Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of this research together with the guiding research questions and subquestions followed by a review of the relevant literature in chapter two. Chapter three provides a detailed description of the study’s qualitative methodology and chapter four presents the results of the data analysis. Finally, chapter fives provide a summary of the research together with answers to the study’s guiding research questions and subquestions.
The Implementation of Internet of Things (IoT): A Case Study of the Barriers that Prevent Implementation of IoT within Small Businesses
Chapter 2: Literature Review
Chapter Introduction
The review of literature will be critical to establishing the current scope of innovation related to the IoT as well as its potential for expansion, especially into use by SMEs. To this end, this chapter describes more fully the study’s guiding Unified Theory of Acceptance and Use of Technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current trends that are having an impact on its proliferation. In addition, an examination of the risks that are associated with the implementation of IoT is followed by an analysis of other barriers that prevent the implementation of IoT by small businesses. Finally, a summary of the research and the key findings that emerged from a synthesis of the relevant literature conclude the chapter.
Theoretical/Conceptual Framework
The theoretical/conceptual framework that will be used in this study was originally developed by Venkatesh, Morris, Davis, and Davis (2003) by integrating a number of disparate elements from previous models to create a more accurate approach to understanding how and why technology-related decisions are made by organizations today. The Venkatesh et al. (2003) theoretical model draws on a number of key elements from eight previous theories or models in order to produce a more robust overview concerning the effects of different motivational factors on the technology-related decision-making process to identify how and why end users actually use different technologies.
The rationale in support of this more comprehensive model included identifying similarities between earlier models that could be applied in novel ways to gain fresh applicable insights that can be applied to similar situations involving the uptake of new technologies. This comprehensive model was termed the Unified Theory of Acceptance and Use of Technology (UTAUT) which was regarded as highly relevant for the purposes of this study as well. As noted in the introductory chapter, the topics selected for the questionnaire described further in chapter 3 below were based upon the UTAUT and were designed to explicate the respective levels of acceptance of technology acceptance and willingness to adopt innovations by stakeholders . Moreover, there is a growing body of research that confirms the effectiveness of the UTAUT model for guiding future research technology acceptance-related analyses (Venkatesh et al., 2003), including the acceptance levels for the adoption of the IoT.
The use of the UTAUT model is also highly appropriate for the purposes of this study because individual acceptance levels of information technology (IT) have been a key focus of many of the studies concerning new technology implementations to date (Venkatesh, Thong & Xu, 2016). Furthermore, the UTAUT draws on a growing body of scholarship that supports the logical notion that in order to enhance acceptance levels of new technologies, individuals must first have the opportunity to gain hands-on experience with them (Venkatesh et al., 2016). In this regard, Venkatesh et al. (2016) emphasize that, “There is also research on technology adoption by groups and organizations that holds the premise that one must first use a technology before one can achieve desired outcomes, such as improvement in employee productivity and task/job performance in organizations” (p. 328).
Four key factors comprise the UTAUT model as follows: (1) performance expectancy, (2) effort expectancy, (3) social influence, and (4) facilitating conditions as well as four moderators (1) age, (2) gender, (3) experience, and (4) voluntariness that can facilitate the analysis of behavioral intention levels to actually use a new technology, generally in organizational contexts (Venkatesh et al., 2016). An analysis of the accuracy of the four key factors of the UTAUT model in predicting new technology acceptance levels by Venkatesh et al. (2016) showed that performance expectancy, effort expectancy, and social influence influenced behavioral intention to use a technology were all predicted accurately. Likewise, various facilitating conditions and behavioral intention influenced actual technology usage (Venkatesh et al., 2016).
In addition, other researchers have also used the UTAUT model to examine the effects of the above-stated four moderators on acceptance of new technology levels and found that the model explained more than three-quarters (77%) of variance levels in respondents’ behavioral intention to use a technology and more than half (52%) of their variance in actual technology usage (Venkatesh et al., 2016). In sum, the UTAUT model provides a useful conceptual framework in which to develop timely and informed answers to the following guiding research questions and subquestions as stated in the introductory chapter:
RQ1. Why do SMEs view implementing and using IoT a risk?
RQ1a. What are the barriers (real or perceived) to implementation of IoT?
RQ2. How are IoT security risks and business risks related?
Technology That Will Change LogisticsIntroductionLogistics and supply chain management have always been a challenging area for companies, military organizations, and governments. With globalization and the increased complexity of supply chain networks, it is becoming increasingly difficult to ensure that goods are delivered on time, at the right place, and at the right cost. Furthermore, the COVID-19 pandemic has highlighted the vulnerability of supply chains, leading many organizations to seek ways
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now