{"title":"南非移动和固定电信运营商对消费者物联网组合的数据信任","authors":"Mfanasibili Ngwenya, M. Ngoepe","doi":"10.4102/sajim.v24i1.1426","DOIUrl":null,"url":null,"abstract":"consumer IoT (CIoT) space, any product almost always comes with a smartphone application to either control, programme or just view what is happening with the product. Tiwary et al. (2018) pointed out that the consumer has to download the required application using a smartphone, a tablet or a laptop. This application can communicate with a centralised database and obtain valuable data about the environment. Background: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. Objective: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. Method: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences. Results: The study established that the choice of system to use varied from consumer to consumer. The consumer’s original decision may be influenced by many factors, such as devices sponsored by one’s health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. Conclusion: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.","PeriodicalId":331290,"journal":{"name":"SA Journal of Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data trust in consumer internet of things assemblages in the mobile and fixed telecommunication operators in South Africa\",\"authors\":\"Mfanasibili Ngwenya, M. Ngoepe\",\"doi\":\"10.4102/sajim.v24i1.1426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"consumer IoT (CIoT) space, any product almost always comes with a smartphone application to either control, programme or just view what is happening with the product. Tiwary et al. (2018) pointed out that the consumer has to download the required application using a smartphone, a tablet or a laptop. This application can communicate with a centralised database and obtain valuable data about the environment. Background: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. Objective: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. Method: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences. Results: The study established that the choice of system to use varied from consumer to consumer. The consumer’s original decision may be influenced by many factors, such as devices sponsored by one’s health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. Conclusion: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.\",\"PeriodicalId\":331290,\"journal\":{\"name\":\"SA Journal of Information Management\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SA Journal of Information Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4102/sajim.v24i1.1426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SA Journal of Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4102/sajim.v24i1.1426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data trust in consumer internet of things assemblages in the mobile and fixed telecommunication operators in South Africa
consumer IoT (CIoT) space, any product almost always comes with a smartphone application to either control, programme or just view what is happening with the product. Tiwary et al. (2018) pointed out that the consumer has to download the required application using a smartphone, a tablet or a laptop. This application can communicate with a centralised database and obtain valuable data about the environment. Background: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. Objective: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. Method: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences. Results: The study established that the choice of system to use varied from consumer to consumer. The consumer’s original decision may be influenced by many factors, such as devices sponsored by one’s health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. Conclusion: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.