To read this content please select one of the options below:

Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator

Arif Mahmud (School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia and Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh)
Mohd Najwadi Yusoff (School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia)
Mohd Heikal Husin (School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia)

Journal of Systems and Information Technology

ISSN: 1328-7265

Article publication date: 28 March 2023

Issue publication date: 12 June 2023

287

Abstract

Purpose

The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a research gap by verifying the protection motivation theory using gender as a moderator.

Design/methodology/approach

The authors used a purposive sampling approach to collect data from Dhaka city, in which 370 valid responses were selected. Additionally, the quantitative and cross-sectional survey used a seven-point Likert scale. Afterward, the evaluation approach included three phases: a measurement model, a structural model and multi-group analysis.

Findings

Vulnerability, self-efficacy and response-efficacy were discovered to be critical predictors with a variance of 60.4%. Moreover, there was a significant disparity between males and females in two relationships, response efficacy and intention as well as response cost and intention.

Practical implications

This research expands our understanding of Generation Z consumers' behavioral intentions to take measures against household threats, allowing preventative programs to be improved. Further, in the case of applying coping strategies, a practical difference between males and females has been found that must be bridged through awareness campaigns.

Originality/value

This study has made a unique contribution to the information system literature. First, the role of protection motivation theory factors in addressing security concerns in homes has been assessed. Second, the coping evaluation process has a greater impact on users' intentions than the threat appraisal process. However, males and females use slightly different approaches to defending themselves against the threat.

Keywords

Citation

Mahmud, A., Yusoff, M.N. and Husin, M.H. (2023), "Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator", Journal of Systems and Information Technology, Vol. 25 No. 2, pp. 133-159. https://doi.org/10.1108/JSIT-02-2022-0054

Publisher

:

Emerald Publishing Limited

Copyright © 2023, Emerald Publishing Limited

Related articles