Skip to main content
PLOS One logoLink to PLOS One
. 2024 Jul 12;19(7):e0304118. doi: 10.1371/journal.pone.0304118

Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approach

Kazrin Ahmad 1,, Md Saiful Islam 1, Md Abrar Jahin 1,, M F Mridha 2,*
Editor: Mohamed Rafik N Qureshi3
PMCID: PMC11244810  PMID: 38995917

Abstract

Integrating Internet of Things (IoT) technology inside the cold supply chain can enhance transparency, efficiency, and quality, optimize operating procedures, and increase productivity. The integration of the IoT in this complicated setting is hindered by specific barriers that require thorough examination. Prominent barriers to IoT implementation in a cold supply chain, which is the main objective, are identified using a two–stage model. After reviewing the available literature on IoT implementation, 13 barriers were identified. The survey data were cross–validated for quality, and Cronbach’s alpha test was employed to ensure validity. This study applies the interpretative structural modeling technique in the first phase to identify the main barriers. Among these barriers, “regulatory compliance” and “cold chain networks” are the key drivers of IoT adoption strategies. MICMAC’s driving and dependence power element categorization helps evaluate barrier interactions. In the second phase of this study, a decision-making trial and evaluation laboratory methodology was employed to identify causal relationships between barriers and evaluate them according to their relative importance. Each cause is a potential drive, and if its efficiency can be enhanced, the system benefits as a whole. The findings provide industry stakeholders, governments, and organizations with significant drivers of IoT adoption to overcome these barriers and optimize the utilization of IoT technology to improve the effectiveness and reliability of the cold supply chain.

1 Introduction

Recent developments in Internet of Things (IoT) technology have the potential to significantly change several industries via the introduction of data-driven insights, increased connectivity, and a replacement of long-established ways of doing things. The supply chain (SC) is a network of related entities that includes every procedure step, from the procurement of raw materials or components to the consummation of the finished good. Supply chains in the modern day have developed into intricate value networks and are now an important differentiator for businesses. A growing number of barriers make it harder than ever to track items and goods as they go through the value chain and confirm where they came from [1]. Cold SC (CSC) is a procedure that includes activities regulated by temperature and a specialized logistical infrastructure designed to maintain product quality and temperature consistency throughout its entire transit, beginning with the point of origin in manufacturing or procurement and ending with its eventual delivery to the final consumer [2]. Everything from preparing, storing, transporting, and monitoring temperature-sensitive goods from their providing areas to their receiving locations involves a sequence of activities in CSC. Food, flowers, medicines, and chemicals are examples of temperature-sensitive items because of their perishable nature [3]. To increase sales and profits, companies are creating a cold chain in transportation by reducing costs, reducing delivery times, improving product quality, and offering personalized goods.

The Internet of Things (IoT) is a network that links physical items to the Internet and allows them to broadcast data to intelligently identify themselves and enable their location, tracking, monitoring, and management with the assistance of radio frequency identification tags, sensors, actuators, and positioning systems [4]. IoT allows previously inaccessible physical and everyday items to separately gather and share data via the use of built-in sensors and network connection. IoT emerged from networked devices, which started at MIT’s Auto-ID Center in the nineties, according to Center Director Kevin Ashton, who purportedly developed the concept of IoT at the turn of the millennium. The current concept of IoT is supported by the addition of GPS devices, smartphones, social networks, cloud computing, and data analytics to existing networks [5]. IoT plays a significant part in Industry 4.0, which encompasses a variety of innovative and revolutionary technologies, cyber-physical systems, IoT, and cloud computing [6]. It links objects, sensors, actuators, and other smart technologies, allowing immediate access to physical commodity data to support new services with high efficiency and productivity [7]. IoT deployment may boost the likelihood of reliably transferring flow from source to sink, which is the potential of the cold chain network to withstand increased rivalry among enterprises [8].

Improved operating processes, reduced risk and expense, greater visibility and transparency, and greater adaptability and flexibility across the supply chain are merely a few of the many advantages of incorporating IoT into the supply chain [9]. IoT technology may drastically boost the monitoring and control of CSCs, particularly in areas such as medication, food, and logistics where temperature-sensitive commodities are moved and preserved [10].

This study conducts an exhaustive analysis of the barriers that hinder the successful implementation of the IoT in cold supply chains. Integrated interpretive structural modeling and decision-making trial and evaluation laboratory (ISM-DEMATEL) is an extensively used technique for decision-making and analysis in complex systems. ISM is beneficial for building hierarchical links among factors and analyzing the structure of complex systems, whereas DEMATEL delivers a quantitative assessment of the intensity and direction of interactions between factors [11, 12]. Both approaches allow for a combination of qualitative and quantitative research, with DEMATEL specifically addressing the feedback loops. They are straightforward and obvious, making them easier to explain and grasp by decision-makers [1315].

The increasing volume of international trade and consumer spending has spurred the rapid growth of supply chains for perishable commodities. The logistics for “cold chain” items, such as perishables and frozen foods, constantly evolve. Global revenue for the sector is forecasted to reach USD 277.69 billion by 2023, growing at a CAGR (cumulative aggregate gross revenue) of 7.24 percent between 2018 and 2023 [16].

A simplified and technology-enhanced logistics method for CSC IoT implementation is illustrated in Fig 1. The figure depicts IoT sensors installed across the CSC to track moisture, temperature, and other important factors, including refrigerated vehicles, warehouses, and storage facilities. The chosen parameters were controlled and monitored using a network of sensors and data-collecting microcontrollers [17]. To provide immediate insight into the state of products in transit, data collected from these sensors are wirelessly connected and relayed in real-time to a centralized system [18]. In sectors such as pharmaceuticals and food, where maintaining the proper temperature is crucial to product quality and safety, IoT devices make sure that temperature-sensitive commodities are stored and transported within a designated temperature range [19, 20]. By considering traffic, weather, and supply quality, IoT may help enhance delivery routes [21]. This guarantees that the perishable goods arrive on schedule and in the best possible shape. IoT sensors can monitor inventory levels to minimize overstocking or understocking of temperature-sensitive products, which lowers spoilage and perishable goods losses [22]. Well-organized logistics and transportation systems significantly affect product quality. Adopting a high-quality logistics system, especially for perishable items, involves frequent temperature monitoring, real-time product quality assessment, and shelf life determination [23].

Fig 1. IoT implementation in the cold supply chain.

Fig 1

The objectives of the study are to apprehend the following:

  1. To identify the dominant barriers of IoT implementation in cold supply chains.

  2. To Investigate the influential relationship among barriers using ISM and DEMATEL technique.

  3. To identify the most significant barriers and underlying causes and effects hindering the enhancement of IoT implementation.

Several studies have delved into barriers within specific countries and contexts; however, these investigations are not without their limitations. Some have explored sectors unrelated to the CSC, and while certain studies have focused on IoT adoption in this context, they often fall short of establishing connections among identified barriers or evaluating their respective effects on the overall system. Moreover, the exploration of IoT implementation barriers in CSCs represents a significant gap in the literature, with no prior comprehensive studies identified in this specific domain. The lack of scholarly attention to this crucial aspect of CSC underscores the need for an in-depth investigation. Our research is a pioneering effort to bridge this gap by employing an integrated ISM-DMATEL approach.

The literature gap is particularly evident in the scarcity of empirical examinations and theoretical frameworks dedicated to understanding the intricacies of IoT implementation in CSCs. The unique challenges posed by the CSC environment, characterized by stringent temperature control requirements and perishable goods logistics, warrant further exploration.

To address these gaps, this study contributes to the literature in the following ways:

  1. An in-depth analysis of research on essential barriers to CSC IoT adoption, considering various perspectives, including supply chain stages, environmental effects, socio-economic scenery, and data complexity.

  2. A survey-based approach was employed to gather data and expert opinions regarding these barriers.

  3. The utilization of the ISM method to determine the interdependencies among the selected barriers.

  4. The MICMAC strategy was applied to comprehensively analyze the fundamental constructs, thereby offering valuable insights into their significance.

  5. The DEMATEL approach was used to validate causal relationships among the components within the model.

  6. Key barriers that play a fundamental role in efficiently managing the cold chain are highlighted, offering insights to overcome challenges in IoT adoption.

  7. Systematic identification and ranking of barriers based on their influence on the system addresses the current lack of comprehensive assessments in the literature.

  8. Contribution towards filling research gaps by focusing specifically on the CSC, distinguishing it from studies that extend across different sectors.

  9. Providing a structured approach to understanding and addressing the challenges associated with IoT implementation in CSC, contributing to enhanced operational efficiency and reliability.

  10. It offers valuable insights for enterprises, governments, and technology developers to navigate and overcome obstacles in integrating IoT into CSC operations.

The rest of the paper is arranged as follows: “Literature review” provides a comprehensive literature review of IoT implementation in CSCs, including implementation challenges and comparable methodologies utilized in the present era; “Methodology” presents the research methodology that was used for the study; “Numerical illustration for results interpretation” covers the data analysis, along with the application of ISM-DEMATEL to the obtained barriers; “Discussions” describes the results of the implementation of ISM-DEMATEL techniques and discusses the results. Finally, the study concludes with conclusions, limitations, and recommendations for future work in “Conclusions and future works.”

2 Literature review

The aim of this section is to provide a summary of how CSC procedures may use IoT. We used Google Scholar and many other publishers’ websites, including Springer, Elsevier, Emerald, and Taylor-and-Francis, to compile the literature most relevant to our study.

2.1 Internet of Things (IoT)

The IoT is among the most revolutionary technological developments brought about by the digital era [24]. The Internet of Things is anticipated to become the most popular form of internet traffic in the next years, with a predicted CAGR of 40 in the commercial sector [25]. The economy, communication patterns, and technology development are all expected to be profoundly affected [26]. First invented in 1999 by Kevin Ashton and many other scholars at the Massachusetts Institute of Technology, IoT has gained broad interest because it can provide comfort, efficiency, and competitive benefits to the corporate sector [27]. The IoT is an essential idea in the coming period. Numerous smart buildings and smart houses are built using IoT technologies [28]. The IoT presents a new opportunity to reduce risks, manage complexity, and produce concrete economic benefits by increasing transparency and flexibility across the supply chain [29]. The physical components that link IoT include wireless devices such as portable computers, smartphones, wearable gadgets, RFID tags, RFID readers, and wireless sensors. Users may interact with the IoT network using a variety of devices, including cellphones, implanted RFID transponders, wirelessly connected PCs, and wearable technology [30]. The popularity and success of IoT have skyrocketed in recent years. Industry leaders, technologists, and consumers recognize the importance of IoT, which has led to an industrial revolution and automated operations in organizations and homes [31]. Human-to-thing communication and autonomous coordination among “things” is possible even when they are kept at a facility or transported from one entity in the supply chain to another. Increased supply chain visibility, responsiveness, and adaptability to a variety of SCM challenges are all made possible by IoT [5, 32].

2.2 IoT in CSC

IoT, often known as the third wave of IT, has revolutionized supply chain management (SCM) and other sectors. This helps expand the supply chain function by offering technical assistance for greater visibility, stability, and intelligent management [33, 34]. Ben-Daya et al. [5] analyzed the existing literature to learn more about the IoT and how it influences SCM. IoT has transformed supply chain management by improving efficiency, allowing predictive maintenance, and enabling real-time reactions to change circumstances, improving operational efficiency, waste reduction, and overall customer happiness [35]. Bahl [36] explores how supply chain management has been transformed by IoT technology, which offers real-time data insights, improves visibility, and allows proactive decision-making to satisfy consumer expectations in a changing marketplace and optimize operations. In addition, the majority of research has concentrated on the steps in the supply chain pertaining to food production, distribution, and processing. Kamble et al. [37] proposed an integrated ISM-DEMATEL model to identify the most significant barriers to the widespread deployment of IoT technologies in the food retail supply chain. The two most significant barriers to the widespread use of IoT were a lack of government regulation and insufficient network infrastructure. Nguyen et al. evaluated the reliability of a cold chain network by considering both flow and time factors simultaneously, with the ultimate goal of determining the network reliability for actual products. Shashi [38] revealed two primary themes: the existing cold chain system’s known or unknown limits, as well as the use of digital enablers based on the IoT.

Numerous deployment strategies, constraints, and barriers in cold chain monitoring applications have been discussed [39]. Sallam et al. [34] analyzed future developments in the field of supply chain management and offers a thorough analysis of the IoT applications in this area, including problems, possibilities, and best practices. The feasibility of implementing modern technologies such as IoT to enhance cold SC was assessed by Gupta et al. [40]. To enhance service quality, the organization must invest additional funds for maintenance. Umamaheswari et al. [41] suggested smart cold storage that uses cutting-edge supply chain technology and the IoT to boost productivity and reduce wait times at all levels. Luo et al. [42] presented a smart monitoring system that stores data on defined servers to monitor cold chain items in real time while cutting costs, enhancing network capacity, and simplifying protocols. Cold chain transit is easy to track using this strategy. Afreen and Bajwa [43] implemented a system that utilizes the IoT to track and notify users of changes in cold storage conditions such as humidity, temperature, light, and gas concentration in real-time., alerting workers when these variables exceed safe thresholds. Goodarzian et al. [44] proposed a model for improving the precision, swiftness, and fairness of vaccine injection and implemented an inaugural responsive green-cold vaccine supply chain network in response to the COVID-19 pandemic. Intelligent control technology, cellular networks, wireless communication technology, temperature and humidity sensors, IoT, and database technology all come together to form a cold chain management system [45]. Ceken and Abdurahman [46] presented an IoT-based cold chain logistics system that controls and monitors the cold chain’s ambient temperature in real time and estimates perishable item shelf life to help all stakeholders make better decisions. The paper by Tsang et al. [22] presented an IoT-based risk monitoring solution to handle product quality and safety concerns in the cold chain. Using this technology, the cold chain can be monitored in real-time, and risks can be assessed to ensure the safety of workers. Hernandez and Yamaura [47] suggested that IoT-enabled devices may reduce pharmaceutical waste caused by temperature changes. It also demonstrated consistency in IoT implementation, including infrastructure, security, and device management. Owing to perishable food and cross-regional transit, cold chain systems encounter several challenges in the perishable food supply chains. Atyam et al. [48] explained the complexity and problems associated with modern supply chain management, the importance of IoT in monitoring items, and how IoT and blockchain might improve supply chain performance. Kumar et al. [49] highlighted the need of efficient cost management and waste reduction as key performance indicators and also emphasized the possibility of boosting operational efficiency and optimizing resource utilization via the integration of the IoT. IoT-enabled smart monitoring and control systems could provide long-term solutions to energy consumption and managerial reluctance in the cold supply chain [50]. This study of Zhang et al. [51] addressed these difficulties by creating a perishable food supply chain model utilizing real-time IoT data and two supply hubs to increase performance. Future cold supply networks can become more resilient and sustainable if IoT technologies are used. This advancement is expected to result in less waste and decreased operational expenses, therefore benefiting both businesses and consumers [40, 52].

2.3 IoT implementation barriers

IoT deployment is challenging because of device and data security, interoperability issues, scalability, trust, privacy concerns, financial issues, lack of qualified personnel, and compliance with data privacy laws. First, it is necessary to identify the barriers that hinder IoT implementation in CSC in order to overcome these challenges. Table 1 lists the barriers to implementing the IoT in CSC.

Table 1. Barriers to IoT implementation in the cold supply chain.

Sl No. Barriers Implied Meaning References
01 Regulatory compliance The CSC has strict temperature and data management guidelines. It may be challenging to implement IoT technology and meet these requirements. In the pharmaceutical and food industries, strict regulations are tough to follow. Failing to satisfy these regulations may result in product recalls or legal concerns. [49, 5356]
02 High implementation cost In order to adopt the IoT, it may be necessary to make a sizable initial investment in things like sensors, devices, and infrastructure. Transporting and storing cold requires plenty of energy. Costs may rise with power prices. [39, 40, 52, 57]
03 Lack of skilled workforce Multiple sensors, data analytics, and system integration make IoT-enabled CSCs difficult. Implementing, deploying, and administering these systems may be challenging without trained people. Integration of IoT into CSCs demands expertise. Without qualified workers, organizations may struggle to analyze this data. [5861]
04 Data security and privacy Data generated and sent by IoT devices is often private. Extremely regulated sectors, such as healthcare and pharmaceuticals, make it difficult to safeguard this data and guarantee privacy compliance. [47, 62, 63]
05 Technological infrastructure Integrating the IoT into an already established supply chain might be challenging. On the other hand, it’s likely that some of the more recent IoT technologies won’t be compatible with more established networks and software. IoT devices can’t be deployed and used effectively without the right infrastructure in place. [42, 47, 64, 65]
06 Scalability challenges Scalability is a challenge for numerous sectors. It may be difficult to implement IoT throughout a complex supply chain. Cold supply networks need strict data monitoring and traceability. Implementing and running these systems need accurate data. Coordinating many linked devices and data becomes more difficult as IoT networks grow. [60, 64, 66, 67]
07 Cultural and ethical consideration Cultural norms and expectations must be addressed when adopting IoT devices that monitor behaviors and data. IoT devices that monitor and enhance work processes may affect employees differently by culture. Technological developments may not benefit all workers. As IoT automation reduces human control, workers may fear they will be outdated. [54, 61, 68]
08 Acceptance and adoption IoT implementation may involve organizational training and cultural changes; therefore, resistance to change and acceptance may be a significant obstacle. Several parties in the CSC may not understand IoT’s potential benefits, generating resistance. Worker resistance to the current system may hinder adoption. [69, 70]
09 Data integration and management issue Constructing a cohesive and efficient system might be difficult due to possible communication difficulties across different IoT devices and platforms. The IoT is the source of a lot of data. Without proper data management and analytics tools, it is very challenging to deal with this massive amount of data, let alone analyze it and derive any meaningful conclusions from it. [16, 42, 67, 71]
10 Reliability issue Inefficient asset monitoring and network concerns may cause asset loss, theft, customer distrust, delays, data loss, and inefficiency. IoT device failures may interrupt operations and raise maintenance expenses. Improper data input or modification without validation might affect reliability, resulting in non-compliance with industry standards and legal issues. [22, 39, 56, 63]
11 ROI uncertainty A thorough cost-benefit analysis is required to determine the potential return on investment. The overall cost of an IoT deployment might be more than expected if the time it takes to see a return on investment is greater than expected. [39, 40, 50]
12 Extreme environment issue Extreme weather is a common occurrence for cold supply networks. Radio wave frequency is impacted by nearby elements, including metals and water, resulting in variable performance. It might be difficult to maintain the functionality and reliability of IoT devices when they are in cold storage or in transit. [38, 39, 43, 72]
13 Cold chain network Powering remote or mobile supply chain equipment might be difficult. IoT devices may have trouble delivering data in rural or poor areas with poor network coverage. Many temperature-sensitive items can not resist slight temperature fluctuations during transport, storage, and handling, which could affect the cold chain network. [38, 70, 7375]

2.4 Methodology related literature

ISM is a computer-based learning method that assists individuals or groups in creating a visual representation of intricate connections between several aspects of a complex situation. The fundamental idea is to use the practical skills and knowledge of specialists to dissect a complex system into many sub-systems and construct a multi-level structural model [11]. Raut et al. [76] employed the ISM approach to establish the interconnections among drivers, enabling a comprehensive knowledge of the relative connections among the critical success factors and defining their dependency when implementing sustainability.

The DEMATEL technique has been used extensively to identify critical barriers in various vital processes, which were created to support methodical evaluations and organized decision-making processes. The effect connections map shows the relational linkages, with numbers denoting the degree of influence and arrows denoting the direction of influence. It is a comprehensive tool for assessing the interrelations between system variables and emphasizing the core-driving components [12]. Manoharan et al. [77] presented the DEMATEL model, which aids in comprehending the importance of drivers and barriers, creating matrices or digraphs to represent complex causal interactions, and identifying the relationships between these factors. The barrier analysis techniques employed in recent studies are presented in Table 2.

Table 2. Various barrier analysis methodologies used in recent approaches.

Sl no. Authors Methodology Problems Findings
1 [78] ISM MICMAC Figured out what matters most for reducing food waste and loss in supply chains for fresh produce Regulatory bodies, food policy, and market infrastructure are the most important elements that have a strong propensity to affect the lowering of FLW in FPSCs.
2 [79] DEMATEL-MMDE-ISM Identified and evaluated potential barriers to IoT deployment in the manufacturing industry Highlighted the key challenges where academics and practitioners may concentrate their strategic efforts to overcome implicit concerns while deploying IoT Techniques in manufacturing.
3 [80] Bayesian Best-Worst Method Discovered barriers to implementing the circular economy in the manufacturing sector. Recommended a more realistic PFS performance, allowing several uses.
4 [81] Bayesian Best-Worst Method Identified multiple barriers to implementing the IoT in the food industry Major barrier to the IoT in the food industry is the absence of an adequate internet infrastructure.
5 [82] ISM-DEMATEL Examined the identified obstacles that impede the implementation of electronic waste management practices in India. Key challenges pertaining to e-waste recycling are a lack of public knowledge and rules about the matter.
6 [83] DEMATEL–ISM Identified what circumstances affected the flight crew’s TSA protocol Different levels of hierarchy, mutual impact, and the cause-and-effect link are shown for the flight crew’s TSA creation and management.
7 [84] Fuzzy-ISM-DEMATEL Identified barriers to implementing sustainable purchasing practices over the internet Improved DEMATEL, ISM, and rough set theory into a unified framework.
8 [85] ISM-DEMATEL Analysed the challenges associated with waste recycling in India For India’s trash recycling infrastructure to grow, significant barriers such as a lack of funds, input material, and subsidies have to be overcome.

The literature investigation discusses every element of the CSC, covering transportation, cold storage, procurement, and occupational security across the cold chain. IoT supports SCM by enhancing visibility and stability, but problems include regulatory limitations and poor infrastructure. Most studies focus on distinct problems and seek to solve these challenges using the solutions provided. In the combined ISM-MICMAC-DEMATEL approach, ISM-MICMAC is used to construct hierarchical relationships among barriers and analyze the structure of systems, while DEMATEL delivers a numerical evaluation of the strength and direction of interactions between factors. Numerous barrier analysis strategies have been employed in modern methods, which are also used to analyze obstacles. The choice between these tactics varies depending on individual circumstances, available data, and decision-makers’ preferences. Thirteen barriers, and from the different barrier analysis techniques utilized in recent approaches, ISM-DEMATEL was chosen to analyze these barriers.

3 Methodology

Research initiation involves several key stages, including the design of surveys, meticulous data collection, selection procedures, and rigorous reliability testing, as illustrated in Fig 2. Subsequently, the second phase unfolds with a process flow diagram outlining the development of the ISM model. The third phase is characterized by a process flow diagram that delineates the systematic steps employed in constructing the DEMATEL model.

Fig 2. Flowchart depicting the research methodology, encompassing phases such as data collection and validation, implementation of ISM-MICMAC, and execution of the DEMATEL procedure.

Fig 2

3.1 Data collection method

3.1.1 Barriers identification

This involves identifying and recognizing the possible obstacles or challenges inside the system. These obstacles may be technical, organizational, or connected to other system operation elements. Using literature research and expert comments, potential barriers to the system were identified, as described in Table 1.

3.1.2 Survey development and data selection procedure

Thirty experts participated in the survey. The diagonal values in the ISM method are zero. Only one side of the diagonal value is used to create the initial reachability matrix. All 13 rows and 13 columns of the matrix were surveyed, with the exception of diagonal values. This verification process guaranteed that the data provided by the respondents were valid. After determining that the impact of barrier 1 on barrier 2 is V, an expert must conclude that the impact of barrier 2 on barrier 1 is A. If O and X are diagonal, their opposing sides must be the same. These checks will improve the quality of the survey, even if the initial reachability matrix ultimately determines the entire system.

The DEMATEL impact factor survey, which is likewise associated with the ISM survey, is also measured on a scale from 0 to 4. The next issue concerns the impact factor, which must be greater than or equal to 1 if the effect of barrier 1 on barrier 2 is V. A value of 0 is required for the influence factor if it is O. A positive number is also required for X. Therefore, this cross-checking method will enhance the quality of the survey.

Twelve reasonable answers were selected for each question, and twelve 13 × 13 matrices were constructed. The average of these matrices was calculated to determine the average matrix. For the ISM, the structural self-interaction matrix is also prepared using the value that appears most often in these logical replies.

Table 3 provides a brief overview of the various characteristics of the expert panel. Quantification of each category offers vital information regarding the makeup of the group. A table of this type assists in visually representing and examining the distribution of expertise. The organized survey data from these 30 experts helps the comprehensibility of the information, which is essential for generating the outcome. The sex distribution comprised 26 males and 4 females. Thirteen panelists are below 30, 8 fall in the 30–40 range, 5 are aged 41–50, and 4 are 51 years and above. Regarding experience in their respective fields, 10 experts had less than five years, 7 possessed 5–10 years, 10 had 10–15 years, and 6 held 15 years and above. The domain of expertise includes eight in academics (Industrial Engineering), five in System Integration, four in Data Analysts, six in Data Security, and seven in cold chain executives.

Table 3. Demographic profile of the selected experts.
Demographics Number of experts
Gender
Male 26
Female 4
Age
Below 30 years 13
30–40 years 8
41–50 years 5
51 years and above 4
Experience in their field
Less than five years 10
5–10 years 7
10–15 years 7
15 years and above 6
Domain of expertise
Academics (Industrial Engineering) 8
System Integration 5
Data Analyst 4
Data Security 6
Cold chain executives 7

The survey was conducted using Google Forms, and the recruitment period was from 27 Sep 2023 to 11 Oct 2023. Participants were selected based on their expertise in supply chain, system integration, data analysis, data security, and cold chain. The survey consisted of 312 questions, focusing on the influential relationships among the barriers. Confidentiality of participant responses was strictly maintained. All the collected data were anonymized and stored. Only the research team had access to the raw data, and the findings were reported in aggregate form to ensure the anonymity of the participants. This study adhered to the ethical principles outlined in the Declaration of Helsinki. Participants were provided with informed consent forms detailing the purpose of the study, their rights as participants, and the procedures for data handling. Participation in the survey was voluntary, and participants had the right to withdraw at any time without penalties. This study was approved by the Ethics Review Board of the Research & Extension Center, Khulna University of Engineering & Technology, Bangladesh, to conduct this survey research.

3.1.3 Establish relationships between barriers

Once possible obstacles are discovered, it is essential to understand how these barriers are interrelated or impact each other. This step helps in understanding the complexity of the system and how different challenges may be connected. To determine which pairs of barriers require further investigation, a contextual relationship between them is established.

3.1.4 Cronbach’s alpha testing

The reliability coefficient Cronbach’s alpha can be used to evaluate the internal consistency of the survey or test items. Many psychological and educational surveys and assessments have used Cronbach’s alpha for their formulation and testing. This aids researchers and practitioners in ensuring that their measuring equipment accurately measures the idea in question. Cronbach’s alpha reliability is a measure of how well a sum or average of k measurements holds, where k measures might be anything from k raters to alternate forms to items on a questionnaire or exam. We used a 156-item questionnaire (k = 156) to measure implementation barrier influence, with each item scored on a 0–4 Likert scale. A Cronbach’s alpha value should exceed 0.7 since a value equal to or more than 0.7 falls within an acceptable range [86].

The variance of the total score (270.52) and the sum of the item variances (67.88) provide this dependability measure. The survey dataset had an acceptable degree of internal consistency, as indicated by a Cronbach’s alpha value of 0.7534. This measuring tool reliably captures the targeted construct because the coefficient is greater than the generally recognized requirement of 0.7.

3.2 Interpretative structural model (ISM)

The initial development of ISM can be attributed to J. Warfield in 1973 who examined intricate socioeconomic systems [85]. This method may help individuals or teams better grasp a topic by organizing their understanding of it into a network diagram. The following is a detailed description of how ISM works [13, 14].

3.2.1 Step 1: Developing structural self-interaction matrix (SSIM)

The pair-wise connection between barriers in the system can be observed by employing SSIM. The following four symbols indicate a unique set of relationships:

  • V: Barrier i influences barrier j;

  • A: Barrier j influences barrier i;

  • X: Barriers i and j influence each other;

  • O: Barriers i and j have no relationship.

3.2.2 Step 2: Developing reachability matrix

The SSIM generates a reachability matrix; four symbols are converted to 0s and 1s to implement the SSIM in the initial reachability matrix. matrix.

Specific rules of replacement are as follows:

  • If D(i, j) of SSIM is shown with the symbol “V,” D(i, j) = 1 and D(j, i) = 0 should be assigned in the initial reachability matrix;

  • If D(i, j) of SSIM is shown with the symbol “A,” D(i, j) = 0 and D(j, i) = 1 should be assigned in the initial reachability matrix;

  • If D(i, j) of SSIM is represented by an “X,” then D(i, j) = 1 and D(j, i) = 1 should be placed in the initial reachability matrix,

  • If D(i, j) of SSIM is represented by an “O,” then D(i, j) = 0 and D(j, i) = 0 should be assigned.

3.2.3 Step 3: Developing final reachability matrix

A transitivity test is then performed on the initial reachability matrix. ISM presupposes, as a given, that contextual relations are transitive. If barrier A is connected to barrier B, and B is related to barrier C, then barrier A must also be related to barrier C.

3.2.4 Step 4: Developing level partition

Level partitioning refers to categorizing or classifying distinct levels inside the information system. This involves dividing the system into levels or hierarchies to better understand its structure at various levels. The resultant final reachability matrix is segmented into several hierarchical levels.

3.2.5 Step 5: Developing conical form

The conical form describes structuring or organizing an information system in an arrangement that resembles a conical shape, indicating a hierarchical structure. Subsequently, a conical form of the reachability matrix was created.

3.2.6 Step 6: Developing ISM model

A directed graph was constructed using a reachability matrix to eliminate transitive linkages. By exchanging the nodes of the variables for statements, they converted into an ISM from the resultant digraph.

3.2.7 Step 7: Reviewing to check for inconsistency

After establishing the level partition, conical shape, and ISM model, it’s important to examine the full system to detect and resolve discrepancies. This step verifies that the system was consistent and functions smoothly without conflicting factors. The generated ISM model is reviewed for conceptual coherence, and any necessary revisions were implemented.

3.3 MICMAC analysis

The multiplication of impact matrix applied to classification (MICMAC) study seeks to create a graph to categorize various barriers. The MICMAC algorithm is based on the multiplication characteristics of matrices [87].

The ISM framework requires the construction of a conical matrix to depict the interrelationships of a system’s components. For each element, the driving and dependence powers were calculated by adding the values in the rows and columns, respectively. These elements were further classified according to the effectiveness of their driving and dependent power in the MICMAC analysis. Factors were grouped into four categories: autonomous, dependent, linkage, and independent [88].

  1. Group I (Autonomous factors): Comprises autonomous factors characterized by minimal interdependencies.

  2. Group II (Dependent factors): Encompasses dependent factors exhibiting a substantial reliance but limited generative capacity.

  3. Group III (Linkage factors): Consists of linkage factors possessing a robust propelling force and reliability.

  4. Group IV (Independent factors): Involves factors that significantly impact the outcomes of sustainable energy initiatives but are not significantly influenced by other variables. These factors can be utilized to manipulate other elements, thereby contributing to the preservation of sustainable energy objectives.

3.4 DEMATEL

The DEMATEL method transforms the complex web of interrelations between barriers into a clear structural model of the system by categorizing them into two groups: causes and effects. This is a practical method for ranking the relative importance of different aspects of a complex system to inform strategic decisions over the long run and identify potential development areas [89]. It is extensively implemented across numerous domains, such as SCM, traceability, smart cities, healthcare, and consumer behavior [90]. The following is a detailed description of how DEMATEL works [15, 37].

3.4.1 Step 1: Computation of average matrix

The expert panel that filled out the survey was asked to provide an integer value between 0 and 4 to represent the degree of influence they saw between any two barriers, using five different integer scales as “very high influence (4)”, “high influence (3)”, “moderate influence (2)”, “low influence (1)”, and “no influence (0)”. A respondent’s estimate of how much variable i influences variable j is denoted by the xij symbol. For i = j, 0 is assigned to each diagonal element.

For every respondent, we may generate a non-negative n × n matrix using the formula Xk=[xijk], where k means that there were a total of responders with 1 ≤ kH and the total number of factors is denoted by n. In this case, the H responder matrices are denoted by X1, X2, X3, …, XH.

The average matrix can be created as

aij=1HHk=1xijk (1)

3.4.2 Step 2: Calculation of the normalized direct-relation matrix

Normalize direct-relation matrix D by D = A × S, where

S=maxij{1maxij=1n|xij|,1maxjj=1n|xij|} (2)

3.4.3 Step 3: Calculation of the total relation matrix

The total relation matrix T is represented as

T=D(I-D)-1, (3)

where I is the identity matrix.

3.4.4 Step 4: Calculation of cause and effect values

R and C values, representing the sum of the values in the rows and columns, are now used in the calculations. Where,

R=[Ri]n×1=[nj-1tij]n×1;i=1,,n (4)
C=[Cj]1×n=[nj-1tij]1×n;j=1,.,n (5)

The transpose value of the jth column, denoted by [Cj]′, and the sum of the values of the jth column, Cj, shows the effect of the jth attribute on the other attributes. The influence of the ith row, denoted by ri, indicates the cause of the ith attribute on other attributes. The sum (Ri + Ci) represents the cumulative effects experienced and exerted by factor i. This signifies the degree of importance of element i in the overall system. The difference (RiCi) indicates the net effects of factor i on the system. If the difference between Di and Ri is positive, the influence factor i may be considered as a net cause. Conversely, if the difference between Di and Ri is negative, then factor i can be regarded as a net receiver.

3.4.5 Step 5: Calculation of the threshold value

Determination of the threshold value is necessary to construct an interrelationship map. The interrelationship map only displays equations with penetration matrix values greater than the threshold value. The mean of the elements inside the entire penetration matrix is computed using Eq 6.

a=i=1nj=1ntijN (6)

3.4.6 Step 6: Drawing interrelationship map

An interrelationship map is created to comprehensively analyze the final solution, considering the values of Ri + Ci and RiCi for each attribute in relation to the threshold value.

3.4.7 Step 7: Calculation of the final ranking of attributes

The interrelationship map derives a potential framework and hierarchy of these factors. This is achieved by organizing the values of Ri + Ci in descending order.

4 Numerical illustration for results interpretation

4.1 ISM-MICMAC application

ISM and MICMAC techniques are strong ways to create a hierarchy and reveal contextual interactions between IoT adoption barriers, especially regarding the CSC. The principal aim of utilizing MICMAC is to evaluate the importance of the dimensions that affect a system. Using this methodology, researchers can examine the complex interrelationships and dependencies between different components and identify important factors that have a major impact on the system as a whole. The ISM-MICMAC technique has two main phases that have been applied in various settings such as supply chains, industry, and healthcare. A hierarchical structure of the chosen IoT adoption barriers was first constructed using the ISM. The relative importance and hierarchy of each barrier were then determined by methodically examining cause-and-effect interactions. After the dimensions are established, professionals evaluate the correlations, resulting in the development of a binary relation matrix that is then converted into a reachability matrix. The hierarchy of the barriers is displayed in this matrix, highlighting their key and consequential functions within the CSC framework. The MICMAC technique is used in the next step to further explore the relationships and interactions among the various IoT adoption barriers that have been identified. The emphasis is on understanding the dynamic behavior of barriers and classifying them according to their reliance and driving forces. Identifying driving barriers with high influence but low dependence and dependent barriers with high influence but low driving power is made easier using MICMAC analysis. With this categorization, the role of each barrier in the bigger picture and the vital links between them can be better understood.

4.1.1 Structural self-interaction matrix (SSIM) development

Experts’ judgments on the relationships between the 13 identified barriers are used to inform the SSIM’s development, which involves using four symbols to depict these interactions in a pairwise fashion, as described insubsubsection 3.2.1. In Table 4, SSIM depicts the element intrinsic linkages and internal dynamics.

Table 4. Structural self-interaction matrix (SSIM).
Sl No. Barriers 1 2 3 4 5 6 7 8 9 10 11 12 13
1 Regulatory Compliance V V V V V V V V V V V V
2 High implementation cost A A A A O V A V X A A
3 Lack of skilled workforce A A V X V X V V O A
4 Data security and privacy X X X V X V V O A
5 Technological infrastructure X O V X V V X A
6 Scalability challenges O V X V V X A
7 Cultural and ethical consideration V O V O O A
8 Acceptance and adoption A X A A A
9 Data Integration and management issue V V X A
10 Reliability issue A A A
11 ROI uncertainty A A
12 Extreme environment issue A
13 Cold chain network

The symbols V, A, X, and O represent the specific sort of connection between the two components (i, j) being examined. The notation “V” indicates that element i will exert influence on element j. “A” signifies that element i will be impacted by element j. The symbol “X” denotes a bidirectional link, indicating that elements i and j will mutually impact each other. There is no relationship or connection between the elements of the symbol “O”.

Table 5 lists IoT adoption barriers using abbreviations for convenience. Each abbreviation provides a concise overview of the main barriers that each one represents. Researchers and stakeholders seeking to overcome and resolve these obstacles in the rapidly evolving field of IoT technology will find the table invaluable.

Table 5. Barrier abbreviation table.
Sl no. Abbreviation Full form of abbreviation
1 RC Regulatory Compliance
2 HIC High implementation cost
3 LSW Lack of skilled workforce
4 DSP Data security and privacy
5 TI Technological infrastructure
6 SC Scalability challenges
7 CEC Cultural and ethical consideration
8 AA Acceptance and adoption
9 DIM Data integration and management issue
10 RI Reliability issue
11 ROI ROI uncertainty
12 EE Extreme environment issue
13 CCN Cold chain network

4.1.2 Reachability matrix formation

The four symbols in Table 4 are converted to 0s and 1s to implement SSIM in the first reachability matrix using the rules described in subsubsection 3.2.2. A square matrix is prepared in Table 6 with binary values that show whether the parts influence one other. The observed barriers are interconnected and have complicated relationships, which can be better understood using the reachability matrix.

Table 6. Initial reachability matrix.
Barriers RC HIC LSW DSP TI SC CEC AA DIM RI ROI EE CCN
RC 1 1 1 1 1 1 1 1 1 1 1 1 1
HIC 0 1 0 0 0 0 0 1 0 1 1 0 0
LSW 0 1 1 0 0 1 1 1 1 1 1 0 0
DSP 0 1 1 1 1 1 1 1 1 1 1 0 0
TI 0 1 1 1 1 1 0 1 1 1 1 1 0
SC 0 1 0 1 1 1 0 1 1 1 1 1 0
CEC 0 0 1 1 0 0 1 1 0 1 0 0 0
AA 0 0 0 0 0 0 0 1 0 1 0 0 0
DIM 0 1 1 1 1 1 0 1 1 1 1 1 0
RI 0 0 0 0 0 0 0 1 0 1 0 0 0
ROI 0 1 0 0 0 0 0 1 0 1 1 0 0
EE 0 1 0 0 1 1 0 1 1 1 1 1 0
CCN 0 1 1 1 1 1 1 1 1 1 1 1 1

4.1.3 Final reachability matrix formation

Transitivity was used to create the final reachability matrix, as shown in Table 7. Following the completion of the analytical phase of the ISM technique, the final reachability matrix, which contains the discovered hierarchical linkages among the system parts, is produced. The final reachability matrix determines the “driving and dependency power”, providing insight into the dynamics of the system. Analyzing “driving and dependency power,” Table 7 classifies parameters into “dependent, autonomous, linkage, and independent” categories. The barriers that display a significant driving force and dependence are categorized as belonging to the linking group; none of them are classified as autonomous, non-dependent, or dependent.

Table 7. Final reachability matrix.
Barriers RC HIC LSW DSP TI SC CEC AA DIM RI ROI EE CCN Driving Power
RC 1 1 1 1 1 1 1 1 1 1 1 1 1 13
HIC 0 1 0 0 0 0 0 1 0 1 1 0 0 4
LSW 0 1 1 1* 1* 1 1 1 1 1 1 1* 0 11
DSP 0 1 1 1 1 1 1 1 1 1 1 1* 0 11
TI 0 1 1 1 1 1 1* 1 1 1 1 1 0 11
SC 0 1 1* 1 1 1 1* 1 1 1 1 1 0 11
CEC 0 1* 1 1 1* 1* 1 1 1* 1 1* 1* 0 11
AA 0 0 0 0 0 0 0 1 0 1 0 0 0 2
DIM 0 1 1 1 1 1 1* 1 1 1 1 1 0 11
RI 0 0 0 0 0 0 0 1 0 1 0 0 0 2
ROI 0 1 0 0 0 0 0 1 0 1 1 0 0 4
EE 0 1 1* 1* 1 1 1* 1 1 1 1 1 0 11
CCN 0 1 1 1 1 1 1 1 1 1 1 1 1 12
Dependence Power 1 11 9 9 9 9 9 13 9 13 11 9 2

4.1.4 Level partition

Barriers are broken down into three distinct sets: the reachability set, which contains the factor and all other factors it influences; the antecedent set, which contains the factor and all other factors that influence it; and the intersubsection set, which contains all the factors in both sets.

Table 8 provides an overview of the final reachability matrix’s detailed reachability set, antecedent set, and inter-subsection set of IoT implementation barriers in CSC. All the barriers were categorized into levels.

Table 8. Final level partition.
Elements (Mi) Reachability Set R(Mi) Antecedent Set A(Ni) Intersection Set Level
1 1 1 1 5
2 2, 11 1, 2, 3, 4, 5, 6, 7, 9, 11, 12, 13 2, 11 2
3 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
4 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
5 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
6 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
7 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
8 8, 10 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 8, 10 1
9 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
10 8, 10 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 8, 10 1
11 2, 11 1, 2, 3, 4, 5, 6, 7, 9, 11, 12, 13 2, 11 2
12 3, 4, 5, 6, 7, 9, 12 1, 3, 4, 5, 6, 7, 9, 12, 13 3, 4, 5, 6, 7, 9, 12 3
13 13 1, 13 13 4

4.1.5 Conical matrix

The conical matrix in Table 9 displays the transitivity interactions between adoption barriers. Identifying indirect linkages between components reveals the domino impact of system effects. A more complete picture of the system dynamics and structure is achieved using this matrix, which assists in understanding the wider effect of changing one element on other elements. The conical shape of the final reachability matrix is illustrated in Fig 3.

Table 9. Conical matrix (CM).
Variables 8 10 2 11 3 4 5 6 7 9 12 13 1 Driving Power Level
8 1 1 0 0 0 0 0 0 0 0 0 0 0 2 1
10 1 1 0 0 0 0 0 0 0 0 0 0 0 2 1
2 1 1 1 1 0 0 0 0 0 0 0 0 0 4 2
11 1 1 1 1 0 0 0 0 0 0 0 0 0 4 2
3 1 1 1 1 1 1* 1* 1 1 1 1* 0 0 11 3
4 1 1 1 1 1 1 1 1 1 1 1* 0 0 11 3
5 1 1 1 1 1 1 1 1 1* 1 1 0 0 11 3
6 1 1 1 1 1* 1 1 1 1* 1 1 0 0 11 3
7 1 1 1* 1* 1 1 1* 1* 1 1* 1* 0 0 11 3
9 1 1 1 1 1 1 1 1 1* 1 1 0 0 11 3
12 1 1 1 1 1* 1* 1 1 1* 1 1 0 0 11 3
13 1 1 1 1 1 1 1 1 1 1 1 1 0 12 4
1 1 1 1 1 1 1 1 1 1 1 1 1 1 13 5
Dependence Power 13 13 11 11 9 9 9 9 9 9 9 2 1
Level 1 1 2 2 3 3 3 3 3 3 3 4 5
Fig 3. Conical form of the final reachability matrix.

Fig 3

The hierarchical relationships among the different system parts are better understood using a conical matrix (Table 9), which is a tool for creating conical structures. This conical form clarifies the architecture of the system by visually depicting the hierarchical connections.

4.1.6 MICMAC analysis

MICMAC analysis is a useful tool for determining the drive and dependence power of barriers. This analysis was conducted using barriers to divide the structure into separate groups.

There are four distinct categories of barriers described in Fig 4:

Fig 4. MICMAC diagram for barriers.

Fig 4

  • Autonomous barriers: These barriers were located in the first quadrant. They were not very strong in driving or being dependent.

  • Dependent barriers: These barriers are shown in Quadrant-II. The driving power of the subject was weak, whereas the dependence power was strong.

  • Linkage barriers: These are inside Quadrant-III and exhibit strong driving and dependent power. In general, the instability of these barriers arises from the interconnectedness of their actions since any action done on one barrier might have consequences for others and could affect the barrier itself.

  • Independent barriers: These are shown in Quadrant-IV and exhibit strong driving power but weak dependence power.

4.1.7 ISM model

The digraph in Fig 5 shows the barriers preventing IoT adoption. It was used to identify the hierarchy levels associated with the implementation of the IoT in cold SC. The conceptual coherence of the produced ISM model was checked, and any required adjustments were made.

Fig 5. Digraph depicting the relationship between barriers.

Fig 5

4.2 DEMATEL application

4.2.1 Average matrix formation

Each expert on the panel completed a survey with an integer value between 0 and 4 to indicate the level of impact they noticed between every given pair of obstacles. Using the matrix format of the survey data, the average matrix is determined using Eq 1 in Table 10.

Table 10. Average matrix.
RC HIC LSW DSP TI SC CEC AA DIM RI ROI EE CCN
RC 0.000 2.250 2.417 3.750 2.583 1.750 1.583 3.417 2.000 2.750 3.583 2.500 1.750
HIC 0.167 0.000 0.750 0.750 0.333 0.250 0.333 2.417 0.417 3.500 3.583 0.333 1.000
LSW 0.167 2.333 0.000 0.167 0.833 3.500 1.750 2.833 3.500 3.500 1.833 1.083 1.167
DSP 0.167 3.500 1.917 0.000 3.000 1.833 3.583 2.083 2.000 2.583 0.583 0.167 1.750
TI 0.167 2.000 1.250 2.833 0.000 1.833 0.417 1.750 3.667 3.000 2.000 3.083 0.917
SC 0.167 2.917 1.083 1.333 1.833 0.000 1.000 3.083 3.167 3.250 2.000 1.667 0.667
CEC 1.000 0.417 2.917 3.333 0.250 1.000 0.000 3.750 0.083 2.833 0.917 0.250 0.250
AA 0.333 0.750 1.167 1.250 0.417 0.417 2.250 0.000 0.083 2.000 1.167 0.167 0.083
DIM 0.250 3.000 2.333 3.167 3.583 3.250 0.000 1.750 0.000 2.833 2.083 1.000 1.500
RI 0.000 0.333 0.333 0.250 0.333 0.500 1.000 2.167 0.250 0.000 0.333 1.083 0.250
ROI 0.000 3.333 1.250 0.083 0.667 1.167 1.000 3.000 0.167 2.167 0.000 2.000 0.750
EE 0.000 3.083 0.667 0.250 2.917 2.000 0.083 2.500 0.750 1.917 2.167 0.000 0.333
CCN 0.083 3.250 1.917 2.083 3.083 3.000 2.583 1.750 2.833 2.000 2.917 2.917 0.000

4.2.2 Normalized direct relation matrix formation

Using Eq 2, the normalized direct relation matrix is formulated from the average matrix in Table 11. The maximum summation was 32.333, which functions as a divisor, and every cell value from the average matrix was divided by this value.

Table 11. Normalised direct relation matrix (D).
RC HIC LSW DSP TI SC CEC AA DIM RI ROI EE CCN
RC 0.000 0.070 0.075 0.116 0.080 0.054 0.049 0.106 0.062 0.085 0.111 0.077 0.054
HIC 0.005 0.000 0.023 0.023 0.010 0.008 0.010 0.075 0.013 0.108 0.111 0.010 0.031
LSW 0.005 0.072 0.000 0.005 0.026 0.108 0.054 0.088 0.108 0.108 0.057 0.034 0.036
DSP 0.005 0.108 0.059 0.000 0.093 0.057 0.111 0.064 0.062 0.080 0.018 0.005 0.054
TI 0.005 0.062 0.039 0.088 0.000 0.057 0.013 0.054 0.113 0.093 0.062 0.095 0.028
SC 0.005 0.090 0.034 0.041 0.057 0.000 0.031 0.095 0.098 0.101 0.062 0.052 0.021
CEC 0.031 0.013 0.090 0.103 0.008 0.031 0.000 0.116 0.003 0.088 0.028 0.008 0.008
AA 0.010 0.023 0.036 0.039 0.013 0.013 0.070 0.000 0.003 0.062 0.036 0.005 0.003
DIM 0.008 0.093 0.072 0.098 0.111 0.101 0.000 0.054 0.000 0.088 0.064 0.031 0.046
RI 0.000 0.010 0.010 0.008 0.010 0.015 0.031 0.067 0.008 0.000 0.010 0.034 0.008
ROI 0.000 0.103 0.039 0.003 0.021 0.036 0.031 0.093 0.005 0.067 0.000 0.062 0.023
EE 0.000 0.095 0.021 0.008 0.090 0.062 0.003 0.077 0.023 0.059 0.067 0.000 0.010
CCN 0.003 0.101 0.059 0.064 0.095 0.093 0.080 0.054 0.088 0.062 0.090 0.090 0.000

4.2.3 Total relation matrix formation

The total relation matrix is formulated using Eq 3 in Table 12. The values in the matrix indicate the degree of relation between the pairs of factors. A higher value suggests a stronger relationship.

Table 12. Total relation matrix.
RC HIC LSW DSP TI SC CEC AA DIM RI ROI EE CCN R i
RC 0.012 0.193 0.152 0.189 0.162 0.143 0.126 0.243 0.142 0.235 0.207 0.145 0.100 2.050
HIC 0.009 0.048 0.053 0.049 0.039 0.041 0.044 0.130 0.039 0.162 0.143 0.040 0.047 0.843
LSW 0.014 0.155 0.058 0.065 0.085 0.166 0.102 0.187 0.158 0.214 0.129 0.083 0.067 1.485
DSP 0.016 0.190 0.121 0.068 0.147 0.122 0.162 0.172 0.123 0.197 0.098 0.060 0.087 1.565
TI 0.013 0.157 0.097 0.141 0.070 0.125 0.068 0.158 0.168 0.204 0.137 0.143 0.065 1.546
SC 0.014 0.169 0.087 0.095 0.112 0.061 0.080 0.188 0.145 0.203 0.131 0.097 0.053 1.436
CEC 0.037 0.077 0.130 0.139 0.051 0.078 0.052 0.188 0.048 0.167 0.078 0.042 0.034 1.121
AA 0.015 0.058 0.062 0.063 0.035 0.040 0.093 0.050 0.026 0.109 0.064 0.026 0.017 0.660
DIM 0.017 0.193 0.132 0.156 0.175 0.170 0.065 0.169 0.077 0.214 0.148 0.093 0.085 1.694
RI 0.003 0.034 0.028 0.025 0.026 0.033 0.047 0.095 0.022 0.032 0.031 0.045 0.016 0.438
ROI 0.006 0.149 0.071 0.035 0.053 0.071 0.063 0.155 0.038 0.136 0.050 0.089 0.041 0.959
EE 0.006 0.153 0.058 0.047 0.124 0.101 0.039 0.147 0.065 0.139 0.120 0.039 0.034 1.070
CCN 0.015 0.214 0.132 0.138 0.170 0.173 0.142 0.188 0.161 0.207 0.184 0.153 0.045 1.922
C i 0.178 1.790 1.180 1.212 1.249 1.325 1.082 2.071 1.211 2.219 1.522 1.055 0.691

4.2.4 Identification of cause and effect

Table 13 provides information on the degree of influence of various factors related to IoT adoption on cold SC barriers. Each row represents a specific factor, and each column provides different metrics or totals. The row total and column total were calculated using Eqs 4 and 5. Causes have RiCi values greater than 0, whereas the effects have smaller RiCi values.

Table 13. Degree of influences.
IoT implementation in cold SC barriers (Ri) Row Total (Ci) Column Total Ri + Ci RiCi Identify
Regulatory Compliance 2.050 0.178 2.228 1.872 Cause
High implementation cost 0.843 1.790 2.633 -0.947 Effect
Lack of skilled workforce 1.485 1.180 2.665 0.304 Cause
Data security and privacy 1.565 1.212 2.776 0.353 Cause
Technological infrastructure 1.546 1.249 2.795 0.297 Cause
Scalability 1.436 1.325 2.761 0.110 Cause
Cultural and ethical consideration 1.121 1.082 2.203 0.039 Cause
Acceptance and adoption 0.660 2.071 2.731 -1.412 Effect
Data integration and management issue 1.694 1.211 2.905 0.482 Cause
Reliability issue 0.438 2.219 2.657 -1.781 Effect
ROI uncertainty 0.959 1.522 2.481 -0.563 Effect
Extreme environment issue 1.070 1.055 2.125 0.015 Cause
Cold chain network 1.922 0.691 2.613 1.231 Cause

4.2.5 Developing interrelationship map

A digraph illustrating the influential relationship between the barriers is shown in Fig 6, where the threshold value calculated using Eq 6 is 0.099. Once the threshold value is determined, an interrelationship map is produced. In this map, the values above the threshold reflect the influence of barrier i on barrier j. By contrast, when the value is lower than the threshold value, barrier i is influenced by barrier j. The arrows demonstrate the influence, demonstrating an important link among the barriers. Values positioned above the neutral horizontal line are categorized as belonging to the cause group, while values positioned below the neutral horizontal line are categorized as belonging to the effect group.

Fig 6. Digraph showing the influential relationship between the barriers.

Fig 6

4.2.6 Developing final ranking of attributes

DIM > TI > DSP > SC > AA > LSW > RI > HIC > CCN > ROI > RC > CEC > EE

Where Full form of these abbreviations described in Table 5.

5 Discussions

Numerous interconnected barriers to extensive IoT implementation in cold SC were analyzed in this study. Data from the survey were double-checked to ensure accuracy. The Cronbach’s alpha test was used to ensure that the survey results were acceptable and valid. A reliable measurement is ensured by this coefficient, which evaluates the internal consistency of the survey questions. After it was confirmed that the alpha value was above the acceptable range, the subsequent stage of the process was initiated.

To ascertain this, The ISM-MICMAC-DEMATEL method is constructed to determine important barriers, which are divided into three subsections: subsection 4.1 for ISM, subsection 4.1.6 for MICMAC and the other subsection 4.2 for DEMATEL.

The ISM model was created to determine the hierarchy levels of IoTBs so that CSC practitioners could see their dependence links and focus on the largest adoption barriers to IoT deployment. This study identified five hierarchical layers to explain the linkages between the chosen IoTBs. The implementation barrier at higher levels exhibits greater susceptibility to the effect of other factors, while components situated at lower levels strongly influence other factors.

Variables classified as high levels, namely Levels 1 and 2, are prone to being influenced by other variables. We identified acceptance, adoption, and reliability issues at the top of the hierarchy, driven by the four hierarchies below. At the second level, we identified two barriers: high implementation cost and ROI uncertainty caused by the three hierarchical layers below it. In the third tier, six interconnected barriers have mutual effects. These barriers include a lack of skilled workforce, data security and privacy, technological infrastructure, scalability challenges, cultural and ethical considerations, data integration and management, and extreme environments. Conversely, components categorized as low levels, namely Levels 4 and 5, can influence the other factors more. The IoT adoption barriers in Level 4 are cold chain networks and Level 5 is regulatory compliance. These factors serve as foundational elements in a broader network of relationships.

The analysis of barriers identifies regulatory compliance as an important factor that hinders the implementation of the IoT. The implementation of government regulations that promote the adoption of IoT will result in a significant transformation of the supply chain system. Infrastructure, environmental factors, a trained workforce, cultural-ethical considerations, scalability, and other factors influence the cold chain network. Most of the supply chain stages are apprehensive about implementing IoT, as is typical with every new technology. An efficient technological infrastructure is necessary for the successful deployment of the IoT across supply chains, which involves a vast network of linked devices and systems. Adoption of the IoT depends on this infrastructure, which allows integration, data transfer, and communication among components in the supply chain ecosystem. Industries may face challenges with scalability and performance if the infrastructure is insufficient for the IoT. To oversee such a vast and complex system, experts with the necessary level of expertise are required. Reducing the challenges associated with IoT adoption requires secure network cloud data. Preventing spyware and attacks is crucial since the number of connected devices and sensitive data is growing. As the nature of threats evolves, more sophisticated security measures and solutions designed for IoT systems may be required. A massive investment is necessary to hire experts, educate current employees, and build infrastructure. Industries are hesitant to implement IoT due to concerns about the potential lack of return on investment. In order to feel certain about the ROI, small companies need to be presented with a handful of positive examples.

According to the MICMAC analysis, independent barriers are cold chain networks and regulatory compliance; dependent barriers are ROI uncertainty and high implementation costs. The other seven were linkage barriers, and no autonomous barriers existed. Among the many types of barriers, linkage and independent barriers exhibit significant driving forces, making them crucial barriers.

The interdependence of the barriers is depicted in the interrelationship map. Regulatory compliance, lack of skilled workforce, data security and privacy, technological infrastructure, scalability challenges, cultural and ethical considerations, data integration and management issues, extreme environment issues, and cold chain networks are in the cause group. High implementation cost, acceptance and adoption, reliability issues, and ROI uncertainty are in the effect group. Regulatory compliance and cold chain networks were identified as the most important causes, with respective values of 1.8719 and 1.2308. These two barriers drive more in a larger context; thus, improving performance may promote system development. Reliability issues, acceptance and adoption, and high implementation costs are the most important effects influenced by other barriers. These effects were quantified with values of -1.7808, -1.4118, and -94707, respectively. According to the final ranking of attributes, the most important criteria are technological infrastructure, data security and privacy, and data integration and management. The criterion for extreme environments is of the least importance.

To overcome the barriers associated with data integration and management, it is essential to implement standardized software that enables communication between devices on the same system. Priority should be given to privacy and security during IoT implementation, and it is difficult to develop and investigate a gateway that connects devices using multiple protocols. Faculty and industry must collaborate to resolve this challenge. Significant investment and research are needed for solving security and data integration challenges at the ground level.

5.1 Managerial and practical implications

Given that the implementation of IoT is in its early stages, the results presented in this paper offer valuable guidance for practitioners. This study has revealed several implications for both managerial and practical considerations, providing insights that can inform decision-making in this evolving field.

  • This article guides innovative supply chain methods that use new technologies such as IoT. This study provides crucial barriers to understanding supply chain strategies by considering IoT while creating a coordinating system. Managers can also learn about the most prevalent IoT technological difficulties. With additional insight, managers can quickly improve processes, fix issues, and make decisions more informedly.

  • This research can help CSC managers plan IoT programs to protect perishable goods from packaging and processing to storage, transportation, and distribution by providing precise temperature and humidity data with a data integration system. IoT sensors may warn of temperature changes or equipment breakdown. Managers schedule proactive maintenance to prevent breakdowns and product spoilage. High-quality goods and adequate regulations may benefit from this research.

  • This study promotes new efforts to provide supply chain stakeholders with a single platform to exchange information to establish a strong system. This study’s focus on efficient information transmission made cold SC more trustworthy. IoT devices collect sufficient data to enable managers to observe patterns and trends. Analytics can optimize processes, routes, and resource use.

  • This study suggests that IoT technology might enhance cold SC product quality, customer demand, and services. If this study is used well, management may replace conventional supply chain linkages with real-time data interchange via radio frequency identification tags, readers, and other embedded electronic devices.

  • The findings of this study can convince managerial staff to invest in GPS, RFID tags, readers, and other monitoring technologies. Managers will hire suitable candidates to maximize the use of IoT technology using this knowledge. The conclusions of this study may also motivate higher management to expand staff training and development.

5.2 Unique theoretical contribution

To guarantee a long-term, IoT-based CSC system, this study examined the challenges associated with using the IoT in CSC. Thirteen obstacles were identified with the assistance of stakeholders. According to the results of this study, various stakeholders in CSC require distinct responses. As the transport management system (TMS) is the most influential party, it follows that TMS should take the initiative and rely on policies to guide its actions. These stakeholders initiate the HIC, TI, SC, DIM, EE, and CCN barriers.

Additionally, any and all obstacles may serve as a roadmap for different groups of people engaged in logistics, product processing, quality inspection, and secure packaging. To sum up the theoretical contribution, this study found two kinds of barriers—cause and effect—based on stakeholder theory that prevents the implementation of IoT in CSC systems. The specific barriers to the effective deployment of IoT in CSC may be better understood by exploring each of these categories. Combining insights from management, engineering, logistics, and information systems into a comprehensive plan. This approach facilitates the identification of problems as a whole and the development of comprehensive solutions. This study also used a socio-technical systems approach to examine social-technical interactions inside the CSC. Human traits, organizational culture, and socioeconomic context influence the process of identifying and removing barriers. This model demonstrated how obstacles in one part of a system may affect other parts of the system and how the removal of certain obstacles can cause other benefits to trickle down.

6 Conclusions and future works

The primary purpose of this study was to identify and examine the barriers that hinder IoT implementation in cold SC. Our research sought to identify and examine the barriers preventing the IoT from being widely used. As a result of IoT’s infancy, CSC partners are unaware of their technological requirements and the benefits that accompany them; consequently, they are hesitant to implement it. Significant findings and insights were derived from the ISM-MICMAC-DEMATEL analysis, which clarified the connection between implementation barriers and their effect on CSC. ISM provides hierarchical linkages, but the impact of IoTBs on each other has not been quantified. The DEMATEL method was employed to identify the most crucial IoTBs and overcome the limitations of ISM, which prioritizes the interactions between the selected barriers more than ISM. According to the research results, there are two primary factors that practitioners in CSCs should focus on regulatory compliance and cold chain networks, which serve as a catalyst for advancement by focusing on the barriers hindering development. With MICMAC’s element classification based on driving and dependence powers, the interconnections inside a complicated system may be fully understood, and decisions can be made more effectively. According to the DEMATEL attribute ranking, the three most important factors preventing the widespread adoption of the IoT are data integration and management (DIM), technological infrastructure (TI), and data security and privacy (DSP). While these barriers do pose a serious threat to the system, it is vital to remember that they could not be the main causes influencing the dependability and efficiency of IoT deployment as a whole. Regardless of whether they are not the most crucial barriers discovered by DEMATEL analysis, practitioners aiming for long-term viability in IoT deployment should prioritize resolving the most important causes. Challenges with regulatory compliance and cold chain networks are likely to be among these root reasons, as are other essentials for the successful implementation of IoT. The long-term success and stability of IoT deployments may be assured if practitioners concentrate on fixing these underlying issues. On the other hand, where there is a need for rapid or immediate improvement to enhance IoT implementation, it can be practical to tackle the most important obstacles found by DEMATEL first. Although these obstacles may not solve the root problems, they may improve some parts of the IoT deployment, which can lead to rapid success and show stakeholders how beneficial the technology could be. The efficient implementation of IoT in CSC depends on government rules and a strong cold chain structure. Government engagement may solve data privacy, security, integration, and reliability issues, boosting industry confidence and IoT adoption. Securing and tackling these barriers properly leads to higher reliability in the IoT implementation. The total system becomes more expensive due to the scalability issues and harsh environmental issues. The most important thing to remember is that the long-term advantages will be worth it, even if the initial investment in the IoT is expensive. It will increase the acceptance and adoption of the IoT implementation in CSC.

Practitioners must pay special attention to the highlighted barriers to the adoption of IoT. Hence, this study highlights the present barriers and provides the groundwork for future developments that might revolutionize the use of the IoT in cold SC. Although our research has shed light on significant insights into IoT implementation barriers within CSCs, it is imperative to acknowledge certain limitations and outline avenues for future exploration. Our primary constraint lies in the indirect nature of our investigation as we could not directly observe industry-specific barriers. Instead, we thoroughly examined existing IoT studies on CSCs. Another limitation of this research is the lack of digital archives, such as Scopus and the ACM Digital Library, in the systematic literature review. However, we selected respectable scientific archives, such as IEEE Xplore, Springer, Elsevier, Taylor & Francis, Wiley Online Library, ResearchGate, and Science Direct. These repositories provide high-quality research. The references of selected publications were traced using all relevant studies using the backward snowballing method. Identifying thirteen major IoT implementation barriers is the foundation, but it is essential to recognize that additional barriers may surface during real-world implementation. To mitigate potential bias, we sought input from thirty experts. However, the evaluation by these topic experts introduced a degree of subjectivity to our study’s final conclusions. Enhancing the robustness of our findings involves soliciting inputs from an extensive array of industry firms. Increased participation would validate our identified barriers and enrich the diversity of perspectives, thereby improving the overall quality of our study. Furthermore, our study’s focus on CSC prompts the need for broader investigations into other sectors, such as the food supply chain, agriculture, and perishable goods. Conducting additional research in these areas will provide a more comprehensive contextual understanding and allow for the generalization of our findings beyond the specific case at hand. Additionally, alternative methods should be explored to test the hypotheses regarding the interrelationships among IoT barriers. Although our research has made valuable contributions, addressing these limitations and pursuing future avenues of exploration will undoubtedly refine and extend the scope of our understanding of IoT implementation challenges in various industries.

Supporting information

S1 Data

(XLSX)

pone.0304118.s001.xlsx (92.4KB, xlsx)

Data Availability

All data and related metadata underlying the findings of this study have been deposited in Figshare, an appropriate public data repository. The datasets are accessible at the following DOI: https://doi.org/10.6084/m9.figshare.25826077.v1.

Funding Statement

The author(s) received no specific funding for this work.

References

  • 1. Rejeb A, Keogh JG, Treiblmaier H. Leveraging the internet of things and blockchain technology in supply chain management. Future Internet. 2019;11(7):161. doi: 10.3390/fi11070161 [DOI] [Google Scholar]
  • 2. Khan AU, Ali Y. Sustainable supplier selection for the cold supply chain (CSC) in the context of a developing country. Environment, development and sustainability. 2021; p. 1–30. [Google Scholar]
  • 3. Li L. Managing supply chain and logistics: Competitive strategy for a sustainable future. World Scientific Publishing Company; 2014. [Google Scholar]
  • 4.Tan MII, Desa MI, et al. Logistics and information technology: Previous research and future research expension. In: 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE). vol. 5. IEEE; 2010. p. 242–246.
  • 5. Ben-Daya M, Hassini E, Bahroun Z. Internet of things and supply chain management: a literature review. International journal of production research. 2019;57(15-16):4719–4742. doi: 10.1080/00207543.2017.1402140 [DOI] [Google Scholar]
  • 6. Frederico GF, Garza-Reyes JA, Anosike A, Kumar V. Supply Chain 4.0: concepts, maturity and research agenda. Supply Chain Management: An International Journal. 2019;25(2):262–282. doi: 10.1108/SCM-09-2018-0339 [DOI] [Google Scholar]
  • 7. Li dX. Engineering informatics: state of the art and future trends. Frontiers of Engineering Management. 2015;1(3):270–282. [Google Scholar]
  • 8. Nguyen TP, Huang CL, Lin YK. Estimation of the Network Reliability for a Stochastic Cold Chain Network with Multi-State Travel Time. Applied Sciences. 2023;13(13):7897. doi: 10.3390/app13137897 [DOI] [Google Scholar]
  • 9. Mineraud J, Mazhelis O, Su X, Tarkoma S. A gap analysis of Internet-of-Things platforms. Computer Communications. 2016;89:5–16. doi: 10.1016/j.comcom.2016.03.015 [DOI] [Google Scholar]
  • 10.Salunkhe P, Nerkar R. IoT driven smart system for best cold chain application. In: 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC). IEEE; 2016. p. 64–67.
  • 11. George JP, Pramod V. An interpretive structural model (ISM) analysis approach in steel re rolling mills (SRRMS). International Journal of Research in Engineering & Technology. 2014;2(4):161–174. [Google Scholar]
  • 12. Du YW, Li XX. Hierarchical DEMATEL method for complex systems. Expert Systems with Applications. 2021;167:113871. doi: 10.1016/j.eswa.2020.113871 [DOI] [Google Scholar]
  • 13. Zhang F, Li D, Ahrentzen S, Feng H. Exploring the inner relationship among neighborhood environmental factors affecting quality of life of older adults based on SLR–ISM method. Journal of Housing and the Built Environment. 2020;35:215–242. doi: 10.1007/s10901-019-09674-y [DOI] [Google Scholar]
  • 14. Li Y, Sankaranarayanan B, Thresh Kumar D, Diabat A. Risks assessment in thermal power plants using ISM methodology. Annals of Operations Research. 2019;279:89–113. doi: 10.1007/s10479-018-3121-7 [DOI] [Google Scholar]
  • 15. Alinezhad A, Khalili J, Alinezhad A, Khalili J. DEMATEL Method. New Methods and Applications in Multiple Attribute Decision Making (MADM). 2019; p. 103–108. [Google Scholar]
  • 16.Wanganoo L, Shukla VK. Real-time data monitoring in cold supply chain through NB-IoT. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE; 2020. p. 1–6.
  • 17. Mohammed M, Riad K, Alqahtani N. Design of a smart IoT-based control system for remotely managing cold storage facilities. Sensors. 2022;22(13):4680. doi: 10.3390/s22134680 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 18. Shih CW, Wang CH. Integrating wireless sensor networks with statistical quality control to develop a cold chain system in food industries. Computer Standards & Interfaces. 2016;45:62–78. doi: 10.1016/j.csi.2015.12.004 [DOI] [Google Scholar]
  • 19.Hasanat RT, Rahman MA, Mansoor N, Mohammed N, Rahman MS, Rasheduzzaman M. An IoT based real-time data-centric monitoring system for vaccine cold chain. In: 2020 IEEE East-West Design & Test Symposium (EWDTS). IEEE; 2020. p. 1–5.
  • 20.Kumar N, Tyagi M, Sachdeva A. Estimation of critical key performance factors of food cold supply chain using fuzzy AHP approach. In: International Conference on Advanced Production and Industrial Engineering. Springer; 2019. p. 701–711.
  • 21. Chen J, Xu S, Chen H, Zhao C, Xue K; IOP Publishing. Research on optimization of food cold chain logistics distribution route based on internet of things. Journal of Physics: Conference Series. 2020;1544(1):012086. [Google Scholar]
  • 22. Tsang YP, Choy KL, Wu CH, Ho GT, Lam CH, Koo P. An Internet of Things (IoT)-based risk monitoring system for managing cold supply chain risks. Industrial Management & Data Systems. 2018;118(7):1432–1462. doi: 10.1108/IMDS-09-2017-0384 [DOI] [Google Scholar]
  • 23. Esmizadeh Y, Bashiri M, Jahani H, Almada-Lobo B. Cold chain management in hierarchical operational hub networks. Transportation Research Part E: Logistics and Transportation Review. 2021;147:102202. doi: 10.1016/j.tre.2020.102202 [DOI] [Google Scholar]
  • 24. Hasan I, Habib MM. Revolutionizing Supply Chain Management: The Impact of IoT on Efficiency and Transparency. International Supply Chain Technology Journal. 2022;8(7). doi: 10.20545/isctj.v08.i07.02 [DOI] [Google Scholar]
  • 25. Zhou M, Fortino G, Shen W, Mitsugi J, Jobin J, Bhattacharyya R. Guest editorial special section on advances and applications of Internet of Things for smart automated systems. IEEE Transactions on Automation Science and Engineering. 2016;13(3):1225–1229. doi: 10.1109/TASE.2016.2579538 [DOI] [Google Scholar]
  • 26. Okorogu V, Obioma Peace C, Oranugo Charles O, Ezeribe Basil E. The Internet of Things: Insight to a Technological Revolution. International Journal for Research in Applied Science and Engineering Technology. 2017;5(9). [Google Scholar]
  • 27. Aryal A, Liao Y, Nattuthurai P, Li B. The emerging big data analytics and IoT in supply chain management: a systematic review. Supply Chain Management: An International Journal. 2020;25(2):141–156. doi: 10.1108/SCM-03-2018-0149 [DOI] [Google Scholar]
  • 28.Shi W, Gao T, Kulshrestha S, Bose R, Haga A, Okada Y. A framework for automatically generating IoT security quizzes in 360VR images/videos based on linked data. In: Advances in Internet, Data and Web Technologies: The 8th International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2020). Springer; 2020. p. 259–267.
  • 29. Al-Talib M, Melhem WY, Anosike AI, Reyes JAG, Nadeem SP, et al. Achieving resilience in the supply chain by applying IoT technology. Procedia Cirp. 2020;91:752–757. doi: 10.1016/j.procir.2020.02.231 [DOI] [Google Scholar]
  • 30. Krotov V. The Internet of Things and new business opportunities. Business Horizons. 2017;60(6):831–841. doi: 10.1016/j.bushor.2017.07.009 [DOI] [Google Scholar]
  • 31.Saleem J, Hammoudeh M, Raza U, Adebisi B, Ande R. IoT standardisation: Challenges, perspectives and solution. In: Proceedings of the 2nd international conference on future networks and distributed systems; 2018. p. 1–9.
  • 32. Ben-Daya M, Hassini E, Bahroun Z, Banimfreg BH. The role of internet of things in food supply chain quality management: A review. Quality management journal. 2020;28(1):17–40. doi: 10.1080/10686967.2020.1838978 [DOI] [Google Scholar]
  • 33.Salomon VAP. Multi-Criteria Methods and Techniques Applied to Supply Chain Management. Rijeka: IntechOpen; 2018. Available from: 10.5772/intechopen.71296. [DOI]
  • 34. Sallam K, Mohamed M, Mohamed AW. Internet of Things (IoT) in supply chain management: challenges, opportunities, and best practices. Sustainable Machine Intelligence Journal. 2023;2:3–1. doi: 10.61185/SMIJ.2023.22103 [DOI] [Google Scholar]
  • 35.Yesodha KRK, Jagadeesan A, Logeshwaran J. IoT applications in Modern Supply Chains: Enhancing Efficiency and Product Quality. In: 2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA). IEEE; 2023. p. 366–371.
  • 36. Bahl S. Role of Internet of Things (Iot) in Supply Chain Management Effectiveness: An Empirical Study. INFORMATION TECHNOLOGY IN INDUSTRY. 2018;6(3). doi: 10.17762/itii.v6i3.824 [DOI] [Google Scholar]
  • 37. Kamble SS, Gunasekaran A, Parekh H, Joshi S. Modeling the internet of things adoption barriers in food retail supply chains. Journal of Retailing and Consumer Services. 2019;48:154–168. doi: 10.1016/j.jretconser.2019.02.020 [DOI] [Google Scholar]
  • 38. Shashi M. Digitalization of pharmaceutical cold chain systems using IoT digital enabler. Int J Eng Adv Technol. 2022;11:133–137. doi: 10.35940/ijeat.E3622.0611522 [DOI] [Google Scholar]
  • 39. Badia-Melis R, Mc Carthy U, Ruiz-Garcia L, Garcia-Hierro J, Villalba JR. New trends in cold chain monitoring applications-A review. Food Control. 2018;86:170–182. doi: 10.1016/j.foodcont.2017.11.022 [DOI] [Google Scholar]
  • 40. Gupta VK, Chaudhuri A, Tiwari MK. Modeling for deployment of digital technologies in the cold chain. IFAC-PapersOnLine. 2019;52(13):1192–1197. doi: 10.1016/j.ifacol.2019.11.360 [DOI] [Google Scholar]
  • 41.Umamaheswari K, Susneha M, Kala BS. IoT based smart cold storage system for efficient stock management. In: 2020 International Conference on Communication and Signal Processing (ICCSP). IEEE; 2020. p. 0051–0055.
  • 42. Luo H, Zhu M, Ye S, Hou H, Chen Y, Bulysheva L. An intelligent tracking system based on internet of things for the cold chain. Internet Research. 2016;26(2):435–445. doi: 10.1108/IntR-11-2014-0294 [DOI] [Google Scholar]
  • 43. Afreen H, Bajwa IS. An IoT-based real-time intelligent monitoring and notification system of cold storage. IEEE Access. 2021;9:38236–38253. doi: 10.1109/ACCESS.2021.3056672 [DOI] [Google Scholar]
  • 44. Goodarzian F, Navaei A, Ehsani B, Ghasemi P, Muñuzuri J. Designing an integrated responsive-green-cold vaccine supply chain network using Internet-of-Things: artificial intelligence-based solutions. Annals of Operations Research. 2023;328(1):531–575. doi: 10.1007/s10479-022-04713-4 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 45.Zhang N, Liu Y. NB-IOT drives intelligent cold chain for best application. In: 2019 IEEE 9th international conference on electronics information and emergency communication (ICEIEC). IEEE; 2019. p. 1–4.
  • 46. Çeken C, Abdurahman D. Simulation modeling of an iot based cold chain logistics management system. Sakarya University Journal of Computer and Information Sciences. 2019;2(2):89–100. doi: 10.35377/saucis.02.02.598963 [DOI] [Google Scholar]
  • 47.Hernández A, Yamaura M. Cold chain management with Internet of Things (IoT) enabled solutions for pharmaceutical industry. Malaysia Institute for Supply Chain Innovation. 2017; p. 1–6.
  • 48.Atyam NR, Ponmurugan P, Senthamil LS, Augustine PJ, Govindarajan A, et al. Integrated Internet of Things with Blockchains for Vendor-Management Inventory System. In: 2022 6th International Conference on Computing Methodologies and Communication (ICCMC). IEEE; 2022. p. 86–99.
  • 49. Kumar N, Tyagi M, Sachdeva A. Visualization and analysis of key performance indicators for agricultural cold supply chain in Indian context using fuzzy DEMATEL approach. Journal of Agribusiness in Developing and Emerging Economies. 2023;. doi: 10.1108/JADEE-10-2022-0223 [DOI] [Google Scholar]
  • 50. Kumar N, Tyagi M, Sachdeva A. A sustainable framework development and assessment for enhancing the environmental performance of cold supply chain. Management of Environmental Quality: An International Journal. 2023;34(4):1077–1110. doi: 10.1108/MEQ-03-2022-0046 [DOI] [Google Scholar]
  • 51. Zhang Y, Zhao L, Qian C. Modeling of an IoT-enabled supply chain for perishable food with two-echelon supply hubs. Industrial Management & Data Systems. 2017;117(9):1890–1905. doi: 10.1108/IMDS-10-2016-0456 [DOI] [Google Scholar]
  • 52. Abdel-Basset M, Manogaran G, Mohamed M. Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future generation computer systems. 2018;86(9):614–628. doi: 10.1016/j.future.2018.04.051 [DOI] [Google Scholar]
  • 53. Babagolzadeh M, Shrestha A, Abbasi B, Zhang Y, Woodhead A, Zhang A. Sustainable cold supply chain management under demand uncertainty and carbon tax regulation. Transportation Research Part D: Transport and Environment. 2020;80:102245. doi: 10.1016/j.trd.2020.102245 [DOI] [Google Scholar]
  • 54.Stuurman K, Kamara I. IoT Standardization-The Approach in the Field of Data Protection as a Model for Ensuring Compliance of IoT Applications? In: 2016 IEEE 4th International Conference on Future internet of things and Cloud Workshops (FiCloudW). IEEE; 2016. p. 336–341.
  • 55.Jerkins JA. Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE; 2017. p. 1–5.
  • 56.Zhou W, Piramuthu S. IoT and supply chain traceability. In: Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings 1. Springer; 2015. p. 156–165.
  • 57. Urbano O, Perles A, Pedraza C, Rubio-Arraez S, Castelló ML, Ortola MD, et al. Cost-effective implementation of a temperature traceability system based on smart RFID tags and IoT services. Sensors. 2020;20(4):1163. doi: 10.3390/s20041163 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 58. Manavalan E, Jayakrishna K. A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements. Computers & industrial engineering. 2019;127:925–953. doi: 10.1016/j.cie.2018.11.030 [DOI] [Google Scholar]
  • 59.Madanayake U, Seidu R, Young B. Investigating the Skills and Knowledge Requirements for IOT Implementation in Construction. In: 5th NA International Conference on Industrial Engineering and Operations Management; 2020.
  • 60. Hussain MI. Internet of Things: challenges and research opportunities. CSI transactions on ICT. 2017;5:87–95. doi: 10.1007/s40012-016-0136-6 [DOI] [Google Scholar]
  • 61.Seet PS, Jones J, Klarin A, Suseno Y. IoT and the Future Workforce: Potential Implications. Australian Council of Learned Academies; 2021.
  • 62.Zhang H, Sakurai K. Blockchain for iot-based digital supply chain: A survey. In: Advances in Internet, Data and Web Technologies: The 8th International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2020). Springer; 2020. p. 564–573.
  • 63.Nakamura S, Enokido T, Takizawa M. A TBOI (time-based operation interruption) protocol to prevent late information flow in the IoT. In: International Conference on Broadband and Wireless Computing, Communication and Applications. Springer; 2019. p. 93–104.
  • 64.Mohsin A, Yellampalli SS. IoT based cold chain logistics monitoring. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). IEEE; 2017. p. 1971–1974.
  • 65. Karimi T, Azar A, Mohebban B, Ghasemi R. Developing an Internet of Things-based Intelligent Transportation Technology Roadmap in the Food Cold Supply Chain. Industrial Management Journal. 2022;14(2):195–219. [Google Scholar]
  • 66. Raut RD, Gardas BB, Narwane VS, Narkhede BE. Improvement in the food losses in fruits and vegetable supply chain-a perspective of cold third-party logistics approach. Operations research perspectives. 2019;6:100117. doi: 10.1016/j.orp.2019.100117 [DOI] [Google Scholar]
  • 67. Li G. Development of cold chain logistics transportation system based on 5G network and Internet of things system. Microprocessors and Microsystems. 2021;80:103565. doi: 10.1016/j.micpro.2020.103565 [DOI] [Google Scholar]
  • 68. Sodhi MS, Tang CS. Supply chain management for extreme conditions: research opportunities. Journal of Supply Chain Management. 2021;57(1):7–16. doi: 10.1111/jscm.12255 [DOI] [Google Scholar]
  • 69.Kokkinos K, Exadactylos A, Vafidis D, Hatziioannou M. Efficient traceability of aquatic products on the cold supply chain management via IoT and artificial neural networks. In: Proceedings of the 3rd International Congress on Applied Ichthyology & Aquatic Environment, Volos, Greece; 2018. p. 8–11.
  • 70. Gillespie J, da Costa TP, Cama-Moncunill X, Cadden T, Condell J, Cowderoy T, et al. Real-Time Anomaly Detection in Cold Chain Transportation Using IoT Technology. Sustainability. 2023;15(3):2255. doi: 10.3390/su15032255 [DOI] [Google Scholar]
  • 71.Sarkar S, Akshatha K, Saurabh A, Samanvitha B, Sarwar MF. IoT Enabled Cold Supply Chain Monitoring System. In: 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT). IEEE; 2022. p. 1–6.
  • 72. Tsang Y, Choy K, Wu CH, Ho G, Lam H, Koo P. An IoT-based cargo monitoring system for enhancing operational effectiveness under a cold chain environment. International Journal of Engineering Business Management. 2017;9:1847979017749063. doi: 10.1177/1847979017749063 [DOI] [Google Scholar]
  • 73.Soh ZHC, Zamri LBM, Sulaiman SN, CheAbdullah SA, Yahaya SZ, Ibrahim MN. Cold Chain Management System via Low Power Wide Area Network and IoT. In: 2021 6th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE). vol. 6. IEEE; 2021. p. 1–6.
  • 74. Zhang P, Liu X, Li W, Yu X. Pharmaceutical cold chain management based on blockchain and deep learning. Journal of Internet Technology. 2021;22(7):1531–1542. doi: 10.53106/160792642021122207007 [DOI] [Google Scholar]
  • 75.Wanganoo L, Shukla VK, Panda BP. NB-IoT Powered Last-Mile Delivery Framework for Cold Supply Chain. In: Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020. Springer; 2021. p. 257–268.
  • 76. Raut RD, Narkhede B, Gardas BB. To identify the critical success factors of sustainable supply chain management practices in the context of oil and gas industries: ISM approach. Renewable and Sustainable Energy Reviews. 2017;68:33–47. doi: 10.1016/j.rser.2016.09.067 [DOI] [Google Scholar]
  • 77. Manoharan S, Pulimi VSK, Kabir G, Ali SM. Contextual relationships among drivers and barriers to circular economy: An integrated ISM and DEMATEL approach. Sustainable Operations and Computers. 2022;3:43–53. doi: 10.1016/j.susoc.2021.09.003 [DOI] [Google Scholar]
  • 78. Gokarn S, Choudhary A. Modeling the key factors influencing the reduction of food loss and waste in fresh produce supply chains. Journal of environmental management. 2021;294:113063. doi: 10.1016/j.jenvman.2021.113063 [DOI] [PubMed] [Google Scholar]
  • 79. Singh R, Bhanot N. An integrated DEMATEL-MMDE-ISM based approach for analysing the barriers of IoT implementation in the manufacturing industry. International Journal of Production Research. 2020;58(8):2454–2476. doi: 10.1080/00207543.2019.1675915 [DOI] [Google Scholar]
  • 80. Cui Y, Liu W, Rani P, Alrasheedi M. Internet of Things (IoT) adoption barriers for the circular economy using Pythagorean fuzzy SWARA-CoCoSo decision-making approach in the manufacturing sector. Technological Forecasting and Social Change. 2021;171:120951. doi: 10.1016/j.techfore.2021.120951 [DOI] [Google Scholar]
  • 81.Abkenar ZA, Lajimi HF, Hamedi M, Parkouhi SV. Determining the importance of barriers to IoT implementation using bayesian best-worst method. In: Advances in Best-Worst Method: Proceedings of the Second International Workshop on Best-Worst Method (BWM2021). Springer; 2022. p. 144–159.
  • 82. Kumar A, Dixit G. An analysis of barriers affecting the implementation of e-waste management practices in India: A novel ISM-DEMATEL approach. Sustainable Production and Consumption. 2018;14:36–52. doi: 10.1016/j.spc.2018.01.002 [DOI] [Google Scholar]
  • 83. Meng B, Lu N, Lin C, Zhang Y, Si Q, Zhang J. Study on the influencing factors of the flight crew’s TSA based on DEMATEL–ISM method. Cognition, Technology & Work. 2022; p. 1–15. [Google Scholar]
  • 84. Song W, Zhu Y, Zhao Q. Analyzing barriers for adopting sustainable online consumption: A rough hierarchical DEMATEL method. Computers & Industrial Engineering. 2020;140:106279. doi: 10.1016/j.cie.2020.106279 [DOI] [Google Scholar]
  • 85. Chauhan A, Singh A, Jharkharia S. An interpretive structural modeling (ISM) and decision-making trail and evaluation laboratory (DEMATEL) method approach for the analysis of barriers of waste recycling in India. Journal of the Air & Waste Management Association. 2018;68(2):100–110. doi: 10.1080/10962247.2016.1249441 [DOI] [PubMed] [Google Scholar]
  • 86. Bonett DG, Wright TA. Cronbach’s alpha reliability: Interval estimation, hypothesis testing, and sample size planning. Journal of organizational behavior. 2015;36(1):3–15. doi: 10.1002/job.1960 [DOI] [Google Scholar]
  • 87. Dewangan DK, Agrawal R, Sharma V. Enablers for competitiveness of Indian manufacturing sector: an ISM-fuzzy MICMAC analysis. Procedia-Social and Behavioral Sciences. 2015;189:416–432. doi: 10.1016/j.sbspro.2015.03.200 [DOI] [Google Scholar]
  • 88. Sindhwani R, Malhotra V. Modelling and analysis of agile manufacturing system by ISM and MICMAC analysis. International Journal of System Assurance Engineering and Management. 2017;8:253–263. [Google Scholar]
  • 89. Si SL, You XY, Liu HC, Zhang P. DEMATEL technique: A systematic review of the state-of-the-art literature on methodologies and applications. Mathematical Problems in Engineering. 2018;2018:1–33. doi: 10.1155/2018/3696457 [DOI] [Google Scholar]
  • 90.Khan S, Singh R, Haleem A, Dsilva J, Samar Ali S. Exploration of Critical Success Factors of Logistics 4.0: A DEMATEL Approach. Logistics 2022, 6, 13; 2022.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

S1 Data

(XLSX)

pone.0304118.s001.xlsx (92.4KB, xlsx)

Data Availability Statement

All data and related metadata underlying the findings of this study have been deposited in Figshare, an appropriate public data repository. The datasets are accessible at the following DOI: https://doi.org/10.6084/m9.figshare.25826077.v1.


Articles from PLOS One are provided here courtesy of PLOS

RESOURCES