The advancement of Internet of Things (IoT) technologies has ushered in a new era of smart homes, promising convenience and automation. However, alongside these advancements, concerns regarding the security and privacy of Internet of Things smart homes have garnered significant attention. The study embarked on a user-centric analysis, delving into the intricacies of security and privacy concerns in the adoption of Internet of Things smart homes. The primary purpose of this research was to investigate the security and privacy concerns that users harbour when adopting Internet of Things smart home technologies. We used SMART-PLS version (4.0.9.6) as the data analysis tool, to examine the concerns and to gain a comprehensive understanding of their impact on adoption. The analysis was, rooted in quantitative research design and based on data gathered through an online questionnaire distributed to the target population of 325 participants. The research response rate was 92%. The hypotheses examined unveiled statistically significant relationships, culminating in results indicating an R2 of 0.762. This implies that approximately 76.2% of the rationale behind individuals' decisions to either adopt or refrain from using IoT smart home devices, with a focus on security and privacy considerations, can be elucidated by our proposed Structural Equation Model. his model served as a comprehensive lens through which we dissected the intricate interplay of variables shaping user attitudes and behaviors. The study sheds light on the critical concerns of security and privacy within the IoT smart home domain. By leveraging quantitative analysis and a well-crafted Structural Equation Model, we offer valuable insights into the factors influencing user adoption decisions. The research contributes to the broader discourse IoT technology adoption and serves as a foundation for future studies and policy considerations in the ever-evolving landscape of smart homes.
Published in | American Journal of Information Science and Technology (Volume 8, Issue 1) |
DOI | 10.11648/j.ajist.20240801.11 |
Page(s) | 1-14 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
Internet of Things, Security and Privacy, Smart Homes
[1] | M. G. A. F. M. S. A. Chandradhara, “Design of IoT based Smart Home System,” Journal of University of Shanghai for Science and Technology, vol. 23, pp. 249-261, 2021. |
[2] | R. A.-D. B. S. A. Al-Syouf, “Towards a Secure Web-Based Smart Homes,” Conference: 2021 12th International Conference on Information and Communication Systems (ICICS), pp. 195-200, 2021. |
[3] | H. &. B. S. &. A. A. &. J. A. Mrabet, “A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis,” Sensors, vol. 20, p. 3625, 2020. |
[4] | N. M. K. a. H. R. Kumar, “Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls,” Decision support systems, vol. 46, no 1, pp. 254-264, 2008. |
[5] | K. S. C. Sharma B. K, “Smart Homes adoption in India–Value-based Adoption Approach,” In 2021 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD), no 9-10, pp. 1-6, 2021. |
[6] | L. H. Z. H. Yang H, “User acceptance of smart home services: an extension of the theory of planned behavior,” Industrial Management & Data Systems, vol. 117, no 1, pp. 68-89, 2017. |
[7] | M. Islam, “An Assessment on the Smart Home Technology Adoption: Users’ Perspective,” 2018. |
[8] | P. Kowalczuk, “Consumer acceptance of smart speakers: a mixed methods approach,” Journal of Research in Interactive Marketing, vol. 12, no 4, pp. 418-431, 2018. |
[9] | J. S. K. A. P. P. S. Kumar D, “An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things,” Journal of Ambient Intelligence and Humanized Computing, pp. 1-17, 2020. |
[10] | Z. X. S. S. Pal D, “Prohibitive factors to the acceptance of Internet of Things (IoT) technology in society: A smart-home context using a resistive modelling approach,” Technology in Society, vol. 66, p. 101683, 2021. |
[11] | K. R. I. R. Bairagi A K, “An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures,” Information Security Journal: A Global Perspective, vol. 25, no 4-6, pp. 197-212, 2016. |
[12] | P. Y. C. J. Kim Y, “A study on the adoption of IoT smart home service: using Value-based Adoption Model,” Total Quality Management & Business Excellence, vol. 28, no 9-10, pp. 1149-1165, 2017. |
[13] | U. L. M. D. Piasecki S, “Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards,” Computer Law & Security Review, vol. 42, p. 105542, 2021. |
[14] | A. M. F. P. Thorburn Robert, “Towards an integrated privacy protection framework for IoT: contextualising regulatory requirements with industry best practices,” pp. 45-6, 2019. |
[15] | M. J. C. A. M. Davis B D, “Vulnerability studies and security postures of IoT devices: A smart home case study,” IEEE Internet of Things Journal, vol. 7, no 10, pp. 10102-10110, 2020. |
[16] | M. S. R. F. Zeng E, “End user security and privacy concerns with smart homes,” In thirteenth symposium on usable privacy and security, vol. SOUPS 2017, pp. 65-80, 2017. |
[17] | K. B. D. M. Devi B, “Application of Bandura’s social cognitive theory in the technology enhanced, blended learning environment,” International Journal of Applied Research, vol. 3, no 1, pp. 721-724, 2017. |
[18] | N. A. S. A. Babu R G, “Machine learning in IoT security performance analysis of outage probability of link selection for cognitive networks,” In 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 15-19, 2019. |
[19] | F. E. P. E. T. G. M. P. Celik Z B, “Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities,” ACM Computing Surveys (CSUR), vol. 52, no 4, pp. 1-30, 2019. |
[20] | S. K. Yadav A K, “Comparative analysis of consensus algorithms and issues in integration of blockchain with IoT,” In Smart Innovations in Communication and Computational Sciences: Proceedings of ICSICCS 2020, pp. 25-46, 2021. |
[21] | Y. Y. L. H. Park H, “A Study on Smart City Risk Factors and Resistance,” Convergence Security Journal, vol. 20, no 2, pp. 15-28, 2020. |
[22] | C. M. L. R. Y. C. M. Ambrosin M, “Introduction to the special issue on security and privacy for connected cyber-physical systems,” ACM Transactions on Cyber-Physical Systems, vol. 5, no 1, pp. 1-2, 2020. |
[23] | I. M. M. E.-S. I. a. L. J. Bile Hassan, “Extending the UTAUT2 model with a privacy calculus model to enhance the adoption of a health information application in Malaysia,” In Informatics, vol. 9, no 2, p. 31, 2022. |
[24] | C. R. L. M. C. L. M. A. Gonzales A, “End Users' Perspectives on the Quality and Design of mHealth Technologies During the COVID-19 Pandemic in the Philippines: Qualitative Study,” JMIR Formative Research, vol. 7, no 1, p. e41838, 2023. |
[25] | H. K. T. A. Merhi M, “A cross-cultural study of the intention to use mobile banking between Lebanese and British consumers: Extending UTAUT2 with security, privacy and trust,” Technology in Society, vol. 59, p. 101151, 2019. |
[26] | K. K. A. S. A. Widyanto H A, “Encouraging behavioral intention to use mobile payment: an extension of Utaut2,” Journal Muara Ilmu Ekonomi Dan Bisnis, vol. 4, no 1, pp. 87-97, 2020. |
[27] | T. M. S. B. Y. H. M. N. Khayer A, “Cloud computing adoption and its impact on SMEs’ performance for cloud supported operations: A dual-stage analytical approach,” Technology in Society, vol. 60, p. 101225, 2020. |
[28] | E. B. A. M. A.-R. A. S. A. Enaizan O, “Effects of privacy and security on the acceptance and usage of EMR: the mediating role of trust on the basis of multiple perspectives,” Informatics in Medicine Unlocked, vol. 21, p. 100450, 2020. |
[29] | G. S. W. S. Grandhi L. S, “A security-UTAUT framework for evaluating key security determinants in smart city adoption by the Australian city councils,” In 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter), pp. 17-22, 2021. |
[30] | M. M. E.-S. I. L. J. Bile Hassan I, “Extending the UTAUT2 model with a privacy calculus model to enhance the adoption of a health information application in Malaysia,” In Informatics, vol. 9, no 2, p. 31, 2022. |
[31] | A. G. R. M. R. G. B. R. G. E. T. P. N. V. Nunes N, “Modeling adoption, security, and privacy of COVID-19 apps: findings and recommendations from an empirical study using the unified theory of acceptance and use of technology,” MIR Human Factors, vol. 9, no 3, p. e35434, 2022. |
[32] | P. H. B. K. B. M. K. P. N. Z. Amiri P, “A qualitative study of factors influencing ePHR adoption by caregivers and care providers of Alzheimer's patients: An extension of the unified theory of acceptance and use of technology model,” Health Science Reports, vol. 6, no 7, p. e1394, 2023. |
[33] | N. S, “Factors driving the adoption of smart home technology: An empirical assessment,” Telematics and Informatics, vol. 45, p. 101283, 2019. |
[34] | M. J. C. S. Jo T. H, “Elderly perception on the internet of things-based integrated smart-home system,” Sensors, vol. 21, no 4, p. 1284, 2021. |
[35] | J. M. B. Ronville Savoury, “Exploring the Influential Determinants of IoT Adoption in the US Manufacturing Sector,” International Journal of Applied Management and Technology, vol. 20, no 1, p. 11, 2021. |
[36] | S. N. M. M. Kayali M, “The Effect of Individual Factors Mediated by Trust and Moderated by IT Knowledge on Students' Adoption of Cloud Based E-Learning,” Int. J. Innov. Technol. Explor. Eng, vol. 9, no 3, 2019. |
[37] | Statista, “Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions).,” 2023. [Online]. Available: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. [Använd September 2023]. |
[38] | W. Y. T. E. I. a. L. A. Li, “Motivations, barriers and risks of smart home adoption: From systematic literature review to conceptual framework,” Energy Research & Social Science, vol. 80, p. 102211, 2021. |
APA Style
Magara, T., Zhou, Y. (2024). Security and Privacy Concerns in the Adoption of IoT Smart Homes: A User-Centric Analysis. American Journal of Information Science and Technology, 8(1), 1-14. https://doi.org/10.11648/j.ajist.20240801.11
ACS Style
Magara, T.; Zhou, Y. Security and Privacy Concerns in the Adoption of IoT Smart Homes: A User-Centric Analysis. Am. J. Inf. Sci. Technol. 2024, 8(1), 1-14. doi: 10.11648/j.ajist.20240801.11
@article{10.11648/j.ajist.20240801.11, author = {Tinashe Magara and Yousheng Zhou}, title = {Security and Privacy Concerns in the Adoption of IoT Smart Homes: A User-Centric Analysis}, journal = {American Journal of Information Science and Technology}, volume = {8}, number = {1}, pages = {1-14}, doi = {10.11648/j.ajist.20240801.11}, url = {https://doi.org/10.11648/j.ajist.20240801.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajist.20240801.11}, abstract = {The advancement of Internet of Things (IoT) technologies has ushered in a new era of smart homes, promising convenience and automation. However, alongside these advancements, concerns regarding the security and privacy of Internet of Things smart homes have garnered significant attention. The study embarked on a user-centric analysis, delving into the intricacies of security and privacy concerns in the adoption of Internet of Things smart homes. The primary purpose of this research was to investigate the security and privacy concerns that users harbour when adopting Internet of Things smart home technologies. We used SMART-PLS version (4.0.9.6) as the data analysis tool, to examine the concerns and to gain a comprehensive understanding of their impact on adoption. The analysis was, rooted in quantitative research design and based on data gathered through an online questionnaire distributed to the target population of 325 participants. The research response rate was 92%. The hypotheses examined unveiled statistically significant relationships, culminating in results indicating an R2 of 0.762. This implies that approximately 76.2% of the rationale behind individuals' decisions to either adopt or refrain from using IoT smart home devices, with a focus on security and privacy considerations, can be elucidated by our proposed Structural Equation Model. his model served as a comprehensive lens through which we dissected the intricate interplay of variables shaping user attitudes and behaviors. The study sheds light on the critical concerns of security and privacy within the IoT smart home domain. By leveraging quantitative analysis and a well-crafted Structural Equation Model, we offer valuable insights into the factors influencing user adoption decisions. The research contributes to the broader discourse IoT technology adoption and serves as a foundation for future studies and policy considerations in the ever-evolving landscape of smart homes. }, year = {2024} }
TY - JOUR T1 - Security and Privacy Concerns in the Adoption of IoT Smart Homes: A User-Centric Analysis AU - Tinashe Magara AU - Yousheng Zhou Y1 - 2024/03/19 PY - 2024 N1 - https://doi.org/10.11648/j.ajist.20240801.11 DO - 10.11648/j.ajist.20240801.11 T2 - American Journal of Information Science and Technology JF - American Journal of Information Science and Technology JO - American Journal of Information Science and Technology SP - 1 EP - 14 PB - Science Publishing Group SN - 2640-0588 UR - https://doi.org/10.11648/j.ajist.20240801.11 AB - The advancement of Internet of Things (IoT) technologies has ushered in a new era of smart homes, promising convenience and automation. However, alongside these advancements, concerns regarding the security and privacy of Internet of Things smart homes have garnered significant attention. The study embarked on a user-centric analysis, delving into the intricacies of security and privacy concerns in the adoption of Internet of Things smart homes. The primary purpose of this research was to investigate the security and privacy concerns that users harbour when adopting Internet of Things smart home technologies. We used SMART-PLS version (4.0.9.6) as the data analysis tool, to examine the concerns and to gain a comprehensive understanding of their impact on adoption. The analysis was, rooted in quantitative research design and based on data gathered through an online questionnaire distributed to the target population of 325 participants. The research response rate was 92%. The hypotheses examined unveiled statistically significant relationships, culminating in results indicating an R2 of 0.762. This implies that approximately 76.2% of the rationale behind individuals' decisions to either adopt or refrain from using IoT smart home devices, with a focus on security and privacy considerations, can be elucidated by our proposed Structural Equation Model. his model served as a comprehensive lens through which we dissected the intricate interplay of variables shaping user attitudes and behaviors. The study sheds light on the critical concerns of security and privacy within the IoT smart home domain. By leveraging quantitative analysis and a well-crafted Structural Equation Model, we offer valuable insights into the factors influencing user adoption decisions. The research contributes to the broader discourse IoT technology adoption and serves as a foundation for future studies and policy considerations in the ever-evolving landscape of smart homes. VL - 8 IS - 1 ER -