5,554 research outputs found

    The Impacts of Privacy Rules on Users' Perception on Internet of Things (IoT) Applications: Focusing on Smart Home Security Service

    Get PDF
    Department of Management EngineeringAs communication and information technologies advance, the Internet of Things (IoT) has changed the way people live. In particular, as smart home security services have been widely commercialized, it is necessary to examine consumer perception. However, there is little research that explains the general perception of IoT and smart home services. This article will utilize communication privacy management theory and privacy calculus theory to investigate how options to protect privacy affect how users perceive benefits and costs and how those perceptions affect individuals??? intentions to use of smart home service. Scenario-based experiments were conducted, and perceived benefits and costs were treated as formative second-order constructs. The results of PLS analysis in the study showed that smart home options to protect privacy decreased perceived benefits and increased perceived costs. In addition, the perceived benefits and perceived costs significantly affected the intention to use smart home security services. This research contributes to the field of IoT and smart home research and gives practitioners notable guidelines.ope

    User Perceptions of Smart Home IoT Privacy

    Full text link
    Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more households including Internet-connected devices that continuously monitor user activities. In this study, we conduct eleven semi-structured interviews with smart home owners, investigating their reasons for purchasing IoT devices, perceptions of smart home privacy risks, and actions taken to protect their privacy from those external to the home who create, manage, track, or regulate IoT devices and/or their data. We note several recurring themes. First, users' desires for convenience and connectedness dictate their privacy-related behaviors for dealing with external entities, such as device manufacturers, Internet Service Providers, governments, and advertisers. Second, user opinions about external entities collecting smart home data depend on perceived benefit from these entities. Third, users trust IoT device manufacturers to protect their privacy but do not verify that these protections are in place. Fourth, users are unaware of privacy risks from inference algorithms operating on data from non-audio/visual devices. These findings motivate several recommendations for device designers, researchers, and industry standards to better match device privacy features to the expectations and preferences of smart home owners.Comment: 20 pages, 1 tabl

    Smart Privacy for IoT: Privacy Embedded Design for Home Automation Systems

    Get PDF
    The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems. This study was an empirical and quantitative study that evaluates the impact of users’ behavior when privacy is embedded into the design of home automation systems using a web-based survey. Prior to the main study, a Delphi study and a pilot study were conducted. A 5-point Likert scale was used for the survey items which was distributed, and 330 responses were received. A pre-analysis data screening was conducted prior to the data analysis and the Partial Least Square Structural Equation Modelling (PLS-SEM) was used to analyze the collected data, while the PROCESS macro for SPSS was used to evaluate the mediation effects of the model associated with the study. The findings from this research show the mediating effects of privacy concern on the relationship between privacy embedded design and home automation usage as well as the relationship between privacy self-efficacy and home automation usage. The study also shows that both privacy concern and home automation usage predict the two antecedents for the study. While the finding shows that the mediating effects of privacy concern on the relationship between privacy self-efficacy and home automation usage is a full mediation, the mediating effects of privacy concerns on the relationship between privacy embedded design and home automation usage shows a complementary mediating effects. The findings in this study contributes to the information systems security and privacy body of knowledge by revealing the capacity of privacy concern to predict the behavior of users of home automation usage

    The connected consumer‎: A theoretical framework of consumer adoption/consequences of the Internet of Things and smart connected objects

    Get PDF
    Over the last decade, technological and Internet innovations have increasingly invaded the consumer market (N’Goala, 2016). The Internet of Things (IoT) is becoming a common platform, and disrupts relationships between consumers and companies (Bohli et al., 2009); in essence, this is a timely research. The major goal of this thesis is to deepen the understanding of the acceptance and the adoption processes of the IoT and smart connected technologies, as well as the related consequences on perceived well-being. To do this, four contexts of study have been explored: smart connected objects, smart sleep applications, smart homes, and smart stores. First, we performed qualitative exploratory studies, and secondly we conducted quantitative studies to build conceptual models according to our qualitative findings and the literature. The results show that technology benefits are the first factors that enable technology acceptance through perceived usefulness and perceived ease of use; subsequently, self-improvement, through perceived social image and well-being benefits, are the main reasons to continue using the IoT and smart connected technologies. The acceptance and the adoption of these technologies also depend on users’ personality traits while perceived risks and fears on the use of the personal data are the main barriers. In turn, the IoT and smart connected technologies influence perceived well-being according to the experience of use, personality traits, and the technology.Le résumé en français n'a pas été communiqué par l'auteur

    Cybersecurity and smart home devices: A resource governance model

    Get PDF
    A yet to be explored area of cybersecurity, as experienced through the security embedded within a focal firm’s products, is cloud-based smart home devices being rapidly adopted in homes. Adoption of these cloud-based products is growing some 22%, indicating the potential of the home market for future revenue and profit growth. With the uncovering of generous data collection functionality currently built-into these products and the seeming routineness of data breaches in general, security and data privacy of smart home devices has been identified as a critical concern of consumers. As a first step in addressing this concern, we propose a theoretical model of cybersecurity in smart home devices based on a foundation of information governance and resource dependence theories. The Resource Governance Model provides a framework for smart home device firms to help ensure products incorporate their chosen cybersecurity design. Future direction for application of the Resource Governance Model is then discussed

    The Internet of Things Connectivity Binge: What are the Implications?

    Get PDF
    Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services and opportunities

    Risk perceptions about personal Internet-of-Things: Research directions from a multi-panel Delphi study

    Get PDF
    Internet-of-Things (IoT) research has primarily focused on identifying IoT devices\u27 organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We conduct a sequential, mixed-methods study using multi-panel Delphi and thematic analysis techniques to understand consumer risk perceptions. The results identify four themes focused on data exposure and user experiences within IoT devices. Our thematic analysis also identified several emerging risks associated with the evolution of IoT device functionality and its potential positioning as a resource for malicious actors to conduct security attacks
    corecore