Beruflich Dokumente
Kultur Dokumente
Abstract. The Internet of Things (IoT) has gained a huge importance in the
recent years among the other latest Internet evolutions. Internet of Things aims
to provide people with the innovative and intelligent technologies and services
where all the physical objects around their world are connected to the Internet
and communicate with each other. IoT products and services span several fields
such as, healthcare, hospitality, transport, infrastructure, education and frontline
social services. Trust plays a crucial role in the adoption of Internet of things
technologies and services for ensuring a satisfactory and expected transaction
result. It helps customers to overcome perception of risk and uncertainty related
to IoT technology and enhances the customers’ level of acceptance that have a
positive impact in adoption intention. However, current literature of the IoT
services still lacks studies on the behavioral aspect that clarify the perception of
customers about the adoption and usage of the IoT technologies and services. In
this paper, we develop a conceptual trust model that contains the major factors
affecting trust towards IoT technology adoption. The model is presented in three
domains and 11 dimensions and designed based on the theory of Technology
Acceptance Model (TAM). The result of this paper is a conceptual framework
that classified the factors into three main domains, namely: product related
factors, Social influence related factors and Security Related Factors. This
framework aims to serve as a foundation for future studies about trust in IoT
technology adoption.
1 Introduction
During the last few years, Internet of Things (IoT) approached our daily lives gradually
through the wide spread of wireless communication and smart devices such as phones,
home appliances, health care devices, hospitality, transport and so on. Smart devices
that are often interconnected with cloud services promise easy usage and global access
and make more consumers engage in such technology.
An IoT system can be described as a collection of interconnected smart devices that
interact on a collaborative basis to fulfill a common goal. It embraces many different
technologies, services, and standards [1]. IoT involves three major agents i.e. people,
objects and data. It is expected that tens of billions uniquely identifiable objects will be
a part of this global computing network by the year 2020 [2]. Undeniably, this high
level of heterogeneity, coupled to the wide scale of IoT systems and the increased
intractability of humans, machines, and robots, in any combination is expected to
expand security threats. Moreover, the traditional security countermeasures and privacy
enforcement cannot be directly applied to IoT technologies due to their limited com-
puting power, high number of interconnected devices and scalability issues. At the
same time, to reach a full acceptance and adoption by users it is mandatory to define
valid security, privacy and trust models suitable for the IoT application context [1, 3].
An IoT applications, such as smart home, use sensors to control the room smartly
and remotely. These sensors collect information in very sensitive and personal
domains, i.e. a bedroom. In this automated communication the owner takes no active
role in communication and relies on services to act on person behalf [4]. In such
situation, security, and in particular trust, remains major challenge for consumers and
developers of IoT application and services.
Different security challenges could face the adoption of the IoT. Trust is a fun-
damental issue since the IoT environment is characterized by different devices which
have to process and handle the data in compliance with user needs and rights. This
paper is concerned with this challenge, namely, trust. As consumers believe in the
potential IoT benefits to them, they are also concerned about the security and privacy of
their data and the data breach of sensitive personal information can be exploited to
harm them; the trust of these consumers on the IoT can be tampered. The success of
IoT ultimately depends upon the consumer perceptions about security and privacy in
IoT and the level of digital trust of its consumers [2]. In a global rush to promote IoT
products and services, the industry is falling behind on building consumer trust. The
wide adoption of IoT devices is highly reliant on establishing consumer’s trust.
A deep understanding of the aspects and variables that lead to customers’ trust in
IoT enabled product and services could help developers in implementing an efficient
and widely accepted and adopted IoT services [5]. This study contributes to the body of
literature of trust for IoT adoption by presenting a comprehensive view about related
factors that affect the consumers’ trust of IoT services and products, and study how
factors might be useful to implement marketing strategies focused on consumer’s
demands and requirements. Moreover, this paper proposes a conceptual model to
instruct future research directions and developers in understanding the factors that
could affect IoT adoption.
2 Literature Review
supply chain management, smart cities, digital logistics, efficient transportation, home
automation, mobile payment, warehouse management, and the private domain. The
prediction of the devices that connected to the internet will be 100 billion devices by
2030 [7].
IoT consists of four levels that starts with perception layer that consists of different
sensors and data collectors followed by network layer that is responsible for transmitting
the data. The third layer is the middleware layer that consists of information processing
systems followed by fourth level that is the application and services level [8].
The IoT enabled products and services affect consumers’ behavior and choices on
numerous aspects of their daily life. However, the convenience provided by inter-
connected smart devices is accompanied with a lot of security and privacy issues. For
instance, the threat that an intruder takes control of IoT devices, access to sensitive
information or disrupt services. On the ignorance of these issues in IoT, undesired
consequences will be challenged like lack of trust, non-acceptance and damage to
reputation [2].
IoT manufacturers are working effectively to add more intelligence and connec-
tivity into devices. However, the reality is that the security and privacy concerns are
poorly considered in the development, for instance, poor encryption or unencrypted
communications, weak passwords, and defective user interfaces exposing the con-
sumers and their sensitive private information to be compromised by the hackers [2].
A trustworthy system or service should preserve its users’ privacy, which is one of the
ways to gain user trust. Trust, security and privacy are highly related crucial issues in
IoT.
Users’ assessments reflect their beliefs about technology’s ability to deliver and
perform of its objective characteristics which may differ based on their experience or
the context for its use. Consumers appreciate the possible benefits and advantages of
using IoT products and services. However, consumers feel uncomfortable as these
smart IoT devices collect and share personal information. They are concerned about the
security of devices and privacy of their personal information. If these devices or their
personal information is exploited for criminal acts, then trust upon adopting these IoT
devices could be compromised. Therefore, it is considerable that the success and
adoption of IoT products and services is greatly dependent on establishing consumer’s
trust [14].
The literature in the technical aspects of IoT are more numerous than the behavioral
and attitudinal aspects. This indicates the need for more investigation in that field. Few
studies have investigated the role of trust in IoT adoption. For instance, the study by
Gao and Bai [14] concluded that trust has a significant factor that affects the behavioral
intention to adopt the in the IoT products and services. Han et al. [15] proofed that trust
is an essential factor for the adoption of third party apps. The following section
describe a conceptual model that combine the major factors that influence consumer
trust towards adoption of IoT products or services.
Different factors that have been collected from the literature are combined to form
it. The conceptual model guiding this research is depicted in Fig. 1 that has been called
Trust factors for improving IoT technology adoption model (TFITAM).
Fig. 1. Trust factors for improving IoT technology adoption model (TFITAM)
In this paper, we are targeting IoT technology adoption. Actually, there is a dis-
tinction between adoption and acceptance of a technology. Technology adoption is a
process – starting with the user becoming aware of the technology, and ending with the
user embracing the technology and making full use of it. Acceptance, on the other
hand, is an attitude towards a technology, and it is influenced by various factors [19].
We are investigating the factors that influence the adoption.
to increase the adoption, users need to feel safe when interacting with these systems.
Moreover, the lack of security were found to be a major issue that prevent customers
from adopting the IoT product and services [25]. To achieve that several factors need to
be taken care of. We have divided the factors into:
Product or Service (Trustee) Security this factor is concern with the ability of the
trustee to achieve major security concerns such as confidentiality, integrity and
availability. This factor could be affected by trustee reputation and earlier behaviors
and performance [9]. Security is always a critical issue to which consumers are con-
cerned when it comes to trust towards adoption [20]. The level of security and privacy
are critical characteristics of IoT technology that affect the development of consumers’
confidence in them as it gives consumers the assurance that they will be safe [20].
According to Koien [23], users tend to trust the IoT devices that use credible entity
authentication and access control. Such devices that show ability and willingness to
protect themselves are welling to be noted as trusted devices. Therefore, we can
conclude that there is a positive relationship between trust and IoT product or service
security level.
Perceived Risk Associated with a product or service. In the context of IoT usage, the
perceived risk of IoT services usages is higher because of the unique characteristics of
the IoT technologies and the high level of IT involvement. Users feel greater uncer-
tainty and heightened risk in their adoption decision [14, 20, 30]. Trust is considered as
one the most effective tools for reducing uncertainty and risks by generating a sense of
safety [14], therefore plays a major role in adoption intention. Consumers tend to
distrust IoT devices or services because they perceived to be outside of their control, as
they consider these devices as a high risk [23]. There is a mismatch between the actual
risk level and the human trust in the device that is usually built upon his/her perceived
risk [23], therefore, we have separated the actual product or service security level and
the perceived risk. However, there is an inverse relationship between the actual product
security level and the perceived risk associated with that product or service.
4 Conclusions
developers could use this model and its specified factors to create products and services
that could be widely adopted through gaining consumers trust.
The next step is to evaluate the TFITAM model through further investigation by the
authors. Data will be collected from consumers and service providers to validate the
proposed model. Data then shall be statistically analyzed to confirm the results by using
a useful variable analysis technique. The main goal of this step is to measure and
understand the relationships among factors and variables. Moreover, future work can
consider specific domain of IoT products or services and this may require additional
elements to be added and may cause some changes in the subdomains. The model
could be further investigated to recommend practical standards that can be enhanced
with performance indicators and indexes for improving trust in IoT products and
services.
References
1. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in
Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
2. Khan, W., Aalsalem, M., Quratulain, A., Khan, M.: Enabling consumer trust upon
acceptance of IoT technologies through security and privacy model. In: Advanced
Multimedia and Ubiquitous Engineering, vol. 354, pp. 479–485 (2016)
3. Weber, R.H.: Internet of Things - new security and privacy challenges. Comput. Law Secur.
Rev. 26(1), 23–30 (2010)
4. Daubert, J., Wiesmaier, A., Kikiras, P.: A view on privacy & trust in IoT. In: 2015 IEEE
International Conference on Communication Workshop (ICCW), London, pp. 2665–2670
(2015)
5. Belanche, D., Casaló, L.V., Flavián, C.: Integrating trust and personal values into the
technology acceptance model: the case of e-government services adoption. Cuad. Econ. y
Dir. la Empres. 15(4), 192–204 (2012)
6. Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for
the Internet of Things: a survey. IEEE Commun. Surv. Tutor. 16(1), 414–454 (2014)
7. Del Giudice, M.: Discovering the Internet of Things (IoT) within the business process
management. Bus. Process Manag. J. 22(2), 263–270 (2016)
8. Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security
concerns of Internet of Things (IoT). Int. J. Comput. Appl. 111(7), 1–6 (2015)
9. Yan, Z., Zhang, P., Vasilako, A.: A survey on trust management for Internet of Things.
J. Netw. Comput. Appl. 42, 120–134 (2014)
10. McKnight, D., Carter, M., Thatcher, J., Clay, P.: Trust in a specific technology: an
investigation of its components and measures. ACM Trans. Manag. Inf. Syst. 2(2), 12 (2011)
11. Mayer, R., Davis, J., Schoorman, F.: An integrative model of organizational trust. Acad.
Manag. Rev. 20, 709–734 (1995)
12. Tam, S., Thatcherb, J.B., Craigc, K.: How and why trust matters in post-adoptive usage: the
mediating roles of internal and external self-efficacy. J. Strateg. Inf. Syst. (2017, in press)
13. Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: an integrated
model. MIS Q. 27, 51–90 (2003)
14. Gao, L., Bai, X.: A unified perspective on the factors influencing consumer acceptance of
Internet of Things technology. Asia Pac. J. Mark. Logist. 26(2), 211–231 (2014)
334 A. AlHogail and M. AlShahrani
15. Han, B., Wu, Y.A., Windsor, J.: User’s adoption of free third-party security apps. J. Comput.
Inf. Syst. 54(3), 77–86 (2014)
16. Lee, M., Turban, E.: A trust model for consumer internet shopping. Int. J. Electron. Commer.
6(1), 75–91 (2001)
17. Chang, S.-H., Chou, C.-H., Yang, J.-M.: The literature review of technology acceptance
model: a study of the bibliometric distributions. In: Pacific Asia Conference on Information
Systems, pp. 1634–1640 (2010)
18. Cho, Y.C., Sagynov, E.: Exploring factors that affect usefulness, 19(1) (2015)
19. Renaud, K., van Biljon, J.: Predicting technology acceptance and adoption by the elderly. In:
Proceedings of the 2008 Annual Research Conference of the South African Institute of
Computer Scientists and Information Technologists on IT research in Developing Countries
Riding the Wave of Technology, SAICSIT 2008, pp. 210–219 (2008)
20. Lai, I.K.W., Tong, V.W.L., Lai, D.C.F.: Trust factors influencing the adoption of
internet-based interorganizational systems. Electron. Commer. Res. Appl. 10(1), 85–93
(2011)
21. Bart, Y., Shankar, V., Sultan, F., Urban, G.L.: Are the drivers and role of online trust the
same for all web sites and consumers? A large-scale exploratory empirical study. J. Mark. 69
(4), 133–152 (2005)
22. Abu, F., Jabar, J., Yunus, A.R.: Modified of UTAUT theory in adoption of technology for
Malaysia Small Medium Enterprises (SMEs) in food industry. Aust. J. Basic Appl. Sci. 9(4),
104–109 (2015)
23. Koien, G.M.: Reflections on trust in devices: an informal survey of human trust in an
Internet-of-Things context. Wirel. Pers. Commun. 61(3), 495–510 (2011)
24. Coughlan, T., Brown, M., Mortier, R., Houghton, R., Goulden, M., Lawson, G.: Exploring
acceptance and consequences of the Internet of Things in the home. In: 2012 IEEE
International Conference on Green Computing and Communications, pp. 148–155 (2012)
25. Al-Momani, A., Mahmoud, M., Ahmad, S.: Modeling the adoption of Internet of Things
services: a conceptual framework. Int. J. Appl. Res. 2(5), 361–367 (2016)