Promoting Information Privacy Protection Awareness for Internet of Things (IoT)

e Internet of ings (IoT) has had a considerable inuence on our daily lives by enabling enhanced connection of devices, systems, and services that extends beyondmachine-to-machine interactions and encompasses a wide range of protocols, domains, and applications. However, despite privacy concerns shown by IoT users, little has been done to reduce and protect individual information exposure. It is extremely dicult to mitigate IoTdevices from reidentication threats which is why it is still a major challenge for IoTusers to securely protect their information.e trust controls how we regulate privacy in our IoTplatforms in the same way that it governs personal relationships. As IoTdevices become increasingly linked, more data is shared across individuals, businesses, governments, and ecosystems. Technologies, sensors, machines, data, and cloud connections all rely largely on trust relationships that have been formed. With the rapid growth of additional types of IoT devices that are being introduced, it, therefore, expands privacy concerns and is dicult to develop trust with an IoT system or device without the option to regulate information privacy settings. Privacy has always been a barrier for many devices as they race for the early adoption of IoT technologies. Several Internet of ings devices or systems will continue to pose privacy threats. As a result, the main objective of this study was to examine the individual understanding of privacy and to promote information privacy protection awareness not only to IoT users but also to organizations that use IoT devices or platforms to run their day-to-day business operations. Furthermore, the objective extends to compare user knowledge and concerns about IoTprivacy, as well as to identify any common attitudes and variances. However, in terms of enhancing individuals’ knowledge, an artifact was developed to educate and enhance information privacy awareness among IoTusers. A preand postquestionnaire was generated to test and validate user knowledge regarding information privacy protection in IoT. e study was conducted using a quantitative research method. Findings indicate that IoTusers’ awareness of information privacy protection turned out to be average, suggesting a need for education and awareness. Several participants stated that information privacy protection awareness is required within the community to educate, raise awareness, eliminate human error, and enable individuals to be conscious of their privacy when surng the Internet.


Introduction
e Internet of ings (IoT) envisions the networking of billions to trillions of smart items around us that are uniquely identi ed and addressable everyday things capable of collecting, storing, processing, and communicating information about themselves and their physical surroundings. IoT systems will provide sophisticated services of a whole new sort based on progressively ne-grained data collecting in a densely populated ecosystem of smart objects. Pervasive healthcare, enhanced building management systems, smart city services, public surveillance, data collection, and participatory sensing applications are examples of IoT systems. IoT is evolving as an Internet-based industrial information architecture used to simplify information flows among several platforms including supply chain networks. IoT is important in supply chain management because it streamlines supply chain operations, provides real-time information, and tracks business activities at multiple levels. Many new prospects for integrating IoT to several platforms exist today or might be anticipated soon. In order to fulfill these demands, IoT and its relevant supporting platforms must be swiftly established and designed in such a way that will promote information privacy protection. e collecting, processing, and distribution of data amid people's private lives are becoming increasingly invisible, dense, and ubiquitous, raising severe privacy issues. Ignorance of these concerns might have unintended repercussions, such as nonacceptance and failure of new services, reputational harm, or costly litigation cases. Even if people are privacy conscious, the so-called privacy paradox demonstrates that they do not act in accordance with their stated beliefs [1]. One of the key challenges in such an interconnected digital world of modern technology is individual awareness, information privacy protection, and the ethical use of IoT platforms and applications. IoT helps enterprises reconsider their approach to their businesses to improve company policies. is has led to the majority of enterprises migrating from legacy or traditional systems to more integrated IoT systems that enable them to stay competitive and deliver better services to their customers. IoT is extensively utilized in manufacturing, transportation, and utility businesses, whereby detectors and many other smart devices are used [2]. Nevertheless, it has also found examples of applications for agricultural, infrastructure, and smart homes, leading to digital transformation for some organizations. Even though numerous concepts have previously been prototyped in field trials, it is difficult to forecast the repercussions of such widespread computer integration in this digital era. Lamba [3], as massive amounts of data, are exchanged and processed every hour or day; there is an extremely high possibility of IoT devices and services being vulnerable to some level of threats and cyberattacks. With these threats and attacks, it is important to investigate if individuals and organizations have enough information regarding their privacy protection.
is brings us to the question, "Are individuals aware of their information exposure and protection on IoT planforms?." While IoT is helping to make life easier for everyone, it is also necessary to think about how these attacks might be mitigated or avoided [4]. However, technology, such as smart homes, and e-health enable a wide range of processes throughout the integrated system's physical and virtual environment [5]. Professionals use their skills and knowledge to assist and defend users since individuals or users are increasingly vulnerable to security threats and attacks as daily activities progress. Verification, information management, setup, and authentication are all privacy concerns in IoT interconnected networks [6]. Although IoT products make life easier and more competitive, privacy is not guaranteed. erefore, it is important to consider privacy and IoT as two variables integrated to work hand in hand to protect and create a level of trust when information is being exchanged. Even though they are not compatible, privacy helps separate confidential information while IoT connects all smart devices together. Privacy threats can be triggered in different ways between IoT systems. Endpoints in the IoT ecosystem broadcast data autonomously, but they also collaborate and interact with other endpoints. Internet of ings must be interoperable for networked devices to work seamlessly together. e data transmitted by a certain endpoint may not raise any privacy concerns on its own. However, gathering, collating, and analyzing even fragmented data from various endpoints might provide sensitive results. Nonetheless, in an increasingly interconnected world, manufacturers, developers, and end users must continue to strive for privacy protection within IoT platforms. With the number of connected devices directly linked to the Internet predicted to reach three times more by 2025, the potential for a rise in personal privacy concerns is evident.
e study hypothetically suggests that promoting awareness and providing training and education to IoT users on information privacy protection will allow them to be more cautious when using IoT platforms or systems. e study opted for online surveys in the form of questionnaires as a data gathering technique for IoT users.
To respond to such questions, the responder must submit his or her opinion or point of view based on the research topic under study. Unlike other data gathering approaches, online surveys offer a larger reach, allowing many individuals to submit high-quality, trustworthy, and important data. e author created an artifact for IoT users to go through before attempting the real IoT privacy-related questions to educate them. In the next section, existing literature on privacy in IoT contexts is examined. e remaining sections deal with the problem statement, study aim, scope, and research questions. Some parts of the study also address the research techniques used in this study as well as the analytic strategy. Lastly, the final sections discuss the study limitations and future research prospects. e study conducted for this research forms part of an honors research project module, HRCOS82 (Honours Research Report). HRCOS82 is a compulsory module for the Bachelor of Science Honours degree offered by the University of South Africa (UNISA). e objective of this research module is to prepare students for a postgraduate research study at a master's level. Students are afforded the prospect to pursue a research project with a view of producing a research report in a structured means under the supervision of study leaders within the School of Computing, UNISA. is research was conducted after obtaining ethical clearance from the designated research and university bodies that permitted the research to be conducted and reported on. e organization of this research is mentioned as follows. e literature review of the existing works and their background information is provided in Section 2. Section 3 describes the research materials and methods. Section 4 elaborates the results and discussion along with the comparative analysis. Finally, the conclusion is stated in Section 5.

Background of Privacy and Information Privacy.
Despite numerous attempts to define privacy, no universal definition of privacy has been developed. Amid the fact that the right to privacy is universal, its concrete manifestation varies depending on the prevailing societal characteristics, as well as the economic and cultural environment [7]. at is, privacy must be reinterpreted in light of the current era and examined in its current context. Several factors influence what people consider private. ere are significant differences between societies and cultures, and scientific advancement can also result in a different, pressing need for privacy protection [8]. It depends on the situation, on the context, as sharing the same information in different situations could be viewed separately.
Individual plays a significant role in which privacy can be thought of as a sort of "aura" that surrounds the individual and serves as a barrier between him/her and the outside world [9]. e limits of this aura change from context to context and from individual to individual, so an average standard must be found from all of these individualized and changing contexts, and this standard can be legally protected. Apart from this ever-changing context, numerous attempts to define privacy have been made over the last decade [10]. One of the best definitions of privacy is provided by Máté Dániel Szabó, a Hungarian jurist, who stated that "Privacy is the right of the individual to decide about himself/herself." e idea of information privacy is a subset of the larger concept of privacy, which has been researched and debated for centuries. According to Quan-Haase and Ho [11], most interpretations of the idea of privacy allude to a human right, although in different settings. Mutimukwe et al. [12] identified four levels of privacy based on these contexts: (i) personal privacy, (ii) personal conduct privacy, (iii) personal communication privacy, and (iv) personal data privacy. Personal communication privacy and data privacy may now be integrated into the concept of information privacy since most conversations are digitized and preserved as information.
e study focuses on information privacy because it is the subject of the majority of privacy-related IS research [13].
is sole focus is unsurprising given that technology is generating many issues and some answers around data privacy. With the advancement of modern information and communication technology, data can be gathered, aggregated, and analyzed at a quicker and higher volume than ever before. Furthermore, data might be obtained without the consent of individuals.
ere are different definitions of information privacy, but the features of the definitions are quite consistent and often include some type of control over the potential secondary uses of one's personal information [13]. e process of employing data for reasons other than those for which it was initially obtained is referred to as secondary usage. Lamba [3] defines four aspects of information privacy: acquisition, unlawful secondary use, unauthorized access, and mistakes. Another taxonomy covers data gathering, data processing, data distribution, and invasion.Özkan [14] offers a taxonomy of information privacy in collaborative contexts based on time, matter, and space dimensions. e space dimension reflects a structural perspective of information privacy that incorporates individual, group, and organizational privacy.
Information privacy is simply defined as the protection of an individual's personal information [15]. Information privacy has turned out to be the most critical concern in today's digital age. If people are completely unaware of their privacy, the disclosure of personal information in digital communication settings may result in significant privacy issues in the future [16]. Even though people have a theoretical interest in maintaining their privacy when using the Internet and do not want everyone to know their personal data and confidential information, promoting information protection awareness can provide more insight for users on how they can manage their personal information. Privacy will be protected thanks to modern technology. People are irritated when they believe they have certain privacy rights but then learn that they do not [17]. We need to communicate with individuals so that they are aware of the problem ahead of time. Computer technology is not leading us into some terrifying new period that we will not be able to comprehend [18].
Quan-Haase and Ho [11] define information privacy as "an individual's interest in controlling, or at least considerably influencing, the processing of data about oneself." e term privacy is related to various ideas, definitions, and interpretations within the field of Information Systems (IS). Maram et al. [19] define privacy as "the desire of individuals to possess the liberty of choice no matter the conditions or amount to which they reveal their attitude and conduct to others." Lamba [3] defines privacy as "the management of transactions between people, with the last word objective of promoting autonomy and/or decreasing vulnerability." On the other hand, privacy is an individual's ability to manage information about themselves. ey are distinct difference between privacy and security which is discussed in the following section.

Difference between Privacy and
Security. Privacy and security are two different but connected concepts [11].
(I) Privacy is concerned with the usage and control of personal data, such as establishing policies to guarantee individuals' personal information is gathered, shared, and utilized in appropriate ways [20]. (II) Security is primarily concerned with safeguarding data from malicious assaults and profiteering from stolen data [21].

Background of the Internet of ings.
We are witnessing the start of a brand-new age of the Internet of ings (IoT, also referred to as the Internet of Objects). e Internet of ings (IoT) is the networked interconnectivity of common items, many of which have all-knowing intelligence. e Internet of ings (IoT) will broaden the industry's scope by Mobile Information Systems incorporating every object enabling communication via embedded systems, resulting in a widely dispersed network of devices interacting with people and other devices [22]. In recent decades, the exponential rise of the IoT in the realm of computers has encouraged innovation and customized services that have improved people's living standards [23].
IoT devices are employed in a variety of industries, including manufacturing, engineering, computers, and small companies. Smart gadgets can investigate the surroundings, communicate with other intelligent items, and interact with people, allowing users to perform things more differently [24]. Because of fast developments in the underlying technology, IoT is enabling a plethora of unique applications that promise to improve the quality of our lives. In recent years, the IoT has piqued the curiosity of scholars and practitioners all around the world.
IoT has gotten a lot of academic interest in the last decade. IoT is viewed as a factor of the forthcoming Internet and will comprise billions of intelligent communicating things. e Internet of the future will indeed be composed of disparately linked devices that will gradually increase the borders of the world utilizing physical and digital components. IoT will provide new capabilities to link things. While the concept of the Internet of ings has been around for a long time, the latest improvements in a range of diverse technologies have made it a reality. e following technologies have made IoT feasible: (I) Access to low-cost, low-power sensor technologies.
Because of the availability of low-cost, trustworthy sensors, more firms can utilize IoT technology. (II) Communication: A plethora of Internet network protocols have made it easier to link sensors to the cloud and other devices for efficient data transfer. (III) Cloud computing platforms: with the expanded availability of cloud platforms, both organizations and consumers may now access the infrastructure they need to scale up without having to manage it all. (IV) Analytics and machine learning are two of the foremost important aspects of machine learning. Businesses may gain insights more quickly and simply thanks to advances in machine learning and analytics, similarly to access to varied and vast amounts of knowledge stored remotely. (V) Machine learning (AI): natural-language processing (NLP) has been supplied to the Internet of ings such as personal digital assistants Alexa, Cortana, and Siri through advances in neural networks, enabling them accessible, inexpensive, and feasible for home usage.
IoT is employed by automobile owners to remotely operate their cars, like preheating the car before the driving force gets in it or hailing a car through a phone [25]. Due to IoT's ability to enable device-to-device communication, cars will soon be able to schedule their own service appointments. Figure 1 gives an insight detail of IoT architecture:

Privacy in the Internet of ings.
IoT provides users with a strong technical background and management over how to carry out ordinary duties by blanketing the environment with smart items [27]. Smart objects are slightly different computer devices such as embedded systems, sensor systems, and actuators which can disseminate and share data to facilitate positive interactions and rational choice creation in the Internet of ings [28]. ings are embedded in consumer devices and industrial machinery to collect and transmit environmental data. Smart objects can also cause physical changes in their environment and be controlled locally or remotely via the Internet. e privacy concerns addressed in the study which are applied to every IoT user are illustrated with examples that are related to smart appliances which are connected to devices. Further, the rate at which the users of smart devices are developed is out spaced by the rate that is protective for obtaining solutions that protect the information with the help of technologies. Despite the abundance of the Internet of ings and its impact on our daily lives, we must fully understand the threats and challenges they pose to our privacy.

IoT Privacy Challenges. Data gathering technologies in the IoT ecosystem have resulted in new privacy problems.
Obtaining consent for data collection is one of these problems, as allowing users to manage, personalize, and choose the data they provide, and ensuring that the use of such data is confined to the stated purpose. ese issues are exacerbated by the increasing risk of personal information misuse in the IoT sphere [13]. is is due to the widespread tracking of habits, actions, and whereabouts throughout time. IoT technologies bring new dangers to personal safety. e development of the digital computer has allowed the advance of some fields like statistics, while IoT has enhanced communication, information exchange, and collecting [29].
Yet, the data is present with a gigantic scale that is stored, sorted, and analyzed with the help of the government and large companies. erefore, the capabilities support the data to gather deliberately the observation as surveillance and novel applications are offered by using the data acquired which is freely supplied for other purposes [30]. However, the effectiveness and reduced cost of data storage enable the longterm preservation of massive volumes of potentially illegal material [31]. A representation or information string associated with a person's identity cannot be deleted or forgotten, whether on the public Internet or in classified data storage.
Another privacy challenge raised by IoT is the difficulty in establishing safe and secure communication. is is due to the fact that the technology consists of various components at the network edge, making it difficult to ensure that all of the components communicate safely and securely. ere are also some concerns about data secrecy and confidentiality associated with IoT. e technology, for example, entails the interconnection of multiple networks, whereas in most cases, a user may not have control over some networks, exposing data to numerous secrecy and confidentiality threats.
Furthermore, IoT involves a large number of devices and networks. is makes identifying, assessing, and monitoring critical components to ensure compliance with privacy policies di cult [32]. However, it is di cult to ensure an adequate level of secure information exchange and trust between various vertical information technology infrastructures. Other IoT privacy issues are discussed below in detail: (I) Identi cation, Localizing, and Tracking. e evolving features and technologies of the Internet of ings, as well as the emerging systems of IoT interaction, have resulted in speci c privacy challenges. One of the IoT's privacy challenges is identifying the risk of associating an identi er, such as an address, with the individual and related data [33]. e main challenge, in this case, is associating the identity with a speci c context, which violates the individual's privacy by providing identifying information to entities outside the user's personal sphere, thereby increasing the potential cyberattack vectors.
(II) Pro ling and Authentication.
e Internet of ings also poses signi cant privacy challenges in terms of pro ling, interaction, and presentation, all of which violate privacy. In terms of pro ling, the Internet of ings poses a risk in the collection of data about users in order to determine their interests through correlation with other data and pro les [34]. In this case, pro ling methods in e-commerce may be used for consumer personalization as well as internal targeting and optimization based on customers' interests and demographics. Pro ling, on the other hand, can lead to privacy violations if data is used for unsolicited advertising, price discrimination, and social engineering.

(III) Lifecycle Transitions and Inventory Attacks.
IoT raises concerns about privacy due to lifecycle transitions and inventory attacks. In this case, the users' con dential information gathered during the lifetime of the IoT device may be revealed during changes to the gadget's control spheres during their lifecycle [35]. e smart devices interact with a wide range of services and people, accumulating data on such interactions in their history logs. Given that the lifecycle of most consumer goods is based on the customer owning the products in perpetuity, the sale or sharing of such devices could result in the buyer gaining access to sensitive data about the previous owner, infringing on the individual's privacy. e next section delivers a comprehensive summary of the privacy measures in the IoT context that emphasizes more on protecting individual personal information.

Information Privacy Protection Measures in IoT.
Traditional Internet privacy concerns mostly a ect connected persons using the Internet. However, in IoT contexts, privacy problems may a ect persons who are not utilizing any IoT services but are present in the surroundings [36]. Internet apps may employ well-established authentication mechanisms to record data ow, evaluate any privacy infractions, and promptly warn the user. However, due to the lack of well-de ned control domain boundaries in IoT contexts, it is signi cantly more di cult to properly catch privacy infractions. As a result, IoT settings must respect individuals' privacy and ensure that personal data acquired is utilized for just the intended purpose. Finally, obtained data should be kept for as long as it is necessary. Table 1 lists necessary measures that can be applied in IoT privacy protection:

Introduction.
is section indicates the methods used to discourse the focal research question and achieve the objectives indicated in the preceding sections. e research onion in Figure 2 illustrates the study methodological approach that leads to the development of a concrete research Mobile Information Systems theory by addressing each critical stage involved in the process.

Research Philosophy.
Research philosophy is about di erent beliefs about the nature of the topic under study.
Research philosophy is subdivided into three groups: Ontology, Epistemology, and Axiology [41]. Epistemology is widely used in scienti c research since it aids in locating the information that can be demonstrated without a question; in other words, it aims to identify universal acceptable knowledge and manage the facts properly [42]. Philosophical viewpoints within the epistemological worldview include positivism, pragmatism, realism, and interpretivism. Positivism is there to generate research topics and hypotheses that may be tested and examined [43]. It can also be used to quantify and explain common knowledge about the study under investigation which is why this study opted for the positivism approach.

Research Method.
e research onion contains other two essential elements which are deductive and inductive. Within positivism methods, data is evaluated rst, important patterns are accustomed to inform the generation of ndings, and the inductive approach may be employed successfully. In contrast to the deductive approach, the inductive strategy allows one to create their own theory rather than employing one that already exists. e inductive approach is characterized by a move from the precise to the broad, which is why this study opted for it [44].

Research Strategy.
A range of techniques, like experimental research, action research, case study research, interviews, survey, and scienti c literature review, are often utilized according to the nature of the research. is study opted for an open-ended survey and questionnaires. Surveys are one of the foremost e ective and cost-e ective research strategies. is data gathering technique most often delivers

References
Measure Summary [37] Authentication and authorization Mechanisms for lightweight authentication and key establishment [38] Privacy awareness Informs customers about con dential information gathering, risks involved, and how to utilize IoT services responsibly and prevent personal information from leaking [37] Data encryption secure channel using IPSec Ensures secure data interchange and information delivery. e IPSec protocol provides authentication as well as encryption. Demonstrates a 6LoWPAN/IPsec extension for IoT device security [39] 2FA (Two-factor authentication) Double authentication using SMS codes and e-mail to authenticate enough accurate data to the author based on the topic under study. Surveys are typically employed, and they entail sampling of the community on which the study is focused [45]. It enables the collection of massive amounts of information that will be utilized to answer generated research questions.

Data Collection and Analysis.
A descriptive method was used to analyze the results of this study. Online questionnaires were applied as a way of collecting data from users on their views and concerns about information privacy protection. Online questionnaires are easier to conduct and give a quick means to get replies and are a straightforward way to process data. Also, because one of the study's requirements was that a person is an IoT user, the use of an online questionnaire survey was satisfactory. Finally, this study used an online questionnaire survey to meet the study's objectives, which were to assess IoT user awareness and concerns about information privacy and protection, as well as to identify any common attitudes and differences.

Results and Discussion
e purpose of this quantitative study is to promote information privacy awareness among IoT users and identify privacy risks based on data collected from them through a survey. To successfully validate this research, the data collected was analyzed to provide answers to the main research question: "What percentage of IoT users are knowledgeable/ aware of data protection and privacy?". Data is interpreted descriptively, as described earlier in the previous section. e online survey was completed by 97.6% of participants, with the remaining 2.4% declining to participate. Data gathered from the survey was subjected to frequency counts. In other words, the participants' responses to each individual question were added up to get the maximum frequency of occurrence or the number of times a certain response occurred. Some questionnaire findings are offered in the form of tables and charts for greater accuracy and comprehension. Table 2 shows all participants' age group information. e study's target age range was between 20 and 35 years old, and 78.3% of participants fell into this category.

Demographic Information.
According to the data gathered, 50% of the population were male, 47.5% were female, and 2.5% preferred not to say. e survey's qualification breakdown revealed that 46.2% of participants held grade 12 qualifications, 7.7% were diploma candidates, 28.2% held three-year university degrees, 10.3% held honors degrees, and 7.7% did not have any of the abovementioned qualifications. According to the study, 55% of the participants were employed, while 45% were unemployed.

Information Privacy Protection Awareness Status in IoT
Context. Around 47.5% of the respondents had previously touched on the subject of privacy and threats related to information privacy protection, while 52.5% were unaware of any threats or dangers linked with IPP. Participants rated their understanding of information privacy protection as follows: 12.5% had no awareness, 10% had poor awareness, 45% had average awareness, 22.5% had good awareness, and 10% had a strong understanding. Data protection, cloud privacy, IoT privacy, and POPIA (Protection of Personal Information Act) were some of the significant privacy protection topics identified during the course of data gathering. 35% of participants admitted to being victims of a data breach, whereas 65% had never encountered such a scenario. Most participants stated that information privacy protection is required within the community to educate, raise awareness, eliminate human error, and enable individuals to be conscious of their privacy when browsing the web. Figure 3, the majority of participants consented to be trained on information privacy protection awareness. Approximately 42.5% of responders strongly believe that IPP training should be taught in school by teachers while 37.5% of participants, on the other hand, stated that training should be done via lectures at universities in the form of short courses. Only 20% suggested IPP training be offered at colleges as a short or online course. Figure 3 shows the precise age highlighted to begin teaching  Mobile Information Systems individuals about information privacy protection, and the majority of responses from participants suggested training between the ages of 15 and 18 years. In Figure 4, the majority of the participants (55%) agreed that information privacy protection material should be o ered in English, while 45% believed it would be more e ective if the content would be presented in the participant's native tongue. On the same point, 75% of participants agreed to be informed about IPP using online awareness materials, while 22% preferred workshops.

Information Privacy Protection Awareness Artifact
Evaluation. Following a thorough review of the artifact, 81.6% of the participants strongly agreed to have learned a lot about information privacy protection in the context of IoT, with just 18.4% responding not to have grasped the concept adequately. 87.5% of participants indicated that the artifact was well presented and informative about IPP, whereas 12.5% did not nd it very informative. 30.8% of participants agreed that by 2022, about 26.5 billion gadgets are expected to be connected to the Internet of ings. Figure 5 depicts the most often utilized Internet-connected gadgets by participants. Smartphones are the most often used Internet-connected devices, with a 92.5% rating.
Approximately 97.5% of participants found the IoT privacy guidelines presented in the artifact to be extremely valuable and agreed to implement these suggestions in the future to preserve their privacy in an IoT environment. Following the examination of the artifact, 62.5% of the participants were able to employ end-to-end encryption when sending their data, while 37.5% were unable to do so. Figure 6 depicts the number of participants who are aware of the IoT risks if they do not comply with the privacy   principles indicated in the artifact. ose who were aware of IoT risks/harms responded with a Yes, while those who were not aware of any IoT-related risks responded with a No. After complete artifact evaluation, the majority of participants (90%) were aware and educated of several IoT privacy preservation methods including two-factor authentication, or 2FA, which is an extra layer of protection used to safeguard the security of IoT accounts.

Discussion.
Participants' ratings of their awareness of information privacy protection turned out to be average, suggesting a need for education and awareness. Approximately 42.5% of responders strongly believe that IPP training should be taught in school by teachers. Individuals should be taught information privacy protection between the ages of 15 and 18 years old, according to the agreed-upon age range by responders. Most participants (55%) agreed that information privacy protection content should be offered in English. 35% of those respondents admitted to being victims of a data breach. Smartphones were the most often utilized Internet-connected devices, with a 92.5% rating. Approximately 97.5% of participants found the IoT privacy guidelines presented in the artifact to be extremely valuable and agreed to implement these suggestions in the future to preserve their privacy in an IoT environment. Several participants stated that information privacy protection is required within the community to educate, raise awareness, eliminate human error, and enable individuals to be conscious of their privacy when sur ng the Internet. After the participant's evaluation of the artifact, 81.6% of the participants strongly believed that they were knowledgeable on information privacy protection in the context of IoT.
Participants rate the artifact as well presented and informative. Finally, most participants' comments on the IoT privacy artifact presented to them as a means of educating and increasing awareness were extremely positive, which made the artifact an e ective method of spreading/sharing information privacy protection awareness to IoT users.

Conclusion
Individual privacy protection is a major challenge in this digital era. We contribute to a better understanding of how individuals' knowledge of privacy risks a ects their privacyrelated actions by concentrating on the conceptualization of IPA. Individuals might be concerned about their privacy, but the so-called privacy paradox shows that they do not behave in line with their stated views. It is therefore mandatory in this digital era to always enhance people's understanding of the need of protecting their privacy and know the ethical use of IoT platforms. Privacy may also be misinterpreted, yet it has the capacity to encourage criminality and exploitation of systems, while secretive connections between terrorists could endanger safety. As a result, privacy is not a universal virtue. Instead, philosophical and legal research must be conducted into the realms of privacy, the substance of privacy, and the advantages and damages that privacy protection may create to nd the conditions under which privacy is valued enough to sustain the maintenance of private rights. However, individuals can protect their Internet privacy in several ways. Protective measures are speci c computer-based actions that users desire to safeguard their information. People can protect their online privacy by limiting the knowledge they reveal and setting up place privacy protections. Furthermore, knowledge, talents, and skill all play a task. People that have higher Internet skills, technological experience, and understanding of the IoT are more likely to interact with privacy protection measures. Boosting information privacy awareness will have an enormous impact in helping individuals to be completely alert to the risks and ethical procedures they must take into consideration to safeguard their personal information. In that instance, the study went above and beyond in examining the level of alertness posed by individuals when making use of IoT systems or platforms. e study contributed more to individuals' awareness by improving their knowledge level of information privacy protection through online questionnaires and artifacts that re ect the measures and steps that need to be adhered to when dealing with interconnected smart technologies. e paper enhanced individual understanding of privacy-related issues that need to be recognized when dealing with IoT platforms or systems. After a complete evaluation of the study results, the artifact presented provided the majority of individuals with adequate knowledge that will enable them to safeguard their personal information. e rapid growth of IoTplatforms and systems will continue to bring more issues related to individual privacy. As such privacy cannot be fully mitigated especially with the amount of data exchanged hourly, daily, or weekly, instead it can be controlled and more awareness needs to be promoted. erefore, it is wise for individuals to have adequate knowledge and advanced awareness of how they can protect themselves from any sort of privacy-related threats before their systems get exposed to IoT attacks.

Data Availability
e data used to support the findings of this study can be obtained from the corresponding author upon request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.