The Internet of Things (IoT) connects a massive variety of devices that transmit vast volumes of data. The size and complexity of these data flow and their continual expansion create considerable risks of identity and information breaches, device and network manipulation, and consequent impacts on application platforms. This qualitative study examines the knowledge and practices of IoT users concerning the security threats and vulnerabilities presented by these devices. The 17 semi-structured interviews reported here focus on IoT users’ understanding of their vulnerabilities and their security-related practices. While the size and characteristics of the study population are too limited to represent the universe of IoT users, the study’s findings lead to recommendations that may usefully inform future investigations of this increasingly vital topic. Through this study of the literature, it became apparent to the researcher that there is a lack of research directly related to the gaps between the user’s privacy and security practices and the unique perspective of technology adoption from expectations of the user’s privacy and security knowledge. Most importantly, this study explored factors related to users’ perceptions and social aspects as defined and measured by the Protection Motivation Theory (PMT) and the Diffusion of Innovation (DOI) model, which provides the theoretical and conceptual framework listed. However, this study’s research findings show that perceived consumer innovativeness appears to affect. At the same time, the perceived cost has a negative effect on the intention to use smart home technology, something that providers should pay close attention to.
|Advisor:||Kohun, Frederick G.|
|Commitee:||Allen, Stuart A., Lawson, John D., Pinchot, Jamie L.|
|School:||Robert Morris University|
|Department:||Information Systems and Communications|
|School Location:||United States -- Pennsylvania|
|Source:||DAI-A 82/5(E), Dissertation Abstracts International|
|Subjects:||Information science, Information Technology, Computer Engineering, Technical Communication, Web Studies|
|Keywords:||Diffusion of innovation, Internet of Things, Privacy, Protection Motivation Theory, Security, Identity protection, Identity theft, IoT users, Security training, Smart home technology|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be