scholarly journals Internet of Things: understanding trust in techno-service systems

2017 ◽  
Vol 28 (3) ◽  
pp. 442-475 ◽  
Author(s):  
Tracy Harwood ◽  
Tony Garry

Purpose The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems contexts may be inappropriate for use within an IoT context. The purpose of this paper is to offer empirically generated understandings of trust within potential IoT applications. Design/methodology/approach In an attempt to capture and communicate the complex and all-pervading but frequently inconspicuous nature of ubiquitous technologies within potential IoT techno-systems, propositions developed are investigated using a novel mixed methods research design combining a videographic projective technique with a quantitative survey, sampling 1,200 respondents. Findings Research findings suggest the dimensionality of trust may vary according to the IoT techno-service context being assessed. Originality/value The contribution of this paper is twofold. First, and from a theoretical perspective, it offers a conceptual foundation for trust dimensions within potential IoT applications based upon empirical evaluation. Second, and from a pragmatic perspective, the paper offers insights into how findings may guide practitioners in developing appropriate trust management systems dependent upon the characteristics of particular techno-service contexts.

2015 ◽  
Vol 29 (6/7) ◽  
pp. 533-546 ◽  
Author(s):  
Tracy Harwood ◽  
Tony Garry

Purpose – This study aims to provide empirically generated insights into a gamification approach to online customer engagement and behavior (CE and CEB). There is a substantive discrepancy between popular coverage and empirically based research as to the effectiveness of virtual brand gamification in engaging customers. Design/methodology/approach – Using Samsung Nation as a unit of analysis, a mixed-methods research design using netnography and participant observation is adopted to address the research aim. Findings – Taken holistically, the findings identify key processes and outcomes of CE and CEB within virtual gamified platforms. Additionally, insights are provided into implementation flaws deriving from gamification that may potentially impact the CE experience. Originality/value – The contribution of this paper is twofold. First and from a theoretical perspective, it offers both a conceptual foundation and empirical-based evaluation of CE and CEB through a gamified brand platform. Second and from a pragmatic perspective, the conceptual model derived from this research may aid practitioners in developing more robust gamified CE strategies.


2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Emmanuel Carsamer ◽  
Anthony Abbam ◽  
Yaw N. Queku

Purpose Capital, risk and liquidity are the vitality of the banking industry, which can improve the efficiency of banking and promote the efficiency of resource allocation. The purpose of this study is to examine how Basel III new liquidity ratios affect bank capital and risk adjustments and how banks respond to the new liquidity rules. Design/methodology/approach The authors adopted the system generalized method of moments (GMM) to examine how Basel III new liquidity ratios affect bank capital and risk adjustments and how banks respond to the new liquidity rules. Based on the call reports data from banks, GMM was used to test the hypotheses that new liquidity ratios affect bank capital and risk adjustments, as well as how banks respond to the regulation. Findings The results indicate banks targeted capital, risk and liquidity and simultaneously coordinate short-term adjustments in capital and risk. New liquidity measures enable banks to coordinate risk and liquidity decisions. Short-term adjustments in new liquidity rules inversely impact bank capital. Short-term adjustments in new liquidity rules inversely impact bank capital and capital adjustments adversely affect changes in the liquidity coverage ratio (LCR). Research limitations/implications The primary results revealed that Ghanaian banks simultaneously coordinate and target capital, risk exposure and liquidity level. Also, capital adjustments positively influence risk adjustments and vice versa while bidirectional negative coordination exists between bank capital and risk on one hand and liquidity on the other hand. Short-term adjustments in new liquidity rule inversely impact bank capital and capital adjustments adversely affect changes in the LCR. The findings partially confirm the theoretical predictions of Repullo (2005) regarding the negative links between capital, risk and liquidity but the authors have higher capital induces higher risk. Practical implications Banks should balance off their targeted risk and liquidity in order not to sacrifice capital accumulation for liquidity. Originality/value This research offers new contributions in the research of bank management of capital and liquidity toward banks during a financial crisis from a theoretical perspective and trust management from an applicative perspective.


2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


2020 ◽  
Author(s):  
Anbiao Huang ◽  
Shuo Gao ◽  
Arokia Nathan

In Internet of Things (IoT) applications, among various authentication techniques, keystroke authentication methods based on a user’s touch behavior have received increasing attention, due to their unique benefits. In this paper, we present a technique for obtaining high user authentication accuracy by utilizing a user’s touch time and force information, which are obtained from an assembled piezoelectric touch panel. After combining artificial neural networks with the user’s touch features, an equal error rate (EER) of 1.09% is achieved, and hence advancing the development of security techniques in the field of IoT.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jean-Éric Pelet ◽  
Erhard Lick ◽  
Basma Taieb

Purpose This study bridges the gap between sensory marketing and the use of the internet of things (IoT) in upscale hotels. This paper aims to investigate how stimulating guests’ senses through IoT devices influenced their emotions, affective experiences, eudaimonism (well-being), and ultimately, guest behavior. The authors examined the potential moderating effects of gender. Design/methodology/approach Research conducted comprised an exploratory study, which consisted of interviews with hotel managers (Study 1) and an online confirmatory survey (n = 357) among hotel guests (Study 2). Findings The results showed that while the senses of smell, hearing and sight had an impact on guests’ emotions, the senses of touch, hearing and sight impacted guests’ affective experiences. The senses of smell and taste influenced guests’ eudaimonism. The sense of smell had a greater effect on eudaimonism and behavioral intentions among women compared to men. Research limitations/implications This study concentrated on upscale hotels located in Europe. Further research may explore the generalizability of the findings (e.g. in other cultures, comparison between high-end and low-end hotels). Practical implications Managers of upscale hotels should apply congruent sensory stimuli from all five senses. Stimuli may be customized (“SoCoIoT” marketing). IoT in hotels may be useful in the aftermath of the COVID pandemic, as voice commands help guests avoid touching surfaces. Originality/value IoT can be applied in creating customized multi-sensory hotel experiences. For example, hotels may offer unique and diverse ambiances in their rooms and suites to improve guest experiences.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rabia Saylam ◽  
Abdulkadir Ozdemir

Purpose This study aims to examine the perception of military people regarding the use of a network of various intelligent objects, the Internet of Things (IoT), in the future battlespace. Design/methodology/approach A research model that analyzes military acceptance of the IoT is proposed. The model is created by integrating the technology acceptance model and diffusion of innovation theory. Then an empirical study is conducted through a survey, and the proposed hypotheses are tested. The findings are obtained thanks to the structural equation model (SEM), which clearly reveals the overall dependency relationship among independent and dependent variables even when a dependent variable is an independent variable in another relationship. Findings The study clearly reveals the significant factors effecting the attitude toward the use of IoT in the military. It also uncovers potential barriers to the adoption of IoT in the military domain. Especially, risk factor seems to have no significant impact on the acceptance of IoT, and also, there seems to be a positive relationship between risk and trust contrary to an expected negative relationship. Originality/value To the best of the authors’ knowledge, this study is the first research analyzing the acceptance of IoT in the military domain through hypotheses in a SEM.


Sign in / Sign up

Export Citation Format

Share Document