IDEAS home Printed from https://ideas.repec.org/a/eee/telpol/v48y2024i3s0308596123002148.html
   My bibliography  Save this article

Leaking my face via payment: Unveiling the influence of technology anxiety, vulnerabilities, and privacy concerns on user resistance to facial recognition payment

Author

Listed:
  • Zhang, Xiaoxue
  • Zhang, Zizhong

Abstract

As biometric identification techniques for authentication continue to gain prominence, the demand for mobile payment systems employing facial recognition payment (FRP) in diverse business contexts has increased significantly. Leveraging the antecedent-privacy concern-outcome (APCO) model, this study constructs a comprehensive research framework for FRP and subjects it to examination through an online survey involving 1058 Chinese users. The study's results reveal that technology anxiety exhibits significant relationships with technology, provider, legal, and user vulnerabilities. However, it is noteworthy that technology anxiety does not exert an influence on privacy concerns. Conversely, technology, provider, legal and user vulnerabilities are found to be significantly associated with privacy concerns. Furthermore, the research highlights that privacy concerns have a positive association with user resistance to FRP. The current study also provides practical implications for cooperation and governments.

Suggested Citation

  • Zhang, Xiaoxue & Zhang, Zizhong, 2024. "Leaking my face via payment: Unveiling the influence of technology anxiety, vulnerabilities, and privacy concerns on user resistance to facial recognition payment," Telecommunications Policy, Elsevier, vol. 48(3).
  • Handle: RePEc:eee:telpol:v:48:y:2024:i:3:s0308596123002148
    DOI: 10.1016/j.telpol.2023.102703
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0308596123002148
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.telpol.2023.102703?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Armstrong, J. Scott & Overton, Terry S., 1977. "Estimating Nonresponse Bias in Mail Surveys," MPRA Paper 81694, University Library of Munich, Germany.
    2. Viswanath Venkatesh & Xiaojun Zhang, 2010. "Unified Theory of Acceptance and Use of Technology: U.S. Vs. China," Journal of Global Information Technology Management, Taylor & Francis Journals, vol. 13(1), pages 5-27, January.
    3. Tamara Dinev & Massimo Bellotto & Paul Hart & Vincenzo Russo & Ilaria Serra & Christian Colautti, 2006. "Privacy calculus model in e-commerce – a study of Italy and the United States," European Journal of Information Systems, Taylor & Francis Journals, vol. 15(4), pages 389-402, August.
    4. Coye Cheshire & Judd Antin & Elizabeth Churchill, 2010. "Behaviors, adverse events, and dispositions: An empirical study of online discretion and information control," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 61(7), pages 1487-1501, July.
    5. Tamara Dinev & Heng Xu & Jeff H Smith & Paul Hart, 2013. "Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts," European Journal of Information Systems, Taylor & Francis Journals, vol. 22(3), pages 295-316, May.
    6. Jinyoung Min & Byoungsoo Kim, 2015. "How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 66(4), pages 839-857, April.
    7. Zhong, Yongping & Oh, Segu & Moon, Hee Cheol, 2021. "Service transformation under industry 4.0: Investigating acceptance of facial recognition payment through an extended technology acceptance model," Technology in Society, Elsevier, vol. 64(C).
    8. Jinwei Cao & Andrea Everard, 2008. "User Attitude Towards Instant Messaging: The Effect of Espoused National Cultural Values on Awareness and Privacy," Journal of Global Information Technology Management, Taylor & Francis Journals, vol. 11(2), pages 30-57, April.
    9. Coye Cheshire & Judd Antin & Elizabeth Churchill, 2010. "Behaviors, adverse events, and dispositions: An empirical study of online discretion and information control," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 61(7), pages 1487-1501, July.
    10. Chen, Wenhao & Wang, Min, 2023. "Regulating the use of facial recognition technology across borders: A comparative case analysis of the European Union, the United States, and China," Telecommunications Policy, Elsevier, vol. 47(2).
    11. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    12. Liu, Aiping & Urquía-Grande, Elena & López-Sánchez, Pilar & Rodríguez-López, Ángel, 2022. "How technology paradoxes and self-efficacy affect the resistance of facial recognition technology in online microfinance platforms: Evidence from China," Technology in Society, Elsevier, vol. 70(C).
    13. Hamid Nemati & Jeffrey D. Wall & Anthony Chow, 2014. "Privacy Coping and Information-Sharing Behaviors in Social Media: A Comparison of Chinese and U.S. Users," Journal of Global Information Technology Management, Taylor & Francis Journals, vol. 17(4), pages 228-249, October.
    14. Tamara Dinev & Allen R. McConnell & H. Jeff Smith, 2015. "Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box," Information Systems Research, INFORMS, vol. 26(4), pages 639-655, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Nils Koester & Patrick Cichy & David Antons & Torsten Oliver Salge, 2022. "Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2333-2355, December.
    2. Liu, Yu-li & Yan, Wenjia & Hu, Bo, 2021. "Resistance to facial recognition payment in China: The influence of privacy-related factors," Telecommunications Policy, Elsevier, vol. 45(5).
    3. Muhammad Waqas & Alishba Hania & Farzan Yahya & Iqra Malik, 2023. "Enhancing Cybersecurity: The Crucial Role of Self-Regulation, Information Processing, and Financial Knowledge in Combating Phishing Attacks," SAGE Open, , vol. 13(4), pages 21582440231, December.
    4. David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
    5. Kim, Yeolib & Kim, Seung Hyun & Peterson, Robert A. & Choi, Jeonghye, 2023. "Privacy concern and its consequences: A meta-analysis," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    6. Ying, Shiyi & Huang, Youlin & Qian, Lixian & Song, Jinzhu, 2023. "Privacy paradox for location tracking in mobile social networking apps: The perspectives of behavioral reasoning and regulatory focus," Technological Forecasting and Social Change, Elsevier, vol. 190(C).
    7. Fast, Victoria & Sachs, Nikolai & Schnurr, Daniel, 2021. "Privacy Decision-Making in Digital Markets: Eliciting Individuals' Preferences for Transparency," 23rd ITS Biennial Conference, Online Conference / Gothenburg 2021. Digital societies and industrial transformations: Policies, markets, and technologies in a post-Covid world 238020, International Telecommunications Society (ITS).
    8. Dah-Kwei Liou & Wen-Hai Chih & Li-Chun Hsu & Chia-Yi Huang, 2016. "Investigating information sharing behavior: the mediating roles of the desire to share information in virtual communities," Information Systems and e-Business Management, Springer, vol. 14(2), pages 187-216, May.
    9. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    10. Hu, Bo & Liu, Yu-li & Yan, Wenjia, 2021. "Should I scan my face? The influence of perceived value and trust on Chinese users' intention to use facial recognition payment," 23rd ITS Biennial Conference, Online Conference / Gothenburg 2021. Digital societies and industrial transformations: Policies, markets, and technologies in a post-Covid world 238028, International Telecommunications Society (ITS).
    11. Tawfiq Alashoor & Mark Keil & H. Jeff Smith & Allen R. McConnell, 2023. "Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing," Information Systems Research, INFORMS, vol. 34(4), pages 1415-1436, December.
    12. Nik Thompson & Tanya McGill & Anna Bunn & Rukshan Alexander, 2020. "Cultural factors and the role of privacy concerns in acceptance of government surveillance," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 1129-1142, September.
    13. Eunji Lee & Jin-young Kim & Junchul Kim & Chulmo Koo, 2023. "Information Privacy Behaviors during the COVID-19 Pandemic: Focusing on the Restaurant Context," Information Systems Frontiers, Springer, vol. 25(5), pages 1829-1845, October.
    14. Basmah Emad ALQadheeb & Othman Ibraheem Alsalloum, 2021. "Self-Disclosure in Social Networking Sites in Saudi Arabia," International Journal of Business and Management, Canadian Center of Science and Education, vol. 13(10), pages 1-96, July.
    15. John A. Aloysius & Hartmut Hoehle & Soheil Goodarzi & Viswanath Venkatesh, 2018. "Big data initiatives in retail environments: Linking service process perceptions to shopping outcomes," Annals of Operations Research, Springer, vol. 270(1), pages 25-51, November.
    16. Henner Gimpel & Dominikus Kleindienst & Daniela Waldmann, 2018. "The disclosure of private data: measuring the privacy paradox in digital services," Electronic Markets, Springer;IIM University of St. Gallen, vol. 28(4), pages 475-490, November.
    17. David Schneider & Johannes Klumpe & Martin Adam & Alexander Benlian, 2020. "Nudging users into digital service solutions," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(4), pages 863-881, December.
    18. Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    19. France Bélanger & Tabitha L. James, 2020. "A Theory of Multilevel Information Privacy Management for the Digital Era," Information Systems Research, INFORMS, vol. 31(2), pages 510-536, June.
    20. Ruwan Bandara & Mario Fernando & Shahriar Akter, 2020. "Privacy concerns in E-commerce: A taxonomy and a future research agenda," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(3), pages 629-647, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:telpol:v:48:y:2024:i:3:s0308596123002148. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/wps/find/journaldescription.cws_home/30471/description#description .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.