Internet of Things (IoT) Privacy and Security: A User-Focused Study of Aotearoa New Zealand Home Users

This study focuses on behavior of everyday Aotearoa New Zealand (Aotearoa) home users of Internet of Things (IoT) consumer devices. It considers Protection Motivation Theory (PMT) as an approach to modification of user behavior to improve safety in terms of privacy and security. Our aim is to better understand safety for everyday users of IoT consumer devices in the home. We want to understand human barriers to safety in Aotearoa users’ perceptions and behaviors, and learn what everyday users perceive and understand about IoT privacy and security at home. This study aims to investigate IoT user behavior alignment with PMT. The main contributions of this paper explore Aotearoa users’ perceptions and behaviors towards IoT devices in the home through the theoretical lens of PMT, and determine which of the four factors of PMT contribute

[1]  L. Hadlington Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours , 2017, Heliyon.

[2]  Víctor Juan Expósito Jiménez,et al.  An overview of wireless IoT protocol security in the smart home domain , 2017, 2017 Internet of Things Business Models, Users, and Networks.

[3]  Mariana Cains,et al.  Trust as a Human Factor in Holistic Cyber Security Risk Assessment , 2015 .

[4]  John A Hughes,et al.  Sociological Analysis: Methods of Discovery , 1976 .

[5]  Mohamed E. Seliaman,et al.  The Impact of Privacy Concerns and Perceived Vulnerability to Risks on Users Privacy Protection Behaviors on SNS: A Structural Equation Model , 2016 .

[6]  John W. Creswell,et al.  A Concise Introduction to Mixed Methods Research , 2014 .

[7]  Gretchen Rossman,et al.  Learning in the Field: An Introduction to Qualitative Research , 1998 .

[8]  Donald H. Rumsfeld Known and Unknown: A Memoir , 2011 .

[9]  Michael E. Lesk,et al.  Privacy and Cybersecurity: The Next 100 Years , 2012, Proceedings of the IEEE.

[10]  Mizuho Iwaihara,et al.  Associations between privacy, risk awareness, and interactive motivations of social networking service users, and motivation prediction from observable features , 2015, Comput. Hum. Behav..

[11]  Maximilian von Grafenstein,et al.  Privacy and Security in Autonomous Vehicles , 2017 .

[12]  J. Friedrich,et al.  Security Engineering: a Guide to Building Dependable Distributed Systems Banking and Bookkeeping , 2022 .

[13]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[14]  Blake Ives,et al.  Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .

[15]  Ahmad-Reza Sadeghi,et al.  Internet of things or threats?: on building trust in IoT (keynote) , 2018, CODES+ISSS.

[16]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..

[17]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[18]  Inho Choi,et al.  Parental Mediation Regarding Children's Smartphone Use: Role of Protection Motivation and Parenting Style , 2017, Cyberpsychology Behav. Soc. Netw..

[19]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[20]  Araz Taeihagh,et al.  Autonomous Vehicles for Smart and Sustainable Cities: An In-Depth Exploration of Privacy and Cybersecurity Implications , 2018, ArXiv.

[21]  A. Edmondson,et al.  METHODOLOGICAL FIT IN MANAGEMENT FIELD RESEARCH. , 2007 .

[22]  Yair Levy,et al.  The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse , 2013 .

[23]  R. W. Rogers,et al.  Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .

[24]  Teodor Sommestad,et al.  A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour , 2015, Int. J. Inf. Secur. Priv..

[25]  George A. Akerlof,et al.  The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .

[26]  Marc Dupuis,et al.  Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices , 2018, SIGITE.