----- GENERAL INFORMATION ----- DATA TITLE: Internet-of-Things (IoT) purchasing data DATA ABSTRACT: Data measuring the intent to purchase Internet-of-Things home security devices, based on the Theory of Reasoned Action (intent, attitude, subjective norms), the Theory of Planned Behavior (perceived behavioral control), and Protection Motivation Theory (self-efficacy, fear, vulnerability, severity and response efficacy), along with related variables (threat to home safety, cost, personal innovativeness in IT, privacy concerns, perceived ease of use) and demographic variables. AUTHORS: Author: Joey F George ORCID: 0000-0002-7515-6494 Institution: Iowa State University Email: jfgeorge@iastate.edu Author: Rui Chen Institution: Iowa State University Email: ruichen@iastate.edu Author: Lingyao Yuan ORCID: 0000-0001-9863-3137 Institution: Iowa State University Email: lyuan@iastate.edu Corresponding author: Joey F George (jfgeorge@iastate.edu) ASSOCIATED PUBLICATIONS: “Intent to purchase IoT home security devices: fear vs privacy,” currently under review. COLLECTION INFORMATION: Time period(s): December 2017 Location(s): US ----- FILE DIRECTORY ----- ----- FILE LIST----- “All IoT data.csv” (40 kb) “Codebook IoT Purchasing Data.csv” “README IoT purchasing data.txt” ----- CODEBOOK ----- “Codebook IoT Purchasing Data.csv” The following papers are cited in the codebook: Agarwal, R. and Prasad, J. 1998. A conceptual and operational definition of personal innovativeness in the domain of information technology, Information Systems Research 9(2), 204-215. Davis, F.D. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly 13(3), 319-340. George, J.F. 2004. The theory of planned behavior and internet purchasing. Internet Research 14(3), 198-212. Johnston, A.C., and Warkentin, M. 2010. Fear appeals and information security behaviors: An empirical study, MIS Quarterly 34(3), 549-566. Milne, S., Sheeran, P., and Orbell, S. 2000. Prediction and intervention in health‐related behavior: a meta‐analytic review of protection motivation theory. Journal of Applied Social Psychology 30(1), 106-143. Taylor, S., and Todd, P. A. 1995. Understanding information technology usage: a test of competing models. Information Systems Research 6(2), 144-176. Xu, H., Dinev, T., Smith, J., and Hart, P. 2011. Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12(12), 798. ----- METHODS AND MATERIALS ----- The data were collected from a panel of US consumers by Cint, in December 2017. ----- DATA COLLECTION METHODS ----- Cint was paid to collect data from US consumers in December 2017. N = 229. ----- DATA PROCESSING METHODS ----- The raw data were collected in an excel spreadsheet. All data that might allow the identification of respondents, including IP addresses, latitude and longitude, have been removed. Also, all data describing date of completion and duration of completion have been removed. All respondents in the sample completed the survey, and there were no missing values. No other data cleaning or processing were involved in creating “All IoT data.csv.” ------- LICENSING ------- This work is licensed under the Creative Commons Attribution (CC-BY) 4.0 International License. For more information visit: https://creativecommons.org/licenses/by/4.0