Assessing IT usage: the role of prior experience
MIS Quarterly
Extending the TAM for a World-Wide-Web context
Information and Management
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Consumer trust in an Internet store
Information Technology and Management
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Information Systems Research
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 7 - Volume 7
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Building Effective Online Marketplaces with Institution-Based Trust
Information Systems Research
Queue - RFID
Auto-ID: managing anything, anywhere, anytime in the supply chain
Communications of the ACM - Spyware
How much is too little? Privacy and smart cards in Hong Kong and Ontario
Journal of Information Science
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
What does RFID do for the consumer?
Communications of the ACM - Special issue: RFID
International Journal of Human-Computer Studies
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology
International Journal of Electronic Commerce
International Journal of Electronic Commerce
Trust and TAM in online shopping: an integrated model
MIS Quarterly
Uncertainty-aware Wireless Sensor Networks
International Journal of Mobile Communications
Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
International Journal of Mobile Communications
From the internet of computers to the internet of things
From active data management to event-based systems and more
Data protection and privacy laws in the light of RFID and emerging technologies
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
High-Level Managers' Considerations for RFID Adoption in Hospitals: An Empirical Study in Taiwan
Journal of Medical Systems
Hi-index | 0.00 |
Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively early phase of the risk development, strategic options with which RFID suppliers and users can positively influence the public acceptance of the technology. We propose a strategic framework based on research findings on risk perception and technology acceptance as well as a set of options for coping with the public perception of RFID-related privacy risks.