Next Article in Journal
Ground Stability Analysis in Non-Open-Cut Tunneling Method Using Small-Diameter Steel Pipe Piles
Next Article in Special Issue
The Selection of Strategic Alliance in IC Packaging and Testing Industry with DEA Resampling Comparative Evaluation
Previous Article in Journal
Line-segment Feature Analysis Algorithm Using Input Dimensionality Reduction for Handwritten Text Recognition
Previous Article in Special Issue
Assessing SMEs’ Internationalisation Strategies in Action
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Motivations for the Use of IoT Solutions by Company Managers in the Digital Age: A Romanian Case

by
Mirela Cătălina Tűrkeș
1,*,
Sorinel Căpușneanu
2,
Dan Ioan Topor
3,
Adela Ioana Staraș
4,
Mihaela Ștefan Hint
3 and
Laurentiu Florentin Stoenica
5
1
Faculty of Economics and Business Administration, Dimitrie Cantemir Christian University, 040042 Bucharest, Romania
2
Faculty of Finance-Banking, Accountancy and Business Administration, Titu Maiorescu University, 040051 Bucharest, Romania
3
Faculty of Economic Sciences, 1 Decembrie 1918 University, 510009 Alba-Iulia, Romania
4
National Institute for Chemical Pharmaceutical Research and Development (INCD-ICCF), 031299 Bucharest, Romania
5
Faculty of Management—Marketing, Artifex University of Bucharest, 060754 Bucharest, Romania
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(19), 6905; https://doi.org/10.3390/app10196905
Submission received: 29 August 2020 / Revised: 12 September 2020 / Accepted: 28 September 2020 / Published: 1 October 2020

Abstract

:
The purpose of our study is to research and identify intrinsic and extrinsic motivations but also their impact on the behavioral intentions of using Internet of Things (IoT) solutions among company managers in Romania in the future. The research method used in the quantitative study was the sample survey, using the online questionnaire as a data collection tool. The questionnaire included a formalized set of 54 questions, being specially designed to generate a new structural model starting from the Unified Theory for Acceptance and Use of Technology (UTAUT) elements. A total of 416 respondents provided complete and useful answers for this research. The results of the study showed that the endogenous factor intrinsically motivated significantly and strongly affected the intention of managers to use IoT solutions in professional activity compared to the variable of extrinsic motivation whose action remains insignificant. At the same time, the effect of the intrinsic motivation variable was mediated by the significant influence of the endogenous extrinsic motivation factor. The implications of this study are multiple for both managers and researchers. The originality of this article lies in the empirical part of the research, which, by using a quantitative method based on the questionnaire, provides important information on the impact of the motivational spectrum on the acceptance and use of IoT solutions by managers in the next period to achieve new performance, both personal and professional.

1. Introduction

Technology-based innovation is the main support in the efficient implementation and transformation of present business processes [1]. With the development of companies, the digital transformation of business processes and models has increased in order to gain competitive advantages through the use of the Internet of Things (IoT). Connecting anytime and anywhere with IoT solutions is done through a vast network of electronic devices containing sensors or software [2], connected people, connected networks, connected data and connected processes that have created revolutionary opportunities in the economy, society, business and personal life [3]. It is estimated that by 2030 there will be over 500 billion devices connected to the Internet [4]. However, the availability of IoT technologies and solutions does not guarantee acceptability from end users. As a result, understanding user acceptance becomes an essential condition for expanding the use of IoT applications in everyday life.
Although users enjoy multiple benefits [5,6,7,8,9,10], the proliferation of new communication technologies has raised privacy and security issues due to the unprecedented amounts of information it can collect, analyze and store [11]. Researchers have conducted studies on the possible implications of IoT services on users’ lives, and as a result, understanding user acceptance becomes an essential condition in the daily expansion of IoT applications. As IoT development is still in its infancy, few studies have been devoted to understanding acceptance issues from end users and especially from the perspective of company managers. Some researchers have theoretically investigated IoT through the prism of users, governments, and companies [12,13,14,15], implementation, architecture, and design [16,17]. Other researchers have focused in their studies on investigating the negative aspects of IoT such as identification, heterogeneity, addressing and interoperability [12] or lack of acceptance of user acceptance as an obstacle in IoT adoption and deployment [18].
As the development of IoT is still at an early stage, few studies have been dedicated to understanding the problems of acceptance by end users and especially from the perspective of company managers. Given the importance given to new technologies in the digital age but also the difficulties of understanding and acceptance faced by users, this paper aims to develop and empirically test a model of the causal relationship of intrinsic and extrinsic factors that determine acceptance of IoT by managers companies. The decisional problem is described by the question: To what extent do specific elements of motivation influence the behavioral intention of Romanian managers related to the use of IoT solutions in professional activity? The purpose of marketing research was to identify factors in the spectrum of intrinsic and extrinsic motivations and determine their impact on the behavior of using IoT solutions among company managers in Romania in the future.
The objectives of our research aim at: (1) Assessing the impact of the variables: Effort Expectancy, Attitude Towards IoT, Perceived Autonomy and Perceived Competence and Perceived Relatedness on the spectrum of intrinsic motivation; (2) Determining the direct impact of the factors: Performance Expectancy, Social Influence, Facilitating Conditions, Perceived Privacy and Perceived Risk/Security on extrinsic motivation; (3) Determining the way in which intrinsic and extrinsic motivation influences the behavioral intention to use IoT solutions by the managers of Romanian companies at work.
This study intends to make several contributions such as: (1) researching and identifying the intrinsic and extrinsic motivations of company managers in accepting and using IoT solutions; (2) the extension of the specialized literature by determining the impact of the spectrum of motivations on the behavior of future use. Previous studies have not highlighted the assessment of behavioral intent regarding the future use of IoT solutions by company managers but only the identification of factors that influence the acceptance of the IoT system in public universities [19].
The content of the article is structured in accordance with the proposed purpose and objectives, with a brief presentation of the literature and research methodology and data collection and processing in Section 2, while the empirical results are presented and discussed in Section 3. Finally, the conclusions and limitations of the study are presented in Section 4.

2. Materials and Methods

2.1. Materials

2.1.1. IoT: Definition and Evolution

IoT was introduced in 1999 by Kevin Ashton and is the network that connects objects in the physical world of the Internet, allowing communication between them, collecting and exchanging data between them and people in order to achieve goals in different fields and applications [20]. Developed based on RFID technology by MIT’s Auto-ID Center, IoT has received several definitions: (1) focusing on smart infrastructure with Radio Frequency Identification (RFID) technology [21], (2) ubiquitous connection [22], (3) dynamic global network infrastructure with the identification of physical and virtual things [23], (4) a network containing all smart devices with a kind of detection mechanism that can communicate via the Internet with other smart or cloud devices [24].
Smart devices are those devices that have built-in systems with Internet connectivity, being equipped with a microcontroller, sensors and actuators. The sensors receive the real-world data, the microcontroller processes this data and the actuators create the events based on them. These devices are self-configured and can be controlled remotely [25,26,27]. IoT components consist of: (1) sensors, RFID technology and near field communication (NFC) with short-term wireless data collection technologies, (2) wireless or wired Internet networks for data transmission, and (3) applications of services for processing, analyzing and managing transmitted data [28]. In other words, IoT is a vast computing network that connects wireless sensors to application services over the Internet.
Whether we are talking about employees or managers, studies on the behavior of users of IoT solutions are limited in the academic literature and are still in an early stage [29]. Adopting new technology can bring benefits (convenience, speed in decision making) but also negative effects (anxiety or technological stress) to its users [30]. Thus, three types of paradoxes with double impact on users of computer products were identified: (1) control/chaos; (2) meeting needs/creating needs; (3) freedom enslavement [31,32,33].
The increase in the number of users (corporations, companies, SMEs, individuals) who use IoT can be explained by the many benefits it offers such as: (1) improving the customer experience; (2) improving efficiency; (3) access to data/collection of new data; (4) reduction of labor cost/actual costs; (5) connectivity; (6) saving time; (7) a new positioning at the business level [34]. Although the benefits to users of IoT applications are obvious, there are a number of concerns about: (1) complexity, (2) dependence on other IoT applications, (3) business models used, (4) society, (5) regulatory standards and (6) data security/protection (unauthorized access to personal information and risks of hacking on IoT applications) leading to positive factors that promote IoT use and negative factors that prevent IoT use [34,35].

2.1.2. Unified Theory for Acceptance and Use of Technology (UTAUT): Importance, Advantages and Limitations

The clearest highlighting of the relationships between the degree of acceptance of information technology and IoT by employees, employers or managers and their intention to use information technology is achieved using the Unified Theory for Acceptance and Use of Technology (UTAUT). Based on the general model of technology adoption, the UTAUT model was developed as an integration of previous research models in the field of technology acceptance [36]. This model has incorporated several theories such as: rational action theory (TRA) [37], acceptance model technology (TAM) [38], TAM 2 [39], motivational model (MM) [40], planned behavioral theory [41], C-TAM-CTB model, computer use model (MPCU) [42], social cognitive theory (SCT) [43] and the theory of innovative diffusion (IDT) [44].
In its construction, the UTAUT model uses four basic variables to reflect the above-mentioned relationships: Performance Expectancy (PE) (users’ perception of the usefulness of IoT in their professional activity), Effort Expectation (EE) (ease perceived by users in using IoT), Social Influence (SI) (perception of social pressure in IoT use) and Facilitating Conditions (FC) (user perception of support for IoT use) to make predictions about user Behavioral Intentions (BI) and Use Behavior (UB) in adopting IoT for professional purposes in the workplace. The UTAUT model also uses the following variables: gender, age, previous experiences with IoT or other technologies, the degree of volunteering and influencing independent variables (PE, EE, SI, FC) and dependent variables (BI, UB).
Like any other model, UTAUT has advantages and limitations. According to specialists, the most important advantages of the UTAUT model are: (1) the holistic approach in explaining the basic relationships with social and psychological factors with a significant impact on information technology; (2) consistent validity and reliability of collected data [45,46]. Among the limits of the UTAUT model identified by the most significant specialists are: (1) the multitude of variables necessary to achieve the substantial level of variance; (2) due to the complexity of SI and FC they cannot be measured correctly [47].
Considering the advantages and limitations of the UTAUT model, the specialists tried to investigate the acceptance of information technology by analyzing the intrinsic and extrinsic motivations of the staff employed to obtain feedback for the design of effective strategies by companies for promotion in the workplace [48].

2.1.3. Motivation and Relationships between Intrinsic and Extrinsic Motivations of Employees and Managers

Work motivation is defined as “the psychological forces that determine the direction of a person’s behavior in an organization, a person’s level of effort, and a person’s level of persistence in the face of obstacles” [49]. In other words, work motivation can be approached through the prism of motivation: (1) intrinsic (refers to noninstrumental behavioral involvement that is inherently satisfactory and pleasant, motivated action not depending on the outcome of the behavior) and (2) extrinsic (refers to performance instrumental behavior that is fundamentally contingent on achieving a result separate from the action itself) [50]. In the professional environment, employees as well as managers would be intrinsically motivated by pleasure and satisfaction in performing their tasks [51,52] but also personal performance [53]. Extrinsic motivation is related to objectives such as financial rewards or incentives obtained [51,52]. Defined from the practical point of view, motivation guides the direction, intensity and persistence of performance behaviors [53]. Generally speaking, extrinsic and intrinsic motivations influence the intentions of employees or managers regarding activities and behaviors but the factors that influence these motivations are very little known [51]. The studies conducted by specialists explored the motivations of employees from both private and public, and how managers perceived these influences of intrinsic and extrinsic factors on employee involvement were reflected in the following results: (1) monetary rewards are more important in motivating private sector employees while job security has been more important in motivating public sector employees, both categories of employees equally appreciated the desire to work in a team, contribution to society and opportunities for advancement [54]; (2) private sector employees appreciate higher extrinsic rewards but also intrinsic variables compared to public sector employees who appreciate higher intrinsic rewards in light of motivation [55]; (3) public and private employees have similar attitudes about job security, promotion opportunities, and the significance of work, but private employees value cash rewards more than public employees who value shorter working hours more [56].

2.1.4. Intrinsic and Extrinsic Motivational Factors

According to our study, we considered intrinsic motivational factors: Effort Expectancy (EE), Attitude Towards IoT (IoTA), Perceived Autonomy (PA), Perceived Competence (PC), Perceived Relationship (PR). The extrinsic motivational factors considered were: Performance Expectancy (PE), Facilitation Conditions (CF), Social Influence (SI), Perceived Confidentiality (PP), Perceived Security (PS) and Behavioral Intention (BI).
Effort Expectancy (EE) shows the extent to which the use of technology is easily perceived by users [36] and which also includes the degree of perceived complexity [57] being important in the context of personal and workplace technologies. Perceptions of ease of use [38] and perceived utility have been reflected in several studies using the TAM model with a significant impact on behavioral intentions to use IoT technologies such as: (1) e-learning [58], (2) blogs [59], (3) mobile devices [60], (4) IoT applications [61], (5) wearable technology [62,63], (6) adoption of mobile banking [64] and Internet banking [65], (7) urban technologies [66], (8) virtual reality [67] and (9) teaching technologies [68]. Therefore, we consider that the performance effort will have a positive impact on the intrinsic motivation of using IoT solutions by managers and the first hypothesis that will be tested will be:
H1. 
Effort Expectancy has a significant impact on Intrinsic Motivation
Attitude Towards IoT (IoTA) shows the extent to which users express their feelings or opinions about IoT solutions. Specialist studies have shown positive attitudes of most users related to IoT solutions [69] finding them interesting, captivating and attributing a higher quality to the information transmitted [70] thus contributing to efficiency, safety and convenience to their activities. Based on the robustness of IoT applications that contribute to facilitating the activities of managers, the interest, pleasure and joy of using them by managers, we believe that the attitude towards IoT will have a positive impact on the intrinsic motivation to use IoT solutions by managers. and the second hypothesis tested will be:
H2. 
Atitudine toward IoT has a significant impact on Intrinsic Motivation
Perceived Autonomy (PA) shows the degree to which the user of a particular IoT system considers that he would use it with the minimum necessary resources (e.g., additives, supplements, accessories, additional hardware, additional software, extra networking and additional energy) [71] in order to carry out managerial activities. Considering the different options and opportunities for developing the desired activities which will allow managers to better coordinate their activities by finding efficient and fast solutions, while monitoring and controlling a wide range of IoT devices, the third hypothesis was formulated. It consists of the manifestation of a positive impact of the perceived autonomy on the intrinsic motivation of using IoT solutions by managers.
H3. 
Perceived Autonomy has a significant impact on Intrinsic Motivation
Perceived Competence (PC) shows the ability of a person to successfully perform the tasks received being significantly correlated with the results obtained [72]. Correlated with perceived autonomy and self-efficacy, self-competence becomes an important predictor for the learning environment [72,73] being strongly related to intrinsic motivation [74]. Users’ perception of IoT solution management skills, skills developed through connectivity to IoT solutions and their use, we consider that the perceived competence has a positive impact on the intrinsic motivation to use IoT solutions by managers and the fourth hypothesis tested will be:
H4. 
Perceived Competence has a significant impact on Intrinsic Motivation
Perceived Relatedness (PR) indicates the quality of the relationship between the user of IoT solutions and the perception given by the user. Based on the theory of self-determination, perceived relationship plays an important role along with competence and autonomy [75] but also with perceived competence in motivating users [76]. Therefore, it is expected that the support, understanding, listening and appreciation received from other users of IoT solutions will create a positive impact on the intrinsic motivation to use IoT solutions by managers and the fifth hypothesis tested will be:
H5. 
Perceived Relatedness has a significant impact on Intrinsic Motivation
Performance Expectancy (PE) shows the extent to which the use of technology brings benefits to users [36] being one of the important predictors of the behavioral intent of communication technologies [77]. The more individuals expect to improve their performance through the use of technology, the more likely they are to use it. The use of new technologies brings many advantages being useful in daily activities, allowing the acquisition of interpersonal skills and helping to quickly perform work tasks, thus increasing labor productivity. The same model of performance expectation is expected to have a positive impact on the extrinsic motivation of managers to use IoT solutions, thus testing the sixth hypothesis:
H6. 
Performance Expectancy has a significant impact on Extrinsic Motivation
Social Influence (SI) shows the extent to which the use of technology is perceived through the prism of those close to them [36] having special importance [78] especially through the significant influence on the intention to the adoption of IoT solutions [79]. Social influence is “the perception of users if people important to them perceive that they should be involved in behavior” [80] and is especially important for consumers, who do not have much detailed information about the use of products and services recently launched and which can reach reliable information through social interaction [61]. Through the support provided, managers receive help, advice and useful information related to IoT solutions, becoming more confident in making independent decisions and guaranteeing partnerships in providing IoT solutions. Starting from the above, we consider that social influence will have a positive impact on the extrinsic motivation of managers to use IoT solutions, thus testing the seventh hypothesis:
H7. 
Social Influence has a significant impact on Extrinsic Motivation
Facilitating Conditions (FC) show the extent to which the use of technology is perceived by users in terms of available resources and support provided [36] to perform a behavior. In addition to facilitation conditions, specialists used in their studies other variables such as perceived value, self-efficacy [81] and the results indicated and supported a relationship between facilitation conditions and social assistance in the use of technology. Benefiting from IT consulting, users have the knowledge and skills to use the IoT solutions needed to exchange ideas in the IoT partner community. We consider that the facilitation conditions also have a positive impact on the extrinsic motivation of managers to use IoT solutions, thus testing the eighth hypothesis:
H8. 
Facilitating Conditions has a significant impact on Extrinsic Motivation
Perceived Privacy (PP) is defined as the extent to which a user using private IoT solutions considers that they could exercise some control over how information used by the system can be accessed, collected, stored, used, manipulated or disclosed to other systems or users [71]. Confidentiality is an important challenge in the IoT environment, due to the availability of sensory devices, the speed and volume of information flow [72]. By using strong passwords to maintain control over IoT solutions, certain vulnerabilities in data networks can be eliminated. We consider that the perception of confidentiality has a positive impact on the extrinsic motivation of managers to use IoT solutions, thus testing the ninth hypothesis:
H9. 
Perceived Privacy has a significant impact on Extrinsic Motivation
Perceived Security (PS) indicates the degree to which a user of an IoT system considers that it would be protected from unauthorized access to the modification, destruction or disclosure of its resources or personal information during the processing, storage and transmission of data [71]. Since most IoT devices are wireless, this involves many security challenges such as forgery, network attacks, denial of service, intrusions, and so on [82,83,84,85] which causes a lot of damage [86]. Solutions have also been identified to increase trust in IoT devices by increasing security in business management by using symmetric keys, encryption or other ways to secure information [87]. We consider that the perception of security has a positive impact on the extrinsic motivation of managers to use IoT solutions, thus testing the tenth hypothesis:
H10. 
Perceived Security has a significant impact on Extrinsic Motivation
Behavioral Intention (BI). Specialists obtained positive results regarding the analysis of consumers’ intentions to buy IoT products using several factors such as: (1) connectivity, interactivity, telepresence, intelligence, convenience and security using functional experience as a variable [88]; (2) behavioral control, perceived pleasure [61]. We consider that extrinsic motivation has a significant impact on the behavioral intention of managers to use IoT solutions, thus testing the eleventh hypothesis:
H11. 
Extrinsic Motivation has a significant impact on Behavioral Intention to use IoT solutions
Intrinsic Motivation (IM) is defined as the performance of an activity for its inherent satisfaction (pleasure), rather than for a separate outcome [53], which reflects man’s natural willingness to assimilate and learn [75]. Specialist research has indicated the following increased intrinsic motivations related to: (1) employees’ willingness to create a positive mood, which leads to increased learning and knowledge exchange [51]; (2) strong motivation for self-learning and self-realization from a professional point of view [89]; (3) perception as a safer result of performing a task than in the case of extrinsic reasons being the only functional engine of performance [53,90]. We consider that intrinsic motivation has a significant impact on the behavioral intention of IoT solution users, thus testing the twelfth hypothesis:
H12. 
Intrinsic Motivation has a significant impact on Behavioral Intention to use IoT solutions
Extrinsic Motivation (EM) is defined as obtaining different results when performing an activity [75]. Achieving goals through extrinsic motivation consists of obtaining organizational rewards or benefits [51] but this behavior can only be temporary. The extrinsic rewards between the two motivators will be more relevant and can replace intrinsic motivation as the main goal for the involvement of a particular activity [91]. We consider that extrinsic motivation has a significant impact on the intrinsic motivation of managers to use IoT solutions, thus testing the thirteenth hypothesis:
H13. 
Extrinsic Motivation has a significant impact on Intrinsic Motivation

2.2. Methods

Quantitative marketing research aims to identify the opinions and motivations of Romanian managers on the use of IoT solutions, given the development of new skills needed in future professional activities. The initial UTAUT model included four constructions: performance expectation, effort expectation, social influence and facilitation conditions, being ideal in predicting the intention to accept and use new technologies and identify differences between users’ intentions to use an information system and subsequent use behavior [36]. Recent studies have developed and strengthened the UTAUT model and highlighted positive relationships between new elements and the intention to use the new IoT concept [19,92,93]. Most previous research on the influence of intrinsic and extrinsic motivation on behavioral intention to use has focused more on issues of autonomy, control, performance, and facilitation [10,40,50,53]. However, no study has analyzed the relationship between intrinsic and extrinsic motivation variables and the intention to use IoT solutions in the future by different types of managers. However, no study has analyzed the relationship between intrinsic and extrinsic motivation variables and the intention to use IoT solutions in the future by different types of managers. Intrinsic and extrinsic motivations that determine managers to engage in competition, to develop new working relationships, to get actively involved in work and achieve new performances, correlated with maintaining the confidentiality and security of personal data.
The research model proposed in Figure 1 divides the factors of the UTAUT model into two groups, joining new elements specific to motivation. Thus, in the first stage of the model is presented the action exerted by the exogenous variables Effort Expectancy (EE), Attitude Towards IoT (AT), Perceived Autonomy (PA), Perceived Competence (PC) and Perceived Relatedness (PR) on the Intrinsic Motivation factor (IM). In the second stage, Extrinsic Motivation (EM) knows the influence of latent factors: Performance Expectancy (PE), Social Influence (SI), Facilitating Conditions (FC), Perceived Privacy (PP) and Perceived Security (PS). The last stage shows the impact of exogenous variables intrinsic motivation and extrinsic motivation on Behavioral Intention to use IoT solutions (BI).

2.2.1. The Questionnaire

The questionnaire included a formalized set of 54 questions (47 content questions and 7 identification questions), specially designed to generate a new multidimensional model starting from the UTAUT elements [36]. Figure 1 shows the articles for the 13 latent variables included in the construct model. Effort Expectancy (EE) articles were adopted. Attitude Towards IoT (AT), Perceived Autonomy (PA), from the studies of authors Chen (2013), Economides (2017) and Wong (2002), while various new articles were introduced for Perceived Competence (PC) and Perceived Relatedness (PR) from Ryan (2000) and Karahanna (1999), respectively. For Performance Expectancy (PE), Social Influence (SI) and Facilitating Conditions (FC) were adapted from the research of Davis (2003), Venkatesh (2012) and Economides (2017). Other new measurement elements were introduced for Perceived Privacy (PP) and Perceived Security (PS) from material from Albalawi (2018) and Dong (2014). The items that measure Intrinsic Motivation (IM) and Extrinsic Motivation have been adapted for managers who intend to use IoT solutions in the future. Gender, age, education level, management level, work experience, industry and location were the moderators used in our study. Respondents were asked about their work experience, managerial position and plans or intentions to use IoT solutions in the future. The use of a self-administered online questionnaire required the construction of short, closed questions that were subsequently measured using the five-level Likert scale, from “1”—Strongly disagree to “5”—Strongly agree to “1”—Strongly disagree to “5”—Strongly agree.

2.2.2. Sample Selection

The testing of the thirteen working hypotheses involved the use of a known marketing method, namely the sample survey, which took place between 10 February and 30 June 2020. With a questionnaire response rate of approximately 34%, the sample finally included 416 respondents (62.74% men and 37.26% women), 48.80% of the subjects coming from the middle-level managers (general managers, branch managers and department managers) while only 14.42% belonging to the group of top-level managers (the board of directors, president, vice-president or CEO). Almost half of the respondents (48.32%) had more than 11 years of work experience.
They operate in various fields: discrete and process manufacturing (32.45), retail (24.28%), transportation and logistics (9.13%), automotive and consumer electronics (5.53%) and others (Table 1).

2.2.3. Methodology and Data Analysis

The collection of data and information necessary for the research was carried out using a questionnaire distributed by email to managers working in Romania. It was decided to use the online survey due to the multiple advantages offered: obtaining relevant information for marketing research in a convenient time, studying a large sample, low costs, convenience for the respondent (manager), flexibility in link identification that did not reach the email addresses from the initial list and the ease of collecting and processing the data necessary for the research [94]. The researched population was identified in the databases of the Romanian Chamber of Commerce and Industry, Romanian Entrepreneur Association and The Romanian Academic Society of Management (RASM), etc. In order to carry out the quantitative research in optimal conditions, a sampling base was built which included 1224 managers, each observation unit being randomly selected from the reference population. After being contacted and expressing their willingness to participate in the marketing research, managers completed the online questionnaire (Table 2).
The processing, analysis and interpretation of data and information provided by managers was performed using the software SPSS Statistics and SmartPLS3 Professional. To examine the structural model and measure the simultaneous influence between its latent variables, the collected data were tabulated in SPSS and analyzed using the structural equation modeling technique based on the partial least squares (PLS). Two major advantages were the basis for the option to use this exploratory technique, namely: fast and correct validation of reflective construct models [95] and increased efficiency compared to other regression techniques [96].

2.2.4. Questionnaire Validation and Preliminary Results

Because the success of any marketing research depends overwhelmingly on the quality of the questionnaire in its design, two criteria were taken into account: ensuring the management of the information necessary to substantiate the decisions and the characteristics of the respondents. The model obtained from the design process was analyzed by a team of specialists who have solid knowledge, are involved in IoT projects and support services. After eliminating the double, confusing or unnecessary questions, its pretesting was performed in all aspects, on a restricted sample of respondents, the best data operators and respecting the proposed methodology. The results of the pretesting of the questionnaire were analyzed very carefully, bringing the necessary improvements. After collection, the data were entered into the SPSS application to verify the correctness of the information provided by the respondents but also to eliminate the errors. Interactive data validation involves validating the questionnaire as soon as corrections have been made. Preliminary results (215 respondents in the previous period) for the latent variables—Attitude Towards IoT (CA = 0.839, AVE = 0.682), Perceived Autonomy (0.752, AVE = 0.673, Perceived Privacy (CA = 0.746, AVE = 0.639), Social Influence (CA = 0.773, AVE = 0.697), Intrinsic Motivation (CA = 0.783, AVE = 0.814)— indicated measures Cronbach’s alpha (CA) greater than 0.6 and Average Variance Extracted (AVE) greater than 0.5 [97]

3. Results and Discussions

For the proposed internal model, the values of the path coefficients were positive (Figure 2) except for those from Perceived Competence (PC) to Intrinsic Motivation (IM) and from Perceived Privacy (PP) to Extrinsic Motivation (EM) whose weights reflected negative paths of −0.010 and −0.004, respectively.
Being always standardized, the weights of the coefficients register variations between −1 and +1, their weights reflecting weaker or stronger ways [98]. Three strong effects are visible among the paths from Perceived Risk (PS) to Extrinsic Motivation (EM) (0.590), from Extrinsic Motivation (EM) to Intrinsic Motivation (IM) (0.344) and from Intrinsic Motivation (IM), respectively, to the Behavioral Intention (BI) (0.542).
In Figure 3 along with the standardized path coefficients, placed on the corresponding paths, the values of the R2 value for the three endogenous latent variables (factors) were displayed in the blue ellipses. The general measure of the effect size for the structural model, the R2 can register values “high” (R > 0.5), “moderate” (R > 0.30) or “weak” (R > 0.1) [98]. For the endogenous variable Behavioral Intention to Use Solutions IoT the value of the R2 indicates a high size (0.452), which means that almost 45.2% of its variation is explained by the model, by the common action of two factors (IM and EM). Five exogenous variables (EE, AT, PA, PC and PR) jointly explain approximately 53.8% of the variation of the endogenous Intrinsic Motivation (IM) factor. In the case of the Extrinsic Motivation (EM) factor, the value of the R2 was more substantial, with 63% of the variation of the endogenous variable being explained by five other exogenous variables (PE, SI, FC, PP and PS).
Measurement loads linking factors to indicator variables should generally be significant and range from 0 to 1 [99]. The proposed reflective model is strong and reliable, confirmed by the size of the standardized track loads which are greater than 0.70 and by their reliability which is over 0.50. [100]. Calculating the square of the incarnation of the measurements, it is observed that the reliability of all indicators connected to the latent variables EE, AT, PA, PC and PS registers values between 0.52 (0.721 ^ 2) and 0.86 (0.928 ^ 2). At the same time, the absolute contribution of the indicators used to define the latent variables PE, SI, FC, PP and PP indicates high loads, ranging from 0.50 (0.704 ^ 2) to 0.76 (0.874 ^ 2) [101].

3.1. The Measurement Model

Table 3 shows the results obtained after testing the convergent and discriminant validity for the construct model. Given that the research focuses on the PLS model, it was decided to test the convergent validity of the proposed reflective model by using primarily composite reliability, as an alternative to Cronbach’s alpha (CA) [100,102].
The arguments that strengthened this decision were mainly related to the Cronbach’s alpha (CA) indicator which cannot provide a real, perfect estimate of the reliability of the scale-built model. However, the Cronbach’s alpha values of each factor were higher than the threshold recommended by Nunnally [103], namely 0.7, so we can say that in this case, it could also confirm the reliability of the measurement model. Previous studies show that the composite reliability of reflective models must be equal to or greater than 0.6 for exploratory studies [103,104] equal to or greater than 0.70 for confirmatory constructs [105] and ≥ 0.80 for confirmatory research [106]. The composite reliability of the proposed construct is very high (> 0.80), a fact confirmed by the size of the indicators obtained by each latent variable. If the composite reliability of the Social Influence factor (0.823) slightly exceeds 0.8, that of the Intrinsic Motivation variable (0.910) approaches 1 (Figure 4).
Although it tends to underestimate reliability, Cronbach’s alpha can confirm the convergent validity of a construct model if the indicators for latent variables are ≥ 0.6 [107].
Six latent factors: BI (0.741), EM (0.717), FC (0.787), PA (0.757), PP (0.771) and SI (0.727) were measured at an acceptable level while the rest exceed the ≥ 0.8 limit set for an extremely good scale (Figure 5) [108]. Therefore, the proposed model fulfills the condition of convergent validity.
However, the Average Variance Extracted (AVE) remains the optimal indicator used to test convergent and divergent validity. In the case of reflective models, if the AVE levels of the latency factors exceed the recommended minimum threshold of 0.5 then the convergent validity is confirmed [98,107,109], otherwise, the explained variation is exceeded by the error variation [103,110]. In the present research, the exogenous factors PA (0.570) and SI (0.542) displayed the lowest AVE values but higher than the minimum limit of 0.5. At the opposite pole are the endogenous factors IM and EM whose size AVE was 0.834 and 0.778, respectively. The third endogenous BI factor indicated a moderate AVE of 0.662 (Figure 6). As all AVE values are higher than the minimum acceptable threshold of 0.5, it follows that the construct model meets the condition of convergent validity.
The determination of discriminant validity according to the Fornell–Larcker criterion is based on the same AVE indicator [110]. For each factor included in the model, the AVE square roots must be greater than their correlations with any other latent variable [111]. As can be seen in Table 4a,b, the AVE square roots calculated for the 13 factors are distributed in the diagonal cells and the correlations with the other variables are displayed below them.
The size of the square root of the AVE of the endogenous IM factor was 0.913, being superior to the correlation scores displayed vertically (0.913 > 0.372, 0.542, 0.574, 0.358, 0.533, 0.475 and 0.330) and horizontally (0.913 > 0.421, 0.558, 0.555, 0.543, 0.282). The correlations of the constructs AT (0.236), BI (0.382), EE (0.406), EM (0.473), FC (0.296), IM (0.330), PA (0.257), PC (0.354), PE (0.380), PP (0.288), PR (0.358) and PS (0.458) also became lower in relation to the AVE square root of the Social Influence factor (0.736). The highest AVE values were obtained by the latent variables IM (0.913) and EM (0.883), and the lowest by SI (0.736) and BI (0.750), respectively.
Therefore, the construct model fulfills the condition of discriminated validity, since the variation shared with its own block of indicators of each factor (construct) exceeds the variation it shares with any other latent variable. The standardized average residual square root (SRMR) indicates the relevance of the proposed model. If the difference between the observed correlation matrix and the implicit correlation matrix is less than 0.08 [112] or reaches a maximum of 0.10 [113] then the relevance is proven. The proposed model is good and relevant as the mean size of this difference (SRMR) was 0.072 (<0.80).
If the indicators load well on the intended variables, and the cross-loads with other latent variables that they are not intended to measure are low, then the reflective model fulfills the condition of discriminated validity. Previous studies indicate the existence of a simple factor structure in a constructed model provided that the expected loads are greater than 0.7 (some use 0.6) and the cross-loads are below 0.6 [114]. Table 4a shows the existence of simple structures of factors that strengthen the label significance of the other latent variables due to cross-loads below level 0.6. The BI factor displays substantial cross-loads with the IM indicator (IM1: 0.581 > 0.6; IM: 0.522 > 0.6) and optimal incarnations on its own items (BI1: 0.885 > 0.7; BI2: 0.831 > 0.7; BI3: 0.942 > 0.7). If each factor of the model indicates a lower correlation with any other latent variable than with itself, the model is valid. Thus, the loads of the endogenous IM factor on its own construction exceed the minimum acceptable threshold of 0.7 (IM1 (0.918); IM2 (0.908)); while significant cross-loads were identified by the indicators EM2 (0.572), EM1 (0563), PR1 (0544), PE4 (0.523) or less marked with SI3 (0.148), FC1 (0.169) and FC3 (0.166).
Similarly, the EM factor obtained high loads on EM1′s own articles (0.900): EM1 (0.864) and high cross-charges with IM2 (0.595); IM1 (0.580); PS4 (0.534) (Table 4b). Therefore, the discriminated validity condition was again met using cross-load size as an alternative to AVE.
The discriminated validity of a suitable model can be easily detected using the HTMT report. It expresses the ratio between the geometric average of the correlations of the indicators from the constructs that have the role of measuring different phenomena and the average of the correlations of the articles from the same construction [115]. Various studies have shown that for reflective models the HTMT value should be below 1.0 [116] or more strictly, be lower than 0.9 [117] or even 0.85 [118]. The results demonstrated maximum HTMT values between PE and PR (0.793) and minimum between PA and EE factors (0.268), conforming to the value threshold of 0.85 [119].
Multicollinearity in OLS regression is problematic if the variance inflation coefficient (VIF) is greater than 4.0 (some studies use a milder limit of 5.0) [112,117]. The reflective construct model also indicates very good multicollinearity, as the variance inflation coefficients (VIF) for each indicator, calculated with the OLS regression method, are lower than 4.0 [105]. VIF highs were reached by indicators AT2 (3117) and AT3 (3175), and lows of BI2 (1011), PA4 (1147), AT4 (1170) and PP4 (1210) (Figure 7).
The GoF size of 0.595 indicates, after evaluating the data sets, a good level of fit of the proposed measurement model, being located almost in the middle of the allowed range (between 0 and 1) [120]

3.2. The Structural Model

The use of PLS algorithms allowed the evaluation of the structural relationships between the model constructs and the testing of research hypotheses. Table 5 shows the results of the correlations between the construct variables, values of the structural coefficients Path (β) and t-value correspondence (T-Statistics). p-values, R2 and Q2, after using the Bootstrapping and Blindfolding options (per 1000 copies) within SmartPLS.
The evaluation of the structural model included three distinct stages. In the first stage, the impact of exogenous variables was evaluated: Effort Expectancy, Attitude Towards IoT, Perceived Autonomy, Perceived Competence and Perceived Relatedness on the endogenous factor Intrinsic Motivation. Path coefficients (β) highlight the intensity of the links between the construct variables and their size must vary between 0 and 1 [121]. Loads of PR (0.231 > 0), EE (0.175) and PA (0.123) pathways show positive but low correlations in relation to IM (Table 5). A negative correlation was identified between the latent variables PC and IM (β = −0.010 < 0). The calculation results for the correlations EE- > IM (2407), PA- > IM (2484) and PR- > IM (2031) indicate t-values over 1.96, significant at the probability level of 0.05. The situation is reconfirmed by p-values which once again highlights that the three paths are significant at a level higher than the probability level 0.001. The AT- > IM and PC-IM paths that showed t-values of 1.186 and 0.011 (< 1.96), respectively, are discordant, being insignificant at the level of 0.05.
The second stage aimed at determining the impact of the factors: Performance Expectancy (PE), Social Influence (SI), Facilitating Conditions (FC), Perceived Privacy (PP) and Perceived Security (PS) on Extrinsic Motivation (EM). In relation to the endogenous variable EM (Table 5) correlations were obtained: weak with the variables PP (−0.004 > 0) and FC (0.044), moderate with the factors SI (0.139), PE (0.136) but also high with PS - > MS (0.590 > 0). In this part of the construct the pathways PS - > EM (6.759 > 1.96), SI- > IM (3.426) and PR- > IM (2.301 > 1.96) proved to be positive and significant. Although insignificant, the PP -> EM (0.057) pathway indicates a negative impact compared to FC - > EM (0.968 < 1.96) which exerts an extremely weak but positive influence.
The third stage aimed at determining how intrinsic and extrinsic motivation influenced the behavioral intention to use IoT solutions by Romanian managers at work. Table 6 shows two strong correlations between the variables IM and BI (0.542) as well as between EM and IM (0.344) were. A positive but moderate correlation was identified between EM and BI (0.180 > 0). Of the three pathways linking endogenous variables, only two proved to be significant IM - > BI (5879 > 1.96) and EM - > IM (4149), respectively. Although the path between EM and BI (1,511) was positive, it remains insignificant as the t-value does not exceed the accepted threshold of 1.96 at a probability level of 0.05.
The coefficients of determination (R2) indicate that 63% of the variation of the EM factor and 53.8% of the variation of the IM, respectively, is explained by the proposed construct model (Table 6). No R2 quantities were generated for the rest of the elements, these being only exogenous latent factors [98,107]. As the adjusted R2 is very close to the R2 it follows that the predictors added to a regression model had a trivial correlation with the endogenous variable.
The endogenous factors BI (0.230), EM (0.462) and (0.422) modeled reflectively in this model obtained cross-redundancies (Stone–Gleisser value Q2) over 0, indicating its relevance to predict these factors [101,122,123,124]. Figure 8a–c below shows the distribution of path load coefficients for the routes of the model from IM to BI, EM to BI and EM to IM, showing all information contained in confidence intervals.

4. Conclusions

A new construct model was presented and validated, fulfilling the purpose of marketing research—identifying and analyzing the impact of factors in the spectrum of intrinsic and extrinsic motivations on the behavior of using IoT solutions among company managers in Romania in the future. A significant contribution was made both by developing the UTAUT construct model and by fulfilling the three objectives of our research. Thus, in assessing the extent to which exogenous variables had an impact on intrinsic motivation, it was shown that three out of five factors showed a positive and significant influence (Effort Expectancy (EE), Perceived Autonomy (PA) and Perceived Relatedness (PR)). At the same time, the direct and significant impact of the factors: Performance Expectancy (PE), Social Influence (SI) and Perceived Security (PS) on extrinsic motivation was illustrated. The positive and significant impact of the endogenous variable Intrinsic Motivation (IM) on the behavioral intention to use IoT solutions by managers of Romanian companies at work has been clearly demonstrated, even if that of Extrinsic Motivation remains only a positive one.
Corroborating the obtained results, the structural model explains 45.2% of the variance of the behavioral intention of Romanian managers to use IoT solutions at their workplace. In this context, eight of the thirteen hypotheses formulated were confirmed by empirical reality (H1, H3, H5, H6, H7, H10, H12, H13). In the first stage, the exogenous variables EE (β = 0.175; p = 0.016) and PA (β = 0.123; p = 0.013) had a positive and significant impact on the endogenous IM factor, confirming the acceptance of hypotheses H1 and H3. The construct model indicates a high empirical correlation (0.778) between the ease of understanding/understanding how to monitor, control and use IoT solutions (EE4) and the feeling of closeness to colleagues and business partners (PR1). On the other hand, there is a moderate positive empirical correlation (0.488) between the feeling that the use of IoT solutions will allow them to better coordinate workplace activities (PA2) and the exchange of ideas through the IoT partner community (FC1).
Another result of the analysis confirms the null hypothesis (H5) according to which Perceived Relatedness (PR) has a significant but strong impact on Intrinsic Motivation (β = 0.231, p = 0.043). Another significant and strong correlation was identified between the feelings of being well listened to by colleagues and partners (PR1) and the feelings of involvement, pleasure and satisfaction (IM1) (0.732). Unlike the other factors, the variable PC (β = −0.010) does not exert any impact on MI, while the exogenous factor AT (β = 0.079, 1.186 < 1.96) shows a positive but insignificant impact. Our finding on the impact of latent EE, PA and PR variables on MI has been fully supported by other previous research [125,126].
In the second stage, the impact of the latent variables PE (β = 0.136; p = 0.024) and SI (β = 0.139; p = 0.001) on the exogenous factor EM was significant, reason for which the null hypotheses H6 and H7 were accepted. Given the use of IoT solutions by managers, the variable (PE4) that supports the acquisition of new interpersonal skills in programming shows a strong correlation (0.870) to the contribution to personal success (EM1). A positive but moderate correlation (0.558) was found between the help provided by the community in finding the best IoT solutions (SI2) and the recognition of personal achievements (EM2). At the level of the entire researched population, the Performance Security factor (PS) has a significant, strong impact (β = 0.590; p = 0.000) on the endogenous variable Extrinsic Motivation (EM). The strongest correlation, given the use of IoT solutions by managers, was found between the risk of cyberattacks on personal data (PS1) and the sense of contribution to professional success (EM1). The exogenous variable FC showed a positive and insignificant impact (0.960 < 1.96) on Extrinsic Motivation. The second negative impact of the construct was displayed between the latent variables Perceived Privacy (PP) and Extrinsic Motivation (EM). The influence of PE, SI and PS factors has been highlighted by other previous studies [127,128].
In the last stage of the construct model, the null hypotheses H12 and H13 were confirmed. Thus, the endogenous variable Extrinsic Motivation (EM) has a positive and strong impact on Intrinsic Motivation (IM) (β = 0.344, p = 0.000). Given the use of IoT solutions by managers, two strong correlations were found, the first (0.718) between recognition of personal achievements (EM2) and easy mastery of work tasks (IM2) and the second (0.663) between the feeling of contribution to my success (EM1) and that of involvement, pleasure and satisfaction (IM1).
The endogenous Intrinsic Motivation (IM) factor has a significant and strong impact on the variable Behavioral Intention to Use IoT solutions (BI) (β = 0.542, p = 5.879 > 1.96). Two other strong correlations are identified between the prediction of using IoT solutions in the future (BI3) and (0.666) the feeling of involvement, pleasure and satisfaction (IM1) and (0.703) the ability to easily master any task (IM2).
Regarding the impact of Extrinsic Motivation (EM) on Behavioral Intention to Use IoT solutions (BI), the alternative hypothesis was accepted (β = 0.180, p = 1.511 < 1.96), this impact being positive but insignificant. The influence exerted by the three exogenous variables Extrinsic Motivation (EM), Intrinsic Motivation (IM) and Behavioral Intention to Use (BI) have been the subject of numerous previous studies [19,94].
The results of this study have important and very useful implications for managers in Romania and also for those in other countries, regardless of the sectors of activity where they work, experience or location, highlighting the factors that should be considered and their impact. on the intrinsic and extrinsic motivation in substantiating the decisions and strategies regarding the implementation and use of IoT solutions within one’s own activity, in order to improve future personal and business performance. A significant implication is the stimulation of intrinsic motivation due to the intention to use IoT solutions in the future. It is highlighted as a source of energy that pushes to action, an engine of the entire activity of managers, both personally and professionally, which aims to develop clear and concrete objectives such as: increasing the ability to monitor, control and use IoT solutions, identify new challenges and interact with the IoT ecosystem, identify options and opportunities for developing desired activities, reduce the number of decisions and achieve more efficient results, get involved in managing and designing your own IoT solutions, participate in specialized courses, closeness and involvement in new relationships with colleagues and business partners and much more.
Another significant implication that contributes to the support of extrinsic motivation is the need to recognize that the acceptance or intention to use IoT solutions in the next period, by managers, should be managed with objectives such as: increasing personal productivity, faster work tasks, facilitating the exchange of ideas in the IoT partner community, providing the necessary support for the use of IoT solutions; the use of strong passwords to increase the security of personal information and reduce the risks of information manipulation, protection through the use of encryption technologies and ensuring better confidentiality and security of personal and business information.
An in-depth presentation of the factors influencing intrinsic and extrinsic motivation as well as their impact on behavioral intention to use IoT solutions will allow researchers to design and develop new more or less elaborate construct models that include new latent variables and indicators, highlighting new behaviors following the acceptance and use of IoT solutions. The results presented are important, given that this study is exceptional, unique and cannot be compared with other studies in the motivational and behavioral spectrum conducted in other fields.
The marketing research carried out has several limitations. Among them, we mention: low response rate (34%) and the generation of self-selection among respondents specific to online surveys, the exclusion of the influence of demographic moderators (gender, age, education level, etc.). In the future, other exploratory studies could improve the UTAUT theory by introducing new, unexplored latent variables and by creating added value in the context of the smart technology revolution.

Author Contributions

Conceptualization, M.C.T. and S.C.; methodology, M.C.T.; validation, M.C.T. and D.I.T.; formal analysis, A.I.S., M.Ș.H. and L.F.S.; writing—Original draft preparation, M.C.T., S.C.; writing—Review and editing, S.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ammirato, S.; Sofo, F.; Felicetti, A.M.; Raso, C. A Methodology to Support the Adoption of IoT Innovation and Its Application to the Italian Bank Branch Security Context. Eur. J. Innov. Manag. 2019, 22, 146–174. [Google Scholar] [CrossRef]
  2. Li, S.; Da Xu, L.; Zhao, S. The Internet of Things: A Survey. Inf. Syst. Front. 2014, 17, 243–259. [Google Scholar] [CrossRef]
  3. Liang, X. Internet of Things and Its Applications in Libraries: A Literature Review. Libr. Hi Tech 2018, 38, 67–77. [Google Scholar] [CrossRef]
  4. CISCO. Internet of Things: At-a-Glance; CISCO: San Jose, CA, USA, 2016. [Google Scholar]
  5. Ferri, L.; Spano, R.; Tomo, A. Cloud Computing in High Tech Startups: Evidence from a Case Study. Technol. Anal. Strat. Manag. 2019, 32, 146–157. [Google Scholar] [CrossRef]
  6. Lu, Y.; Papagiannidis, S.; Alamanos, E. Exploring the Emotional Antecedents and Outcomes of Technology Acceptance. Comput. Hum. Behav. 2019, 90, 153–169. [Google Scholar] [CrossRef] [Green Version]
  7. Caldarelli, A.; Ferri, L.; Maffei, M. Expected Benefits and Perceived Risks of Cloud Computing: An Investigation Within an Italian Setting. Technol. Anal. Strat. Manag. 2016, 29, 167–180. [Google Scholar] [CrossRef]
  8. Gangwar, H.; Date, H.; Ramaswamy, R. Understanding Determinants of Cloud Computing Adoption Using an Integrated TAM-TOE Model. J. Enterp. Inf. Manag. 2015, 28, 107–130. [Google Scholar] [CrossRef]
  9. Lee, Y.; Lee, J.; Hwang, Y. Relating Motivation to Information and Communication Technology Acceptance: Self-Determination Theory Perspective. Comput. Hum. Behav. 2015, 51, 418–428. [Google Scholar] [CrossRef]
  10. Fagan, M.H.; Neill, S.; Wooldridge, B.R. Exploring the Intention to Use Computers: An Empirical Investigation of the Role of Intrinsic Motivation, Extrinsic Motivation, and Perceived Ease of Use. J. Comput. Inf. Syst. 2008, 48, 31–37. [Google Scholar]
  11. He, G.M. Analysis of the Application of the Internet of Things Technology in Environmental Monitoring. Appl. Mech. Mater. 2015, 733, 796–799. [Google Scholar] [CrossRef]
  12. Haller, S.; Karnouskos, S.; Schroth, C. The Internet of Things in an Enterprise Context. In Computer Vision; Springer Science and Business Media LLC: Berlin, Germany, 2009; pp. 14–28. [Google Scholar]
  13. Peoples, C.; Parr, G.; McClean, S.; Scotney, B.; Morrow, P. Performance Evaluation of Green Data Centre Management Supporting Sustainable Growth of the Internet of Things. Simul. Model. Pr. Theory 2013, 34, 221–242. [Google Scholar] [CrossRef]
  14. Weber, R.H. Internet of Things—New Security and Privacy Challenges. Comput. Law Secur. Rev. 2010, 26, 23–30. [Google Scholar] [CrossRef]
  15. Zhao, J.; Zheng, X.; Dong, R.; Shao, G. The Planning, Construction, and Management Toward Sustainable Cities in China Needs the Environmental Internet of Things. Int. J. Sustain. Dev. World Ecol. 2013, 20, 195–198. [Google Scholar] [CrossRef]
  16. Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. In Proceedings of the 10th International Conference on Frontiers of Information Technology, 17–19 December 2012, Islamabad, Pakistan; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2012; pp. 257–260. [Google Scholar]
  17. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  18. Kim, S.; Kim, S. A Multi-Criteria Approach Toward Discovering Killer IoT Application in Korea. Technol. Forecast. Soc. Chang. 2016, 102, 143–155. [Google Scholar] [CrossRef]
  19. Almetere, E.S.; Kelana, B.W.Y.; Abu Mansor, N.N. Using UTAUT Model to Determine Factors Affecting Internet of Things Acceptance in Public Universities. Int. J. Acad. Res. Bus. Soc. Sci. 2020, 10, 142–150. [Google Scholar] [CrossRef]
  20. Ashton, K. That ‘Internet of Things’ thing. RFID J. 1999, 22, 97. [Google Scholar]
  21. Borgia, E. The Internet of Things vision: Key features, Applications and Open Issues. Comput. Commun. 2014, 54, 1–31. [Google Scholar] [CrossRef]
  22. UN International Telecommunication Union (ITU). Yearb. United Nations 2005, 59, 1583–1584.
  23. RFID Global. Casagras-Final Report. An EU framewok on 7 project. Coordination and Support Action for Global RFID-related activities and Standardisation. Cluster of European Research Project Internet of Things. CERP-IoT Research Roadmap, Draft version V1.9, 15 September 2009, Casagras, EU.
  24. McKinsey & Company. The Internet of Things: Opportunities and Challenges for Semiconductor Companies. Available online: http://www.mckinsey.com/insights/innovation/internet-of-things-opportunities-and-challenges-for-semiconductor-companies, (accessed on 22 March 2017).
  25. Li, X.; Lu, R.; Liang, X.; Shen, X.; Chen, J.; Lin, X. Smart Community: An Internet of Things Application. IEEE Commun. Mag. 2011, 49, 68–75. [Google Scholar] [CrossRef]
  26. Solima, L.; Della-Peruta, M.R.; del Giudice, M. Object-Generated Content and Knowledge Sharing: The Forthcoming Impact of the Internet of Things. J. Knowl. Econ. 2015, 7, 738–752. [Google Scholar] [CrossRef]
  27. Mital, M.; Chang, V.; Choudhary, P.; Papa, A.; Pani, A.K. Adoption of Internet of Things in India: A Test of Competing Models Using a Structured Equation Modeling Approach. Technol. Forecast. Soc. Chang. 2018, 136, 339–346. [Google Scholar] [CrossRef]
  28. Lee, W.; Shin, S. An Empirical Study of Consumer Adoption of Internet of Things Services. Int. J. Eng. Technol. Innov. 2019, 9, 1–11. [Google Scholar]
  29. Andersson, P.; Mattsson, L.-G. Service Innovations Enabled by the “Internet of Things”. IMP J. 2015, 9, 85–106. [Google Scholar] [CrossRef]
  30. Walz, K. Stress Related Issue Due to Too Much Technology: Effects on Working Professionals. MBA Student Scholarship. 2012, 11, 3–2012. [Google Scholar]
  31. Winner, L. Three Paradoxes of the Information Age. In Culture on the Brink: Ideologies of Technolog; Bender, G., Druckery, T., Eds.; Bay Press Seattle: Seattle, WA, USA, 1994; pp. 191–197. [Google Scholar]
  32. Mick, D.G.; Fournier, S. Paradoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies. J. Consum. Res. 1998, 25, 123–143. [Google Scholar] [CrossRef]
  33. Johnson, D.S.; Bardhi, F.; Dunn, D.T. Understanding How Technology Paradoxes Affect Customer Satisfaction with Self-Service Technology: The Role of Performance Ambiguity and Trust in Technology. Psychol. Mark. 2008, 25, 416–443. [Google Scholar] [CrossRef]
  34. Malik, A.; Magar, A.T.; Verma, H.; Singh, M.; Sagar, P. A Detailed Study of an Internet of Things (IoT). Int. J. Sci. Technol. Res. 2019, 8, 2989–2994. [Google Scholar]
  35. Rachisan, P.R.; Berinde, S.-R.; Bota-Avram, C.; Groșanu, A. Bankruptcy Risk Forecasting for the Metallurgical Branch in Romania. METABK 2014, 53, 371–374. [Google Scholar]
  36. Venkatesh, V.; Morris, M.; Davis, G.; Davis, F. User Acceptance of Information Technology: Toward a Unified View. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef] [Green Version]
  37. Fishbein, M.; Ajzen, I. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research; Addison-Wesley: Reading, MA, USA, 1975. [Google Scholar]
  38. Davis, F. Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology. MIS Q. 1989, 13, 319–340. [Google Scholar] [CrossRef] [Green Version]
  39. Venkatesh, V.; Davis, F.D. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Manag. Sci. 2000, 46, 186–204. [Google Scholar] [CrossRef] [Green Version]
  40. Davis, F.D.; Bagozzi, R.P.; Warshaw, P.R. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. J. Appl. Soc. Psychol. 1992, 22, 1111–1132. [Google Scholar] [CrossRef]
  41. Ajzen, I.; Anderson, N. Theory of Planned Behavior. Encycl. Health Behav. 2012, 50, 179–211. [Google Scholar] [CrossRef]
  42. Thompson, R.L.; Higgins, C.A.; Howell, J.M. Personal Computing: Toward a Conceptual Model of Utilization. MIS Q. 1991, 15, 125. [Google Scholar] [CrossRef]
  43. Compeau, D.; Higgins, C.A.; Huff, S. Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study. MIS Q. 1999, 23, 145. [Google Scholar] [CrossRef]
  44. Moore, G.C.; Benbasat, I. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Inf. Syst. Res. 1991, 2, 192–222. [Google Scholar] [CrossRef]
  45. Lin, C.-P.; Bhattacherjee, A. Elucidating Individual Intention to Use Interactive Information Technologies: The Role of Network Externalities. Int. J. Electron. Commer. 2008, 13, 85–108. [Google Scholar] [CrossRef]
  46. Wang, Y.-S.; Wu, M.-C.; Wang, H.-Y. Investigating the Determinants and Age and Gender Differences in the Acceptance of Mobile Learning. Br. J. Educ. Technol. 2009, 40, 92–118. [Google Scholar] [CrossRef]
  47. van Raaij, E.M.; Schepers, J.J. The Acceptance and Use of a Virtual Learning Environment in China. Comput. Educ. 2008, 50, 838–852. [Google Scholar] [CrossRef]
  48. Lee, M.K.; Cheung, C.M.; Chen, Z. Acceptance of Internet-Based Learning Medium: The Role of Extrinsic and Intrinsic Motivation. Inf. Manag. 2005, 42, 1095–1104. [Google Scholar] [CrossRef]
  49. George, J.M.; Jones, G.R. Understanding and Managing Organizational Behaviour, 6th ed.; Prentice Hall: Upper-Saddle River, NJ, USA, 2012. [Google Scholar]
  50. Legault, L. Intrinsic and Extrinsic Motivation. In Encyclopedia of Personality and Individual Differences; Springer Science and Business Media LLC: Berlin, Germany, 2020; pp. 2416–2419. [Google Scholar]
  51. Lin, H.-F. Effects of Extrinsic and Intrinsic Motivation on Employee Knowledge Sharing Intentions. J. Inf. Sci. 2007, 33, 135–149. [Google Scholar] [CrossRef]
  52. Giancola, F.L. Should HR Professionals Devote More Time to Intrinsic Rewards? Compens. Benefits Rev. 2014, 46, 25–31. [Google Scholar] [CrossRef]
  53. Cerasoli, C.P.; Nicklin, J.M.; Ford, M.T. Intrinsic Motivation and Extrinsic Incentives Jointly Predict Performance: A 40-Year Meta-Analysis. Psychol. Bull. 2014, 140, 980–1008. [Google Scholar] [CrossRef] [PubMed]
  54. Jurkiewicz, C.L.; Massey, T.K.; Brown, R.G. Motivation in Public and Private Organizations: A Comparative Study. Public Prod. Manag. Rev. 1998, 21, 230. [Google Scholar] [CrossRef]
  55. Buelens, M.; Broeck, H.V.D. An Analysis of Differences in Work Motivation between Public and Private Sector Organizations. Public Adm. Rev. 2007, 67, 65–74. [Google Scholar] [CrossRef]
  56. Houston, D.J. Public-Service Motivation: A Multivariate Test. J. Public Adm. Res. Theory 2000, 10, 713–728. [Google Scholar] [CrossRef]
  57. Chen, K.-Y.; Chang, M.-L. User Acceptance of ‘Near Field Communication’ Mobile Phone Service: An Investigation Based on the ‘Unified Theory of Acceptance and Use of Technology’ Model. Serv. Ind. J. 2013, 33, 609–623. [Google Scholar] [CrossRef]
  58. Sumak, B.; Heričko, M.; Pusnik, M. A Meta-Analysis of E-Learning Technology Acceptance: The Role of User Types and E-Learning Technology Types. Comput. Hum. Behav. 2011, 27, 2067–2077. [Google Scholar] [CrossRef]
  59. Hsu, C.-L.; Lin, J.C.-C. Acceptance of Blog Usage: The Roles of Technology Acceptance, Social Influence and Knowledge Sharing Motivation. Inf. Manag. 2008, 45, 65–74. [Google Scholar] [CrossRef]
  60. Zhang, L.; Zhu, J.; Liu, Q. A Meta-Analysis of Mobile Commerce Adoption and the Moderating Effect of Culture. Comput. Hum. Behav. 2012, 28, 1902–1911. [Google Scholar] [CrossRef]
  61. Gao, L.; Bai, X. A Unified Perspective on the Factors Influencing Consumer Acceptance of Internet of Things Technology. Asia Pac. J. Mark. Logist. 2014, 26, 211–231. [Google Scholar] [CrossRef]
  62. Lunney, A.; Cunningham, N.R.; Eastin, M.S. Wearable Fitness Technology: A Structural Investigation into Acceptance and Perceived Fitness Outcomes. Comput. Hum. Behav. 2016, 65, 114–120. [Google Scholar] [CrossRef]
  63. Al-Momani, A.M.; Mahmoud, M.A.; Ahmad, S. Modeling the Adoption of Internet of Things Services: A Conceptual Framework. Int. J. Appl. Res. 2016, 2, 361–367. [Google Scholar]
  64. Boonsiritomachai, W.; Pitchayadejanant, K. Determinants Affecting Mobile Banking Adoption by Generation Y Based on the Unified Theory of Acceptance and Use of Technology Model Modified by the Technology Acceptance Model Concept. Kasetsart J. Soc. Sci. 2017, 2452–3151. [Google Scholar] [CrossRef]
  65. Patel, K.J.; Patel, H.J.; Estelami, H. Adoption of Internet Banking Services in Gujarat. Int. J. Bank Mark. 2018, 36, 147–169. [Google Scholar] [CrossRef]
  66. Sepasgozar, S.M.; Hawken, S.; Sargolzaei, S.; Foroozanfa, M. Implementing Citizen Centric Technology in Developing Smart Cities: A Model for Predicting the Acceptance of Urban Technologies. Technol. Forecast. Soc. Chang. 2019, 142, 105–116. [Google Scholar] [CrossRef]
  67. Lee, J.H.; Kim, J.H.; Choi, J.Y. The Adoption of Virtual Reality Devices: The Technology Acceptance Model Integrating Enjoyment, Social Interaction, and Strength of the Social Ties. Telemat. Inform. 2019, 39, 37–48. [Google Scholar] [CrossRef]
  68. Scherer, R.; Siddiq, F.; Tondeur, J. The Technology Acceptance Model (TAM): A Meta-Analytic Structural Equation Modeling Approach to Explaining Teachers’ Adoption of Digital Technology in Education. Comput. Educ. 2019, 128, 13–35. [Google Scholar] [CrossRef]
  69. Kim, K.-J. Interacting Socially with the Internet of Things (IoT): Effects of Source Attribution and Specialization in Human-IoT Interaction. J. Comput. Commun. 2016, 21, 420–435. [Google Scholar] [CrossRef] [Green Version]
  70. Liu, L.; Chen, W.; Solanas, A.; He, A. Knowledge, Attitude, and Practice About Internet of Things for Healthcare. In Proceedings of the 2017 International Smart Cities Conference, Wuxi, China, 14–17 September 2017; 2017; pp. 1–4. [Google Scholar] [CrossRef]
  71. Economides, A.A. User Perceptions of Internet of Things (IoT) Systems. Commun. Comput. Inf. Sci. 2017, 978, 3–20. [Google Scholar] [CrossRef]
  72. Wong, E.H.; Wiest, D.J.; Cusick, L.B. Perceptions of Autonomy Support, Parent Attachment, Competence and Self-Worth as Predictors of Motivational Orientation and Academic Achievement: An Examination of Sixth- and Ninth-Grade Regular Education Students. Adolescence 2002, 37, 255–266. [Google Scholar] [PubMed]
  73. Marchant, G.J.; Paulson, S.E.; Rothlisberg, B.A. Relations of Middle School Students’ Perceptions of Family and School Contexts Within Academic Achievement. Psychol. Sch. 2001, 38, 505–519. [Google Scholar] [CrossRef]
  74. Guay, F.; Boggiano, A.K.; Vallerand, R.J. Autonomy Support, Intrinsic Motivation, and Perceived Competence: Conceptual and Empirical Linkages. Pers. Soc. Psychol. Bull. 2001, 27, 643–650. [Google Scholar] [CrossRef] [Green Version]
  75. Ryan, R.M.; Deci, E.L. Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. Contemp. Educ. Psychol. 2000, 25, 54–67. [Google Scholar] [CrossRef]
  76. Kreijns, K.; Vermeulen, M.; van Acker, F.; van Buuren, H. Predicting Teachers’ Use of Digital Learning Materials: Combining Self-Determination Theory and the Integrative Model of Behaviour Prediction. Eur. J. Teach. Educ. 2014, 37, 465–478. [Google Scholar] [CrossRef]
  77. Karahanna, E.; Straub, D.W. The Psychological Origins of Perceived Usefulness and Ease-of-Use. Inf. Manag. 1999, 35, 237–250. [Google Scholar] [CrossRef]
  78. Lee, M.K.; Cheung, C.M.; Sia, C.L.; Lim, K.H. How Positive Informational Social Influence Affects Consumers’ Decision of Internet Shopping? In Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 4–7 January; Institute of Electrical and Electronics Engineers: Piscataway, NJ, USA, 2006; Volume 6, p. 115. [Google Scholar]
  79. Dong, X.; Chang, Y.; Wang, Y.; Yan, J. Understanding Usage of Internet of Things (IOT) systems in China. Inf. Technol. People 2017, 30, 117–138. [Google Scholar] [CrossRef]
  80. Venkatesh, V.; Thong, J.Y. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Q. 2012, 36, 157. [Google Scholar] [CrossRef] [Green Version]
  81. Wang, H.-Y.; Wang, S.-H. User Acceptance of Mobile Internet Based on the Unified Theory of Acceptance and Use of Technology: Investigating the Determinants and Gender Differences. Soc. Behav. Pers. Int. J. 2010, 38, 415–426. [Google Scholar] [CrossRef]
  82. Weinberg, B.D.; Milne, G.R.; Andonova, Y.G.; Hajjat, F. Internet of Things: Convenience vs. Privacy and Secrecy. Bus. Horiz. 2015, 58, 615–624. [Google Scholar] [CrossRef]
  83. Roman, R.; Zhou, J.; Lopez, J. On the Features and Challenges of Security and Privacy in Distributed Internet of Things. Comput. Netw. 2013, 57, 2266–2279. [Google Scholar] [CrossRef]
  84. Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and challenges. Wirel. Netw. 2014, 20, 2481–2501. [Google Scholar] [CrossRef]
  85. Waber, R.H. Internet of Things: Privacy issues Revisited. Comput. Law Secur. Rev. 2015, 31, 618–627. [Google Scholar] [CrossRef]
  86. Borgohain, T.; Kumar, U. A Survey on Security and Privacy Issues in Internet-of-Things. Int. J. Adv. Netw. Appl. 2015, 6, 2372–2378. [Google Scholar]
  87. AlBalawi, U.; Joshi, S. Secure and Trusted Telemedicine in Internet of Things IoT. In 2018 IEEE 4th World Forum on Internet of Things; IEEE: Berlin, Germany, 2018; pp. 30–34. [Google Scholar] [CrossRef]
  88. Chang, Y.; Dong, X.; Sun, W. Influence of Characteristics of the Internet of Things on Consumer Purchase Intention. Soc. Behav. Pers. Int. J. 2014, 42, 321–330. [Google Scholar] [CrossRef]
  89. Renko, M.; Kroeck, K.G.; Bullough, A. Expectancy Theory and Nascent Entrepreneurship. Small Bus. Econ. 2011, 39, 667–684. [Google Scholar] [CrossRef]
  90. Nasri, W.; Charfeddine, L. Motivating Salespeople to Contribute to Marketing Intelligence Activities: An Expectancy Theory Approach. Int. J. Mark. Stud. 2012, 4, 168. [Google Scholar] [CrossRef]
  91. Urdan, T. Book Review: Intrinsic Motivation, Extrinsic Rewards, and Divergent Views of Reality. Educ. Psychol. Rev. 2003, 15, 311–325. [Google Scholar] [CrossRef]
  92. Baudier, P.; Ammi, C.; Lecouteux, A. Employees’ Acceptance of the Healthcare Internet of Things: A Source of Innovation in Corporate Human Resource Policies. J. Innov. Econ. 2019, 30, 89–111. [Google Scholar] [CrossRef]
  93. Tran, T.D. An UTAUT Application-IoT Acceptance in Retail Digital Transformation. Available online: www.42gears.com (accessed on 20 December 2019).
  94. Evans, J.R.; Mathur, A. The Value of Online Surveys. Internet Res. 2005, 15, 195–219. [Google Scholar] [CrossRef]
  95. Mota, L.J.; Ramsden, A.E.; Liu, M.; Castle, J.D.; Holden, D.W. SCAMP3 Is a Component of the Salmonella-Induced Tubular Network and Reveals an Interaction Between Bacterial Effectors and Post-Golgi Trafficking. Cell. Microbiol. 2009, 11, 1236–1253. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  96. Bharati, P.; Zhang, W.; Chaudhury, A. Better Knowledge with Social Media? Exploring the Roles of Social Capital and Organizational Knowledge Management. J. Knowl. Manag. 2015, 19, 456–475. [Google Scholar] [CrossRef]
  97. Chin, W.W. How to Write up and Report PLS Analyses. In Handbook of Partial Least Squares: Concepts, Methods, and Applications; Esposito, V.V., Chin, W.W., Henseler, J., Wang, H., Eds.; Springer Handbook of Computational Studies; Springer: Manhattan, NY, USA, 2010; pp. 655–690. [Google Scholar]
  98. Sarstedt, M. A Review of Recent Approaches for Capturing Heterogeneity in Partial Least Squares Path Modelling. J. Model. Manag. 2008, 3, 140–161. [Google Scholar] [CrossRef]
  99. Ringle, C.M.; Wende, S.; Becker, J.-M. SmartPLS Boenningstedt: SmartPLS GmbH. Available online: http://www.smartpls.com (accessed on 22 June 2019).
  100. Henseler, J.; Ringle, C.M.; Sarstedt, M. Testing Measurement Invariance of Composites Using Partial Least Squares. Int. Mark. Rev. 2016, 33, 405–431. [Google Scholar] [CrossRef]
  101. Hair, J.F.; Hult, G.T.M.; Ringle, C.M.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling; Sage Publications: Thousand Oaks, CA, USA, 2014; pp. 3–32. [Google Scholar]
  102. Bagozzi, R.P.; Yi, Y. Advanced Topics in Structural Equation Models. In Advanced Methods of Marketing Research; Bagozzi R., P., Ed.; Blackwell: Oxford, UK, 1994; p. 151. [Google Scholar]
  103. Nunally, J.C. Psychometric Theory; McGraw Hill: New York, NY, USA, 1978; p. 640. [Google Scholar]
  104. Höck, C.; Ringle, C.M.; Sarstedt, M. Management of Multi-Purpose Stadiums: Importance and Performance Measurement of Service Interfaces. Int. J. Serv. Technol. Manag. 2010, 14, 188. [Google Scholar] [CrossRef]
  105. Henseler, J.; Sarstedt, M. Goodness-of-Fit Indices for Partial Least Squares Path Modeling. Comput. Stat. 2013, 28, 565–580. [Google Scholar] [CrossRef] [Green Version]
  106. Daskalakis, S.; Mantas, J. Evaluating the Impact of a Service-Oriented Framework for Healthcare Interoperability. In eHealth Beyond the Horizon—Get IT here: Proceedings of MIE 2008; Anderson, S.K., Klein, G.O., Schulz, S., Aarts, J., Mazzoleni, M.C., Eds.; IOS Press: Amsterdam, The Netherlands, 2008; pp. 285–290. [Google Scholar]
  107. Höck, M.; Ringle, C.M. Local Strategic Networks in the Software Industry: An Empirical Analysis of the Value Continuum. Int. J. Knowl. Manag. Stud. 2010, 4, 132. [Google Scholar] [CrossRef]
  108. Ringle, C.M.; Sarstedt, M.; Straub, D.W. A Critical Look at the Use of PLS-SEM. MIS Q. 2012, 36, iii. [Google Scholar] [CrossRef] [Green Version]
  109. Davies, A.M.C. Uncertainty Testing in PLS Regression. Spectrosc. Eur. 2001, 13, 16–19. [Google Scholar]
  110. Fornell, C.; Larcker, D.F. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  111. Henseler, J. On the Convergence of the Partial Least Squares Path Modeling Algorithm. Comput. Stat. 2009, 25, 107–120. [Google Scholar] [CrossRef] [Green Version]
  112. Hu, L.; Bentler, P.M. Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives. Struct. Equ. Model. Multidiscip. J. 1999, 6, 1–55. [Google Scholar] [CrossRef]
  113. Henseler, J.; Dijkstra, T.K.; Sarstedt, M.; Ringle, C.M.; Diamantopoulos, A.; Straub, D.W.; Ketchen, D.J.; Hair, J.F.; Hult, G.T.M.; Calantone, R.J. Common Beliefs and Reality About Partial Least Squares: Comments on Rönkkö & Evermann (2013). Organ. Res. Methods 2014, 17, 182–209. [Google Scholar]
  114. Cenfetelli, R.T.; Bassellier, G. Interpretation of Formative Measurement in Information Systems Research. MIS Q. 2009, 33, 689. [Google Scholar] [CrossRef]
  115. Henseler, J.; Ringle, C.M.; Sarstedt, M. A New Criterion for Assessing Discriminant Validity in Variance-Based Structural Equation Modeling. J. Acad. Mark. Sci. 2014, 43, 115–135. [Google Scholar] [CrossRef] [Green Version]
  116. Gold, A.H.; Malhotra, A.; Segars, A.H. Knowledge Management: An Organizational Capabilities Perspective. J. Manag. Inf. Syst. 2001, 18, 185–214. [Google Scholar] [CrossRef]
  117. Teo, T.S.H.; Srivastava, S.C.; Jiang, L. Trust and Electronic Government Success: An Empirical Study. J. Manag. Inf. Syst. 2008, 25, 99–132. [Google Scholar] [CrossRef]
  118. Clark, L.A.; Watson, D. Constructing Validity: Basic Issues in Objective Scale Development. Psychol. Assess. 1995, 7, 309–319. [Google Scholar] [CrossRef]
  119. Kline, R.B. Principles and Practice of Structural Equation Modeling, 3rd ed.; Guilford Press: New York, NY, USA, 2011. [Google Scholar]
  120. Tenenhaus, M.; Vinzi, V.E.; Chatelin, Y.-M.; Lauro, C. PLS Path Modeling. Comput. Stat. Data Anal. 2005, 48, 159–205. [Google Scholar] [CrossRef]
  121. Urbach, N.; Ahlemann, F. Structural Equation Modeling in Information Systems Research Using Partial Least Squares. J. Inf. Technol. Theory 2010, 11, 5–36. [Google Scholar]
  122. Stone, M. Cross-Validatory Choice and Assessment of Statistical Predictions. J. R. Stat. Soc. 1974, 36, 111–133. [Google Scholar] [CrossRef]
  123. Geisser, S. A Predictive Approach to the Random Effects Model. Biometrika 1974, 61, 101–107. [Google Scholar] [CrossRef]
  124. Martín-Ruiz, D.; Gremler, D.D.; Washburn, J.H.; Cepeda-Carrion, G. Reframing Customer Value in a Service-Based Paradigm: An Evaluation of a Formative Measure in a Multi-industry, Cross-cultural Context. In Handbook of Partial Least Squares; Springer Science and Business Media LLC: Berlin, Germany, 2009; pp. 535–566. [Google Scholar]
  125. Mukhtar, F.; Muis, K.; Elizov, M. Relations between Psychological Needs Satisfaction, Motivation, and Self-Regulated Learning Strategies in Medical Residents: A cross-sectional Study. MedEdPublish 2018, 7. [Google Scholar] [CrossRef] [Green Version]
  126. Chen, X.; Fang, S.; Li, Y.; Wang, H. Does Identification Influence Continuous E-Commerce Consumption? The Mediating Role of Intrinsic Motivations. Sustainability 2019, 11, 1944. [Google Scholar] [CrossRef] [Green Version]
  127. Cho, Y.J.; Perry, J. Intrinsic Motivation and Employee Attitudes Role of Managerial Trustworthiness, Goal Directedness, and Extrinsic Reward Expectancy. Rev. Public Pers. Adm. 2012, 32, 382–406. [Google Scholar] [CrossRef]
  128. Rönkkö, M.; Evermann, J. A Critical Examination of Common Beliefs About Partial Least Squares Path Modeling. Organ. Res. Methods 2013, 16, 425–448. [Google Scholar] [CrossRef]
Figure 1. Model construct.
Figure 1. Model construct.
Applsci 10 06905 g001
Figure 2. Path coefficients for the inner model.
Figure 2. Path coefficients for the inner model.
Applsci 10 06905 g002
Figure 3. Partial least squares (PLS) algorithm results.
Figure 3. Partial least squares (PLS) algorithm results.
Applsci 10 06905 g003
Figure 4. Composite reliability.
Figure 4. Composite reliability.
Applsci 10 06905 g004
Figure 5. Cronbach’s alpha.
Figure 5. Cronbach’s alpha.
Applsci 10 06905 g005
Figure 6. Average Variance Extracted (AVE).
Figure 6. Average Variance Extracted (AVE).
Applsci 10 06905 g006
Figure 7. The variance inflation factor (VIF).
Figure 7. The variance inflation factor (VIF).
Applsci 10 06905 g007
Figure 8. Distribution of load coefficients.
Figure 8. Distribution of load coefficients.
Applsci 10 06905 g008
Table 1. Sample structure.
Table 1. Sample structure.
DimensionsFrequencyPercentage
GenderMale26162.74
Female15537.26
AgeBetween 20 and 30 years5312.74
Between 31 and 40 years10425.00
Between 41 and 50 years15136.30
Between 51 and 60 years8019.23
Upper 60 years286.73
Education LevelPrimary education184.33
High school6014.42
University21451.44
Master/PhD11928.61
Other51.20
Management LevelTop-Level Management6014.42
Middle-Level Management20348.80
Lower-Level Management15336.78
Work ExperienceLess than 5 years286.73
Between 5 and 10 years18744.95
Between 11 and 16 years12931.01
More than 16 years7217.31
IndustryAutomotive and Consumer Electronics 235.53
Healthcare and Hospitality122.88
Retail10124.28
Discrete and Process Manufacturing13532.45
Finance services163.85
Energy and Natural Resources71.68
Communications133.13
Transportation and Logistics5914.18
Construction and Utilities389.13
Agriculture/Agrotech/farming92.16
Other30.72
LocationAB71.68
AR102.40
AG122.88
BC92.16
BH61.44
BN71.68
BT40.96
BV30.72
BR112.64
B11427.40
BZ51.20
CS61.44
CL20.48
CJ174.09
CT112.64
CV61.44
DB51.20
DJ92.16
GL133.13
GR51.20
GJ10.24
HR30.72
HD40.96
IL92.16
IS51.20
IF276.49
MM92.16
MH30.72
MS81.92
NT51.20
OT71.68
PH163.85
SJ10.24
SM30.72
SB133.13
SV51.20
TR20.48
TM153.61
TL30.72
VS71.68
VL20.48
VN61.44
Total416100
Table 2. Questionnaire.
Table 2. Questionnaire.
ItemsQuestions
Effort Expectancy (EE)(EE1) Learning how to use IoT solutions would be easy for me
(EE2) I think I could easily use IoT solutions
(EE3) My interaction with IoT solutions would be clear and easy to understand
(EE4) I think it would be easy for me to become proficient in monitoring, controlling and using IoT solutions
Attitude Towards IoT (AT)(AT1) Using robust IoT solutions will make my job a lot easier
(AT2) I am interested in understanding and using IoT solutions
(AT3) I like to use IoT solutions because they involve many challenges
(AT4) I am happy when I use IoT solutions because it allows me to monitor and control the ecosystem
Perceived Autonomy (PA)(PA1) Using IoT solutions, I will have new options and opportunities for developing the desired activities
(PA2) I feel that using IoT solutions will allow me to better coordinate activities at work
(PA3) Using IoT solutions can reduce the number of decisions I have to make to get optimal results
(PA4) By using IoT solutions, I have the freedom to monitor and control a wide range of devices remotely
Perceived
Competence (PC)
I think I’m pretty good at connecting devices and using IoT solutions
I think I have the skills to build IoT solutions if I attend specific courses;
I think I am quite good at getting involved in a programming project on the development of IoT solutions in the future
I think I’m good at managing IoT solutions
Perceived Relatedness (PR)(PR1) When I use IoT solutions, I feel closer to my colleagues and business partners
PR2 When I use IoT solutions, I feel better understood by colleagues and business partners
PR4 When I use IoT solutions, I am better listened to by colleagues and business partners
PR4 When I use IoT solutions, I feel more connected to colleagues and business partners
Intrinsic Motivation (IM)(IM1) When I use IoT solutions, I feel involvement, pleasure and satisfaction
(IM2) When I use IoT solutions, I can easily master any task
Performance Expectancy (PE)(PE1) IoT solutions are useful both for my daily life and for my job
(PE2) IoT solutions help me quickly accomplish work tasks
(PE3) IoT solutions would increase the productivity of my work
(PE4) IoT solutions allow me to acquire new interpersonal skills in programming with a direct impact on increasing my morale
Facilitating Conditions (FC)(FC1) To use IoT solutions, they have all the necessary resources: skills and knowledge
(FC2) I have the necessary knowledge to use IoT solutions (IoT Developer Guide and/or exploring classical/online learning modules)
(FC3) Using IoT solutions are useful for exchanging ideas in the IoT partner community
(FC4) I benefit of IoT consulting and technical support
Social Influence (SI)(SI1) People who are important to me have given me useful tips and information about using IoT solutions
(SI2) People who are important to me have helped me find the best IoT solutions
(SI3) People who are important to me have given me the support I need to use IoT solutions
(SI4) People who are important to me believe that I have the skills to become a partner in providing IoT solutions
Perceived Privacy (PP)(PP1) When I use IoT solutions, I feel that other systems would have control over my work
(PP2) When I use IoT solutions, I feel that there are certain risks when it comes to manipulating information
(PP3) When I use IoT solutions, from reputable manufacturers I feel that my information is safe/secure
(PP4) When I use strong password-protected IoT solutions, I have the security of my information
Perceived Security (PS)(PS1) When I use IoT solutions, I feel protected by unauthorized access to other systems
(PS2) When I use IoT solutions, additional methods of verifying my access are used
(PS3) When I use IoT solutions, I feel protected by the use of encryption technologies
(PS4) When I use IoT solutions, the website has a data security policy through which it assumes responsibility
Extrinsic Motivation (EM)(EM1) When I use IoT solutions, I feel that I contribute to my success
(EM2) When I use IoT solutions, I feel the recognition of personal achievements
Behavioral Intention (BI)(B1) I intend to use IoT solutions in the future
(B2) I plan to use IoT solutions in the future/year
B3) I foresee the use of IoT solutions in the future
Table 3. Construct reliability and validity.
Table 3. Construct reliability and validity.
Latent VariablesCronbach’s Alpha (CA)Composite ReliabilityAverage Variance Extracted (AVE)
AT0.8000.8720.639
BI0.7410.8450.662
EE0.8550.8990.690
EM0.7170.8750.778
FC0.7870.8610.609
IM0.8020.9100.834
PA0.7570.8410.570
PC0.8060.8740.637
PE0.8480.8900.670
PP0.7710.8560.602
PR0.8140.8750.636
PS0.8390.8880.666
SI0.7270.8230.542
Table 4. Fornell–Larcker criterion and Cross loading.
(a) Fonell-Larcker criterion.
(a) Fonell-Larcker criterion.
ATBIEEEMFCIMPAPCPEPPPRPSSI
AT0.800
BI0.3540.750
EE0.4080.4420.830
EM0.3940.5290.5030.882
FC0.2380.3620.2710.3830.780
IM0.4210.5580.5550.5430.2820.913
PA0.2610.3650.2440.3200.3510.3720.755
PC0.4170.5340.5520.5120.3490.5420.3870.798
PE0.4720.5060.5830.5630.3420.5740.2580.5390.819
PP0.2390.4190.3740.4910.2620.3580.2520.5960.5150.776
PR0.4630.5590.5570.5300.3460.5330.3420.5880.5250.5930.798
PS0.3720.5640.5940.5770.4270.4750.2890.5150.5820.5080.5630.816
SI0.2360.3820.4060.4730.2960.3300.2570.3540.3800.2880.3580.4580.736
(b) Cross loading.
(b) Cross loading.
ATBIEEEMFCIMPAPCPEPPPRPSSI
AT10.7640.2880.2580.2010.2380.2570.1340.3420.3150.1850.3130.2650.216
AT20.9040.2800.3260.3390.1790.3430.1670.3360.3820.1710.3580.2690.236
AT30.9280.3330.4400.4810.2000.4580.1950.4140.4190.2500.4180.4380.173
AT40.8430.2260.2210.1150.1670.2190.4270.2040.2130.1390.2090.1370.146
BI10.2940.8850.3600.4440.3800.4050.3110.4990.4180.4680.4120.4620.426
BI20.2440.8310.3410.2800.0530.3340.1900.0210.3910.0830.0460.1410.091
BI30.3480.9420.4400.3720.2990.4490.3490.4880.4260.3230.5150.4100.295
EE10.2200.2650.7850.2550.1630.3770.1690.5010.4450.2850.4930.4340.211
EE20.2820.3460.8540.2870.1690.3760.1860.5480.4640.3230.5370.4740.285
EE30.2890.3930.8400.2440.2130.3690.1740.5490.4170.2800.4940.4250.333
EE40.4760.4280.8410.2010.3040.3200.2510.5600.5620.3380.5150.5830.449
EM10.4520.4550.4320.9000.3780.5630.2870.4800.3830.4650.5460.5880.494
EM20.2270.4800.3440.8640.2930.5720.2780.4210.4730.3970.4540.5690.331
FC10.1920.2380.1890.2630.7490.1680.2170.2560.2130.2260.2250.2940.238
FC20.1980.3290.1930.3130.8260.2400.2540.2580.2660.1530.2640.3360.216
FC30.1840.2430.1770.2320.7040.1660.2870.1980.2350.1600.2340.2650.211
FC40.1770.3080.2700.3640.8330.2800.3310.3510.3350.2680.3380.4110.259
IM10.4680.5810.5730.5800.2740.9180.3340.5500.5320.3630.5710.4960.366
IM20.2960.6220.4300.5950.2410.9080.3450.4380.4100.2890.4800.3680.232
PA10.1870.2010.1480.1790.2120.2120.7550.1960.1280.1680.1440.1400.207
PA20.2060.2610.1660.2030.2270.2600.8140.2060.1610.0970.1680.1570.198
PA30.1740.2020.1110.1920.2600.2280.7250.2170.1840.0980.2490.1670.137
PA40.2090.3710.2610.3340.3220.3650.7210.4520.2610.3260.3910.3350.218
PC10.3230.3680.5730.3990.3040.4240.3190.7680.5650.4930.5100.5300.252
PC20.3870.4740.5070.4390.3250.4510.3630.8610.5960.5550.5130.5800.328
PC30.3520.5270.5350.3800.3120.4680.3290.8750.5030.4610.4990.4940.328
PC40.2600.3170.3510.4250.1600.3840.2120.8730.3620.3880.4710.3450.213
PE10.2490.2900.4450.3500.1960.3270.1690.4830.7400.4660.5160.5680.183
PE20.3450.3970.4820.3960.2390.3910.2140.5390.8350.5460.4940.6250.257
PE30.3420.4460.4440.3750.2980.3980.2230.5380.8200.5130.5610.5860.285
PE40.4030.4780.5220.3980.3390.5230.2300.5440.8740.5120.5230.5270.419
PP10.1510.2930.3550.3580.2080.3170.2020.4780.5180.7580.5030.4910.170
PP20.1730.3600.3170.4210.2360.2690.2460.4830.5040.8500.5040.5670.262
PP30.2150.4420.3250.3830.2700.3080.2140.5200.5170.8570.5170.5090.296
PP40.2030.1860.1530.3510.0860.2130.1080.3590.3570.7140.2990.2970.154
PR10.4500.4790.5600.3550.2940.5440.2960.5060.4140.3870.7790.5390.387
PR20.2680.3290.4930.3450.2240.4080.2210.4010.5370.4640.7670.5510.161
PR30.3490.4440.5270.4080.2590.4480.2810.5490.4120.5510.8330.4300.243
PR40.3630.5020.4930.3740.3120.4460.2750.4590.5810.5230.8100.5900.293
PS10.4160.4920.5130.4620.3360.5360.2500.4910.5910.4760.5310.8390.465
PS20.1640.3250.4510.4550.2840.2620.1520.4670.5620.4690.5730.7470.245
PS30.2770.4630.4910.5370.3590.3220.2480.5320.5430.5430.4510.8400.350
PS40.2750.5310.4730.5340.4200.3280.2760.5310.6280.5180.5370.8340.368
SI10.1840.2960.2840.3260.2670.2230.1620.2880.2820.2200.2630.3730.767
SI20.2790.3070.3700.4980.2330.3390.2200.3030.3700.2050.3390.4000.872
SI3-0.0410.2240.1640.1860.1030.1480.1010.1350.1270.1780.1190.2170.717
SI40.1450.3040.3300.2740.2490.1980.2600.2830.2670.2770.2720.3210.862
Table 5. Results.
Table 5. Results.
HypothesisCorrelationβT-Statisticsp-ValuesDecision
H1EE - > IM0.1752.4070.016Supported
H2AT - > IM0.0791.1860.236No Supported
H3PA - > IM0.1232.4840.013Supported
H4PC - > IM−0.0100.1100.912No Supported
H5PR - > IM0.2312.0310.043Supported
H6PE - > EM0.1362.7930.024Supported
H7SI - > EM0.1393.4260.001Supported
H8FC - > EM0.0440.9680.333No Supported
H9PP - > EM−0.0040.0570.954No Supported
H10PS - > EM0.5906.7590.000Supported
H11EM - > BI0.1801.5110.131No Supported
H12EM - > IM0.3444.1490.000Supported
H13IM - > BI0.5425.8790.000Supported
Table 6. The size of the coefficients of determination (R2) and cross-redundancies (Q2).
Table 6. The size of the coefficients of determination (R2) and cross-redundancies (Q2).
R2R2 Adjusted
BI0.4520.4490.230
EM0.6300.6250.462
IM0.5380.5310.422

Share and Cite

MDPI and ACS Style

Tűrkeș, M.C.; Căpușneanu, S.; Topor, D.I.; Staraș, A.I.; Hint, M.Ș.; Stoenica, L.F. Motivations for the Use of IoT Solutions by Company Managers in the Digital Age: A Romanian Case. Appl. Sci. 2020, 10, 6905. https://doi.org/10.3390/app10196905

AMA Style

Tűrkeș MC, Căpușneanu S, Topor DI, Staraș AI, Hint MȘ, Stoenica LF. Motivations for the Use of IoT Solutions by Company Managers in the Digital Age: A Romanian Case. Applied Sciences. 2020; 10(19):6905. https://doi.org/10.3390/app10196905

Chicago/Turabian Style

Tűrkeș, Mirela Cătălina, Sorinel Căpușneanu, Dan Ioan Topor, Adela Ioana Staraș, Mihaela Ștefan Hint, and Laurentiu Florentin Stoenica. 2020. "Motivations for the Use of IoT Solutions by Company Managers in the Digital Age: A Romanian Case" Applied Sciences 10, no. 19: 6905. https://doi.org/10.3390/app10196905

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop