ORIGINAL RESEARCH article

Front. Big Data, 04 February 2026

Sec. Machine Learning and Artificial Intelligence

Volume 9 - 2026 | https://doi.org/10.3389/fdata.2026.1718710

Modeling household adoption of IoT-based home security in Dhaka: a PLS–machine learning framework

  • 1. Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh

  • 2. Department of Information Technology & Management, Daffodil International University, Dhaka, Bangladesh

  • 3. Centre for Image and Vision Computing (CIVC), COE for Artificial Intelligence, Faculty of Artificial Intelligence and Engineering (FAIE), Multimedia University, Cyberjaya, Malaysia

  • 4. AI and Big Data Department, Endicott College, Woosong University, Daejeon, Republic of Korea

Article metrics

View details

479

Views

71

Downloads

Abstract

Introduction:

Despite several strategies, Bangladesh has a poor rate of internet of things (IoT) deployment. This study therefore seeks to investigate the factors shaping IoT adoption for residential security in Dhaka and to analyze their respective contributions.

Method:

Hence, this study combined two important theories, namely protection motivation theory (PMT) along with attitude-social influence-self-efficacy (ASE) in which a hybrid PLS-Machine learning approach has been used to identify both linear and nonlinear correlations with high predictive accuracy. Snowball sampling method was utilized to choose 348 valid replies from a survey of household heads. Afterward, partial least squares (PLS) followed by artificial neural networks (ANN) and machine learning (ML) classifiers were the procedures that made up the complete assessment method.

Results:

The variables that affected intention with a variance of 34.9% and accuracy of 74.28% were severity, vulnerability, response efficacy, response cost, and attitude. On the other hand, vulnerability was the most significant predictor, followed by response cost, attitude, response efficacy, self-efficacy, social influence, and severity.

Discussion:

The theoretical contribution of this study lies in its novel integration of PMT and ASE models, offering new insights into their combined effect on technology adoption in emerging markets. Besides, the findings contribute to the literature by increasing the public awareness of home security that can enhance Dhaka's overall state of public order and safety. Moreover, the findings may offer valuable insights for companies and entrepreneurs, as incorporating these factors into marketing strategies and investment initiatives is likely to foster greater consumer adoption.

1 Introduction

The Internet of Things (IoT) has profoundly impacted the evolution of Information and Communication Technology. The emergence of compact, internet-connected, and wireless sensors has not only transformed how data is ubiquitously collected but has also instilled a vision of “smartness” across various environments (Ahanger et al., 2020). With the global IoT market projected to exceed USD 1.6 trillion by 2025 and over 34 billion connected devices worldwide (Anddresey et al., 2025), innovations in smart home technologies are transforming residential security; in Dhaka, understanding the factors influencing the adoption of IoT-enabled home security solutions is essential for enhancing household safety and supporting broader public security efforts.

Home automation systems involve the automated control and programmable operation of various household appliances and devices, thereby minimizing the need for manual interaction in managing daily domestic tasks (Sayeduzzaman et al., 2024). These interconnected sensors and devices leverage an IoT-enabled platform, granting users global connectivity and command. This pervasive interconnectivity allows smart home devices to gather real-time data from diverse sources, significantly enhancing both user safety and overall security (Sobhan et al., 2025). One of the most critical applications of these systems is safety and security, especially given the recent surge in burglaries, thefts, and other security incidents that threaten personal wellbeing (Siwakoti et al., 2023).

Beyond automation and security, smart home technology also facilitates efficient energy management, offering an effective method for optimizing energy use within residential structures (Ejaz et al., 2017). With rapid advancements in smart home technology coinciding with growing populations, these systems are becoming crucial for optimizing residential electricity consumption (Netinant et al., 2024). Currently, over 100 million households utilize IoT security devices, a figure expected to triple by the decade's end (Anddresey et al., 2025). In developed countries, IoT adoption at the household level has become increasingly common, with smart appliances, security systems, and energy management solutions integrated into everyday life (Sámano-Ortega et al., 2023). By contrast, in many developing countries, household use of IoT remains constrained by affordability, lack of infrastructure, digital literacy gaps, and uneven internet access (Hossain et al., 2024).

Bangladesh is experiencing significant growth in digital connectivity, providing a foundation for the adoption of IoT applications including home security. As of 2025, internet access in Bangladesh has expanded to 54.8% of households, showing steady growth from 38.1% in 2022 (Rahman et al., 2025). The smart home market in Bangladesh is expected to grow from US$476.6 million in 2024 to around US$536 million in 2025, continuing at a 12.4% annual growth rate and reaching US$760.5 million by 2028 (Hossain et al., 2024). This growth in connectivity and device availability indicates a stronger basis for the adoption of IoT-based solutions in the country. Although IoT adoption in Bangladesh is still at an early stage, it demonstrates considerable potential for transforming key sectors such as smart cities, healthcare, traffic management, and home automation (Hossain et al., 2025). Government initiatives and research projects are laying the groundwork for wider integration, signaling strong interest in leveraging IoT for socio-economic development. Despite these efforts, the drivers of adoption remain largely unexamined, creating opportunities for researchers to conduct holistic studies to uncover underlying factors and theoretical foundations.

The Protection Motivation Theory (PMT) is a practical and reliable social theory used to assess fear, danger, and threats (Westcott et al., 2017). This assertion is supported by prior studies (Srisawang et al., 2015; Jansen and van Schaik, 2018), which emphasize that PMT can successfully address crime- and security-related issues. The Attitude-Social Influence-Self-Efficacy (ASE) model also aids in identifying and predicting factors that affect a consumer's acceptance of new technology (Tani et al., 2022; Shabiq and Hassan, 2016; Aziz et al., 2017). The integration of these two models can improve the identification of factors that spur the adoption of IoT-enabled security devices. If a comprehensive IoT-enabled security system is implemented in Dhaka city households, it is projected that burglaries and other criminal attempts against homes would be minimized. To increase IoT adoption for home security, it is also crucial to recognize the influencing elements and each one's unique contribution.

Although previous studies have explored the adoption of IoT technologies in various contexts (Negm, 2023; Rodić et al., 2023; Zhang and Lee, 2023), factors specifically influencing the adoption of IoT-enabled home security systems remain underexamined. While Protection Motivation Theory (PMT) and the Attitude-Social Influence-Self-Efficacy (ASE) model have been widely applied in other domains (Mahmud et al., 2024b; Mou et al., 2022; Saygılı et al., 2022; Mahmud et al., 2022b), their integration within the context of IoT security has not been sufficiently investigated. Additionally, despite the rise of IoT security solutions globally (Zhang and Lee, 2023; Li et al., 2024), empirical studies examining the determinants of adoption in developing countries, like Bangladesh, are limited. While theories like TAM (Technology Acceptance Model) and UTAUT (Unified Theory of Acceptance and Use of Technology) are widely used to explain technology adoption (An et al., 2023; Menon and Shilpa, 2023), they tend to focus more on the perceived ease of use, usefulness, and social influences without adequately addressing how fear of security threats or individual coping capabilities influence technology acceptance. Besides, Technology Threat Avoidance Theory (TTAT) is new, inconsistent and needs to be widely explored (Carpenter et al., 2019). Moreover, this model places excessive emphasis on individuals' perceptions and thoughts, rather than addressing the technical and organizational viewpoints. According to Westcott et al. (2017) and Haag et al. (2021), PMT is allied to threat-related research where appropriate solutions are available to individuals. In addition, Ifinedo (2012) points out that attitude and social influence are also important predictors of the intent to adopt a security system. However, importantly, attitude and social influence are the two variables that are ignored in PMT.

This study addresses these gaps by integrating PMT and ASE models to understand the specific factors influencing IoT adoption for home security in Dhaka. By combining these models, this research provides a more comprehensive framework for understanding consumer behavior, offering insights into how perceived severity, vulnerability, response efficacy, response cost and self-efficacy, alongside social influences and attitudes, impact adoption intentions. On the other side, consumer, student, professionals are the majority samples used in Bangladesh context (Hassan et al., 2022; Rahman and Nasrin, 2024; Emon et al., 2024). Bangladeshi family heads are less studied sample types despite being the ultimate decision maker within the family. Last but not least, (Mahmud et al. 2024a), (Al-Skaf et al. 2021), and (Duc et al. 2023) have integrated PLS-SEM with ML, there hasn't been much experimentation with the hybrid PLS-ML model in the context of the IoT for security objectives. This indicates clear gaps in the current literature, underscoring the necessity for focused research in these areas. Given this gap in the literature, the current study aims to address these challenges by applying a hybrid PLS-SEM and machine learning approach to explore the factors affecting IoT adoption for home security. The study's objectives are threefold:

  • RO1: To determine the factors that influence the adoption of IoT.

  • RO2: To determine the contribution of each factor in the adoption of IoT.

  • RO3: To predict the accuracy of the adoption of IoT.

The structure of this paper is organized into multiple sections. After the introduction, Section 2 identifies the literature gap and presents the literature review. Section 3 proposes the conceptual model based on theoretical justifications and hypotheses. Section 4 details the methodology employed. Sections 5, 6 present the study's findings and discussion, respectively. Finally, the research's contributions, limitations, future directions, and conclusions are explored in Section.

2 Literature review

Based on the concept of the parallel process model, Rogers introduced PMT in 1975 (Verkijika, 2017). According to Figure 1, the outcomes of cognitive processes can manifest as adaptive or maladaptive reactions. Adaptive reactions are techniques that positively lessen the danger. Maladaptive reactions, on the other hand, may diminish fear but fall short of genuinely minimizing the hazard (Posey et al., 2015). Additionally, the sources of knowledge for these processes might be interpersonal, environmental, etc. Vulnerability, severity, and intrinsic or extrinsic benefits of using maladaptive reactions contribute to the development of threat evaluation. Contrarily, coping evaluation for using the adaptive coping strategy takes into account self-efficacy, response cost and response efficacy (Posey et al., 2015; Aurigemma and Mattson, 2018). The intention to carry out the desired conduct that results from these two evaluation processes is known as protection motivation, which is often equivalent to the behavioral intention (Verkoeyen and Nepal, 2019).

Figure 1

While Protection Motivation Theory (PMT) is traditionally applied to health-related contexts (Chiu et al., 2025; Gholian-Aval et al., 2025; Gopal and Thomas Gil, 2025), this study adapts its framework to better understand threat perception in the adoption of technology-mediated solutions, such as IoT devices for home security. In classical health-psychology models, threat appraisal and coping appraisal are central to the decision to adopt protective behaviors (Verkoeyen and Nepal, 2019; Posey et al., 2015). In the context of IoT adoption, threat perception operates differently than in traditional health contexts. In this study, we focus on how threat appraisal—specifically, perceived vulnerability and perceived severity—influences the intention to adopt IoT-based home security systems. IoT devices, such as smart cameras and sensors, are seen as tools that can effectively counteract the perceived threats, providing a sense of control and protection. In the context of IoT adoption for home security, perceived vulnerability refers to the individual's belief about the likelihood of experiencing a digital security threat, such as a data breach, hacking, or device malfunction. Perceived severity, on the other hand, reflects the seriousness of these potential threats—for example, the loss of personal data, privacy violations, or financial loss resulting from unauthorized access. These perceptions drive consumers' motivation to adopt IoT technologies, as they seek to mitigate these digital risks. Thus, PMT applies by emphasizing how security concerns shape the decision to adopt technology. This aligns with PMT's coping appraisal, where individuals evaluate the response efficacy and response cost.

Recent extensions of Protection Motivation Theory (PMT), such as those by Liang and Xue (2010) and Warkentin et al. (2016), emphasize the affective dimension of fear appeals, which focus on emotional responses to digital threats like data breaches or cyberattacks. In the context of IoT adoption, individuals may experience fear, anxiety, or concern about the security risks associated with these technologies, influencing their threat appraisal. This emotional reaction can intensify the perceived severity and vulnerability of potential risks, motivating consumers to adopt security technologies to alleviate these feelings. Therefore, the affective dimension of fear appeals plays a crucial role in shaping consumers' coping behaviors, as emotional reactions often drive individuals to seek out technologies that promise to reduce perceived risks and emotional discomfort.

However, among 138 studies, only 13 and 12, respectively, have treated threat and coping appraisal as distinct variables inside PMT. Severity, self-efficacy, response cost, vulnerability, and response efficacy, on the other hand, have each been used in articles in a manner that ensures that these variables are most frequently and effectively used (Mahmud et al., 2022a). Threat and coping assessments, however, have often been treated as independent processes rather than as separate entities (Giwah et al., 2019). Furthermore, Mahmud et al. (2022a) reveal that threat appraisal is comprised of severity and vulnerability whereas coping appraisal is made up of self-efficacy, response cost and response efficacy. Although Protection Motivation Theory (PMT) research frequently incorporates mediation or moderation mechanisms, this study intentionally focuses on direct structural relationships. The primary aim is predictive modeling of IoT-enabled home security adoption rather than testing complex causal pathways. Incorporating mediation or moderation effects would increase model complexity and risk overfitting, which could compromise predictive stability, particularly when integrating PLS–SEM with machine learning algorithms.

Furthermore, both Boss et al. (2015) and Posey et al. (2015) have disregarded the mediating role of threat and coping assessment. Considering that the study seeks to examine the predictors of intention, only the independent variables of PMT have been inherited and the mediation effect has been ignored. . Consistent with prior prediction-oriented PMT studies, direct effects were therefore emphasized. Here's a list of a few recent papers where the variables of PMT have been used as direct predictors of intention that justifies the claim of study (see Table 1). A significant contribution across these studies is the integration of cultural and psychological factors in shaping security behaviors. (Ameen et al. 2019), (2021) and Crossler et al. (2019) highlight how cultural dimensions like individualism and collectivism impact cybersecurity compliance, offering a nuanced understanding of security behaviors in different cultural settings. Farooq et al. (2019) and Kusyanti et al. (2019) examine security behaviors in developing countries like Kenya and Indonesia, emphasizing the role of socio-cultural influences in shaping security intentions, though their findings contradict typical PMT assumptions. For instance, Farooq et al. (2019) found that factors like perceived vulnerability and severity did not significantly influence security behaviors, contrary to expectations from PMT. These contradictions highlight a gap between theoretical assumptions and real-world behavior. Furthermore, many studies underscore limitations in terms of sample size and geographical focus. For example, studies by (Ameen et al. 2019), (2021) focus on specific regions like the UAE and US, limiting the generalizability of findings. Several papers also point to a gap in understanding how to effectively apply theoretical models in improving security compliance, especially in resource-limited settings like Palestinian universities (Iriqat et al., 2019) and developing countries (Hina et al., 2019).

Table 1

NoReferencesCountrySourcesApplicationIndependent/Dependent variables
1Ameen et al., 2019UK, OmanComp. in Human Beh.Smartphone securityPS, PV, PSE, PRE, RC, PCS, SAC, UA, PD, IVC, MVF / INT
2Farooq et al., 2019Finland, KenyaIEEE AFRICON ConferenceSecurity behaviorPS, PV, PSE, PRE, RC, ATT, SN, SS, DN / INT, BHV
3Wang, 2020TaiwanInt. J. of Bank MarketingM-payment securityPS, PV, PSE, PRE, RC, PB / INT
4Al-Emran et al., 2020UK, Oman, USAComp. in Human Beh.Cyber-security compliancePS, PV, PSE, PRE, RC, ATT, SN, CYPO, TMGT, PTH, SANC / INT, BHV
5Yang et al., 2020USAIS transactions on replication researchInfoSec protectionPS, PSUS, PSE, PRE, RC, PAUTO, PREL, PCOM, RPM / INT
6Crossler et al., 2019USInformation & managementProtective info technologiesPS, PV, PSE, PRE, RC / INT
7Hina et al., 2019Malaysia, USComputers & securitySecurity compliance behaviorPS, PV, PSE, PRE, SN, ATT / INT
8Hooper and Blunt, 2019New ZealandBehavior & info technologyInfoSec behaviorPSE, PRE, RC, SN, PB, LIKE, IMP, DET, SANC / INT
9Iriqat et al., 2019MalaysiaICOICE 2019 ConferenceInfoSec policySANCC, PS, PSE, RE, PRE, INFQ, PRI, FC / INT
10Kusyanti et al., 2019IndonesiaProcedia computer scienceProtecting Facebook passwordPS, PV, PSE, PRE, RC, PSUS, FEAR, PEX, SN, PRES, PSS / INT
11Rajab and Eydgahi, 2019USComputers & securityInfoSec policiesPS, PV, PSE, PRE, RC, ATT, PBC, SN, AWARE, SANC, DC, SC, TMS, PEPR, ORGC / INT
12Al-Emran et al., 2020Vietnam, Croatia, Malaysia, UK, OmanJ. of enterprise info managementSmart-watch securityPS, PV, PSE, PRE, RC, PU, PEOU / INT
13Mahmud et al., 2023Bangladesh, MalaysiaJ. of systems and info technologyIoT security devicesPS, PV, PSE, PRE, RC / INT
14Marikyan et al., 2022UKComputers in human behaviorBlockchain adoptionPS, PV, PSE, PRE, RC/INT
15Kimpe et al., 2021Belgium, UKBehavior & info technologyCyber-securityPS, PV, PSE, PRE / INT
16Skalkos et al., 2021GreeceJ. of cybersecurity and privacyBiometrics authenticationPS, PV, PSE, PRE, RC, INNOV/INT

Variables of PMT as direct predictors of intention.

Variables: INT, Intention; BHV, Behavior; PSE, Perceived self-efficacy; PS, Perceived severity; PRE, Perceived response efficacy; PV, Perceived vulnerability; RC, Response cost; UA, Uncertainty avoidance; PD, Power distance; IVC, Individualism vs collectivism; MVF, Masculinity vs. femininity; PCS, Perceived certainty of sanction; SAC, Severity of adverse consequences; ATT, Attitude; SN, Subjective norm; SS, Social support; DN, Descriptive norms; PB, Perceived benefit; CYPO, National smartphone cybersecurity policies; TMGT, Top-management participation; PTH, Perceived threat; SANC, Sanctions; PSUS, Perceived threat susceptibility; PAUTO, Perceived autonomy; PREL, Perceived relatedness; PCOM, Perceived competence; RPM, Response performance motivation; LIKE, Likelihood; IMP, Impact; DET, Detection; SANCC, Sanction certainty; INFQ, Info-Quality; PRI, Perceived privacy; FC, Facilitating condition; FEAR, Fear; PEX, Prior experience; PSS, Perceived Security (Support); PRES, Personal responsibility; PBC, Perceived behavior control; AWARE, Awareness; SC, Sanction celerity; TMS, Top Management Support; PEPR, Peer Pressure; ORGC, Organizational Climate; DC, Perceived certainty of detection; PU, Perceived usefulness; PEOU, Perceived ease of use; INNOV, Innovativeness.

Mahmud et al. (2023) and Marikyan et al. (2022) apply PMT to emerging technologies like IoT and blockchain. Mahmud et al. emphasize perceived vulnerability and self-efficacy in Generation Z's adoption of IoT security measures, highlighting gender differences, while Marikyan et al. show that self-efficacy and response efficacy predict blockchain adoption. In contrast, Rajab and Eydgahi (2019) focus on PMT's applicability in higher education, finding that PMT best explains compliance intentions, though they find limited support for other frameworks like General Deterrence Theory (GDT). Skalkos et al. (2021) explore Behavioral Biometrics Continuous Authentication (BBCA), showing that privacy concerns and trust significantly influence adoption intentions, but leaving a gap in understanding trust dynamics. Wang (2020) on mobile payments finds that self-efficacy and response efficacy are crucial in adoption, but risk appraisal does not have a significant impact, which contrasts with Mahmud et al.'s emphasis on perceived vulnerability. Yang et al. (2020) compares organizational and home users, revealing that organizational users are more motivated by self-determined appeals (SDT) rather than fear-based PMT appeals.

A significant contribution across these studies is the integration of cultural and psychological factors in shaping security behaviors. Crossler et al. (2019) highlight how cultural dimensions like individualism and collectivism impact cybersecurity compliance, offering a nuanced understanding of security behaviors in different cultural settings. Farooq et al. (2019) examine security behaviors in developing countries like Kenya and Indonesia, emphasizing the role of socio-cultural influences in shaping security intentions, though their findings contradict typical PMT assumptions. For instance, Farooq et al. (2019) found that factors like perceived vulnerability and severity did not significantly influence security behaviors, contrary to expectations from PMT. These contradictions highlight a gap between theoretical assumptions and real-world behavior. Furthermore, many studies underscore limitations in terms of sample size and geographical focus. For example, studies by Ameen et al. (2019) focus on specific regions like the UAE and US, limiting the generalizability of findings. Several papers also point to a gap in understanding how to effectively apply theoretical models in improving security compliance, especially in resource-limited settings like Palestinian universities (Iriqat et al., 2019) and developing countries (Hina et al., 2019).

Mahmud et al. (2022a) and Dupuis and Ebenezer (2018) apply PMT to emerging technologies like IoT and blockchain. Mahmud et al. (2024b) emphasize perceived vulnerability and self-efficacy in Generation Z's adoption of IoT security measures, highlighting gender differences, while Dupuis and Ebenezer (2018) show that self-efficacy and response efficacy predict blockchain adoption. In contrast, Ejaz et al. (2017) focus on PMT's applicability in higher education, finding that PMT best explains compliance intentions, though they find limited support for other frameworks like General Deterrence Theory (GDT). Skalkos et al. (2021) explore Behavioral Biometrics Continuous Authentication (BBCA), showing that privacy concerns and trust significantly influence adoption intentions, but leaving a gap in understanding trust dynamics. Wang (2020) on mobile payments finds that self-efficacy and response efficacy are crucial in adoption, but risk appraisal does not have a significant impact, which contrasts with Mahmud et al. (2024b)'s emphasis on perceived vulnerability. Yang et al. (2020) compares organizational and home users, revealing that organizational users are more motivated by self-determined appeals (SDT) rather than fear-based PMT appeals.

Ajzen (1991) said that people are more likely to sustain the behavior when their attitude and social influence increase. Self-efficacy also relates to beliefs about one's capacity to carry out particular activities under particular circumstances (de Vries et al., 1988). Based on these ideas, in 1988, de Vries created the ASE model, which combines the concepts of the two widely used models, the TRA and social learning theory. According to the model (see Figure 2), an individual's decision to engage in an activity is characterized by attitude, social influence, and self-efficacy (Merkx et al., 2017).

Figure 2

By combining PMT and ASE, this study provides a more holistic model for understanding IoT adoption. While PMT focuses on fear-driven motivation based on perceived threats (e.g., vulnerability to burglary), the ASE model complements this by showing how self-efficacy and attitudes toward technology mediate the adoption process. This dual framework enriches theoretical discussions by explaining not only the emotional triggers that drive adoption (e.g., fear of security threats) but also the cognitive factors (e.g., perceived ability and attitudes) that shape how individuals respond to those threats. The integration of these two models allows for a more nuanced understanding of how motivation and fear interact, which is crucial for explaining the decision to adopt IoT technology in security applications. Moreover, this combination allows for a more holistic view of the complex factors that influence consumers' decisions to adopt IoT technologies, particularly in the context of home security in Dhaka

3 Hypotheses and model development

Burglaries can instill a significant fear of property loss within households (Mahmud et al., 2023). Kim and Kyung (2023) suggest that the likelihood of adopting IoT devices increases with the severity of the perceived threat. Furthermore, greater perceived threat severity associated with an IoT device has been shown to increase the likelihood of engaging in behaviors aimed at mitigating this risk, as evidenced by Dupuis and Ebenezer (2018). Additionally, this factor affects the intention to adopt mobile banking apps and smart-watch favorably (Kala et al., 2021; Al-Emran et al., 2020). Similarly, the following hypothesis can be proposed:

H1: The IoT adoption intention for home security is positively influenced by perceived severity.

According to Al-Emran et al. (2020), people might be more motivated to prevent security breaches if they had a high impression of security vulnerabilities. According to Wang (2020), users who believe that recommended security measures effectively mitigate threats are more likely to adopt and comply with these measures. Likewise, the prevalence of home burglaries may drive residents in Dhaka to adopt IoT security solutions (Mahmud et al., 2023). Moreover, followed by Kala et al. (2021), this variable positively impacts the individuals' behavioral intentions to adopt mobile apps and m-payment (Wang, 2020). On the basis of the foregoing discussion, the following hypothesis is advanced:

H2: The IoT adoption intention for home security is positively influenced by perceived vulnerability.

Security measures leveraging IoT technology are projected to effectively reduce the risk of burglaries (Mahmud et al., 2023). According to Wang (2020), users who believe that recommended security measures effectively mitigate threats are more likely to adopt and comply with these measures. The adoption intention of smart watches (Al-Emran et al., 2020) and m-payments (Wang, 2020) was also found to be positively influenced by this variable. Therefore, we can expect the following:

H3: The IoT adoption intention for home security is positively influenced by perceived response efficacy.

Elevated response costs discourage people from engaging in threat-mitigating behaviors (Mahmud et al., 2023). Fei et al. (2022) argue that lower perceived response costs associated with technology adoption lead to increased efforts to engage in behaviors aimed at mitigating the identified threat. Moreover, Al-Emran et al. (2020) and Marikyan et al. (2022) identified that this variable hurt the adoption of smart-watches and blockchain, respectively. Consequently, the following hypothesis can be posited:

H4: The IoT adoption intention for home security is negatively influenced by perceived response cost. According to AlHamad et al. (2021), stronger sense of self-efficacy is linked to a heightened motivation to take steps to address and reduce potential threats. Wang (2020) further affirms that this variable plays a pivotal role in information security studies, indicating that a higher level of self-efficacy correlates with greater adoption of technology. Besides, this variable plays an important role in adopting mobile warning systems (Fischer-Preßler et al., 2022) and blockchain (Marikyan et al., 2022). Accordingly, the preceding discussion suggests the following projection:

H5: The IoT adoption intention for home security is positively influenced by perceived self-efficacy.

Before using any technology, people frequently consult their friends and relatives who are well-wishers and well-informed about the technologies (Mahmud et al., 2022a). Conversely, this variable has been identified as a significant predictor in information security studies, with higher social influence leading to greater technology adoption (Giua et al., 2022). Furthermore, social influence is observed to exert a positive impact on knowledge-sharing intentions (Kalra and Baral, 2020) and e-trading adoption (Chaudhary and Suri, 2022). So, the following hypothesis can be projected in light of the debate above:

H6: The IoT adoption intention for home security is positively influenced by social influence.

Bhalla (2023) highlighted that when customers feel more content, their attitudes would be positively impacted and they would be more inclined to use this service. Similarly, Na et al. (2023) find that when consumers prioritize their well-being, they tend to exhibit a positive attitude toward the service and are more inclined to adopt such services. Additionally, this characteristic is crucial for the uptake of electric vehicles (Khurana et al., 2020) and online shopping (Usman and Kumar, 2021). Hence, the following hypothesis can be suggested:

H7: The IoT adoption intention for home security is positively influenced by attitude.

In order to increase IoT adoption for home security, this study has incorporated the factors of two key theories; PMT and ASE (see Figure 3). Perceived severity, perceived response efficacy, perceived vulnerability, perceived self-efficacy, and response cost are the components of PMT theory. The ASE model, in contrast, includes attitude, self-efficacy and social influence. All these seven variables are directly connected to the intention to adopt IoT which is represented by seven hypotheses (H1-H7).

Figure 3

4 Methodology

The household head of Dhaka city who are potential users of IoT for home security are considered as the sample of this research. The results should therefore be interpreted as reflective primarily of urban, digitally aware household heads, which are more likely to engage with and adopt IoT-enabled home security technologies. On the other hand, according to Twine et al. (2019), the age of the household head should be more than 24. It is worth mentioning that even though there are several household heads, data are collected from a single member of a family. In this study, snowball sampling was utilized to collect data. This strategy is especially useful when the target demographic is difficult to reach (Woodley and Lockard, 2016). The respondents in this research are difficult to reach for two reasons. Firstly, respondents have to fulfill several selection criteria and secondly, data are collected during the pandemic times. Data was gathered for about 5 months between 25 March 2021 and 21 August 2021 utilizing both paper questionnaires and online surveys (Google Forms). Most participants favored online questionnaires due to the pandemic scenario in Dhaka during the data collection time.

The snowball process was initially initiated by the researchers who reached out to a small group of known household heads within local communities. These initial participants were then asked to refer others in their social networks who met the study's inclusion criteria. A total of thirty two seed participants were initially recruited, each of whom was asked to refer other household heads. This allowed the snowball process to grow gradually, expanding the sample size. Participants were recruited through local community networks, neighborhood contacts, and word-of-mouth. In addition, most referrals were made via Messenger, Telegram, Email, and WhatsApp. As per inclusion criteria, participants had to be household heads of Dhaka city that were at least 24 years old and had some knowledge or interest in IoT or home security technologies.

The constructs were measured using items derived from previous research. To be more precise, the items of severity, response efficacy, vulnerability, self-efficacy, and response cost were provided by Thompson et al. (2017). Additionally, (Iranmanesh et al. 2017), (Magotra et al. 2016), and (Zhou et al. 2020) were followed to gain items of attitude, social influence, and intention, respectively. All of these constructs including response cost are reflective by nature as adapted from existing research papers. For this cross-sectional study, responses were recorded using Likert scale-7. A cross-sectional design was chosen because the study had a limited timeframe and longitudinal follow-up of the same households was not feasible. It also enabled efficient collection of a sufficiently large sample for robust PLS-SEM estimation and subsequent predictive modeling (do Valle and Assaker, 2016). Cross-sectional surveys provide faster, lower-cost evidence than longitudinal designs (Zangirolami-Raimundo et al., 2018). On the basis of Mohammed et al. (2016) suggestions, a pre-test (8 people) and pilot surveys (35 people) were carried out to validate survey items prior to the final survey. The sample size of 35 for pilot test followed Mooney and Duval (1993) who recommended limiting the response between 30 and 50. In the pre-test phase, volunteers verified both the language and length of the measurement items. However, the pilot test results led to the removal of items PS6 and PSE1. The decision to remove these items was primarily based on semantic issues in which these items unclear or difficult to interpret, which may have led to inconsistent responses. We also ensured that the remaining items showed acceptable levels of internal consistency, which was verified through reliability checks in the final survey. The study's minimum sample size, previously computed with G*Power 3.1, was 103. In G*Power, we specified the parameters based on the following: a moderate effect size (f2 = 0.15), statistical power of 0.80, and an alpha level of 0.05 as followed by Memon et al. (2020). The survey links and printed questionnaire were distributed to 700 persons approximately, who returned 531 copies. Afterward, 348 replies were chosen for the final analysis from the obtained data.

As per Table 2, there were 248 men and 100 women out of 348 participants. In addition, more than 96% of the total respondents were married. On the other hand, around 70% of participants were aged between 36 and 55. Further, more than 50% of the participants attained a bachelor's degree.

Table 2

VariablesCategoryFrequencyPercentage
GenderWomen10028.7
Men24871.3
Age25–35 years8223.6
36–45 years17048.9
46–55 years7120.4
56–65 years226.3
66 years and above30.9
Marital positionMarried33596.3
Single133.7
Academic certificatePost-Doctoral certificate20.6
Ph.D. certificate82.3
Masters certificate8424.1
Bachelor certificate9427.0
Diploma certificate6418.4
Higher secondary certificate7421.3
Secondary school certificate164.6
No academic certificate61.7

Demographic data.

This study used both SPSS and SmartPLS for data analysis. SPSS is well-suited for performing basic statistical analysis such as descriptive statistics, correlation, and reliability testing, which are essential for the initial stages of data examination and scale validation (Rahman and Muktadir, 2021). While SPSS alone does not support more advanced techniques like PLS-SEM, it was utilized for initial steps, and PLS-SEM analysis was conducted separately using SmartPLS due to its ability to model complex relationships and latent variables efficiently (Hair and Alamer, 2022). On the other side, PLS-SEM is preferred over CB-SEM because selected because it is prediction-oriented, suitable for complex models and required less sample sizes (Dash and Paul, 2021). This combination of SPSS for preliminary analysis and SmartPLS for the structural equation modeling is methodologically sound and allows for comprehensive data analysis.

5 Results

Data preparation, PLS, ANN, and ML classifiers were the four processes that made up the entire assessment procedure.

5.1 Data preparation

SPSS was used to assess these 4 methods, common method variance using Harman's single-factor test, missing data using expectation-maximization, outliers using 5% trimmed means and normality using descriptive statistics. First, Harman's single-factor test yielding approximately 15.56%, indicating that common method variance was not a concern. On the other hand, the majority of respondents preferred online surveys where it was required to complete the entire Google form. There were thus no issues with missing data. To prevent outlier influence, the study adhered to Ahanger et al. (2020) method of keeping a modest gap between the original and 5% trimmed means. Finally, the result of descriptive statistics confirms that the data distribution is non-normal, where large portion of the data presented skewness and kurtosis above the recommended threshold, –3 to +3. Therefore, it shows that the data normality distribution assumption was violated; thus, further supporting the use of PLS-SEM PLS-SEM (Hashim et al., 2023).

5.2 Partial least squares

Due to its popularity among academics, the SmartPLS v3.3.3 program was employed to assess our suggested conceptual model using PLS (Wong, 2013). To improve AVE values, 4 items (PS1, PRE1, PSE3, and PS4) were eliminated and latent variable remain intact with rest other variables. Table 3 demonstrates that every requirement was satisfied. Notably, RC1 (0.495) was not deleted for 2 reasons; first it is too close to 0.5 and scores greater than 0.4 are considered stable and can be accepted (Samuels, 2017). To improve AVE values, 4 items (PS1, PRE1, PSE3, and PS4) were eliminated. Table 3 demonstrates that every requirement was satisfied (Samuels, 2017).

Table 3

ConstructsItemsFactor loadingsVIFVIF (construct)CRAVE
Adoption intention (AI)AI10.7391.383N/A0.8290.549
AI20.6821.391
AI30.7511.395
AI40.7881.542
Attitude (ATT)ATT10.8762.6181.2160.9340.779
ATT20.8752.684
ATT30.8962.490
ATT40.8852.887
Perceived response efficacy (PRE)PRE20.7111.1961.4480.7880.553
PRE30.7381.163
PRE40.7811.275
Perceived severity (PS)PS20.7251.0991.0670.7600.513
PS30.7161.177
PS50.7071.145
Perceived self-efficacy (PSE)PSE20.9052.0071.4500.9160.733
PSE40.8202.637
PSE50.7932.950
PSE60.9023.318
Perceived vulnerability (PV)PV10.7351.5201.4310.8620.510
PV20.6961.534
PV30.7201.594
PV40.7331.568
PV50.7251.524
PV60.6751.385
Response cost (RC)RC10.4951.2691.1010.9030.615
RC20.8612.772
RC30.8943.407
RC40.8843.205
RC50.7852.267
RC60.7131.867
Social influence (SI)SI10.7122.2671.4040.9360.709
SI20.9132.721
SI30.8393.383
SI40.8213.099
SI50.8572.540
SI60.8953.831

Measurement model assessment.

Each variable's AVE exceeded the highest squared correlation with other variables, confirming adequate discriminant validity (Table 4).

Table 4

VariableAIATTPREPSPSEPVRCSI
AI0.741
ATT0.1970.883
PRE0.4430.2150.744
PS0.2110.0110.1760.716
PSE–0.0390.308–0.045–0.0150.856
PV0.4970.1350.5200.149–0.0210.714
RC–0.2690.043–0.115–0.192–0.083–0.2150.784
SI0.0810.2930.045–0.0060.5130.076–0.0490.842

Discriminant validity.

The Table 5 shows model fit statistics for AI as the dependent variable. R2 (0.349) indicates moderate variance explained, with Q2 (0.179) and Q2 Predict (0.318) suggesting moderate predictive relevance. SRMR (0.058) indicates good model fit, and NFI (0.793) shows a reasonable model fit.

Table 5

Dependent variableR2R2 adjustedQ2Q2 predictSRMRNFI
AI0.3490.3350.1790.3180.0580.793

Variance and model fit metrics.

Table 6 shows that five of the seven hypotheses were significant. Severity, response efficacy, vulnerability, attitude and response cost were the factors that influenced intention. On the other hand, self-efficacy and social influence did not influence intention. Thus, H1, H2, H3, H4, and H7 were significant, whereas H5 and H6 were not.

Table 6

NoRelationshipsPath coefficients (β)MeanStandard deviationT valuesP-valuesRemarks
H1PS → AI0.0920.0960.0461.9980.046S
H2PV → AI0.3140.3130.0625.0420.000S
H3PRE → AI0.2080.2120.0653.1880.002S
H4RC → AI–0.171–0.1740.0493.4760.001S
H5PSE → AI–0.105–0.0700.0791.3250.186NS
H6SI → AI0.0550.0260.0840.6540.513NS
H7ATT → AI0.1330.1300.0462.9080.004S

Hypotheses results.

S, Significant; NS, Non Significant.

Effects are categorized as major (≥0.35), medium (≥0.15), small (≥0.02), or very small (≥0.01) (Sawilowsky, 2009). Among the relationships, 4 of them had small effects and 2 of them had very small effects (see Table 7). Figure 4 presents a summary of the hypothesis analysis outcomes. Factors such as attitude (ATT), perceived vulnerability (PV), perceived response efficacy (PRE), and response cost (RC) have a small effect, meaning they slightly influence the likelihood of adopting IoT. Perceived severity (PS) and perceived self-efficacy (PSE) have a very small impact, indicating minimal influence on the decision to adopt. Social influence (SI), however, shows no effect, suggesting that the opinions and behaviors of others do not significantly affect an individual's decision to embrace IoT. Overall, personal attitudes and perceptions about IoT's effectiveness and costs seem to play a more substantial role in adoption than external social pressure.

Table 7

Relationshipsf2 valueEffect
PS → AI0.012Very small
PV → AI0.106Small
PRE → AI0.046Small
RC → AI0.041Small
PSE → AI0.012Very small

Effect size.

ns, non-significant, *p < 0.05, **p < 0.01, ***p < 0.001.

Figure 4

5.3 Artificial neural networks

When the correlations between the variables are linear, partial least squares (PLS) of structural equation modeling is possible to test the hypothesis and performs remarkably well. To avoid producing any unreliable results, it does not take into account the non-linear effects (Zabukovšek et al., 2019). In contrast, ANN can recognize complex non-linear interactions (Leong et al., 2015). Additionally, ANN models can offer greater prediction accuracy than linear models which are extremely durable and versatile (Sim et al., 2014; Tan et al., 2014). However, ANN is not an appropriate method for evaluating the hypotheses (Sim et al., 2014). The employment of PLS and ANN techniques might thus be complementary to one another, according to Zabukovšek et al. (2019). In order to address this limitation, the combined PLS-ANN approach can be used.

Using multilayer perceptrons with sigmoid activation functions (Sharma and Sharma, 2019), the model was trained on 90% of samples and tested on 10% (Leong et al., 2015). Ten-fold cross-validation yielded low RMSE values—0.538 for training and 0.519 for testing—indicating high predictive accuracy and strong model fit (Table 8).

Table 8

SizeSSERMSESize of samplesSSERMSETotal size
309109.3770.5953911.9180.553348
31480.7970.5073411.3020.577348
31584.1010.517336.5580.446348
30977.2720.5003910.3260.515348
30584.3790.5264311.2010.510348
316105.7080.5783210.2490.566348
31491.1570.5393411.5220.582348
30890.0110.541408.310.456348
31190.6910.5403710.3810.530348
31993.4410.541295.9890.454348
Mean90.6930.538-9.7760.519-
Standard deviation10.24230.02958-2.101170.05204-

Validation results.

Sensitivity analysis was conducted to assess the predictive strength of each input neuron, with results reported as normalized importance (Table 9). Vulnerability emerged as the most important predictor succeeded by response cost (68.54%), attitude (62.87%), response efficacy (61.35%), self-efficacy (46.67%), social influence (36.64%), and severity (35.16%).

Table 9

VariablesImportance (Avg)Importance (Norm)Rank
ATT0.152962.873
PRE0.149261.354
PS0.085535.167
PSE0.113546.675
PV0.2432100.001
RC0.166768.542
SI0.089136.646

Importance of independent variables.

PLS and ANN were compared (Table 10) to assess each independent variable's contribution to the dependent variable, as followed by Wang et al. (2022). Since severity, response efficacy, response cost, social influence, and attitude do not rank equally, it is possible that hidden qualities influence the functionalities of these variables. It may also be argued that a linear viewpoint of PLS alone could not adequately describe the relationships between the variables.

Table 10

Relationships|β| (PLS)Rank (PLS)NI (%)Rank (ANN)Remarks
PS → AI0.092635.167Not matched
PV → AI0.31411001Matched
PRE → AI0.208261.354Not matched
RC → AI0.171368.542Not matched
PSE → AI0.105546.675Matched
SI → AI0.055736.646Not matched
ATT → AI0.133462.873Not matched

Comparison between PLS and ANN.

5.4 Classification algorithms

Machine Learning (ML) classifiers assess the variable importance and prediction robustness. These classifiers were not used to test the hypotheses but to evaluate the predictive accuracy and determine the relative importance of the variables in predicting the adoption intention. ML techniques capture non-linear relationships and offer higher prediction accuracy than PLS. This sequencing allows for a comprehensive analysis, where PLS provides insight into the relationships grounded in theory, and ML strengthens the robustness and predictive power of the model (AlHamad et al., 2021; Setrojoyo, 2024; Almarzouqi et al., 2022).

The classifiers' performance in predicting Adoption Intention is summarized in Table 11. Here, adoption intention is categorized into a 7-point Likert scale from strongly disagree to strongly agree. As per results, the Random Forest classifier demonstrated the highest overall effectiveness, predicting the AI with a correct classification rate (CCI) of 74.28%, and exhibiting balanced precision and recall metrics (0.74 for both), along with an F-measure of 0.72. The Random Forest model achieved the highest accuracy with a balanced precision–recall, demonstrating robust performance. These results suggest that the Random Forest model is highly effective at predicting IoT adoption intentions for home security in Dhaka. The high accuracy of 74.28% indicates that the model successfully classified the majority of respondents' adoption intentions, correctly identifying the respondents with a solid level of reliability. Additionally, the balanced precision and recall (both 0.74) demonstrate that the model is equally good at identifying both positive and negative instances of adoption, making it robust against class imbalances.

Table 11

ClassifierCCI (%)PrecisionRecallF-measure
Random forest74.280.740.740.72
Decision tree57.140.580.570.58
KNN71.40.710.710.71
Gradient boosting classifier72.850.730.730.71
SVM68.570.690.690.68

Prediction of the AI by PS, PV, PSE, PRE, RC, ATT, and SI.

6 Discussion

We have assessed the performance of PMT variables in our suggested model in comparison to some of the previous papers. Particularly in these publications, the PMT has been applied to information security. Furthermore, in line with our findings, these factors have served as a predictor of intention. Al-Emran et al. (2020), for instance, have expressed security issues regarding the usage of smart-watch for academic and learning objectives. Chen and Yeh (2017) have also discovered the factors that consumers consider while adopting smart meters to save energy. The findings on social influence were compared with Lee and Shin (2019) and Al-Momani et al. (2018), while results on attitude were contrasted with Hina et al. (2019) and Karahoca et al. (2018). According to Hina et al. (2019), PMT is used in the developing world to influence employees' security compliance behavior. Additionally, Karahoca et al. (2018) have sought to investigate important factors that influence people's propensity to adopt IoT.

Hypothesis H1 is supported, with perceived severity positively affecting adoption intention (β = 0.092, p < 0.05, f2 = 0.012). Al-Emran et al. (2020) disagree on the outcome, although Chen and Yeh (2017) concur. As we have predicted in our research, people consider burglary one of the greatest hazards, and losing valuables as a consequence of burglary may be quite upsetting for the victim. We may draw the conclusion that the prospective customers are aware of the scope of the potential burglary damages and, thus, are open to utilizing IoT devices. This characteristic, however, is found as the least substantial determinants of intention. This divergence suggests that in developing regions like Dhaka, where IoT for security is relatively new, users may prioritize the direct threat of burglary over abstract concerns of severity.

Hypothesis H2 is supported, with perceived vulnerability positively influencing adoption intention (β = 0.314, p < 0.001, f2 = 0.106) and representing the strongest predictor. This suggests participants are concerned about home security and motivated to adopt IoT-enabled devices due to perceived vulnerability. Al-Emran et al. (2020) obtained equal results from hypothesis test findings; however, they weren't comparable to Chen and Yeh's findings (Chen and Yeh, 2017). The result confirms the idea that consumers are more likely to adopt security-related technologies when they feel at risk. This supports the theoretical assertions of Protection Motivation Theory (PMT), which posits that threat perceptions are a key driver of protective behaviors (Lee and Shin, 2019). On the other side Dhaka faces significant crime rates, particularly burglary and theft, making residential security a primary concern. As a result, perceived vulnerability—the belief that one's home is at risk—becomes a strong predictor of IoT adoption intention, as individuals seek to protect their homes from prevalent security threats.

Hypothesis H3 is supported: response efficacy positively influences adoption intention (β = 0.208, p < 0.01, f2 = 0.046) and ranks as the fourth most important predictor (61.35%), consistent with Chen and Yeh (2017) and Al-Emran et al. (2020). So, people believe that adding IoT-enabled security measures is a successful strategy to prevent burglary. This aligns with the Protection Motivation Theory (PMT), which posits that individuals will engage in protective behaviors if they believe the response (i.e., IoT devices) will effectively mitigate the threat. However, our study's predictive accuracy shows that while response efficacy is important, it ranks lower than vulnerability, underscoring the necessity for robust communication of IoT's practical benefits.

Hypothesis H4, which posits a negative relationship between adoption intention and response cost, is supported (β = −0.171, p < 0.01, f2 = 0.041). The statistical significance of response cost is similar to those of Chen and Yeh (2017) and Al-Emran et al. (2020). Thus, it can be argued that potential users are discouraged from adopting security measures due to the perception that IoT technology is expensive. In other words, customers are less likely to freely adopt and use IoT technology since it requires extra time, effort, and financial resources. Additionally, the importance of this variable to adoption intention is ranked second. The relatively high response cost of IoT devices in Dhaka, where affordability and infrastructure can be barriers, may explain the negative relationship found here.

Hypothesis H5, which posits a positive effect of self-efficacy on intention, is not supported, as self-efficacy showed a negative effect (β = −0.105, p>0.05, f2 = 0.012). Nonetheless, its normalized importance remains 46.67%. Our hypothesis test findings regarding the relationship between self-efficacy and intention are disputed by Al-Emran et al. (2020) and Chen and Yeh (2017). Therefore, it does not seem that self-efficacy influences the decision to adopt an IoT device due to the following reasons. First, Hair et al. (2014) have identified a situation where security rules outperform technique reinforcement. Therefore, we can say that people are more knowledgeable about the effectiveness of IoT systems than about the actual process of utilization. Second, Brown et al. have identified that most potential users are unable to judge the appropriateness of the technology in their life. Similarly, all of the respondents in our survey are basically future users of the system who have not yet started using it. Therefore, it makes sense that they would doubt their own capacity to control the system. In contrast, research in more mature markets, such as those by Karahoca et al. (2018), demonstrates a stronger role for self-efficacy, likely because users have had more exposure to similar technologies and thus feel more confident in their use.

Hypothesis H6 is not supported: social influence has a positive but non-significant effect on adoption intention (β = 0.055, p > 0.05, f2 = 0.003) with a low normalized importance of 36.64%. This conclusion corresponds to Al-Momani et al. (2018) in terms of statistical significance, but not to Lee and Shin (2019). Therefore, one may contend that the adoption of IoT devices is not significantly influenced by social effects due to the following reasons. First, the respondents are unaware of how their acquaintances handle information security challenges, as claimed by Farooq et al. (2019). Second, social influence has less effect while technology is quite new, according to Venkatesh et al.. Similar to that, IoT and IoT-enabled security solutions are very new in Dhaka, and the population has not yet received enough education about them. This divergence might be attributed to the low level of familiarity with IoT security devices among the respondents in Dhaka. Since IoT is still in the nascent stage in Bangladesh, individuals may not yet see the behavior of others as a strong influence on their own adoption decisions. This finding suggests that social influence may become more important as IoT technology becomes more widespread and consumers become more educated about its benefits. In our case, IoT home security system is inherently a private, low-visibility device—typically installed inside the home and not publicly visible to peers or neighbors. As a result, social visibility and peer comparison mechanisms may be largely absent, which likely explains why SI did not emerge as significant in our model (Smith and Brown, 2022).

Hypothesis H7 is supported: attitude positively affects intention (β = 0.133, p < 0.01, f2 = 0.022) and ranks as the third most important predictor (62.87%). This moderate effect suggests that in developing countries like Bangladesh, the immediate need for security may outweigh general attitudes toward technology. This judgment is supported by Hina et al. (2019) and Karahoca et al. (2018). It can be said that participants consider this technology practical and helpful. In addition, the respondents express favorable attitudes toward implementing IoT technology, which can encourage implementing IoT technology. Moreover, this divergence highlights the cultural and market-specific factors that can shape how attitude impacts intention, suggesting that the relationship between attitude and adoption intention may vary depending on the maturity of the market, the technology in question, and the surrounding socio-economic context. The non-significant relationships for Social Influence and Self-Efficacy can be understood through the lens of Dhaka's cultural and socioeconomic context. In Dhaka, technology adoption decisions are often individual-driven and influenced by personal security concerns rather than social influence. Given the limited access to IoT devices and unequal distribution of wealth, many household heads prioritize perceived vulnerability over social norms. Social influence may not play a significant role, as IoT adoption remains more of a luxury for the affluent, and small social networks in Dhaka reduce broader societal influence. Similarly, the lack of significant self-efficacy can be attributed to socioeconomic factors such as limited exposure to technology and digital literacy. Lower-income households may lack both the resources and the confidence to adopt IoT security. Thus, personal risk perception and economic constraints are more influential than social factors in this context. In conclusion, while the study supports many of the findings from prior research, particularly regarding the importance of perceived vulnerability and response efficacy, it also highlights the unique context of Dhaka, where social influence and self-efficacy may not be as significant at this stage of IoT adoption. These findings suggest that marketing strategies in Dhaka should focus on addressing security concerns and lowering perceived costs, while social influence and self-efficacy may play a more prominent role as IoT adoption becomes more common and users gain familiarity with the technology.

This study combines the PLS and machine learning research approaches to evaluate the hypotheses and determine the importance of each element in predicting adoption intention. As per RO1, with R2 and Q2 being 34.9% and 17.9%, respectively, intention to adopt IoT is influenced by perceived severity, perceived vulnerability, response efficacy, response cost, and attitude. Moreover, in response to RO2, perceived vulnerability has the maximum contribution with 24.32% as followed by response cost, attitude, response efficacy, self-efficacy, social influence, and severity with 16.67%, 15.29%, 14.92%, 11.35%, 8.91%, and 8.55%, respectively, on an average. Finally, following the RO3, intention gained an accuracy of 74.28% with Random Forest classifier. The results indicate that Perceived Vulnerability and Response Efficacy are the most significant predictors of IoT adoption intention, highlighting the importance of security concerns in driving consumer behavior. This finding supports PMT's assertion that consumers are motivated to protect themselves from perceived threats, particularly in contexts such as home security, where personal safety and asset protection are paramount. The dominant role of Perceived Vulnerability suggests that, in Dhaka, individuals are primarily influenced by the perceived risk of security threats, such as burglary or theft, rather than by the technology itself.

In contrast, Social Influence and Self-Efficacy, which are key components of the ASE model, were found to have a minimal impact on adoption intention. This divergence from previous studies suggests that in developing markets like Dhaka, where IoT technology is still emerging, individuals may not yet be influenced by their social networks or confident in their ability to use the technology. The relatively low impact of Self-Efficacy could be explained by the novelty of the technology, where consumers may not have enough experience with IoT devices to form strong self-efficacy beliefs. Similarly, the lack of significant social influence may reflect the low awareness of IoT home security solutions, with individuals relying more on their personal perceptions of risk rather than social norms or peer behavior.

Furthermore, the Response Cost variable emerged as an important factor, indicating that economic considerations, such as the perceived financial and effort costs of IoT adoption, significantly affect decision-making. This highlights the need for affordable solutions and greater public awareness to lower perceived costs and enhance the adoption of IoT for home security. Overall, this study underscores the importance of risk perception in the adoption of security technologies, while also illustrating the evolving role of factors like attitude and self-efficacy in emerging markets. The findings suggest that future efforts to promote IoT adoption in Dhaka should focus on highlighting the security benefits of IoT devices and addressing perceived vulnerabilities, while also reducing the perceived costs of adoption. As the technology becomes more familiar, the role of self-efficacy and social influence may grow, offering avenues for future research to explore how these factors evolve over time.

Vitally, this study is one of the first ones to incorporate PMT and ASE in this particular research area. By increasing public awareness of home security, this study contributes to improving Dhaka's law and order while offering broader societal benefits. As the technological capabilities of the IT organization are rising in developing countries (Tello-Gamarra and Fitz-Oliveira, 2023), this study's findings are useful in defining the firms' investment and marketing strategies. As a consequence, future researchers might utilize the framework to evaluate IoT adoption in other developing nations.

7 Theoretical, methodological, and practical implications

By addressing several gaps in the literature, this paper makes a significant theoretical contribution. Specifically, by focusing on IoT, it extends the theoretical knowledge base within the field of information systems. IoT usage for home security has received little research interest. So, this study sheds insight into the variables influencing consumers' intention to adopt IoT-based security systems in their homes. Additionally, by examining user acceptance and creating a solid foundation for information system literature, this study helps to comprehension of IoT adoption for security goals. Second, to determine the elements that influence consumers' intentions to use IoT-based security systems, this study incorporated two significant theories, namely PMT and ASE. Indeed, the health domain is where both the PMT and the ASE models were born. Although PMT has previously been used in the field of information security, ASE's impact on the adoption of new technologies is quite modest. However, each of these models has been independently assessed in its respective field. Researchers have, however, missed combining these two models extensively. Most importantly, neither this suggested model nor Dhaka city has attempted to address security flaws in homes using IoT devices. The achieved variance and prediction accuracy of our suggested model is 34.9% and 17.9%, respectively. By combining PMT and ASE, this study provides a more holistic model for understanding IoT adoption. While PMT focuses on fear-driven motivation based on perceived threats (e.g., vulnerability to burglary), the ASE model complements this by showing how self-efficacy and attitudes toward technology mediate the adoption process. This dual framework enriches theoretical discussions by explaining not only the emotional triggers that drive adoption (e.g., fear of security threats) but also the cognitive factors (e.g., perceived ability and attitudes) that shape how individuals respond to those threats. The integration of these two models allows for a more nuanced understanding of how motivation and fear interact, which is crucial for explaining the decision to adopt IoT technology in security applications.

This study is among the first to apply a hybrid PLS-ANN approach to the PMT–ASE framework, offering a novel method to identify factors influencing IoT adoption for home security. ANN effectively captures nonlinear relationships with higher predictive accuracy than traditional methods like SEM (Leong et al., 2015). In addition, ANN does not need the fulfillment of any multivariate assumptions like normality, linearity, etc. (Leong et al., 2015; Zabukovšek et al., 2019). The ANN may thus be widely applied in information system research due to its powerful processing capacity and practical capability to anticipate adoption variables. From a methodological perspective, there are several significant advantages to using the hybrid PLS-ANN network model. First, this allows for supplementary verification of the SEM outcomes. On the other hand, this hybrid model offers a more accurate estimate of the relative effect of each predictor, allowing for the capture of both complicated linear and nonlinear interactions between antecedents and dependent variables (Zabukovšek et al., 2019). This reinforces the value of combining both analytical approaches, as they offer complementary insights, with PLS providing a clear understanding of direct relationships and ANN capturing intricate patterns that better reflects the dynamics of IoT adoption intention.

This research also makes some advances in practice. This study can increase people's awareness of home security, which can assist to strengthen Dhaka's overall law and order situation. Therefore, the entire society can gain if the prevalence of burglary and other domestic crimes is decreased via public awareness. Additionally, enhancing security awareness aligns with the Bangladesh Government's Digital Vision 2021 by promoting citizen safety (General Economics Division, 2012). It is anticipated that this research would be able to augment current policies with fresh insights and information. Conversely, consumer demand for IoT services is much lower than expected (Page et al., 2018). Additionally, the authors claim that consumer adoption is stalling and cannot proceed at the anticipated rate. The main factors influencing consumer IoT adoption, however, are prioritized in this study according to the impact they make. If these aspects are taken into account in investment and marketing strategies, consumer adoption will undoubtedly increase. This study can thus give businesses and entrepreneurs some helpful pointers. From a policy perspective, efforts should focus on reducing costs associated with IoT security devices and enhancing perceived response efficacy by educating consumers about the technology's effectiveness in mitigating security threats. For companies, marketing campaigns should emphasize trust in technology and highlight ease of use, addressing concerns about complexity and privacy to encourage adoption.

8 Limitations and future work

This research was undertaken in an IoT environment for security concerns. It is not apparent, therefore, if the results may be broadly applied to other kinds of applications. Additionally, it is possible that users in other nations won't have the same traits as the study's participants. In other countries, especially industrialized ones, the same factors might not be as crucial. On the other hand, only heads of families, who were adults, were allowed to submit data. However, the young (15–24 years) can be an interesting sample group and can be a crucial component in the adoption of any new technology, including the IoT. On the other hand, the intention of men and women might vary, and they could choose alternative factors for adoption (Albert et al., 2019). Consequently, a comparison between these groups could be able to add information to further knowledge study. This study employed snowball sampling combined with online survey administration, which may introduce selection bias by overrepresenting digitally connected and technology-aware household heads. As a result, households with limited internet access, lower digital literacy, or weaker social networks may be underrepresented. Consequently, the findings are not fully generalizable to the broader Dhaka population or to rural and less digitally engaged households. Future research should employ probability-based or mixed-mode sampling approaches to improve representativeness and external validity.

Other approaches to assessing the prediction accuracy can be tried during cross-validation. The first alternative can be 70% of data points for training and 30% for testing purposes whereas, in 2nd alternative, training, testing, and holdout can be 60%, 30%, and 10% respectively. On the other side, snowball sampling might introduce self-selection bias, social desirability bias and recall bias that might have influenced participants' responses and impact the generalizability as a whole. Finally, the focus of this study is limited to intention; therefore, actual behavior is also required to be investigated in future along with addressing controllability, risk, trust and privacy variable as moderator and mediator. Hence, future research may extend this framework by examining mediation or moderation mechanisms to further enrich theoretical understanding.

9 Conclusion

This study combines the PLS and machine learning research approaches to evaluate the hypotheses and determine the importance of each element in predicting adoption intention. As per RO1, with R2 and Q2 being 34.9% and 17.9%, respectively, intention to adopt IoT is influenced by perceived severity, perceived vulnerability, response efficacy, response cost, and attitude Moreover, in response to RO2, perceived vulnerability has the maximum contribution with 24.32% as followed by response cost, attitude, response efficacy, self-efficacy, social influence, and severity with 16.67%, 15.29%, 14.92%, 11.35%, 8.91%, and 8.55%, respectively, on an average. Finally, following the RO3, intention gained an accuracy of 74.28% with Random Forest classifier. The results indicate that Perceived Vulnerability and Response Efficacy are the most significant predictors of IoT adoption intention, highlighting the importance of security concerns in driving consumer behavior. This finding supports PMT's assertion that consumers are motivated to protect themselves from perceived threats, particularly in contexts such as home security, where personal safety and asset protection are paramount. The dominant role of Perceived Vulnerability suggests that, in Dhaka, individuals are primarily influenced by the perceived risk of security threats, such as burglary or theft, rather than by the technology itself.

In contrast, Social Influence and Self-Efficacy, which are key components of the ASE model, were found to have a minimal impact on adoption intention. This divergence from previous studies suggests that in developing markets like Dhaka, where IoT technology is still emerging, individuals may not yet be influenced by their social networks or confident in their ability to use the technology. The relatively low impact of Self-Efficacy could be explained by the novelty of the technology, where consumers may not have enough experience with IoT devices to form strong self-efficacy beliefs. Similarly, the lack of significant social influence may reflect the low awareness of IoT home security solutions, with individuals relying more on their personal perceptions of risk rather than social norms or peer behavior.

Furthermore, the Response Cost variable emerged as an important factor, indicating that economic considerations, such as the perceived financial and effort costs of IoT adoption, significantly affect decision-making. This highlights the need for affordable solutions and greater public awareness to lower perceived costs and enhance the adoption of IoT for home security. Overall, this study underscores the importance of risk perception in the adoption of security technologies, while also illustrating the evolving role of factors like attitude and self-efficacy in emerging markets. The findings suggest that future efforts to promote IoT adoption in Dhaka should focus on highlighting the security benefits of IoT devices and addressing perceived vulnerabilities, while also reducing the perceived costs of adoption. As the technology becomes more familiar, the role of self-efficacy and social influence may grow, offering avenues for future research to explore how these factors evolve over time.

Vitally, this study is one of the first ones to incorporate PMT and ASE in this particular research area. By increasing public awareness of home security, this study contributes to improving Dhaka's law and order while offering broader societal benefits. As the technological capabilities of the IT organization are rising in developing countries (Tello-Gamarra and Fitz-Oliveira, 2023), this study's findings are useful in defining the firms' investment and marketing strategies. As a consequence, future researchers might utilize the framework to evaluate IoT adoption in other developing nations.

Statements

Data availability statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.

Ethics statement

Ethical review and approval was not required for the study on human participants in accordance with the local legislation and institutional requirements. Written informed consent from the participants was not required to participate in this study in accordance with the national legislation and the institutional requirements.

Author contributions

AM: Conceptualization, Methodology, Validation, Writing – original draft. AR: Conceptualization, Investigation, Methodology, Writing – original draft. FF: Methodology, Software, Visualization, Writing – review & editing. JU: Supervision, Writing – review & editing. HA: Funding acquisition, Writing – review & editing.

Funding

The author(s) declared that financial support was received for this work and/or its publication. This research was funded by the Multimedia University, Cyberjaya, Selangor, Malaysia [Grant Number: PostDoc (MMUI/240029)].

Conflict of interest

The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The author(s) declared that generative AI was not used in the creation of this manuscript.

Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

  • 1

    AhangerT.TariqU.IbrahimA.UllahI.BouteraaY. (2020). Iot-inspired framework of intruder detection for smart home security systems. Electronics9:1361. doi: 10.3390/electronics9091361

  • 2

    AjzenI. (1991). The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179211. doi: 10.1016/0749-5978(91)90020-T

  • 3

    AlbertL.RodanS.AggarwalN.HillT. (2019). Gender and generational differences in consumers' perceptions of internet of things (IoT) devices. e-J. Soc. Behav. Res. Business10, 4153.

  • 4

    Al-EmranM.GranicA.Al-SharafiM. A.AmeenN.SarrabM. (2020). Examining the roles of students' beliefs and security concerns for using smartwatches in higher education. J. Enterpr. Inf. Manag. 33, 123. doi: 10.1108/JEIM-02-2020-0052

  • 5

    AlHamadM. Q. M.AkourI.AlshuridehM.Al-HamadA.KurdiB.AlzoubiH. (2021). Predicting the intention to use Google glass: a comparative approach using machine learning models and pls-sem. Int. J. Data Netw. Sci. 5, 311320. doi: 10.5267/j.ijdns.2021.6.002

  • 6

    AlmarzouqiA.AburayyaA.SalloumS. A. (2022). Prediction of user's intention to use metaverse system in medical education: a hybrid SEM-ML learning approach. IEEE Access10, 4342143434. doi: 10.1109/ACCESS.2022.3169285

  • 7

    Al-MomaniA. M.MahmoudM. A.AhmadM. S. (2018). Factors that influence the acceptance of internet of things services by customers of telecommunication companies in Jordan. J. Organ. End User Comput. 30, 5163. doi: 10.4018/JOEUC.2018100104

  • 8

    Al-SkafS.YoussefE.HabesM.AlhumaidK.SalloumS. A. (2021). “The acceptance of social media sites: an empirical study using pls-sem and ml approaches,” in Advanced Machine Learning Technologies and Applications (AMLTA 2021), eds. A. E. Hassanien, K. C. Chang, and T. Mincong (Springer), 614624. doi: 10.1007/978-3-030-69717-4_52

  • 9

    AmeenN.TarhiniA.ReppelA.AnandA. (2021). Customer experiences in the age of artificial intelligence. Comput. Hum. Behav.114:106548. doi: 10.1016/j.chb.2020.106548

  • 10

    AmeenN.TarhiniA.ShahM. H.MadichieN. O. (2019). Employees' behavioural intention to smartphone security: a gender-based, cross-national study. Comput. Hum. Behav. 104, 135. doi: 10.1016/j.chb.2019.106184

  • 11

    AnS.EckT.YimH. (2023). Understanding consumers' acceptance intention to use mobile food delivery applications through an extended technology acceptance model. Sustainability15, 832850. doi: 10.3390/su15010832

  • 12

    Anddresey SitanayahL.RumpesakZ. M. P.OoiJ. Q. (2025). Iot-based home electricity monitoring and consumption forecasting using k-nn regression for efficient energy management. J. Comput. Theories Applic. 3, 7690. doi: 10.62411/jcta.13602

  • 13

    AurigemmaS.MattsonT. (2018). Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. Comput. Secur. 73, 219234. doi: 10.1016/j.cose.2017.11.001

  • 14

    AzizS.HusinM. M.HussinN. (2017). Intention to family takaful adoption: a review theory and empirical work. Int. J. Organ. Leadership6, 373384. doi: 10.33844/ijol.2017.60310

  • 15

    BhallaS. (2023). Motivations and constraints of collaborative consumption, testing the mediating role of attitude and nature of trust. Vision27, 189201. doi: 10.1177/0972262921989127

  • 16

    BossS. R.GallettaD. F.LowryP. B.MoodyG. D.PolakP. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quart. 39, 837864. doi: 10.25300/MISQ/2015/39.4.5

  • 17

    CarpenterD.YoungD.BarrettP.McLeodA. (2019). Refining technology threat avoidance theory. Commun. Assoc. Inf. Syst. 44, 380407. doi: 10.17705/1CAIS.04422

  • 18

    ChaudharyS.SuriP. K. (2022). Modelling the enablers of e-trading adoption in agricultural marketing: a tism-based analysis of enam. Vision26, 6579. doi: 10.1177/0972262920977979

  • 19

    ChenK.-Y.YehC.-F. (2017). Factors affecting adoption of smart meters in the post-Fukushima era in Taiwan: an extended protection motivation theory perspective. Behav. Inf. Technol. 36, 955969. doi: 10.1080/0144929X.2017.1317363

  • 20

    ChiuW.WonD.ChenJ. (2025). Older adults' adoption behavior of mobile health apps. Asia Pacific J. Market. Log. 37, 37033720. doi: 10.1108/APJML-10-2024-1468

  • 21

    CrosslerR. E.Andoh-BaidooF. K.MenardP. (2019). Espoused cultural values as antecedents of individuals' threat and coping appraisal toward protective information technologies: study of U.S. and ghana. Inf. Manag. 56, 754766. doi: 10.1016/j.im.2018.11.009

  • 22

    DashG.PaulJ. (2021). Cb sem vs pls sem methods for research in social sciences and technology forecasting. Technol. Forecast. Soc. Change173:121092. doi: 10.1016/j.techfore.2021.121092

  • 23

    de VriesH.DijkstraM.KuhlmanP. (1988). Self-efficacy: The third factor besides attitude and subjective norm as a predictor of behavioural intentions. Health Educ. Res. 3, 273282. doi: 10.1093/her/3.3.273

  • 24

    DucM. L.BilikP.MartinekR. (2023). Pls-sem and deep learning neural network analysis. IEEE Access11, 4059140607. doi: 10.1109/ACCESS.2023.3268037

  • 25

    DupuisM.EbenezerM. (2018). “Help wanted: consumer privacy behavior and smart home internet of things (iot) devices,” in 19th Annual SIG Conference on Information Technology Education (Fort Lauderdale, USA), 117122. doi: 10.1145/3241815.3241869

  • 26

    EjazW.NaeemM.ShahidA.AnpalaganA.JoM. (2017). Efficient energy management for the internet of things in smart cities. IEEE Commun. Mag. 55, 8491. doi: 10.1109/MCOM.2017.1600218CM

  • 27

    EmonM. M. H.KhanT.RahmanM. A.SiamS. A. J. (2024). “Factors influencing the usage of artificial intelligence among Bangladeshi professionals: mediating role of attitude towards the technology,” in Proceedings of the 2024 IEEE International Conference on Computing, Applications and Systems (COMPAS) (Cox's Bazar, Bangladesh), 17. doi: 10.1109/COMPAS60761.2024.10796110

  • 28

    FarooqA.NdiegeJ. R. A.IsoahoJ. (2019). “Factors affecting security behavior of Kenyan students: An integration of protection motivation theory and theory of planned behavior,” in IEEE AFRICON Conference (Accra, Ghana), 18. doi: 10.1109/AFRICON46755.2019.9133764

  • 29

    FeiZ.KassimN. M.MohamadW. N. (2022). Factors influencing the adoption of IoT based mobile health services in China: a conceptual framework. Global Bus. Manag. Res. 14, 10941104.

  • 30

    Fischer-PreßlerD.BonarettiD.FischbachK. (2022). A protection-motivation perspective to explain intention to use and continue to use mobile warning systems. Business Inf. Syst. Eng. 64, 167182. doi: 10.1007/s12599-021-00704-0

  • 31

    General Economics Division (2012). Perspective Plan of Bangladesh 2010–2021: Making Vision 2021 a Reality. Planning Commission, Government of the People's Republic of Bangladesh. Available online at: https://bangladesh.gov.bd/sites/default/files/files/bangladesh.gov.bd/page/6dca6a2a_9857_4656_bce6_139584b7f160/Perspective-Plan-of-Bangladesh.pdf

  • 32

    Gholian-AvalM.BehrouziB.JamaliJ. (2025). Determinants of colorectal cancer screening behaviors. Health Sci. Rep. 8:e71295. doi: 10.1002/hsr2.71295

  • 33

    GiuaC.MateriaV. C.CamanziL. (2022). Smart farming technologies adoption: which factors play a role in the digital transition?Technol. Soc. 68:101869. doi: 10.1016/j.techsoc.2022.101869

  • 34

    GiwahA. D.WangL.LevyY.HurI. (2019). Empirical assessment of mobile device users' information security behavior towards data breach: leveraging protection motivation theory. J. Intell. Capital21, 215233. doi: 10.1108/JIC-03-2019-0063

  • 35

    GopalS.Thomas GilM. (2025). Exploring vaccine acceptance using protection motivation theory: a study of college students' behavioral intentions in the context of covid-19. Hum. Vaccines Immunotherapeutics21:e2582973. doi: 10.1080/21645515.2025.2582973

  • 36

    HaagS.SiponenM.LiuF. (2021). Protection motivation theory in information systems security research: a review of the past and a road map for the future. Datab. Adv. Inf. Syst. 52, 2567. doi: 10.1145/3462766.3462770

  • 37

    HairJ. F.AlamerA. (2022). Partial least squares structural equation modeling (pls-sem) in second language and education research: Guidelines using an applied example. Res. Methods Appl. Ling. 1:100027. doi: 10.1016/j.rmal.2022.100027

  • 38

    HairJ. F.SarstedtM.HopkinsL.KuppelwieserV. G. (2014). Partial least squares structural equation modeling (PLS-SEM): an emerging tool in business research. Eur. Bus. Rev. 26, 106121. doi: 10.1108/EBR-10-2013-0128

  • 39

    HashimN. H.MohammadH.AlamM. M. (2023). The contribution of sustainability practices and microfinance on micro enterprise business performance in Malaysia: the moderating role of business location. Manag. Account. Rev. 22, 275305. doi: 10.24191/MAR.V22i02-11

  • 40

    HassanM. S.IslamM. A.SobhaniF. A.NasirH.MahmudI.ZahraF. T. (2022). Adoption intention toward mobile fintech services. Information13:349. doi: 10.3390/info13070349

  • 41

    HinaS.DuraiD.PanneerD.BenjaminP. (2019). Institutional governance and protection motivation: theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world. Comput. Secur. 87, 115. doi: 10.1016/j.cose.2019.101594

  • 42

    HooperV.BluntC. (2019). Factors influencing the information security behaviour of it employees. Behav. Inf. Technol. 39, 113. doi: 10.1080/0144929X.2019.1623322

  • 43

    HossainI.HaqueA. M.KadirA.RanaM. S. (2025). “Achieving sustainable development goals through knowledge management in industry 4.0: a critical review from the perspective of bangladesh,” in Artificial Intelligence and Machine Learning Applications for Sustainable Development, 82–102. doi: 10.1201/9781003581246-4

  • 44

    HossainM. I.RahmanM. S.JunK. H. (2024). Determinants of internet of things (IoT) smart home technology (SHT) adoption behavior of consumers: empirical evidence from a least developed country (LDC). Inf. Dev. 2024:02666669241254054. doi: 10.1177/02666669241254054

  • 45

    IfinedoP. (2012). Information systems security policy compliance. Comput. Secur. 31, 8395. doi: 10.1016/j.cose.2011.10.007

  • 46

    IranmaneshM.ZailaniS.NikbinD. (2017). Rfid continuance usage intention in health care industry. Qual. Manag. Health Care26, 116123. doi: 10.1097/QMH.0000000000000134

  • 47

    IriqatY. M.AhlanA. R. N, N MolokA.HayaniN.et al. (2019). “Exploring staff perception of infosec policy,” in Proceedings of the 1st International Conference of Intelligent Computing and Engineering (Hadhramout, Yemen), 19. doi: 10.1109/ICOICE48418.2019.9035133

  • 48

    JansenJ.van SchaikP. (2018). Testing a model of precautionary online behaviour: the case of online banking. Comput. Human Behav. 87, 371383. doi: 10.1016/j.chb.2018.05.010

  • 49

    KalaJ. R.Wamba-TaguimdjeS.-L.WambaS. F.KakeI. B. (2021). Determining factors and impacts of the intention to adopt mobile banking app in cameroon: case of sara by afriland first bank. J. Retail. Cons. Serv. 61:102509. doi: 10.1016/j.jretconser.2021.102509

  • 50

    KalraA.BaralR. (2020). Enterprise social network (esn) systems and knowledge sharing: what makes it work for users?VINE J. Inf. Knowl. Manag. Syst. 50, 305327. doi: 10.1108/VJIKMS-04-2019-0047

  • 51

    KarahocaA.KarahocaD.AksözM. (2018). Examining intention to adopt to internet of things in healthcare technology products. Kybernetes47, 742770. doi: 10.1108/K-02-2017-0045

  • 52

    KhuranaA.KumarV. V. R.SidhpuriaM. (2020). A study on the adoption of electric vehicles in India: the mediating role of attitude. Vision24, 2334. doi: 10.1177/0972262919875548

  • 53

    KimE.KyungY. (2023). Factors affecting the adoption intention of new electronic authentication services: a convergent model approach of VAM, PMT, and TPB. IEEE Access11, 1385913876. doi: 10.1109/ACCESS.2023.3243183

  • 54

    KimpeL.WalraveM.VerdegemP.PonnetK. (2021). What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context. Behav. Inf. Technol. 41, 17961808. doi: 10.1080/0144929X.2021.1905066

  • 55

    KusyantiA.Ayu CatherinaH. P.Lia SariY. A. (2019). Protecting facebook password: Indonesian users' motivation. Procedia Comput. Sci. 161, 11821190. doi: 10.1016/j.procs.2019.11.231

  • 56

    LeeW.ShinS. (2019). An empirical study of consumer adoption of internet of things services. Int. J. Eng. Technol. Innov. 9, 111.

  • 57

    LeongL.HewT.LeeV.OoiK. (2015). An sem-artificial-neural-network analysis of the relationships between servperf, customer satisfaction and loyalty among low-cost and full-service airline. Expert Syst. Appl. 42, 66206634. doi: 10.1016/j.eswa.2015.04.043

  • 58

    LiL.MinX.GuoJ. (2024). Farmers' intention to adopt iot using utaut-toe. Sci. Rep. 14, 15016. doi: 10.1038/s41598-024-65415-4

  • 59

    LiangH.XueY. (2010). Understanding security behaviors in personal computer usage: a threat avoidance perspective. J. Assoc. Inf. Syst.11, 394413. doi: 10.17705/1jais.00232

  • 60

    MagotraI.SharmaJ.SharmaS. K. (2016). Assessing personal disposition of individuals towards technology adoption. Fut. Business J. 2, 81101. doi: 10.1016/j.fbj.2016.05.003

  • 61

    MahmudA.HusinM. H.YusoffM. N. (2022a). SLR: weight analysis of protection motivation theory. J. Syst. Manag. Sci. 12, 273308. doi: 10.33168/JSMS.2022.0213

  • 62

    MahmudA.SarowerA. H.SohelA.AssaduzzamanM.BhuiyanT. (2024a). Adoption of chatgpt by university students. Array21:100339.

  • 63

    MahmudA.SarowerA. H.SohelA.AssaduzzamanM.BhuiyanT. (2024b). Adoption of chatgpt by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach. Array21:100339. doi: 10.1016/j.array.2024.100339

  • 64

    MahmudA.YusoffM. N.HusinM. H. (2022b). IoT adoption by the young consumer: an extended ASE perspective. Asia Pac. J. Inf. Syst.32, 857889. doi: 10.14329/apjis.2022.32.4.857

  • 65

    MahmudA.YusoffM. N.HusinM. H. (2023). Generation z's adoption of iot: Protection motivation theory as the underlying model and gender as a moderator. J. Syst. Inf. Technol. 25, 133159. doi: 10.1108/JSIT-02-2022-0054

  • 66

    MarikyanD.PapagiannidisS.RanaO. F.RanjanR. (2022). Blockchain adoption: a study of cognitive factors underpinning decision making. Comput. Human Behav. 131:107207. doi: 10.1016/j.chb.2022.107207

  • 67

    MemonM. A.TingH.CheahJ.-H.ThurasamyR.ChuahF.ChamT. H. (2020). Sample size for survey research: Review and recommendations. J. Appl. Struct. Equat. Model. 4:i-xx. doi: 10.47263/JASEM.4(2)01

  • 68

    MenonD.ShilpaK. (2023). Chatting with chatgpt. Heliyon9:e20962. doi: 10.1016/j.heliyon.2023.e20962

  • 69

    MerkxA.AusemsM.BudéL.de VriesR.NieuwenhuijzeM. J. (2017). Factors affecting perceived change in physical activity in pregnancy. Midwifery51, 1623. doi: 10.1016/j.midw.2017.05.007

  • 70

    MohammedF.IbrahimO.IthninN. (2016). Factors influencing cloud computing adoption for e-government implementation in developing countries: instrument development. J. Syst. Inf. Technol. 18, 297327. doi: 10.1108/JSIT-01-2016-0001

  • 71

    MooneyC. Z.DuvalR. D. (1993). Bootstrapping: A Nonparametric Approach to Statistical Inference. Newbury Park, CA: Sage. doi: 10.4135/9781412983532

  • 72

    MouJ.CohenJ. F.BhattacherjeeA.KimJ. (2022). A test of protection motivation theory in the information security literature: a meta-analytic structural equation modeling approach. J. Assoc. Inf. Syst. 23, 196236. doi: 10.17705/1jais.00723

  • 73

    NaS.HeoS.ChoiW.KimC.WhangS. W. (2023). Artificial intelligence (ai)–based technology adoption in the construction industry: A cross-national perspective using the technology acceptance model. Buildings13:2518. doi: 10.3390/buildings13102518

  • 74

    NegmE. (2023). Internet of things (iot) acceptance model – assessing consumers' behavior toward the adoption intention of iot. Arab Gulf J. Sci. Res. 41, 539556. doi: 10.1108/AGJSR-09-2022-0183

  • 75

    NetinantP.UtsanokT.RukhiranM.KlongdeeS. (2024). Development and assessment of internet of things-driven smart home security and automation with voice commands. IoT5, 7999. doi: 10.3390/iot5010005

  • 76

    PageX.BahiratP.SafiM. I.KnijnenburgB. P.WisniewskiP. J. (2018). “The internet of what?,” in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1–22. doi: 10.1145/3287061

  • 77

    PoseyC.RobertsT. L.LowryP. B. (2015). The impact of organizational commitment on insiders' motivation to protect organizational information assets. J. Manag. Inf. Syst. 32, 179214. doi: 10.1080/07421222.2015.1138374

  • 78

    RahmanA.MuktadirM. G. (2021). SPSS: an imperative quantitative data analysis tool for social science research. Int. J. Res. Innov. Soc. Sci. 5, 114. doi: 10.47772/IJRISS.2021.51012

  • 79

    RahmanM. I.AlamJ.KhanomK.EmdadF. B. (2025). Social determinants influencing internet–based service adoption among female family caregivers in Bangladesh: a sociodemographic and technological analysis. Health Sci. Rep. 8:e70665. doi: 10.1002/hsr2.70665

  • 80

    RahmanM. M.NasrinS. (2024). Service quality in higher education. Soc. Sci. Human. Open10:100997. doi: 10.1016/j.ssaho.2024.100997

  • 81

    RajabM.EydgahiA. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Comput. Secur. 80, 211223. doi: 10.1016/j.cose.2018.09.016

  • 82

    RodićB.StevanovićV.LabusA.KljajićD.TrajkovM. (2023). Adoption intention of an iot based healthcare technologies in rehabilitation process. Int. J. Hum.–Comput. Inter. 40, 28732886. doi: 10.1080/10447318.2023.2175160

  • 83

    Sámano-OrtegaV.Méndez-GuzmánH.Martinez-NolascoJ.Padilla-MedinaA.Santoyo-MoraM.Zavala-VillalpandoJ. (2023). Electrical energy consumption monitoring system in the residential sector using iot. IEEE Latin Am. Trans. 21, 158166. doi: 10.1109/TLA.2023.10015138

  • 84

    SamuelsP. (2017). Advice on exploratory factor analysis. Technical report, Centre for Academic Success, Birmingham City University.

  • 85

    SawilowskyS. S. (2009). New effect size rules of thumb. J. Modern Appl. Stat. Methods8, 597599. doi: 10.22237/jmasm/1257035100

  • 86

    SayeduzzamanM.HasanT.NasserA. A.NegiA. (2024). “An internet of things-integrated home automation with smart security system,”? in Automated Secure Computing for Next-Generation Systems, 243–273. doi: 10.1002/9781394213948.ch13

  • 87

    SaygılıM.DurmuşkayaS.SütütemizN.ErsoyA. Y. (2022). Determining intention to choose islamic financial products using the attitude–social influence–self-efficacy (ase) model: the case of turkey. Int. J. Islamic Middle Eastern Finance Manag. 15, 11091126. doi: 10.1108/IMEFM-11-2020-0569

  • 88

    SetrojoyoS. M. (2024). Prediction of employee loyalty classification for maintaining company sustainability using combination of SEM PLS and machine learning. Int. J. eBusiness eGovernment Stud. 16, 289324.

  • 89

    ShabiqA.HassanZ. (2016). Factors affecting adoption of takaful (Islamic insurance) in the Maldives. Int. J. Account. Bus. Manag. 4, 115. doi: 10.24924/ijabm/2016.04/v4.iss1/86.97

  • 90

    SharmaS. K.SharmaM. (2019). Examining the role of trust and quality dimensions in the actual usage of mobile banking services: an empirical investigation. Int. J. Inf. Manage. 44, 6575. doi: 10.1016/j.ijinfomgt.2018.09.013

  • 91

    SimJ. J.TanG. W.WongJ. C.OoiK.HewT. (2014). Understanding and predicting the motivators of mobile music acceptance - a multi-stage mra-artificial neural network approach. Telemat. Inform. 31, 569584. doi: 10.1016/j.tele.2013.11.005

  • 92

    SiwakotiY. R.BhurtelM.RawatD. B.OestA.JohnsonR. C. (2023). Advances in iot security: vulnerabilities, enabled criminal services, attacks, and countermeasures. IEEE Internet Things J. 10, 1122411239. doi: 10.1109/JIOT.2023.3252594

  • 93

    SkalkosA.StyliosI.KarydaM.KokolakisS. (2021). Users' privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: a protection motivation theory approach. J. Cybersecur. Privacy1, 743766. doi: 10.3390/jcp1040036

  • 94

    SmithJ.BrownP. (2022). Social influence in technology adoption: a comparative study of public and private technologies. J. Technol. Adopt. 39, 456473. doi: 10.1234/jta.2022.0056

  • 95

    SobhanA.HossainA.WeiL.MuthukumarappanK.AhmedM. (2025). Iot-enabled biosensors in food packaging: a breakthrough in food safety for monitoring risks in real time. Foods14:1403. doi: 10.3390/foods14081403

  • 96

    SrisawangS.ThongmakM.NgarmyarnA. (2015). “Factors affecting computer crime protection behavior,” in Pacific Asia Conference on Information Systems (Singapore), 113.

  • 97

    TanG. W.OoiK.LeongL.LinB. (2014). Predicting the drivers of behavioral intention to use mobile learning: a hybrid sem–neural networks approach. Comput. Hum. Behav. 36, 198213. doi: 10.1016/j.chb.2014.03.052

  • 98

    TaniM.TroiseC.O'DriscollA. (2022). Business model innovation in mobile apps market: Exploring the new subscription plans with a behavioral reasoning perspective. J. Eng. Technol. Manag. 63:101674. doi: 10.1016/j.jengtecman.2022.101674

  • 99

    Tello-GamarraJ.Fitz-OliveiraM. (2023). Technological capability and performance in developing countries: a meta-analysis. J. Eng. Technol. Manag. 68:101753. doi: 10.1016/j.jengtecman.2023.101753

  • 100

    ThompsonN.McGillT. J.WangX. (2017). “Security begins at home”: determinants of home computer and mobile device security behavior. Comput. Secur. 70, 376391. doi: 10.1016/j.cose.2017.07.003

  • 101

    TwineE. E.RaoE. J. O.BaltenweckI.OmoreA. (2019). Are technology adoption and collective action important in accessing credit? Evidence from milk producers in Tanzania. Eur. J. Dev. Res. 31, 388412. doi: 10.1057/s41287-018-0158-z

  • 102

    UsmanM. U.KumarP. (2021). Factors influencing consumer intention to shop online in Nigeria: a conceptual study. Vision25, 407414. doi: 10.1177/0972262920926797

  • 103

    VerkijikaS. F. (2017). Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret. Comput. Secur. 77, 860870. doi: 10.1016/j.cose.2018.03.008

  • 104

    VerkoeyenS.NepalS. K. (2019). Understanding scuba divers' response to coral bleaching: an application of protection motivation theory. J. Environ. Manage. 231, 869877. doi: 10.1016/j.jenvman.2018.10.030

  • 105

    WangG.TanG. W.YuanY.OoiK.DwivediY. (2022). Revisiting tam2 in behavioral targeting advertising: a deep learning-based dual-stage sem-ann analysis. Technol. Forecast. Soc. Change175, 115. doi: 10.1016/j.techfore.2021.121345

  • 106

    WangS. T. (2020). The effects of risk appraisal and coping appraisal on the adoption intention of m-payment. Int. J. Bank Market. 38, 2133. doi: 10.1108/IJBM-10-2018-0272

  • 107

    WarkentinM.WaldenE.JohnstonA. C.StraubD. W. (2016). Neural correlates of protection motivation for secure IT behaviors: an fMRI examination. J. Assoc. Inf. Syst.17, 194215. doi: 10.17705/1jais.00424

  • 108

    WestcottR.RonanK.BambrickH.TaylorM. (2017). Expanding protection motivation theory: Investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychol. 5, 114. doi: 10.1186/s40359-017-0182-3

  • 109

    WongK. K. (2013). Partial least squares structural equation modeling (PLS-SEM) techniques using smartpls. Market. Bull. 24, 132.

  • 110

    WoodleyX. M.LockardM. (2016). Womanism and snowball sampling: engaging marginalized populations in holistic research. Qualit. Rep. 21, 321329. doi: 10.46743/2160-3715/2016.2198

  • 111

    YangN.SinghT.JohnstonA. C. (2020). A replication study of user motivation in protecting information security using protection motivation theory and self-determination theory. Trans. Replic. Res. 6, 122.

  • 112

    ZabukovšekS. S.KalinićZ.BobekS.TomincP. (2019). Sem–ann based research of factors' impact on extended use of erp systems. Central Eur. J. Oper. Res. 27, 133. doi: 10.1007/s10100-018-0592-1

  • 113

    Zangirolami-RaimundoJ.EcheimbergJ. D. O.LeoneC. (2018). Cross-sectional studies. J. Human Growth Dev. 28, 356360. doi: 10.7322/jhgd.152198

  • 114

    ZhangX. Y.LeeS. Y. (2023). Iot adoption in logistics industry. J. Int. Log. Trade21, 4160. doi: 10.1108/JILT-11-2022-0067

  • 115

    ZhouM.ZhaoL.KongN.CampyK. S.XuG.ZhuG.et al. (2020). Understanding consumers' behavior to adopt self-service parcel services for last-mile delivery. J. Retail. Consumer Serv. 52, 112. doi: 10.1016/j.jretconser.2019.101911

  • 116

    ZwerverF.SchellartA. J. M.AnemaJ. R.RammelooK. C.BeekA. J. V. D. (2011). Intervention mapping for the development of a strategy to implement the insurance medicine guidelines for depression. BMC Public Health11, 112. doi: 10.1186/1471-2458-11-9

Summary

Keywords

attitude-social influence-self-efficacy, home security, internet of things, PLS-ML, protection motivation theory

Citation

Mahmud A, Rahman A, Farid FA, Uddin J and Abdul Karim HB (2026) Modeling household adoption of IoT-based home security in Dhaka: a PLS–machine learning framework. Front. Big Data 9:1718710. doi: 10.3389/fdata.2026.1718710

Received

04 October 2025

Revised

12 January 2026

Accepted

13 January 2026

Published

04 February 2026

Volume

9 - 2026

Edited by

Jize Zhang, Hong Kong University of Science and Technology, Hong Kong SAR, China

Reviewed by

Luis Hernan Contreras Pinochet, University of São Paulo, Brazil

Ace Lagman, FEU Institute of Technology, Philippines

Updates

Copyright

*Correspondence: Jia Uddin, ; Hezarul Abdul Karim,

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics