Business model innovation through the application of the Internet-of-Things: A comparative analysis

2021 ◽  
Vol 126 ◽  
pp. 126-136
Author(s):  
Timber Haaker ◽  
Pham Thi Minh Ly ◽  
Nhan Nguyen-Thanh ◽  
Hanh Thi Hong Nguyen
2018 ◽  
pp. 27-55 ◽  
Author(s):  
Mirko Presser ◽  
Qi Zhang ◽  
Anja Bechmann ◽  
Michail J. Beliatis

2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


Author(s):  
Nipun R. Navadia ◽  
Gurleen Kaur ◽  
Harshit Bhardwaj ◽  
Taranjeet Singh ◽  
Aditi Sakalle ◽  
...  

Cloud storage is a great way for companies to fulfill more of their data-driven needs and excellent technology that allows the company to evolve and grow at a faster pace, accelerating growth and providing a flexible forum for developers to build useful apps for better devices to be developed over the internet. The integration of cloud computing and the internet of things creates a scalable, maintainable, end-to-end internet of things solution on the cloud network. By applying the infrastructure to the real universe, it generates sources of insight. Cloud computing and IoT are separate technology but are closely associated and are termed as ‘cloud-based IoT' as IoT has the ability to create intelligent goods and services, gather data that can affect business decisions and probably change the business model to boost success and expansion, and cloud infrastructure can be at the heart of all IoT has to deliver.


2018 ◽  
Vol 2018 ◽  
pp. 1-30 ◽  
Author(s):  
Michele De Donno ◽  
Nicola Dragoni ◽  
Alberto Giaretta ◽  
Angelo Spognardi

The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.


Sign in / Sign up

Export Citation Format

Share Document