Next Article in Journal
Improving Metabolic Syndrome in Ghanaian Adults with Type 2 Diabetes through a Home-Based Physical Activity Program: A Feasibility Randomised Controlled Trial
Next Article in Special Issue
A Review of Privacy Enhancement Methods for Federated Learning in Healthcare Systems
Previous Article in Journal
Development and Validation of Safe Motherhood-Accessible Resilience Training (SM-ART) Intervention to Improve Perinatal Mental Health
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Risks and User Perception towards Adopting Wearable Internet of Medical Things

School of Social Sciences, Western Sydney University, Penrith, NSW 2751, Australia
*
Author to whom correspondence should be addressed.
Int. J. Environ. Res. Public Health 2023, 20(8), 5519; https://doi.org/10.3390/ijerph20085519
Submission received: 22 February 2023 / Revised: 27 March 2023 / Accepted: 29 March 2023 / Published: 14 April 2023
(This article belongs to the Special Issue Use of Emerging Technologies in Public Health: Blockchain and AI)

Abstract

:
The Wearable Internet of Medical Things (WIoMT) is a collective term for all wearable medical devices connected to the internet to facilitate the collection and sharing of health data such as blood pressure, heart rate, oxygen level, and more. Standard wearable devices include smartwatches and fitness bands. This evolving phenomenon due to the IoT has become prevalent in managing health and poses severe security and privacy risks to personal information. For better implementation, performance, adoption, and secured wearable medical devices, observing users’ perception is crucial. This study examined users’ perspectives of trust in the WIoMT while also exploring the associated security risks. Data analysed from 189 participants indicated a significant variance (R2 = 0.553) on intention to use WIoMT devices, which was determined by the significant predictors (95% Confidence Interval; p < 0.05) perceived usefulness, perceived ease of use, and perceived security and privacy. These were found to have important consequences, with WIoMT users intending to use the devices based on the trust factors of usefulness, easy to use, and security and privacy features. Further outcomes of the study identified how users’ security matters while adopting the WIoMT and provided implications for the healthcare industry to ensure regulated devices that secure confidential data.

1. Introduction

The advent of mobile computing and other cutting-edge technologies has paved the way for health monitoring through ubiquitous devices connected to the internet. These devices, commonly called the Wearable Internet of Medical Things (WIoMT), are now essential for monitoring various medical and health risks. With the capability to track changes to the body, such as monitoring sleep, heart rates, calories burned, and distance travelled, they have become an indispensable tool for healthcare professionals and individuals alike [1].
The authors in [2] described the WIoMT as interconnected individual medical devices that communicate over a network to enable data collection and sharing. The most commonly used WIoMT are Wearable Fitness Trackers such as fitness bands, patches, and smartwatches with health monitoring functions. Other forms include Wearable ECG Monitors, Wearable Blood Pressure Monitors, Biosensors, Smart Patches and Ingestible Sensors. Wearable Fitness Trackers monitor steps, heart rates, sleep hours, and burnt calories [3]. Likewise, Wearable ECG Monitors gather and share ECG data using Wi-Fi [4]. Wearable Blood Pressure Monitors are non-invasive and cuffless devices measuring blood pressure [5]. Biosensors detect specific analytes in a biological sample, and Smart Patches monitor various physiological measures such as pulse [6,7]. Ingestible Sensors measure temperature, pressure, and other chemical and physical parameters [8].
The WIoMT evolved from the Internet of Things (IoT) and the Internet of Medical Things (IoMT). The Internet of Things (IoT) is an encompassing term for all devices connected to the internet, such as devices from simple sensors to smartphones [9]. They are further described as interconnected devices that communicate over the internet to enable data collection and sharing [9]. They have been widely used in various areas such as personal homes, the medical sector, automation for industry and manufacturers, smart environments, traffic management, and several more. The IoMT is a binding domain under the IoT [10]. It is a group of health devices and products that connect with healthcare systems via networks [2]. Medical devices accessing Wi-Fi allow machine-to-machine networking, which forms the basis of establishing the IoMT [11]. The IoMT comprises several crucial aspects, such as actively monitoring patients with long-term or chronic conditions, recording medical attention requests and hospitalised patients’ status, and wearable patient care devices that transmit data to hospitals [11]. Health devices that can be converted or integrated into IoMT technology include infusion pumps connected to analytics supports and hospital beds equipped with devices that monitor patients’ vital signs [11]. Similarly, [12] also define the use of the IoT in healthcare for health assistance as the IoMT. This refers to the integration of the IoT with medical devices that enable improved patient comfort, cost-effective medical solutions, faster hospital treatments, and even more personalised healthcare. These technologies facilitate the diagnosis of certain diseases, mainly without the need for a healthcare professional [13].
As the WIoMT industry advances, so do concerns about security and privacy [14,15]. These devices pose significant security and privacy risks as they continuously collect users’ personal health information in real time, which is considered more vulnerable than other types of data [16]. The decision to adopt wearable medical devices involves a risk analysis that takes into account the trade-off between significant benefits and perceived security threats since using them requires the disclosure of personal medical information [17]. Security and privacy issues are crucial in influencing users’ adoption and trust of medical devices. Thus, there is a need to investigate users’ perceptions of security and trust concerning the WIoMT. This study aims to explore the security and privacy risks associated with the WIoMT and understand the factors influencing users’ trust decisions when adopting the technology. The study is guided by two research questions: (a) What are the factors that affect the trust and adoption of the WIoMT? (b) What are the security risks associated with using the WIoMT? The findings revealed that two dimensions and five domains predicted consumers’ intention to use WIoMT devices. The two dimensions were product-related and security-related factors, while the five domains included functionality, reliability, perceived usefulness, perceived ease of use, and perceived security and privacy. The study established that these factors were significantly associated with the intention to use WIoMT devices. Notably, perceived security and privacy was the most significant predictor of the dependent variable, intention to use.
To this end, the research questions and hypotheses of the study are discussed below, focusing on each of the factors and variables that were examined. The paper is structured as follows: Section 2 discusses the architectural context of the WIoMT, focusing on the theoretical framework and hypothesis development for this study. Section 3 outlines the detailed methodology used in this research. Section 4 presents and discusses the results of this study, followed by a comprehensive discussion of the findings in Section 5. Finally, Section 6 provides concluding remarks and highlights directions for future research.

2. Architectural Context of WIoMT

In traditional medical scenarios, healthcare professionals collect and manage patients’ health data manually using standard medical equipment, such as stethoscopes, thermometers, and blood pressure monitors. Health data are often recorded on paper or in electronic health records (EHRs). In some cases, these data are not accessible via the internet or other digital networks.
In contrast, medical IoT scenarios involve using connected devices, such as medical sensors, wearables, and implantable devices, to collect and transmit real-time patient health data to healthcare providers. These data can be used to monitor patients remotely, provide more personalised care, and detect health issues early on. Medical IoT devices can also be integrated with electronic health records (EHRs) to provide a more comprehensive view of a patient’s health status, medical history, and treatment plan.
In contrast to traditional medical scenarios, medical IoT scenarios involve a higher degree of connectivity and automation in collecting and managing health data. Medical IoT scenarios leverage advanced technologies to provide real-time monitoring, more personalised care, and improved accuracy and efficiency in managing patient data. However, the use of medical IoT devices also raises concerns about security, privacy, and data protection, which must be addressed to ensure the safety and well-being of patients.
The architectural basis of the WIoMT is built on three different layers, as illustrated in Figure 1. The application layer includes clouds and servers where the device from the perception layer is connected through the network layer and stored in an abstract space and is easily retrieved when required or necessary. The network layer is the component commonly known as routers and gateways. So, they act as a bridge between the application and the perception layers. The perception layer is ‘the tangible things’ that ‘users’ use. The perception layer consists of various devices and instruments with sensors and actuators. The WIoMT follows a very similar architectural model to the IoT, where sensors, RFID, and smartphones are connected through various networks and are operated from multiple application domains. Although the structure is similar, the difference lies in the perception layer of devices, as the IoMT perception accumulates medical information with several devices [10].
Healthcare service providers are growing their medical practices to include the Wearable IoMT, which has become increasingly crucial as an efficient method to monitor patients’ health [19]. These devices have given rise to new architectures, applications, and standards related to addressing current health challenges and have further enhanced the development of the individualised and single-user-based WIoMT [20]. Some real examples of WIoMT devices are provided in Table 1 below:
WIoMT devices have become significant in providing different benefits to the medical sector, such as minimising patients’ travel time and expenses, delivering medical care in places with limited accessibility, and enhancing the delivery of critical knowledge to health personnel from distant places. For instance, [21] observed that the beneficial use of WIoMT devices ensured the monitoring and consciousness of individual health statuses among users. [11] also claimed that the modern WIoMT promises personalised and enhanced healthcare services, such as portable medical apps that are shifting hospitals’ reach from domestic to international healthcare monitoring agencies. Such wearable applications, enabled by Bluetooth and close-field connectivity, change the precautionary medicine domain and the lives of individuals with chronic disease by providing continuous health surveillance, detection, and better care. Nonetheless, despite these benefits of the WIoMT, specific challenges and risks exist that must be considered before adoption.

2.1. WIoMT Adoption Challenges and Risks

Healthcare wearables should be considered high-privacy- and high-security-risk gadgets since they continuously collect users’ personal health information in real time. Personal health information is more susceptible than other forms of data, such as demographic or primary consumer data [16]. The choice to embrace such technology requires a security and privacy assessment that weighs the trade-offs between significant benefits and perceived security/privacy hazards, because the use of such devices involves the exposure of personal medical data [17]. When a user believes that the anticipated advantages of using a wearable system outweigh the risks, the user will usually prefer to use wearable healthcare technology. In the past, society has concentrated on the negative consequences of sharing personal data, such as security flaws, forgeries, and data theft. The authors in [22] carried out a preliminary investigation to see if individuals considered the costs and advantages of possibly surrendering some privacy in exchange for using electronic health records (EHRs). They found a substantial need for research on evaluating the effect of the user’s perspective whenever technology is used to exchange personal information [22]. Healthcare wearables are typically conceived as consumer items, which may restrict their utility as health apps as they are easily accessible and available to everyone who may not have bought them for health management in the first place [23]. Additionally, they have the potential to alter healthcare delivery methods and the acquisition and transmission of sensitive personal information. Therefore, these devices tend to complicate matters related to privacy, security, sharing, autonomy, permission, ownership, access, and data valuation [24], as illustrated in Table 2.
One of the major security and privacy issues in the WIoMT is clear text login information and clear text HTTP data processing [25]. This implies that the login and passwords of these devices are recorded in log files as plaintext [25]. The data shared among different domains are sent as plain text, and no security measures such as encryption are used while transmitting the data. In a study by [26], it was found that sensor tracking is the most commonly identified threat in the perception layer of WIoMT. Additionally, tag cloning, side channel, physical harm, and jamming threats were identified as potentially significant threats in the perception layer [26]. Further complications arise with preserving the security and privacy of sensitive data since unauthorised access to the medical data of users has been reported quite often. These security and privacy issues could result in the deterioration of the effectiveness of WIoMT and adversely impact individuals’ sensitive health information [26]. The other prominent issues with WIoMT are technical safety issues which occur due to the high dependence on device operating systems [27].
WIoMT devices are also susceptible to cyber attacks since cybercriminals can target devices that usually have less security protection. For example, MyFitness Pal was hacked in 2018, exposing the data of up to 150 million users, which were subsequently sold on the dark web.
Recently, it was found that 94% of healthcare organisations have been victims of cyber attacks on medical devices and infrastructure [28]. The resource-constrained nature of the IoMT can be exploited by malicious actors, who may use it to carry out severe cyber security attacks against the network infrastructure [29]. Although the international standards community has taken a lead role in developing and modifying existing standards to address issues of malware infections, vulnerabilities and cyber attacks, the proprietary nature of previously non-interoperable medical devices limits integration between vendors’ products [30,31]. This results to errors in communication since interoperability and integration do not equate.
Similarly, the Food and Drug Administration (FDA) has issued two guideline publications on the management of cybersecurity in medical devices. Manufacturers should integrate risk management during the development of medical devices and furnish the FDA with risk data when submitting products for clearance. However, the FDA’s guidelines do not evaluate the risk assessment method used by manufacturers to assess cyber threats, nor do they give criteria for manufacturers to determine possible countermeasures [32]. Though such recommendations are non-binding, they acknowledge that the shift in the operating environment of the WIoMT needs urgent attention [32]. A debate also exists over the definition of medical devices and under what kind of circumstances any product shall be called a medical device [32].

2.2. Theoretical Framework and Hypothesis Development

Trust and security risks play a vital role in determining WIoMT adoption. A study conducted on 489 IoT users by [33] exposed that perceived usefulness and enjoyment significantly affect behavioural intention through the perceived value and trust of IoT services. Similarly, it was also found that IoT adoption is determined substantially by perceived privacy risk [33]. In another study, some major factors influencing and acting as significant predictors of adopting IoT are performance expectancy, effort expectancy, social influence, hedonic motivation, and price value [34]. According to Dong et al., many researchers have used experience theory and TAM to explore users’ general perceptions through IoT. In contrast, the finding that users embraced IoT systems through healthcare is constrained [35]. Hence, there is a need to explore users’ security and perception of the WIoMT.
Ref [36] classified trust-related findings into three categories based on their different theories:
  • Trust is defined in personality theory as a belief found in conduct, which emerges early in the personality’s psychological growth.
  • Trust is defined in sociology and economics as a process that occurs inside and between communities, organisations, and individuals who trust them.
  • In social psychology, trust is defined as the intentions and desires of the innocent party in a transaction, the concerns arising from that transaction and the various components that aid or obstruct the creation and maintenance of that trust.
This study adopts a social–psychological viewpoint for examining variables impacting users’ trust and intentions in using the WIoMT as it focuses on transactional issues and risks associated with the WIoMT. To better understand the significance of the trust factors on the adoption of the WIoMT, a conceptual model (Figure 2) has been proposed that draws from the diverse understanding of trust and is theoretically based on the Technology Acceptance Model (TAM). The TAM is a prominent theory that explains how a user adopts and uses technology. The TAM has been examined and validated by researchers, and it has been proven acceptable as a theoretical underpinning for technological adoption [37]. There are numerous theoretical foundations for technology adoption, but according to the TAM, various variables influence users’ decisions about how they will use a newly given system. The two most important criteria in behavioural intention to use technology are perceived ease of use and perceived utility [38].
WIoMT devices should have higher adoption rates to simplify usage for consumers. Additionally, the acceptance of WIoMT devices must be analysed from the users’ perspectives. Therefore, the following research questions and hypotheses are considered in this study:
A.
What factors influence the trust and adoption of the WIoMT?
B.
What are the security risks associated with adopting the WIoMT?
Numerous quantifiable and non-quantifiable variables impact the trust of the WIoMT. The conceptual model classified the variables under two main dimensions: product-related and security-related. Each dimension consists of several variables.

2.2.1. Product-Related Factors

Several product-specific factors may affect users’ decisions to trust a WIoMT product. Various models and studies have suggested various factors affecting confidence that influence the adoption decision. These are:
Functionality and reliability: This refers to whether technology has the ability or capacity to accomplish a specified task by having the required characteristics and will function correctly and reliably in a consistent manner [39].
Trust in the functionality of a technology depends on the capacity of that technology to perform properly. It is noted that users’ trust is based on the perception that the service or product will carry out its expected and requested function [40]. Because errors are not acceptable to users of any technology, there is a significant impact of the absence of errors on trust toward WIoMT adoption, similar to IoT devices [41]. Hence, the following hypothesis are considered:
H1a: 
The functionality of WIoMT devices has an effect on trust towards WIoMT adoption.
H1b: 
The reliability of WIoMT devices has an effect on trust towards WIoMT adoption.
Perceived Usefulness: This is defined as the degree to which one believes that using the technology will enhance their performance [39].
Numerous studies have demonstrated the positive relationship between IoT products or services adoption rates and the user’s perception of the products or services facilitating their everyday lives. Therefore, the perceived usefulness of the WIoMT devices must be advocated to achieve successful adoption.
H1c: 
Perceived usefulness has an impact on trusting WIoMT devices.
Ease of Use: This refers to the degree to which one believes that using the technology will be effort-free. According to the ease of use, technology plays a significant role in building up consumers’ trust towards a technology.
H1d: 
Perceived ease of use has an impact on trusting WIoMT devices.

2.2.2. Security-Related Factors

In the WIoMT context, security indicates the degree to which a person believes it will be risk-free to use a WIoMT product. When introducing new technology, security is a significant user concern and directly affects the trust of the user of a particular product or service and, thus, the acceptance of technology [42].
Perceived Security and Privacy: This factor is concerned with the ability of the trustee to achieve significant security goals such as confidentiality, which assures that only authorised users can have access to sensitive data; availability, which guarantees the resilience of systems even though attacks occur; integrity to ensure the protection of original forms of data; and authenticity, which eases any interaction between confirmed devices. Security is always a critical issue with which users are concerned regarding trust towards adoption. The levels of security and privacy are critical characteristics of IoT technology that affect the development of users’ confidence in them, as they assure users that they will be safe [40].
According to [43], users tend to trust IoT devices that use credible entities for authentication and access control. Such devices that show the ability and willingness to protect themselves are noted as trusted devices. Therefore, it can be deduced that there is a positive relationship between trust and a WIoMT product’s security level.
H2: 
Perceived security and privacy have an impact on trusting WIoMT devices.
Trust may also be considered as a significant factor affecting the behavioural intention to use any IoT technology [44]. Therefore, trust plays a significant role in users’ perception and adoption of WIoMT.
H2a: 
Perceived security and privacy have an impact on trusting WIoMT devices.
H3: 
Trust has a direct impact on behavioural intention to use WIoMT devices.
The null hypotheses of all the above-hypothesised statements (H1 to H3) are also vital in the sense that they will still indicate some Hlevel of WIoMT adoption concerns due to security risks in the event that H1 to H3 are non-significant. The methodology by which these hypotheses are explored is discussed in the next section.

3. Methodology

This study adopted quantitative methods using a non-experimental cross-sectional design in a questionnaire. The reason for employing a questionnaire is so that we could benefit from insights and perceptions that allow for correlation and regression analysis to be employed. The questionnaire consisted of two sections. The first section used demographic information to segment data and compare respondents. This section collected information regarding age group, gender, and level of technical proficiency in using computers. The objective of the second section was to assess the factors affecting trust based on the conceptual model in Figure 2. For the validity and reliability of the questionnaire, the questions were adapted from existing survey instruments and the WIoMT risks and control gaps identified from the literature. The IoT is an extensively researched area that allows for the acceptance of previously used scales. Although the scales were created precisely to address specific IoT challenges, these could be adapted to address the identification and understanding of security risks and users’ perception of WIoMT adoption. The questionnaire mainly represented two dimensions of factors with a hypothesis set for each factor.

Participants and Procedure

This study included 189 participants that belonged to diverse cultures, backgrounds, and age groups. The applicable and effective number of participants was confirmed by implementing the rule set by Tabachnick and Fidell, which is N ≥ 50 + 8 m, where m is the number of predictors. Similarly, [45] states that 15 participants per predictor is appropriate for sampling. This study meets the assumptions for both, with 189 participants from whom primary data were collected. The survey included demographics, perceived usefulness, perceived ease of use, functionality and reliability, perceived security and privacy, and behavioural intention to use. All ethical approvals necessary for the project were considered and obtained from the Human Research Ethics committee. In addition, a project description, participant information sheet, consent forms, and recruitment documents were developed. The survey was conducted online, with participants signing up for the study, and data were collected via Qualtrics (an online-based survey platform). After participants accessed the survey, they were required to read the participant information sheet that gave a basic summary of the study and outlined what participants would be expected to do. Participants were then required to sign the consent forms.
The collected data were exported to Microsoft Excel from Qualtrics for cleaning, screening, and coding. They were further exported to Statistical Package for Social Science (SPSS, Version 21, IBM, Sydney, Australia) for statistical analyses. At first, for descriptive statistics, the frequency, percentage, mean, median, and standard deviation were calculated as appropriate. The frequency and percentage were calculated for all the categorical variables, such as age groups, gender, technical proficiency in using computers, perceived significance of technology, and each domain’s statement. The mean, median, and standard deviation were calculated for all the numerical variables, such as age and scores for each domain and dimension. Graphical and tabular presentations were used where needed.
For inferential statistics, correlations were tested between domains and dimensions at a 95% Confidence Interval with a p-value less than 0.05 being statistically significant. Pearson Correlation analysis was utilised when the association between two numerical variables was to be determined if they were non-normal variables [46]. The study calculated scores for all domains based on their ordinal categories. These scores were correlated in pairs for each respondent to determine a significant association between two domains in the pair.
Additionally, regression analysis was conducted to determine the factor that had the most influence on the outcome variable of this study. Additionally, regression analysis calculated the percentage variation of the outcome variable (behavioural intention to use) represented by the independent/input variables (perceived usefulness, perceived ease of use, functionality and reliability, and perceived security and privacy). The regression model generated was also tested to determine if it predicted the outcome variable, and if it did, to also determine which variable had the highest power to predict the outcome variable.
According to [47], a correlation analysis with a series of regression analyses between variables can display significant outcomes and precisely find factors that influence consumers’ decision to accept WIoMT devices. IBM SPSS software for statistical analysis was used to analyse the data in this study. Based on correlation analysis, it was expected that there might be a correlation between security and perceived usefulness towards trust and a correlation of intention to use that leads to attitude. The regression analysis was expected to find the strongest relationship between factors leading towards trust and how they affect users’ perceptions.

4. Results

This study was conducted using a survey (via Qualtrics) with 55 questions, initially involving 243 participants. The data screening revealed 32 blank surveys and 1 case of ineligible participant, which were removed before exporting to Microsoft Excel and SPSS for data cleaning and analysis. A missing value analysis in SPSS showed 21 cases had incomplete responses with more than 50% questions unanswered, and the remainder had at least 1 question unanswered. The former 21 cases were deleted as per the suggestion by [48], and for the latter ones, regression imputation was conducted to replace the missing data with estimated values. Ultimately, the study included 189 responses. The analyses based on the responses provided by the participants were conducted through SPSS software, version 21, with the following outputs noted as findings/result.

4.1. Demographics

The first set of questions was related to demographics and other related information. Starting with age, more than half (42.9%) belonged to the 25 to 34 years age group, followed by 37% of those between ages 18 and 24, 9.5% between 35 and 44, and 6.9% between 45 and 54. There were seven respondents aged 55 or above (Table 3). A little more than half of the respondents identified themselves as female. Males comprised 46.6% of the total respondents.
When respondents were asked about their technical proficiency in using computers, almost half (45%) indicated they were at the “Somewhat Above Average” level, 40.2% at the “Average” level, and 13.8% at the “Far Above Average” level of technical proficiency. Only 1.1% stated they had a “Somewhat Below Average” level of technical proficiency. Likewise, when asked about technology having great significance in their lives, the majority (88.4%) affirmed with “Definitely Yes”, 11.1% answered with “Probably Yes”, and only 0.5% gave the answer “Might or might not”.
Additionally, more than half (65.6%) of them responded they were familiar with WIoMT devices, and among them, 77 mentioned they used such devices, and 47 said they did not. Similarly, when those who used such devices were asked if they were aware of any of the listed WIoMT devices, only one-fourth (23.8%) selected Wearable Fitness Trackers, 3.2% selected Wearable ECG Monitors, 6.9% Wearable Blood Pressure Monitors, 2.1% Smart Patches, and 4.8% mentioned they were aware of none of the listed devices.

4.2. Security Risks

There were six statements related to security risks within the perceived security and privacy domain. The theme of the questions was unauthorised access to data; malware infections and vulnerabilities; lack of regulation and compliance; unsecured network connectivity; lack of encryption; and lack of patching and device updates. (Table 4). Taking a descriptive look at each risk, for unauthorised access to data, more than two-thirds of the respondents agreed on its effect on the WIoMT, while 23.2% gave a neutral reply, and only 6.4% denied its effect on the performance of such technologies. Similarly, for all the other security risks, more than sixty percent of the respondents affirmed the effect of those risks on WIoMT devices. Only less than 10% of the respondents felt these risks did not affect the performance of WIoMT devices.
If we observe the proportions of participants responding to the statements related to security risks, most of them felt “unauthorised access to data” was the most prominent risk for these devices, followed by “unsecured network connectivity” and “malware infections and vulnerabilities”.

4.3. Reliability and Validity

Cronbach’s alpha value was used to test the internal consistency within each domain and dimension. Among the domains, the internal consistency was calculated for perceived usefulness, perceived ease of use, functionality and reliability, perceived security and privacy, and intention to use due to the multiple number of questions in each. It was found that the internal consistency in all five domains (perceived usefulness, perceived ease of use, functionality and reliability, perceived security and privacy, and intention to use) was higher than the acceptable value of 0.7 as demonstrated in Table 5, thus indicating a reasonable and acceptable level of reliability and validity as recommended by [41].
Among three dimensions, internal consistency was calculated for product-related factors and security-related factors, and the internal consistency for both dimensions was in the acceptable range (i.e., above 0.7) (Table 6).

4.4. Correlation

a. Correlation between Product and Security-related factors
i. Functionality vs. Perceived Security and Privacy
There was a weak positive correlation between functionality and perceived security and privacy, and it was significant at p < 0.001 (Table 7). This means that, with the increase in the functionality of WIoMT devices, there is a significant increase in the perceived security and privacy of such devices among the consumers.
i. Reliability vs. Perceived Security and Privacy
There was a moderate positive correlation between reliability and perceived security and privacy, and it was significant at p < 0.001 (Table 8). This means that, with the increase in the reliability of WIoMT devices, there is a significant increase in how consumers perceive the security and privacy of such devices.
i. Perceived Usefulness vs. Perceived Security and Privacy
There was a moderate positive correlation between perceived usefulness and perceived security and privacy, and it was significant at p < 0.001 (Table 9). This means that, with the increase in the perceived usefulness of WIoMT devices, there is a significant increase in the security and privacy perception of such devices among consumers.
i. Perceived Ease of Use vs. Perceived Security and Privacy
There was a moderate positive correlation between perceived ease of use and perceived security and privacy, and it was significant at p < 0.001. (Table 10). This means that, with the increase in the perceived ease of use of WIoMT devices, there is a significant increase in the perceived security and privacy of such devices among consumers.
a. Correlation between Product and Security-related factors, and Intention to Use
The correlation analysis showed that there was a significant correlation between product- and security-related factors and intention to use (Table 11).
A moderate positive correlation could be observed between perceived usefulness, perceived ease of use, and perceived security and privacy with intention to use WIoMT devices, respectively. Additionally, there was a weak yet positive correlation between the functionality, reliability, and security risk of such devices with their intention to use. According to Table 11, all factors were found to be significantly associated with intention to use at p < 0.001 level. The correlation analysis indicated that all product- and security-related factors had a positive influence on the intention to use WIoMT devices, which led to the rejection of their null hypotheses and affirmation of their hypotheses.
As it was found that the functionality of WIoMT devices was significantly linked to use; H1a, “the functionality of WIoMT devices has an effect on trust towards WIoMT adoption”, was supported by this study. It means that the respondents were ready to adopt WIoMT devices provided that the devices have proper functionality. An increase in functionality was found to increase users’ perception of security and privacy. This creates more awareness of the potential risks of the use of WIoMT. It leads to trust, which finally results in the high possibility of adopting WIoMT devices, as intention to use becomes strong.
H1b states “the reliability of WIoMT devices has an effect on trust towards WIoMT adoption”. Reliability and intention to use were found to have a positive correlation in this study. The reliability of the WIoMT devices builds trust and gives way to an intention to use, resulting in the adoption of the WIoMT. This shows that despite lacking knowledge about device reliability, users are still willing to trust and adopt WIoMT devices.
H1c, “perceived usefulness has an impact on trusting WIoMT devices”, was also supported by the study. It was found to correlate with the intention to use positively. This proves that if the respondents understand the usefulness of the WIoMT, then they trust WIoMT devices.
“Perceived ease of use has an impact on trusting WIoMT devices” was indicated as H1d in this study. It was found to support this study as the perceived ease of use was significantly associated with the intention of use. It brings forth an insight that trust in the WIoMT and its adoption is highly impacted by perceived ease of use.
H2, “perceived security and privacy has an impact on trusting WIoMT devices”, was also supported by this study, as it was found to be significantly correlated with intention to use. Trusting WIoMT devices on these grounds ignited the intention to use among the respondents. Security and privacy always matter while trusting to adopt or use any WIoMT devices. It was found that the participants considered trusting WIoMT device companies and service providers in protecting their individual data. This hypothesis is further supported by the positive correlation of security risk and intention to use.
On the grounds of functionality, reliability, perceived usefulness, perceived ease of use, and perceived security and privacy, H3, “trust has a direct impact on behavioural intention to use WIoMT devices”, was found to be supported by this study.
All these variables were further explored in a multivariate analysis (regression) to determine the variables and factors with the strongest relationship and relevance when adopting WIoMT. The results are given below.

4.5. Regression

Regression was calculated and is shown in the tables below with the adjusted R square value showing 54% of variation in intention to use represented by reliability, perceived usefulness, perceived ease of use, functionality, and perceived security and privacy (Table 12). The value for the threshold of F was 0, which told us that the null hypotheses could be negated, and the research hypotheses could be accepted.
Furthermore, Table 13 shows how well the regression equation fit the data, and in this case, the model predicted the dependent variable significantly, i.e., the regression model statistically and significantly predicted the outcome variable.
Likewise, Table 14 shows the results of the multiple regression test. Here, the t-value of perceived security and privacy was the highest with significance at p < 0.001, and hence had the highest power to predict the outcome (intention to use WIoMT). This brings clarity that users depend on device security and privacy while trusting to adopt any WIoMT devices.
Based on power to predict, perceived security and privacy was followed by perceived ease of use and perceived usefulness in the prediction of intention to use WIoMT devices.
This implies that three of the considered independent variables (perceived usefulness, perceived ease of use, and perceived security and privacy) in this study were significant predictors of the dependent variable (intention to use). The following findings provide a summary of the regression results for each of the three domains:
  • Another significant aspect of WIoMT device adoption by the users found in this study was WIoMT devices’ security and privacy. It was found that WIoMT device adoption was affected by the perception of the user on this ground. It was found that if the user perception indicates the compromise of one’s privacy and security, the user is less likely to adopt WIoMT devices. Therefore, it became clear that concerns about privacy and security are of high consideration for users while trusting to adopt WIoMT devices.
  • In terms of evaluating the influence of users’ perceptions that using WIoMT technologies would make their lives easier and smarter, some enquiries were put forth. It was found that users who believe and understand the time- and effort-saving nature of WIoMT devices are influenced in their decision to adopt them. With respect to the questions regarding ease of use and device usefulness, the results indicate a positive attitude towards adoption if WIoMT devices are easy to use and able to demonstrate device usefulness. Perceived usefulness and ease of use are inter-related aspects and affect a user’s perception towards trusting to adopt any WIoMT devices.
  • Likewise, the regression analysis shows that the intention to use WIoMT devices is also determined by the user’s perceived security and privacy. When the user’s perceived security and perceived privacy are ensured by WIoMT, then the user gains trust in the device and intends to use the device.
  • This study was also geared towards investigating the significance of trust in affecting “behavioural intention to use” towards WIoMT adoption. It was found that trust generated in the user plays an important role in affecting the behavioural intention to adopt WIoMT. This implies that any user’s behavioural intention to use is influenced by trusting WIoMT devices.

5. Discussion

This study investigated the factors influencing trust and intention to use WIoMT devices. The study had two research questions: (a) What factors influence trust and adoption of WIoMT? and (b) what are the security risks associated with adopting WIoMT? The results confirmed that the two dimensions and five domains predict consumers’ intention to use WIoMT devices. These two dimensions were product-related factors and security-related factors. In contrast, the five domains were functionality, reliability, perceived usefulness, perceived ease of use, and perceived security and privacy. The study showed that these factors were significantly associated with the intention to use WIoMT devices. Perceived security and privacy was the most significant predictor of the dependent variable, intention to use. Each of the factors and variables studied in this research are discussed below with respect to the research questions and hypothesis of the study.
This study comprised individuals aged mostly between 25 to 34 years old, followed by those of 18 to 24 years of age, which is similar to the studies by [33,49,50,51,52]. This study took place in a university context where young adults comprise most of the population. In the other mentioned studies, online surveys were also utilised, mostly accessed by young people, not older individuals [53]. Similarly, there were more female respondents than males, which was opposite to the studies by [45,50,51]. However, this finding was similar to other studies by [33,52]. This may be explained by a study on the influence of gender on online survey participation, which showed that females are more likely to contribute to online surveys than males [45].
When asked about familiarity with WIoMT devices, in this study, more than half of the respondents mentioned they were familiar with such devices. Among them, 40.7% of the total sample had used them, which is quite different from the study by [49], which mentioned 81% of their sample had used at least one to five IoT devices, and from the studies by [33,51], in which 100% of the sample used IoT devices. This is an interesting finding for a sample extracted from a specific population belonging to a highly multicultural educational institution. It lets us predict the usage of such devices in the general population, and this information can be useful for promoters and marketers of such technology.
The reliability measure across the dimensions showed accuracy in the measurement to the extent that even if the respondents answered the questions multiple times, their pattern of answers remained the same every time. This was determined by Cronbach’s alpha higher than 0.7 for both dimensions. Similar values were also obtained in studies by [40,49]. Likewise, the reliability across the domains was also high, i.e., more than 0.7 for all domains. This is in coherence with other studies [49,50,51,54], where the reliability measure was above satisfactory for the concerned domains of the intention to wse WIoMT devices, such as perceived usefulness, perceived ease of use, perceived security and privacy, functionality, and reliability. There were similar results in a pilot study which incorporated the same dimensions and domains.
All product-related and security-related factors were found to be significantly associated with this study. They had a positive correlation, which means that with an increase in one, there was a subsequent and significant increase in the other. For example, if the functionality of WIoMT devices perceived by the consumer increases, then their perception of privacy and security of such devices also increases. Similarly, if these devices are perceived to be reliable, useful, and easy to use, their view regarding the privacy and security of using such devices also increases. This finding is also consistent with studies by [49,50].
Additionally, in this study, it was found that all product- and security-related factors were significantly and positively correlated with the dependent variable, intention to use. This result was similar to [50,54]. It illustrates that the theoretical framework for this study was connected with the findings derived from the analyses. In fact, it validates the hypotheses which stated that the product-related and security-related factors (perceived usefulness, perceived ease of use, perceived security and privacy, functionality, and reliability) all have an impact on trusting WIoMT devices, which in turn affect the intention to use them.
Similarly, the sub-domain security risk significantly correlated with the dependent variable, intention to use. In this study, the security risks identified fell into the following categories:
  • Unauthorised access to data;
  • Malware infections and vulnerabilities;
  • Lack of regulation and compliance;
  • Unsecured network connectivity;
  • Lack of encryption;
  • Lack of patching and device updates.
Most of the participants considered “unauthorised access to data” to be the most prominent security risk for WIoMT devices, followed by “unsecured network connectivity” and “malware infections and vulnerabilities”. There was a significant correlation with intention to use. When users perceive security risks in using the devices, their tendency to use such devices is affected, which is significant and not merely due to chance. According to the findings from this study, the security risk mentioned had an impact on the intention to use such devices. It showed that intention to use was affected when there is more agreement on the impact of security risk.
Furthermore, the regression analysis has shown all domains to predict factors of the dependent variable, the intention to use WIoMT devices. These domains are the independent variables: perceived usefulness, perceived ease of use, functionality, reliability, and perceived security and privacy. This is consistent with the studies by [33,49,50,51,55]. Among the predictors of intention to use, perceived security and privacy was found to have the highest power to predict the outcome. This finding was similar to the studies by [54,56], and the theory presented by [57]. It suggests that if users believe that the device protects their privacy and has security measures for their stored/shared information, they are more likely to use it. It is a basic expectation for any technology in the modern world, where people trust inanimate objects for their health and well-being. In other words, WIoMT service providers need to resolve security issues using various security controls such as encryption, data transparency and Public Key Infrastructure, and in general, by applying best data management practices. However, this finding was different to studies by [18,55], where other factors turned out to be more powerful predictors than perceived security and privacy. The conclusion is that product-related factors (mostly perceived usefulness) were the most influential predictor of intention to use WIoMT devices. It is also relevant because consumers buy a product only when they perceive something as useful. If a person does not see any need for it, even though it has the best security features and is very easy to use, he/she does not intend to use it, which in turn discourages him/her from buying it in the first place. However, our study showed that the privacy and security domain had the highest power to predict the intention to use such devices. In contrast, others, such as perceived ease of use and perceived usefulness, had lower power to predict in comparison. However, they were still the other predictors.
Overall, the results and findings indicated that the factors that influence the trust and adoption of the WIoMT were mainly perceived security and privacy, perceived ease of use, and perceived usefulness. Among these, perceived security and privacy had the highest power to predict the adoption of the WIoMT. All these predictors led the user to trust the devices and intend to use them. This means that users look for security features in such devices before trusting them. After they are assured of their ability to keep information private and secure, they look for ease in using them and how useful they are for themselves. Although there was a positive correlation between device functionality and reliability with the intention to use WIoMT devices, these became insignificant when adjusted with other factors. As for the security risks identified from the literature in this study, findings from the survey showed that risks of unauthorised access to data, malware infections, lack of regulation and compliance, unsecured network connectivity, lack of encryption, and lack of patching and device updates are significantly correlated with intention to use. This means they had a significant effect on the behavioural adoption of WIoMT technologies. These risks also comprised the sub-domain part of the security-related domain, the strongest predictor of the outcome variable.

5.1. Theoretical and Practical Implications

The proposed research model in this study predicted more than half of the outcome variables (R2 = 0.54). The significant variables that affect the intention to use WIoMT devices were perceived security and privacy, perceived ease of use, and perceived usefulness. Perceived security and privacy had the highest influence on the adoption of the WIoMT than other domains (ß = 0.691, t = 6.789). The implication of this outcome is that if the consumers of these technologies do not perceive the devices to store and/or relay information securely and privately, they will not have intention to use it in the first instance. This shows that WIoMT devices need to have the best security and privacy features to be relevant in the market.
Additionally, WIoMT technologies need to be easy to use so that users do not get discouraged from adopting these devices. After all, the devices are built to be used voluntarily. For many, the devices have not become necessities until and unless they have some health issues to manage on their own. Hence, these technologies need to be easily comprehensible for all age groups, especially older generations who more likely need to utilise of these wearables that track their health and help maintain wellness. Not only easiness in use, but WIoMT’s actual usefulness determines it utilisation among the users. They need to visualise what these devices can do to make their lives easier, and this can be done in various ways. One effective way can be to engage prominent people in the community who use these devices to advocate them to others. Hence, developers need to make these devices user-friendly and purposeful with exciting features to increase intention to use.
One of the most influential factors that leads to the adoption of WIoMT devices is their efficiency in saving time and effort for medical attention or health monitoring. Therefore, consideration must be given to data privacy and security. This study also narrowed the research on wearable health technology, which is much more prevalent and known among the general public than other IoT and IoMT devices and equipment. It has developed a better understanding of the trust factor in behavioural intention to use WIoMT products through exploring security and privacy. Thus, this contributes to the body of knowledge in terms of understanding the perceptions as well as the adoption of users towards WIoMT.

5.2. Strengths and Limitations

This study’s strength lies in its scope, which is WIoMT technology. Many previous studies have explored models to discuss the adoption of IoT and IoMT, but this study is among the few that have stayed relevant to the present times, where wearable technologies have become a necessity for many people with chronic diseases. The study also provides insight to vendors, manufacturers, and healthcare providers in understanding advanced technology from the user’s perspective to contribute to this competitive global market. Most researchers have focused on the technological aspects of the devices rather than the user’s perspective for adopting new technology, which has been the main focus of this study. The adoption of WIoMT devices by users will benefit various groups, including the government, advertising firms, manufacturers, and healthcare professionals. It will help users and the healthcare sector develop a device that is simple to use and secure for users. Understanding the user’s perception of trust towards the WIoMT from this study will contribute to new advances in the IoMT sector, such as robotic medical equipment and remote monitoring devices. Adopting technology over conventional techniques is difficult, especially in the healthcare industry. This study will help overcome the challenges of trust, security, and privacy in the usage of wearables to assist manufacturers and the healthcare sector in developing true consumer-centric technologies.
The results of this study come with limitations. First, this is a self-reported online survey which may have resulted in information and selection biases that are common with the nature of quantitative methodologies. The second limitation is around generalisability. The participants of this study are limited to Australia; hence, the results may not be generalisable to populations of other countries, which may be very different from Australia in terms of economic, social, and cultural contexts. The study has tried to minimise this limitation by incorporating participants with international backgrounds living in Australia. Still, the country’s cultural context will influence consumer behaviour. The third limitation is that the study is primarily quantitative. Hence, only objective views have been captured. Supplementary qualitative studies might provide more insight into the utility of such devices.
Lastly, in this study, a little more than half (54%) of the variance in the outcome variable was due to the independent variables considered. However, the unexplained remaining 46% variance implies to some extent that other possible domains might influence the intention to use WIoMT devices that have been missed in the research model. This study can be a basis for further research in this area. Nonetheless, the study’s results are consistent with those of other similar studies, indicating that it will benefit a wide range of people by providing information on users’ behaviour and intentions to use WIoMT devices. It will help future researchers to work towards the better acceptance and usability of similar or advanced WIoMT devices.

6. Conclusion and Future Research

The main purpose of this study was to investigate the factors that led to trust and eventually to the intention to use WIoMT devices, study the power of those independent variables on the outcome variable, and explore the security risks associated with adopting the WIoMT. The independent variables/domains considered in this study were perceived usability, perceived ease of use, reliability, functionality, and perceived security and privacy, mainly extracted from the TAM model.
The study had 189 responses subjected to quantitative analyses using SPSS version 21. First, the descriptive data were analysed, which showed more participants belonging to the age group of 25 to 34 years, more females, more with an above-average level of technical proficiency in using computers, more believing technology to be significant in one’s life, more familiar with WIoMT devices, and more using such devices among those who knew about such devices. Next, to check the reliability and validity of the study instrument, the internal consistency was calculated within each dimension and each domain. The Cronbach’s alpha value, which measures internal consistency, was higher than the acceptable cut-off of 0.7. This showed that the study instrument was reliable and valid in accomplishing the research objectives.
The collected data were further subjected to correlation analysis, which examined correlation coefficients among various domains and sub-domains and, thus, bivariate associations of one domain with another. It was found that all independent variables were correlated univariately with the dependent variable, as all domains were found to be significantly associated with intention to use at the p < 0.001 level. The correlation analysis helped validate the hypotheses explored in this study. When all product- and security-related factors increase in their influence, the resulting intention to use WIoMT devices also increases.
The regression analysis conducted also helped determine the factors with the strongest relevance when adopting WIoMT. Only three factors, i.e., perceived security and privacy, perceived usability, and perceived ease of use, were found to have significantly predicted the outcome variable (intention to use). This finding is not merely by chance but rather a statistical backup. It means that if the user perceives that that device maintains security and privacy, if it is usable and easy to use, only then would they have intention to use.
The highest power to predict the dependent variable lay within the perceived security and privacy domain. The perceived security risks were unauthorised access to data, malware infection and vulnerabilities, lack of regulation and compliance, unsecured network connectivity, lack of encryption, and lack of patching and device updates. The sub-domain of these risks was significantly correlated with intention to use. This means that if the users perceive these risks to be present in WIoMT devices, they will have less intention to use such technology.
This study contributes to the literature regarding adopting WIoMT devices in our daily lives in which usability, ease of use, and security and privacy affect the trust of the consumer, which ultimately leads to the behavioural intention to use such devices regularly. Moreover, the study highlighted that security and privacy factors have the most power to influence the use of the WIoMT, and manufacturers, healthcare providers, and vendors need to focus on what users think if they have the vision to increase the adoption of their technology in the world. As found in the study, there are many potential consumers who are yet to be familiar with or use WIoMT devices. Future research should focus on improving the acceptability and use of comparable or upgraded WIoMT technologies. Researchers should examine more individuals who are using WIoMT devices across larger geographical locations to understand more users’ perspectives towards adoption.

Author Contributions

Conceptualization, S.T., A.B. and A.M.; methodology, S.T., A.B. and A.M.; formal analysis, S.T. and A.B.; investigation, S.T., A.B., A.M. and F.F.; data curation, S.T. and A.B.; writing—original draft preparation, S.T., A.B., A.M. and F.F.; writing—review and editing, S.T., A.B., A.M. and F.F.; supervision, A.B. and A.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Ethics Committee of Western Sydney University (protocol code H14191 on 24 August 2021).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented in this study are available on request from [email protected]. The data are not publicly available due to ethical restrictions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, H.; Wu, J.; Gao, Y.; Shi, Y. Examining individuals’ adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. Int. J. Med. Inform. 2016, 88, 8–17. [Google Scholar] [CrossRef] [PubMed]
  2. Dimitrov, D.V. Medical Internet of Things and Big Data in Healthcare. Healthc. Inform. Res. 2016, 22, 156–163. [Google Scholar] [CrossRef] [PubMed]
  3. Majumder, S.; Mondal, T.; Deen, M.J. Wearable Sensors for Remote Health Monitoring. Sensors 2017, 17, 130. [Google Scholar] [CrossRef]
  4. Yang, Z.; Zhou, Q.; Lei, L.; Zheng, K.; Xiang, W. An IoT-cloud Based Wearable ECG Monitoring System for Smart Healthcare. J. Med. Syst. 2016, 40, 286. [Google Scholar] [CrossRef] [PubMed]
  5. Ganti, V.; Carek, A.M.; Jung, H.; Srivatsa, A.V.; Cherry, D.; Johnson, L.N.; Inan, O.T. Enabling Wearable Pulse Transit Time-Based Blood Pressure Estimation for Medically Underserved Areas and Health Equity: Comprehensive Evaluation Study. JMIR Mhealth Uhealth 2021, 9, e27466. [Google Scholar] [CrossRef]
  6. Ag, C. Wearable Smart Patches in Medical Monitoring and Diagnosis. 2021. Available online: https://solutions.covestro.com/en/highlights/articles/cases/2021/sensor-based-wearable-smart-patches (accessed on 16 August 2021).
  7. Pateraki, M.; Fysarakis, K.; Sakkalis, V.; Spanoudakis, G.; Varlamis, I.; Maniadakis, M.; Lourakis, M.; Ioannidis, S.; Cummins, N.; Schuller, B.; et al. Chapter 2—Biosensors and Internet of Things in smart healthcare applications: Challenges and opportunities. In Wearable and Implantable Medical Devices; Dey, N., Ashour, A.S., James Fong, S., Bhatt, C., Eds.; Academic Press: Cambridge, MA, USA, 2020. [Google Scholar]
  8. Molteni, M. Ingestible Sensors Electronically Monitor Your Guts. 2018. Available online: https://www.wired.com/story/this-digital-pill-prototype-uses-bacteria-to-sense-stomach-bleeding/ (accessed on 16 August 2021).
  9. Burgess, M. What is the Internet of Things? WIRED Explains. WIRED UK. 2018. Available online: https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot (accessed on 12 August 2021).
  10. Pirbhulal, S.; Samuel, O.W.; Wu, W.; Sangaiah, A.K.; Li, G. A joint resource-aware and medical data security framework for wearable healthcare systems. Future Gener. Comput. Syst. 2019, 95, 382–391. [Google Scholar] [CrossRef]
  11. Shin, D.; Hwang, Y. Integrated acceptance and sustainability evaluation of Internet of Medical Things. Internet Res. 2017, 27, 1227–1254. [Google Scholar] [CrossRef]
  12. Razdan, S.; Sharma, S. Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies. IETE Tech. Rev. 2021, 39, 775–788. [Google Scholar] [CrossRef]
  13. Suresh, V.; Ramson, J.; Jegan, D. Internet of Medical Things (IoMT)—An overview. In Proceedings of the 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 5–6 March 2020. [Google Scholar]
  14. Frost & Sullivan. 2017. Internet of Medical Things: Revolutionizing Healthcare. Available online: https://aabme.asme.org/posts/internet-of-medical-things-revolutionizing-healthcare (accessed on 12 March 2020).
  15. Hong, H.; Sun, Z. TS-ABOS-CMS: Time-bounded secure attribute-based online/offline signature with constant message size for IoT systems. J. Syst. Arch. 2022, 123, 102388. [Google Scholar] [CrossRef]
  16. Bansal, G.; Zahedi, F.M.; Gefen, D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis. Support Syst. 2010, 49, 138–150. [Google Scholar] [CrossRef]
  17. Xu, H.; Teo, H.-H.; Tan, B.C.Y.; Agarwal, R. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services. J. Manag. Inf. Syst. 2009, 26, 135–174. [Google Scholar] [CrossRef]
  18. Dutta Pramanik, P.; Upadhyaya, B.; Pal, S.; Pal, T. Internet of Things, Smart Sensors, and Pervasive Systems: Enabling the Connected and Pervasive Health Care. In Healthcare Data Analytics and Management; Academic Press: Cambridge, MA, USA, 2019. [Google Scholar]
  19. Microchip. Intelligence and the Internet of Medical Things (IoMT). 2020. Available online: https://ww1.microchip.com/downloads/en/DeviceDoc/00003668.pdf (accessed on 31 August 2021).
  20. Rubí, J.N.S.; Gondim, P.R.L. IoMT Platform for Pervasive Healthcare Data Aggregation, Processing, and Sharing Based on OneM2M and OpenEHR. Sensors 2019, 19, 4283. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  21. Islam, S.M.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
  22. Angst, C.; Agarwal, R. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. MIS Q. 2009, 33, 339–370. [Google Scholar] [CrossRef] [Green Version]
  23. Azodo, I.; Williams, R.; Sheikh, A.; Cresswell, K. Opportunities and Challenges Surrounding the Use of Data From Wearable Sensor Devices in Health Care: Qualitative Interview Study. J. Med. Internet Res. 2020, 22, e19542. [Google Scholar] [CrossRef] [PubMed]
  24. Mittelstadt, B. Ethics of the health-related internet of things: A narrative review. Ethics Inf. Technol. 2017, 19, 157–175. [Google Scholar] [CrossRef] [Green Version]
  25. Putta, S.R.; Abuhussein, A.; Alsubaei, F.; Shiva, S.; Atiewi, S. Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach. In Fourth International Congress on Information and Communication Technology; Springer: Singapore, 2020. [Google Scholar]
  26. Nanayakkara, N.; Halgamuge, M.; Syed, A. Security and Privacy of Internet of Medical Things (IoMT) Based Healthcare Applications: A Review. In Proceedings of the 2019 IIER 750th International Conference on Advances in Business Management and Information Technology (ICABMIT), Istanbul, Turkey, 6–7 November 2019. [Google Scholar]
  27. Gao, Y.; Wang, J.; Yuan, Y.; Jiang, Y.Z.; Yue, X. Machine learning and blockchain technology for smart healthcare and human health. J. Healthc. Eng. 2021. Available online: https://www.hindawi.com/journals/jhe/si/512528/ (accessed on 20 January 2023).
  28. Williams, P.A.; Woodward, A.J. Cybersecurity vulnerabilities in medical devices: A complex environment and multifaceted problem. Med. Devices Évid. Res. 2015, 8, 305–316. [Google Scholar] [CrossRef] [Green Version]
  29. Rasool, R.U.; Ahmad, H.F.; Rafique, W.; Qayyum, A.; Qadir, J. Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML. J. Netw. Comput. Appl. 2022, 201, 103332. [Google Scholar] [CrossRef]
  30. Slight, S.P.; Bates, D.W. A risk-based regulatory framework for health IT: Recommendations of the FDASIA working group. J. Am. Med. Inform. Assoc. 2014, 21, e181–e184. [Google Scholar] [CrossRef] [Green Version]
  31. Koutras, D.; Stergiopoulos, G.; Dasaklis, T.; Kotzanikolaou, P.; Glynos, D.; Douligeris, C. Security in IoMT communications: A survey. Sensors 2020, 20, 4828. [Google Scholar] [CrossRef]
  32. Yuan, S.; Fernando, A.; Klonoff, D.C. Standards for Medical Device Cybersecurity in 2018. J. Diabetes Sci. Technol. 2018, 12, 743–746. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  33. Hsu, C.-L.; Lin, J.C.-C. Exploring Factors Affecting the Adoption of Internet of Things Services. J. Comput. Inf. Syst. 2018, 58, 49–57. [Google Scholar] [CrossRef]
  34. Aldossari, M.Q.; Sidorova, A. Consumer Acceptance of Internet of Things (IoT): Smart Home Context. J. Comput. Inf. Syst. 2020, 60, 507–517. [Google Scholar] [CrossRef]
  35. Dong, X.; Chang, Y.; Wang, Y.; Yan, J. Understanding usage of Internet of Things (IOT) systems in China: Cognitive experience and affect experience as moderator. Inf. Technol. People 2017, 30, 117–138. [Google Scholar] [CrossRef]
  36. Lee, M.; Turban, E. A Trust Model for Consumer Internet Shopping. Int. J. Electron. Commer. 2001, 6, 75–91. [Google Scholar] [CrossRef]
  37. Cho, Y.C.; Sagynov, E. Exploring Factors That Affect Usefulness, Ease Of Use, Trust, And Purchase Intention In The Online Environment. Int. J. Manag. Inf. Syst. (IJMIS) 2015, 19, 21. [Google Scholar] [CrossRef]
  38. Gao, L.; Bai, X. A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac. J. Mark. Logist. 2014, 26, 211–231. [Google Scholar] [CrossRef]
  39. Mcknight, D.H.; Carter, M.; Thatcher, J.B.; Clay, P.F. Trust in a specific technology: An investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2011, 2, 12. [Google Scholar] [CrossRef]
  40. Lai, I.K.W.; Tong, V.W.L.; Lai, D.C.F. Trust factors influencing the adoption of internet-based interorganizational systems. Electron. Commer. Res. Appl. 2011, 10, 85–93. [Google Scholar] [CrossRef]
  41. Bart, Y.; Shankar, V.; Sultan, F.; Urban, G.L. Are the Drivers and Role of Online Trust the Same for All Web Sites and Consumers? A Large-Scale Exploratory Empirical Study. J. Mark. 2005, 69, 133–152. [Google Scholar] [CrossRef] [Green Version]
  42. Al-Momani, A.M.; Mahmoud, M.A.; Ahmad, M. Modeling the adoption of internet of things services: A conceptual framework. Int. J. Appl. Res. 2016, 2, 361–367. [Google Scholar]
  43. Køien, G. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wirel. Pers. Commun. 2011, 61, 495–510. [Google Scholar] [CrossRef]
  44. Yildirim, H.; Ali-Eldin, A.M.T. A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. 2019, 31, 497–505. [Google Scholar] [CrossRef]
  45. Smith, G. Does Gender Influence Online Survey Participation? A Record-Linkage Analysis of University Faculty Online Survey Response Behavior. 2008. Available online: https://eric.ed.gov/?id=ED501717 (accessed on 20 January 2023).
  46. Campbell, M.J. Statistics at Square One. 1995. Available online: https://www.bmj.com/about-bmj/resources-readers/publications/statistics-square-one (accessed on 20 January 2023).
  47. Iustina-Cristina, C.-M.; Gheorghe, M. Patients’ attitudes toward the use of IoT medical devices: Empirical evidence from Romania. Proc. Int. Conf. Bus. Excell. 2019, 13, 567–577. [Google Scholar]
  48. Kang, H. The prevention and handling of the missing data. Korean J. Anesthesiol. 2013, 64, 402–406. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  49. Alhogail, A. Improving IoT technology adoption through improving consumer trust. Technologies 2018, 6, 64. [Google Scholar] [CrossRef] [Green Version]
  50. Lallmahomood, M. An Examination of ‘Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model. J. Internet Bank. Commer. 2007, 12, 1–26. [Google Scholar]
  51. Kao, Y.-S.; Nawata, K.; Huang, C.-Y. An Exploration and Confirmation of the Factors Influencing Adoption of IoT-Based Wearable Fitness Trackers. Int. J. Environ. Res. Public Health 2019, 16, 3227. [Google Scholar] [CrossRef] [Green Version]
  52. Zhang, M.; Luo, M.; Nie, R.; Zhang, Y. Technical attributes, health attribute, consumer attributes and their roles in adoption intention of healthcare wearable technology. Int. J. Med. Inform. 2017, 108, 97–109. [Google Scholar] [CrossRef]
  53. Kelfve, S.; Kivi, M.; Johansson, B.; Lindwall, M. Going web or staying paper? The use of web-surveys among older people. BMC Med. Res. Methodol. 2020, 20, 252. [Google Scholar] [CrossRef]
  54. Kowatsch, T.; Maass, W. Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts. In Knowledge and Technologies in Innovative Information Systems; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  55. Alraja, M.N.; Farooque, M.M.J.; Khashab, B. The Effect of Security, Privacy, Familiarity, and Trust on Users’ Attitudes Toward the Use of the IoT-Based Healthcare: The Mediation Role of Risk Perception. IEEE Access 2019, 7, 111341–111354. [Google Scholar] [CrossRef]
  56. Kim, Y.; Park, Y.; Choi, J. A study on the adoption of IoT smart home service: Using Value-based Adoption Model. Total Qual. Manag. Bus. Excell. 2017, 28, 1149–1165. [Google Scholar] [CrossRef]
  57. Khan, W.; Aalsalem, M.Y.; Khan, M.K.; Arshad, Q. Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model. In Advanced Multimedia and Ubiquitous Engineering; Springer: Singapore, 2016. [Google Scholar]
Figure 1. Fundamental architecture of WIoMT [18].
Figure 1. Fundamental architecture of WIoMT [18].
Ijerph 20 05519 g001
Figure 2. Conceptual Model.
Figure 2. Conceptual Model.
Ijerph 20 05519 g002
Table 1. Practical examples of WIoMT devices.
Table 1. Practical examples of WIoMT devices.
WIoMT Device CategoryExamples
Wearable Fitness TrackersFitbit, Jawbone, Polar loop
Wearable ECG MonitorsFitbit sense, Fitbit Versa 3
Wearable Blood Pressure MonitorsBPM Connect, Omron platinum
BiosensorsVital Patch, Philips wearable biosensor
Smart PatchesBio-patch, skin patch
Ingestible SensorsIngestible sensing capsules
Table 2. Impact of security and privacy risks.
Table 2. Impact of security and privacy risks.
WIOMT Security and Privacy RisksImpact
Lack of security measures, such as encryption while transmitting dataData shared in different domains are recorded as plain text, which leads to compromised user login details.
Sensor trackingPotential threats such as tag cloning, side channel, physical harm, and jamming threats
Poor signal communication between medical devices such as pacemakers and insulin pumpsUsers rely on such devices but are at risk of cyber attacks.
Unauthorised accessDeterioration of the effectiveness of WIoMT and adverse impact on individual’s sensitive health information
Lack of standards; limited integration between devicesErrors in communication when integration is achieved.
Lack of regulation and complianceExposing medical devices towards cyber attacks
Table 3. Demographic and other characteristics of the respondents (N = 189).
Table 3. Demographic and other characteristics of the respondents (N = 189).
VariablesCategoriesFrequencyPercent (%)
Age Group18–247037.0
25–348142.9
35–44189.5
45–54136.9
Above 5573.7
GenderMale8846.6
Female10153.4
Level of technical proficiencyFar Above Average2613.8
Somewhat Above Average8545.0
Average7640.2
Somewhat Below Average21.1
Technology has great significance in your lifeDefinitely Yes16788.4
Probably Yes2111.1
Might or might not10.5
Familiar with WIoMT devicesYes12465.6
No6534.4
Use WIoMT devices
(n = 124)
Yes7740.7
No4724.9
Aware of WIoMT devices (n = 77)Wearable Fitness Trackers4523.8
Wearable ECG Monitors63.2
Wearable Blood Pressure Monitors136.9
Smart Patches42.1
None94.8
Total189100
Table 4. Security risks of WIoMT.
Table 4. Security risks of WIoMT.
StatementResponse n (%)
Definitely YesProbably YesMight or Might NotProbably NotDefinitely Not
Indicate your level of agreement on the security risk of “unauthorised access to data” impact on Wearable Internet of Medical Things.64 (33.9)69 (36.5)44 (23.2)3 (1.6)9 (4.8)
Indicate your level of agreement on the security risk of “malware infections and vulnerabilities” impact on Wearable Internet of Medical Things.59 (31.2)68 (36.1)49 (25.9)5 (2.6)8 (4.2)
Indicate your level of agreement on the security risk relating to “lack of regulation and compliance” impact on Wearable Internet of Medical Things.56 (29.6)69 (36.5)48 (25.4)7 (3.7)9 (4.8)
Indicate your level of agreement on the security risk of “unsecured network connectivity” impact on Wearable Internet of Medical Things.59 (31.2)69 (36.5)51 (27.0)3 (1.6)7 (3.7)
Indicate your level of agreement on the security risk of “lack of encryption” impact on Wearable Internet of Medical Things.56 (29.6)66 (34.9)54 (28.7)5 (2.6)8 (4.2)
Indicate your level of agreement on the security risk of “lack of patching and device updates” impact on Wearable Internet of Medical Things.52 (27.5)75 (39.7)46 (24.3)9 (4.8)7 (3.7)
Table 5. Internal consistency of the domains.
Table 5. Internal consistency of the domains.
DomainsCronbach’s Alpha ValueCronbach’s Alpha Value Analysis
Perceived Usefulness0.911Excellent
Perceived Ease of Use0.892Excellent
Functionality and Reliability0.853Excellent
Perceived Security and Privacy0.917Excellent
Security Risk *0.943Excellent
Intention to Use0.866Excellent
* “Security risk” is the sub-domain of “perceived security and privacy” domain.
Table 6. Internal consistency of dimensions.
Table 6. Internal consistency of dimensions.
DimensionsCronbach’s Alpha ValueCronbach’s Alpha Value Analysis
Product-related factors0.929Excellent
Security-related factors0.917Excellent
Table 7. Correlation between functionality and perceived security and privacy.
Table 7. Correlation between functionality and perceived security and privacy.
Coefficient of Correlation Ip-ValueFunctionality MeanPerceived Security and Privacy Mean
0.4730.000 *2.672.29
* Correlation is significant at the 0.001 level (2-tailed).
Table 8. Correlation between reliability and perceived security and privacy.
Table 8. Correlation between reliability and perceived security and privacy.
Coefficient of Correlation Ip-ValueReliability MeanPerceived Security and Privacy Mean
0.5310.000 *2.832.29
* Correlation is significant at the 0.001 level (2-tailed).
Table 9. Correlation between perceived usefulness and perceived security and privacy.
Table 9. Correlation between perceived usefulness and perceived security and privacy.
Coefficient of Correlation Ip-ValuePerceived Usefulness MeanPerceived Security and Privacy Mean
0.5400.000 *2.042.29
* Correlation is significant at the 0.001 level (2-tailed).
Table 10. Correlation between perceived ease of use and perceived security and privacy.
Table 10. Correlation between perceived ease of use and perceived security and privacy.
Coefficient of Correlation Ip-ValuePerceived Ease of Use MeanPerceived Security and Privacy Mean
0.6450.000 *2.122.29
* Correlation is significant at the 0.001 level (2-tailed).
Table 11. Correlation between product- and security-related factors and intention to use.
Table 11. Correlation between product- and security-related factors and intention to use.
Product- and Security-Related Factors Correlation Coefficient
(with Intention to Use)
p-Value
Functionality0.3710.000 *
Reliability0.3640.000 *
Perceived Usefulness0.5650.000 *
Perceived Ease of Use0.6310.000 *
Perceived Security and Privacy0.6860.000 *
Security Risk **0.3120.000 *
* Correlation is significant at the 0.001 level (2-tailed). ** “Security risk” is the sub-domain of “perceived security and privacy” domain.
Table 12. Regression analysis.
Table 12. Regression analysis.
Model Summary b
ModelRR SquareAdjusted R SquareStd. Error of the EstimateChange Statistics
R Square ChangeF Changedf1df2Sig. F Change
10.744 a0.5530.5410.576980.55345.26651830.000
a Predictors: (constant), reliability, perceived usefulness, perceived ease of use, functionality, perceived security and privacy. b Dependent variable: intention to use.
Table 13. ANOVA results.
Table 13. ANOVA results.
ANOVA a
ModelSum of SquaresdfMean SquareFSig.
1Regression75.348515.07045.2660.000 b
Residual60.9231830.333
Total136.270188
a Dependent variable: intention to use. b Predictors: (constant), reliability, perceived usefulness, perceived ease of use, functionality, perceived security and privacy.
Table 14. Regression analysis on the intention to use WIoMT devices.
Table 14. Regression analysis on the intention to use WIoMT devices.
Coefficients a
ModelUnstandardised CoefficientsStandardised CoefficientstSig.Collinearity Statistics
BStd. ErrorBetaToleranceVIF
1(Constant)−0.3240.179 −1.8120.072
Perceived Usefulness0.2440.0930.1862.6120.010 *0.4822.075
Perceived Ease of Use0.2800.0970.2212.8750.005 *0.4142.417
Perceived Security and Privacy0.6910.1020.4746.7890.000 **0.5001.998
Functionality0.0660.0540.0911.2170.2250.4372.290
Reliability−0.0970.055−0.140−1.7680.0790.3912.557
a Dependent variable: intention to use. * Significant at the 0.05 level (2-tailed). ** Significant at the 0.001 level (2-tailed).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Thapa, S.; Bello, A.; Maurushat, A.; Farid, F. Security Risks and User Perception towards Adopting Wearable Internet of Medical Things. Int. J. Environ. Res. Public Health 2023, 20, 5519. https://doi.org/10.3390/ijerph20085519

AMA Style

Thapa S, Bello A, Maurushat A, Farid F. Security Risks and User Perception towards Adopting Wearable Internet of Medical Things. International Journal of Environmental Research and Public Health. 2023; 20(8):5519. https://doi.org/10.3390/ijerph20085519

Chicago/Turabian Style

Thapa, Sanjit, Abubakar Bello, Alana Maurushat, and Farnaz Farid. 2023. "Security Risks and User Perception towards Adopting Wearable Internet of Medical Things" International Journal of Environmental Research and Public Health 20, no. 8: 5519. https://doi.org/10.3390/ijerph20085519

APA Style

Thapa, S., Bello, A., Maurushat, A., & Farid, F. (2023). Security Risks and User Perception towards Adopting Wearable Internet of Medical Things. International Journal of Environmental Research and Public Health, 20(8), 5519. https://doi.org/10.3390/ijerph20085519

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop