{"id":"https://openalex.org/W4361010029","doi":"https://doi.org/10.1108/jsit-02-2022-0054","title":"Generation Z\u2019s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator","display_name":"Generation Z\u2019s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator","publication_year":2023,"publication_date":"2023-03-27","ids":{"openalex":"https://openalex.org/W4361010029","doi":"https://doi.org/10.1108/jsit-02-2022-0054"},"language":"en","primary_location":{"id":"doi:10.1108/jsit-02-2022-0054","is_oa":false,"landing_page_url":"https://doi.org/10.1108/jsit-02-2022-0054","pdf_url":null,"source":{"id":"https://openalex.org/S39868070","display_name":"Journal of Systems and Information Technology","issn_l":"1328-7265","issn":["1328-7265","1758-8847"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061636122","display_name":"Arif Mahmud","orcid":"https://orcid.org/0000-0002-1029-0166"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]},{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD","MY"],"is_corresponding":true,"raw_author_name":"Arif Mahmud","raw_affiliation_strings":["School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia and Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia and Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013","https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055271663","display_name":"Mohd Najwadi Yusoff","orcid":"https://orcid.org/0000-0002-1410-0315"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Najwadi Yusoff","raw_affiliation_strings":["School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021333066","display_name":"Mohd Heikal Husin","orcid":"https://orcid.org/0000-0002-3667-3894"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Heikal Husin","raw_affiliation_strings":["School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences, Universiti Sains Malaysia, George Town, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061636122"],"corresponding_institution_ids":["https://openalex.org/I139322472","https://openalex.org/I200606013"],"apc_list":null,"apc_paid":null,"fwci":6.9382,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.96566656,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"25","issue":"2","first_page":"133","last_page":"159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10609","display_name":"Digital Marketing and Social Media","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/moderation","display_name":"Moderation","score":0.7580549120903015},{"id":"https://openalex.org/keywords/likert-scale","display_name":"Likert scale","score":0.6620261669158936},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5866014957427979},{"id":"https://openalex.org/keywords/nonprobability-sampling","display_name":"Nonprobability sampling","score":0.5594837069511414},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.5533497333526611},{"id":"https://openalex.org/keywords/coping","display_name":"Coping (psychology)","score":0.5499991774559021},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4931463599205017},{"id":"https://openalex.org/keywords/variance","display_name":"Variance (accounting)","score":0.4413470923900604},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.4381397068500519},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.43466565012931824},{"id":"https://openalex.org/keywords/applied-psychology","display_name":"Applied psychology","score":0.3514247536659241},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2520308196544647},{"id":"https://openalex.org/keywords/developmental-psychology","display_name":"Developmental psychology","score":0.15976086258888245},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15671014785766602},{"id":"https://openalex.org/keywords/clinical-psychology","display_name":"Clinical psychology","score":0.1258111298084259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12526863813400269}],"concepts":[{"id":"https://openalex.org/C93225998","wikidata":"https://www.wikidata.org/wiki/Q1941972","display_name":"Moderation","level":2,"score":0.7580549120903015},{"id":"https://openalex.org/C105776082","wikidata":"https://www.wikidata.org/wiki/Q617473","display_name":"Likert scale","level":2,"score":0.6620261669158936},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5866014957427979},{"id":"https://openalex.org/C100363876","wikidata":"https://www.wikidata.org/wiki/Q690661","display_name":"Nonprobability sampling","level":3,"score":0.5594837069511414},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5533497333526611},{"id":"https://openalex.org/C73282008","wikidata":"https://www.wikidata.org/wiki/Q1759895","display_name":"Coping (psychology)","level":2,"score":0.5499991774559021},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4931463599205017},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.4413470923900604},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.4381397068500519},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.43466565012931824},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.3514247536659241},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2520308196544647},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.15976086258888245},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15671014785766602},{"id":"https://openalex.org/C70410870","wikidata":"https://www.wikidata.org/wiki/Q199906","display_name":"Clinical psychology","level":1,"score":0.1258111298084259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12526863813400269},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/jsit-02-2022-0054","is_oa":false,"landing_page_url":"https://doi.org/10.1108/jsit-02-2022-0054","pdf_url":null,"source":{"id":"https://openalex.org/S39868070","display_name":"Journal of Systems and Information Technology","issn_l":"1328-7265","issn":["1328-7265","1758-8847"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Information Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":83,"referenced_works":["https://openalex.org/W831516243","https://openalex.org/W1483959627","https://openalex.org/W1591013228","https://openalex.org/W1770026754","https://openalex.org/W1860620008","https://openalex.org/W1987381312","https://openalex.org/W2025829466","https://openalex.org/W2042083373","https://openalex.org/W2071005526","https://openalex.org/W2091261347","https://openalex.org/W2096899740","https://openalex.org/W2100372251","https://openalex.org/W2118785178","https://openalex.org/W2150238850","https://openalex.org/W2153535865","https://openalex.org/W2166982098","https://openalex.org/W2170551713","https://openalex.org/W2183877827","https://openalex.org/W2291354081","https://openalex.org/W2344419295","https://openalex.org/W2409589671","https://openalex.org/W2501779383","https://openalex.org/W2503241677","https://openalex.org/W2510889263","https://openalex.org/W2513318118","https://openalex.org/W2513561725","https://openalex.org/W2514273118","https://openalex.org/W2522954953","https://openalex.org/W2563010877","https://openalex.org/W2564499263","https://openalex.org/W2566860659","https://openalex.org/W2607562343","https://openalex.org/W2613832828","https://openalex.org/W2619213813","https://openalex.org/W2675458303","https://openalex.org/W2736213052","https://openalex.org/W2768249236","https://openalex.org/W2771276020","https://openalex.org/W2771721466","https://openalex.org/W2782069613","https://openalex.org/W2794539717","https://openalex.org/W2795032667","https://openalex.org/W2800303425","https://openalex.org/W2888864956","https://openalex.org/W2895094653","https://openalex.org/W2898103948","https://openalex.org/W2898602306","https://openalex.org/W2899886323","https://openalex.org/W2904124312","https://openalex.org/W2913564313","https://openalex.org/W2919766756","https://openalex.org/W2942571558","https://openalex.org/W2943897627","https://openalex.org/W2952297734","https://openalex.org/W2955478577","https://openalex.org/W2964515046","https://openalex.org/W2969132493","https://openalex.org/W2970932323","https://openalex.org/W2973153643","https://openalex.org/W2987483809","https://openalex.org/W2989159265","https://openalex.org/W2990065849","https://openalex.org/W2997028558","https://openalex.org/W2999971836","https://openalex.org/W3025703304","https://openalex.org/W3058104546","https://openalex.org/W3087269210","https://openalex.org/W3089008715","https://openalex.org/W3092516581","https://openalex.org/W3106294170","https://openalex.org/W3122877168","https://openalex.org/W3123245320","https://openalex.org/W3142330556","https://openalex.org/W3148233419","https://openalex.org/W3158113715","https://openalex.org/W3167490497","https://openalex.org/W3202153650","https://openalex.org/W3204886010","https://openalex.org/W4207045306","https://openalex.org/W4223638751","https://openalex.org/W4234670054","https://openalex.org/W4248557982","https://openalex.org/W4280525323"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W4243729035","https://openalex.org/W2344264974","https://openalex.org/W3183129722"],"abstract_inverted_index":{"Purpose":[0],"The":[1,46],"factors":[2,203],"that":[3,176],"motivate":[4],"Generation":[5,141],"Z":[6,142],"individuals":[7],"to":[8,19,29,53,100,146,155,191,238],"use":[9,234],"the":[10,23,36,67,78,160,192,197,214,226,242],"Internet":[11],"of":[12,25,107,140,162,199],"Things":[13],"for":[14],"security":[15,206],"purposes":[16],"have":[17],"yet":[18],"be":[20,101,156,178],"explored.":[21],"Therefore,":[22],"purpose":[24],"this":[26],"paper":[27],"is":[28],"close":[30],"a":[31,43,49,73,84,87,105,112,166,188,219],"research":[32,136],"gap":[33],"by":[34],"verifying":[35],"protection":[37,200],"motivation":[38,201],"theory":[39,202],"using":[40],"gender":[41],"as":[42,126,128],"moderator.":[44],"Design/methodology/approach":[45],"authors":[47],"used":[48,72],"purposive":[50],"sampling":[51],"approach":[52,80],"collect":[54],"data":[55],"from":[56],"Dhaka":[57],"city,":[58],"in":[59,119,159,204,208],"which":[60],"370":[61],"valid":[62],"responses":[63],"were":[64,98],"selected.":[65],"Additionally,":[66],"quantitative":[68],"and":[69,90,96,117,124,131,171,232],"cross-sectional":[70],"survey":[71],"seven-point":[74],"Likert":[75],"scale.":[76],"Afterward,":[77],"evaluation":[79,216],"included":[81],"three":[82],"phases:":[83],"measurement":[85],"model,":[86],"structural":[88],"model":[89],"multi-group":[91],"analysis.":[92],"Findings":[93],"Vulnerability,":[94],"self-efficacy":[95],"response-efficacy":[97],"discovered":[99],"critical":[102],"predictors":[103],"with":[104],"variance":[106],"60.4%.":[108],"Moreover,":[109],"there":[110],"was":[111],"significant":[113],"disparity":[114],"between":[115,169],"males":[116,170,231],"females":[118,172,233],"two":[120],"relationships,":[121],"response":[122,129],"efficacy":[123],"intention":[125],"well":[127],"cost":[130],"intention.":[132],"Practical":[133],"implications":[134],"This":[135,184],"expands":[137],"our":[138],"understanding":[139],"consumers'":[143],"behavioral":[144],"intentions":[145,224],"take":[147],"measures":[148],"against":[149,241],"household":[150],"threats,":[151],"allowing":[152],"preventative":[153],"programs":[154],"improved.":[157],"Further,":[158],"case":[161],"applying":[163],"coping":[164,215],"strategies,":[165],"practical":[167],"difference":[168],"has":[173,186,210,218],"been":[174,211],"found":[175],"must":[177],"bridged":[179],"through":[180],"awareness":[181],"campaigns.":[182],"Originality/value":[183],"study":[185],"made":[187],"unique":[189],"contribution":[190],"information":[193],"system":[194],"literature.":[195],"First,":[196],"role":[198],"addressing":[205],"concerns":[207],"homes":[209],"assessed.":[212],"Second,":[213],"process":[217],"greater":[220],"impact":[221],"on":[222],"users'":[223],"than":[225],"threat":[227],"appraisal":[228],"process.":[229],"However,":[230],"slightly":[235],"different":[236],"approaches":[237],"defending":[239],"themselves":[240],"threat.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
