The next digital gold rush: how the internet of things will create liquid, transparent markets

2015 ◽  
Vol 43 (1) ◽  
pp. 36-41 ◽  
Author(s):  
Paul Brody ◽  
Veena Pureswaran

Purpose – The article analyses the market changes that are likely to be produced by and Internet of Things comprised of hundreds of billions of connected devices. Design/methodology/approach – Based on an IBM study, the authors foresee an Internet of Things emerging as a low-cost, private-by-design “democracy of devices” that will enable new digital economies and create new value, while offering consumers and enterprises fundamentally better products and user experiences. Findings – The IoT creates the ability to digitize, sell and deliver physical assets as easily as with virtual goods today. Using everything from Bluetooth beacons to Wi-Fi-connected door locks to allow customer access, many physical assets will become digital services. Practical implications – In a device-driven democracy, conference rooms, hotel rooms, cars and warehouse bays can themselves report capacity, utilization and availability in real-time. By taking raw capacity and making it easy to be utilized commercially, the IoT can remove barriers to fractionalization of industries that would otherwise be impossible. Originality/value – The article paints a compelling picture of a future in which the Internet of Things initiates five vectors of disruption by: Unlocking excess capacity of physical assets. 2. Creating liquid, transparent marketplaces. 3. Radical re-pricing of credit and risk. 4. Improving operational efficiency. 5. Digitally integrating value chains.

2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Author(s):  
H. B. Chi ◽  
M. F. N. Tajuddin ◽  
N. H. Ghazali ◽  
A. Azmi ◽  
M. U. Maaz

<span>This paper presents a low-cost PV current-voltage or <em>I-V</em> curve tracer that has the Internet of Things (IoT) capability. Single ended primary inductance converter (SEPIC) is used to develop the <em>I-V</em> tracer, which is able to cope with rapidly changing irradiation conditions. The <em>I-V</em> tracer control software also has the ability to automatically adapt to the varying irradiation conditions. The performance of the <em>I-V</em> curve tracer is evaluated and verified using simulation and experimental tests.</span>


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jean-Éric Pelet ◽  
Erhard Lick ◽  
Basma Taieb

Purpose This study bridges the gap between sensory marketing and the use of the internet of things (IoT) in upscale hotels. This paper aims to investigate how stimulating guests’ senses through IoT devices influenced their emotions, affective experiences, eudaimonism (well-being), and ultimately, guest behavior. The authors examined the potential moderating effects of gender. Design/methodology/approach Research conducted comprised an exploratory study, which consisted of interviews with hotel managers (Study 1) and an online confirmatory survey (n = 357) among hotel guests (Study 2). Findings The results showed that while the senses of smell, hearing and sight had an impact on guests’ emotions, the senses of touch, hearing and sight impacted guests’ affective experiences. The senses of smell and taste influenced guests’ eudaimonism. The sense of smell had a greater effect on eudaimonism and behavioral intentions among women compared to men. Research limitations/implications This study concentrated on upscale hotels located in Europe. Further research may explore the generalizability of the findings (e.g. in other cultures, comparison between high-end and low-end hotels). Practical implications Managers of upscale hotels should apply congruent sensory stimuli from all five senses. Stimuli may be customized (“SoCoIoT” marketing). IoT in hotels may be useful in the aftermath of the COVID pandemic, as voice commands help guests avoid touching surfaces. Originality/value IoT can be applied in creating customized multi-sensory hotel experiences. For example, hotels may offer unique and diverse ambiances in their rooms and suites to improve guest experiences.


Author(s):  
Bin Lin

The Internet of Things is another information technology revolution and industrial wave after computer, Internet and mobile communication. It is becoming a key foundation and an important engine for the green, intelligent and sustainable development of economic society. The new networked intelligent production mode characterized by the integration innovation of the Internet of Things is shaping the core competitiveness of the future manufacturing industry. The application of sensor network data positioning and monitoring technology based on the Internet of Things in industry, power and other industries is a hot field for the development of the Internet of Things. Sensor network processing and industrial applications are becoming increasingly complex, and new features have appeared in the sensor network scale and infrastructure in these fields. Therefore, the Internet of Things perception data processing has become a research hotspot in the deep integration process between industry and the Internet of Things. This paper deeply analyzes and summarizes the characteristics of sensor network perception data under the new trend of the Internet of Things as well as the research on location monitoring technology, and makes in-depth exploration from the release and location monitoring of sensor network perception data of the Internet of Things. Sensor network technology integrated sensor technology, micro-electromechanical system technology, wireless communication technology, embedded computing technology and distributed information processing technology in one, with easy layout, easy control, low power consumption, flexible communication, low cost and other characteristics. Therefore, based on the release and location monitoring technologies of sensor network data based on the Internet of Things in different applications, this paper studies the corresponding networking technologies, energy management, data management and fusion methods. Standardization system in wireless sensor network low cost, and convenient data management needs, design the iot oriented middleware, and develops the software and hardware system, the application demonstration, the results show that the design of wireless sensor network based on iot data monitoring and positioning technology is better meet the application requirements, fine convenient integration of software and hardware, and standardized requirements and suitable for promotion.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rabia Saylam ◽  
Abdulkadir Ozdemir

Purpose This study aims to examine the perception of military people regarding the use of a network of various intelligent objects, the Internet of Things (IoT), in the future battlespace. Design/methodology/approach A research model that analyzes military acceptance of the IoT is proposed. The model is created by integrating the technology acceptance model and diffusion of innovation theory. Then an empirical study is conducted through a survey, and the proposed hypotheses are tested. The findings are obtained thanks to the structural equation model (SEM), which clearly reveals the overall dependency relationship among independent and dependent variables even when a dependent variable is an independent variable in another relationship. Findings The study clearly reveals the significant factors effecting the attitude toward the use of IoT in the military. It also uncovers potential barriers to the adoption of IoT in the military domain. Especially, risk factor seems to have no significant impact on the acceptance of IoT, and also, there seems to be a positive relationship between risk and trust contrary to an expected negative relationship. Originality/value To the best of the authors’ knowledge, this study is the first research analyzing the acceptance of IoT in the military domain through hypotheses in a SEM.


2020 ◽  
Vol 40 (7/8) ◽  
pp. 1243-1268
Author(s):  
Andreas Schroeder ◽  
Parikshit Naik ◽  
Ali Ziaee Bigdeli ◽  
Tim Baines

PurposeThe purpose of this study is to investigate how the internet of things (IoT) contributes to manufacturers' advanced services development and delivery. To better understand the creation of these IoT contributions, the study adopts a socio-technical research perspective, which expands the scope of the investigation and integrates the technological, information and social factors that enable these IoT contributions.Design/methodology/approachA multiple-case research method was employed to investigate the IoT contribution scenarios of 15 manufacturers who offer advanced services and to examine their dependence on other non-IoT factors, using thematic analysis.FindingsThe analysis identified five advanced services value propositions, which are enabled by nine “IoT-enabled information systems (IS) artefacts” that specify the distinct interactions between the technological, information and social subsystems supporting the manufacturers' advanced services value propositions.Originality/valueThe study advances the servitisation research by demonstrating that IoT technology on its own is insufficient for the creation of the IoT contributions. It shows, instead, the need for close interactions with a diverse range of other factors, which are often not considered when developing an IoT strategy. The study also introduces the IS artefact notion as a unit of analysis that constitutes an alternative to the commonly adopted techno-centric perspective used to conceptualise IoT contributions. The study and its findings add to the development of a socio-technical perspective on the IoT in advanced services and thereby suggests a number of theoretical and practical implications.


2020 ◽  
Vol 14 (1) ◽  
pp. 144-151 ◽  
Author(s):  
Sudip Misra ◽  
Sanku Kumar Roy ◽  
Arijit Roy ◽  
Mohammad S. Obaidat ◽  
Avantika Jha

2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


Sign in / Sign up

Export Citation Format

Share Document