Search results

1 – 2 of 2
Article
Publication date: 26 May 2022

Vikram S. Bhadauria and Anitha Chennamaneni

This study aims to investigate the threat phenomenon as perceived by Internet of Things (IoT) users and examines the role of anxiety, desire and personal innovativeness in the…

Abstract

Purpose

This study aims to investigate the threat phenomenon as perceived by Internet of Things (IoT) users and examines the role of anxiety, desire and personal innovativeness in the behavioral intention toward the usage of IoT devices.

Design/methodology/approach

A unified research model is developed based on the protection motivation theory, theory of reasoned action, theory of self-regulation and the review of relevant theoretical, empirical and practitioner literature. Data were collected from 315 assistive IoT device users and analyzed using partial least squares structural modeling.

Findings

The results indicate strong support for the proposed research model. All relationships, except one, were significant at the 0.05 level. Desire was found to play a direct as well as a moderating role between fear and behavioral intention to continue using assistive IoT devices, which was also directly influenced by anxiety and personal innovativeness.

Research limitations/implications

Understanding the security behaviors of IoT users will help researchers and practitioners develop preventive measures and robust security solutions for the IoT devices to avert any threats from cyber-attacks and to boost users’ confidence levels. Future research will benefit from replicating the study using longitudinal data.

Originality/value

This study is one of the first studies that integrate multiple perspectives to present a holistic research model. To the authors’ knowledge, anxiety, desire and personal innovativeness, key factors influencing fear and behavioral intention, have not been studied in the domain of adoption of IoT assistive devices. Additionally, the study offers a new dimension to IoT users’ security behaviors.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 29 April 2014

73

Abstract

Details

Kybernetes, vol. 43 no. 5
Type: Research Article
ISSN: 0368-492X

1 – 2 of 2