As IoT is getting increasingly popular, it brings us new challenges and problems. IoT users either intentionally or unintentionally leave the use information behind them when they engage with IoT. Those seemingly trivial information, once complied up, can tell more than one would have expected. Users may or may not have realized this problem. We are interested in the reasons why users still choose to engage in IoT uses when they realize the problems. The current study uses and compares two models, Privacy Calculus and IT Identity, to investigate this interesting phenomenon. Privacy Calculus model offers rational explanations, stating that IoT users weigh the benefits and the risks of IoT uses. It assumes that IoT users make decisions based on rational thinking. They choose to engage with IoT of their choices because the benefits outweigh the risks. On other hand, IT Identity theory provides an alternative explanation. According to IT identity theory, people adopt and engage with the use of IoT in order to be themselves. Their IT identity is a primary motivator of their IT related behaviors. That is to say, they engage with the IoT regardless of use information problem because the use of IoT is part of their IT identity. By including two models in the same paper, we hope that we can better capture IoT users’ thoughts on why they still engage with IoT knowing the risks caused by use information.

Abstract Only



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.