{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:09:17Z","timestamp":1774436957994,"version":"3.50.1"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319999500","type":"print"},{"value":"9783319999517","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99951-7_8","type":"book-chapter","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T15:26:07Z","timestamp":1535210767000},"page":"113-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Exploring the Determinants of IoT Adoption: Findings from a Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Marian","family":"Carcary","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Maccani","sequence":"additional","affiliation":[]},{"given":"Eileen","family":"Doherty","sequence":"additional","affiliation":[]},{"given":"Gerard","family":"Conway","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,26]]},"reference":[{"key":"8_CR1","unstructured":"Accenture: From Productivity to Outcomes. Using the Internet of Things to Drive Future Business Strategies. Accenture (2015)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jnca.2016.03.006","volume":"66","author":"D Airehrour","year":"2016","unstructured":"Airehrour, D., Gutierrez, J., Ray, S.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198\u2013213 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Al Awadhi, S., Morris, A.: The use of the UTAUT model in the adoption of e-government services in Kuwait. In Proceedings of the 41st Hawaii International Conference on System Sciences, pp. 1\u201311. IEEE, Hawaii (2008)","DOI":"10.1109\/HICSS.2008.452"},{"issue":"2","key":"8_CR5","first-page":"254","volume":"87","author":"F Al-Harby","year":"2010","unstructured":"Al-Harby, F., Qahwaji, R., Kamala, M.: Users\u2019 acceptance of secure biometrics authentication system: reliability and validation of an extended UTAUT model. Commun. Comput. Inf. Sci. 87(2), 254\u2013258 (2010)","journal-title":"Commun. Comput. Inf. Sci."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1016\/j.comcom.2012.07.001","volume":"36","author":"F Al-Turjman","year":"2013","unstructured":"Al-Turjman, F., Al-Fagih, A., Alsalih, W., Hassanein, H.: A delay-tolerant framework for integrated RSNs in IoT. Comput. Commun. 36, 998\u20131010 (2013)","journal-title":"Comput. Commun."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MNET.2016.7437030","volume":"30","author":"M Amadeo","year":"2016","unstructured":"Amadeo, M., et al.: Information-centric networking for the internet of things: challenges and opportunities. IEEE Netw. 30, 92\u2013100 (2016)","journal-title":"IEEE Netw."},{"key":"8_CR8","volume-title":"Business Research Methods","author":"B Blumberg","year":"2014","unstructured":"Blumberg, B., Cooper, D.R., Schlinder, P.S.: Business Research Methods. McGraw Hill, Berkshire (2014)"},{"issue":"5","key":"8_CR9","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1080\/0144929X.2012.674157","volume":"32","author":"D Boos","year":"2013","unstructured":"Boos, D., Guenter, H., Grote, G., Kinder, K.: Controllable accountabilities: the internet of things and its challenges for organizations. Behav. Inf. Technol. 32(5), 449\u2013467 (2013)","journal-title":"Behav. Inf. Technol."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia, E.: The internet of things vision: key features, applications and open issues. Comput. Commun. 54, 1\u201331 (2014)","journal-title":"Comput. Commun."},{"key":"8_CR11","volume-title":"How Providers Can Succeed in the Internet of Things","author":"A Bosche","year":"2016","unstructured":"Bosche, A., Crawford, D., Jackson, D., Schallehn, M., Smith, P.: How Providers Can Succeed in the Internet of Things. Bain Insights, Munich (2016)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., de Donato, W., Persico, V., Pescape, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR13","first-page":"16","volume":"11","author":"T Bradley","year":"2014","unstructured":"Bradley, T., Thibodeau, P., Ng, V.: The internet of things - threats and challenges. Netw. World Asia 11, 16\u201318 (2014)","journal-title":"Netw. World Asia"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.clsr.2015.12.001","volume":"32","author":"X Caron","year":"2016","unstructured":"Caron, X., Bosua, R., Maynard, S., Ahmad, A.: The internet of things (IoT) and its impact on individual privacy: an australian perspective. Comput. Law Secur. Rev. 32, 4\u201315 (2016)","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"8_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1097\/PEC.0b013e3181ce2f99","volume":"26","author":"DJ Chisolm","year":"2010","unstructured":"Chisolm, D.J., Purnell, T.S., Cohen, D.M., McAlearney, A.S.: Clinician perceptions of an electronic medical record during the first year of implementation in emergency services. Pediatr. Emerg. Care 26(2), 107\u2013110 (2010)","journal-title":"Pediatr. Emerg. Care"},{"issue":"18","key":"8_CR16","doi-asserted-by":"publisher","first-page":"2141","DOI":"10.1049\/iet-com.2013.0283","volume":"7","author":"K Cho","year":"2013","unstructured":"Cho, K., Lee, B., Lee, K., Lee, D.: Energy-efficient replica detection for resource- limited mobile devices in the internet of things. IET Commun. 7(18), 2141\u20132150 (2013)","journal-title":"IET Commun."},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 19(2), 189\u2013211 (1995)","journal-title":"MIS Q."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1016\/j.comcom.2012.02.014","volume":"35","author":"D Corujo","year":"2012","unstructured":"Corujo, D., Lebre, M., Gomes, D., Aguiar, R.: MINDiT: a framework for media independent access to things. Comput. Commun. 35, 1772\u20131785 (2012)","journal-title":"Comput. Commun."},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"14","key":"8_CR20","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","volume":"22","author":"FD Davis","year":"1992","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111\u20131132 (1992)","journal-title":"J. Appl. Soc. Psychol."},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.comcom.2015.05.010","volume":"74","author":"P DiMarco","year":"2016","unstructured":"DiMarco, P., Athanasiou, G., Mekikis, P., Fischione, C.: MAC-aware routing metrics for the internet of things. Comput. Commun. 74, 77\u201386 (2016)","journal-title":"Comput. Commun."},{"issue":"2","key":"8_CR22","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1108\/BPMJ-05-2015-0076","volume":"22","author":"G Dominici","year":"2016","unstructured":"Dominici, G., Roblek, V., Abbate, T., Tani, M.: Click and drive. Bus. Process Manage. J. 22(2), 420\u2013434 (2016)","journal-title":"Bus. Process Manage. J."},{"issue":"3","key":"8_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/info-09-2013-0047","volume":"16","author":"W Dutton","year":"2014","unstructured":"Dutton, W.: Putting things to work: social and policy challenges for the internet of things. Info 16(3), 1\u201321 (2014)","journal-title":"Info"},{"issue":"2","key":"8_CR24","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1108\/BPMJ-05-2015-0079","volume":"22","author":"M Ferretti","year":"2016","unstructured":"Ferretti, M., Schiavone, F.: Internet of things and business processes redesign in sea- ports: the case of Hamburg. Bus. Process Manage. J. 22(2), 271\u2013284 (2016)","journal-title":"Bus. Process Manage. J."},{"key":"8_CR25","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"M Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wiley Publishing Company, Massachusetts (1975)"},{"issue":"2","key":"8_CR26","first-page":"125","volume":"5","author":"E Fleisch","year":"2010","unstructured":"Fleisch, E.: What is the internet of things? An economic perspective. Econ. Manage. Financ. Markets 5(2), 125\u2013157 (2010)","journal-title":"Econ. Manage. Financ. Markets"},{"issue":"10","key":"8_CR27","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-016-0510-0","volume":"98","author":"D Georgakopoulos","year":"2016","unstructured":"Georgakopoulos, D., Jayaraman, P.P.: Internet of things: from internet scale sensing to smart services. Computing 98(10), 1041\u20131058 (2016)","journal-title":"Computing"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2014.07.013","volume":"54","author":"L Grieco","year":"2014","unstructured":"Grieco, L., et al.: IoT-aided robotics applications: technological implications, target domains and open issues. Comput. Commun. 54, 32\u201347 (2014)","journal-title":"Comput. Commun."},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1016\/j.jnca.2012.12.028","volume":"36","author":"B Guo","year":"2013","unstructured":"Guo, B., Zhang, D., Wang, Z., Yu, Z., Zhou, X.: Opportunistic IoT: exploring the harmonious interaction between humans and the internet of things. J. Netw. Comput. Appl. 36, 1531\u20131539 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.ijpe.2014.12.013","volume":"164","author":"R Haass","year":"2015","unstructured":"Haass, R., Dittmer, P., Veigt, M., L\u00fctjen, M.: Reducing food losses and carbon emission by using autonomous control\u2013a simulation study of the intelligent container. Int. J. Prod. Econ. 164, 400\u2013408 (2015)","journal-title":"Int. J. Prod. Econ."},{"issue":"9","key":"8_CR31","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2015.7263372","volume":"53","author":"A Hakiri","year":"2015","unstructured":"Hakiri, A., Berthou, P., Gokhale, A., Abdellatif, S.: Publish\/subscribe-enabled software defined networking for efficient and scalable IoT communications. IEEE Commun. Mag. 53(9), 48\u201354 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"8_CR32","first-page":"1","volume":"46","author":"J Heikkila","year":"2010","unstructured":"Heikkila, J., Smale, A.: The effects of language standardization on the acceptance and use of e-HRM systems in foreign subsidiaries. J. World Bus. 46(3), 1\u20139 (2010)","journal-title":"J. World Bus."},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.future.2015.09.016","volume":"56","author":"M Henze","year":"2016","unstructured":"Henze, M., Hermerschmidt, L., Kerpen, D., H\u00e4u\u00dfling, R., Rumpe, B., Wehrle, K.: A comprehensive approach to privacy in the cloud-based internet of things. Future Gener. Comput. Syst. 56, 701\u2013718 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"8_CR34","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/07421222.1999.11518247","volume":"16","author":"PJ Hu","year":"1999","unstructured":"Hu, P.J., Chau, P.Y., Sheng, O.R.L., Tam, K.Y.: Examining the technology acceptance model using physician acceptance of telemedicine technology. J. Manage. Inf. Syst. 16(2), 91\u2013112 (1999)","journal-title":"J. Manage. Inf. Syst."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Huang, S., Wang, X.: Influence of organizational system to end-users\u2019 acceptance of ERP system in chinese enterprises. In: Proceedings of the 9th International Conference on Hybrid Intelligent Systems, pp. 160\u2013164. IEEE, Shenyang (2009)","DOI":"10.1109\/HIS.2009.323"},{"key":"8_CR36","unstructured":"Intel: The Intel IoT Platform \u2013 Architecture Specification White Paper (2017). https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/iot-platform-reference-architecture-paper.pdf"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.future.2015.09.003","volume":"56","author":"A Jacobsson","year":"2016","unstructured":"Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Gener. Comput. Syst. 56, 719\u2013733 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2014.11.009","volume":"49","author":"H Jiang","year":"2015","unstructured":"Jiang, H., Shen, F., Chen, S., Li, K., Jeong, Y.: A secure and scalable storage system for aggregate data in IoT. Future Gener. Comput. Syst. 49, 133\u2013141 (2015)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"8_CR39","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/JSEN.2010.2060480","volume":"11","author":"W Lang","year":"2011","unstructured":"Lang, W., Jedermann, R., Mrugala, D., Jabbari, A., Krieg-Br\u00fcckner, B., Schill, K.: The \u201cintelligent container\u201d\u2014a cognitive sensor network for transport management. IEEE Sens. J. 11(3), 688\u2013698 (2011)","journal-title":"IEEE Sens. J."},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Kyoochun, L.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58, 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"8_CR41","unstructured":"McKinsey: The Internet of Things: Mapping the Value Beyond the Hype (2015)"},{"issue":"7","key":"8_CR42","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1108\/IMDS-11-2015-0478","volume":"116","author":"D Mishra","year":"2016","unstructured":"Mishra, D., Gunasekaran, A., Childe, S.J., Papadopoulos, T., Dubey, R., Wamba, S.: Vision, applications and future challenges of internet of things: a bibliometric study of the recent literature. Ind. Manage. Data Syst. 116(7), 1331\u20131355 (2016)","journal-title":"Ind. Manage. Data Syst."},{"issue":"2","key":"8_CR43","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1108\/BPMJ-05-2015-0077","volume":"22","author":"A Murray","year":"2016","unstructured":"Murray, A., Papa, A., Cuozzo, B., Russo, G.: Evaluating the innovation of the internet of things. Bus. Process Manage. J. 22(2), 341\u2013356 (2016)","journal-title":"Bus. Process Manage. J."},{"key":"8_CR44","volume-title":"Diffusion of Technologies and Social Behavior","year":"2013","unstructured":"Nakicenovic, N., Gr\u00fcbler, A. (eds.): Diffusion of Technologies and Social Behavior. Springer, Berlin (2013)"},{"key":"8_CR45","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.cose.2015.06.002","volume":"54","author":"R Neisse","year":"2015","unstructured":"Neisse, R., Steri, G., Fovino, I., Baldini, G.: SecKit: a model-based security toolkit for the internet of things. Comput. Secur. 54, 60\u201376 (2015)","journal-title":"Comput. Secur."},{"issue":"3","key":"8_CR46","first-page":"12","volume":"11","author":"V Ng","year":"2014","unstructured":"Ng, V.: Drivers and obstacles to IoT adoption in Asia Pacific. Netw. World Asia 11(3), 12\u201314 (2014)","journal-title":"Netw. World Asia"},{"issue":"43","key":"8_CR47","first-page":"879","volume":"37","author":"C Okoli","year":"2015","unstructured":"Okoli, C.: A guide to conducting a standalone systematic literature review. Commun. Associ. Inf. Syst. 37(43), 879\u2013910 (2015)","journal-title":"Commun. Associ. Inf. Syst."},{"issue":"1","key":"8_CR48","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/j.eswa.2010.07.005","volume":"38","author":"JC Pai","year":"2011","unstructured":"Pai, J.C., Tu, F.M.: The acceptance and use of customer relationship management (CRM) systems: an empirical study of distribution service industry in Taiwan. Expert Syst. Appl. 38(1), 579\u2013584 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"8_CR49","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s12525-017-0251-8","volume":"27","author":"M Papert","year":"2017","unstructured":"Papert, M., Pflaum, A.: Development of an ecosystem model for the realization of internet of things services in supply chain management. Electr. Mark. 27(2), 175 (2017)","journal-title":"Electr. Mark."},{"issue":"2","key":"8_CR50","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.im.2014.08.008","volume":"52","author":"G Par\u00e9","year":"2015","unstructured":"Par\u00e9, G., Trudel, M.C., Jaana, M., Kitsiou, S.: Synthesizing information systems knowledge: a typology of literature reviews. Inf. Manag. 52(2), 183 (2015)","journal-title":"Inf. Manag."},{"key":"8_CR51","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jss.2015.01.027","volume":"103","author":"P Patel","year":"2015","unstructured":"Patel, P., Cassou, D.: Enabling high-level application development for the internet of things. J. Syst. Softw. 103, 62\u201384 (2015)","journal-title":"J. Syst. Softw."},{"key":"8_CR52","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1049\/et.2014.1109","volume":"9","author":"A Pye","year":"2014","unstructured":"Pye, A.: The internet of things: connecting the unconnected. Eng. Technol. 9, 64\u201370 (2014)","journal-title":"Eng. Technol."},{"key":"8_CR53","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.jnca.2015.12.016","volume":"64","author":"Y Qin","year":"2016","unstructured":"Qin, Y., Sheng, Q., Falkner, N., Dustdar, S., Wang, H., Vasilakos, A.: When things matter: a survey on data-centric internet of things. J. Netw. Comput. Appl. 64, 137\u2013153 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR54","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.ijpe.2014.09.001","volume":"159","author":"X Qiu","year":"2015","unstructured":"Qiu, X., Luo, H., Xu, G., Zhong, R., Huang, G.: Physical assets and service sharing for iot-enabled supply hub in industrial park (SHIP). Int. J. Prod. Econ. 159, 4\u201315 (2015)","journal-title":"Int. J. Prod. Econ."},{"key":"8_CR55","volume-title":"Diffusion of Innovations","author":"EM Rogers","year":"1995","unstructured":"Rogers, E.M.: Diffusion of Innovations. Free Press, New York (1995)"},{"key":"8_CR56","volume-title":"Diffusion of Innovations","author":"EM Rogers","year":"2010","unstructured":"Rogers, E.M.: Diffusion of Innovations. Simon and Schuster, New York (2010)"},{"key":"8_CR57","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"issue":"3","key":"8_CR58","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1057\/ejis.2014.7","volume":"23","author":"F Rowe","year":"2014","unstructured":"Rowe, F.: What literature review is not: diversity, boundaries and recommendations. Eur. J. Inf. Syst. 23(3), 241\u2013255 (2014)","journal-title":"Eur. J. Inf. Syst."},{"key":"8_CR59","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.comnet.2015.08.002","volume":"91","author":"S Sahraoui","year":"2015","unstructured":"Sahraoui, S., Bilami, A.: Efficient HIP-based approach to ensure light weight end-to-end security in the internet of things. Comput. Netw. 91, 26\u201345 (2015)","journal-title":"Comput. Netw."},{"key":"8_CR60","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.comnet.2014.02.001","volume":"64","author":"Y Saied","year":"2014","unstructured":"Saied, Y., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the internet of things. Comput. Netw. 64, 273\u2013295 (2014)","journal-title":"Comput. Netw."},{"issue":"9","key":"8_CR61","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1049\/et.2014.0926","volume":"9","author":"A Saint","year":"2014","unstructured":"Saint, A.: Internet of things: brave new world. Eng. Technol. 9(9), 80\u201383 (2014)","journal-title":"Eng. Technol."},{"issue":"2","key":"8_CR62","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1108\/10662241011032236","volume":"20","author":"M Sambasivan","year":"2010","unstructured":"Sambasivan, M., Wemyss, G.P., Rose, R.C.: User acceptance of a G2B system: a case of electronic procurement system in Malaysia. Internet Res. 20(2), 169\u2013187 (2010)","journal-title":"Internet Res."},{"key":"8_CR63","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.jclepro.2015.03.055","volume":"100","author":"F Shrouf","year":"2015","unstructured":"Shrouf, F., Miragliotta, G.: Energy management based on internet of things: practices and framework for adoption in production management. J. Clean. Prod. 100, 235\u2013246 (2015)","journal-title":"J. Clean. Prod."},{"key":"8_CR64","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"8_CR65","first-page":"5","volume":"71","author":"A Sofronijevi\u0107","year":"2014","unstructured":"Sofronijevi\u0107, A., Mili\u0107evi\u0107, V., lli\u0107, B.: Smart city as a framework for creating competitive advantages in international business management. Management 71, 5\u201315 (2014)","journal-title":"Management"},{"key":"8_CR66","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1016\/j.jclepro.2016.10.006","volume":"140","author":"BLR Stojkoska","year":"2017","unstructured":"Stojkoska, B.L.R., Trivodaliev, K.V.: A review of internet of things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454\u20131464 (2017)","journal-title":"J. Clean. Prod."},{"key":"8_CR67","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1353-4858(14)70069-8","volume":"7","author":"A Storey","year":"2014","unstructured":"Storey, A.: There\u2019s nothing \u2018smart\u2019 about insecure connected devices. Netw. Secur. 7, 9\u201312 (2014)","journal-title":"Netw. Secur."},{"issue":"2","key":"8_CR68","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144\u2013176 (1995)","journal-title":"Inf. Syst. Res."},{"key":"8_CR69","unstructured":"TEKSystems: The State of the Internet of Things: Executive Summary (2016)"},{"issue":"1","key":"8_CR70","doi-asserted-by":"publisher","first-page":"124","DOI":"10.2307\/249443","volume":"15","author":"RL Thompson","year":"1991","unstructured":"Thompson, R.L., Higgins, C.A., Howell, J.M.: Personal computing: toward a conceptual model of utilization. MIS Q. 15(1), 124\u2013143 (1991)","journal-title":"MIS Q."},{"issue":"2","key":"8_CR71","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1108\/ICT-07-2015-0045","volume":"48","author":"C Valmohammadi","year":"2016","unstructured":"Valmohammadi, C.: Examining the perception of iranian organizations on internet of things solutions and applications. Ind. Commer. Train. 48(2), 104\u2013108 (2016)","journal-title":"Ind. Commer. Train."},{"issue":"2","key":"8_CR72","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance mod- el: four longitudinal field studies. Manage. Sci. 46(2), 186\u2013204 (2000)","journal-title":"Manage. Sci."},{"issue":"3","key":"8_CR73","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"key":"8_CR74","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"R Weber","year":"2010","unstructured":"Weber, R.: Internet of things \u2013 new security and privacy challenges. Comput. Law Secur. Rev. 26, 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"key":"8_CR75","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.clsr.2015.07.002","volume":"31","author":"R Weber","year":"2015","unstructured":"Weber, R.: Internet of things: privacy issues revisited. Comput. Law Secur. Rev. 31, 618\u2013627 (2015)","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"8_CR76","first-page":"13","volume":"26","author":"J Webster","year":"2002","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26(2), 13\u201323 (2002)","journal-title":"MIS Q."},{"key":"8_CR77","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.bushor.2015.06.005","volume":"58","author":"B Weinberg","year":"2015","unstructured":"Weinberg, B., Milne, G., Andonova, Y., Hajjat, F.: Internet of things: convenience vs. privacy and secrecy. Bus. Horiz. 58, 615\u2013624 (2015)","journal-title":"Bus. Horiz."},{"issue":"3","key":"8_CR78","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1108\/JEIM-09-2014-0088","volume":"28","author":"MD Williams","year":"2015","unstructured":"Williams, M.D., Rana, N.P., Dwivedi, Y.K.: The unified theory of acceptance and use of technology (UTAUT): a literature review. J. Enterp. Inf. Manage. 28(3), 443\u2013488 (2015)","journal-title":"J. Enterp. Inf. Manage."},{"key":"8_CR79","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MNET.2016.7437031","volume":"30","author":"K Xu","year":"2016","unstructured":"Xu, K., Qu, Y., Yang, K.: A tutorial on the internet of things: from a heterogeneous network integration perspective. IEEE Netw. 30, 102\u2013108 (2016)","journal-title":"IEEE Netw."},{"key":"8_CR80","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"8_CR81","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TCE.2015.7389813","volume":"61","author":"J Yun","year":"2015","unstructured":"Yun, J., Ahn, I., Sung, N., Kim, J.: A device software platform for consumer electronics based on the internet of things. IEEE Trans. Consum. Electr. 61(4), 564\u2013571 (2015)","journal-title":"IEEE Trans. Consum. Electr."},{"issue":"1","key":"8_CR82","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26\u201333 (2017)","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Business Information Processing","Perspectives in Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99951-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:40:18Z","timestamp":1710351618000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99951-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319999500","9783319999517"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99951-7_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Informatics Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bir2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bir2018.dsv.su.se\/welcome-to-bir-2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}