Skip to main content

Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts

  • Conference paper
Knowledge and Technologies in Innovative Information Systems (MCIS 2012)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 129))

Included in the following conference series:

Abstract

Internet of Things (IOT) services provide new security and privacy challenges in our everyday life. But no empirical instrument has been developed for the class of IOT services that identifies privacy factors that predict usage intentions and individuals’ willingness to provide personal information. The contribution of this paper is to address this lack of research. The proposed research model integrates the Extended Privacy Calculus Model and the Technology Acceptance Model and is pre-tested with 30 IOT experts. Results indicate that intentions to use IOT services are influenced by various factors such as perceived privacy risks and personal interest. It is further assumed that factors such as legislation, data security or transparency of information use influence the adoption of IOT services. Accordingly, further research must focus on a better understanding of these factors to increase the adoption of both useful and secure IOT services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajzen, I.: The theory of planned behavior. Organizational Behavior and Human Decision Processes 50(2), 179–211 (1991)

    Article  Google Scholar 

  2. Ajzen, I., Fishbein, M.: Understanding Attitudes and Predicting Social Behaviour. Prentice Hall, Inglewood Cliffs (1980)

    Google Scholar 

  3. Awad, N.F., Krishnan, M.S.: The personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly 30(1), 13–28 (2006)

    Google Scholar 

  4. Barclay, D., Thompson, R., Higgins, C.: The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies 2(2), 285–309 (1995)

    Google Scholar 

  5. Bélanger, F., Crossler, R.E.: Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly 35(4), 1017–1041 (2011)

    Google Scholar 

  6. Chin, W.W.: Issues and Opinion on Structural Equation Modeling. MIS Quarterly 22(1), vii–xvi (1998)

    Google Scholar 

  7. Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13(3), 319–339 (1989)

    Article  Google Scholar 

  8. Davis, F.D., Venkatesh, V.: Toward preprototype user acceptance testing of new information systems: Implications for software project management. IEEE Trans. on Engineering Management 51(1), 31–46 (2004)

    Article  Google Scholar 

  9. Dhillon, G., Torkzadeh, G.: Value-focused assessment of information system security in organizations. Information Systems Journal 16(3), 293–314 (2006)

    Article  Google Scholar 

  10. Dinev, T., Hart, P.: An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research 17(1), 61–80 (2006)

    Article  Google Scholar 

  11. Gefen, D., Straub, D., Boudreau, M.-C.: Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems 7(7), 1–78 (2000)

    Google Scholar 

  12. Janzen, S., Kowatsch, T., Maass, W.: A Methodology for Content-Centered Design of Ambient Environments. In: Winter, R., Zhao, J.L., Aier, S. (eds.) DESRIST 2010. LNCS, vol. 6105, pp. 210–225. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Kamis, A., Koufaris, M., Stern, T.: Using an Attribute-Based Decision Support System for User-Customized Products Online: An Experimental Investigation. MIS Quarterly 32(1), 159–177 (2008)

    Google Scholar 

  14. Komiak, S.Y.X., Benbasat, I.: The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents. MIS Quarterly 30(4), 941–960 (2006)

    Google Scholar 

  15. Kowatsch, T., Maass, W., Weber, R., Weber, R.: The Internet of Things Initiative (IOT-I) Deliverable 2.2: Initial Social Acceptance and Impact Evaluation, FP7 ICT project, contract number: 257565 (2011)

    Google Scholar 

  16. Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: A multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)

    Article  Google Scholar 

  17. Moore, G.C., Benbasat, I.: Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2(3), 192–222 (1991)

    Article  Google Scholar 

  18. Nunnally, J.C.: Psychometric Theory. McGraw-Hill, New York (1967)

    Google Scholar 

  19. Presser, M., Krco, S.: The Internet of Things Initiative (IOT-I) Deliverable 2.1: Initial report on IoT applications of strategic interest, FP7 ICT project, contract number: 257565 (2011)

    Google Scholar 

  20. Rust, R.T., Kannan, P.K., Peng, N.: The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science 30(4), 455–464 (2002)

    Article  Google Scholar 

  21. Siponen, M.T., Iivari, J.: IS Security Design Theory Framework and Six Approaches to the Application of IS Security Policies and Guidelines. Journal of the Association for Information Systems 7(7), 445–472 (2006)

    Google Scholar 

  22. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425–478 (2003)

    Google Scholar 

  23. Weber, R.: Internet of Things - New security and privacy challenges. Computer Law & Security 23(1), 23–30 (2010)

    Article  Google Scholar 

  24. Wixom, B.H., Todd, P.A.: A Theoretical Integration of User Satisfaction and Technology Acceptance. Information Systems Research 16(1), 85–102 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kowatsch, T., Maass, W. (2012). Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds) Knowledge and Technologies in Innovative Information Systems. MCIS 2012. Lecture Notes in Business Information Processing, vol 129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33244-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33244-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33243-2

  • Online ISBN: 978-3-642-33244-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics