{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T23:03:33Z","timestamp":1762211013125,"version":"3.40.5"},"reference-count":51,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,9,27]]},"abstract":"<jats:p>Determining the appropriate approaches and procedures to gain sufficient results is a vital issue that is faced by the majority of researchers. Each type of research can have several methodologies that can be applied. Yet, one approach might lead to concluding more effective outcomes. Thus, designing the research and applying appropriate methods and techniques are the key aim of this experiment. Combining the research onion framework with an advanced Internet of Things- (IoT-) enabled mobile app solution within the real world is the foundation of this research. The framework has six main layers, starting with philosophy and ending with techniques and procedures. This research begins by providing a brief introduction in regard to the selected framework. Then, it provides a comprehensive explanation regarding each of the framework layers and justifying the chosen element within each layer combining with the advanced IoT-enabled mobile app for this research study. Later, it highlights the challenges that can be faced while using such a framework.<\/jats:p>","DOI":"10.1155\/2021\/4270998","type":"journal-article","created":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T22:20:20Z","timestamp":1632781220000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Research Onion for Smart IoT-Enabled Mobile Applications"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0967-1885","authenticated-orcid":true,"given":"Ryan","family":"Alturki","sequence":"first","affiliation":[{"name":"Department of Information Science, College of Computer and Information Systems, Umm Al Qura University, Makkah, Saudi Arabia"}]}],"member":"311","reference":[{"volume-title":"Research Methods for Business Students","year":"2009","author":"M. Saunders","key":"1"},{"volume-title":"Generic Design and Construction Process Protocol: Final Report","year":"1998","author":"M. Kagioglou","key":"2"},{"unstructured":"IqbalR.MuwongeM. G.The Impact of Advertisement on Consumer Behaviour; a Case Study of Nokia2012Cardiff, WalesUniversity of WalesDissertion","key":"3"},{"unstructured":"KarasevaV.Features for mobile Applications Popularity2014Lappeenranta, FinlandLappeenranta University of TechnologyMaster Thesis","key":"4"},{"volume-title":"Use of Technology and its Influence on Project success. A Study of E-Commerce Companies in Ireland","year":"2013","author":"I. Meller","key":"5"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1504\/ijmc.2006.008605"},{"volume-title":"Investigating the Role of Procurement Practices in Effective Implementation of Infrastructure Projects in a Developing Country: A Case of Pakistan","year":"2011","author":"M. A. Noor","key":"7"},{"author":"T. Omotayo","article-title":"The research methodology for the development of a kaizen costing framework suitable for indigenous construction firms in Lagos, Nigeria","key":"8"},{"volume-title":"The Opening of Vision: Nihilism and the Postmodern Situation","year":"1988","author":"D. M. Levin","key":"9"},{"unstructured":"DavisonR. M.An Action Research Perspective of Group Support Systems: How to Improve Meetings in Hong Kong1998Hong Kong, ChinaCity University of Hong KongPhD Dissertation","key":"10"},{"volume-title":"Philosophy, Science and Social Inquiry: Contemporary Methodological Controversies in Social Science and Related Applied fields of Research","year":"1987","author":"D. C. Phillips","key":"11"},{"volume-title":"Qualitative Inquiry: A Dictionary of Terms","year":"1997","author":"T. A. Schwandt","key":"12"},{"volume-title":"How to Make Our Ideas clear","year":"1878","author":"C. S. Peirce","key":"13"},{"year":"2009","author":"AlzheimerEurope","article-title":"The Four Main Approaches","key":"14"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.2307\/2011902"},{"author":"M. Nissen","article-title":"Lessons learned to guide project management theory and research: pragmatism and knowledge flow","key":"16"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1057\/palgrave.jors.2602065"},{"volume-title":"Logic: The Theory of Enquiry","year":"1938","author":"J. Dewey","key":"18"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1057\/ejis.2011.54"},{"issue":"2","key":"20","first-page":"227","article-title":"The development of American pragmatism","volume":"5","author":"J. Dewey","year":"2007","journal-title":"Scientiae Studia"},{"author":"A. Burney","article-title":"Inductive and deductive research approach","key":"21"},{"volume-title":"Principles of Sociological Inquiry\u2013Qualitative and Quantitative Methods","year":"2012","author":"A. Blackstone","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1371\/journal.pone.0156164"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1016\/j.jbi.2015.11.008"},{"volume-title":"Usability versus Persuasion in an Application Interface Design: A Study of the Relationship between Usability & Persuasion in a Smart-Phone Application Designed to Help Optimise Domestic Energy Use and Reduce CO2 Emission","year":"2014","author":"D. Freeney","key":"25"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1155\/2021\/9221005"},{"key":"27","first-page":"1148","volume-title":"Experimental Research Methods. Handbook Of Research for Educational Communications and Technology: A Project of the Association for Educational Communications and Technology","author":"S. M. Ross","year":"1996"},{"author":"R. Alturki","doi-asserted-by":"crossref","article-title":"Usability testing of fitness mobile application: methodology and quantitative results","key":"28","DOI":"10.5121\/csit.2017.71108"},{"year":"2008","author":"O. Blakstad","article-title":"Experimental research","key":"29"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1080\/01449298408901744"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1109\/tpc.1986.6448982"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1177\/001872088903100209"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1145\/371920.372181"},{"author":"M. Borys","doi-asserted-by":"crossref","article-title":"Mobile application usability testing in quasi-real conditions","key":"34","DOI":"10.1109\/HSI.2015.7170698"},{"issue":"3","key":"35","article-title":"Apps vs devices: can the usability of mobile apps be decoupled from the device","volume":"9","author":"A. Hussain","year":"2012","journal-title":"IJCSI International Journal of Computer Science"},{"key":"36","article-title":"Protocol analysis: verbal reports as data","volume-title":"BradfordBooks","author":"K. Ericsson","year":"1984"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.1037\/0033-295x.87.3.215"},{"year":"2015","author":"Psychology","article-title":"Advantages and disadvantages of experimental research","key":"38"},{"year":"2014","author":"Occupytheory","article-title":"Advantages and disadvantages of experimental research","key":"39"},{"year":"2000","author":"Zen","article-title":"Chapter 20. Experiments","key":"40"},{"year":"2006","author":"M. Holah","article-title":"Advantages of laboratory experiments","key":"41"},{"year":"2016","author":"J. Mifsud","article-title":"Usability testing of mobile applications: a step-by-step guide","key":"42"},{"doi-asserted-by":"publisher","key":"43","DOI":"10.1509\/jmkr.45.3.261"},{"volume-title":"Design Research: Methods and Perspectives","year":"2003","author":"B. Laurel","key":"44"},{"volume-title":"Cognitive Interviewing Practice","year":"2014","author":"D. Collins","key":"45"},{"author":"G. Borriello","doi-asserted-by":"crossref","article-title":"Ubicomp 2002: ubiquitous computing","key":"46","DOI":"10.1007\/3-540-45809-3"},{"doi-asserted-by":"publisher","key":"47","DOI":"10.5121\/ijcsit.2017.9509"},{"doi-asserted-by":"publisher","key":"48","DOI":"10.14569\/IJACSA.2020.0110435"},{"doi-asserted-by":"publisher","key":"49","DOI":"10.14569\/ijacsa.2020.0110428"},{"doi-asserted-by":"publisher","key":"50","DOI":"10.1007\/978-3-319-99966-1_5"},{"doi-asserted-by":"publisher","key":"51","DOI":"10.2196\/11785"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/4270998.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/4270998.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/4270998.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T22:21:14Z","timestamp":1632781274000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/4270998\/"}},"subtitle":[],"editor":[{"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":51,"alternative-id":["4270998","4270998"],"URL":"https:\/\/doi.org\/10.1155\/2021\/4270998","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"type":"electronic","value":"1875-919X"},{"type":"print","value":"1058-9244"}],"subject":[],"published":{"date-parts":[[2021,9,27]]}}}