM) was developed and SPSS12.0 and AMOS 7.0 were used for analyses. The results are summarized as follows: 1) security trust perceived by employees positively influences on perceived usefulness and perceived ease of use; 2) employee-s knowledge on RFID positively influences on only perceived ease of use; 3) a partner-s influence for RFID acceptance positively influences on only perceived usefulness; 4) service provider trust very positively influences on perceived usefulness and perceived ease of use 5) the relationships between TAM variables are the same as the previous studies.

Authors:



References:
[1] Chircu and R. J. Kauffman, "Limits to Value in Electronic
Commerce-Related IT Investments," Journal of Management Information Systems, vol. 17, no. 2, pp. 59-80, 2000.
[2] M. Sharif, T. Elliman, P. E. D. Love, and A. Badii, "Integrating the IS with the enterprise: key EAI research challenges," The Journal of
Enterprise Information Management, vol. 17, no. 2, pp. 164-170,2004.
[3] Sharma and A. Citurs, "Drivers and Rationales in RFID Adoption and Post Adoption Integration: An Integrative Perspective on IOS Adoption," SIGADIT(DIGT) Workshop, pp. 1-22, 2005.
[4] S. Neo, P. E. Khoo and S. Ang, "The Adoption of TradeNet by the
Trading Community: An Empirical Analysis," proceedings of the
15th Annual International Conference on IS, 1995.
[5] Szajna, "Empirical Evaluation of the revised technology acceptance
model," Management Science, vol. 42, no. 1, pp. 85-92, 1996.
[6] Fornell and D. F. Larcker, "Evaluating Structural Equation Models
with Unobservable Variables and Measurement Error," Journal of
Marketing Research, vol. 18, pp. 39-50, 1981.
[7] L. Iacovou, I. Benbasat and A. S. Dexter, "Electronic Data
Interchange and Small Organizations: Adoption and Impact of
Technology," MIS Quarterly, vol. 19, no. 4, 1995.
[8] N. Prather and L. K. Gundry, "Blueprints for Innovation," New York,
AMA, 1995.
[9] Perakslis, and R. Wolk, "Social acceptance of RFID as a biometric
security method," IEEE technology &society magazine, vol.25,
no.3, pp. 34-42, 2006.
[10] Bill and A. H. A. Eman, "Adoption of Mobile Technology in the
Supply Chain: An Exploratory Cross-Case Analysis:," International
Journal of E-Business Research, vol. 4, issue 4, pp. 1-15, 2008.
[11] Gefen, "E-commerce: the role of familiarity and trust," Omega, vol.
28, pp. 725-737, 2000.
[12] D. Gefen, E. Karahanna, and D. W. Straub, "Trust and TAM in
Online Shopping: An Integrated Model," MIS Quarterly, vol. 27, no.
1, pp. 51-90, 2003.
[13] D. W. Straub, M. Keil, and W. Brenner, " Testing the technology
acceptance model across cultures: a three country study,"
Information Management, vol. 33, pp. 1-11, 1997.
[14] M. Rogers, Diffusion of Innovations, 4th ed., Free Press, New York,
NY, 1995.
[15] F.D. Davis, "Perceived usefulness, perceived ease of use, and user
acceptance of information technology," MIS Quarterly, vol. 13, no.
3, pp. 319-340, 1989.
[16] Muller-Seitz, K. Dautzenberg, U. Creusen, and C.
Stromereder, "Customer acceptance of RFID technology: Evidence
from the German electronic retail sector," Journal of retailing and
consumer services, vol.16, no.1, pp.31-39, 2009.
[17] Yang and S. L. Jarvenpaa, "Trust and Radio Frequency
Identification(RFID) Adoption within an Alliance," Proceedings of
the 38th Hawaii International Conference on System Sciences-2005,
pp. 1-10, 2005.
[18] K. Lui and R. Jamieson, "Integrating Trust and Risk Perceptions in
Business-to-Consumer Electronic Commerce with the Technology
Acceptance Model," European Conference on Information
Systems(ECIS 2003), Naples, 2003.
[19] Chen and B.C. Williams, "The impact of electronic data interchange
(EDI) on SMEs: summary of eight British case studies," Journal of
Small Business Management, vol. 36, no. 3, pp. 68-72, 1998.
[20] F. Hair, R. E. Anderson, R. L. Tatham and W. C. Black, "Multivariate
data analysis," fifth edition, Prentice-Hall, Upper Saddle River, NJ.
[21] J. K. Kim, "The study about antecedent factors for continuous use of
application service," KAIST Business Service Online Service, vol. 27,
2007, http://kowledge.kaist.ac.kr.
[22] J. N. Lee, "A Bilateral Perspective on Trust Building in IT
Outsourcing", The Korea Society of Management Information
Systems, proceeding paper, 2006.
[23] J. Y. L. Thong, "An Integrated Model of Information Systems
Adoption in Small Business," Journal of Management Information
System, vol. 15, no. 4, pp. 187-214, 1999.
[24] Mathieson, "Predicting user intentions: comparing the technology
acceptance model with the theory of planned behavior," Information
Systems Research, vol. 2, no.3, pp. 173-190, 1991.
[25] C. Abrams, C. E. L. Rob, and Z. L. Daniel, "Nurturing interpersonal
trust in knowledge-sharing networks," Academy of Management
Executive, vol. 17, no. 4, pp. 64-77, 2003.
[26] L. R. Vijayasarathy "Predicting Consumer Intentions to Use Online
Shopping: The Case for an Augmented Technology Acceptance
Model", Information & Management, vol. 41, no. 6, pp. 747-762. ,
2004.
[27] L. Raymond and F. Bergeron, "EDI Success in Small- and
Medium-Sized Enterprises: A Field Study," Journal of
organizational computing and electronic commerce, vol.6, no. 2 ,
pp.161-172 1996.
[28] L. T. Hu and P. M. Bentler, "Cutoff criteria for fit indexes in
covariance structure analysis: Conventional criteria versus new
alternatives," Structured Equation Modeling, vol. 6, no. 1, pp. 1-55,
1999.
[29] L.V. Huy and P. Filiatrault, "The Adoption of E-commerce in SMEs
in Vietnam: A Study of Users and Prospectors," The Tenth Pacific
Asia Conference on Information Systems, pp. 1335-1344, 2006.
[30] M. H. Muhammad and R. P. Victor, "Consumer Acceptance of RFID
Technology: An Exploratory Study," IEEE Transactions on
Engineering Management, vol. 55, no. 2, pp. 316-326, 2008.
[31] Koufaris, "Applying the technology acceptance model and flow
theory to online consumer behavior," Information Systems Research,
vol. 13, no. 2, pp. 205-223, 2002.
[32] M. Meints, "Social Acceptance of RFID in Retail,"
http://www.fidis.net, 2007.
[33] M. S. Lee, "The Effect of Trust and Perceived Risk on the RFID
Technology Acceptance - An Empirical Study by the employees in
the Company or Public Enterprise-," ph. D Thesis, 2007.
[34] Gunther and S. Spiekermann, "RFID and the perception of control,"
Communications of the ACM, vol. 48, no. 9, pp. 73-76, 2005.
[35] B. Cragg and M. King, "Information systems and small firm
performance: Case study evidence," European Conference on
Information Systems, pp. 424-432, 1993.
[36] Chwelos, I. Benbasat and A. S. Dexter, "Empirical Test of an EDI
Adoption Model," Information System Research, vol. 12, no. 3,
September 2001.
[37] M. Doney and J. P. Cannon, "An examination of the nature of trust in
buyer-seller relationships," Journal of Marketing, vol. 2, no. 61,
1997.
[38] C. Mayer, J. H. Davis and F.D. Schoorman, "An integrative model of
organizational trust," Academy of Management Review, vol. 20, no.
3, pp. 709-734, 1995.
[39] L. Thompson, C. A. Higgins and J. M. Howell, "Influence of
Experience on Personal Computer Utilization: Testing a Conceptual
Model," Journal of Management Information Systems, vol. 11, no. 1,
pp. 167-187, 1995.
[40] R. M. Morgan and S. D. Hunt, "The commitment-trust theory of
relationship marketing," Journal of Marketing , vol. 58, pp. 20-38,
1994.
[41] Graziolo and S. L. Jarvenpaa, "Perils of Internet fraud: an empirical
investigation of deception and trust with experienced internet," IEEE
Transactions on Systems, Man, and Cybernetics Part A: Systems and
Humans, vol. 30, no. 4, pp. 395-410, 2000.
[42] S. Teo and M. Tan, "An empirical study of adopters and
non-adopters of the Internet in Singapore," Information &
Management, vol. 34, pp. 339-345, 1998.
[43] Matta and C. Moberg, "Defining the Antecedents for Adoption of
RFID in the Supply Chain," Issues in Information Systems, vol. 8, no.
2, pp. 449-454, 2007.
[44] Y. G. Kim, " The Effect of Trust to the Cooperation between Service
Customer and Service Provider," Korea Consumption Culture
Association, pp. 147-152, 1999.
[45] Z. K. Shalhoub, "Trust, privacy, and security in electronic business:
the case of the GCC countries," Information Management &
Computer Security, vol. 14, no. 3, pp. 270-283, 2006.
[46] RFIDnews (2008, May), "Korea-s largest retailers adopt RFID,"
http://www.rfidnews.org.