{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:07:08Z","timestamp":1770268028261,"version":"3.49.0"},"reference-count":99,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T00:00:00Z","timestamp":1679961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSIT"],"published-print":{"date-parts":[[2023,6,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a research gap by verifying the protection motivation theory using gender as a moderator.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The authors used a purposive sampling approach to collect data from Dhaka city, in which 370 valid responses were selected. Additionally, the quantitative and cross-sectional survey used a seven-point Likert scale. Afterward, the evaluation approach included three phases: a measurement model, a structural model and multi-group analysis.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Vulnerability, self-efficacy and response-efficacy were discovered to be critical predictors with a variance of 60.4%. Moreover, there was a significant disparity between males and females in two relationships, response efficacy and intention as well as response cost and intention.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>This research expands our understanding of Generation Z consumers' behavioral intentions to take measures against household threats, allowing preventative programs to be improved. Further, in the case of applying coping strategies, a practical difference between males and females has been found that must be bridged through awareness campaigns.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This study has made a unique contribution to the information system literature. First, the role of protection motivation theory factors in addressing security concerns in homes has been assessed. Second, the coping evaluation process has a greater impact on users' intentions than the threat appraisal process. However, males and females use slightly different approaches to defending themselves against the threat.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jsit-02-2022-0054","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T03:00:16Z","timestamp":1679886016000},"page":"133-159","source":"Crossref","is-referenced-by-count":13,"title":["Generation Z\u2019s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator"],"prefix":"10.1108","volume":"25","author":[{"given":"Arif","family":"Mahmud","sequence":"first","affiliation":[]},{"given":"Mohd Najwadi","family":"Yusoff","sequence":"additional","affiliation":[]},{"given":"Mohd Heikal","family":"Husin","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,3,28]]},"reference":[{"key":"key2023060906190623600_ref001","unstructured":"5G: Future of IoT (2019), \u201c5G Americas white paper\u201d, available at: www.5gamericas.org\/wp-content\/uploads\/2019\/07\/5G_Americas_White_Paper_on_5G_IOT_FINAL_7.16.pdf (accessed 4 March 2020)."},{"key":"key2023060906190623600_ref002","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2019.101586","article-title":"Evaluating the effectiveness of learner controlled information security training","volume":"87","year":"2019","journal-title":"Computers and Security"},{"issue":"3","key":"key2023060906190623600_ref003","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.chb.2009.12.007","article-title":"Gender, age and income differences in internet usage among employees in organisations","volume":"26","year":"2010","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"key2023060906190623600_ref004","first-page":"41","article-title":"Gender and generational differences in consumers\u2019 perceptions of Internet of Things (IoT)","volume":"10","year":"2019","journal-title":"Devices. e-Journal of Social and Behavioural Research in Business"},{"issue":"4","key":"key2023060906190623600_ref0221","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/JEIM-02-2020-0052","article-title":"Examining the roles of students beliefs and security concerns for using smartwatches in higher education","volume":"33","year":"2020","journal-title":"Journal of Enterprise Information Management"},{"issue":"4","key":"key2023060906190623600_ref005","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/JEIM-02-2020-0052","article-title":"Examining the roles of students\u2019 beliefs and security concerns for using smartwatches in higher education","volume":"34","year":"2021","journal-title":"Journal of Enterprise Information Management"},{"key":"key2023060906190623600_ref006","first-page":"125","article-title":"Extending protection motivation theory to understand security determinants of anti-virus software usage on mobiles devices","volume":"10","year":"2016","journal-title":"International Journal of Computers"},{"issue":"2","key":"key2023060906190623600_ref007","first-page":"1","article-title":"Towards closing the gender gap in Iraq: understanding gender differences in smartphone adoption and use","volume":"24","year":"2018","journal-title":"Information Technology for Development"},{"issue":"2","key":"key2023060906190623600_ref008","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chb.2019.106184","article-title":"Employees\u2019 behavioural intention to smartphone security: a gender-based, cross-national study","volume":"104","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2023060906190623600_ref009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1757-899X\/263\/4\/042026","article-title":"Home security system using Internet of Things","volume":"263","year":"2017","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"issue":"3","key":"key2023060906190623600_ref010","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","article-title":"Gender difference and employees\u2019 cybersecurity behaviors","volume":"69","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"16","key":"key2023060906190623600_ref011","first-page":"483","article-title":"Generation Z and CSR: antecedents of purchasing intention of university students","volume":"8","year":"2017","journal-title":"Kafkas \u00dcniversitesi \u0130ktisadi ve \u0130dari Bilimler Fak\u00fcltesi Dergis"},{"issue":"3","key":"key2023060906190623600_ref012","doi-asserted-by":"publisher","first-page":"353","DOI":"10.5901\/mjss.2015.v6n3s2p353","article-title":"Describing the need for affordable livable sustainable housing based on Maslow\u2019s theory of need","volume":"6","year":"2015","journal-title":"Mediterranean Journal of Social Sciences"},{"issue":"3","key":"key2023060906190623600_ref013","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1080\/0144929X.2019.1685597","article-title":"Using smartwatches for fitness and health monitoring: the UTAUT2 combined with threat appraisal as moderators","volume":"40","year":"2021","journal-title":"Behaviour and Information Technology"},{"issue":"15","key":"key2023060906190623600_ref014","first-page":"749","article-title":"Internet of Things for smart crime detection","volume":"7","year":"2014","journal-title":"Contemporary Engineering Sciences"},{"issue":"9","key":"key2023060906190623600_ref015","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1080\/0144929X.2017.1317363","article-title":"Factors affecting adoption of smart meters in the post-Fukushima era in Taiwan: an extended protection motivation theory perspective","volume":"36","year":"2017","journal-title":"Behaviour and Information Technology"},{"key":"key2023060906190623600_ref016","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/HICSS.2009.74","article-title":"Application of protection motivation theory to adoption of protective technologies","volume-title":"42nd HI International Conference on System Sciences","year":"2009"},{"issue":"1","key":"key2023060906190623600_ref017","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1108\/YC-04-2020-1123","article-title":"Driving healthcare wearable technology adoption for Generation Z consumers in Hong Kong","volume":"22","year":"2021","journal-title":"Young Consumers"},{"issue":"4","key":"key2023060906190623600_ref018","doi-asserted-by":"publisher","first-page":"61","DOI":"10.4236\/wsn.2016.84006","article-title":"An investigative study for smart home security: issues, challenges and countermeasures","volume":"8","year":"2016","journal-title":"Wireless Sensor Network"},{"issue":"1","key":"key2023060906190623600_ref019","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1177\/0269758016661606","article-title":"Residential burglary victimization: household- and country-level mixed modeling","volume":"23","year":"2017","journal-title":"International Review of Victimology"},{"key":"key2023060906190623600_ref0224","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.chb.2016.08.034","article-title":"An analysis of multiple factors relating to teachers\u2019 problematic information security behavior","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2023060906190623600_ref020","doi-asserted-by":"publisher","first-page":"66","DOI":"10.7492\/ijaec.2014.006","article-title":"Street crime and physical environment \u2013 from the perception of local people regarding security feelings","volume":"3","year":"2014","journal-title":"International Journal of Architecture, Engineering and Construction"},{"issue":"2","key":"key2023060906190623600_ref021","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/15245000802034663","article-title":"Understanding health behavior: an integrated model for social marketers","volume":"14","year":"2008","journal-title":"Social Marketing Quarterly"},{"key":"key2023060906190623600_ref022","unstructured":"Crime Index by City (2019), \u201cNumbeo\u201d, available at: www.numbeo.com\/crime\/region_rankings.jsp?title=2019&region=142 (accessed 22 March 2022)."},{"key":"key2023060906190623600_ref023","unstructured":"Crime Statistics (2019), \u201cBangladesh police\u201d, available at: www.police.gov.bd\/en\/crime_statistic\/year\/2019 (accessed 5 January 2021)."},{"issue":"5","key":"key2023060906190623600_ref0225","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/j.im.2018.11.009","article-title":"Espoused cultural values as antecedents of individuals\u2019 threat and coping appraisal toward protective information technologies: study of U.S. and Ghana","volume":"56","year":"2019","journal-title":"Information and Management"},{"key":"key2023060906190623600_ref024","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/949\/1\/012009","article-title":"Multicollinearity and regression analysis","volume":"949","year":"2018","journal-title":"Journal of Physics: Conference Series"},{"issue":"8","key":"key2023060906190623600_ref025","first-page":"1","article-title":"What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context","volume":"41","year":"2021","journal-title":"Behaviour and Information Technology"},{"key":"key2023060906190623600_ref026","volume-title":"Understanding Victims of Crime: The Impact of the Crime and Support Needs","year":"2017"},{"issue":"74","key":"key2023060906190623600_ref027","doi-asserted-by":"publisher","first-page":"44","DOI":"10.15219\/em74.1351","article-title":"New trends in management the characteristics of Generation Z","volume":"2","year":"2018","journal-title":"e-mentor"},{"issue":"4","key":"key2023060906190623600_ref028","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1080\/10810730.2019.1631914","article-title":"The effect of framed health messages on intention to take antivirals for pandemic influenza: a vignette-based randomised controlled trial","volume":"24","year":"2019","journal-title":"Journal of Health Communication"},{"key":"key2023060906190623600_ref029","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/3241815.3241869","article-title":"Help wanted: consumer privacy behavior and smart home Internet of Things (IoT) devices","volume-title":"19th Annual SIG Conference on Information Technology Education","year":"2018"},{"issue":"2","key":"key2023060906190623600_ref030","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s12599-021-00704-0","article-title":"A protection-motivation perspective to explain intention to use and continue to use mobile warning systems","volume":"64","year":"2022","journal-title":"Business and Information Systems Engineering"},{"issue":"2","key":"key2023060906190623600_ref031","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","article-title":"A meta-analysis of research on protection motivation theory","volume":"30","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"2","key":"key2023060906190623600_ref032","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1057\/ejis.2015.9","article-title":"Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence","volume":"25","year":"2016","journal-title":"European Journal of Information Systems"},{"issue":"9","key":"key2023060906190623600_ref033","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1108\/IMDS-03-2015-0087","article-title":"An empirical study of wearable technology acceptance in healthcare","volume":"115","year":"2015","journal-title":"Industrial Management and Data Systems"},{"issue":"2","key":"key2023060906190623600_ref0222","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1108\/JIC-03-2019-0063","article-title":"Empirical assessment of mobile device users\u2019 information security behavior towards data breach: leveraging protection motivation theory","volume":"21","year":"2019","journal-title":"Journal of Intellectual Capital"},{"key":"key2023060906190623600_ref0226","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.dss.2019.02.010","article-title":"Quality matters: evoking subjective norms and coping appraisals by system design to increase security intentions","volume":"119","year":"2019","journal-title":"Decision Support Systems"},{"key":"key2023060906190623600_ref034","unstructured":"Guidelines to import IoT devices in Bangladesh (2018), \u201cBangladesh telecommunication regulatory commission\u201d, available at: www.btrc.gov.bd\/sites\/default\/files\/notice_files\/Instructions%20on%20IoT%20Devices%20Importation%20in%20Bangladesh.pdf (accessed 16 April 2020)."},{"issue":"8","key":"key2023060906190623600_ref035","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1089\/tmj.2014.0166","article-title":"Investigating m-health acceptance from a protection motivation theory perspective: gender and age differences","volume":"21","year":"2015","journal-title":"Telemedicine and e-Health"},{"issue":"2","key":"key2023060906190623600_ref036","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","article-title":"Partial least squares structural equation modeling (PLS-SEM): an emerging tool in business research","volume":"26","year":"2014","journal-title":"European Business Review"},{"key":"key2023060906190623600_ref037","unstructured":"Harris, M. (2018), \u201cVideo doorbell firm ring says its devices slash crime\u2014but the evidence looks flimsy\u201d, MIT Technology Review, available at: www.technologyreview.com\/2018\/10\/19\/103922\/video-doorbell-firm-ring-says-its-devices-slash-crimebut-the-evidence-looks-flimsy\/ (accessed 8 April 2020)."},{"key":"key2023060906190623600_ref038","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/S1474-7979(2009)0000020014","article-title":"The use of partial least squares path modeling in international marketing","volume":"20","year":"2009","journal-title":"Advances in International Marketing"},{"issue":"2","key":"key2023060906190623600_ref039","first-page":"21","article-title":"Digital device addiction effect on lifestyle of Generation Z in Bangladesh","volume":"1","year":"2018","journal-title":"Asian People Journal"},{"issue":"3","key":"key2023060906190623600_ref040","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1108\/PRR-03-2019-0006","article-title":"Security perception in the adoption of mobile payment and the moderating effect of gender","volume":"3","year":"2019","journal-title":"PSU Research Review"},{"issue":"1","key":"key2023060906190623600_ref041","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/ijerph14010008","article-title":"A study of personal health record user\u2019s behavioral model based on the PMT and UTAUT integrative perspective","volume":"14","year":"2017","journal-title":"International Journal of Environmental Research and Public Health"},{"issue":"1","key":"key2023060906190623600_ref042","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1080\/10580530.2015.1117868","article-title":"Critical times for organisations: what should be done to curb workers noncompliance with is security policy guidelines?","volume":"33","year":"2016","journal-title":"Information Systems Management"},{"key":"key2023060906190623600_ref043","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/IS.2018.8710564","article-title":"Crime prediction using multiple ANFIS architecture and spatiotemporal data","volume-title":"International conference on intelligent systems","year":"2018"},{"issue":"7","key":"key2023060906190623600_ref044","doi-asserted-by":"publisher","first-page":"275","DOI":"10.3991\/ijet.v17i07.29243","article-title":"Modelling students\u2019 adoption of e-learning during the COVID-19 pandemic: Hungarian perspective","volume":"17","year":"2022","journal-title":"International Journal of Emerging Technologies in Learning (iJET)"},{"issue":"7","key":"key2023060906190623600_ref045","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su9071079","article-title":"Application of protection motivation theory to investigate sustainable waste management behaviors","volume":"9","year":"2017","journal-title":"Sustainability"},{"key":"key2023060906190623600_ref046","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.chb.2018.05.010","article-title":"Testing a model of precautionary online behaviour: the case of online banking","volume":"87","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"sup1","key":"key2023060906190623600_ref047","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/14783363.2019.1665820","article-title":"Study on initial adoption of advanced driver assistance system: integrated model of PMT and UTAUT 2","volume":"30","year":"2019","journal-title":"Total Quality Management and Business Excellence"},{"issue":"4","key":"key2023060906190623600_ref048","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1108\/K-02-2017-0045","article-title":"Examining intention to adopt to Internet of Things in healthcare technology products","volume":"47","year":"2018","journal-title":"Kybernetes"},{"issue":"10","key":"key2023060906190623600_ref049","first-page":"87","article-title":"Trends and patterns of crimes in Dhaka city: an analysis of recent cases","volume":"3","year":"2015","journal-title":"BEST: International Journal of Humanities, Arts, Medicine and Sciences"},{"issue":"215","key":"key2023060906190623600_ref050","first-page":"2167","article-title":"Coping style as a moderator of chronic loneliness and substance use in emerging adults","volume":"5","year":"2016","journal-title":"Journal of Depression and Anxiety"},{"issue":"1","key":"key2023060906190623600_ref051","doi-asserted-by":"crossref","first-page":"102744","DOI":"10.1016\/j.ipm.2021.102744","article-title":"Is professionals\u2019 information security behaviors in Chinese IT organizations for information security protection","volume":"59","year":"2022","journal-title":"Information Processing and Management"},{"issue":"4","key":"key2023060906190623600_ref052","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1007\/s41870-020-00469-x","article-title":"NB-IoT: applications and future prospects in perspective of Bangladesh","volume":"12","year":"2020","journal-title":"International Journal of Information Technology"},{"key":"key2023060906190623600_ref053","doi-asserted-by":"crossref","first-page":"253","DOI":"10.4018\/978-1-5225-1944-7.ch014","article-title":"Modelling cyber-crime protection behaviour among computer users in the context of Bangladesh","volume-title":"Design Solutions for User-Centric Information Systems","year":"2017"},{"issue":"C","key":"key2023060906190623600_ref054","first-page":"1","article-title":"Blockchain adoption: a study of cognitive factors underpinning decision making","volume":"131","year":"2022","journal-title":"Computers in Human Behavior"},{"key":"key2023060906190623600_ref055","unstructured":"Meola, A. (2016), \u201cPeople buy smart home products for this one main reason\u201d, Business insider, available at: www.businessinsider.com\/home-security-is-number-one-driver-of-smart-home-adoption-2016-4 (accessed 20 March 2020)."},{"issue":"1","key":"key2023060906190623600_ref056","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","article-title":"Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory","volume":"30","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"3","key":"key2023060906190623600_ref057","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1108\/JSIT-01-2016-0001","article-title":"Factors influencing cloud computing adoption for e-government implementation in developing countries: instrument development","volume":"18","year":"2016","journal-title":"Journal of Systems and Information Technology"},{"issue":"1","key":"key2023060906190623600_ref058","first-page":"51","article-title":"The evolution of technology acceptance theories","volume":"1","year":"2017","journal-title":"International Journal of Contemporary Computer Research"},{"key":"key2023060906190623600_ref059","unstructured":"National Internet of Things Strategy (2020), \u201cInformation and communication technology division\u201d, Government of the People\u2019s Republic of Bangladesh, available at: https:\/\/bcc.portal.gov.bd\/sites\/default\/files\/files\/bcc.portal.gov.bd\/page\/bdb0a706_e674_4a40_a8a8_7cfccf7e9d9b\/\/2020-10-19-15-04-9807d52e24da56e66f7ec89f7eb540ec.pdf (accessed 22 March 2022)."},{"issue":"1","key":"key2023060906190623600_ref060","doi-asserted-by":"crossref","first-page":"14","DOI":"10.24815\/jaroe.v4i1.19644","article-title":"Factors influencing the adoption of mobile payment method among generation Z: the extended UTAUT approach","volume":"4","year":"2021","journal-title":"Journal of Accounting Research, Organization and Economics"},{"key":"key2023060906190623600_ref061","volume-title":"Gender Differences in Technology Adoption and Welfare Impact among Nigerian Farming Households","year":"2014"},{"issue":"C","key":"key2023060906190623600_ref062","first-page":"102432","article-title":"Going through the emotions of regret and fear: revisiting protection motivation for identity theft protection","volume":"62","year":"2022","journal-title":"International Journal of Information Management"},{"key":"key2023060906190623600_ref063","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-030-11407-7","article-title":"Mitigating the ransomware threat: a protection motivation theory approach","volume-title":"17th International Conference on Information Security","year":"2019"},{"key":"key2023060906190623600_ref064","unstructured":"Papadopoulos, A. (2019), \u201cThe world\u2019s safest cities ranking\u201d, Ceoworld Magazine, available at: https:\/\/ceoworld.biz\/2018\/09\/19\/the-worlds-safest-cities-ranking-2018 (accessed 10 January 2022)."},{"key":"key2023060906190623600_ref065","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/ICICT4SD50815.2021.9396818","article-title":"Prospects of internet of things for Bangladesh","volume-title":"International Conference on Information and Communication Technology for Sustainable Development","year":"2021"},{"issue":"4","key":"key2023060906190623600_ref066","first-page":"69","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","year":"1986","journal-title":"Journal of Management"},{"key":"key2023060906190623600_ref067","unstructured":"Ramahi, N.A. (2018), \u201cDubai police praise hi-tech security systems for drop in burglaries\u201d, The National, available at: www.thenational.ae\/uae\/dubai-police-praise-hi-tech-security-systems-for-drop-in-burglaries-1.749349 (accessed 8 June 2021)."},{"issue":"1","key":"key2023060906190623600_ref068","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s11417-020-09341-0","article-title":"Impact of COVID-19 on selected criminal activities in Dhaka","volume":"16","year":"2021","journal-title":"Bangladesh. Asian Journal of Criminology"},{"issue":"4","key":"key2023060906190623600_ref0220","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1080\/15536548.2017.1418632","article-title":"Predicting information security policy compliance intentions and behavior for six employee-based risks","volume":"13","year":"2018","journal-title":"Journal of Information Privacy and Security"},{"key":"key2023060906190623600_ref069","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-58481-2_17","article-title":"Improving healthcare with wearables: overcoming the barriers to adoption","volume":"2017","year":"2017","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"key2023060906190623600_ref070","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u2019 adherence to information security policies: an exploratory field study","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2023060906190623600_ref071","article-title":"Factors affecting computer crime protection behavior","volume-title":"19th Pacific Asia Conference on Information Systems","year":"2015"},{"key":"key2023060906190623600_ref072","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.procs.2018.08.198","article-title":"Design of smart home security system using object recognition and PIR sensor","volume":"135","year":"2018","journal-title":"Procedia Computer Science"},{"key":"key2023060906190623600_ref073","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.procs.2013.05.026","article-title":"User acceptance towards web-based learning systems: investigating the role of social, organizational and individual factors in European higher education","volume":"17","year":"2013","journal-title":"Procedia Computer Science"},{"key":"key2023060906190623600_ref074","first-page":"263","article-title":"Moderating effects of age and gender on social commerce adoption factors the Cameroonian context: lecture notes in information systems and organization","volume-title":"ICT for an Inclusive World","year":"2020"},{"issue":"2","key":"key2023060906190623600_ref075","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/21582440221096136","article-title":"Adoption factors and moderating effects of age and gender that influence the intention to use a non-directive reflective coaching chatbot","volume":"12","year":"2022","journal-title":"SAGE Open"},{"key":"key2023060906190623600_ref076","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","article-title":"Security begins at home\u2019: determinants of home computer and mobile device security behavior","volume":"70","year":"2017","journal-title":"Computers and Security"},{"key":"key2023060906190623600_ref077","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","year":"2016","journal-title":"Computers and Security"},{"issue":"2","key":"key2023060906190623600_ref078","first-page":"5","article-title":"Structural equation modeling in information systems research using partial least squares","volume":"11","year":"2010","journal-title":"Journal of Information Technology Theory and Application"},{"issue":"4","key":"key2023060906190623600_ref079","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","article-title":"Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model","volume":"11","year":"2000","journal-title":"Information Systems Research"},{"key":"key2023060906190623600_ref080","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.cose.2018.03.008","article-title":"Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret","volume":"77","year":"2017","journal-title":"Computers and Security"},{"key":"key2023060906190623600_ref0275","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.cose.2018.03.008","article-title":"Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret","volume":"77","year":"2018","journal-title":"Computers and Security"},{"key":"key2023060906190623600_ref081","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.jenvman.2018.10.030","article-title":"Understanding scuba divers\u2019 response to coral bleaching: an application of protection motivation theory","volume":"231","year":"2019","journal-title":"Journal of Environmental Management"},{"issue":"1","key":"key2023060906190623600_ref082","first-page":"21","article-title":"The effects of risk appraisal and coping appraisal on the adoption intention of m-payment","volume":"38","year":"2020","journal-title":"International Journal of Bank Marketing"},{"key":"key2023060906190623600_ref0227","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.dss.2016.09.013","article-title":"Continuance of protective security behavior: a longitudinal study","volume":"92","year":"2016","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2023060906190623600_ref083","first-page":"21","article-title":"Factors that affect acceptance and use of information systems within the Maritime industry in developing countries","volume":"22","year":"2020","journal-title":"Journal of Systems and Information Technology"},{"issue":"1","key":"key2023060906190623600_ref084","first-page":"1","article-title":"Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS","volume":"24","year":"2013","journal-title":"Marketing Bulletin"},{"key":"key2023060906190623600_ref0228","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chb.2019.106229","article-title":"Empirical study of knowledge withholding in cyberspace: integrating protection motivation theory and theory of reasoned behavior","volume":"105","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"12","key":"key2023060906190623600_ref0223","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1atrr.00055","article-title":"Open data: a replication study of user motivation in protecting information security using protection motivation theory and self-determination theory","volume":"6","year":"2020","journal-title":"AIS Transactions on Replication Research"},{"key":"key2023060906190623600_ref085","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICoICT49345.2020.9166200","article-title":"IoT products adoption for smart living in Indonesia: technology challenges and prospects","volume-title":"8th International Conference on Information and Communication Technology","year":"2020"},{"issue":"2","key":"key2023060906190623600_ref086","doi-asserted-by":"publisher","first-page":"79","DOI":"10.20982\/tqmp.09.2.p079","article-title":"A beginner\u2019s guide to factor analysis: focusing on exploratory factor analysis","volume":"9","year":"2013","journal-title":"Tutorials in Quantitative Methods for Psychology"},{"issue":"4","key":"key2023060906190623600_ref087","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.im.2017.11.003","article-title":"Health information privacy concerns, antecedents, and information disclosure intention in online health communities","volume":"55","year":"2018","journal-title":"Information and Management"},{"key":"key2023060906190623600_ref088","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.dss.2014.05.004","article-title":"Moderating role of gender in the relationships between perceived benefits and satisfaction in social virtual world continuance","volume":"65","year":"2014","journal-title":"Decision Support Systems"},{"key":"key2023060906190623600_ref089","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jretconser.2019.101911","article-title":"Understanding consumers\u2019 behavior to adopt self-service parcel services for last-mile delivery","volume":"52","year":"2020","journal-title":"Journal of Retailing and Consumer Services"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-02-2022-0054\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-02-2022-0054\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:23:39Z","timestamp":1753395819000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/25\/2\/133-159\/255213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,28]]},"references-count":99,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,3,28]]},"published-print":{"date-parts":[[2023,6,12]]}},"alternative-id":["10.1108\/JSIT-02-2022-0054"],"URL":"https:\/\/doi.org\/10.1108\/jsit-02-2022-0054","relation":{},"ISSN":["1328-7265","1328-7265"],"issn-type":[{"value":"1328-7265","type":"print"},{"value":"1328-7265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,28]]}}}