4.7 Article

There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks

Journal

COMPUTERS IN HUMAN BEHAVIOR
Volume 139, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.chb.2022.107551

Keywords

Cybersecurity; Smart home; Internet-of-things (IoT); Security intentions; Rational choice theory; Theory of planned behavior

Ask authors/readers for more resources

Modern households are digitized with Internet-connected devices, but this poses the risk of increasing cyber-attacks. This study investigates the factors that drive individuals to secure their home networks from cyber-attacks. Using rational choice theory and theory of planned behavior, the research model shows strong support for the relationships between cognitive and psychological factors and individual security intentions.
Modern households are increasingly becoming digitized as they contain numerous Internet-connected networked devices throughout the home. However, this growth in the adoption of smart devices in households comes with the risk of Internet cyber-attacks that seem to be increasing every year. With many individuals working from home due to the COVID-19 pandemic, smart home networks are becoming small extensions of the organizational IT infrastructure. Amidst this backdrop, this behavioral study aims to understand the factors that drive an in-dividual's intention toward securing their home network from cyber-attacks. We draw upon rational choice theory (RCT) and theory of planned behavior (TPB) to derive a model consisting of cognitive and psychological components to explain an individual's intention to secure their smart home network. From a survey of 503 working professionals, our data analysis shows strong support for our research model, and, thus, the hypothe-sized relationships between the cognitive and psychological factors and individual security intentions. Practical implications of these results for home users, organizations, and researchers are discussed, which will be helpful for organizational IT security managers in planning for organizational security as the line between home and workplace is becoming increasingly blurred.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available