Fuzzy AHP analysis of Internet of Things (IoT) in enterprises

Abstract Internet of Things (IoT) is a term that has been introduced in recent years, and it defines objects being able to connect and transfer data through the internet. Although some IoT-related products are currently available in the market, there are still some IoT problems that need to be overcome, such as the security issues and lack of confidence and understanding of IoT. This study aims to analyze the influential factors in building successful IoT system for IoT-related enterprises. This study develops a rule-based decision support mechanism using fuzzy set theory and the Analytic Hierarchy Process (AHP) to evaluate the influential factors in IoT. This study finds that tangible factors (Security, Value and Connectivity) are more important than the intangible factors (Telepresence and Intelligence). Finally, this study concludes that after enterprises build a good IoT connectivity system, it is essential to combine this with good IoT security to create a successful IoT environment. Enterprises should also consider both IoT security and IoT values for the IoT products and employees' working convenience.

[1]  Jin Ho Park,et al.  A Security Generic Service Interface of Internet of Things (IoT) Platforms , 2017, Symmetry.

[2]  Kwai-Sang Chin,et al.  Fuzzy analytic hierarchy process: A logarithmic fuzzy preference programming methodology , 2011, Int. J. Approx. Reason..

[3]  Wenyu Dou,et al.  The Internet of Things and interaction style: the effect of smart interaction on brand attachment , 2017 .

[4]  M. Y. Yoshino,et al.  Strategic Alliances: An Entrepreneurial Approach to Globalization , 1995 .

[5]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[6]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[7]  D. Sicker,et al.  Towards 5G: Scenario-based assessment of the future supply and demand for mobile telecommunications infrastructure , 2018, Technological Forecasting and Social Change.

[8]  Shuang-Hua Yang,et al.  How the internet of things technology enhances emergency response operations , 2013 .

[9]  Donna L. Hoffman,et al.  Emergent Experience and the Connected Consumer in the Smart Home Assemblage and the Internet of Things , 2015 .

[10]  Yu-Hui Wang,et al.  Explore technology innovation and intelligence for IoT (Internet of Things) based eyewear technology , 2018 .

[11]  Wen-Hsiang Lai,et al.  Fuzzy rule-based analysis of firm's technology transfer in Taiwan's machinery industry , 2009, Expert Syst. Appl..

[12]  Fernando Boavida,et al.  A Taxonomy of Faults for Wireless Sensor Networks , 2017, Journal of Network and Systems Management.

[13]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[14]  Charles C. Ragin,et al.  Fuzzy-Set Social Science , 2001 .

[15]  Remco M. Dijkman,et al.  Business models for the Internet of Things , 2015, Int. J. Inf. Manag..

[16]  Jiafu Wan,et al.  Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.

[17]  Seongcheol Kim,et al.  A multi-criteria approach toward discovering killer IoT application in Korea , 2016 .

[18]  Wei Sun,et al.  Influence of characteristics of the Internet of Things on consumer purchase intention , 2014 .

[19]  S. Roy,et al.  Value co-creation with Internet of things technology in the retail industry , 2017 .

[20]  Jin Kwak,et al.  System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats , 2018, KSII Trans. Internet Inf. Syst..

[21]  John Seely Brown,et al.  Shaping Strategies for the IoT , 2017, Computer.

[22]  Chin-Lung Hsu,et al.  An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives , 2016, Comput. Hum. Behav..

[23]  David Alan Grier The Radical Technology of Industrie 4.0 , 2017, Computer.

[24]  Daniele Miorandi,et al.  A secure and quality-aware prototypical architecture for the Internet of Things , 2016, Inf. Syst..

[25]  Partha Pratim Ray A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..

[26]  Sven Ove Hansson,et al.  The case for ethical technology assessment (eTA) , 2006 .

[27]  T. Saaty,et al.  The Analytic Hierarchy Process , 1985 .

[28]  Marimuthu Palaniswami,et al.  An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.

[29]  Jan Damsgaard,et al.  Binary trading relations and the limits of EDI standards: the Procrustean bed of standards , 2000, Eur. J. Inf. Syst..

[30]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[31]  G Sutherland Douglas,et al.  Process Watch: Yield management turns green , 2016 .

[32]  Kamalrulnizam Abu Bakar,et al.  Adaptive energy aware cluster-based routing protocol for wireless sensor networks , 2017, Wirel. Networks.

[33]  Hyo-Chan Bang,et al.  Adaptive Internet of Things and Web of Things convergence platform for Internet of reality services , 2015, The Journal of Supercomputing.