SlideShare a Scribd company logo
1 of 21
Customer Intention to Use Facial Recognition at
Quick-Service Restaurants
Olena Ciftci, Eun-Kyong Choi, Ph.D., and Katerina Berezina, Ph.D.
Page 11/20/2020
Introduction
Facial recognition system in BurgerFi
Page 2
Introduction
• Facial recognition is technology that
can identify individuals by their face
topology (Maxie, 2017; Unar, Seng, &
Abbasi, 2014).
• Facial recognition is a type of
biometrics technology
Page 3
Introduction
• Potential to use for loyalty program
account access and/or payment
authorization
• chains Chick-Fil-A, KPro by KFC in China,
BurgerFi;
• start-ups CaliBurger in California and
Malibu Poke in Dallas, Texas.
• Integrated with other technology systems
in restaurants
• self-service kiosks,
• loyalty program system
• point-of-sales systems (POS)
Facial recognition system in CaliBurger
Page 4
Introduction
Benefits from deploying facial recognition in quick-service restaurants:
• convenience for customers
• much faster process of ordering
• personalized service
• enhancement of the customer experience
• differentiation from competitors
• attraction of new customers (Kim, Tang, & Bosselman, 2018).
Page 5
Introduction
Industry problem
Promising massive adoption business investment in technology
(Morosan, 2011).
Lack of academic literature on the topic
Morosan, C. (2011). Customers' adoption of biometric systems in restaurants: An extension
of the technology acceptance model.
Page 6
Introduction
Main goal
• To investigate the factors influencing customers’ adoption of facial recognition in
quick-service restaurants.
Page 7
Theoretical model
Page 8
H1
H2
H3
H4
H5
H6
Intention to Use for a
Loyalty Account
Authorization
Intention to Use for a
Payment
Authorization
Behavioral Intentions
a)
b)
UTAUT
UTAUT2
Context
Performance
Expectancy
Effort Expectancy
Social Influence
Facilitating
Conditions
Hedonic Motivations
Personal
Innovativeness
Privacy Concerns
Perceived Security
Trust
H8
H9
H7
Unified Theory of
Acceptance and Use of
Technology:
UTAUT (Venkatesh, Morris,
Davis, & Davis, 2003) and
UTAUT 2 (Venkatesh, Thong,
& Xu, 2012).
Methods
Data collection
• A self-administrated online questionnaire was created in Qualtrics
• Distributed though Amazon Mechanical Turk (MTurk)
• Pilot test
• Sample size
• 558 useful responses
Page 9
Methods
Measures
• Multi-items constructs
• A seven-point Likert scale with anchors from “1-Strongly Disagree” to “7- Strongly
Agree”
• The items were derived from previous literature and changed when necessary to fit the
study context (Agarwal & Prasad, 1998; Breward et al., 2017; Kim et al., 2011;
Khalilzadeh et al., 2017; Morosan, 2011; Okumus et al., 2018; Pavlou et al., 2007;
Vekantesh et al., 2012)
Page 10
Methods
Questionnaire structure
• Screening questions
• The U.S. residents
• at least 18 years old or older
• have dined in a QSR within the last 12 months
• ordered a meal or drink through a self-service kiosk at least once.
• Scenario with photos of the system
• Questions: items of the constructs
• Questions about participants’ dining behavior
• Demographic questions
Page 11
Analysis
• Descriptive statistics
• SPSS 24
• Confirmatory factor analysis (CFA) to evaluate the measurement model
• Partial least squares (PLS) based SEM to examine the structural model and hypotheses
(Hair, Hult, Ringle, & Sarstedt, 2013)
• Smart PLS 3.6
Page 12
Findings
• 49.7% males and 49.5% females
• 67.9 % 25 - 44 years old
• 45.4% single and 45.5 % married
• More than 85% were college graduates
• Majority have dined in QSRs within a month
Page 13
Sample demographic and dining statistics
Findings Convergent validity of the measurement model
Constructs Loadings AVE CR
Effort Expectancy (EE) > 0.8 0.826 0.950
Facilitating Conditions (FC) >0.6 0.617 0.826
Hedonic Motivations (HM) >0.9 0.927 0.974
Performance Expectancy (PE) >0.8 0.847 0.957
Personal Innovativeness (PI) >0.7 0.583 0.807
Privacy Concerns (PC) >0.9 0.877 0.973
Social Influence (SI) >0.9 0.910 0.968
Perceived Security (PS) >0.9 0.952 0.975
Trust (T) >0.9 0.884 0.958
Intention to Use for a Loyalty Account
Authorization (IULA)
>0.9 0.968 0.989
Intention to Use for a Loyalty Payment
Authorization (IUPA)
>0.9 0.967 0.989
Table 1. Validity and reliability for constructs.
Page 14
Findings Discriminant validity of the measurement model
Table 2. Heterotrait-Monotrait Ratios (HTMTs).
(Henseler, Ringle, & Sarstedt, 2015)
Page 15
EE FC HM IULA IUPA PC PS PE PI SI T
EE
FC 0.754
HM 0.422 0.481
IULA 0.300 0.415 0.757
IUPA 0.267 0.379 0.716
PC 0.099 0.211 0.440 0.592 0.593
PS 0.240 0.377 0.692 0.859 0.880 0.681
PE 0.354 0.412 0.785 0.865 0.828 0.499 0.782
PI 0.388 0.363 0.260 0.306 0.277 0.101 0.228 0.280
SI 0.232 0.349 0.679 0.803 0.790 0.472 0.762 0.801 0.257
T 0.345 0.495 0.791 0.836 0.822 0.602 0.885 0.825 0.239 0.796
Findings Structural Model
Table 3. Hypotheses testing and effect size.
Note: * The effect size was determined based on Cohen’s (1988) guidelines.
Page16
Hypotheses Beta t-value p-value f Square*
H1a PE  IULA 0.382 7.562 0.000 0.191 (medium effect)
H1b PE  IUPA 0.333 6.205 0.000 0.120 (small effect)
H2a EE  IULA -0.042 1.672 0.095 0.005 (no effect)
H2b EE  IUPA -0.051 2.135 0.033 0.006 (no effect)
H3a SI  IULA 0.210 4.887 0.000 0.071 (small effect)
H3b SI  IUPA 0.232 4.912 0.000 0.071 (small effect)
H4a FC  IULA 0.016 0.586 0.558 0.001 (no effect)
H4b FC  IUPA 0.003 0.104 0.917 0.000 (no effect)
Findings Structural Model
Table 3. Hypotheses testing and effect size (Continue)
Note: * The effect size was determined based on Cohen’s (1988) guidelines.
R2=0.782 and R2=0.736 for intention to use facial recognition for loyalty account authorization and payment respectively
R2=0.700 for trust towards facial recognition
Page17
Hypotheses Beta t-value p-value f Square*
H5a HM  IULA 0.126 3.171 0.002 0.026 (small effect)
H5b HM  IUPA 0.077 1.953 0.051 0.008 (no effect)
H6a PI  IULA 0.054 2.321 0.020 0.012 (no effect)
H6b PI  IUPA 0.044 1.832 0.068 0.007 (no effect)
H7a T  IULA 0.251 5.796 0.000 0.081 (small effect)
H7b T  IUPA 0.307 6.808 0.000 0.100 (small effect)
H8 PC  T -0.051 1.793 0.073 0.005 (no effect)
H9 PS  T 0.803 28.962 0.000 1.234 (large effect)
Conclusions
• Theoretical contribution
• Extending UTAUT for the context of facial recognition in QSRs
• Comparing intentions to use facial recognition for two types of authorization: to a loyalty account
and a payment account.
• Practical implication of the results for the quick-service restaurants management.
Page18
Limitations
• A non-probability sampling
• The sample of people who have dined in QSRs in last 12 months.
• The scenario is about facial recognition integrated in self-service kiosk
Page19
Thank you very much for your
attention!
Page20
References
• Breward, M., Hassanein, K., & Head, M. (2017). Understanding consumers’ attitudes toward controversial information technologies: A contextualization approach.
Information Systems Research, 28(4), 760-774.
• Chin, W. W., Peterson, R. A., & Brown, S. P. (2008). Structural equation modeling in marketing: Some practical reminders. Journal of marketing theory and
practice, 16(4), 287-298.
• Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale, NJ: Lawrence Erlbaum Associates, Inc.
• Maxie, E. (2017, September 5). Ready or not, facial recognition is here to stay. Retrieved from https://www.verypossible.com/blog/ready-or-not-facial-
recognition-is-here-to-stay
• Morosan, C. (2011). Customers' adoption of biometric systems in restaurants: An extension of the technology acceptance model. Journal of Hospitality Marketing &
Management, 20(6), 661-690.
• Hair, J., F., Black, W. C., Babin, B. B., & Anderson, R. E. (2010). Multivariate data analysis (7th ed). Upper Saddle River, NJ: Prentice Hall.
• Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2013). A primer on partial least squares structural equation modeling (PLS-SEM). Los Angeles: Sage
publications.
• Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of
the Academy of Marketing Science, 43(1), 115-135.
• Rouse, M. (2017). Biometrics. Retrieved from https://searchsecurity.techtarget.com/definition/biometrics
• Sonawane, K. (2016). Biometric technology market by type (face recognition, iris recognition, fingerprint recognition, hand geometry recognition, signature recognition,
voice recognition and middleware recognition) and end user (public sector, banking & financial sector, healthcare, IT & telecommunication and others) - Global
opportunity analysis and industry forecast, 2015 – 2022. Reports overview. Retrieved from https://www.alliedmarketresearch.com/biometric-technology-market
• Unar, J. A., Seng, W. C., & Abbasi, A. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673-2688.
doi:10.1016/j.patcog.2014.01.016
• Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425-478.
• Venkatesh, V., Thong, J. I. L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology.
MIS Quarterly, 36(1), 157-178.
Page21

More Related Content

Similar to Customer intention to use facial recognition at quick service restaurants

American Marketing Association is collaborating with JSTOR t.docx
  American Marketing Association is collaborating with JSTOR t.docx  American Marketing Association is collaborating with JSTOR t.docx
American Marketing Association is collaborating with JSTOR t.docxjoyjonna282
 
CollectionOptimization
CollectionOptimizationCollectionOptimization
CollectionOptimizationMike Nguyen
 
Sustainability implementation and reporting in SMEs.pdf
Sustainability implementation and reporting in SMEs.pdfSustainability implementation and reporting in SMEs.pdf
Sustainability implementation and reporting in SMEs.pdfGianpieroMattei
 
ISS Service Innovation Leadership Seminar, 28 March - Jochen Wirtz
ISS Service Innovation Leadership Seminar, 28 March - Jochen WirtzISS Service Innovation Leadership Seminar, 28 March - Jochen Wirtz
ISS Service Innovation Leadership Seminar, 28 March - Jochen WirtzNUS-ISS
 
Om 0016 – quality management winter 2014
Om 0016 – quality management winter 2014Om 0016 – quality management winter 2014
Om 0016 – quality management winter 2014Mba Assignments
 
"Agent-Based Service Analytics" by Dr. Yang Li
"Agent-Based Service Analytics" by Dr. Yang Li"Agent-Based Service Analytics" by Dr. Yang Li
"Agent-Based Service Analytics" by Dr. Yang Li李杨 Dr Yang Li
 
Churn customer analysis
Churn customer analysisChurn customer analysis
Churn customer analysisDr.Bechoo Lal
 
Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3ISSIP
 
A literary study on the bonding of the Six Sigma with the Service Quality for...
A literary study on the bonding of the Six Sigma with the Service Quality for...A literary study on the bonding of the Six Sigma with the Service Quality for...
A literary study on the bonding of the Six Sigma with the Service Quality for...IJERA Editor
 
2012 to 2013 Australian Hospital Digital Scanning Survey
2012 to 2013 Australian Hospital Digital Scanning Survey2012 to 2013 Australian Hospital Digital Scanning Survey
2012 to 2013 Australian Hospital Digital Scanning Surveysquareearth
 
A study on service quality assessment in state bank of travancore
A study on service quality assessment in state bank of travancoreA study on service quality assessment in state bank of travancore
A study on service quality assessment in state bank of travancoreBella Meraki
 
Ssmed short 20110810 v15
Ssmed short 20110810 v15Ssmed short 20110810 v15
Ssmed short 20110810 v15ISSIP
 
Queuing model as a technique of queue solution in nigeria banking industry
Queuing model as a technique of queue solution in nigeria banking industryQueuing model as a technique of queue solution in nigeria banking industry
Queuing model as a technique of queue solution in nigeria banking industryAlexander Decker
 
Consumer Behavior: Factors Affecting Member Attrition and Retention
Consumer Behavior: Factors Affecting Member Attrition and RetentionConsumer Behavior: Factors Affecting Member Attrition and Retention
Consumer Behavior: Factors Affecting Member Attrition and RetentionAltegra Health
 
Developing the Dashboard
Developing the DashboardDeveloping the Dashboard
Developing the DashboardJane Chiang
 
Strategic facilities planning_hf_symposium_110907 (nx_power_lite)
Strategic facilities planning_hf_symposium_110907 (nx_power_lite)Strategic facilities planning_hf_symposium_110907 (nx_power_lite)
Strategic facilities planning_hf_symposium_110907 (nx_power_lite)2dplanning
 

Similar to Customer intention to use facial recognition at quick service restaurants (20)

American Marketing Association is collaborating with JSTOR t.docx
  American Marketing Association is collaborating with JSTOR t.docx  American Marketing Association is collaborating with JSTOR t.docx
American Marketing Association is collaborating with JSTOR t.docx
 
CollectionOptimization
CollectionOptimizationCollectionOptimization
CollectionOptimization
 
Sustainability implementation and reporting in SMEs.pdf
Sustainability implementation and reporting in SMEs.pdfSustainability implementation and reporting in SMEs.pdf
Sustainability implementation and reporting in SMEs.pdf
 
ISS Service Innovation Leadership Seminar, 28 March - Jochen Wirtz
ISS Service Innovation Leadership Seminar, 28 March - Jochen WirtzISS Service Innovation Leadership Seminar, 28 March - Jochen Wirtz
ISS Service Innovation Leadership Seminar, 28 March - Jochen Wirtz
 
15. six sigma basics pgp
15. six sigma basics pgp15. six sigma basics pgp
15. six sigma basics pgp
 
Om 0016 – quality management winter 2014
Om 0016 – quality management winter 2014Om 0016 – quality management winter 2014
Om 0016 – quality management winter 2014
 
"Agent-Based Service Analytics" by Dr. Yang Li
"Agent-Based Service Analytics" by Dr. Yang Li"Agent-Based Service Analytics" by Dr. Yang Li
"Agent-Based Service Analytics" by Dr. Yang Li
 
Churn customer analysis
Churn customer analysisChurn customer analysis
Churn customer analysis
 
Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3
 
A literary study on the bonding of the Six Sigma with the Service Quality for...
A literary study on the bonding of the Six Sigma with the Service Quality for...A literary study on the bonding of the Six Sigma with the Service Quality for...
A literary study on the bonding of the Six Sigma with the Service Quality for...
 
30120130406016
3012013040601630120130406016
30120130406016
 
2012 to 2013 Australian Hospital Digital Scanning Survey
2012 to 2013 Australian Hospital Digital Scanning Survey2012 to 2013 Australian Hospital Digital Scanning Survey
2012 to 2013 Australian Hospital Digital Scanning Survey
 
A study on service quality assessment in state bank of travancore
A study on service quality assessment in state bank of travancoreA study on service quality assessment in state bank of travancore
A study on service quality assessment in state bank of travancore
 
Ssmed short 20110810 v15
Ssmed short 20110810 v15Ssmed short 20110810 v15
Ssmed short 20110810 v15
 
Customer process management
Customer process managementCustomer process management
Customer process management
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Queuing model as a technique of queue solution in nigeria banking industry
Queuing model as a technique of queue solution in nigeria banking industryQueuing model as a technique of queue solution in nigeria banking industry
Queuing model as a technique of queue solution in nigeria banking industry
 
Consumer Behavior: Factors Affecting Member Attrition and Retention
Consumer Behavior: Factors Affecting Member Attrition and RetentionConsumer Behavior: Factors Affecting Member Attrition and Retention
Consumer Behavior: Factors Affecting Member Attrition and Retention
 
Developing the Dashboard
Developing the DashboardDeveloping the Dashboard
Developing the Dashboard
 
Strategic facilities planning_hf_symposium_110907 (nx_power_lite)
Strategic facilities planning_hf_symposium_110907 (nx_power_lite)Strategic facilities planning_hf_symposium_110907 (nx_power_lite)
Strategic facilities planning_hf_symposium_110907 (nx_power_lite)
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Customer intention to use facial recognition at quick service restaurants

  • 1. Customer Intention to Use Facial Recognition at Quick-Service Restaurants Olena Ciftci, Eun-Kyong Choi, Ph.D., and Katerina Berezina, Ph.D. Page 11/20/2020
  • 3. Introduction • Facial recognition is technology that can identify individuals by their face topology (Maxie, 2017; Unar, Seng, & Abbasi, 2014). • Facial recognition is a type of biometrics technology Page 3
  • 4. Introduction • Potential to use for loyalty program account access and/or payment authorization • chains Chick-Fil-A, KPro by KFC in China, BurgerFi; • start-ups CaliBurger in California and Malibu Poke in Dallas, Texas. • Integrated with other technology systems in restaurants • self-service kiosks, • loyalty program system • point-of-sales systems (POS) Facial recognition system in CaliBurger Page 4
  • 5. Introduction Benefits from deploying facial recognition in quick-service restaurants: • convenience for customers • much faster process of ordering • personalized service • enhancement of the customer experience • differentiation from competitors • attraction of new customers (Kim, Tang, & Bosselman, 2018). Page 5
  • 6. Introduction Industry problem Promising massive adoption business investment in technology (Morosan, 2011). Lack of academic literature on the topic Morosan, C. (2011). Customers' adoption of biometric systems in restaurants: An extension of the technology acceptance model. Page 6
  • 7. Introduction Main goal • To investigate the factors influencing customers’ adoption of facial recognition in quick-service restaurants. Page 7
  • 8. Theoretical model Page 8 H1 H2 H3 H4 H5 H6 Intention to Use for a Loyalty Account Authorization Intention to Use for a Payment Authorization Behavioral Intentions a) b) UTAUT UTAUT2 Context Performance Expectancy Effort Expectancy Social Influence Facilitating Conditions Hedonic Motivations Personal Innovativeness Privacy Concerns Perceived Security Trust H8 H9 H7 Unified Theory of Acceptance and Use of Technology: UTAUT (Venkatesh, Morris, Davis, & Davis, 2003) and UTAUT 2 (Venkatesh, Thong, & Xu, 2012).
  • 9. Methods Data collection • A self-administrated online questionnaire was created in Qualtrics • Distributed though Amazon Mechanical Turk (MTurk) • Pilot test • Sample size • 558 useful responses Page 9
  • 10. Methods Measures • Multi-items constructs • A seven-point Likert scale with anchors from “1-Strongly Disagree” to “7- Strongly Agree” • The items were derived from previous literature and changed when necessary to fit the study context (Agarwal & Prasad, 1998; Breward et al., 2017; Kim et al., 2011; Khalilzadeh et al., 2017; Morosan, 2011; Okumus et al., 2018; Pavlou et al., 2007; Vekantesh et al., 2012) Page 10
  • 11. Methods Questionnaire structure • Screening questions • The U.S. residents • at least 18 years old or older • have dined in a QSR within the last 12 months • ordered a meal or drink through a self-service kiosk at least once. • Scenario with photos of the system • Questions: items of the constructs • Questions about participants’ dining behavior • Demographic questions Page 11
  • 12. Analysis • Descriptive statistics • SPSS 24 • Confirmatory factor analysis (CFA) to evaluate the measurement model • Partial least squares (PLS) based SEM to examine the structural model and hypotheses (Hair, Hult, Ringle, & Sarstedt, 2013) • Smart PLS 3.6 Page 12
  • 13. Findings • 49.7% males and 49.5% females • 67.9 % 25 - 44 years old • 45.4% single and 45.5 % married • More than 85% were college graduates • Majority have dined in QSRs within a month Page 13 Sample demographic and dining statistics
  • 14. Findings Convergent validity of the measurement model Constructs Loadings AVE CR Effort Expectancy (EE) > 0.8 0.826 0.950 Facilitating Conditions (FC) >0.6 0.617 0.826 Hedonic Motivations (HM) >0.9 0.927 0.974 Performance Expectancy (PE) >0.8 0.847 0.957 Personal Innovativeness (PI) >0.7 0.583 0.807 Privacy Concerns (PC) >0.9 0.877 0.973 Social Influence (SI) >0.9 0.910 0.968 Perceived Security (PS) >0.9 0.952 0.975 Trust (T) >0.9 0.884 0.958 Intention to Use for a Loyalty Account Authorization (IULA) >0.9 0.968 0.989 Intention to Use for a Loyalty Payment Authorization (IUPA) >0.9 0.967 0.989 Table 1. Validity and reliability for constructs. Page 14
  • 15. Findings Discriminant validity of the measurement model Table 2. Heterotrait-Monotrait Ratios (HTMTs). (Henseler, Ringle, & Sarstedt, 2015) Page 15 EE FC HM IULA IUPA PC PS PE PI SI T EE FC 0.754 HM 0.422 0.481 IULA 0.300 0.415 0.757 IUPA 0.267 0.379 0.716 PC 0.099 0.211 0.440 0.592 0.593 PS 0.240 0.377 0.692 0.859 0.880 0.681 PE 0.354 0.412 0.785 0.865 0.828 0.499 0.782 PI 0.388 0.363 0.260 0.306 0.277 0.101 0.228 0.280 SI 0.232 0.349 0.679 0.803 0.790 0.472 0.762 0.801 0.257 T 0.345 0.495 0.791 0.836 0.822 0.602 0.885 0.825 0.239 0.796
  • 16. Findings Structural Model Table 3. Hypotheses testing and effect size. Note: * The effect size was determined based on Cohen’s (1988) guidelines. Page16 Hypotheses Beta t-value p-value f Square* H1a PE  IULA 0.382 7.562 0.000 0.191 (medium effect) H1b PE  IUPA 0.333 6.205 0.000 0.120 (small effect) H2a EE  IULA -0.042 1.672 0.095 0.005 (no effect) H2b EE  IUPA -0.051 2.135 0.033 0.006 (no effect) H3a SI  IULA 0.210 4.887 0.000 0.071 (small effect) H3b SI  IUPA 0.232 4.912 0.000 0.071 (small effect) H4a FC  IULA 0.016 0.586 0.558 0.001 (no effect) H4b FC  IUPA 0.003 0.104 0.917 0.000 (no effect)
  • 17. Findings Structural Model Table 3. Hypotheses testing and effect size (Continue) Note: * The effect size was determined based on Cohen’s (1988) guidelines. R2=0.782 and R2=0.736 for intention to use facial recognition for loyalty account authorization and payment respectively R2=0.700 for trust towards facial recognition Page17 Hypotheses Beta t-value p-value f Square* H5a HM  IULA 0.126 3.171 0.002 0.026 (small effect) H5b HM  IUPA 0.077 1.953 0.051 0.008 (no effect) H6a PI  IULA 0.054 2.321 0.020 0.012 (no effect) H6b PI  IUPA 0.044 1.832 0.068 0.007 (no effect) H7a T  IULA 0.251 5.796 0.000 0.081 (small effect) H7b T  IUPA 0.307 6.808 0.000 0.100 (small effect) H8 PC  T -0.051 1.793 0.073 0.005 (no effect) H9 PS  T 0.803 28.962 0.000 1.234 (large effect)
  • 18. Conclusions • Theoretical contribution • Extending UTAUT for the context of facial recognition in QSRs • Comparing intentions to use facial recognition for two types of authorization: to a loyalty account and a payment account. • Practical implication of the results for the quick-service restaurants management. Page18
  • 19. Limitations • A non-probability sampling • The sample of people who have dined in QSRs in last 12 months. • The scenario is about facial recognition integrated in self-service kiosk Page19
  • 20. Thank you very much for your attention! Page20
  • 21. References • Breward, M., Hassanein, K., & Head, M. (2017). Understanding consumers’ attitudes toward controversial information technologies: A contextualization approach. Information Systems Research, 28(4), 760-774. • Chin, W. W., Peterson, R. A., & Brown, S. P. (2008). Structural equation modeling in marketing: Some practical reminders. Journal of marketing theory and practice, 16(4), 287-298. • Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale, NJ: Lawrence Erlbaum Associates, Inc. • Maxie, E. (2017, September 5). Ready or not, facial recognition is here to stay. Retrieved from https://www.verypossible.com/blog/ready-or-not-facial- recognition-is-here-to-stay • Morosan, C. (2011). Customers' adoption of biometric systems in restaurants: An extension of the technology acceptance model. Journal of Hospitality Marketing & Management, 20(6), 661-690. • Hair, J., F., Black, W. C., Babin, B. B., & Anderson, R. E. (2010). Multivariate data analysis (7th ed). Upper Saddle River, NJ: Prentice Hall. • Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2013). A primer on partial least squares structural equation modeling (PLS-SEM). Los Angeles: Sage publications. • Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. • Rouse, M. (2017). Biometrics. Retrieved from https://searchsecurity.techtarget.com/definition/biometrics • Sonawane, K. (2016). Biometric technology market by type (face recognition, iris recognition, fingerprint recognition, hand geometry recognition, signature recognition, voice recognition and middleware recognition) and end user (public sector, banking & financial sector, healthcare, IT & telecommunication and others) - Global opportunity analysis and industry forecast, 2015 – 2022. Reports overview. Retrieved from https://www.alliedmarketresearch.com/biometric-technology-market • Unar, J. A., Seng, W. C., & Abbasi, A. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673-2688. doi:10.1016/j.patcog.2014.01.016 • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425-478. • Venkatesh, V., Thong, J. I. L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178. Page21