Putting things to work: social and policy challenges for the Internet of things

Info ◽  
2014 ◽  
Vol 16 (3) ◽  
pp. 1-21 ◽  
Author(s):  
William H. Dutton

Purpose – This paper aims to provide a critical assessment of the Internet of things (IoT) and the social and policy issues raised by its development. While the Internet will continue to become ever more central to everyday life and work, there is a new but complementary vision for an IoT, which will connect billions of objects – “things” like sensors, monitors, and radio-frequency identification devices – to the Internet at a scale that far outstrips use of the Internet as we know it, and will have enormous social and economic implications. Design/methodology/approach – It is based on a review of literature and emerging developments, including synthesis of a workshop and discussions within a special interest group on the IoT. Findings – Nations can harvest the potential of this wave of innovation not only for manufacturing but also for everyday life and work and the development of new information and services that will change the way we do things in many walks of life. However, its success is not inevitable. Technical visions will not lead inexorably to successful public and private infrastructures that support the vitality of an IoT and the quality of everyday life and work. In fact, the IoT could undermine such core values as privacy, equality, trust and individual choice if not designed, implemented and governed in appropriate ways. Research limitations/implications – There is a need for more multi-disciplinary research on the IoT. Practical implications – Policymakers and opinion formers need to understand the IoT and its implications. Social implications – If the right policies and business models are developed, the IoT will stimulate major social, economic and service innovations in the next years and decades. Originality/value – This paper pulls together discussions and literature from a social science perspective, as one means to enable more multidisciplinary studies of emerging developments.

2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


2013 ◽  
Vol 756-759 ◽  
pp. 4529-4532 ◽  
Author(s):  
Hao Zeng ◽  
Yan Hui Fu ◽  
Xu Chen

Traditional Radio Frequency Identification (RFID) Tag Equipment has some problems like these: it is difficult to realize if the tag is kept out, destroyed, or taken away abnormally. It cant accurately judge where the area the tag had moved to is. Besides, it is difficult to distinguish the right of the tag in the Tag Management. To solve these issues, this paper serves with a method which is based on the Internet of Things (IOT). It mainly includes as the following: the tag is activated in the Controlled Area, the judgment of the tag access the Controlled Area, whether the tag exists in the Controlled Area or not. These methods can reform the problems that the Traditional RFID Tag Equipment has.


Author(s):  
Bozidar Radenkovic ◽  
Petar Kocovic

The Internet that most of us knows as the World Wide Web is expanding beyond PCs and mobile devices. Called the “Internet of things”, this movement will link consumer devices, enterprise assets, media and everyday items, such as packaged goods, to the Internet at an increasing rate. Why the push? New business models and new ways of interacting with customers, employees and suppliers are possible when physical items are linked to the Internet. In theory, the Internet of things will make it possible for a connected refrigerator to automatically order milk. However, history has shown that, even though a technology can be transformational, it takes a series of many small evolutions before the consumer and business world are ready for transformational models like this. We believe that, at first, the sweet spot for the Internet of things will be to use it in simple ways that extend or enhance an existing process. For example, a washing machine that has a 2D bar code can enable a smartphone user to view the instruction manual, or a service person to view the service history and parts list. In contrast, using the Internet of things technologies to make a washing machine that can auto-detect clothes by reading the RFID tags on the garments' labels, and consequently run at the right settings, is less likely to gain adoption.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lixin Liu ◽  
Justin Zuopeng Zhang ◽  
Wu He ◽  
Wenzhuo Li

PurposeRisks resulted from asymmetric information have become crucial barriers for commercial banks to implement supply chain finance (SCF) – mainly the inventory pledge financing (IPF). At the same time, online financial service providers (OFSPs) are emerging as strong competitors in the SCF market. As a result, commercial banks need to update their traditional SCF business models and alleviate their over-dependence on OFSPs.Design/methodology/approachThe authors employ a multi-case-study method to investigate how the Internet of things (IoT) and blockchain technologies can be jointly leveraged to mitigate SCF risks. In-depth interviews were conducted to depict the business models and their novel ecosystem to reinforce traditional banks' ability in SCF services.FindingsFrom the perspective of information asymmetry, the authors categorize IPF risks into three groups based on the principal-agent theory: collateral, warehousing and liquidity risk. The findings suggest that IoT can primarily improve traditional banks' information acquisition ability, and blockchain can facilitate credible information transformation, enabling banks to acquire knowledge from collaterals. Besides, the e-platform in the new architecture increases banks' involvement in the supply chain and builds a fair network to curtail warehousing risks. The employment of smart contracts and collaborative mechanism ensure process and outcome control in mitigating liquidity risks.Originality/valueThe research contributes to the literature by confirming the role of emerging technologies in reducing information asymmetry risks. Besides, the findings provide valuable insights for practitioners to promote effective practices and approaches in IPF.


Author(s):  
G. Geetha

The internet of things is a prime technology that promises to improve human lives. The revolution of the internet of things (IoT), along with the rapid growing of robots in many applications of everyday life, makes embedded IoT with robotics applications impact the future social growth. IoT technology aims at improving the quality of following social things similar to urban life by collecting personal data, tracking human movements, mapping them with various sources of information. The objective of the internet of things is to connect billions of things like sensors, actuators, RFID devices, and others make this technology an important aspect in our everyday life and work. The IoT could emphasize the social values as privacy, equality, trust, and individual choice and their implementation and management.


2020 ◽  
pp. 1523-1556 ◽  
Author(s):  
Bozidar Radenkovic ◽  
Petar Kocovic

The Internet that most of us knows as the World Wide Web is expanding beyond PCs and mobile devices. Called the “Internet of things”, this movement will link consumer devices, enterprise assets, media and everyday items, such as packaged goods, to the Internet at an increasing rate. Why the push? New business models and new ways of interacting with customers, employees and suppliers are possible when physical items are linked to the Internet. In theory, the Internet of things will make it possible for a connected refrigerator to automatically order milk. However, history has shown that, even though a technology can be transformational, it takes a series of many small evolutions before the consumer and business world are ready for transformational models like this. We believe that, at first, the sweet spot for the Internet of things will be to use it in simple ways that extend or enhance an existing process. For example, a washing machine that has a 2D bar code can enable a smartphone user to view the instruction manual, or a service person to view the service history and parts list. In contrast, using the Internet of things technologies to make a washing machine that can auto-detect clothes by reading the RFID tags on the garments' labels, and consequently run at the right settings, is less likely to gain adoption.


2014 ◽  
Vol 2 (2) ◽  
pp. 115 ◽  
Author(s):  
McKay Cunningham

The disparities inherent in various national privacy laws have come into sharper contrast as access to information grows and formerly domestic markets become international. Information flow does not adhere to national boundary lines. Increasingly, laws that seek to protect informational privacy do not either. The European Union took a bold approach by limiting access to its markets for those who failed to observe its strict law designed to protect personal information. The 1995 Directive (and 2014 Regulatory Amendment) embody this approach as they: (1) broadly define personal information; (2) broadly define those who process and control personal information; (3) restrict transfer of personal information to those who cannot demonstrate compliance. Tellingly, the Directive does not limit its scope to certain industries or practices, but requires privacy controls across the board, regardless of whether the processor is a healthcare provider, pastry chef or girl scout. To many, the Directive has failed. While the global trend toward adopting laws similar to the Directive suggests that many States value privacy rights, commentators and empirical studies reveal significant shortcomings. The Directive outlaws harmless activities while allowing exceptions that threaten to swallow the rule. It is simultaneously over-inclusive and under-inclusive. National governments enjoy wide latitude to collect and use personal information under the guise of national security. Perhaps more concerning, technology continues to leapfrog. Information privacy is made continually more difficult with each new “app” and innovation. The Internet of Things is more probable than speculative. Radio-frequency identification is a predicate to computer identification and assimilation of everyday physical objects, enabling the use of these objects to be monitored and inventoried by computers. Tagging and monitoring objects could similarly be accomplished by other technologies like near field communication, barcodes, QR codes and digital watermarking, raising the legitimate argument that informational privacy—at least as envisioned in the 1995 Directive’s absolute terms—is impossible. Informational privacy cannot be accomplished by declaring it a fundamental right and outlawing all processing of personal information. To legally realise and enforce a privacy right in personal information, incremental, graduated, and practical legislation better achieve the goal than sweeping proclamations that have applications to actions unrelated to the harms associated with the absence of the right. With information privacy in particular, a capacious claim of right to all personal information undermines legal enforcement because the harms attending lack of privacy are too often ill-defined and misunderstood. As a result, legal realization of a claimed privacy right in the Age of Information should proceed incrementally and begin with the industries, practices, and processes that cause the most harm by flouting informational privacy. Data mining and data aggregation industries, for example, collect, aggregate and resell personal information without express consent. A targeted prohibition of this industry would reduce financial incentives of the most conspicuous violators and alleviate some of the most egregious privacy infractions. A graduated legal scheme also reduces undue and overbroad Internet regulation. While the right to privacy has been recognised and legally supported in one way or another for centuries, it has not faced the emerging and countervailing Age of Information until now. Current omnibus international legislation reflects the impossibility of legally protecting all privacy in the Age of Information; it also illustrates the need for a refined and practical legal scheme that gradually and directly targets the harms associated with privacy violations.


2015 ◽  
Vol 32 (5) ◽  
pp. 4-7 ◽  
Author(s):  
Peter Fernandez

Purpose – This column aims to explore how the concept of the “Internet of Things” technology will impact everyday life, and examine its implications for libraries. The Internet serves as the foundation for a staggering array of connections between humans and computers all over the world. As a conceptual model, the “Internet of Things” (IOT) begs the question, what if the Internet expanded beyond humans and computers to include the other everyday objects that surround us? Design/methodology/approach – This column will explore how this technology might impact everyday life, and examine this technology’s implications for libraries. Findings – Companies of all kinds, including Intel, Microsoft, AT & T and DHL are all investing in the IOT, citing a variety of reports that estimate tremendous future growth. For example, a recent report by Business Insider predicts that by 2019, the IOT will be the largest device market in the world (overshadowing desktop computers and mobile devices combined) and create $1.7 trillion in new value, affecting business, homes, transportation, health care and government operations . Originality/value – Almost regardless of the success or failure of any given product, the concept of the IOT is a model that is affecting investors and businesses of all types, and in turn affecting technologies that are being developed today. By better understanding the IOT, librarians can therefore be better positioned to respond to developments as they emerge.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Energies ◽  
2021 ◽  
Vol 14 (9) ◽  
pp. 2417
Author(s):  
Andrzej Michalski ◽  
Zbigniew Watral

This article presents the problems of powering wireless sensor networks operating in the structures of the Internet of Things (IoT). This issue was discussed on the example of a universal end node in IoT technology containing RFID (Radio Frequency Identification) tags. The basic methods of signal transmission in these types of networks are discussed and their impact on the basic requirements such as range, transmission speed, low energy consumption, and the maximum number of devices that can simultaneously operate in the network. The issue of low power consumption of devices used in IoT solutions is one of the main research objects. The analysis of possible communication protocols has shown that there is a possibility of effective optimization in this area. The wide range of power sources available on the market, used in nodes of wireless sensor networks, was compared. The alternative possibilities of powering the network nodes from Energy Harvesting (EH) generators are presented.


Sign in / Sign up

Export Citation Format

Share Document