南非移动和固定电信运营商对消费者物联网组合的数据信任

Mfanasibili Ngwenya, M. Ngoepe
{"title":"南非移动和固定电信运营商对消费者物联网组合的数据信任","authors":"Mfanasibili Ngwenya, M. Ngoepe","doi":"10.4102/sajim.v24i1.1426","DOIUrl":null,"url":null,"abstract":"consumer IoT (CIoT) space, any product almost always comes with a smartphone application to either control, programme or just view what is happening with the product. Tiwary et al. (2018) pointed out that the consumer has to download the required application using a smartphone, a tablet or a laptop. This application can communicate with a centralised database and obtain valuable data about the environment. Background: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. Objective: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. Method: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences. Results: The study established that the choice of system to use varied from consumer to consumer. The consumer’s original decision may be influenced by many factors, such as devices sponsored by one’s health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. Conclusion: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.","PeriodicalId":331290,"journal":{"name":"SA Journal of Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data trust in consumer internet of things assemblages in the mobile and fixed telecommunication operators in South Africa\",\"authors\":\"Mfanasibili Ngwenya, M. Ngoepe\",\"doi\":\"10.4102/sajim.v24i1.1426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"consumer IoT (CIoT) space, any product almost always comes with a smartphone application to either control, programme or just view what is happening with the product. Tiwary et al. (2018) pointed out that the consumer has to download the required application using a smartphone, a tablet or a laptop. This application can communicate with a centralised database and obtain valuable data about the environment. Background: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. Objective: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. Method: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences. Results: The study established that the choice of system to use varied from consumer to consumer. The consumer’s original decision may be influenced by many factors, such as devices sponsored by one’s health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. Conclusion: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.\",\"PeriodicalId\":331290,\"journal\":{\"name\":\"SA Journal of Information Management\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SA Journal of Information Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4102/sajim.v24i1.1426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SA Journal of Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4102/sajim.v24i1.1426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在消费者物联网(CIoT)领域,任何产品几乎都配有智能手机应用程序,用于控制、编程或查看产品发生的情况。Tiwary等人(2018)指出,消费者必须使用智能手机、平板电脑或笔记本电脑下载所需的应用程序。该应用程序可以与集中式数据库通信,并获得有关环境的有价值的数据。背景:通过物联网技术将设备连接起来,形成智能生态系统。从连接来看,各种利益相关者出于营销和其他原因与消费者物联网(CIoT)领域的公司共享个人数据。用户下载并使用应用程序时,无需考虑个人信息的类型是否会暴露给世界其他地方。目的:本研究的主要目的是探讨南非移动和固定电信运营商在CIoT组合中的数据信任。方法:本定性研究采用德尔菲法进行三角叙事调查,探讨南非CIoT组合中的数据信任。本研究使用的主要数据收集技术为非结构化访谈(叙述性调查)、问卷调查和半结构化访谈(德尔菲技术)。对于德尔福技术,根据参与物联网,销售和销售物联网服务或为物联网生态系统提供支持服务的专家,有目的地选择五名专家,而通过滚雪球技术,根据他们使用消费者物联网解决方案的经验,提供详细描述经验的能力以及表达这些经验的意愿,选择六名叙述性调查参与者。结果:研究确定了不同消费者对系统使用的选择是不同的。消费者最初的决定可能受到许多因素的影响,例如由健康保险或安全公司赞助的设备。然而,对特定系统的持续使用使其个性化,对消费者来说更舒适。CIoT系统中的信任水平随着不断的互动而提高。结论:该研究得出结论,南非应该有一个非常高的利益相关者信任水平,以更快地采用CIoT。因此,南非独立通信管理局等监管机构应该确保南非市场上的物联网设备是值得信赖的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Data trust in consumer internet of things assemblages in the mobile and fixed telecommunication operators in South Africa
consumer IoT (CIoT) space, any product almost always comes with a smartphone application to either control, programme or just view what is happening with the product. Tiwary et al. (2018) pointed out that the consumer has to download the required application using a smartphone, a tablet or a laptop. This application can communicate with a centralised database and obtain valuable data about the environment. Background: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. Objective: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. Method: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences. Results: The study established that the choice of system to use varied from consumer to consumer. The consumer’s original decision may be influenced by many factors, such as devices sponsored by one’s health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. Conclusion: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The role of perceived value of information disclosure on gaming motives and mobile game play Digital consumer perspectives on data access in an emerging market Knowledge transfer: Graduates’ capability to demonstrate and produce business innovation Use of indigenous knowledge to control potato pests in Umzimkhulu Local Municipality Learning Management Systems as a platform for information sharing during the COVID-19
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1