@article{NeumannTiberiusBiendarra2022, author = {Neumann, Daniel and Tiberius, Victor and Biendarra, Florin}, title = {Adopting wearables to customize health insurance contributions}, series = {BMC medical informatics and decision making}, volume = {22}, journal = {BMC medical informatics and decision making}, publisher = {Springer Nature}, address = {London}, issn = {1472-6947}, doi = {10.1186/s12911-022-01851-4}, pages = {1 -- 7}, year = {2022}, abstract = {Background Wearables, as small portable computer systems worn on the body, can track user fitness and health data, which can be used to customize health insurance contributions individually. In particular, insured individuals with a healthy lifestyle can receive a reduction of their contributions to be paid. However, this potential is hardly used in practice. Objective This study aims to identify which barrier factors impede the usage of wearables for assessing individual risk scores for health insurances, despite its technological feasibility, and to rank these barriers according to their relevance. Methods To reach these goals, we conduct a ranking-type Delphi study with the following three stages. First, we collected possible barrier factors from a panel of 16 experts and consolidated them to a list of 11 barrier categories. Second, the panel was asked to rank them regarding their relevance. Third, to enhance the panel consensus, the ranking was revealed to the experts, who were then asked to re-rank the barriers. Results The results suggest that regulation is the most important barrier. Other relevant barriers are false or inaccurate measurements and application errors caused by the users. Additionally, insurers could lack the required technological competence to use the wearable data appropriately. Conclusion A wider use of wearables and health apps could be achieved through regulatory modifications, especially regarding privacy issues. Even after assuring stricter regulations, users' privacy concerns could partly remain, if the data exchange between wearables manufacturers, health app providers, and health insurers does not become more transparent.}, language = {en} } @article{KorteTiberiusBrem2021, author = {Korte, Andreas and Tiberius, Victor and Brem, Alexander}, title = {Internet of Things (IoT) technology research in business and management literature}, series = {Journal of theoretical and applied electronic commerce research}, volume = {16}, journal = {Journal of theoretical and applied electronic commerce research}, number = {6}, publisher = {MPDI}, address = {Basel}, issn = {0718-1876}, doi = {10.3390/jtaer16060116}, pages = {2073 -- 2090}, year = {2021}, abstract = {In coherence with the progressive digitalization of all areas of life, the Internet of Things (IoT) is a flourishing concept in both research and practice. Due to the increasing scholarly attention, the literature landscape has become scattered and fragmented. With a focus on the commercial application of the IoT and corresponding research, we employ a co-citation analysis and literature review to structure the field. We find and describe 19 research themes. To consolidate the extant research, we propose a research framework, which is based on a theoretical implementation process of IoT as a concept, specific IoT applications, or architectures integrated in an adapted input-process-output model. The main variables of the model are an initial definition and conceptualization of an IoT concept (input), which goes through an evaluation process (process), before it is implemented and can have an impact in practice (output). The paper contributes to interdisciplinary research relating to a business and management perspective on IoT by providing a holistic overview of predominant research themes and an integrative research framework.}, language = {en} } @article{SahlmannClemensNowaketal.2020, author = {Sahlmann, Kristina and Clemens, Vera and Nowak, Michael and Schnor, Bettina}, title = {MUP}, series = {Sensors}, volume = {21}, journal = {Sensors}, number = {1}, publisher = {MDPI}, address = {Basel}, issn = {1424-8220}, doi = {10.3390/s21010010}, pages = {21}, year = {2020}, abstract = {Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices.}, language = {en} }