{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:57:13Z","timestamp":1762642633980,"version":"3.41.2"},"reference-count":20,"publisher":"Emerald","issue":"1\/2","license":[{"start":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T00:00:00Z","timestamp":1637798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EL"],"published-print":{"date-parts":[[2022,2,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The widespread use of the internet and the rapid development of the internet of things in information technology have increased the need for network-enabled marketing. It is important to service a broad class involving logistics, buyer, seller and end-users. During various phases of the sales, purchases and marketing process, IoT will influence decision-making. Electronic commerce is a new form of trade under the development of modern information technology.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>In this paper, the integrated neutrosophic framework based on the internet of things (INF-IoT) has been proposed to support marketers and companies to make a powerful marketing strategy using identified data from IoT devices.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The experimental results show that the proposed method has high performance and very efficient.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This approach may reduce business activity to its core components, which include, in the simplest case, a value proposal, distribution channels and customers, and explain how a network of multi-actors generates a product and services, distributes and uses the value in production. Furthermore, an efficient interface is provided by the logistic module to maintain an order list.<\/jats:p><\/jats:sec>","DOI":"10.1108\/el-07-2020-0197","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T01:13:45Z","timestamp":1637630025000},"page":"1-17","source":"Crossref","is-referenced-by-count":5,"title":["Internet of things-assisted integrated framework for electronic market application"],"prefix":"10.1108","volume":"40","author":[{"given":"Tao","family":"You","sequence":"first","affiliation":[]},{"given":"Balamurugan","family":"S.","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,11,25]]},"reference":[{"key":"key2022021513402467800_ref001","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.future.2018.08.035","article-title":"A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain","volume":"90","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"key2022021513402467800_ref002","doi-asserted-by":"crossref","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","article-title":"Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks","volume":"4","year":"2015","journal-title":"Journal of Cyber Security and Mobility"},{"issue":"2","key":"key2022021513402467800_ref003","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12525-016-0219-0","article-title":"Big data analytics in E-commerce: a systematic review and agenda for future research","volume":"26","year":"2016","journal-title":"Electronic Markets"},{"key":"key2022021513402467800_ref004","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jnca.2017.08.017","article-title":"A review of smart home applications based on internet of things","volume":"97","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"key2022021513402467800_ref005","first-page":"361","article-title":"Modeling the adoption of internet of things services: a conceptual framework","volume":"2","year":"2016","journal-title":"International Journal of Applied Research"},{"issue":"2","key":"key2022021513402467800_ref006","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-019-09383-2","article-title":"Hybrid geometric sampling and AdaBoost based deep learning approach for data imbalance in E-commerce","volume":"20","year":"2019","journal-title":"Electronic Commerce Research"},{"key":"key2022021513402467800_ref007","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/CSE-EUC.2017.263","article-title":"The research on innovative application of E-commerce in IoT era","volume-title":"2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)","year":"2017"},{"issue":"2","key":"key2022021513402467800_ref008","doi-asserted-by":"crossref","first-page":"603","DOI":"10.3390\/app10020603","article-title":"Interdisciplinarily exploring the most potential IoT technology determinants in the omnichannel E-commerce purchasing Decision-Making processes","volume":"10","year":"2020","journal-title":"Applied Sciences"},{"key":"key2022021513402467800_ref009","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.compag.2018.12.039","article-title":"Evolution of internet of things (IoT) and its significant impact in the field of precision agriculture","volume":"157","year":"2019","journal-title":"Computers and Electronics in Agriculture"},{"issue":"3","key":"key2022021513402467800_ref010","first-page":"1069","article-title":"Analyzing consumer attitude toward mobile payment technology and its role in booming the E-commerce business","volume":"12","year":"2020","journal-title":"Journal of Talent Development and Excellence"},{"issue":"1","key":"key2022021513402467800_ref011","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.telpol.2016.11.002","article-title":"The evolution of the internet of things industry and market in China: an interplay of institutions, demands and supply","volume":"41","year":"2017","journal-title":"Telecommunications Policy"},{"issue":"3","key":"key2022021513402467800_ref012","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.dcan.2017.10.002","article-title":"Machine learning for internet of things data analysis: a survey","volume":"4","year":"2018","journal-title":"Digital Communications and Networks"},{"issue":"2","key":"key2022021513402467800_ref013","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1080\/23738871.2017.1366536","article-title":"Security and privacy in the internet of things","volume":"2","year":"2017","journal-title":"Journal of Cyber Policy"},{"issue":"69","key":"key2022021513402467800_ref014","first-page":"345","article-title":"Future of E-commerce in India","volume":"40","year":"2020","journal-title":"Studies in Indian Place Names"},{"issue":"1","key":"key2022021513402467800_ref015","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.ijresmar.2016.11.003","article-title":"The internet-of-Things: Review and research directions","volume":"34","year":"2017","journal-title":"International Journal of Research in Marketing"},{"key":"key2022021513402467800_ref016","first-page":"1","article-title":"Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application","volume-title":"Multimedia Tools and Applications","year":"2019"},{"issue":"3","key":"key2022021513402467800_ref017","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jksuci.2016.10.003","article-title":"A survey on internet of things architectures","volume":"30","year":"2018","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"key2022021513402467800_ref018","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1109\/ISMOT.2012.6679511","article-title":"The internet of things technology in logistics application: Stages, trend and drive modes","volume-title":"2012 International Symposium on Management of Technology (ISMOT)","year":"2012"},{"key":"key2022021513402467800_ref019","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-319-50091-1_6","article-title":"Mobile commerce and the internet of things","volume-title":"Introduction to Electronic Commerce and Social Commerce","year":"2017"},{"key":"key2022021513402467800_ref020","doi-asserted-by":"crossref","first-page":"102090","DOI":"10.1016\/j.ijinfomgt.2020.102090","article-title":"Using the security triad to assess blockchain technology in public sector applications","volume":"52","year":"2020","journal-title":"International Journal of Information Management"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-07-2020-0197\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-07-2020-0197\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:07:42Z","timestamp":1753405662000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/40\/1-2\/1-17\/242370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,25]]},"references-count":20,"journal-issue":{"issue":"1\/2","published-online":{"date-parts":[[2021,11,25]]},"published-print":{"date-parts":[[2022,2,1]]}},"alternative-id":["10.1108\/EL-07-2020-0197"],"URL":"https:\/\/doi.org\/10.1108\/el-07-2020-0197","relation":{},"ISSN":["0264-0473","0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"},{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2021,11,25]]}}}