ABSTRACT
The potential of things or objects generating and processing data about day-to-day activities of its users has given a new level of popularity to Internet of Things (IoT) among its consumers. Even though the popularity has seen a steady increase, the use of IoT devices has been slow and abandonment rapid. To build on the existing literature and advance our understanding of the sociological processes of use and non-use of these devices, this paper presents results from the survey of 489 IoT users. Our qualitative analysis of open ended questions revealed that the motives for use include multi-functionality of devices that provide control over daily activities, social competitive edge, economic advantage, and habit. The justifications for limiting or stopping the use include privacy concerns, information overload and inaccuracy, demotivation because of the reminders about pending or failed goals, no excitement after satisfying initial curiosity, and maintenance becoming unmanageable in terms of effort, time, and money.
- Swamy Ananthanarayan, Miranda Sheh, Alice Chien, Halley Profita, and Katie Siek. 2013. Pt Viz: towards a wearable device for visualizing knee rehabilitation exercises. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1247--1250. Google ScholarDigital Library
- Eric P. S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re) lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 3257--3266. Google ScholarDigital Library
- James Clawson, Jessica A. Pater, Andrew D. Miller, Elizabeth D. Mynatt, and Lena Mamykina. 2015. No longer wearing: investigating the abandonment of personal health-tracking technologies on craigslist. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 647--658. Google ScholarDigital Library
- Daniel A. Epstein, Monica Caraway, Chuck Johnston, An Ping, James Fogarty, and Sean A. Munson. 2016. Beyond abandonment to next steps: understanding and designing for life after personal informatics tool use. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 1109--1113. Google ScholarDigital Library
- Cara Bailey Fausset, Tracy L. Mitzner, Chandler E. Price, Brian D. Jones, Brad W. Fain, and Wendy A. Rogers. 2013. Older adults' use of and attitudes toward activity monitoring technologies. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 57. SAGE Publications Sage CA: Los Angeles, CA, 1683--1687.Google Scholar
- Thomas Fritz, Elaine M. Huang, Gail C. Murphy, and Thomas Zimmermann. 2014. Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 487--496. Google ScholarDigital Library
- Rúben Gouveia, Evangelos Karapanos, and Marc Hassenzahl. 2015. How do we engage with activity trackers? a longitudinal study of Habito. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1305--1316. Google ScholarDigital Library
- Mohammad Hossein Jarrahi, Nicci Gafinowitz, and Grace Shin. 2017. Activity trackers, prior motivation, and perceived informational and motivational affordances. Personal and Ubiquitous Computing (2017), 1--16.Google Scholar
- Amanda Lazar, Christian Koehler, Joshua Tanenbaum, and David H. Nguyen. 2015. Why we use and abandon smart devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 635--646. Google ScholarDigital Library
- Lawrence A. Palinkas, Sarah M. Horwitz, Carla A. Green, Jennifer P. Wisdom, Naihua Duan, and Kimberly Hoagwood. 2015. Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Administration and Policy in Mental Health and Mental Health Services Research 42, 5 (2015), 533--544.Google ScholarCross Ref
- John Rooksby, Mattias Rost, Alistair Morrison, and Matthew Chalmers Chalmers. 2014. Personal tracking as lived informatics. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 1163--1172. Google ScholarDigital Library
- Patrick C. Shih, Kyungsik Han, Erika Shehan Poole, Mary Beth Rosson, and John M. Carroll. 2015. Use and adoption challenges of wearable activity trackers. IConference 2015 Proceedings (2015).Google Scholar
- Leonieke C. van Boekel, Sebastiaan T. M. Peek, and Katrien G. Luijkx. 2017. Diversity in Older Adults? Use of the Internet: Identifying Subgroups Through Latent Class Analysis. Journal of Medical Internet Research 19, 5 (2017), e180.Google ScholarCross Ref
Index Terms
- An Exploratory Study for Understanding Reasons of (Not-)Using Internet of Things
Recommendations
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...
The internet of things: a survey
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating `things'. The future of the Internet will consist of ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Comments