Privacy concerns in the smart home context

With the rapid development of the Internet of Things, intelligent systems are increasingly finding their way into everyday life and into people’s homes. With the spread of these technologies, there is a growing concern about what sensitive data is collected and what it is used for. Unfortunately, the role of privacy has remained largely unexplored in the smart home (SH) usage context. This study addresses this gap in literature: to what extend users’ concerns for information privacy influence the intended SH usage. This study takes an interactional psychology perspective and links the dimensions of the privacy concerns to the intention to use SH devices. Therefore, a multi-theoretical model using Smart PLS 3.2.8 was tested. This study contributes to the literature on privacy, and SH usage by exploring how and why privacy concerns influence participants’ intended SH usage. The findings, derived from the empirical study emphasize the importance of addressing privacy concerns because they are capable of directly and indirectly influencing the intended SH usage. Finally, the results which indicate new directions for privacy and SH research are discussed and implications for research and practice are given.

[1]  France Bélanger,et al.  The role of information systems research in shaping the future of information privacy , 2015, Inf. Syst. J..

[2]  Martina Ziefle,et al.  Smart Home Medical Technologies: Users’ Requirements for Conditional Acceptance , 2016, i-com.

[3]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[4]  D. Whitten,et al.  The Chief Information Security Officer: An Analysis of the Skills Required for Success , 2008, J. Comput. Inf. Syst..

[5]  Michael H. Breitner,et al.  Focusing the customer through smart services: a literature review , 2019, Electron. Mark..

[6]  Rahmath Safeena,et al.  Combination of TAM and TPB in Internet Banking Adoption , 2013 .

[7]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[8]  Yiwen Gao,et al.  International Journal of Medical Informatics , 2016 .

[9]  Ron Cottam,et al.  Hierarchy and the Nature of Information , 2016, Inf..

[10]  Zakaria Maamar,et al.  Privacy-Aware Web Services in Smart Homes , 2009, ICOST.

[11]  I. Ajzen The theory of planned behavior , 1991 .

[12]  M. Denscombe The Good Research Guide: for small-scale social research projects , 1998 .

[13]  Jiyun Kang,et al.  A model of sustainable household technology acceptance , 2016 .

[14]  Byoungsoo Kim,et al.  An empirical investigation of mobile data service continuance: Incorporating the theory of planned behavior into the expectation-confirmation model , 2010, Expert Syst. Appl..

[15]  Hangjung Zo,et al.  Industrial Management & Data Systems , 2017 .

[16]  Saonee Sarker,et al.  Examination of the Determinants of Smart Meter Adoption: An User Perspective , 2012, ICIS.

[17]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[18]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[19]  Paulo Rita,et al.  Privacy concerns and online purchasing behaviour: Towards an integrated model , 2016 .

[20]  Martin Wetzels,et al.  Hierarchical latent variable models in PLS-SEM: guidelines for using reflective-formative type models , 2012 .

[21]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[22]  N. Wünderlich,et al.  Contrasting risk perceptions of technology-based service innovations in inter-organizational settings , 2016 .

[23]  Ella Kolkowska Privacy Principles in Design of Smart Homes Systems in Elderly Care , 2015, HCI.

[24]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[25]  Wolfgang Kastner,et al.  ThinkHome Energy Efficiency in Future Smart Homes , 2011, EURASIP J. Embed. Syst..

[26]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[27]  L. Whitmarsh,et al.  Social barriers to the adoption of smart homes , 2013 .

[28]  José L. Roldán,et al.  European management research using partial least squares structural equation modeling (PLS-SEM) , 2015 .

[29]  E. Weber,et al.  Cross‐Cultural Differences in Risk Perception: A Model‐Based Approach , 1997 .

[30]  LinJudy Chuan-Chuan,et al.  An empirical examination of consumer adoption of Internet of Things services , 2016 .

[31]  Paul Benjamin Lowry,et al.  security and privacy research lies , 2017 .

[32]  Jason Bennett Thatcher,et al.  Conceptualizing models using multidimensional constructs: a review and guidelines for their use , 2012, Eur. J. Inf. Syst..

[33]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[34]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[35]  Nadine Guhr,et al.  The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory , 2019, Inf. Syst. J..

[36]  Yonghee Kim,et al.  A study on the adoption of IoT smart home service: using Value-based Adoption Model , 2017 .

[37]  Fred D. Davis,et al.  A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .

[38]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[39]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[40]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[41]  Ricardo Neisse,et al.  Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[42]  William Enck,et al.  Defending Users against Smartphone Apps: Techniques and Future Directions , 2011, ICISS.

[43]  Chuang Wang,et al.  Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..

[44]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[45]  Chin-Lung Hsu,et al.  An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives , 2016, Comput. Hum. Behav..

[46]  Mohamed Cheriet,et al.  Attribute-Based Encryption for Preserving Smart Home Data Privacy , 2017, ICOST.

[47]  Alexander Maedche,et al.  Interaktion mit smarten Systemen — Aktueller Stand und zukünftige Entwicklungen im Bereich der Nutzerassistenz , 2017, Wirtschaftsinformatik Manag..

[48]  Paul Jen-Hwa Hu,et al.  Examining technology acceptance by school teachers: a longitudinal study , 2003, Inf. Manag..

[49]  J. Edwards Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical Framework , 2001 .

[50]  Andrew M. Farrell,et al.  Insufficient Discriminant Validity: A Comment on Bove, Pervan, Beatty and Shiu (2009) , 2008 .

[51]  M. Sarstedt,et al.  A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .

[52]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[53]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[54]  Viswanath Venkatesh,et al.  Technology adoption decisions in the household: A seven‐model comparison , 2014, J. Assoc. Inf. Sci. Technol..

[55]  Au Vo,et al.  Emerging Trends in Smart Home Security, Privacy, and Digital Forensics , 2016, AMCIS.

[56]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[57]  F. Aldrich Smart Homes: Past, Present and Future , 2003 .

[58]  Alexander Maedche,et al.  Advanced User Assistance Systems , 2016, Bus. Inf. Syst. Eng..

[59]  Heather Patterson,et al.  The Contextual Complexity of Privacy in Smart Homes and Smart Buildings , 2016, HCI.

[60]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[61]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[62]  Liudmila Kokoulina,et al.  Smart Services Classification Framework , 2015, FedCSIS.