Abstract
Internet of Things (IOT) services provide new security and privacy challenges in our everyday life. But no empirical instrument has been developed for the class of IOT services that identifies privacy factors that predict usage intentions and individuals’ willingness to provide personal information. The contribution of this paper is to address this lack of research. The proposed research model integrates the Extended Privacy Calculus Model and the Technology Acceptance Model and is pre-tested with 30 IOT experts. Results indicate that intentions to use IOT services are influenced by various factors such as perceived privacy risks and personal interest. It is further assumed that factors such as legislation, data security or transparency of information use influence the adoption of IOT services. Accordingly, further research must focus on a better understanding of these factors to increase the adoption of both useful and secure IOT services.
Chapter PDF
Similar content being viewed by others
Keywords
References
Ajzen, I.: The theory of planned behavior. Organizational Behavior and Human Decision Processes 50(2), 179–211 (1991)
Ajzen, I., Fishbein, M.: Understanding Attitudes and Predicting Social Behaviour. Prentice Hall, Inglewood Cliffs (1980)
Awad, N.F., Krishnan, M.S.: The personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly 30(1), 13–28 (2006)
Barclay, D., Thompson, R., Higgins, C.: The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies 2(2), 285–309 (1995)
Bélanger, F., Crossler, R.E.: Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly 35(4), 1017–1041 (2011)
Chin, W.W.: Issues and Opinion on Structural Equation Modeling. MIS Quarterly 22(1), vii–xvi (1998)
Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13(3), 319–339 (1989)
Davis, F.D., Venkatesh, V.: Toward preprototype user acceptance testing of new information systems: Implications for software project management. IEEE Trans. on Engineering Management 51(1), 31–46 (2004)
Dhillon, G., Torkzadeh, G.: Value-focused assessment of information system security in organizations. Information Systems Journal 16(3), 293–314 (2006)
Dinev, T., Hart, P.: An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research 17(1), 61–80 (2006)
Gefen, D., Straub, D., Boudreau, M.-C.: Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems 7(7), 1–78 (2000)
Janzen, S., Kowatsch, T., Maass, W.: A Methodology for Content-Centered Design of Ambient Environments. In: Winter, R., Zhao, J.L., Aier, S. (eds.) DESRIST 2010. LNCS, vol. 6105, pp. 210–225. Springer, Heidelberg (2010)
Kamis, A., Koufaris, M., Stern, T.: Using an Attribute-Based Decision Support System for User-Customized Products Online: An Experimental Investigation. MIS Quarterly 32(1), 159–177 (2008)
Komiak, S.Y.X., Benbasat, I.: The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents. MIS Quarterly 30(4), 941–960 (2006)
Kowatsch, T., Maass, W., Weber, R., Weber, R.: The Internet of Things Initiative (IOT-I) Deliverable 2.2: Initial Social Acceptance and Impact Evaluation, FP7 ICT project, contract number: 257565 (2011)
Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: A multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)
Moore, G.C., Benbasat, I.: Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2(3), 192–222 (1991)
Nunnally, J.C.: Psychometric Theory. McGraw-Hill, New York (1967)
Presser, M., Krco, S.: The Internet of Things Initiative (IOT-I) Deliverable 2.1: Initial report on IoT applications of strategic interest, FP7 ICT project, contract number: 257565 (2011)
Rust, R.T., Kannan, P.K., Peng, N.: The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science 30(4), 455–464 (2002)
Siponen, M.T., Iivari, J.: IS Security Design Theory Framework and Six Approaches to the Application of IS Security Policies and Guidelines. Journal of the Association for Information Systems 7(7), 445–472 (2006)
Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425–478 (2003)
Weber, R.: Internet of Things - New security and privacy challenges. Computer Law & Security 23(1), 23–30 (2010)
Wixom, B.H., Todd, P.A.: A Theoretical Integration of User Satisfaction and Technology Acceptance. Information Systems Research 16(1), 85–102 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kowatsch, T., Maass, W. (2012). Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds) Knowledge and Technologies in Innovative Information Systems. MCIS 2012. Lecture Notes in Business Information Processing, vol 129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33244-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-33244-9_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33243-2
Online ISBN: 978-3-642-33244-9
eBook Packages: Computer ScienceComputer Science (R0)