
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,029 |
تعداد مشاهده مقاله | 67,082,929 |
تعداد دریافت فایل اصل مقاله | 7,656,387 |
Providing a secure technology transfer model to assess and manage financial and banking risks based on internet of things | ||
International Journal of Nonlinear Analysis and Applications | ||
مقاله 142، دوره 13، شماره 2، مهر 2022، صفحه 1771-1787 اصل مقاله (795.36 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2022.6316 | ||
نویسندگان | ||
Seyed Saman Karimi1؛ Tahmoures Sohrabi* 2؛ Amir Bayat Tork2 | ||
1Department of Technology Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran | ||
2Department of Industrial management, Central Tehran Branch, Islamic Azad University, Tehran, Iran | ||
تاریخ دریافت: 15 آبان 1400، تاریخ بازنگری: 30 دی 1400، تاریخ پذیرش: 18 بهمن 1400 | ||
چکیده | ||
The purpose of this applied research was to provide a Risk Assessment Model for Internet of Thing Based Technology Transfer in the Banking Area, and the Strauss and Corbin method is used to identify the initial model. In the qualitative section, by conducting in-depth interviews with 35 experts in the banking technology industry as well as technology-based banking, the information collected was analyzed in three stages open coding, axial coding, and selective coding. In a small part of the statistical population, experts and managers active in the Iranian banking industry, the sample size according to Morgan's table was 386. The results of structural equations and exploratory analysis showed that all relationships between causal factors and the main phenomenon, interfering factors and the main phenomenon The underlying factors and the main phenomenon, the main phenomenon and the strategy, and finally the relationship between the strategy and the results are evaluated in a high to medium level and in a positive and direct way. | ||
کلیدواژهها | ||
technology transfer؛ internet of things (IoT)؛ risk management؛ banking systems | ||
مراجع | ||
[1] A. Abdali and A. Naseri, Expand the risk process to manage opportunities, Tadbir Month. J. 20 (2003), 12. [2] K. Abolmaali, Qualitative research: from theory to practice, Alam Publishing, Tehran, 402 (1391). [3] S. Ammirato, F. Sofo, A.M. Felicetti and C. Raso, A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context, Eur. J. Innov. Manag. 22 (2019), no. 1, 146–174. [4] B. Aronson, T. Gonzjlez, K.J. Parker, C. St¨over and A.B. Zampetti, Synergies for libraries in the least developed countries: The technology bank in pursuit of sustainable development, 2017. [5] A. Ashna, E. Golestani, A. Hosseini and J. Zati, A Study of smart homes and the role of the internet of things and the smart assistant in it, Fifth Conf. New and Up to Date Achiev. Engin. Sci. New Technol., Rasht, Guilan Industrial Engineering Basij Organization, 2009. [6] A. Boumlik and M. Bahaj, Big data and IoT: A prime opportunity for banking industry, Int. Conf. Adv. Inf. Technol. Serv. Syst., Springer, Cham, April, 2017, p. 396–407. [7] C. Brindley, Supply chain risk, Hampshire, Ashgate Publishing, 2004.[8] C.S. Choi, J.D. Jeong, J. Han, W.K. Park and I.W. Lee, Implementation of IoT based PV monitoring system with message queuing telemetry transfer protocol and smart utility network, Int. Conf. Inf. Commun. Technol. Convergence, IEEE, 2017, p. 1077–1079. [9] S.E. Crager, Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways, Amer. J. Public Health 108 (2018), 414–420. [10] L. Deng, D. Li, X. Yao, D. Cox and H. Wang, Mobile network intrusion detection for IoT system based on transfer learning algorithm, Cluster Comput. 22 (2019), 9889—9904. [11] L. Denis, D.T.K. Kumar, D. Karthikeyan and D.S. Sasipriya, Offline mobile based OTP technology for enterprise IoT enabled architecture in banking cash logistics and ATM operations, Int. J. Adv. Res. Engin.Technol. 11 (2020), no. 1, 61–69. [12] M. Dogson, The management of technological innovation, Oxford University Press, 2000. [13] A. Erumban, Cross country differences in ICT adoption, a consequence of culture, J. World Bus. 41 (2006), no. 4, 302–314. [14] M. Faraji, Investigation of technology risks from the perspective of IT security in electronic banking in the field of Internet banking, Int. Conf. New Res. Manag. Econ. Account., 2016. [15] I. Ganchev, Z. Ji and M. O’Droma, Designing a low-cost data transfer unit for use in IoT applications, 8th Int. Cong. Ultra Modern Telecommun. Control Syst. Workshops (ICUMT), IEEE, 2016, p. 85–88. [16] W. Guo and Sh. Zhang, Analysis on technology spillover effect of multinational company’s technology transfer to the investment of Chinese car industry, J. Zhengzhou Inst. Aeronautical Ind. Manag. 26 (2008), no. 2, 51–64. [17] A. Habibi, Dematel technique training and its applications in management, Sharif Sci. Res. J. 45 (2012). [18] J. Hallikas, I. Karvonen, U. Pulkkinen, V.M. Virolainen and M. Tuominen, Risk Management processes in supplier networks, Int. J. Prod. Econ. 90 (2004), 47–58. [19] M. Hosseini and J. Tarokh Mohammad, Type-2 fuzzy set extension of DEMATEL method combined with perceptual computing for decision making, J. Ind. Engin. Int. 9 (2013), no. 1, 1–10. [20] O. Houseman, A. Tiwari and R. Roy, A methodology for the selection of new technologies in the aviation industry, Cranfield University, 2004. [21] A. Jafarnejad, A. Ahmadi and M. Maleki, Evaluation of lean production using a combined approach of ANP and DEMATEL techniques in fuzzy conditions, Quart. J. Ind. Manag. Stud. 8 (2011), p. 20. [22] K. Kandasamy, S. Srinivas, K. Achuthan and V.P. Rangan, IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process, EURASIP J. Inf. Secur. 2020 (2020), no. 1, 1–18. [23] E. Karsak and E.Tolga, Fuzzy multi-criteria decision-making procedure for evaluating advanced manufacturing system investments, Int. J. Prod. Econ. 69 (2002), 49–64. [24] R. Kaur, R.S. Sandhu, A. Gera, T. Kaur and P. Gera, Intelligent voice bots for digital banking, Smart Systems and IoT: Innovations in Computing. Springer, Singapore, 2020, p. 401-408. [25] J. Kirchherr and N. Matthews, Technology transfer in the hydropower industry: An analysis of Chinese dam developers’ undertakings in Europe and Latin America, Energy Policy 113 (2018), 546–558. [26] R.S. Lande, S.A. Meshram and P.P. Deshmukh, Smart banking using IoT, Int. Conf. Res. Intell. Comput. Engin., IEEE, 4(2018). [27] F. Latifi, Risk and risk-taking, Tadbir 9 (2000), 20–22. [28] P.V. Lea, T.A. Manning and U.S. Patent, Washington, DC: U.S. Patent and Trademark office, US patent 3 (1967), no. 330, 697. [29] E. Lee, Y. Park and J. Shin, Linguistic decision analysis:Steps for solving decision problems under linguistic information, Fuzzy Sets Syst. 115 (2000), 67–82. [30] W. Liang, W. Li and L. Feng, Information security monitoring and management method based on big data in the internet of things environment, IEEE Access 9 (2021), 39798–39812.[31] M. Mazloomi, Risk management, Account. (1992), 91–92. [32] L.M. Meade and A. Presley, Project selection using the analytic network process, IEEE Trans. Engin. Manag. 49 (2002), 59–66. [33] L. Ming-Tsang, S. Lin and Y. Tang, Evaluating RFID adoption by using DEMATEL techniques approach: A case study in Taiwan’s Healthcare Industry, Proc. 12th Asia Pacific Ind. Engin. Manag. Syst. Conf., 2011. [34] H. Mirzaei, The need for growth and development of risk management in developing countries, World Insurance News 59 (2003), 140–144. [35] J.R.C. Nurse, S. Creese, D. De. Roure, Security risk assessment in internet of things systems, IT Prof. 19 (2017), no. 5, 20–26. [36] D.S. Olawuyi, From technology transfer to technology absorption: Addressing climate technology gaps in Africa, J. Energy Nat. Resources Law 361 (2018), 61–84. [37] M. Ordoobadi Sharon, Application of ANP methodology in evaluation of advanced technologies, J. Manufact. Technol. Manag. 23 (2012), no. 2, 229–252. [38] G.A. Papadakis, Assessment of requirements on safety management systems in EU regulations for the control of major hazard pipelines, J. Hazardous Mater. 78 (2000), 63–89. [39] M. Park, H. Oh and K. Lee, Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective, Sensors 19 (2019), no. 9, 2148. [40] M. Sabeti, Identifying critical success factors in information systems technology transfer in Iranian organizations, Manag. Age 4 (2010), 16–17. [41] S. Stoukatch, F. Dupont, L. Seronveaux, D. Vandormael and M. Kraft, Additive low temperature 3D printed electronic as enabling technology for IoT application, IEEE 19th Electron. Packag. Technol. Conf. IEEE, 2017, p. | ||
آمار تعداد مشاهده مقاله: 47,270 تعداد دریافت فایل اصل مقاله: 2,618 |