{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T09:57:17Z","timestamp":1726480637239},"reference-count":56,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JEIM"],"published-print":{"date-parts":[[2019,11,13]]},"abstract":"\nPurpose<\/jats:title>\nDespite the availability of prior studies on the Internet of Things (IoT) development, they have largely focused on challenges associated with evolving IoT. Hence, identifying requirements for IoT development, as a multifaceted phenomenon, whereby the challenges would be tackled remains a less-explored valuable line of inquiry. The purpose of this paper is to present a holistic view of crucial building blocks of IoT development, in order to fill this gap.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nThis paper conducts empirical research using a grounded theory (GT), centering on semi-structured interviews with 25 experts involved in the Iranian IoT development effort. Data were analyzed by using MAXQDA software.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nThis study presents a conceptual framework of requirements for IoT development, consisting of 14 concepts and 5 categories. The findings reveal that strategic, interactive, institutional, market-oriented and information and communication technology (ICT) infrastructure requirements play a salient role in facilitating IoT development.<\/jats:p>\n<\/jats:sec>\n\nPractical implications<\/jats:title>\nThe findings of this study shed some light on the momentous aspects of IoT development. Practitioners including governmental policymakers, industry and private sectors could benefit from the policy recommendations offered in this study in terms of strategic viewpoint, legal issues, business perspective and technological readiness.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nFrom the methodological aspect, the present research is among the first studies on utilizing GT for exploration of requirements for IoT development. From the theoretical perspective, a remarkable achievement of this study is to profoundly discover some less-explored concepts of IoT development such as commercialization, feasibility study, futurology and institutional aspects. Furthermore, findings of this study highlight the contribution of innovation systems theory for the IoT development area in terms of alignment of the emerged requirements for IoT development with the functions of this theory.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jeim-02-2019-0060","type":"journal-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T15:00:23Z","timestamp":1573657223000},"page":"23-50","source":"Crossref","is-referenced-by-count":11,"title":["A comprehensive framework for Internet of Things development"],"prefix":"10.1108","volume":"33","author":[{"given":"Kimia","family":"Ghaffari","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Lagzian","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Kazemi","sequence":"additional","affiliation":[]},{"given":"Gholamreza","family":"Malekzadeh","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2020012215053801500_ref001","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1108\/IMP-01-2015-0002","article-title":"Service innovations enabled by the internet of things","volume":"9","year":"2015","journal-title":"IMP Journal"},{"issue":"15","key":"key2020012215053801500_ref002","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: a survey","volume":"54","year":"2010","journal-title":"Computer Networks"},{"issue":"3","key":"key2020012215053801500_ref003","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","article-title":"A blockchain future for internet of things security: a position paper","volume":"4","year":"2018","journal-title":"Digital Communications & Networks"},{"issue":"3","key":"key2020012215053801500_ref004","first-page":"407","article-title":"Analyzing the functional dynamics of technological innovation systems: a scheme of analysis","volume":"97","year":"2008","journal-title":"Research Policy"},{"issue":"4","key":"key2020012215053801500_ref005","first-page":"1","article-title":"The internet of things vision: key features, applications and open issues","volume":"54","year":"2014","journal-title":"Computer Communications"},{"issue":"1","key":"key2020012215053801500_ref006","first-page":"277","article-title":"Intertwining the internet of things and consumers\u2019 behavior science: future promises for businesses","volume":"136","year":"2018","journal-title":"Technological Forecasting & Social Change"},{"issue":"1","key":"key2020012215053801500_ref007","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.clsr.2015.12.001","article-title":"The Internet of Things (IoT) and its impact on individual privacy: an Australian perspective","volume":"32","year":"2016","journal-title":"Computer Law & Security Review"},{"issue":"18","key":"key2020012215053801500_ref008","first-page":"17","article-title":"On the interplay of internet of things and cloud computing: a systematic mapping study","volume":"89-90","year":"2016","journal-title":"Computer Communications"},{"key":"key2020012215053801500_ref009","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","year":"2008"},{"issue":"3","key":"key2020012215053801500_ref010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/info-09-2013-0047","article-title":"Putting things to work: social and policy challenges for the Internet of Things","volume":"16","year":"2014","journal-title":"Info"},{"issue":"1","key":"key2020012215053801500_ref011","first-page":"377","article-title":"A qualitative evaluation of IPv6 for the Industrial Internet of Things","volume":"134","year":"2018","journal-title":"Procedia Computer Science"},{"issue":"2","key":"key2020012215053801500_ref012","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1108\/APJML-06-2013-0061","article-title":"A unified perspective on the factors influencing consumer acceptance of Internet of Things technology","volume":"26","year":"2014","journal-title":"Asia Pacific Journal of Marketing & Logistics"},{"key":"key2020012215053801500_ref013","volume-title":"The Discovery of Grounded Theory Strategies for Qualitative Research","year":"1967"},{"key":"key2020012215053801500_ref014","volume-title":"Doing Grounded Theory: Issues and Discussions","year":"1998"},{"issue":"2","key":"key2020012215053801500_ref015","first-page":"23","article-title":"Conceptualization: on theory and theorizing using grounded theory","volume":"1","year":"2008","journal-title":"International Journal of Qualitative Methods"},{"issue":"2","key":"key2020012215053801500_ref016","first-page":"1","article-title":"Remodeling grounded theory","volume":"5","year":"2004","journal-title":"Forum Qualitative Social Research"},{"issue":"7","key":"key2020012215053801500_ref017","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of things (IoT): a vision, architectural elements, and future directions","volume":"29","year":"2013","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"key2020012215053801500_ref018","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.techfore.2006.03.002","article-title":"Functions of innovation systems: a new approach for analysing technological change","volume":"74","year":"2007","journal-title":"Technological Forecasting & Social Change"},{"issue":"3","key":"key2020012215053801500_ref019","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1108\/JSTPM-03-2017-0007","article-title":"Internet plus policy: a study on how China can achieve economic growth through the internet of things","volume":"8","year":"2017","journal-title":"Journal of Science & Technology Policy Management"},{"issue":"3","key":"key2020012215053801500_ref020","first-page":"516","article-title":"An empirical examination of consumer adoption of Internet of Things services: network externalities and concern for information privacy perspectives","volume":"62","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2020012215053801500_ref021","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1080\/08874417.2016.1186524","article-title":"Exploring factors affecting the adoption of Internet of Things services","volume":"58","year":"2018","journal-title":"Journal of Computer Information Systems"},{"issue":"5","key":"key2020012215053801500_ref022","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1016\/j.clsr.2018.04.007","article-title":"Ownership of personal data in the Internet of Things","volume":"34","year":"2018","journal-title":"Computer Law & Security Review"},{"issue":"6","key":"key2020012215053801500_ref023","first-page":"143","article-title":"A multi-criteria approach toward discovering killer IoT application in Korea","volume":"102","year":"2016","journal-title":"Technological Forecasting & Social Change"},{"issue":"16","key":"key2020012215053801500_ref024","first-page":"199","article-title":"Internet of Things security: a top-down survey","volume":"141","year":"2018","journal-title":"Computer Networks"},{"issue":"6","key":"key2020012215053801500_ref025","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/j.bushor.2017.07.009","article-title":"The Internet of Things and new business opportunities","volume":"60","year":"2017","journal-title":"Business Horizons"},{"issue":"1","key":"key2020012215053801500_ref026","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.telpol.2016.11.002","article-title":"The evolution of the Internet of Things industry and market in China: an interplay of institutions, demands and supply","volume":"41","year":"2017","journal-title":"Telecommunications Policy"},{"issue":"4","key":"key2020012215053801500_ref027","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","article-title":"The Internet of Things (IoT): applications, investments, and challenges for enterprises","volume":"58","year":"2015","journal-title":"Business Horizons"},{"issue":"2","key":"key2020012215053801500_ref028","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","article-title":"The Internet of Things: a security point of view","volume":"26","year":"2016","journal-title":"Internet Research"},{"key":"key2020012215053801500_ref029","volume-title":"Naturalistic Inquiry","year":"1985"},{"issue":"1","key":"key2020012215053801500_ref030","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/23270012.2016.1214540","article-title":"Traversing knowledge networks: an algorithmic historiography of extant literature on the Internet of Things (IoT)","volume":"4","year":"2017","journal-title":"Journal of Management Analytics"},{"issue":"5","key":"key2020012215053801500_ref031","first-page":"46","article-title":"Evolving privacy: from sensors to the Internet of Things","volume":"75","year":"2017","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"key2020012215053801500_ref032","first-page":"285","article-title":"Internet of Things: a systematic review of the business literature from the user and organizational perspectives","volume":"136","year":"2018","journal-title":"Technological Forecasting & Social Change"},{"issue":"5","key":"key2020012215053801500_ref033","first-page":"733","article-title":"Analyzing challenges to Internet of Things (IoT) adoption and diffusion: an Indian context","volume":"125","year":"2018","journal-title":"Procedia Computer Science"},{"issue":"1","key":"key2020012215053801500_ref034","first-page":"298","article-title":"Understanding business model in the Internet of Things industry","volume":"136","year":"2018","journal-title":"Technological Forecasting & Social Change"},{"key":"key2020012215053801500_ref035","first-page":"286","article-title":"Internet of Things ecosystems: unpacking legal relationships and liabilities","year":"2017"},{"issue":"7","key":"key2020012215053801500_ref036","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1108\/IMDS-11-2015-0478","article-title":"Vision, applications and future challenges of Internet of Things: a bibliometric study of the recent literature","volume":"116","year":"2016","journal-title":"Industrial Management & Data Systems"},{"issue":"4","key":"key2020012215053801500_ref037","first-page":"124","article-title":"A Fuzzy Analytic Network Process (FANP) approach for prioritizing internet of things challenges in Iran","volume":"53","year":"2018","journal-title":"Technology in Society"},{"issue":"1","key":"key2020012215053801500_ref038","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.ijresmar.2016.11.003","article-title":"The Internet-of-Things: review and research directions","volume":"34","year":"2017","journal-title":"International Journal of Research in Marketing"},{"issue":"2","key":"key2020012215053801500_ref039","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s12525-017-0251-8","article-title":"Development of an ecosystem model for the realization of Internet of Things (IoT) services in supply chain management","volume":"27","year":"2017","journal-title":"Electronic Markets"},{"issue":"5","key":"key2020012215053801500_ref040","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1016\/j.bushor.2017.05.010","article-title":"The Internet of Things: are you ready for what\u2019s coming?","volume":"60","year":"2017","journal-title":"Business Horizons"},{"issue":"1","key":"key2020012215053801500_ref041","first-page":"19","article-title":"Systematic survey of big data and data mining in Internet of Things","volume":"139","year":"2018","journal-title":"Computer Networks"},{"issue":"4","key":"key2020012215053801500_ref042","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.tele.2014.02.003","article-title":"A socio-technical framework for Internet of Things design: a human-centered design for the Internet of Things","volume":"31","year":"2014","journal-title":"Telematics & Informatics"},{"issue":"1","key":"key2020012215053801500_ref043","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1108\/DPRG-07-2016-0035","article-title":"Understanding the Internet of Things ecosystem: multi-level analysis of users, society, and ecology","volume":"19","year":"2017","journal-title":"Digital Policy, Regulation & Governance"},{"issue":"6","key":"key2020012215053801500_ref044","first-page":"146","article-title":"Security, privacy and trust in Internet of Things: the road ahead","volume":"76","year":"2015","journal-title":"Computer Networks"},{"issue":"3","key":"key2020012215053801500_ref045","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1108\/APJIE-12-2017-035","article-title":"Blockchains as security-enabler for industrial IoT-applications","volume":"11","year":"2017","journal-title":"Asia Pacific Journal of Innovation & Entrepreneurship"},{"key":"key2020012215053801500_ref046","unstructured":"Stern, P.C. (1994), \u201cEroding grounded theory\u201d, in Morse, J.M. (Ed.), Critical Issues in Qualitative Research Methods, Sage Publications, Thousand Oaks, CA, pp. 212-223."},{"issue":"2","key":"key2020012215053801500_ref047","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1108\/ICT-07-2015-0045","article-title":"Examining the perception of Iranian organizations on Internet of Things solutions and applications","volume":"48","year":"2016","journal-title":"Industrial & Commercial Training"},{"issue":"6","key":"key2020012215053801500_ref048","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.clsr.2009.09.002","article-title":"Internet of Things \u2013 need for a new legal environment?","volume":"25","year":"2009","journal-title":"Computer Law & Security Review"},{"issue":"1","key":"key2020012215053801500_ref049","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","article-title":"Internet of Things new security and privacy challenges","volume":"26","year":"2010","journal-title":"Computer Law & Security Review"},{"issue":"5","key":"key2020012215053801500_ref050","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.clsr.2015.07.002","article-title":"Internet of Things: privacy issues revisited","volume":"31","year":"2015","journal-title":"Computer Law & Security Review"},{"issue":"5","key":"key2020012215053801500_ref051","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.clsr.2016.07.002","article-title":"Cybersecurity in the Internet of Things: legal aspects","volume":"32","year":"2016","journal-title":"Computer Law & Security Review"},{"issue":"6","key":"key2020012215053801500_ref052","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/j.bushor.2015.06.005","article-title":"Internet of Things: convenience vs. privacy and secrecy","volume":"58","year":"2015","journal-title":"Business Horizons"},{"issue":"3","key":"key2020012215053801500_ref053","doi-asserted-by":"crossref","first-page":"685","DOI":"10.25300\/MISQ\/2017\/41.3.02","article-title":"Grounded theory methodology in information systems research","volume":"41","year":"2017","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020012215053801500_ref054","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.giq.2018.07.001","article-title":"An integrative public IoT framework for smart government","volume":"36","year":"2019","journal-title":"Government Information Quarterly"},{"issue":"4","key":"key2020012215053801500_ref055","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1504\/IJISD.2016.079586","article-title":"Internet of Things in industries: a survey for sustainable development","volume":"10","year":"2016","journal-title":"International Journal of Innovation & Sustainable Development"},{"issue":"1","key":"key2020012215053801500_ref056","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10551-014-2248-y","article-title":"Information relevance model of customized privacy for IoT","volume":"131","year":"2015","journal-title":"Journal of Business Ethics"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-02-2019-0060\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-02-2019-0060\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T15:11:21Z","timestamp":1579705881000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-02-2019-0060\/full\/html"}},"subtitle":["A grounded theory study of requirements"],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,11,13]]}},"alternative-id":["10.1108\/JEIM-02-2019-0060"],"URL":"https:\/\/doi.org\/10.1108\/jeim-02-2019-0060","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2019,11,13]]}}}