You are on page 1of 13

316 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO.

2, MAY 2008

Consumer Acceptance of RFID Technology:


An Exploratory Study
Muhammad Muazzem Hossain and Victor R. Prybutok, Member, IEEE

Abstract—Radiofrequency identification (RFID) technology is and contextualizing it to the RFID technology. This contextu-
used in numerous applications and offers a plethora of interest- alization is done with the intent of extending the TAM to the
ing potential new applications. However, this potential raises is- acceptance of a specific technology—RFID technology. This
sues that require addressing to achieve its widespread acceptance
by consumers. This paper investigates the factors that affect con- study is the first in the RFID literature to utilize and contex-
sumer acceptance of RFID technology. The purpose of this effort tualize the TAM for explaining consumer acceptance of RFID
is to develop and test a theoretical model that contextualizes the technology.
technology acceptance model (TAM) within the context of RFID A special issue of the Communications of the Association for
technology. The research model proposes that convenience, cul- Computing Machinery (ACM) in 2005 (vol. 48, no. 9) was de-
ture, privacy, regulation, and security are the principal factors
influencing the consumers’ acceptance of RFID. However, the re- voted to RFID with a focus on increasing the understanding of
sults show that convenience, culture, and security are significant the technology. RFID is a technology that uses electromagnetic
predictors. This study is the first in the RFID literature to use transmission (i.e., radio waves) to store and retrieve data from an
the TAM for explaining consumer acceptance of RFID technol- identification chip. This chip is called an RFID tag or transpon-
ogy. The findings suggest that: 1) higher perceived convenience of der and is read by an RFID reader or transceiver without human
RFID technology leads to greater acceptance of this technology;
2) societal beliefs, value systems, norms, and/or behaviors influ- interaction. An RFID system comprises five key components—
ence the extent of consumer acceptance of RFID technology; and RFID tag or transponder, reader/writer, encoder, middleware,
3) higher perceived importance of and less willingness to sacrifice and application software [20]. An RFID tag consists of a mi-
personal information security lead to lower intention to use RFID crochip and an antenna. The RFID reader/writer requests the
technology. Contextualization of TAM to RFID technology makes identifying information contained in the microchip by sending
this study relevant to practitioners because the results can pro-
vide insight to organizations using or exploring the use of RFID an RF signal to the tag that then uses its antenna to transmit that
technology. information to the reader/writer via wireless data communica-
tion. The reader then translates the received information into a
Index Terms—Consumer acceptance, contextualization, radio
frequency identification (RFID) technology, technology acceptance digital form and sends it to the application software with the
model (TAM). help of middleware. The encoder, often the RFID reader/writer
itself, encodes the data for storage in the tag once or many times,
I. INTRODUCTION depending upon whether the RFID tag is a read-only tag or a
read-write tag [20].
ADIO frequency identification (RFID) technology is gain-
R ing attention both from academicians and from practition-
ers. RFID has the potential to serve as a fundamental technology
RFID was first invented in 1948 and has subsequently un-
dergone several developmental stages [4]. In the 1950s, the
explorations of RFID technology were confined to laboratory
for ubiquitous services where both objects and people can be
experiments while the development of theory and field trials
identified automatically via attached RFID tags [35]. However,
with RFID took place in the 1960s. The next decade saw an
with the promise of RFID technology come issues that need
explosion in the development and testing of RFID technology.
to be addressed for its widespread acceptance by consumers.
The commercial applications of RFID started in the 1980s, but in
For example, the use of RFID technology by retailers and gov-
the 1990s, RFID became more widely deployed [4]. RFID tech-
ernment agencies raises questions about potential violation of
nology is increasingly utilized to identify and track items and
personal information privacy [35], and potential security threats
people via an automated passive process that uses the tags [35].
to personal information [40]. Motivated by such issues, this
RFID technology is already used in several consumer appli-
study proposes and validates a theoretical model of consumer
cations. Commuters around the world use RFID tags to auto-
acceptance of RFID technology. The proposed model is devel-
matically pay for public transport and tolls without waiting in
oped based on the extant literature and provides a theoretical
line for a teller [36]. Some examples of such RFID tags include
framework of the critical factors that determine the consumer’s
the T-Money in South Korea, EZ-Link Card in Singapore, Touch
acceptance of RFID technology. A contribution of this paper
n Go Card in Malaysia, Octopus Card in Hong Kong, Oyster
involves reviewing the technology acceptance model (TAM)
Card in London, Easy Card in Taiwan, EZ Tag in North Texas
and Houston, FasTrak in California, Pikepass in Oklahoma, and
Manuscript received September 1, 2006; revised June 27, 2007. Review of
this manuscript was arranged by Department Editor A. Chakrabarti. SunPass in Florida. Microwave RFID tags are used by many
The authors are with the Information Technology and Decision Sciences car owners to access control of their vehicles [47]. For exam-
Department, College of Business Administration, University of North Texas, ple, consumers of the Toyota Prius, Toyota Avalon, and Lexus
Denton, TX 76201 USA (e-mail: hossainm@unt.edu; prybutok@unt.edu).
Digital Object Identifier 10.1109/TEM.2008.919728 brands can use their Smart Key, an RFID-enabled tag, to open

0018-9391/$25.00 © 2008 IEEE

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
HOSSAIN AND PRYBUTOK: CONSUMER ACCEPTANCE OF RFID TECHNOLOGY: AN EXPLORATORY STUDY 317

doors and start their cars remotely. The RFID technology offers TAM requires modification and extension to account for addi-
a plethora of interesting potential applications, such as the use tional constructs that are suggested in the RFID literature. The
of RFID in “microwave ovens that can read the tags on pack- model proposed in this study contextualizes the TAM to RFID
ages and cook food without explicit instructions, refrigerators technology by substituting the perceived convenience of using
that can recognize expired foods, and closets that can tally their RFID technology for perceived usefulness and perceived ease of
contents” [25, p. 103]. use of the technology because perceived convenience embodies
However, review of the IS literature shows a lack of research both concepts. The contextualized model is then extended by
about the consumer acceptance issues relevant to RFID tech- adding four constructs—perceived privacy, perceived security,
nology. There are some fragmented studies in the IS litera- perceived regulations’ influence, and perceived culture’s influ-
ture that explore the factors affecting consumer acceptance of ence. Perceived privacy and perceived security each consist of
RFID technology. The extant literature suggests that compa- two dimensions resulting in four variables, namely importance
nies providing RFID-based solutions must address the issues of privacy, unwillingness to sacrifice privacy, importance of se-
of privacy and security threats resulting from the use of RFID- curity, and unwillingness to sacrifice security.
based systems [35], [36], and capitalize on the convenience that
RFID-based applications provide to the consumer [14]. RFID A. Technology Acceptance Model
technology poses a set of unique challenges in terms of privacy,
security, and monetary benefits [36], which are relevant to con- The TAM was originally proposed by Davis [10] and later was
sumer acceptance of this technology becoming a part of daily extended by Davis et al. [11]. The modified TAM incorporated
activities. into the original TAM a mediating variable (behavioral intention
Consumer acceptance of RFID technology is a complex issue, to use technology) that precedes the dependent variable (usage
but the main focus of the consumer is likely to be the usefulness of the technology). TAM posits that perceived usefulness and
of the technology [24]. Various theories have evolved over the perceived ease of use determine the user’s intention to use infor-
past half century to explain the adoption of a technology such mation technology. Perceived usefulness is defined as the extent
as RFID by consumers. The theory of reasoned action (TRA) that individuals believe their job performance is enhanced by
developed by Fishbein and Ajzen [15] posits that behavior is a using a particular technology. Perceived ease of use is defined
result of behavioral intention. Therefore, the consumers’ inten- as the extent to which an individual believes that using a partic-
tion to use RFID technology influences their acceptance of this ular system is free of effort. TAM also postulates that perceived
technology. Thus, the consumer’s intention to use RFID tech- ease of use is a predictor of perceived usefulness.
nology and the consumer’s acceptance of RFID technology are Researchers have utilized and validated TAM for use with
used synonymously. numerous types of technology [51]. Some studies suggest that
TAM successfully predicts an individual’s acceptance of various
corporate information technologies [1], [8], [12], [39]. Accord-
II. THEORETICAL BACKGROUND ing to Straub et al. [42], TAM may hold across technologies,
A review of the relevant literature suggests that the TAM [10] people, settings, and times. Recently, TAM has its footprints
[11] and the theory of planned behavior (TPB) [5] are the two in e-commerce [50], [51], and mobile service [46]. This study
widely used theoretical frameworks that are relevant to why expands TAM to the study of consumer acceptance of the RFID
users accept or reject information technology [30]. Numerous technology.
studies have validated the effectiveness of TAM in predicting
the user’s intention to use IT [2], [28], [51]. IS researchers have III. RESEARCH MODEL AND HYPOTHESES
extensively investigated TAM and extended it with constructs This study proposes and validates the research model pre-
such as impulsiveness and social norms [51], perceived user re- sented in Fig. 1 based on the IS acceptance literature, especially
sources [31], compatibility [7], perceived credibility [45], per- by Davis [10] and Davis et al. [11]. The research model is
ceived financial cost [29], perceived financial resource [46], based on TAM, but substitutes perceived usefulness and per-
computer self-efficacy [3], and importance of service in an ceived ease of use with perceived convenience of using RFID
online shopping environment [49]. Some studies employed technology to contextualize TAM to RFID technology. The con-
TAM to explain individual differences in accepting information textualized TAM is then extended by adding perceived cultural
technology [32] and in understanding the cultural differences influence, perceived privacy, perceived regulations’ influence,
of technology acceptance [43], [33]. Because of the broad basis and perceived security to the model. Table I summarizes the
of applications established by TAM, TAM provides a founda- research constructs.
tion for this study. However, the RFID technology embodies
some technological and usage-context factors such as privacy
A. Perceived Convenience (Perceived Usefulness and Perceived
and security issues [35], [14] that potentially alter the tradi-
tional TAM model for use in explaining the user acceptance Ease of Use)
of this technology. The specific influences of such technolog- The dictionary definition of convenience includes usefulness,
ical and usage-context factors are not entirely reflected by the benefit, comfort, ease, and fitness. The perceived convenience of
principal constructs of TAM [11]. Thus, the constructs of TAM using RFID technology is defined as the extent to which a con-
require modification to fit the context of RFID technology and sumer believes that using an RFID device is comfortable, free

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
318 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO. 2, MAY 2008

perceived usefulness, respectively, in the TAM. Therefore, we


posit that TAM is contextualized to RFID TAM by substituting
perceived convenience for perceived ease of use and perceived
usefulness.
People tend to use a technology if they perceive that the
technology is easy to use and will help them perform their
job better [10]. Similarly, Eckfeldt [14] suggests that com-
panies providing RFID-based solutions should leverage the
potential convenience that RFID-based applications provide
to the consumer. For instance, the EZ-Pass toll collection
system and ExxonMobil Corporation’s Speedpass system re-
main highly successful RFID applications in terms of con-
sumer acceptance because these systems provide consumers
with greater convenience. According to Zhang and Prybu-
tok [48], service convenience increases the consumers’ satis-
faction level and affects consumer intention. Therefore, RFID-
Fig. 1. Research model for consumer acceptance of RFID (CARFID)
technology. based systems are more likely to achieve better adoption rates
if they make the consumers’ life more convenient [14]. Follow-
TABLE I ing this argument, the following alternative hypothesis can be
SUMMARY OF CONSTRUCTS
proposed.
Ha 1: The perceived convenience of using RFID technology
has a significant positive influence on consumer intention to use
this technology.

B. Perceived Culture’s Influence


While culture is not easy to define, many researchers have
attempted to do so. For instance, Hofstede [21, p. 5] defined
culture as “the collective programming of the mind which dis-
tinguishes the members of one human group from another”.
According to Kluckhohn [27, p. 86], culture is the “ways of
thinking, feeling and reacting, acquired and transmitted by sym-
bols, constituting the distinctive achievements of human groups,
including their embodiments in artifacts; the essential core of
culture consists of traditional (i.e., historically derived and se-
lected) ideas and especially their attached values”. Integrating
the aforementioned definitions, culture is defined as the be-
liefs, value systems, norms, or behaviors of a given organiza-
tion, or society. Perceived culture’s influence on RFID technol-
ogy is, therefore, the degree to which an individual believes
that his or her society’s beliefs, value systems, norms, or be-
haviors would influence the use of RFID technology. Studies
focused on culture’s influence on the acceptance of technol-
ogy provide mixed results. Straub et al. [42] suggest that a
link between cultural factors and technology acceptance are
not empirically established with certainty. However, McCoy
et al. [33] extended the work of Straub et al. [42] by col-
lecting culture data and validating TAM in Uruguay and the
USA. They suggest that the TAM is appropriate to explain vari-
ations of intention to use a technology across cultures. In other
words, the influence that a culture has on technology has a
of effort, and is fit for performing a task or fulfilling a require- bearing on the intention to use the technology by the members
ment in a given time and place. Examining the aforementioned of that culture. Thus, the following alternative hypothesis is
definition reveals two critical aspects of convenience—ease of proposed.
use (includes comfortability and free of effort) and usefulness Ha 2: The influence of culture on perceptions about RFID
(includes fitness of performing tasks). These two aspects of per- technology has a significant bearing on the intention to use
ceived convenience are analogous to perceived ease of use and RFID technology by the members of that culture.

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
HOSSAIN AND PRYBUTOK: CONSUMER ACCEPTANCE OF RFID TECHNOLOGY: AN EXPLORATORY STUDY 319

C. Perceived Privacy dards outlined by the law. In this study, regulation is defined
Privacy definitions vary according to both the context and the to include laws, privacy policies, and fair information prac-
environment [37]. In the broadest sense, privacy is defined as the tices. Prior studies suggest that regulations play a critical role
in addressing potential privacy and security threats to personal
right to be left alone [23]. However, Privacy International [37]
argues that there are four types of privacy—information pri- data [23], [35], [38]. For instance, Squicciarini et al. [41] claim
that privacy policies should identify the recipients for the user
vacy, bodily privacy, privacy of communications, and territorial
data, the intended use of the data, and how long the data will
privacy. The most relevant to the RFID technology acceptance
debate is information privacy [23]. Information privacy is de- be retained. In the context of RFID technology, RFID devel-
opers, vendors, and government regulatory agencies must rec-
fined as the right of individuals to control the collection and
ognize the privacy and security threats, and take appropriate
use of their personal information, even after they have disclosed
it to others. For instance, if an individual provides his/her per- countermeasures to increase the willingness of consumers to
cooperate with the economic and social infrastructure of RFID
sonal information to a company while obtaining a product or a
technology [35]. In this vein, many consumer and privacy policy
service, then he/she has the right to object to any further use of
his/her information other than is necessary for delivery of the groups are calling for the development of privacy policy guide-
lines to protect consumers from privacy and security threats
particular product or the service. Perceived privacy in the con-
text of RFID technology, and as used in this study, is defined as that potentially occur from the use of RFID technology [23].
the extent that a consumer has the right to control the collection Jones et al. [23] also argue that public policy guidelines reg-
ulating RFID technology are capable of increasing consumer
and use of his/her personal information via RFID technology.
RFID-based application systems pose various threats to personal trust and confidence in RFID. Furthermore, this increased con-
information privacy. For example, in retailing, if personal iden- sumer trust and confidence in RFID is more likely to improve
the consumer acceptance rates of RFID technology. This im-
tification data are linked to a unique product code and stored on
an RFID tag, then retailers can build profiles of their customers plies that regulations have a significant positive influence on the
and customer buying behaviors. This can help retailers infer not future use of RFID technology. The alternative hypothesis is as
follows.
only their customers’ buying behaviors but also characteristics
of their customers’ health, lifestyle, and travel [23]. The col- Ha 4: The consumers’ perception of regulatory protections
associated with RFID technology is positively associated with
lection of personal information by organizations intensifies the
their intention to use RFID technology.
consumers’ concerns about personal privacy because the infor-
mation collected is potentially available to third parties [13].
Ohkubo et al. [35] identified two privacy issues that complicate E. Perceived Security
the adoption of RFID technology: leakage of the consumer’s per-
sonal information and tracking of the consumer’s physical loca- Security refers to the protection against security threat, which
tion. However, Ohkubo et al. [35] also argue that perceptions of is defined as a "circumstance, condition, or event with the po-
these privacy issues differ, depending upon personal tolerance. tential to cause economic hardship to data or network resources
A consumer with lower personal tolerance for the aforemen- in the form of destruction, disclosure, modification of data,
tioned issues places higher importance on personal privacy and denial of service, and/or fraud, waste, and abuse” [26]. This
is less willing to sacrifice privacy than the one with a higher definition asserts that security threats can take place through
personal tolerance for such privacy issues. In other words, the network and data transactions attacks as well as through unau-
perceived privacy of using RFID technology depends on how thorized access [6]. The use of RFID tags presents potential
consumers perceive the importance of personal privacy and on security threats because a third party can gather or steal per-
the extent to which consumers are willing to sacrifice their per- sonal information knowingly or unknowingly [40]. Security is
sonal privacy. A consumer with higher privacy concerns and less a major issue pertaining to the acceptance of RFID-based ap-
willingness to sacrifice personal privacy has a decreased like- plications. However, Smith [40] argues that RFID-based ap-
lihood of using RFID-based application systems than the con- plication systems should create improved customer satisfaction
sumer with lower concerns and some willingness to sacrifice per- and loyalty. Such improved customer satisfaction gained from
sonal privacy. Thus, the following alternative hypotheses can be RFID-based technology increases the likelihood of future use
postulated. of the technology. Therefore, the key to increased consumer
Ha 3a: The higher the perceived importance of personal pri- acceptance of RFID technology is to assess the benefits of
vacy, the lower the intention to use RFID technology. the technology from consumer’s point of view. Consumers ac-
Ha 3b: The less willing the consumer is to sacrifice personal cept security risks if they believe that the benefits accrued are
privacy, the lower their intention to use RFID technology. worth the risk. In effect, consumers estimate the benefits and
risk exposure before they willingly use a system [14]. This
leads to the proposition that consumer acceptance of RFID
D. Perceived Regulations’ Influence technology is influenced by how consumers view the impor-
Regulation is generally defined as the use of law in gener- tance of security and how willing they are to sacrifice security
ating desired outcomes. For example, regulating RFID tech- against the benefits derived from the use of the technology.
nology implies that a law is enacted to ensure that the use The following alternative hypotheses are based on the previous
of RFID technology complies with the requirements and stan- proposition.

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
320 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO. 2, MAY 2008

Ha 5a: The higher the perceived importance of personal infor- An online survey method was used to collect the data for
mation security, the lower the intention to use RFID technology. the study. The survey was developed in “websurveyor” and the
Ha 5b: The less willing consumers are to sacrifice their per- link was e-mailed to the prospective respondents. The sample
sonal information security, the lower their intention to use RFID consisted of undergraduate and graduate students enrolled in
technology. various business courses in a major southwestern university in
the United States, the University of North Texas. The University
of North Texas is situated 35 miles north of Dallas, TX, and is a
IV. RESEARCH METHODOLOGY leading public university in the region with a student population
One independent construct (perceived convenience) and the of almost 35 000. About 35% of its students commute from
dependent construct (intention to use RFID) were contextu- Dallas via the North Texas Tollway Authority (NTTA) Tollway
alized from the TAM [10] to consumer acceptance of RFID and President George Bush Turnpike [44]. Commuters using
technology model. The term contextualization was first used by either of these two major roads often use NTTA TollTag, an
linguists involved in translating biblical meanings into contem- RFID tag, to pay their toll. Therefore, a significant portion of
porary cultural contexts [19]. Formally adopted by scholars in the students at the University of North Texas are familiar with
the Theological Education Fund (TEF) in early 1950s, contex- RFID toll technology. Thus, the sample was appropriate for this
tualization refers to correctly reading and relating the meaning study.
of sections of the Bible to a specific context [18]. In this study, The survey was sent to 307 students and administered over a
contextualization involves modifying the constructs or ideas period of 24 days. Though it was a convenience sampling, these
of a model to fit the context of the application. For instance, students were chosen to participate in the survey because they
perceived convenience embodies perceived usefulness and per- attended classes that provide an introduction to RFID technol-
ceived ease of use, which are two major constructs of the TAM. ogy about one month prior to the administration of the survey.
The TAM [10, p. 985] perspective is “to provide an explanation Two hundred and fifty six usable responses were obtained at the
of the determinants of computer acceptance that is generally end of the survey period. This represents a 83.4% response rate.
capable of explaining user behavior across a broad range of The responses were divided into an early-response group and
end-user computing technologies and user populations, while at late-response group to check for any early-versus-late response
the same time being both parsimonious and theoretically justi- bias. Independent sample t-tests were used to test for such bias
fied”. Consistent with this definition, TAM provides the foun- in the data. Conducting t-tests using SPSS showed the absence
dation for a generic technology acceptance construct. However, of early-versus-late response bias.
to relate TAM to a specific technology such as RFID technol-
ogy, we need to correctly understand the contextual issues of
the TAM constructs as applicable to that specific technology. V. ANALYSES AND RESULTS
In the context of RFID technology, perceived usefulness and The data were initially factor analyzed to identify the rele-
perceived ease of use delineate the concept of perceived con- vant factors. The results of the factor analysis for independent
venience. We, therefore, contextualized these constructs from measures are shown in Table II and those for dependent mea-
the TAM to perceived convenience in our consumer acceptance sure in Table III. Table II shows that the factor analysis resulted
of RFID technology model. None of the other constructs were in seven factors that measure the independent variables. The
previously measured in the context of RFID usage. Thus, pro- items loaded into factors as expected based on the theory ex-
prietary scales for six independent constructs were developed cept for two items—CULOPU and REGSUP2. CULOPU is a
based on prior literature and reviewed by experts in the field. The measurement item of culture’s influence on RFID technology,
reviewers include university professors who have been teach- also loaded with the items of convenience with a cross-load of
ing various courses on information technology for more than 0.314. REGSUP2 is a measurement item of regulations’ influ-
a decade and are actively involved in research in the field of ence on RFID, simultaneously loaded with the items of security
RFID technology. Each reviewer was given a copy of the ini- measurement with a cross-load of 0.324. Since the study is
tial instrument comprising 82 items measuring eight constructs exploratory in nature, a cross-loading of less than 0.5 is ac-
and asked to comment. A pilot test with 15 experts who are ceptable [17]. A separate factor analysis was conducted for the
pursuing doctoral degrees in information technology, logistics, dependent measure. Table III shows that the factor analysis re-
and marketing also was conducted. The objective of the review sulted in one factor for the dependent variable.
and pilot test was to ensure that none of the items were am- The reliability of the factors was checked using Cronbach’s
biguous and that the items adequately captured the domain of alpha. A Cronbach’s alpha of 0.65 or higher [34] was used as
interest [9]. Seven items were eliminated based on the expert an acceptable value for internal consistency of the measures.
opinion. The final instrument (see the Appendix) consisted of a The Cronbach’s alpha of the dependent variable (intention to
total of 75 items measuring seven independent variables and one use RFID) is 0.868. The Cronbach’s alphas for independent
dependent variable. Expert opinion indicated that the scales had variables range from 0.699 to 0.958. These values support the
adequate content validity. A few demographic variables were contention that all the factors had adequate reliability, though
also included in the instrument. Responses to all items were the 0.699 value is marginal. The reliabilities of the factors are
measured using a seven-point Likert scale anchored between 1 shown in Tables II and III. The item–total correlations were
(strongly disagree) and 7 (strongly agree). examined to ensure that the factors have acceptable convergent

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
HOSSAIN AND PRYBUTOK: CONSUMER ACCEPTANCE OF RFID TECHNOLOGY: AN EXPLORATORY STUDY 321

TABLE II
ROTATED COMPONENT MATRIX: INDEPENDENT VARIABLES

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
322 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO. 2, MAY 2008

TABLE III potheses (H3a, H3b, and H4), suggesting that PrivacyIMP, Pri-
ROTATED COMPONENT MATRIX: DEPENDENT VARIABLE
vacyWTS, and Regulation play insignificant roles in predicting
the intention to use RFID technology in the presence of the other
variables.

B. Discriminant Analysis
This study proposes that the perceived convenience of using
RFID, perceived culture’s influence on RFID, perceived im-
portance of personal privacy, perceived unwillingness to sacri-
fice personal privacy, perceived regulations’ influence on RFID,
perceived importance of personal information security, and per-
ceived unwillingness to sacrifice personal information security
affect the intention to use RFID technology. A discriminant
model was developed to show the underlying differences be-
tween the consumers who have higher intention to use RFID and
those who have lower intention to use RFID. As an initial step,
validity. Factors are deemed to have adequate convergent va- a cluster analysis was conducted. K-means clustering revealed
lidity if all item–total correlations equal or exceed the recom- that the data can be clustered into two groups—the “high inten-
mended criterion of 0.40 [22]. Table IV shows that all item–total tion to use RFID” group and the “low intention to use RFID”
correlations are more than the recommended criterion of 0.40, group. A discriminant analysis was then conducted with these
and supports the contention that the scales have adequate levels clusters as the dependent variables and the summated scores of
of convergent validity. The across factor correlations were then Convenience, Culture, PrivacyIMP, PrivacyWTS, Regulation,
compared to the reliabilities of the scales to check whether the SecurityIMP, and SecurityWTS as the independent variables.
scales displayed adequate discriminant validity [16]. A con- The results of the discriminant analysis are shown in Table VII.
struct has an adequate level of discriminant validity if the Consistent with the results of multiple regression analysis, the
reliability of the construct is higher than the correlations be- results of the discriminant analysis (Table VII) show that only
tween that construct and any other construct [16]. Table V Convenience, Culture, SecurityIMP, and SecurityWTS play sig-
shows that the scales also have adequate levels of discriminant nificant roles in discriminating the high intention to use RFID
validity. group from the low intention to use RFID group. But the p-value
In order to test the proposed hypotheses, two methods of of Box’s M-statistic posits that there was evidence of a viola-
analysis were employed—multiple regression analysis and dis- tion of the assumption of equal population variance structures.
criminant analysis. There are two types of assumptions underlying discriminant
analysis—the assumptions pertaining to the formation of the
A. Regression Analysis discriminant function (normality, linearity, and multicollinear-
ity) and the assumptions pertaining to the estimation of the dis-
Regression Analysis is a statistical tool concerned with eval-
criminant function (equal variance and covariances) [17]. Hair
uating the relationship between a dependent variable and one
et al. [17] argue that the sensitivity of the test to normality,
or more independent variables. The proposed research model
linearity, and multicollinearity makes the significance of covari-
(Fig. 1) in this study has one dependent variable and seven in-
ance differences less than 0.05 an acceptable level. Therefore,
dependent variables. Summated scores of the respective factors
the evidence of the violation of the assumption of equal pop-
were used to obtain the scores for both independent and de-
ulation variance structures does not distort the findings of the
pendent measures. For regression analysis, Intention was used
discriminant analysis that are in congruence with the findings
as dependent variable, and Convenience, Culture, PrivacyIMP,
of the regression analysis.
PrivacyWTS, Regulation, SecurityIMP, and SecurityWTS as in-
dependent variables.
The runs test, Levene’s test and Kolmogorov–Smirnov tests VI. DISCUSSION AND IMPLICATION
were conducted to test for randomness, constancy of variance, The objective of this study was to explore the factors that
and normality, respectively. These tests show that there is no affect consumer acceptance of RFID technology. The findings
evidence of violation of the assumptions underlying multiple re- suggest that convenience, culture, and security are significant in
gression analysis. Also, there is no evidence of multicollinearity predicting the intention to use RFID technology. However, sur-
because the VIFs and condition indexes are within acceptable prisingly, and contrary to the prior literature, the issue of privacy
levels (VIFs < 4.00 and condition indexes <30.00). as a factor to explain the future adoption of RFID technology
The results of multiple regression analysis (Table VI) show was found to be insignificant. One plausible explanation for such
that Convenience, Culture, SecurityIMP, and SecurityWTS are a finding may lie in the nature of how the RFID technology is
significant predictors of intention to use RFID technology. These used. From consumers’ point of view, the implementation of
findings support four hypotheses (H1, H2, H5a, and H5b). The RFID technology (such as the implementation of an automatic
results also show insufficient evidence for support of three hy- toll collection system) is such that consumers often do not realize

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
HOSSAIN AND PRYBUTOK: CONSUMER ACCEPTANCE OF RFID TECHNOLOGY: AN EXPLORATORY STUDY 323

TABLE IV
SCALE RELIABILITY AND CONVERGENT VALIDITY

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
324 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO. 2, MAY 2008

TABLE V
DISCRIMINANT VALIDITY OF CONSTRUCTS

TABLE VI
REGRESSION ANALYSIS PREDICTING INTENTION TO USE RFID

TABLE VII
DISCRIMINANT ANALYSIS: INTENTION TO USE RFID AND DETERMINANTS

that their personal privacy is threatened. Therefore, as consumer as the Internet influences perceptions about privacy issues. The
awareness about RFID usage increases, consumers may better more pervasive the positive influence of technology on people,
recognize the potential privacy threats that RFID technology the less the issue of personal privacy arises. Lastly, respondents
presents [35]. Another explanation is that consumers are aware could have provided significantly different responses depending
of the potential privacy threats that RFID technology presents on how they perceived the notion of privacy as it pertained to
but pay little attention to such issues. The underpinning of this personal information. This is possible because personal infor-
argument is that consumers are rational decision-makers and mation might have different meanings to different respondents.
believe that the benefits of using RFID technology (i.e., the For instance, personal information might imply name and ad-
convenience of using RFID technology) are greater than the dress to some respondents but social security number or health
potential privacy threat. Yet, a third explanation of such con- records to others.
trary findings may lie in the pervasive and ubiquitous nature As hypothesized, perceived convenience, perceived culture’s
of technology. The ever-increasing growth of technology such influence, and perceived security were found to have significant

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
HOSSAIN AND PRYBUTOK: CONSUMER ACCEPTANCE OF RFID TECHNOLOGY: AN EXPLORATORY STUDY 325

influence on the consumer’s willingness to accept the RFID test and validate the model by collecting data from a different
technology. Perceived convenience has a positive impact on composition of subjects.
the consumer intention to use RFID technology. This implies Another issue relevant to this research is that several of the
that the higher the perceived convenience of RFID technology, constructs used in this study are in the developmental stage.
the greater the consumer intention to use the technology. The Although RFID technology was invented in 1940s, academic
influence of culture on perceptions about RFID technology is research in this field has only recently gained momentum. Since
also a significant determinant of the consumer acceptance of scientific studies on the acceptance of this technology are scarce,
this technology. That is, the extent of consumer acceptance of there isn’t a well-developed, meaningful scale to measure the
RFID technology is influenced by societal beliefs, value sys- constructs used in RFID related studies. Therefore, furthering
tems, norms, or behaviors. Another significant determinant of the scale development of constructs relevant to the adoption of
the consumer acceptance of RFID technology is the perception RFID technology stated in this study provides researchers with
of personal information security. We found that the higher the an excellent avenue for future research.
perceived importance of personal information security and the The research model presented in this study is based on an
lower the willingness to sacrifice personal information security, extensive review of prior literature on the acceptance of RFID
the lower the intention to use RFID technology. technology. However, this study does not claim that a compre-
Contrary to the proposed hypothesis, this study also found hensive, exhaustive list of factors has been identified. Future
that regulations were not relevant to predicting the intention to studies can extend the model by incorporating constructs that
use RFID. There are two main reasons for such a contradictory can supplement the model.
finding. First, there are no well-defined, universal regulations Finally, the purpose of this study was to explore the factors
as to the control, implementation, and use of RFID technology. that have influenced the acceptance of RFID technology by con-
Second, the absence of such universal, comprehensible regula- sumers. However, the area of the adoption of RFID technology
tions leads to consumers’ misunderstanding of what regulations by organizations also offers tremendous research potential.
can and will do to produce a desired outcome.
Contextualization of TAM to consumer acceptance of RFID APPENDIX
technology model makes a unique contribution to the RFID liter-
SURVEY INSTRUMENT
ature, in particular, and to the IS literature, in general. Although
numerous studies have utilized, validated, and extended TAM to This survey aims at exploring the factors affecting consumer
explain the acceptance of various technologies, this study is the acceptance of RFID technology. RFID technology uses radio
first attempt in the IS literature to contextualize TAM within the waves to store data in and retrieve data from RFID tags us-
RFID environment. The concept of contextualization of a model ing an RFID reader. Examples of RFID tags include automated
to fit the needs and requirements of specific phenomenon has toll tags, clickers used in classrooms to collect and record stu-
manifold merits. First, contextualization benefits academicians dent responses, electronic tags attached to animals to track their
by enabling them to personalize constructs for use in a study, identification, etc.
and as a result, promotes both a diversity and uniqueness of aca- Please take about 10 minutes of your time to fill out this sur-
demic research. Second, contextualization can help researchers vey. There is no identifying information on this survey and your
to better understand research phenomena and to develop re- answers are completely anonymous. Please answer honestly be-
search models using native constructs rather than borrowing cause your frankness will help us understand important issues
constructs from different contexts. Third, contextualization also related to RFID technology. While this information is impor-
provides a unique contribution to studies involving phenomena tant to us, you are under no obligation to complete the survey.
with peculiar characteristics. Such peculiarity is best explained Also, if you are under the age of 18, please do not fill out this
by native concepts. The use of immigrant concepts may simply survey.
complicate the explanation of a phenomenon. Last, but not the PART I: Please read the questions/statements and choose
least, contextualization of TAM to RFID technology enhances the option that best expresses your view using the following
the relevance of this study to organizations using or attempt- scale:
ing to use RFID technology. Practitioners (e.g., organizations)
1 = Strongly Disagree
value academic research more if the focus of such research is
2 = Disagree
more pragmatic. Contextualization helps academicians conduct
3 = Somewhat Disagree
research by utilizing the contextual terminologies that both aca-
4 = Neither Agree Nor Disagree
demicians and practitioners understand. Thus, it helps to bridge
5 = Somewhat Agree
the gap between academicians and practitioners.
6 = Agree
7 = Strongly Agree
VII. LIMITATIONS AND FUTURE DIRECTION 1) It is IMPORTANT to me to control the amount of access
One of the major limitations of this study involves the sample. that each of the following has to my personal information.
Despite the fact that students are consumers of RFID technology, My employer 1234567
the results from a student sample impose some limitations on My doctor 1234567
the generalizability of these findings. Future research should Government Agencies 1234567

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
326 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO. 2, MAY 2008

My insurance companies 1234567 8) Evaluate the following statements.


Companies from which you buy products The US government should create an
or services 1234567 agency to protect US citizens from privacy
My Instructor 1234567 invasions that may result from the use of
2) I am WILLING to share my personal information with the RFID. 1234567
following. I support laws that will confer individuals
My employer 1234567 with the right to know what information is
My doctor 1234567 gathered about them using RFID
Government Agencies 1234567 technology. 1234567
My insurance companies 1234567 I believe that collecting sensitive information
Companies from which you buy products via RFID tags should be regulated. 1234567
or services 1234567 Individuals should have the right to control
My Instructor 1234567 the collection, use and dissemination of
3) Evaluate the following statements. their personal information. 1234567
Individuals should have the right to control 9) Evaluate the following statements.
the collection, use and dissemination of I will not use any technology that conflicts
their personal information. 1234567 with my social beliefs and norms. 1234567
Individuals should have the right to control Friends’ opinions impact whether or not
the collection, use and dissemination of I will use RFID technology. 1234567
their personal information. 1234567 I will use RFID devices if the use of such
I will not wear a clothing that has RFID devices helps me gain peer group
tags attached because anyone with an RFID acceptance. 1234567
reader can read the data and build a profile I can make a more informed decision about
of my consumer behavior 1234567 the use of RFID devices if I know more
4) The following are IMPORTANT to me when I use a net- about RFID technology. 1234567
work system. I feel more comfortable using a technology
Computer and Network System Security 1234567 that others are using. 1234567
Client/Server Security 1234567 10) I will use RFID technology in the following instances if
Secure Applications 1234567 the use of such technology SAVES me time.
Protection from Malicious Software 1234567 Shopping for groceries 1234567
User Identification and Authentication 1234567 Paying bills 1234567
Backup and Recovery 1234567 Paying tolls 1234567
Security Features (e.g., SET, SSL, locks, Keeping financial records 1234567
etc.) 1234567 Answering questions in class 1234567
5) I am WILLING to sacrifice the following in my decision 11) I will use RFID technology in the following instances if
to use a network system. the use of such technology is EASIER than that of the
Computer and Network System Security 1234567 conventional methods.
Client/Server Security 1234567 Shopping for groceries 1234567
Secure Applications 1234567 Paying bills 1234567
Protection from Malicious Software 1234567 Paying tolls 1234567
User Identification and Authentication 1234567 Keeping financial records 1234567
Backup and Recovery 1234567 Answering questions in class 1234567
Security Features (e.g., SET, SSL, locks, 12) I will be COMFORTABLE using RFID devices.
etc.) 1234567 Always 1234567
6) Evaluate the following statements. Frequently 1234567
I will use RFID devices if I know that my Sometimes 1234567
personal information will be captured Never 1234567
and stored securely. 1234567 13) I am WILLING to use RFID devices.
I will not use RFID tags because they are Always 1234567
not secure. 1234567 Frequently 1234567
7) I SUPPORT the following, as they pertain to RFID. Sometimes 1234567
Fair Information Practices 1234567 Never 1234567
Regulations that protect Human Rights 1234567 PART II: Demographic Information
Regulations by government to protect Please note, survey responses are completely anonymous.
citizens 1234567 14) What is your gender?
Regulations that protect Privacy O Male
Interpretations 1234567 O Female

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
HOSSAIN AND PRYBUTOK: CONSUMER ACCEPTANCE OF RFID TECHNOLOGY: AN EXPLORATORY STUDY 327

15) How old are you? [18] D. J. Hesselgrave, “Contextualization that is authentic and relevant,” Int.
O 18–25 J. Frontier Missions, vol. 12, no. 3, pp. 115–120, 1995.
[19] D. J. Hesselgrave and E. Rommen, Contextualization: Meanings, Methods,
O 26–33 and Models. Grand Rapids: Baker Book House, 1989.
O 34–41 [20] HighJump Software, A 3M Company. (2004). The true cost of ra-
O 42–49 dio frequency identification [Online]. Available: http://highjumpsoftware.
com/promos/rfid-cost-report.asp.
O 50 or older [21] G. H. Hofstede, Culture Consequences: International Differences in Work-
16) What is your highest level of education completed? Related Values. London, U.K.: Sage, 1980.
O High School Graduate [22] R. K. Jayanti and A. C. Burns, “The antecedents of preventive health
care behavior: An empirical study,” J. Acad. Market. Sci., vol. 26, no. 1,
O College Graduate pp. 6–15, 1998.
O Bachelor’s Degree [23] P. Jones, C. Clarke-Hill, D. Hillier, P. Shears, and D. Comfort, “Radio
O Master’s Degree or above frequency identification in retailing and privacy and public policy issues,”
Manage. Res. News, vol. 27, no. 8/9, pp. 46–56, 2004.
[24] R. L. Juban and D. C. Wyld, “Would you like chips with that?: Consumer
ACKNOWLEDGMENT perspectives of RFID,” Manage. Res. News, vol. 27, no. 11/12, pp. 29–44,
2004.
M. M. Hossain thanks Dr. R. Rajamma for her valuable sug- [25] A. Juels, R. L. Rivest, and M. Szydlo, The Blocker Tag: Selective Blocking
gestions. In addition, the authors acknowledge Prof. G. Farris, of RFID Tags for Consumer Privacy. Washington, DC, 2003.
[26] R. Kalakota and A. B. Whunston, Frontiers of Electronic Commerce.
Prof. A. Chakrabarti, and the anonymous reviewers for their Reading, MA: Addition-Wesley, 1996.
insightful comments on this paper. [27] C. Kluckhohn, “Values and value-orientation in the theory of action: An
exploration in definition and classification,” in Toward a General Theory
REFERENCES of Action, T. Parsons and E. Shils, Eds. Cambridge, MA: Harvard Univ.
Press, 1951, pp. 388–433.
[1] D. A. Adams, R. R. Nelson, and P. A. Todd, “Perceived usefulness, ease [28] M. L. Korzaan, “Going with the flow: Predicting online purchase inten-
of use, and usage of information technology: A replication,” MIS Quart., tions,” J. Comp. Inf. Syst., vol. 43, no. 4, pp. 25–31, 2003.
vol. 16, pp. 227–247, 1992. [29] P. Laurn and H. H. Lin, “Toward an understanding of the behavioral
[2] R. Agarwal and E. Karahanna, “Time flies when you’re having fun: Cog- intention to use mobile banking,” Comp. Hum. Behav., vol. 21, pp. 873–
nitive absorption and beliefs about information technology usage?,” MIS 891, 2005.
Quart., vol. 24, no. 4, pp. 665–693, 2000. [30] P. Legris, J. Ingham, and P. Gollerette, “Why do people use information
[3] R. Agarwal, V. Sambamurthy, and R. M. Stair, “Research report: technology? A critical review of the technology acceptance model,” Inf.
The evolving relationship between general and specific computer self- Manage., vol. 40, pp. 191–204, 2003.
efficacy—An empirical assessment,” Inf. Syst. Res., vol. 11, pp. 418–430, [31] K. Mathieson, E. Peacock, and W. W. Chin, “Extending the technology
2000. acceptance model: The influence of perceived user resources,” DATA
[4] AIM, Inc. (2001). Shrouds of time: The history of RFID BASE Adv. Inf. Syst., vol. 32, pp. 86–112, 2001.
[Online]. Available: http://www.aimglobal.org/technologies/rfid/resources/ [32] D. McCloskey, “Evaluating electronic commerce acceptance with the tech-
shrouds_of_time.pdf. nology acceptance model,” J. Comp. Inf. Syst., vol. 44, no. 2, pp. 49–57,
[5] I. Ajzen, “The theory of planned behavior,” Org. Behav. Human Decis. 2003.
Process., vol. 50, pp. 179–211, 1991. [33] S. McCoy, A. Everard, and B. M. Jones, “An examination of the technol-
[6] F. Belanger, J. S. Hiller, and W. J. Smith, “Trustworthiness in electronic ogy acceptance model in Uruguay and the US: A focus on culture,” J.
commerce: The role of privacy, security and site attributes,” J. Strategic Global Inf. Tech. Manage., vol. 8, no. 2, pp. 27–45, 2005.
Inf. Syst., vol. 11, pp. 245–270, 2002. [34] J. C. Nunnally, Psychometric Theory, 2nd ed. New York: McGraw-Hill,
[7] L. D. Chen, M. L. Gillenson, and D. L. Sherrell, “Enticing online con- 1978.
sumers: An extended technology acceptance perspective,” Inf. Manage., [35] M. Ohkubo, K. Suzuki, and S. Kinoshita, “RFID privacy issues and
vol. 39, pp. 705–719, 2002. technical challenges,” Commun. ACM, vol. 48, no. 9, pp. 66–71,
[8] W. C. Chin and P. A. Todd, “On the use, usefulness and ease of structural 2005.
equation modeling in MIS research: A note of caution,” MIS Quart., [36] A. R. Peslak, “An ethical exploration of privacy and radio frequency
vol. 19, pp. 237–246, 1995. identification,” J. Bus. Ethics, vol. 59, pp. 327–345, 2005.
[9] G. A. Churchill, “A paradigm for developing better measures of marketing [37] Privacy International. (2003). Privacy and human rights 2003: Overview
constructs,” J. Market. Res., vol. 16, pp. 64–73, Feb. 1979. [Online]. Available: http://www.privacyinternational.org/survey/phr2003/
[10] F. D. Davis, “Perceived usefulness, perceived ease of use, and user ac- overview.htm.
ceptance of information technology,” MIS Quart., vol. 13, pp. 318–339, [38] C. M. Roberts, “Radio frequency identification (RFID),” Comp. Security,
1989. vol. 25, pp. 18–26, 2006.
[11] F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, “User acceptance of [39] A. H. Segars and V. Grover, “Re-examining perceived ease of use and
computer technology: A comparison of two theoretical models,” Manage. usefulness: A confirmatory factor analysis,” MIS Quart., vol. 17, pp. 517–
Sci., vol. 35, pp. 982–1003, 1989. 525, 1993.
[12] W. J. Doll, A. Hendrickson, and X. Deng, “Using Davis’s perceived use- [40] A. Smith, “Exploring radio frequency identification technology and its
fulness and ease of use instruments for decision making: A confirmatory impact on business systems,” Inf. Manage. Comp. Security, vol. 13, no. 1,
and multi-group invariance analysis,” Decis. Sci., vol. 29, pp. 839–869, pp. 16–28, 2005.
1998. [41] A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray, “Achieving privacy
[13] J. B. Earp, A. I. Anton, L. Aiman-Smith, and W. H. Stufflebeam, “Exam- in trust negotiations with an ontology-based approach,” IEEE Trans.
ining internet privacy policies within the context of user privacy values,” Dependable Secure Comp., vol. 3, no. 1, pp. 13–30, Jan.–Mar. 2006.
IEEE Trans. Eng. Manage., vol. 52, no. 2, pp. 227–237, May 2005. [42] D. W. Straub, M. Keil, and W. Brenner, “Testing the technology acceptance
[14] B. Eckfeldt, “What does RFID do for the consumer?,” Commun. ACM, model across cultures: A three country study,” Inf. Manage., vol. 33,
vol. 48, no. 9, pp. 77–79, 2005. pp. 1–11, 1997.
[15] M. Fishbein and I. Ajzen, Belief, Attitude, Intention and Behavior: An [43] S. Taylor and P. Todd, “Assessing IT usage: The role of prior experience,”
Introduction to Theory and Behavior. Reading, MA: Addison-Wesley, MIS Quart., vol. 19, no. 4, pp. 561–570, 1995.
1975. [44] University of North Texas Fall 2003 Parking/Transportation Survey.
[16] J. F. Gaski and J. R. Nevin, “The differential effects of exercised and (2003). Available: http://www.unt.edu/ir_acc/Surveys/Fall_2003_Trans-
unexercised power sources in a marketing channel,” J. Market. Res., portation_Survey/Fall%202003%20Parking-Transportation%20Report.
vol. 22, no. 2, pp. 130–142, 1985. pdf.
[17] J. F. Hair, R. E. Anderson, R. L. Tatham, and W. C. Black, Multivariate [45] Y. S. Wang, “The adoption of electronic tax filing systems: An empirical
Data Analysis, 5th ed. Upper Saddle River, NJ: Prentice-Hall, 1998. study,” Govt. Inf. Quart., vol. 20, pp. 333–352, 2003.

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.
328 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 55, NO. 2, MAY 2008

[46] Y. S. Wang, Y. M. Wang, H. H. Lin, and T. I. Tang, “Determinants of user Victor R. Prybutok (M’96) received the B.S. degree
acceptance of internet banking: An empirical study,” Int. J. Service Ind. (with high honors), the M.S. degree in biomathemat-
Manage., vol. 14, pp. 501–519, 2003. ics, the M.S. degree in environmental health, and the
[47] R. Want, “RFID: A key to automating everything,” Sci. Amer., vol. 290, Ph.D. degree in environmental analysis and applied
no. 1, pp. 56–65, 2004. statistics from Drexel University, Philadelphia, PA,
[48] X. Zhang and V. R. Prybutok, “A consumer perspective of e-service qual- in 1974, 1976, 1980, and 1984, respectively.
ity,” IEEE Trans. Eng. Manage., vol. 52, no. 4, pp. 461–477, Nov. 2005. He is currently a Regents Professor of decision
[49] X. Zhang and V. R. Prybutok, “An empirical study of online shopping: A sciences in the Information Technology and Decision
service perspective,” Int. J. Services Tech. Manage., vol. 5, no. 1, pp. 1–13, Sciences Department, College of Business Adminis-
2004. tration, University of North Texas, Denton, where he
[50] X. Zhang and V. R. Prybutok, “Application of TAM: The moderating is also the Director of the Center for Quality and Pro-
effect of gender on online shopping,” Int. J. Inf. Tech. Manage., vol. 12, ductivity. He has authored or coauthored more than 80 papers published in jour-
no. 2, pp. 99–118, 2003. nals including The American Statistician, Communications of the Association
[51] X. Zhang, V. R. Prybutok, and C. E. Koh, “The role of impulsiveness in a for Computing Machinery (ACM), Communications in Statistics, Data Base,
TAM-based online purchasing behavior model,” Inf. Resour. Manage. J., Decision Sciences, European Journal of Operational Research, IEEE TRANS-
vol. 19, no. 2, pp. 54–68, 2006. ACTIONS ON ENGINEERING MANAGEMENT, MIS Quarterly, and OMEGA: The
International Journal of Management Science, and Operations Research.
Prof. Prybutok is a Senior Member of the American Society for Quality
(ASQ). He is also active in the American Statistical Association, Decision Sci-
ences Institute, Institute of Electrical and Electronic Engineers, and Operations
Research Society of America. He is an ASQ certified quality engineer, certified
quality auditor, certified quality manager, and served as a Texas Quality Award
Muhammad Muazzem Hossain received the B.B.A. Examiner in 1993. In addition, he is listed in Who’s Who in American Education,
degree from the International Islamic University, Who’s Who in America, and Who’s Who in the South and Southwest.
Kuala Lumpur, Malaysia, in 1996, and the M.S. de-
gree in information technologies in 2004 from the
University of North Texas, Denton, where he is cur-
rently working toward the Ph.D. degree in manage-
ment science at the College of Business Administra-
tion.
Mr. Hossian is a member of the International
Honor Society Beta Gamma Sigma and the Decision
Sciences Institute. He has presented several papers at
conferences that include the Annual Meeting of Decision Sciences Institute and
the Baldrige Award Recipients (BAR) Consortium.

Authorized licensed use limited to: University of North Texas. Downloaded on November 20, 2009 at 14:02 from IEEE Xplore. Restrictions apply.

You might also like