Home IoT resistance: Extended privacy and vulnerability perspective

被引:49
作者
Lee, Hwansoo [1 ]
机构
[1] Dankook Univ, Dept Convergence Secur, 152 Jukjeon Ro, Yongin 16890, Gyeonggi Do, South Korea
关键词
Home IoT; Resistance behavior; Perceived vulnerability; Physical privacy concerns; Information privacy concerns; INFORMATION PRIVACY; INTERNET; THINGS; TECHNOLOGY; PERCEPTIONS; ADOPTION; RISK; CHALLENGES; RESPONSES; EDUCATION;
D O I
10.1016/j.tele.2020.101377
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Home Internet of Things (IoT) services are expected to augment the efficiency and comfort of users' daily lives; however, this expectation is eclipsed by concerns regarding privacy and vulnerability. While these concerns critically impact the acceptance of IoT services for the home, they have been discussed primarily from a traditional point of view; academic discussions of privacy and vulnerability in the current environment are lacking. This study extends existing privacy and vulnerability theories to demonstrate the importance of physical privacy and user vulnerability protections in home IoT environments. To validate the proposed research model, an empirical analysis was conducted on 265 samples with a partial least squares structural equation modeling technique. The differences in vulnerability factors, along with privacy concerns and resistance to home IoT services, were also compared by gender, experience, and type of housing. Results show that user vulnerability has the strongest impact on home IoT privacy concerns and resistance to home IoT environments. Additionally, this study found that personal factors appear differently across vulnerabilities, privacy concerns, and home IoT resistance. This study extends the traditional concepts of privacy and vulnerability to the home IoT environment.
引用
收藏
页数:12
相关论文
共 88 条
[71]  
Ram S., 1989, Journal of Consumer Marketing, V6, P5, DOI [DOI 10.1108/EUM0000000002542, https://doi.org/10.1108/EUM0000000002542]
[72]  
Sheth J.N., 1979, Psychology of innovation resistance: The less developed concept (LDC) in diffusion research
[73]  
Smith HJ, 2011, MIS QUART, V35, P989
[74]  
Son JY, 2008, MIS QUART, V32, P503
[75]   Analysis of end user security behaviors [J].
Stanton, JM ;
Stam, KR ;
Mastrangelo, P ;
Jolton, J .
COMPUTERS & SECURITY, 2005, 24 (02) :124-133
[76]   Three forms of innovation resistance: the case of retail payment methods [J].
Szmigin, I ;
Foxall, G .
TECHNOVATION, 1998, 18 (6-7) :459-468
[77]   Websites, data types and information privacy concerns: A contingency model [J].
Tang, Jih-Hsin ;
Lin, Yi-Jen .
TELEMATICS AND INFORMATICS, 2017, 34 (07) :1274-1284
[78]   Gaining trust through online privacy protection:: Self-regulation, mandatory standards, or Caveat Emptor [J].
Tang, Zhulei ;
Hu, Yu ;
Smith, Michael D. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 24 (04) :153-173
[79]   PLS path modeling [J].
Tenenhaus, M ;
Vinzi, VE ;
Chatelin, YM ;
Lauro, C .
COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2005, 48 (01) :159-205
[80]   IoT as a Land of Opportunity for DDoS Hackers [J].
Vlajic, Natalija ;
Zhou, Daiwei .
COMPUTER, 2018, 51 (07) :26-34