Skip to main content
Log in

The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services

  • Focus Theme
  • Published:
Electronic Markets Aims and scope Submit manuscript

Abstract

Location-Based Services (LBS) use positioning technology to provide individual users the capability of being constantly reachable and accessing network services while ‘on the move’. However, privacy concerns associated with the use of LBS may ultimately prevent consumers from gaining the convenience of ‘anytime anywhere’ personalized services. We examine the adoption of this emerging technology through a privacy lens. Drawing on the privacy literature and theories of technology adoption, we use a survey approach to develop and test a conceptual model to explore the effects of privacy concerns and personal innovativeness on customers’ adoption of LBS. In addition, as a number of IS researchers have shown that customers differ in their decision making for continued adoption as compared to initial decision making, we test the research model separately for potential and experienced customers. The results indicate that privacy concerns significantly influence continued adoption as compared to initial adoption. The implications for theory and practice are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. More details: http://www.ideas.singtel.com/ideas/ideasvp.jsp?t=s&p=2&i=43&v=43.

  2. Cell-ID, or Cell of Origin (COO), works by identifying the cell of the network in which the handset is operating (Barnes 2003). Such technique is the main technology that is widely deployed in mobile communication networks today. It requires no modification to handsets or networks since it uses the mobile network base station as the location of the caller (Barnes 2003).

  3. *SEND-A-TAXI was selected based on the subjects’ interest indications in the pilot study (n = 51): the participants were asked to choose three of their interested ‘what’s around me?’ services. *SEND-A-TAXI service was ranked as the top one.

References

  • Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28(3), 557–582.

    Article  Google Scholar 

  • Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9(2), 204–215.

    Article  Google Scholar 

  • Agarwal, R., & Karahanna, E. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665–692.

    Article  Google Scholar 

  • Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of user’s privacy concerns, Proceedings of the INTERACT, 9th IFIP TC13 International Conference on Human-Computer Interaction, Zurich, Switzerland, pp. 7.

  • Barnes, J. S. (2003). Known by the network: The emergence of location-based mobile commerce. In E.-P. Lim & K. Siau (Eds.), Advances in mobile commerce technologies (pp. 171–189). Hershey: Idea Group.

    Google Scholar 

  • Bellavista, P., Kupper, A., & Helal, S. (2008). Location-based services: Back to the future. IEEE Pervasive Computing, 7(2), 85–89.

    Article  Google Scholar 

  • Bock, G., Kankanhalli, A., & Sharma, S. (2006). Are norms enough? The role of collaborative norms in promoting organizational knowledge seeking. European Journal of Information Systems, 15(4), 357–367.

    Article  Google Scholar 

  • Buchanan, T., Paine, C., Joinson, A. N., & Reips, J. U. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157–165.

    Article  Google Scholar 

  • Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(1), 81–105.

    Article  Google Scholar 

  • Chae, M. & Kim, J. (2001). Information quality for mobile internet services: A theoretical model with empirical validation. In V. Storey, S. Sarkar, & J. DeGross (Eds.), Proceeding of Twenty-Second International Conference on Information Systems (ICIS). New Orlean, LA, USA, pp. 43–53.

  • Chellappa, R. K., & Sin, R. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2), 181–202.

    Article  Google Scholar 

  • Clarke, R. (2001). Person location and person tracking: Technologies, risks and policy implications. Information Technology & People, 14(2), 206.

    Article  Google Scholar 

  • Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale: L. Erlbaum Associates.

    Google Scholar 

  • Cook, M., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston: Houghton Mifflin.

    Google Scholar 

  • Danezis, G., Lewis, S., & Anderson, R. (2005). How much is location privacy worth, Proceedings of the Fourth Workshop on the Economics of Information Security (WISE), Harvard University.

  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 982–1003.

    Article  Google Scholar 

  • Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.

    Article  Google Scholar 

  • Dinev, T., & Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29.

    Article  Google Scholar 

  • Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance — an empirical investigation. Journal of Strategic Information Systems, 17(3), 214–233.

    Article  Google Scholar 

  • Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A. (2007). G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, 39(2), 175–191.

    Google Scholar 

  • Flynn, L. R., & Goldsmith, R. E. (1999). A short, reliable measure of subjective knowledge. Journal of Business Research, 46(1), 57–66.

    Article  Google Scholar 

  • Fornell, C., & Bookstein, F. L. (1982). Two structrual equation models: LISREL and PLS applied to customer exit-voice theory. Journal of Marketing Research, 19(11), 440–452.

    Article  Google Scholar 

  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on Engineering Management, 50(3), 307–321.

    Article  Google Scholar 

  • Gefen, D., Straub, D., & Boudreau, M. (2000). Structural equation modeling techniques and regression: Guidelines for research practice. Communications of AIS, 7(7), 1–78.

    Google Scholar 

  • Goldsmith, R. E., & Hofacker, C. F. (1991). Measuring consumer innovativeness. Journal of the Academy of Marketing Science, 19(3), 209–221.

    Article  Google Scholar 

  • Gupta, S., & Kim, H.-W. (2007). The moderating effect of transaction experience on the decision calculus in on-line repurchase. International Journal of Electronic Commerce, 12(1), 127–158.

    Google Scholar 

  • Johnson, C. A. (1974). Privacy as personal control. In D. H. Carson (Ed.), Man-environment interactions: Evaluations and applications: Part 2, vol. 6 (pp. 83–100). Washington: Privacy, Environmental Design Research Association.

    Google Scholar 

  • Junglas, I., & Watson, R. T. (2006). The U-constructs: Four information drives. Communications of AIS, 17, 569–592.

    Google Scholar 

  • Kaasinen, E. (2003). User needs for location-aware mobile services. Personal and Ubiquitous Computing, 7(1), 70–79.

    Article  Google Scholar 

  • Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, June, pp. 183-213.

  • Kim, H. W., Xu, Y., & Koh, J. (2004). A comparison of online trust building factors between potential customers and repeat customers. Journal of the Association for Information Systems, 5(10), 392–420.

    Google Scholar 

  • Kirton, M. (1976). Adaptors and innovators: A description and measure. Journal of Applied Psychology, 61(5), 622–629.

    Article  Google Scholar 

  • Leonard-Barton, D., & Deschamps, I. (1988). Managerial influence in the implementation of new technology. Management Science, 34(10), 1252–1265.

    Article  Google Scholar 

  • Levy, S. (2004). A future with nowhere to hide?, Newsweek viewed Aug 28, 2008 < http://www.newsweek.com/id/53986/>

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

    Article  Google Scholar 

  • Margulis, S. T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59(2), 411–429.

    Article  Google Scholar 

  • Midgley, D. F., & Dowling, G. R. (1978). Innovativeness: The concept and its measurement. Journal of Consumer Research, 4(4), 229–242.

    Article  Google Scholar 

  • Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.

    Google Scholar 

  • Pedersen, E. P. (2005). Adoption of mobile internet services: An exploratory study of mobile commerce early adopters. Journal of Organizational Computing and Electronic Commerce, 15(2), 203–222.

    Article  Google Scholar 

  • Rao, B., & Minakakis, L. (2003). Evolution of mobile location-based services. Communications of ACM, 46(12), 61–65.

    Article  Google Scholar 

  • Rogers, E. M. (1995). Diffusion of innovations (4th ed.). New York: Free Press.

    Google Scholar 

  • Sheppard, B. H., Hartwick, J., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325–343.

    Article  Google Scholar 

  • Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.

    Article  Google Scholar 

  • Straub, D., Limayem, M., & Karahanna-Evaristo, E. (1995). Measuring system usage: Implications for IS theory testing. Management Science, 41(8), 1328–1342.

    Article  Google Scholar 

  • Taylor, S., & Todd, P. A. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.

    Article  Google Scholar 

  • Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. Journal of Strategic Information Systems, 16(2), 214–232.

    Article  Google Scholar 

  • Thompson, R. L., Higgins, C. A., & Howell, J. M. (1994). Influence of experience on personal computer utilization: Testing a conceptual model. Journal of Management Information Systems, 11(1), 167–187.

    Google Scholar 

  • Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365.

    Article  Google Scholar 

  • Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigations of the effects of the mood. Organizational Behavior and Human Decision Processes, 79(1), 1–28.

    Article  Google Scholar 

  • Venkatesh, V., Morris, G. M., Davis, B. G., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.

    Google Scholar 

  • Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.

    Google Scholar 

  • Wold, H. (1982). Soft modeling: The basic design and some extensions. In K. G. Joreskog & H. Wold (Eds.), Systems under indirect observations: Part 2 (pp. 1–54). Amsterdam: North-Holland.

    Google Scholar 

  • Xu, H. (2009). Consumer responses to the introduction of privacy protection measures: An exploratory research framework. International Journal of E-Business Research, 5(2), 21–47.

    Google Scholar 

  • Xu, H. & Teo, H. H. (2004). Alleviating consumer’s privacy concern in location-based services: A psychological control perspective, Proceedings of the Twenty-Fifth Annual International Conference on Information Systems (ICIS 2004), Washington, D. C., United States, pp. 793–806.

  • Xu, H., Teo, H. H., & Tan, B. C. Y. (2005). Predicting the adoption of location-based services: The roles of trust and privacy risk, Proceedings of 26th Annual International Conference on Information Systems (ICIS 2005), Las Vegas, NV, pp. 89.

Download references

Acknowledgments

The authors would like to thank two anonymous reviewers, the special issue editor for their constructive and encouraging comments. The authors like to thank Prof. Hock Hai Teo at the National University of Singapore for his valuable help on an earlier version of this paper. This material is partially based upon work supported by the U.S. National Science Foundation under Grant No NSF-CNS 0716646. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the U.S. National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heng Xu.

Additional information

Responsible editor: Frédéric Thiesse

Appendix A: Survey instrument

Appendix A: Survey instrument

Construct

Item

Question wording

Source

Intention to Use LBS

INT1

I intend to use the LBS in the next 6 months

Venkatesh et al. (2003)

INT2

I predict I would use the LBS in the next 6 months

INT3

I plan to use the LBS in the next 6 months

Performance Expectancy

PEPT1

LBS reduce my searching time to find the information/services that I need

Chae and Kim (2001); Venkatesh et al. (2003)

PEPT2

LBS reduce my searching efforts to find the information/servicesI needed

PEPT3

With the LBS, I can quickly access the information/services that I need

PEPT4

With the LBS, I can easily access the information/services that I need

Effort Expectancy

EEPT1

My interaction with the LBS would be clear and understandable

Venkatesh et al. (2003)

EEPT2

I would find the LBS easy to use

EEPT3

Learning to use LBS is easy for me

Personal Innovativeness

INNV1

If I heard about a new information technology, I would look for ways to experiment with it

Agarwal and Prasad (1998)

INNV2

Among my peers, I am usually the first to try out new information technologies

INNV3

I like to experiment with new information technologies

Privacy Concerns—Collection

CLCT1

It bothers me to disclose my personal information to service providers

Smith et al. (1996)

CLCT2

I am concerned that other people may monitor my current location continuously

CLCT3

Service providers are collecting too much information about me

Privacy Concerns—Unauthorized Access

ACES1

Service providers may keep my private information (including my location) in a non-secure manner.

Smith et al. (1996)

ACES2

Service providers may not take measures to prevent unauthorized access to my personal information.

ACES3

Service providers may divulge my personal information to unauthorized parties without my consent

Privacy Concerns—Errors

ERR1

Service providers may keep my personal information (including my location) in a non-accurate manner in their database

Smith et al. (1996)

ERR2

Service providers may provide me with inaccurate or wrong information/services due to the error in tracking my location.

ERR3

Service providers may not devote time and effort to verifying the accuracy of the personal information in their databases

Privacy Concerns—Secondary Use

USE1

Service providers may share my personal information (including my location) with other companies without notifying me or getting my authorization

Smith et al. (1996)

USE2

Service providers may use my personal information for other purposes, e.g., analyzing my daily activities to derive information about me

USE3

Service providers may sell my personal information to other companies without notifying me or getting my authorization

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xu, H., Gupta, S. The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electron Markets 19, 137–149 (2009). https://doi.org/10.1007/s12525-009-0012-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12525-009-0012-4

Keywords

JEL

Navigation