TY - JOUR A1 - Neumann, Daniel A1 - Tiberius, Victor A1 - Biendarra, Florin T1 - Adopting wearables to customize health insurance contributions BT - a ranking-type Delphi JF - BMC medical informatics and decision making N2 - Background Wearables, as small portable computer systems worn on the body, can track user fitness and health data, which can be used to customize health insurance contributions individually. In particular, insured individuals with a healthy lifestyle can receive a reduction of their contributions to be paid. However, this potential is hardly used in practice. Objective This study aims to identify which barrier factors impede the usage of wearables for assessing individual risk scores for health insurances, despite its technological feasibility, and to rank these barriers according to their relevance. Methods To reach these goals, we conduct a ranking-type Delphi study with the following three stages. First, we collected possible barrier factors from a panel of 16 experts and consolidated them to a list of 11 barrier categories. Second, the panel was asked to rank them regarding their relevance. Third, to enhance the panel consensus, the ranking was revealed to the experts, who were then asked to re-rank the barriers. Results The results suggest that regulation is the most important barrier. Other relevant barriers are false or inaccurate measurements and application errors caused by the users. Additionally, insurers could lack the required technological competence to use the wearable data appropriately. Conclusion A wider use of wearables and health apps could be achieved through regulatory modifications, especially regarding privacy issues. Even after assuring stricter regulations, users’ privacy concerns could partly remain, if the data exchange between wearables manufacturers, health app providers, and health insurers does not become more transparent. KW - Delphi study KW - Health insurance KW - Wearable electronic device KW - Wearable technology KW - Internet of Things KW - Barriers Y1 - 2022 U6 - https://doi.org/10.1186/s12911-022-01851-4 SN - 1472-6947 VL - 22 SP - 1 EP - 7 PB - Springer Nature CY - London ER - TY - JOUR A1 - Korte, Andreas A1 - Tiberius, Victor A1 - Brem, Alexander T1 - Internet of Things (IoT) technology research in business and management literature BT - results from a co-citation analysis JF - Journal of theoretical and applied electronic commerce research N2 - In coherence with the progressive digitalization of all areas of life, the Internet of Things (IoT) is a flourishing concept in both research and practice. Due to the increasing scholarly attention, the literature landscape has become scattered and fragmented. With a focus on the commercial application of the IoT and corresponding research, we employ a co-citation analysis and literature review to structure the field. We find and describe 19 research themes. To consolidate the extant research, we propose a research framework, which is based on a theoretical implementation process of IoT as a concept, specific IoT applications, or architectures integrated in an adapted input–process–output model. The main variables of the model are an initial definition and conceptualization of an IoT concept (input), which goes through an evaluation process (process), before it is implemented and can have an impact in practice (output). The paper contributes to interdisciplinary research relating to a business and management perspective on IoT by providing a holistic overview of predominant research themes and an integrative research framework. KW - bibliometric analysis KW - business KW - co-citation analysis KW - Internet of Things KW - IoT KW - management Y1 - 2021 U6 - https://doi.org/10.3390/jtaer16060116 SN - 0718-1876 VL - 16 IS - 6 SP - 2073 EP - 2090 PB - MPDI CY - Basel ER - TY - JOUR A1 - Sahlmann, Kristina A1 - Clemens, Vera A1 - Nowak, Michael A1 - Schnor, Bettina T1 - MUP BT - Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices JF - Sensors N2 - Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices. KW - Internet of Things KW - security KW - firmware update KW - MQTT KW - edge computing Y1 - 2020 U6 - https://doi.org/10.3390/s21010010 SN - 1424-8220 VL - 21 IS - 1 PB - MDPI CY - Basel ER -