Adoption of the Internet of Things technologies in business procurement: impact on organizational buying behavior

2018 ◽  
Vol 33 (6) ◽  
pp. 781-791 ◽  
Author(s):  
Talai Osmonbekov ◽  
Wesley J. Johnston

PurposeThe purpose of this paper is to discuss the potential of Internet of Things (IoT) to affect organizational buying behavior. Potential impacts on organizational communication, buying center structure and processes and privacy and security issues are discussed.Design/methodology/approachThis is a conceptual paper that advances testable propositions based on the technology overview and use of existing organizational buying behavior theory.FindingsThis paper concludes that major changes are likely as a result of the adoption of IoT. The nature of organizational communication may shift to more machine-to-machine communication and buying centers may become smaller, less hierarchical but more coordinated, with less conflict. In addition, privacy and security concerns will need to be addressed.Originality/valueThis is the first attempt to conceptualize the impact of adoption of IoT technologies that may help future researchers to examine the impact on a more granular level. For practitioners, it may help them prepare for the impacts of the IoT technological juggernaut.

Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


Author(s):  
Alaa Ahmed Abbood ◽  
Qahtan Makki Shallal ◽  
Mohammed A. Fadhel

<p><span>Internet of Things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.</span></p>


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nikolaos Goumagias ◽  
Jason Whalley ◽  
Ozge Dilaver ◽  
James Cunningham

PurposeThis paper aims to study the evolution of definitions of internet of things (IoT) through time, critically assess the knowledge these definitions contain and facilitate sensemaking by providing those unfamiliar with IoT with a theoretical definition and an extended framework.Design/methodology/approach164 articles published between 2005 and 2019 are collected using snowball sampling. Further, 100 unique definitions are identified in the sample. Definitions are examined using content analysis and applying a theoretical framework of five knowledge dimensions.FindingsIn declarative/relational dimensions of knowledge, increasing levels of agreement are observed in the sample. Sources of tautological reasoning are identified. In conditional and causal dimensions, definitions of IoT remain underdeveloped. In the former, potential limitations of IoT related to resource scarcity, privacy and security are overlooked. In the latter, three main loci of agreement are identified.Research limitations/implicationsThis study does not cover all published definitions of IoT. Some narratives may be omitted by our selection criteria and process.Practical implicationsThis study supports sensemaking of IoT. Main loci of agreement in definitions of IoT are identified. Avenues for further clarification and consensus are explored. A new framework that can facilitate further investigation and agreement is introduced.Originality/valueThis is, to the authors’ knowledge, the first study that examines the historical evolution of definitions of IoT vis-à-vis its technological features. This study introduces an updated framework to critically assess and compare definitions, identify ambiguities and resolve conflicts among different interpretations. The framework can be used to compare past and future definitions and help actors unfamiliar with IoT to make sense of it in a way to reduce adoption costs. It can also support researchers in studying early discussions of IoT.


Author(s):  
Sreelakshmi K. K. ◽  
Ashutosh Bhatia ◽  
Ankit Agrawal

The internet of things (IoT) has become a guiding technology behind automation and smart computing. One of the major concerns with the IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the security of the data. A majority of security issues arise because of the centralized architecture of IoT systems. Another concern is the lack of proper authentication and access control schemes to moderate access to information generated by the IoT devices. So the question that arises is how to ensure the identity of the equipment or the communicating node. The answer to secure operations in a trustless environment brings us to the decentralized solution of Blockchain. A lot of research has been going on in the area of convergence of IoT and Blockchain, and it has resulted in some remarkable progress in addressing some of the significant issues in the IoT arena. This work reviews the challenges and threats in the IoT environment and how integration with Blockchain can resolve some of them.


2019 ◽  
Vol 40 (1) ◽  
pp. 48-52 ◽  
Author(s):  
Peter Buell Hirsch

Purpose This viewpoint is intended to examine the issue of the monetization of personal data and the risks to companies that fail to understand this trend. Design/methodology/approach This paper reviews the recent literature on the use and abuse of personal data to identify relevant trends and issues. Findings It is likely, whether through blockchain technology or some other means, that individual consumers will be able to monetize their data. Research limitations/implications As a review of secondary sources rather than original sources, the findings are anecdotal and not comprehensive. Practical implications In the rapidly changing environment of data privacy and security, one should anticipate that the findings may become outdated by sudden events such as a new global data privacy breach. Social implications Ownership of personal data and its use or abuse is one of the single most important social issues in today’s world, with profound implications for civil society. Originality/value While there have been numerous studies cataloguing attempts to create monetization platforms for consumer data, there are not many studies on the reputational risks for companies in handling data from the Internet of Things.


2019 ◽  
Vol 27 (2) ◽  
pp. 292-323 ◽  
Author(s):  
Omerah Yousuf ◽  
Roohie Naaz Mir

Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks. Findings The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated. Originality/value The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.


Sign in / Sign up

Export Citation Format

Share Document