SciELO - Scientific Electronic Library Online

 
vol.24 issue1A framework for selecting analytics tools to improve healthcare big data usefulness in developing countriesResearch as a service offering of knowledge management firms in the Fourth Industrial Revolution author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

Related links

  • On index processCited by Google
  • On index processSimilars in Google

Share


South African Journal of Information Management

On-line version ISSN 1560-683X
Print version ISSN 2078-1865

Abstract

NGWENYA, Mfanasibili  and  NGOEPE, Mpho. Data trust in Consumer Internet of Things assemblages in the mobile and fixed telecommunication operators in South Africa. SAJIM (Online) [online]. 2022, vol.24, n.1, pp.1-9. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v24i1.1426.

BACKGROUND: Devices can be connected through the Internet of Things (IoT) technology to create a smart ecosystem. From the connection, various stakeholders share personal data with companies in the consumer IoT (CIoT) space for marketing and other reasons. Customers download and use applications without mulling over the type of personal information exposed to the rest of the world. OBJECTIVE: The main objective of this study was to explore data trust in CIoT assemblages in the mobile and fixed telecommunication operators in South Africa. METHOD: This qualitative study triangulated narrative enquiry with the Delphi technique to explore data trust in CIoT assemblages in South Africa. The primary data collection techniques used in this study were unstructured interviews (in the case of narrative enquiry), questionnaires and semi-structured interviews (in the Delphi technique). For the Delphi technique, five experts were chosen purposively based on their involvement in IoT, selling and on-selling IoT services or those providing support services to the IoT ecosystems, while six narrative enquiry participants were selected through snowball technique based on their exposure to using consumer IoT solutions, ability to provide detailed descriptions of their experiences and willingness to articulate those experiences RESULTS: The study established that the choice of system to use varied from consumer to consumer. The consumer's original decision may be influenced by many factors, such as devices sponsored by one's health insurance or security company. However, the constant use of a specific system makes it personal and more comfortable for the consumer. The level of trust in the CIoT system increases with constant interactions. CONCLUSION: The study concludes that there should be a very high level of stakeholders trust for faster adoption of CIoT in South Africa. Therefore, regulators such as the Independent Communication Authority of South Africa should ensure that IoT devices in the South African market are trustworthy.

Keywords : data trust; data security; Consumer Internet of Things (CIoT); mobile applications; South Africa.

        · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License