3,138
Views
56
CrossRef citations to date
0
Altmetric
Articles

Impact of privacy concerns on resistance to smart services: does the ‘Big Brother effect’ matter?

&
Pages 1460-1479 | Received 01 Mar 2019, Accepted 04 Aug 2019, Published online: 23 Sep 2019

References

  • Balta-Ozkan, N., Davidson, R., Bicket, M., & Whitmarsh, L. (2013). Social barriers to the adoption of smart homes. Energy Policy, 63, 363–374.
  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041.
  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
  • Ching, K. W., & Singh, M. M. (2016). Wearable technology devices security and privacy vulnerability analysis. International Journal of Network Security & Its Applications, 8(3), 19–30.
  • Corbin, J. M., & Strauss, A. (1990). Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative Sociology, 13(1), 3–21.
  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–339.
  • Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886.
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.
  • Foroudi, P., Gupta, S., Sivarajah, U., & Broderick, A. (2018). Investigating the effects of smart technology on customer dynamics and customer experience. Computers in Human Behavior, 80, 271–282.
  • Galič, M., Timan, T., & Koops, B.-J. (2016). Bentham, Deleuze and beyond: An overview of surveillance theories from the panopticon to participation. Philosophy & Technology, 30(1), 9–37.
  • Hair, J. F., Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1995). Multivariate data analysis (3rd ed.). New York: Macmillan.
  • Hair, J. F. J., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis. Pearson Prentice Hall, NJ: Upper Saddle River.
  • Hazée, S., Delcourt, C., & Van Vaerenbergh, Y. (2017). Burdens of access: Understanding customer barriers and barrier-attenuating practices in access-based services. Journal of Service Research, 20(4), 441–456.
  • Heidenreich, S., & Spieth, P. (2013). Why innovations fail — The case of passive and active innovation resistance. International Journal of Innovation Management, 17(5), 1–42.
  • Hong, A., Changi, N., & Seongcheol, K. (2017, June 24-27). Analysis of the barriers that consumers encounter when smart home service is introduced in South Korea. 14th International Telecommunications Society (ITS) Asia-Pacific Regional Conference: “Mapping ICT into Transformation for the Next Information Society, Kyoto, Japan.
  • Hsu, C.-L., & Lin, J.-C.-C. (2016). Exploring factors affecting the adoption of internet of things services. Journal of Computer Information Systems, 58(1), 49–57.
  • Hufnagel, E. M., & Conca, C. (1994). User response data: The potential for errors and biases. Information Systems Research, 5(1), 48–73.
  • Inman, J. J., & Nikolova, H. (2017). Shopper-facing retail technology: A retailer adoption decision framework incorporating shopper attitudes and privacy concerns. Journal of Retailing, 93(1), 7–28.
  • Juric, J., & Lindenmeier, J. (2018). An empirical analysis of consumer resistance to smart-lighting products. Lighting Research & Technology, 51(4), 489–512.
  • Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly, 33, 567–582.
  • Kim, Y., Park, Y., & Choi, J. (2017). A study on the adoption of IoT smart home service: Using value-based adoption model. Total Quality Management & Business Excellence, 28(910), 1149–1165.
  • Kleijnen, M., Lee, N. J., & Wetzels, M. (2009). An exploration of consumer resistance to innovation and its antecedents. Journal of Economic Psychology, 30(3), 344–357.
  • Kostka, G. (2019). China’s social credit systems and public opinion: Explaining high levels of approval. New Media & Society, 21(7), 1565–1593.
  • KPMG. (2015). The internet of things should we embrace its full potential? Retrieved from https://assets.kpmg/content/dam/kpmg/pdf/2016/05/Cyber-Insights-Magazine-The-Internet-of-Things.pdf
  • Krafft, M., Arden, C. M., & Verhoef, P. C. (2017). Permission marketing and privacy concerns — Why do customers (not) grant permissions? Journal of Interactive Marketing, 39, 39–54.
  • Kuner, C., Cate, F. H., Millard, C., & Svantesson, D. J. B. (2013). PRISM and privacy: Will this change everything? International Data Privacy Law, 3(4), 217–219.
  • Lancelot-Miltgen, C., Henseler, J., Gelhard, C., & Popovič, A. (2016). Introducing new products that affect consumer privacy: A mediation model. Journal of Business Research, 69(10), 4659–4666.
  • Laukkanen, T. (2016). Consumer adoption versus rejection decisions in seemingly similar service innovations: The case of the Internet and mobile banking. Journal of Business Research, 69, 2432–2439.
  • Lichy, J., Kachour, M., & Khvatova, T. (2017). Big data is watching YOU: Opportunities and challenges from the perspective of young adult consumers in Russia. Journal of Marketing Management, 33(910), 719–741.
  • Lim, C., & Maglio, P. P. (2018). Data-driven understanding of smart service systems through text mining. Service Science, 10(2), 154–180.
  • Lwin, M. O., & Williams, J. D. (2003). A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters, 14(4), 257–272.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
  • Mani, Z., & Chouk, I. (2017). Drivers of consumers’ resistance to smart products. Journal of Marketing Management, 33(1/2), 76–97.
  • Mani, Z., & Chouk, I. (2018). Consumer resistance to innovation in services: Challenges and barriers in the Internet of Things era. Journal of Product Innovation Management, 35(5), 780–807.
  • Marakhimov, A., & Joo, J. (2017). Consumer adaptation and infusion of wearable devices for healthcare. Computers in Human Behavior, 76, 135–148.
  • Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social Issues, 33(3), 5–21.
  • MarketandMarket. (2017). IoT in banking and financial services market by solution. Retrieved from https://www.marketsandmarkets.com/Market-Reports/iot-banking-financial-services-market-172304505.html
  • Minerva, R. (2016). Toward a definition of internet of things. Retrieved from http://www.tlc.dii.univpm.it/blog/wp-content/uploads/2016/06/Course-DAY-3_b.pdf
  • Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35(1), 27–44.
  • Morimoto, M., & Macias, W. (2009). A conceptual framework for unsolicited commercial e-mail: Perceived intrusiveness and privacy concerns. Journal of Internet Commerce, 8(34), 137–160.
  • Novak, T. P., & Hoffman, D. L. (2018). Relationship journeys in the internet of things: A new framework for understanding interactions between consumers and smart objects. Journal of the Academy of Marketing Science, 47(2), 216–237.
  • Pantano, E., Priporas, C. V., & Dennis, C. (2018). A new approach to retailing for successful competition in the new smart scenario. International Journal of Retail & Distribution Management, 46(3), 264–282.
  • Park, K., & Koh, J. (2017). Exploring the relationship between berceived pace of technology change and adoption resistance to convergence products. Computers in Human Behavior, 69, 142–150.
  • Peñaloza, L., & Price, L. (1993). Consumer resistance: A conceptual overview. In L. McAlister & E. M. Rothschild (coord.) (Eds.), Advances in consumer research, 20 (pp. 123–128). Provo, Utah: Association for Consumer Research.
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
  • Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are transforming competition. Harvard Business Review, 92(11), 64–88.
  • Ram, S., & Sheth, J. N. (1989). Consumer resistance to innovations: The marketing problem and its solutions. Journal of Consumer Marketing, 6(2), 5–15.
  • Rosenfeld, P., Booth-Kewley, S., Edwards, J. E., & Thomas, M. D. (1996). Responses on computer surveys: Impression management, social desirability, and the Big Brother syndrome. Computers in Human Behavior, 12(2), 263–274.
  • Roux, D. (2007). Consumer resistance: Proposal for an integrative framework. Recherche Et Applications En Marketing (english Edition), 22(4), 59–79.
  • Roy, S. K., Balaji, M. S., Quazi, A., & Quaddus, M. (2018). Predictors of customer acceptance of and resistance to smart technologies in the retail sector. Journal of Retailing and Consumer Services, 42, 147–160.
  • Roy, S. K., Balaji, M. S., Sadeque, S., Nguyen, B., & Melewar, T. C. (2017). Constituents and consequences of smart customer experience in retailing. Technological Forecasting and Social Change, 124, 257–270.
  • Samuelson, W., & Zeckhauser, R. (1988). Status quo bias in decision making. Journal of Risk and Uncertainty, 1, 7–59.
  • Sarpong, S., & Rees, D. (2014). Assessing the effects of “Big Brother” in a workplace: The case of WAST. European Management Journal, 32(2), 216–222.
  • Slettemeås, D. (2009). RFID-the “next step” in consumer-product relations or orwellian nightmare? Challenges for research and policy. Journal of Consumer Policy, 32, 219–244.
  • Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
  • Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
  • Wiegard, R.-B., & Breitner, M. H. (2017). Smart services in healthcare: A risk-benefit-analysis of pay-as-you-live services from customer perspective in Germany. Electronic Markets, 29(1), 107–123.
  • Wünderlich, N. V., Heinonen, K., Ostrom, A. L., Patricio, L., Sousa, R., Voss, C., & Lemmink, J. G. A. M. (2015). ‘Futurizing’ smart service: Implications for service researchers and managers. Journal of Services Marketing, 29(6/7), 442–447.
  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s information privacy concerns: Toward an integrative view. Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France.
  • Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users’ concerns for information privacy. Thirty Third International Conference on Information Systems: Association for Information Systems, Orlando, USA.
  • Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135–174.
  • Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75–89.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.