1,741
Views
0
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

Determinants of user acceptance of wearable IoT devices

& ORCID Icon | (Reviewing editor)
Article: 2087456 | Received 09 Jan 2022, Accepted 06 Jun 2022, Published online: 21 Jun 2022

References

  • Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). A survey on enabling technologies, protocols, and applications of the internet. IEEE Communications Surveys & Tutorials, 17(4), 2347–17. https://doi.org/10.1109/COMST.2015.2444095
  • Ali, D. H. (2015). A social Internet of things application architecture: Applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds. [Ph.D. thesis]. National Institute of Telecommunications.
  • Bower, M., & Sturman, D. (2015). What are the educational affordances of wearable technologies? Computers & Education, 88, 343–353. https://doi.org/10.1016/j.compedu.2015.07.013
  • Canhoto, A. I., & Arp, S. (2017). Exploring the factors that support adoption and sustained use of health and fitness wearables. Journal of Marketing Management, 33(1–2), 32–60. https://doi.org/10.1080/0267257X.2016.1234505
  • Cavalry. (2014). Five star automotive cyber safety framework. I Am The Cavalry. August 2014. Accessed 2017, July 4. https://iamthecavalry.org/5star
  • Chakraborty, P., Neogi, B., & Das, A. (2020). Knowledge Based database of arm-muscle and activity characterization during load pull exercise using Diagnostic Electromyography (D-EMG) Signal. Cogent Engineering, 7(1, 1849942. Zhongmin Jin (Reviewing editor). https://doi.org/10.1080/23311916.2020.1849942.
  • Chang, L. J., & Sanfey, A. G. (2013). Great expectations: Neural computations underlying the use of social norms in decision making. Social. Cognitive, & Affective Neuroscience, 8(3), 277–284. https://doi.org/10.1093/scan/nsr094
  • Chau, K. Y., Cheung, M. L., Lam, H. S., Tso, K. H., Flint, S. W., Broom, D. R., Tse, G., & Li, K. Y. (2019). Smart technology for healthcare: Exploring the antecedents of adoption intention of healthcare wearable technology in Hong Kong. Health Psychology Research, 7(1), in), inpress. https://doi.org/10.4081/hpr.2019.8099
  • Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology Management, 6(2), 181–202. https://doi.org/10.1007/s10799-005-5879-y
  • Chen, J., & Dibb, S. (2010). Consumer trust in the online retail context: Exploring the antecedents and consequences. Psychology & Marketing, 27(4), 323–346. https://doi.org/10.1002/mar.20334
  • Chung, A., & Rimal, R. N. (2016). Social norms: A review. Review of Communication Research, 2016(4), 1–28. https://doi.org/10.12840/.2255-4165.2016.04.01.008
  • Cislaghi, B., & Heise, L. (2020). Gender norms and social norms: Differences, similarities and why they matter in prevention science. Sociology of Health & Illness, 42(2), 407–422. 2020 0141-9889. https://doi.org/10.1111/1467-9566.13008.
  • Crager, K., & Maiti, A. (2017). Information leakage through mobile motion sensors: User awareness and concerns. Proceedings of the European Workshop on Usable Security (EuroUSEC). https://doi.org/10.14722/eurousec.2017.23013
  • Culbert, D. (2020). Personal data breaches and securing IoT devices. https://betanews.com/2019/08/13/securing-iot-devices.
  • Da Xu, L., He, W., & Li, S. (2014). Internet of Things in Industries: A Survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243. https://doi.org/10.1109/TII.2014.2300753
  • Datta, P., Namin, A. S., & Chatterjee, M. (2018). A survey of privacy concerns in wearable devices. Conference: 2018 IEEE International Conference on Big Data (Big Data). https://doi.org/10.1109/BigData.2018.8622110
  • Daubert, J., Wiesmaier, A., & Kikiras, P. (2015). A view on privacy & trust in IoT. In: 2015 IEEE International Conference on Communication Workshop (ICCW). IEEE.
  • Erişen, S. D T Pham (Reviewing editor). (2022). IoT-Based Real-Time updating multi-layered learning system. applied for a special care context during COVID-19. Cogent Engineering, 9(1), 2044588. https://doi.org/10.1080/23311916.2022.2044588.
  • Flaherty, J. L. (2014). Digital diagnosis: Privacy and the regulation of mobile phone health applications. American Journal of Law & Medicine, 40 (4), 416–441 doi:10.1177/1073110520917041. [PubMed] [Google Scholar].
  • Gessner, D., Olivereau, A., Segura, A. S., & Serbanati, A. (2012, June 25–27). Trustworthy infrastructure services for a secure and privacy-respecting internet of things. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 998–1003). Liverpool, England.
  • Granjal, J., Monteiro, E., & Sá Silva, J. S. (2015). Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communication Surveys & Tutorials, 17(3), 1294–1312. third quarter, 2015. https://doi.org/10.1109/COMST.2015.2388550.
  • Greenberg, G. D., Miller, J. A., Mohr, L. B., & Vladeck, B. C. (1977). Developing public policy theory: Perspectives from empirical research. The American Political Science Review, 71(4), 1532–1543. https://doi.org/10.2307/1961494
  • Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/10.1016/j.future.2013.01.010
  • Habibipour, A., Padyab, A., & Ståhlbröst, A. (2019). Social, ethical and ecological issues in wearable technologies. Twenty-fifth Americas Conference on Information Systems, Cancun (pp. 2019).
  • Hamblen, M. (2015). As smartwatches gain traction, personal data privacy worries mount: Companies could use wearables to track employees’ fitness, or even their whereabouts, in computerworld Computer World .
  • Horne, C., Darras, B., Bean, E., Srivastava, A., & Frickel, S. (2015). Privacy, technology, and norms: The case of smart meters. Social Science Research, 51, 64–76. https://doi.org/10.1016/j.ssresearch.2014.12.003
  • Hu, P. J. H., Clark, T. H. K., & Ma, W. W. (2003). Examining technology acceptance by school teachers: A longitudinal study. Information Management, 41(2), 227–241. https://doi.org/10.1016/S0378-7206(03)00050-8
  • IBM Watson Foundations. (2015). Maximize Insight, Ensure Trust and Improve IT Economics – United States. Accessed 2017, July 4. https://www.ibm.com/big-data/us/en/big-data-and-analytics/it-economics.html
  • ICO. (2017). GDPR consent guidance for consultation. Accessed 2017, July 4. https://ico.org.uk/media/about-the-ico/consultations/2013551/draft-gdpr-consent-guidance-for-consultation-201703.pdf
  • Jones, M. L., & Meurer, K. (2016,May 13-14). Can (and Should) hello barbie keep a secret?. 2016 IEEE International Symposium on Ethics in Engineering, Science and Technology, Vancouver, BC. https://papers.ssrn.com/sol3/papers.cfm?Abstract_id=2768507 IEEE .
  • Kumar, N., Madhuri, J., & ChanneGowda, M. (2017). Review on security and privacy concerns in internet of things. In 2017 International Conference on IoT and Application (ICIOT) (pp. 1–5). https://doi.org/10.1109/ICIOTA.8073640
  • Lee, Y., Yang, W., & Kwon, T. (2018). Data transfusion: Pairing wearable devices and its implication on security for internet of things. IEEE Access, 6, 48994–49006. https://doi.org/10.1109/ACCESS.2018.2859046
  • Levin, D. B. (2002). Building social norms on the internet. Yale Journal of Law & Technology, 2, 99 https://openyls.law.yale.edu/bitstream/handle/20.500.13051/7837/03_4YaleJL_Tech97_2001_2002_.pdf?sequence=2.
  • Levitt, T. (2015). Internet of things: IoT governance, privacy and security issues European Commission
  • Li, S., Li, D., & Shanshan, Z. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259. https://doi.org/10.1007/s10796-014-9492-7
  • Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals’ adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International Journal of Medical Informatics, 88, 8–17. https://doi.org/10.1016/j.ijmedinf.2015.12.010
  • Liang, G., Weller, S. R., Junhua, Z., Fengji, L., & Zhao, Y. D. (2017). The 2015 Ukraine Blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems, 32(4), 3317–3318. https://doi.org/10.1109/TPWRS.2016.2631891
  • Lindley, J., Coultona, P., & Altera, H. (2019). Networking with ghosts in the machine. Paper presented at theRunning withScissors, 13th EAD Conference (pp. 1–13). Dundee: Taylor & Francis Group.
  • Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K. 2015. When good becomes evil: Keystroke inference with smartwatch. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1273–1285), ACM. https://doi.org/10.1145/2810103.2813668
  • Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 102, 83–95. https://doi.org/10.1016/j.comnet.2016.03.011
  • Marino, C., Gini, G., Angelini, F., Vieno, A., & Spada, M. M. (2020). Social norms and e-motions in problematic social media use among adolescents. Addictive Behaviors Reports, 11(June), 100250. https://doi.org/10.1016/j.abrep.2020.100250
  • Martin, K., & Nissenbaum, H. (2016). Measuring privacy: An empirical test using context to expose confounding variables. Columbia Science and Technology Law Review, 18 1 , 176 https://doi.org/10.7916/stlr.v18i1.4015.
  • Martin, K., Shilton, K., & Smith, J. (2019). Business and the ethical implications of technology: Introduction to the symposium. Journal of Business Ethics, 160(2), 307–317. https://doi.org/10.1007/s10551-019-04213-9
  • Matyszczyk, ca. (2015). Samsung’s warning: Our Smart TVs record your living room chatter CNET . https://www.cnet.com/news/samsungs-warning-our-smart-tvs-record-your-living-room-chatter/
  • McLeod, S. A. (2008). Social roles. simply psychology Simply Scholar Ltd . https://www.simplypsychology.org/social-roles.html .
  • Miller, D. T., & Prentice, D. A. (2016). Changing norms to change behavior. Annual Review of Psychology, 67(1), 339–361. https://doi.org/10.1146/annurev-psych-010814-015013
  • Monther, A. A., & Tawalbeh, L. (2020). Security techniques for intelligent spam sensing and anomaly detection in online social platforms. International Journal of Electrical and Computer Engineering, 10(4), 2088–8708 http://doi.org/10.11591/ijece.v10i1.pp275-287.
  • Motti, V. G., & Caine, K. 2015. “Users’ privacy concerns about wearables”, International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg (Springer) (pp. 231–244).
  • Nelson, B. (2016). Children’s connected toys: Data security and privacy concerns. United States Congress Senate Committee on Commerce, Science, and Transportation, December 14. Accessed July 4, 2017. https://www.hsdl.org/?view&did=797394
  • Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books.
  • Peppet, S. R. (2014). Regulating the internet of things: First steps toward managing discrimination, privacy, security and consent. Texas Law Revew, 93, 85 doi:10.1177/2050312117731251.
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. https://doi.org/10.1509/jppm.19.1.27.16941
  • Qingxiong, M., & Liu, L. (2006). The. Technology Acceptance Model: Journal of Organizational and End User Computing, 16(1), 59–72 doi:10.4018/joeuc.2004010104 doi:.
  • Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013, May 20–23). A systemic approach for IoT security. IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS) (pp. 351–355). Cambridge, MA (HAL).
  • Robinson, L. (2018). The identity curation game: Digital inequality. Identity Work, and Emotion Management. Information, Communication and Society, 21(5), 661–680 https://doi.org/10.1080/1369118X.2017.1411521.
  • Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of Things. An Overview, pp. 1–50. The Internet Society (ISOC.
  • Sharma, V., Mankodiya, K., La Torre, F. D., Zhang, A., Ryan, N., Ton, Thanh GN, Gandhi, R., Jain, S. (2014). SPARK: Personalized parkinson disease interventions through synergy between a smartphone and a smartwatch. In Design, User Experience, and Usability (pp. 103–114). Springer International Publishing.
  • Slomovic, A. (2015, January 31). Workplace Wellness, Privacy and the Internet of Things. AnnaSlomovic.com (blog)., https://www.annaslomovic.com/single-post/2015/01/31/Workplace-Wellness-Privacy-and-the-Internet-of-Things
  • Suhluli, S. (2021). The impact of manipulating IOT wearable controls on users privacy concerns. Journal of Management Information and Decision Sciences, 24(S3), 1–16.
  • Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: A review. IEEE International Conference Computer Science and Electronics Engineering (ICCSEE) 3: 648–651.
  • Talukder, M. S., Chiong, R., Bao, Y., & Hayat Malik, B. (2019). Acceptance and use predictors of fitness wearable technology and intention to recommend: An empirical study. Industrial Management and Data Systems, 119(1), 170–188. https://doi.org/10.1108/IMDS-01–2018-0009
  • Theprivacyguru. (2014). Do you agree that privacy is still a social norm? accessed November 1st 2020. https://theprivacyguru.com/blog/agree-privacy-still-social-norm/
  • Ulanoff, L. (2014). Inside HealthKit: apple’s answer to the quantified you, mashable Mashable . (June 3, 2014), http://mashable.com/2014/06/03/inside-apple-healthkitarchived at http://perma.cc/8TCT-68NP, http://mashable.com/2014/06/03/inside-apple-healthkitarchived at http://perma.cc/8TCT-68NP.
  • Van der Zeeuw, A., van Deursen, A., & Jansen, G. (2019). Inequalities in the social use of the Internet of things: A capital and skills perspective. New Media & Society, 21(6), 1344–1361. https://doi.org/10.1177/1461444818821067
  • Van Deursen, A. J. A. M., & Mossberger, K. (2018). Any thing for anyone? A new digital divide in Internet-of-things skills. Policy and Internet, 10(2), 122–140. https://doi.org/10.1002/poi3.171
  • Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikiras, P. (2015). On the security and privacy of internet of things architectures and systems. In 2015 international workshop on secure internet of things (SIoT) (pp. 49–57). IEEE.
  • Whitmore, A., Anurag, A., & Da Xu, L. (2015). The Internet of Things - A Survey of Topics and Trends. Information Systems Frontiers, 17(2), 261–274. https://doi.org/10.1007/s10796-014-9489-2
  • Williams, M., Nurse, J. R., & Creese, S. (2016). The perfect storm: The privacy paradox and the internet-of-things. Paper presented at the 2016 11th International Conference on Availability, Reliability and Security (ARES) Salzburg, Austria (pp. 644–652). IEEE.https://doi.org/10.1109/ARES.2016.25
  • Xue, Y. (2019). A review on intelligent wearables: Uses and risks. Human Behavior and Emerging Technologies, 2019(1), 287–294. https://doi.org/10.1002/hbe2.173
  • Yamin, P., Fei, M., Saadi Lahlou, S., & Levy, S. (2019). Using social norms to change behavior and increase sustainability in the real world: A systematic review of the literature. Sustainability, 11(20), 5847. https://doi.org/10.3390/su11205847
  • Yan, Z., & Holtmanns, S. (2008). Trust modeling and management: from social trust to digital trust. In R. Subramanian (Ed.), Computer security, privacy and politics: Current issues, challenges and solutions (pp. 290–323). IGI Global.
  • Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134. https://doi.org/10.1016/j.jnca.2014.01.014
  • Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258. https://doi.org/10.1109/JIOT.2017.2694844
  • Yildrim, H., & Ali-Eldin, A. M. (2019, October). A model for predicting user intention to use wearable IoT devices at the workplace. Journal of King Saud University- Computer and Information Sciences, 31(4), 497–505. https://doi.org/10.1016/j.jksuci.2018.03.001
  • Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of Things for Smart Cities. IEEE Internet of Things Journal, 1(1), 22–32. Garcia Morchon, and Klaus Wehrle. 2014. https://doi.org/10.1109/JIOT.2014.2306328.
  • Zhae, E. Y., Thatcher, S. M., & Jehn, K. A. (2019). Instigating, engaging in, and managing group conflict: a review of the literature addressing the critical role of the leader in group conflict. Academy of Management AnnalsVol, 13(1), 1 https://doi.org/10.5465/annals.2016.0153.