{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:20:32Z","timestamp":1767374432365,"version":"3.41.2"},"reference-count":37,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T00:00:00Z","timestamp":1581465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2020,2,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Internet of Things (IoT) presents new privacy dilemmas. While IoT is becoming more common, a model to understand privacy concerns has not been established. The purpose of this paper is to examine an existing privacy model, the mobile users\u2019 information privacy concerns (MUIPC), in the context of IoT.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A survey was distributed via email to 1,257 undergraduate students enrolled in a Carnegie Master\u2019s level university in the mid-south; 192 students completed the survey, a response rate of 15.3%. SmartPLS, a structural equation modeling software, was used to evaluate the measurement model and to examine the relationships.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>All relationships were significant at the 0.05 level indicating that the MUIPC model does appear to apply to IoT.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>A convenience sample was used and the response rate was low and, therefore, may not be generalizable to another population.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This research demonstrates the MUIPC is indeed applicable to privacy research within IoT, thus opening another avenue for future research and confirms the influence of information privacy upon intention within the IoT realm.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-07-2019-0090","type":"journal-article","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T09:16:50Z","timestamp":1581585410000},"page":"359-371","source":"Crossref","is-referenced-by-count":14,"title":["Mobile users\u2019 information privacy concerns instrument and IoT"],"prefix":"10.1108","volume":"28","author":[{"given":"C. Bryan","family":"Foltz","sequence":"first","affiliation":[]},{"given":"Laura","family":"Foltz","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"4","key":"key2020071513123541500_ref001","doi-asserted-by":"crossref","first-page":"12","DOI":"10.22215\/timreview\/1067","article-title":"Big data and individual privacy in the age of the internet of things","volume":"7","year":"2017","journal-title":"Technology Innovation Management Review"},{"key":"key2020071513123541500_ref002","unstructured":"Bannan, C. (2016), \u201cThe IoT threat to privacy\u201d, TechCrunch, available at: https:\/\/techcrunch.com\/2016\/08\/14\/the-iot-threat-to-privacy\/ (accessed 2019)."},{"issue":"4","key":"key2020071513123541500_ref003","first-page":"1017","article-title":"Privacy in the digital age: a review of information privacy research in information systems","volume":"34","year":"2011","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2020071513123541500_ref004","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1080\/0144929X.2012.674157","article-title":"Controllable accountabilities: the internet of things and its challenges for organisations","volume":"32","year":"2013","journal-title":"Behaviour and Information Technology"},{"key":"key2020071513123541500_ref005","unstructured":"Calcutt, L. (2017), \u201cHackers target baby monitors as cyber security threat spikes. 9News\u201d, available at: www.9news.com.au\/national\/2017\/10\/10\/14\/41\/hackers-targeting-baby-monitors-as-cyber-security-threat-spikes (accessed 2019)."},{"issue":"3","key":"key2020071513123541500_ref006","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1002\/(SICI)1522-7138(199722)11:3<44::AID-DIR7>3.0.CO;2-X","article-title":"Relationship marketing in consumer markets: a comparison of managerial and consumer attitudes about information privacy","volume":"11","year":"1997","journal-title":"Journal of Direct Marketing"},{"issue":"10","key":"key2020071513123541500_ref007","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1002\/asi.21122","article-title":"Blogging, communication, and privacy management: development of the blogging privacy management measure","volume":"60","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020071513123541500_ref008","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume-title":"Modern Methods for Business Research","year":"1998"},{"volume-title":"Bootstrap Methods and Their Application","year":"1997","key":"key2020071513123541500_ref009"},{"issue":"6","key":"key2020071513123541500_ref010","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/01449290410001715723","article-title":"Internet privacy concerns and their antecedents\u2013measurement validity and a regression model","volume":"23","year":"2004","journal-title":"Behaviour and Information Technology"},{"issue":"1","key":"key2020071513123541500_ref011","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for E-Commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"1","key":"key2020071513123541500_ref012","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1214\/ss\/1177013815","article-title":"Bootstrap methods for standard errors, confidence intervals, and other measures of statistical accuracy","volume":"1","year":"1986","journal-title":"Statistical Science"},{"volume-title":"A Primer for Soft Modeling","year":"1992","key":"key2020071513123541500_ref013"},{"issue":"4","key":"key2020071513123541500_ref014","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1177\/002224378201900406","article-title":"Two structural equation models: LISREL and PLS applied to consumer exit-voice theory","volume":"19","year":"1982","journal-title":"Journal of Marketing Research"},{"issue":"2","key":"key2020071513123541500_ref015","first-page":"70","article-title":"Emerging technologies and cyber risk: how do we secure the internet of things (IoT) environment?","volume":"21","year":"2019","journal-title":"Journal of Applied Business and Economics"},{"issue":"1","key":"key2020071513123541500_ref016","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","article-title":"When to use and how to report the results of PLS-SEM","volume":"31","year":"2019","journal-title":"European Business Review"},{"issue":"2","key":"key2020071513123541500_ref017","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/s11235-017-0343-y","article-title":"Challenges and research directions for the internet of things","volume":"67","year":"2018","journal-title":"Telecommunication Systems"},{"article-title":"Understanding user privacy in internet of things environments","volume-title":"IEEE 3rd World Forum on Internet of Things","year":"2016","key":"key2020071513123541500_ref018"},{"issue":"4","key":"key2020071513123541500_ref019","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"article-title":"An analysis of personal information privacy concerns using Q-Methodology","volume-title":"Australasian Conference on Information Systems","year":"2015","key":"key2020071513123541500_ref020"},{"issue":"1","key":"key2020071513123541500_ref021","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/248873","article-title":"Four ethical issues of the information age","volume":"10","year":"1986","journal-title":"MIS Quarterly"},{"key":"key2020071513123541500_ref022","unstructured":"Morrow, S. (2018), \u201c5 Reasons privacy and IoT are incompatible\u201d, available at: www.iotforall.com\/five-reasons-privacy-iot-incompatible\/ (accessed 2019)."},{"issue":"3","key":"key2020071513123541500_ref023","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1111\/j.1756-2589.2010.00052.x","article-title":"Communication privacy management theory: what do we know about family privacy regulation?","volume":"2","year":"2010","journal-title":"Journal of Family Theory and Review"},{"key":"key2020071513123541500_ref024","first-page":"998","article-title":"Internet of things: underlying technologies, interoperability, and threats to privacy and security","year":"2006","journal-title":"Berkeley Technology Law Journal"},{"issue":"12","key":"key2020071513123541500_ref025","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1016\/j.ijhcs.2013.09.002","article-title":"Guide to measuring privacy concern: review of survey and observational instruments","volume":"71","year":"2013","journal-title":"International Journal of Human-Computer Studies"},{"key":"key2020071513123541500_ref026","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","article-title":"A roadmap for security challenges in the internet of things","volume":"4","year":"2018","journal-title":"Digital Communications and Networks"},{"issue":"4","key":"key2020071513123541500_ref027","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020071513123541500_ref028","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals\u2019 concerns about organizational practices","volume":"20","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2020071513123541500_ref029","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","article-title":"A taxonomy of privacy","volume":"154","year":"2006","journal-title":"University of Pennsylvania Law Review"},{"issue":"1","key":"key2020071513123541500_ref030","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","year":"2002","journal-title":"Information Systems Research"},{"issue":"2","key":"key2020071513123541500_ref031","first-page":"26","article-title":"Internet industry: a perspective review through internet of things and internet of everything","volume":"14","year":"2018","journal-title":"International Management Review"},{"issue":"6","key":"key2020071513123541500_ref032","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/j.bushor.2015.06.005","article-title":"Internet of things: convenience vs. Privacy and secrecy","volume":"58","year":"2015","journal-title":"Business Horizons"},{"issue":"1","key":"key2020071513123541500_ref033","first-page":"166","article-title":"Privacy and freedom","volume":"25","year":"1968","journal-title":"Washington and Lee Law Review"},{"volume-title":"Privacy and Freedom","year":"1967","key":"key2020071513123541500_ref034"},{"first-page":"6","article-title":"Examining the formation of individual\u2019s privacy concerns: toward an integrative view","year":"2008","key":"key2020071513123541500_ref035"},{"year":"2012","key":"key2020071513123541500_ref036","article-title":"Measuring mobile users\u2019 concerns for information privacy"},{"year":"2018","key":"key2020071513123541500_ref037","article-title":"User perceptions of smart home IoT privacy"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2019-0090\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2019-0090\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:03Z","timestamp":1753406583000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/3\/359-371\/199242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,12]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,2,12]]}},"alternative-id":["10.1108\/ICS-07-2019-0090"],"URL":"https:\/\/doi.org\/10.1108\/ics-07-2019-0090","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2020,2,12]]}}}