Abstract Based on the decisiontree analysis and new technology adoption of user's behavior research and with the simulation and onsite training, this article makes the convenient sample of respondents choose the strategies of privacy protection for internet of things, which include kill tags, user model, machine model, the enterprise selfdiscipline and legal restriction. Then it analyzes the relationship between different strategies. The main conclusion is that users would not trust complex privacy protecting technology as they are envisioned today. Instead, they prefer to kill RFID chips at store even if they appreciate after sales services. Therefore, constructing a credit mechanism and increasing the transparency of information to consumers' privacy is a good way to eliminate psychological barriers of consumers.
|