{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:03:35Z","timestamp":1774073015656,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s12599-024-00864-9","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T09:01:31Z","timestamp":1713776491000},"page":"209-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Internet of Things Network Security Improvement Investment"],"prefix":"10.1007","volume":"67","author":[{"given":"Xiufeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,22]]},"reference":[{"key":"864_CR1","doi-asserted-by":"publisher","first-page":"11250","DOI":"10.1109\/JIOT.2020.2996671","volume":"7","author":"MS Abdalzaher","year":"2020","unstructured":"Abdalzaher MS, Muta O (2020) A game-theoretic approach for enhancing security and data trustworthiness in IoT applications. IEEE Internet Things J 7:11250\u201311261. https:\/\/doi.org\/10.1109\/JIOT.2020.2996671","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"864_CR2","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1287\/isre.2020.0962","volume":"32","author":"P Adamopoulos","year":"2021","unstructured":"Adamopoulos P, Todri V, Ghose A (2021) Demand effects of the internet-of-things sales channel: evidence from automating the purchase process. Inf Syst Res 32(1):238\u2013267. https:\/\/doi.org\/10.1287\/isre.2020.0962","journal-title":"Inf Syst Res"},{"key":"864_CR3","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1287\/msom.2019.0775","volume":"22","author":"V Agrawal","year":"2020","unstructured":"Agrawal V, Oraiopoulos N (2020) The role of decision rights in codevelopment initiatives. Manuf Serv Oper Manag 22:832\u2013849. https:\/\/doi.org\/10.1287\/msom.2019.0775","journal-title":"Manuf Serv Oper Manag"},{"key":"864_CR4","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1111\/poms.12700","volume":"26","author":"A Agrawal","year":"2017","unstructured":"Agrawal A, Muthulingam S, Rajapakshe T (2017) How sourcing of interdependent components affects quality in automotive supply chains. Prod Oper Manag 26:1512\u20131533. https:\/\/doi.org\/10.1111\/poms.12700","journal-title":"Prod Oper Manag"},{"key":"864_CR5","doi-asserted-by":"publisher","first-page":"8699","DOI":"10.1287\/mnsc.2022.4307","volume":"68","author":"S Alaei","year":"2022","unstructured":"Alaei S, Makhdoumi A, Malekian A, Peke\u010d S (2022) Revenue-sharing allocation strategies for two-sided media platforms: pro-rata vs. user-centric. Manag Sci 68:8699\u20138721. https:\/\/doi.org\/10.1287\/mnsc.2022.4307","journal-title":"Manag Sci"},{"key":"864_CR7","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1287\/mnsc.2020.3614","volume":"67","author":"A Arora","year":"2021","unstructured":"Arora A, Belenzon S, Patacconi A (2021) Knowledge sharing in alliances and alliance portfolios. Manag Sci 67:1569\u20131585. https:\/\/doi.org\/10.1287\/mnsc.2020.3614","journal-title":"Manag Sci"},{"key":"864_CR8","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1287\/mksc.2013.0786","volume":"32","author":"E Ascarza","year":"2013","unstructured":"Ascarza E, Hardie BGS (2013) A joint model of usage and churn in contractual settings. Mark Sci 32:570\u2013590. https:\/\/doi.org\/10.1287\/mksc.2013.0786","journal-title":"Mark Sci"},{"key":"864_CR9","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1287\/isre.2014.0527","volume":"25","author":"T August","year":"2014","unstructured":"August T, Niculescu MF, Shin H (2014) Cloud implications on software network structure and security risks. Inf Syst Res 25:489\u2013510. https:\/\/doi.org\/10.1287\/isre.2014.0527","journal-title":"Inf Syst Res"},{"key":"864_CR10","doi-asserted-by":"publisher","first-page":"4575","DOI":"10.1287\/mnsc.2018.3153","volume":"65","author":"T August","year":"2019","unstructured":"August T, Dao D, Kim K (2019) Market segmentation and software security: pricing patching rights. Manag Sci 65:4575\u20134597. https:\/\/doi.org\/10.1287\/mnsc.2018.3153","journal-title":"Manag Sci"},{"key":"864_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040","volume":"192","author":"L Babun","year":"2021","unstructured":"Babun L, Denney K, Celik ZB et al (2021) A survey on IoT platforms: communication, security, and privacy perspectives. Comput Netw 192:108040. https:\/\/doi.org\/10.1016\/j.comnet.2021.108040","journal-title":"Comput Netw"},{"key":"864_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2019.102101","volume":"90\u201391","author":"A Basaure","year":"2020","unstructured":"Basaure A, Vesselkov A, T\u00f6yli J (2020) Internet of things (IoT) platform competition: consumer switching versus provider multihoming. Technovation 90\u201391:102101. https:\/\/doi.org\/10.1016\/j.technovation.2019.102101","journal-title":"Technovation"},{"issue":"1","key":"864_CR13","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1007\/s10479-022-04595-6","volume":"324","author":"M Ben-Daya","year":"2023","unstructured":"Ben-Daya M, Hassini E, Bahroun Z, Saeed H (2023) Optimal pricing in the presence of IoT investment and quality-dependent demand. Ann Oper Res 324(1):869\u2013892. https:\/\/doi.org\/10.1007\/s10479-022-04595-6","journal-title":"Ann Oper Res"},{"key":"864_CR14","doi-asserted-by":"publisher","first-page":"108858","DOI":"10.1016\/j.ijpe.2023.108858","volume":"260","author":"GB Benitez","year":"2023","unstructured":"Benitez GB, Ghezzi A, Frank AG (2023) When technologies become Industry 4.0 platforms: defining the role of digital technologies through a boundary-spanning perspective. Int J Prod Econ 260:108858. https:\/\/doi.org\/10.1016\/j.ijpe.2023.108858","journal-title":"Int J Prod Econ"},{"key":"864_CR15","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1287\/msom.1100.0315","volume":"13","author":"GP Cachon","year":"2011","unstructured":"Cachon GP, Feldman P (2011) Pricing services subject to congestion: charge per-use fees or sell subscriptions? Manuf Serv Oper Manag 13:244\u2013260. https:\/\/doi.org\/10.1287\/msom.1100.0315","journal-title":"Manuf Serv Oper Manag"},{"key":"864_CR16","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1287\/mnsc.2021.4101","volume":"68","author":"S Callander","year":"2021","unstructured":"Callander S, Matouschek N (2021) The novelty of innovation: competition, disruption, and antitrust policy. Manag Sci 68:37\u201351. https:\/\/doi.org\/10.1287\/mnsc.2021.4101","journal-title":"Manag Sci"},{"key":"864_CR17","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.ejor.2022.11.019","volume":"308","author":"T Chernonog","year":"2023","unstructured":"Chernonog T, Levy P (2023) Co-creation of mobile app quality in a two-platform supply chain when platforms are asymmetric. Eur J Oper Res 308:183\u2013200. https:\/\/doi.org\/10.1016\/j.ejor.2022.11.019","journal-title":"Eur J Oper Res"},{"key":"864_CR18","unstructured":"Consumers International and Internet Society (2019) The trust opportunity: exploring consumers\u2019 attitudes to the internet of things. (Report No. CC BY-NC-SA 4.0 2). https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/05\/CI_IS_Joint_Report-EN.pdf. Accessed 26 July 2023"},{"key":"864_CR300","doi-asserted-by":"publisher","unstructured":"Garg A, Demirezen EM, Dogan K, Cheng HK (2022) Financial sustainability of IoT platforms: the role of quality and security. Prod Oper Manag. https:\/\/doi.org\/10.1111\/poms.13834","DOI":"10.1111\/poms.13834"},{"key":"864_CR21","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1287\/MNSC.2022.4490","volume":"69","author":"S Gupta","year":"2022","unstructured":"Gupta S, Roy A, Kumar S, Mudambi R (2022) When worse is better: strategic choice of vendors with differentiated capabilities in a complex cocreation environment. Manag Sci 69:2833\u20132851. https:\/\/doi.org\/10.1287\/MNSC.2022.4490","journal-title":"Manag Sci"},{"key":"864_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2022.104600","volume":"51","author":"J Henkel","year":"2022","unstructured":"Henkel J (2022) Licensing standard-essential patents in the IoT\u2014a value chain perspective on the markets for technology. Res Policy 51:104600. https:\/\/doi.org\/10.1016\/j.respol.2022.104600","journal-title":"Res Policy"},{"key":"864_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122563","volume":"192","author":"M Hu","year":"2023","unstructured":"Hu M, Pantano E, Stylos N (2023) \u201cHome alone\u201d no more: how does the internet of things (IoT) enhance travellers\u2019 subjective well-being. Technol Forecast Soc Change 192:122563. https:\/\/doi.org\/10.1016\/j.techfore.2023.122563","journal-title":"Technol Forecast Soc Change"},{"key":"864_CR24","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1287\/isre.2018.0806","volume":"30","author":"KL Hui","year":"2019","unstructured":"Hui KL, Ke PF, Yao Y, Yue WT (2019) Bilateral liability-based contracts in information security outsourcing. Inf Syst Res 30:411\u2013429. https:\/\/doi.org\/10.1287\/isre.2018.0806","journal-title":"Inf Syst Res"},{"key":"864_CR25","doi-asserted-by":"publisher","first-page":"4515","DOI":"10.1111\/poms.13865","volume":"31","author":"N Joglekar","year":"2022","unstructured":"Joglekar N, Anderson EG, Lee K et al (2022) Configuration of digital and physical infrastructure platforms: private and public perspectives. Prod Oper Manag 31:4515\u20134528. https:\/\/doi.org\/10.1111\/poms.13865","journal-title":"Prod Oper Manag"},{"key":"864_CR26","unstructured":"Kaspersky (2023) Internet of things security threats. https:\/\/www.kaspersky.com\/resource-center\/threats\/internet-of-things-security-risks. Accessed 29 August 2023"},{"key":"864_CR27","doi-asserted-by":"publisher","first-page":"4389","DOI":"10.1287\/mnsc.2022.4614","volume":"69","author":"TT Ke","year":"2022","unstructured":"Ke TT, Sudhir K (2022) Privacy rights and data security: GDPR and personal data markets. Manag Sci 69:4389\u20134412. https:\/\/doi.org\/10.1287\/mnsc.2022.4614","journal-title":"Manag Sci"},{"key":"864_CR28","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1287\/mnsc.1120.1573","volume":"59","author":"SH Kim","year":"2013","unstructured":"Kim SH, Netessine S (2013) Collaborative cost reduction and component procurement under information asymmetry. Manag Sci 59:189\u2013206. https:\/\/doi.org\/10.1287\/mnsc.1120.1573","journal-title":"Manag Sci"},{"key":"864_CR29","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1111\/j.1937-5956.2010.01189.x","volume":"20","author":"BC Kim","year":"2011","unstructured":"Kim BC, Chen PY, Mukhopadhyay T (2011) The effect of liability and patch release on software security: the monopoly case. Prod Oper Manag 20:603\u2013617. https:\/\/doi.org\/10.1111\/j.1937-5956.2010.01189.x","journal-title":"Prod Oper Manag"},{"key":"864_CR30","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.comcom.2021.06.003","volume":"176","author":"A Kumar","year":"2021","unstructured":"Kumar A, Sharma S, Goyal N et al (2021) Secure and energy-efficient smart building architecture with emerging technology IoT. Comput Commun 176:207\u2013217. https:\/\/doi.org\/10.1016\/j.comcom.2021.06.003","journal-title":"Comput Commun"},{"key":"864_CR32","doi-asserted-by":"publisher","first-page":"4964","DOI":"10.1287\/mnsc.2021.4125","volume":"68","author":"K Ladas","year":"2022","unstructured":"Ladas K, Kavadias S, Loch C (2022) Product selling vs. pay-per-use service: a strategic analysis of competing business models. Manag Sci 68:4964\u20134982. https:\/\/doi.org\/10.1287\/mnsc.2021.4125","journal-title":"Manag Sci"},{"key":"864_CR33","doi-asserted-by":"publisher","first-page":"2120","DOI":"10.1287\/mnsc.2019.3306","volume":"66","author":"J Lee","year":"2020","unstructured":"Lee J, Krishnan V, Shin H (2020) Business models for technology-intensive supply chains. Manag Sci 66:2120\u20132139. https:\/\/doi.org\/10.1287\/mnsc.2019.3306","journal-title":"Manag Sci"},{"key":"864_CR36","doi-asserted-by":"publisher","unstructured":"Li T, Chen L, Jia F, Tang O (2022) The development of an industry environment for the internet of things: evidence from China. IEEE Trans Eng Manag 1\u201313. https:\/\/doi.org\/10.1109\/TEM.2022.3163298","DOI":"10.1109\/TEM.2022.3163298"},{"key":"864_CR39","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.1111\/poms.13666","volume":"31","author":"S Luo","year":"2022","unstructured":"Luo S, Choi TM (2022) E-commerce supply chains with considerations of cyber-security: should governments play a role? Prod Oper Manag 31:2107\u20132126. https:\/\/doi.org\/10.1111\/poms.13666","journal-title":"Prod Oper Manag"},{"key":"864_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.108665","volume":"173","author":"BJ Ma","year":"2022","unstructured":"Ma BJ, Zhang Y, Liu S et al (2022) Operational strategies for IoT-enabled Brick-and-Mortar retailers in a competitive market. Comput Ind Eng 173:108665. https:\/\/doi.org\/10.1016\/j.cie.2022.108665","journal-title":"Comput Ind Eng"},{"key":"864_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101151","volume":"59","author":"M Merhi","year":"2019","unstructured":"Merhi M, Hone K, Tarhini A (2019) A cross-cultural study of the intention to use mobile banking between Lebanese and British consumers: extending UTAUT2 with security, privacy and trust. Technol Soc 59:101151. https:\/\/doi.org\/10.1016\/j.techsoc.2019.101151","journal-title":"Technol Soc"},{"key":"864_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2023.108937","volume":"263","author":"P Mosch","year":"2023","unstructured":"Mosch P, Majocco P, Obermaier R (2023) Contrasting value creation strategies of industrial-IoT-platforms \u2013 a multiple case study. Int J Prod Econ 263:108937. https:\/\/doi.org\/10.1016\/j.ijpe.2023.108937","journal-title":"Int J Prod Econ"},{"key":"864_CR43","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","volume":"24","author":"M Noura","year":"2019","unstructured":"Noura M, Atiquzzaman M, Gaedke M (2019) Interoperability in internet of things: taxonomies and open challenges. Mob Netw Appl 24:796\u2013809. https:\/\/doi.org\/10.1007\/s11036-018-1089-9","journal-title":"Mob Netw Appl"},{"key":"864_CR44","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.iot.2018.09.009","volume":"3\u20134","author":"EGM Petrakis","year":"2018","unstructured":"Petrakis EGM, Sotiriadis S, Soultanopoulos T et al (2018) Internet of things as a Service (iTaaS): challenges and solutions for management of sensor data on the cloud and the fog. Internet of Things 3\u20134:156\u2013174. https:\/\/doi.org\/10.1016\/j.iot.2018.09.009","journal-title":"Internet of Things"},{"key":"864_CR45","doi-asserted-by":"publisher","first-page":"5234","DOI":"10.1287\/mnsc.2017.2911","volume":"64","author":"M Rahmani","year":"2018","unstructured":"Rahmani M, Roels G, Karmarkar US (2018) Team leadership and performance: combining the roles of direction and contribution. Manag Sci 64:5234\u20135249. https:\/\/doi.org\/10.1287\/mnsc.2017.2911","journal-title":"Manag Sci"},{"key":"864_CR46","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1287\/isre.2016.0683","volume":"27","author":"S Ransbotham","year":"2016","unstructured":"Ransbotham S, Fichman RG, Gopal R, Gupta A (2016) Ubiquitous IT and digital vulnerabilities. Inf Syst Res 27:834\u2013847","journal-title":"Inf Syst Res"},{"key":"864_CR47","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/TITS.2018.2885054","volume":"20","author":"A Riahi Sfar","year":"2019","unstructured":"Riahi Sfar A, Challal Y, Moyal P, Natalizio E (2019) A game theoretic approach for privacy preserving model in IoT-based transportation. IEEE Trans Intell Transp Syst 20:4405\u20134414. https:\/\/doi.org\/10.1109\/TITS.2018.2885054","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"864_CR48","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1287\/msom.2014.0495","volume":"16","author":"G Roels","year":"2014","unstructured":"Roels G (2014) Optimal design of coproductive services: interaction and work allocation. Manuf Serv Oper Manag 16:578\u2013594","journal-title":"Manuf Serv Oper Manag"},{"key":"864_CR49","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ijpe.2014.09.003","volume":"159","author":"K Rong","year":"2015","unstructured":"Rong K, Hu G, Lin Y et al (2015) Understanding business ecosystem using a 6C framework in Internet-of-Things-based sectors. Int J Prod Econ 159:41\u201355. https:\/\/doi.org\/10.1016\/j.ijpe.2014.09.003","journal-title":"Int J Prod Econ"},{"key":"864_CR50","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1287\/MSOM.2020.0958","volume":"24","author":"S Saghafian","year":"2022","unstructured":"Saghafian S, Tomlin B, Biller S (2022) The internet of things and information fusion: who talks to who? Manuf Serv Oper Manag 24:333\u2013351. https:\/\/doi.org\/10.1287\/MSOM.2020.0958","journal-title":"Manuf Serv Oper Manag"},{"key":"864_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122452","volume":"191","author":"G Scur","year":"2023","unstructured":"Scur G, da Silva AVD, Mattos CA, Gon\u00e7alves RF (2023) Analysis of IoT adoption for vegetable crop cultivation: multiple case studies. Technol Forecast Soc Change 191:122452. https:\/\/doi.org\/10.1016\/j.techfore.2023.122452","journal-title":"Technol Forecast Soc Change"},{"key":"864_CR52","doi-asserted-by":"publisher","DOI":"10.1111\/poms.13626","author":"Y Shi","year":"2021","unstructured":"Shi Y, Yu H, Yu Y, Yue X (2021) Analytics for IoT-enabled human\u2013robot hybrid sortation: an online optimization approach. Prod Oper Manag. https:\/\/doi.org\/10.1111\/poms.13626","journal-title":"Prod Oper Manag"},{"key":"864_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2020.102281","volume":"101","author":"J Sim","year":"2021","unstructured":"Sim J, Kim B (2021) Sourcing decision in the presence of a complementary component. Omega 101:102281. https:\/\/doi.org\/10.1016\/j.omega.2020.102281","journal-title":"Omega"},{"key":"864_CR54","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1016\/j.ejor.2022.04.041","volume":"304","author":"R Sui","year":"2023","unstructured":"Sui R, Zhang X, Dan B et al (2023) Bilateral value-added service investment in platform competition with cross-side network effects under multihoming. Eur J Oper Res 304:952\u2013963. https:\/\/doi.org\/10.1016\/j.ejor.2022.04.041","journal-title":"Eur J Oper Res"},{"key":"864_CR55","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1111\/poms.13615","volume":"31","author":"C Sun","year":"2022","unstructured":"Sun C, Ji Y (2022) For better or for worse: impacts of IoT technology in e-commerce channel. Prod Oper Manag 31:1353\u20131371. https:\/\/doi.org\/10.1111\/poms.13615","journal-title":"Prod Oper Manag"},{"key":"864_CR56","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1287\/ISRE.2019.0882","volume":"31","author":"B Tan","year":"2020","unstructured":"Tan B, Anderson EG, Parker GG (2020) Platform pricing and investment to drive third-party value creation in two-sided networks. Inf Syst Res 31:217\u2013239. https:\/\/doi.org\/10.1287\/ISRE.2019.0882","journal-title":"Inf Syst Res"},{"key":"864_CR57","unstructured":"Thales (2022) IoT security issues in 2022: a business perspective. https:\/\/www.thalesgroup.com\/en\/markets\/digital-identity-and-security\/iot\/magazine\/internet-threats. Accessed 7 October 2023"},{"key":"864_CR58","unstructured":"Thales (2023) Building trust in IoT devices with powerful IoT security solutions. https:\/\/www.thalesgroup.com\/en\/markets\/digital-identity-and-security\/iot\/iot-security. Accessed 17 July 2023"},{"key":"864_CR59","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1111\/POMS.13377","volume":"30","author":"Z Tian","year":"2021","unstructured":"Tian Z, Gurnani H, Xu Y (2021) Collaboration in development of new drugs. Prod Oper Manag 30:3943\u20133966. https:\/\/doi.org\/10.1111\/POMS.13377","journal-title":"Prod Oper Manag"},{"key":"864_CR60","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s12599-018-0565-x","volume":"61","author":"O Turetken","year":"2019","unstructured":"Turetken O, Grefen P, Gilsing R, Adali OE (2019) Service-dominant business model design for digital innovation in smart mobility. Bus Inf Syst Eng 61:9\u201329. https:\/\/doi.org\/10.1007\/s12599-018-0565-x","journal-title":"Bus Inf Syst Eng"},{"key":"864_CR61","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s12599-022-00770-y","volume":"65","author":"P Valderas","year":"2023","unstructured":"Valderas P, Torres V, Serral E (2023) Towards an interdisciplinary development of IoT-enhanced business processes. Bus Inf Syst Eng 65:25\u201348. https:\/\/doi.org\/10.1007\/s12599-022-00770-y","journal-title":"Bus Inf Syst Eng"},{"key":"864_CR62","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1287\/msom.2022.1096","volume":"24","author":"Y Wang","year":"2022","unstructured":"Wang Y, Yin R, Chen X, Webster S (2022) Investment efforts under complementary sourcing: the role of market risk and endogenous pricing. Manuf Serv Oper Manag 24:2595\u20132610. https:\/\/doi.org\/10.1287\/msom.2022.1096","journal-title":"Manuf Serv Oper Manag"},{"key":"864_CR63","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.1287\/mnsc.1120.1552","volume":"58","author":"W Xiao","year":"2012","unstructured":"Xiao W, Xu Y (2012) The impact of royalty contract revision in a multistage strategic R&D alliance. Manag Sci 58:2251\u20132271. https:\/\/doi.org\/10.1287\/mnsc.1120.1552","journal-title":"Manag Sci"},{"key":"864_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2021.108291","volume":"242","author":"W Xiao","year":"2021","unstructured":"Xiao W, Li K, Fu H (2021) Quality investment in a decentralized assembly system with backward shareholding. Int J Prod Econ 242:108291. https:\/\/doi.org\/10.1016\/j.ijpe.2021.108291","journal-title":"Int J Prod Econ"},{"key":"864_CR66","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1109\/TEM.2022.3177188","volume":"70","author":"S Yadav","year":"2023","unstructured":"Yadav S, Choi TM, Luthra S et al (2023) Using internet of things (IoT) in agri-food supply chains: a research framework for social good with network clustering analysis. IEEE Trans Eng Manag 70:1215\u20131224. https:\/\/doi.org\/10.1109\/TEM.2022.3177188","journal-title":"IEEE Trans Eng Manag"},{"key":"864_CR67","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1111\/poms.13274","volume":"30","author":"M Yang","year":"2021","unstructured":"Yang M, Jacob VS, Raghunathan S (2021) Cloud service model\u2019s role in provider and user security investment incentives. Prod Oper Manag 30:419\u2013437. https:\/\/doi.org\/10.1111\/poms.13274","journal-title":"Prod Oper Manag"},{"key":"864_CR68","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.neucom.2023.01.007","volume":"528","author":"R Zgheib","year":"2023","unstructured":"Zgheib R, Chahbandarian G, Kamalov F et al (2023) Towards an ML-based semantic IoT for pandemic management: a survey of enabling technologies for COVID-19. Neurocomputing 528:160\u2013177. https:\/\/doi.org\/10.1016\/j.neucom.2023.01.007","journal-title":"Neurocomputing"},{"key":"864_CR69","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ejor.2022.08.035","volume":"307","author":"W Zhu","year":"2023","unstructured":"Zhu W, Xie J, Xia Y et al (2023) Getting more third-party participants on board: optimal pricing and investment decisions in competitive platform ecosystems. Eur J Oper Res 307:177\u2013192. https:\/\/doi.org\/10.1016\/j.ejor.2022.08.035","journal-title":"Eur J Oper Res"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00864-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-024-00864-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00864-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T05:01:00Z","timestamp":1741842060000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-024-00864-9"}},"subtitle":["The Role of Platform and Smart Device Manufacturer"],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["864"],"URL":"https:\/\/doi.org\/10.1007\/s12599-024-00864-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3322546\/v1","asserted-by":"object"}]},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,22]]},"assertion":[{"value":"25 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}