Search results

1 – 10 of over 5000
Article
Publication date: 5 October 2019

Sajjad Shokouhyar, Neda Pahlevani and Farhang Mir Mohammad Sadeghi

This paper aims to present a smart, sustainable supply chain practices structure on the basis of the relational view.

1229

Abstract

Purpose

This paper aims to present a smart, sustainable supply chain practices structure on the basis of the relational view.

Design/methodology/approach

A method based on fuzzy cognitive map was applied to construct a relational map to introduce and implement such relational methods. Considering this relational map as a guideline, observations into particular methods and ways of applying relational methods to attain sustainable development goals across organizations has been introduced.

Findings

Primary outcomes provided a series of relational methods for the purpose of giving advice to those organizations and their suppliers for smart, sustainable supply chain. Reliance between relational methods were examined and assessed under seven meaningful groups: economic internet of things (IoT), green internet of things, social internet of things, economic supply chain, green supply chain, social supply chain and other variables.

Practical implications

This study guides managers toward an improved perception of the connection among IoT instances and sustainable supply to modeling smart, sustainable supply chain. Managers can determine the practices that need more focus along with the practices that are less relevant. Thus, this will help managers in the decision-making process and to organize their decisions by planning and calculating the relative importance and influence of smart, sustainable practices on each other and on the company’s smart, sustainable program.

Originality/value

To the best of the authors’ knowledge, this is the first approach that promptly examines and determines the interdependencies between relational methods and constructs a relational map for the purpose to introduce and analyze smart, sustainable supply chain.

Details

Management Research Review, vol. 43 no. 4
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 30 June 2023

Mohammed Masum Billah, Syed Shah Alam, Mohammad Masukujjaman, Mohd Helmi Ali, Zafir Khan Mohamed Makhbul and Mohd Fairuz Md Salleh

The survival and growth of the ready-made garments (RMGs) sectors in Bangladesh depend on sustainable supply chain performance (SSCP). The purpose of this study is to analyse the…

Abstract

Purpose

The survival and growth of the ready-made garments (RMGs) sectors in Bangladesh depend on sustainable supply chain performance (SSCP). The purpose of this study is to analyse the effects of Internet of Things (IoT), supply chain collaboration and ethical sensitivity on SSCP. Also, supply chain dynamism was tested as a moderator.

Design/methodology/approach

The framework of this study has been developed to enrich the understanding of technology usage in the supply chain. In developing the framework, previous studies in the supply chain context were considered. The model was tested by using data collected from 290 executives that were employed by different RMG companies in Bangladesh. This study used a 29-item structured questionnaire measured on a 6-point Likert scale to collect the data. Covariance-based structural equation modelling (SEM) was utilised to test the data.

Findings

The results showed that there were statistically significant and positive relationships between IoT and supply chain collaboration, social performance, economic performance and environmental performance. Ethical sensitivity also influenced social and economic performance. Supply chain collaboration was found to be related to social, economic and environmental performance. However, no link was found between ethical sensitivity and environmental performance. The result also showed that supply chain dynamism acted as a moderator.

Research limitations/implications

By considering theories and interpreting the results, this study provides some theoretical and practical implications which will enhance the SSCP. The results can also facilitate strategic planning by companies.

Originality/value

This research has identified and analysed the effect of IoT on SSCP in the RMGs industry in Bangladesh where this industry serves as the main economic contributor.

Details

Journal of Enterprise Information Management, vol. 36 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 9 January 2017

Dong-Hee Shin and Yong Jin Park

This study aims to conduct socio-technical analysis of the rapidly evolving Internet of Things (IoT) ecosystem and industry, including such factors as market growth and user…

3237

Abstract

Purpose

This study aims to conduct socio-technical analysis of the rapidly evolving Internet of Things (IoT) ecosystem and industry, including such factors as market growth and user experiences, policy and the impact of IoT on various areas.

Design/methodology/approach

By applying a multi-level socio-technical framework to IoT in South Korea, this study seeks an ecological understanding of how IoT will evolve and stabilize in a smart environment.

Findings

The study shows the values influencing potential users’ adoption of IoT by integrating cognitive motivations and user values as primary determining factors. Along with user modeling, the findings reveal the challenges of designing, deploying and sustaining the diverse components of IoT, and provides a snapshot of Korea’s current approach to meeting these challenges.

Originality/value

The study’s findings offer a contextualized socio-technical analysis of IoT, providing insight into its challenges and opportunities. This insight helps to conceptualize how IoT can be designed and situated within human-centered contexts.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 1
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 4 April 2016

Shancang Li, Theo Tryfonas and Honglei Li

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various…

9951

Abstract

Purpose

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.

Design/methodology/approach

Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.

Findings

IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.

Practical implications

The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.

Originality/value

The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 29 July 2020

Vijay Anand R., Prabhu J., Kumar P.J., Manivannan S.S., Sukumar Rajendran, K.R. Kumar, Susi S. and R. Jothikumar

This paper aims to address the role of Internet of Things (IoT) in preventing COVID-19. The IoT devices can be used in various ways to track the patients and suspected person…

1528

Abstract

Purpose

This paper aims to address the role of Internet of Things (IoT) in preventing COVID-19. The IoT devices can be used in various ways to track the patients and suspected person. Remote data collection can be done with the help of IoT and sensors. Later, the data can be analyzed with the help of data science engineers and researchers to predict and prevent the COVID-19.

Design/methodology/approach

IoT is a creative mean of amalgamating clinical gadgets and their applications to associate with the human services and data innovation frameworks. An investigation on the conceivable outcomes of defying progressive COVID-19 pandemic by implementing the IoT approach while offering treatment to all classes of patient without any partiality in poor and rich. The information sharing, report checking, patient tracking, data social affair, investigation, cleanliness clinical consideration and so forth are the different cloud-based administrations of IoT. It can totally change the working format of the medical services while rewarding the huge volume of patients with a predominant degree of care and more fulfilment, particularly during this pandemic of COVID-19 lockdown. Health workers can quickly focus on patient zero and identify everyone who has come into contact with the infected person and move these people to quarantine/isolation. As COVID-19 has emerged from the Wuhan province of China, IoT tools such as geographic information system could be used as an effective tool to curb the spread of pandemics by acting as an early warning system. Scanners at airports across the world could be used to monitor temperature and other symptoms. This paper addresses the role of IoT in preventing COVID-19.

Findings

In the period of continuous pandemic of COVID-19, IoT offers many propelled cloud-based administrations and offices to serve a greater number of patients effectively. The remote medicinal services framework provides a lot of significance in such a crucial time of lockdown. The powerful interconnected arrangement of gadgets, applications, Web, database and so on encourages the consumers to benefit the administrations in smart way. IoT additionally advances its administrations by building up the quality culture of perceptive medicinal services or portable centre. It is a “distinct advantage innovation,” which may totally change the practices universally. Indeed, even its quality administrations in this extreme time make this methodology progressively productive and beneficial. IoT helps in observing and tracking more recognized people and patients in remote areas for their human service prerequisites. The customary medicinal services are probably going to observe a huge change in perspective sooner rather than later, as the computerized revolution would place cutting-edge innovation and its associated items in the possession of the patients and give both patients and doctors in remote areas better access to quality clinical services.

Originality/value

The contemporary exploration study focuses on the proposed IoT system for the treatment of patients in this progressing COVID-19. The working principle of IoT approach incorporates the mix of human services apparatuses, clinical treatment framework, Web organize, programming and administrations. IoT framework empowers the information assortment, report observing, understanding database, testing pictures and investigation and so forth. Data has been collected through online mode; in this study, the authors adopted empirical research design. Total 150 (118/150 = 78.66% respondent response ratio) online questionnaires were sent in the Chennai city of Tamilnadu, India. The participated nature of work is clinical examination in critical care division.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6483

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 4 April 2016

Jan Nolin and Nasrine Olson

The purpose of this paper is to explore and engage with connections between the evolving technology of the Internet of Things (IoT) and notions of convenience. In particular, the…

7295

Abstract

Purpose

The purpose of this paper is to explore and engage with connections between the evolving technology of the Internet of Things (IoT) and notions of convenience. In particular, the concept of alpha convenience is introduced in order to articulate the broad scope of Internet “any-everything” connectivity, here called “alpha convenience.”

Design/methodology/approach

The recommendations of Constructive Technology Assessment are followed in order to evaluate technology before implementation. The seven value drivers articulated by Fleisch (2010) are utilized in order to envision-specific aspects.

Findings

Three critical aspects relating to alpha convenience are identified and discussed: gossiping technology, personalization and the disempowered smartphone user. It is argued that extreme forms of convenience shift traditional areas of human agency onto technology. It is also noted that alpha convenience tends to develop as ubiquitous feature of future society, making it difficult, if not impossible, to opt out.

Research limitations/implications

The paper focusses on one powerful concept, although the IoT is merely one of several terms used to deliberate the role of next-generation information technology and society. Notable competitors include semantic web, ubiquitous computing, pervasive computing and ambient intelligence.

Social implications

The IoT is predicted to be an intrusive feature into everyday life and the paper identifies important aspects.

Originality/value

This is the first critical discussion of the IoT and convenience. The paper aims at conceptual innovation. Overall, there is a substantial lack of critical scrutiny of the emerging ideas of the IoT.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 26 May 2022

Vikram S. Bhadauria and Anitha Chennamaneni

This study aims to investigate the threat phenomenon as perceived by Internet of Things (IoT) users and examines the role of anxiety, desire and personal innovativeness in the…

Abstract

Purpose

This study aims to investigate the threat phenomenon as perceived by Internet of Things (IoT) users and examines the role of anxiety, desire and personal innovativeness in the behavioral intention toward the usage of IoT devices.

Design/methodology/approach

A unified research model is developed based on the protection motivation theory, theory of reasoned action, theory of self-regulation and the review of relevant theoretical, empirical and practitioner literature. Data were collected from 315 assistive IoT device users and analyzed using partial least squares structural modeling.

Findings

The results indicate strong support for the proposed research model. All relationships, except one, were significant at the 0.05 level. Desire was found to play a direct as well as a moderating role between fear and behavioral intention to continue using assistive IoT devices, which was also directly influenced by anxiety and personal innovativeness.

Research limitations/implications

Understanding the security behaviors of IoT users will help researchers and practitioners develop preventive measures and robust security solutions for the IoT devices to avert any threats from cyber-attacks and to boost users’ confidence levels. Future research will benefit from replicating the study using longitudinal data.

Originality/value

This study is one of the first studies that integrate multiple perspectives to present a holistic research model. To the authors’ knowledge, anxiety, desire and personal innovativeness, key factors influencing fear and behavioral intention, have not been studied in the domain of adoption of IoT assistive devices. Additionally, the study offers a new dimension to IoT users’ security behaviors.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 4 April 2016

Pan Wang, Sohail Chaudhry and Ling Li

2801

Abstract

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 21 August 2018

Mounir Kehal and Zuopeng (Justin) Zhang

Building upon Internet of Things (IoT), Internet of Vehicles (IoV) and Social Internet of Things (SIoT), Social Internet of Vehicles (SIoV) is the latest development in the field…

1454

Abstract

Purpose

Building upon Internet of Things (IoT), Internet of Vehicles (IoV) and Social Internet of Things (SIoT), Social Internet of Vehicles (SIoV) is the latest development in the field. SIoV allows vehicles to socialize among themselves and share information of common interests. The increasing popularity of the SIoV concept demands more research to explore its great potential. However, very few studies have systemically investigated this concept to provide a comprehensive view for readers. The paper aims to discuss this issue.

Design/methodology/approach

This paper discusses the perspectives of the utilizations and limitations of SIoV, setting forward a systematic and epistemological framework.

Findings

The authors summarize the benefits of SIoV from four information-management perspectives: safety management, traffic control and convenience, productivity improvement and commercialization and exploring the factors inhibiting the development of SIoV from the following seven aspects: standardization, adaptability, scalability, infrastructure, lack of application, privacy and security.

Originality/value

The paper lays a solid foundation for researchers to find possible solutions to address the challenges to SIoV and provides valuable insights for practitioners who are interested in adopting SIoV initiatives.

1 – 10 of over 5000