Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
An Empirical Study about RFID Acceptance- Focus on the Employees in Korea -

Authors: Mi Sook Lee


The number of the companies accepting RFID in Korea has been increased continuously due to the domestic development of information technology. The acceptance of RFID by companies in Korea enabled them to do business with many global enterprises in a much more efficient and effective way. According to a survey[33, p76], many companies in Korea have used RFID for inventory or distribution manages. But, the use of RFID in the companies in Korea is in the early stages and its potential value hasn-t fully been realized yet. At this time, it would be very important to investigate the factors that affect RFID acceptance. For this study, many previous studies were referenced and some RFID experts were interviewed. Through the pilot test, four factors were selected - Security Trust, Employee Knowledge, Partner Influence, Service Provider Trust - affecting RFID acceptance and an extended technology acceptance model(e-TAM) was presented with those factors. The proposed model was empirically tested using data collected from employees in companies or public enterprises. In order to analyze some relationships between exogenous variables and four variables in TAM, structural equation modeling(SEM) was developed and SPSS12.0 and AMOS 7.0 were used for analyses. The results are summarized as follows: 1) security trust perceived by employees positively influences on perceived usefulness and perceived ease of use; 2) employee-s knowledge on RFID positively influences on only perceived ease of use; 3) a partner-s influence for RFID acceptance positively influences on only perceived usefulness; 4) service provider trust very positively influences on perceived usefulness and perceived ease of use 5) the relationships between TAM variables are the same as the previous studies.

Keywords: RFID, TAM, Security Trust, Employee Knowledge, Partner Influence, Service Provider Trust.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1393


[1] Chircu and R. J. Kauffman, "Limits to Value in Electronic Commerce-Related IT Investments," Journal of Management Information Systems, vol. 17, no. 2, pp. 59-80, 2000.
[2] M. Sharif, T. Elliman, P. E. D. Love, and A. Badii, "Integrating the IS with the enterprise: key EAI research challenges," The Journal of Enterprise Information Management, vol. 17, no. 2, pp. 164-170,2004.
[3] Sharma and A. Citurs, "Drivers and Rationales in RFID Adoption and Post Adoption Integration: An Integrative Perspective on IOS Adoption," SIGADIT(DIGT) Workshop, pp. 1-22, 2005.
[4] S. Neo, P. E. Khoo and S. Ang, "The Adoption of TradeNet by the Trading Community: An Empirical Analysis," proceedings of the 15th Annual International Conference on IS, 1995.
[5] Szajna, "Empirical Evaluation of the revised technology acceptance model," Management Science, vol. 42, no. 1, pp. 85-92, 1996.
[6] Fornell and D. F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, vol. 18, pp. 39-50, 1981.
[7] L. Iacovou, I. Benbasat and A. S. Dexter, "Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology," MIS Quarterly, vol. 19, no. 4, 1995.
[8] N. Prather and L. K. Gundry, "Blueprints for Innovation," New York, AMA, 1995.
[9] Perakslis, and R. Wolk, "Social acceptance of RFID as a biometric security method," IEEE technology &society magazine, vol.25, no.3, pp. 34-42, 2006.
[10] Bill and A. H. A. Eman, "Adoption of Mobile Technology in the Supply Chain: An Exploratory Cross-Case Analysis:," International Journal of E-Business Research, vol. 4, issue 4, pp. 1-15, 2008.
[11] Gefen, "E-commerce: the role of familiarity and trust," Omega, vol. 28, pp. 725-737, 2000.
[12] D. Gefen, E. Karahanna, and D. W. Straub, "Trust and TAM in Online Shopping: An Integrated Model," MIS Quarterly, vol. 27, no. 1, pp. 51-90, 2003.
[13] D. W. Straub, M. Keil, and W. Brenner, " Testing the technology acceptance model across cultures: a three country study," Information Management, vol. 33, pp. 1-11, 1997.
[14] M. Rogers, Diffusion of Innovations, 4th ed., Free Press, New York, NY, 1995.
[15] F.D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989.
[16] Muller-Seitz, K. Dautzenberg, U. Creusen, and C. Stromereder, "Customer acceptance of RFID technology: Evidence from the German electronic retail sector," Journal of retailing and consumer services, vol.16, no.1, pp.31-39, 2009.
[17] Yang and S. L. Jarvenpaa, "Trust and Radio Frequency Identification(RFID) Adoption within an Alliance," Proceedings of the 38th Hawaii International Conference on System Sciences-2005, pp. 1-10, 2005.
[18] K. Lui and R. Jamieson, "Integrating Trust and Risk Perceptions in Business-to-Consumer Electronic Commerce with the Technology Acceptance Model," European Conference on Information Systems(ECIS 2003), Naples, 2003.
[19] Chen and B.C. Williams, "The impact of electronic data interchange (EDI) on SMEs: summary of eight British case studies," Journal of Small Business Management, vol. 36, no. 3, pp. 68-72, 1998.
[20] F. Hair, R. E. Anderson, R. L. Tatham and W. C. Black, "Multivariate data analysis," fifth edition, Prentice-Hall, Upper Saddle River, NJ.
[21] J. K. Kim, "The study about antecedent factors for continuous use of application service," KAIST Business Service Online Service, vol. 27, 2007,
[22] J. N. Lee, "A Bilateral Perspective on Trust Building in IT Outsourcing", The Korea Society of Management Information Systems, proceeding paper, 2006.
[23] J. Y. L. Thong, "An Integrated Model of Information Systems Adoption in Small Business," Journal of Management Information System, vol. 15, no. 4, pp. 187-214, 1999.
[24] Mathieson, "Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior," Information Systems Research, vol. 2, no.3, pp. 173-190, 1991.
[25] C. Abrams, C. E. L. Rob, and Z. L. Daniel, "Nurturing interpersonal trust in knowledge-sharing networks," Academy of Management Executive, vol. 17, no. 4, pp. 64-77, 2003.
[26] L. R. Vijayasarathy "Predicting Consumer Intentions to Use Online Shopping: The Case for an Augmented Technology Acceptance Model", Information & Management, vol. 41, no. 6, pp. 747-762. , 2004.
[27] L. Raymond and F. Bergeron, "EDI Success in Small- and Medium-Sized Enterprises: A Field Study," Journal of organizational computing and electronic commerce, vol.6, no. 2 , pp.161-172 1996.
[28] L. T. Hu and P. M. Bentler, "Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives," Structured Equation Modeling, vol. 6, no. 1, pp. 1-55, 1999.
[29] L.V. Huy and P. Filiatrault, "The Adoption of E-commerce in SMEs in Vietnam: A Study of Users and Prospectors," The Tenth Pacific Asia Conference on Information Systems, pp. 1335-1344, 2006.
[30] M. H. Muhammad and R. P. Victor, "Consumer Acceptance of RFID Technology: An Exploratory Study," IEEE Transactions on Engineering Management, vol. 55, no. 2, pp. 316-326, 2008.
[31] Koufaris, "Applying the technology acceptance model and flow theory to online consumer behavior," Information Systems Research, vol. 13, no. 2, pp. 205-223, 2002.
[32] M. Meints, "Social Acceptance of RFID in Retail,", 2007.
[33] M. S. Lee, "The Effect of Trust and Perceived Risk on the RFID Technology Acceptance - An Empirical Study by the employees in the Company or Public Enterprise-," ph. D Thesis, 2007.
[34] Gunther and S. Spiekermann, "RFID and the perception of control," Communications of the ACM, vol. 48, no. 9, pp. 73-76, 2005.
[35] B. Cragg and M. King, "Information systems and small firm performance: Case study evidence," European Conference on Information Systems, pp. 424-432, 1993.
[36] Chwelos, I. Benbasat and A. S. Dexter, "Empirical Test of an EDI Adoption Model," Information System Research, vol. 12, no. 3, September 2001.
[37] M. Doney and J. P. Cannon, "An examination of the nature of trust in buyer-seller relationships," Journal of Marketing, vol. 2, no. 61, 1997.
[38] C. Mayer, J. H. Davis and F.D. Schoorman, "An integrative model of organizational trust," Academy of Management Review, vol. 20, no. 3, pp. 709-734, 1995.
[39] L. Thompson, C. A. Higgins and J. M. Howell, "Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model," Journal of Management Information Systems, vol. 11, no. 1, pp. 167-187, 1995.
[40] R. M. Morgan and S. D. Hunt, "The commitment-trust theory of relationship marketing," Journal of Marketing , vol. 58, pp. 20-38, 1994.
[41] Graziolo and S. L. Jarvenpaa, "Perils of Internet fraud: an empirical investigation of deception and trust with experienced internet," IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, vol. 30, no. 4, pp. 395-410, 2000.
[42] S. Teo and M. Tan, "An empirical study of adopters and non-adopters of the Internet in Singapore," Information & Management, vol. 34, pp. 339-345, 1998.
[43] Matta and C. Moberg, "Defining the Antecedents for Adoption of RFID in the Supply Chain," Issues in Information Systems, vol. 8, no. 2, pp. 449-454, 2007.
[44] Y. G. Kim, " The Effect of Trust to the Cooperation between Service Customer and Service Provider," Korea Consumption Culture Association, pp. 147-152, 1999.
[45] Z. K. Shalhoub, "Trust, privacy, and security in electronic business: the case of the GCC countries," Information Management & Computer Security, vol. 14, no. 3, pp. 270-283, 2006.
[46] RFIDnews (2008, May), "Korea-s largest retailers adopt RFID,"