Professional Documents
Culture Documents
• Issue no. 58/2021 – Teleworking: economic and social impact and perspectives
• Issue no. 59/2022 – Digital transformation in the context of European Union’s
Green Deal
Book Review: 10 (ten) projects Internet of Things. Author: Radu Pietraru .............. 570
Daniel-Marian Merezeanu
DOI: 10.24818/EA/2021/57/321
IoT (Internet of Things) is a concept and a paradigm that involves the ubiquity of large and
diverse number of smart devices and active objects that can interact and cooperate with
other devices and objects through wired and wireless connections and unique addressing
schemes to create services and applications adapted to users’ needs. The ability of smart
devices to connect, communicate and transfer data has enabled the innovation and
development of various solutions for industry, business organizations, and final consumers.
Currently, popular IoT solutions in the consumer segment (Consumer IoT) are those in the
“smart home” category (which refers to applications for control and automation of lighting
systems, ventilation, air conditioning, robotic vacuum cleaners, air purifier, air
conditioners, ovens or refrigerators) and wearable devices (“wearables”), such as fitness
bracelets or trackers and smart watches, allowing users to monitor and control their health.
Companies have embraced this tendecy very quickly, because the benefits are important:
higher connectivity, easy access to data, interconnected ecosystems. All this translates into
lower costs and efficiency in resource optimization. Commercial IoT projects are varied ‒
from collecting and analyzing information from customers through interconnected objects,
to implementation of intelligent solutions for the office area (resources ‒ such as water, gas,
electricity or heat ‒ become controllable by automation and monitoring in office buildings,
industrial halls, warehouses, hotels, and can be distributed more efficiently, according to
real needs).
Also, the applicability of IoT technology proves to be useful in optimizing production
flows, intelligent power grids, connected industrial equipment and digital supply chain
management. Industrial IoT (IIoT) refers to application of IoT technology in industrial
settings, especially in terms of control the devices involving cloud technologies and
allowing organizations to collect and analyze data from a variety of sensors (on production
equipment, delivery trucks, pipelines, weather stations, smart meters etc.)
IoT applications have proven their technical feasibility, but there are still questions about
their economic viability, especially from a business perspective. In this regard, concerns are
raised about the high costs and length of time required to implement these solutions, the
scarcity of suitably qualified staff and uncertainties about actual cost-effectiveness of such
projects. In addition, there are concerns about the impact on environment and human
health, data security and confidentiality, and many other unresolved ethical and legal issues.
In this context, this issue of Amfiteatru Economic journal is dedicated to identify the main
benefits and challenges in all areas of IoT applicability, associated with use at the level of
individual consumer, business organization or industry. Moreover, the issue dedicated to
DOI: 10.24818/EA/2021/57/325
Abstract
IoT (Internet of Things) is a concept that defines a world in which all objects are connected
to each other via the Internet. The ability of smart devices to connect, communicate and
transfer data has enabled the innovation and development of various solutions for industry,
business organizations and final consumers. In this article, we have chosen to discuss the
solutions related to smart homes.
Thus, our paper presents, in the first part, the conceptual delimitations regarding IoT, areas
of application, and characteristics of the solutions dedicated to smart homes, showing that
adoption of IoT-based smart home solutions has been too little addressed in the literature.
Most of the work in the field insists on the technical aspects and only subsidiarily deals with
the issues regarding the level of understanding of the IoT smart home concept by potential or
actual users and the degree of adoption and use of these solutions. In order to cover these
gaps identified in the literature, we presented, in the second part of the paper, the
methodology and results of an exploratory research, conducted on a sample of 471 persons,
which allowed us to identify the socio-demographic characteristics of the respondents (users
of IoT solutions), level of understanding the IoT concept, degree of the adoption and, also,
the associated benefits and challenges, from the perspective of the Romanian users. We also
developed a binary logistic regression model, for in-depth analysis of the results and for
correlating the findings of our research with those of other studies.
Keywords: Internet of Things, smart home, smart device, automation, monitoring and
remote control.
JEL Classification: L86, O33
Introduction
Kevin Ashton, technology pioneer, cofounder and executive director of the Auto-ID Center
at MIT (Massachusetts Institute of Technology), used for the first time syntagma Internet of
Things ‒ IoT in a presentation he made in 1999 in order to describe the network connecting
objects in the physical world to the Internet. Referring later to this concept, Ashton (2009)
affirmed that IoT has the potential to change the world, as has happened before with the
Internet.
Although the concept appeared two decades ago, technologies that condition and support
IoT are constantly evolving; being related with an amalgam of existing and developing
technologies applied in a new context, even finding an appropriate definition of the term is
not an easy task. Many authors have tried to expose the important attributes, to define and
capture the essence of IoT (Gigli and Koo, 2011; Lee and Lee, 2015; Madakam et al., 2015;
Whitmore, Agarwal and Li, 2015; Ben-Daya et al., 2017), approaching Internet of Things
especially from the perspective of a global network infrastructure that connects physical
and virtual objects by exploiting data capture and communication capabilities, based on
object identification, sensors and connections in order to development independent
cooperation services and applications. Over time, the term has evolved, describing, into a
more generic meaning, a network of entities connected by any form of sensor, allowing
these entities to be located, identified and even controlled and remotely operated (Onete,
Pleșea and Albăstroiu, 2017).
An IoT solution involves hardware components (processors, sensors, gateways, controllers,
and switches), software (standalone and integrated platforms), and services (device
lifecycle management, remote monitoring, and deployment services). Adopting these
solutions is a way to boost productivity, keep us healthier (or at least more careful and
concerned with this aspect), make transportation more efficient, reduce energy consumption
or make our homes more comfortable. This last-mentioned aspect, namely the implications
of IoT technologies on our homes, is subject of the present article.
Although home automation has been in question since the '80s (Horrigan, 1987), the
concept of smart home has been drawing attention recently due to IoT. A smart home is an
advanced form of traditional home automation, but IoT technologies are taking a step
further by introducing centralized control. A home with IoT solutions is the one wherein
electrical, electronic, and household appliances are connected to a central monitoring and
control system, so that can be automatically turned on and off at certain times or if certain
events occur. The devices are connected via the Internet, and the customer can remotely
adjust access in the house, temperature, lighting, etc., but also functions of the smart TV,
refrigerator, oven etc.
The adoption of IoT smart home solutions has been too little addressed in the literature. Most
papers in the field are based on the technical aspects, presenting the architecture, structure
and functionalities of such systems and associated security issues (Strengers, 2013; Lia et al.,
2018; Sowah et al., 2020) and only subsidiarily deal with issues regarding the level of
understanding the IoT smart home concept by potential or actual users and the degree of
adoption and use of these solutions Although there are regional analyzes and market reports
(Fortune Business Insights, 2020; Mordor Intelligence, 2020; Research Reports World,
2020), still, in the scientific literature are presented mainly empirical analyzes on specific
groups (young people in the digital generation, elderly with disabilities, various categories of
1. Literature review
1.1. Internet of Things – conceptual insights
In recent years, Internet of Things (IoT) has attracted significant attention from different
researchers. Nevertheless, there is no universal definition of IoT, as stated by Whitmore,
Agarwal and Li (2015). However, analyzing definitions in the literature, Lynn et al. (2020)
notice there are two main conceptualizations: technical perspective (IoT is considered an
ecosystem of technical artifacts (Weyrich and Ebert (2016)) and socio-technical perspective
(IoT recognizes actors and associated processes, being recognized especially the role of
connected objects (Shin, 2014)).
However, IoT paradigm has evolved, from the approach concerning what can be connected
to the network, to the approach based on what can be done with objects connected to the
network (Ibarra-Esquer et al., 2017).
Regarding the thing or object that can be connected to the network, from the IoT
perspective, it can be any machine, device, application, computer, virtual or physical object
involved in a communication that could connect to the Internet and capable to create,
request, consume, redirect, or access digital information (Elkhodr, Shahrestani and Cheung,
2013). There are related concepts mentioned in the literature, such as smart
pieces/articles/products, "smart" being a term used to describe things or processes that have
the ability to calculate, connect and communicate to differentiate themselves from
machines and equipment working in isolation.
Concerning what can be done with these (inter)connected things or objects, it can be said
that act as providers and/or consumers of data related to physical world. Recent definitions
(Whitmore, Agarwal and Li, 2015; Ibarra Esquer et al., 2017) focus on some capabilities of
these objects/things, such as:
• networking – set of communication functionalities that allow them to connect and
make their identification, sensor measurements, and other attributes available to external
entities such as other smart objects or systems;
Smart home devices refer to various interconnected devices that can communicate to
improve the habitat of the user's home. Most of the tasks associated with a house
management can be self performed or remotely managed thus saving time and effort for the
individual. Some of these smart devices and technologies are lighting solutions,
entertainment devices, home appliances, surveillance cameras, door lock systems, home
sensors, voice recognition or activation home products, remote controls and many more
(Le, Nguyen and Barnett, 2012; Lia et al., 2018; Yang, W. Lee and H. Lee, 2018). These
are associated with the concept of smart home, which will be the subject of the next section
and the central point of the research related to present paper.
1.3. IoT-based solutions for smart home
Although home automation has been in question since the '80s (Horrigan, 1987), as home
security systems, lighting systems with motion sensors, automation of garage doors and
gates, etc., the concept of smart home has been drawing attention recently due to IoT.
Nowadays, most modern homes already have some degree of "intelligence" because many
appliances already have built-in sensors or electronic controllers; however, these fall into
the category of automation systems, but are not exactly what we mean today by smart
home. IoT smart home takes things a step further by introducing centralized control.
Devices communicate between themselves, as well as with the user, to create an
environment that matches the user’s lifestyle. Therefore, the IoT smart home is a concept
that adds to the traditional features of automation and remote control two essential
attributes, namely interconnection and contextual adaptation. (Yang, W. Lee and H. Lee,
2018). Also, the smart home system requires a smartphone application or a web portal as a
user interface to interact with an automated system.
Smart housing technologies and applications were initially used to manage environmental
systems, such as lighting and heating (Ricquebourg et al., 2006). Currently, due to
technological development, smart home application monitors users' activities and the
internal environment, but also offers services that meet specific requirements and needs.
Recently, smart home applications are evolving as they integrate artificial intelligence (AI)
(Yang, W. Lee, and H. Lee, 2018). For instance, products such as Amazon Echo and
Google Home have become a central hub for smart home gadgets and their voice-activated
assistants, providing comfort in homes. Examples can also be the intelligent remote-control
module developed by Chinese manufacturer Xiaomi (which can be inserted into all home
appliances, such as refrigerators, air purifiers, air conditioners, washing machines, etc.) and
Apple HomeKit (which provides voice support as a hub to communicate, configure and
control smart devices in the Apple kit). In brief, this evolution is presented in table no. 1.
Table no. 1. Evolution of smart home
Year Phase Technical background Main function
1990s Home automation Broadband Internet Household automation
2000s Home network Smart phone and app Remote monitoring and control
2010s Smart home Internet of Things (IoT) and Context awareness and adaptation
Artificial Intelligence (AI)
Source: Yang, W. Lee and H. Lee, 2018, p.2
Despite its long history and growing interest, applications and technologies in this category
have not been widely accepted, mainly due to lack of infrastructure, expensive devices and,
implicitly, limited consumer demand. However, IoT solutions for housing have become
2. Research methodology
As we indicated throughout the entire article, aspects regarding the architecture of smart
home IoT solutions (Strengers, 2013; Lia et al., 2018; Sowah et al., 2020) and those
regarding the advantages (Perera et al., 2017; Johannesen, Kolhe and Goodwin, 2019),
challenges and security issues (Risteska Stojkoska and Trivodaliev, 2017) have been
frequently addressed in the literature. The same statement is not valid when it comes to level
of understanding the concept and degree of adoption of these solutions, as most studies have
either applied the Technology Acceptance Model (TAM) or the Unified Technology
Acceptance and Use Theory (UTAUT) or targeted only specific groups, especially the
elderly and/or those with various health problems and young people. In order to cover these
gaps identified in the scientific literature, we intended to present in this article the results of a
more extensive research that we conducted to identify the degree of smart home IoT
solutions usage by Romanians from various socio-demographic categories. We mention that
our research focused on several aspects regarding the adoption of IoT solutions in Romania,
but in this article we will focus only on those solutions for smart homes.
Thus, the aim of the research was to determine the degree of smart home IoT solutions
usage in Romania. Subsequent to this goal, the main objectives of our research were to:
• O1: know the socio-demographic characteristics of the respondents – namely,
Romanian users of IoT solutions for smart homes;
• O2: establish the level of understanding of the Internet of Things (IoT) concept;
• O3: identify the main IoT solutions used for smart home;
• O4: highlight the benefits and challenges related to these solutions, from the
perspective of Romanian users;
• O5: determine the extent to which certain socio-demographic variables influence the
adoption of IoT smart home solutions.
This research was based on a standard methodology, which is applied in opinion survey.
The method of data collection was the use of a self-administered questionnaire. The
questionnaire was posted on the website www.isondaje.ro and was distributed as a link by
e-mail to personal contacts of the authors and through social networks LinkedIn and
Facebook. The beginning section of the questionnaire provides a brief explanation of its
purpose to provide a common frame of reference for all potential respondents.
The sample used in the research was 471 persons. Given the limited sample size, this online
questionnaire-based study is an exploratory research.
Data collection took place between April and June 2020.
IBM SPSS Statistics Version 26 software was used for descriptive statistics, but also for the
binary logistic regression model.
an event occurred or whether a statistical unit has a particular property or not. We further
purpose to quantify econometrically the relationship between the determinants and the
option of the respondents to use smart home IoT solutions.
Figure no. 1. Respondents' weight hierarchy regarding the use of devices, appliances
and systems monitored, controlled and operated by IoT solutions
Source: Research data processed by authors with statistical program SPSS
The variables included in the analysis are:
• PSH ‒ use of IoT solutions for smart home (independent, dichotomous,
categorical/nominal variable, with values 0 ‒ if the person does not use such IoT solutions ‒
and 1 ‒ if the person uses such IoT solutions);
• SP ‒ gender (dependent, dichotomous, categorical/nominal variable, with values
0 ‒ for female person ‒ and 1 ‒ for male person);
• VP ‒ age (dependent, dichotomous, categorical/nominal variable, with values 1 ‒ if the
person is aged between 18-35 years ‒ and 2 ‒ if the person is aged between 36-65 years);
• VEP ‒ income (dependent, multinomial, categorical/nominal variable, related to the 6
income groups, having values 1 ‒ if the person has an average monthly income below 1000
lei, 2 ‒ average monthly income between 1001-2000 lei, 3 ‒ average monthly income
between 2001-3000 lei, 4 ‒ average monthly income between 3001-4000 lei, 5 ‒ average
monthly income between 4001-5000 lei, 6 ‒ average monthly income over 5000 lei).
To estimate the model parameters, the records at the level of the sample of 471 people were
used. The results obtained are shown in table no. 3.
Conclusions
IoT-based smart home solutions focus on increasing the home comfort, improving the
quality of life and enhancing personal experience. In recent years, these solutions have
become more popular, more accessible and easier to use through the development of
information technology.
As we indicated in the article, issues regarding the architecture of IoT solutions related to the
smart home category and those regarding the advantages, benefits, but also challenges and
security issues of IoT solutions for smart homes have been frequently addressed in the
literature, but issues regarding the degree of understanding the concept and the extent to which
these applications are adopted and used have been less approached. Also, the local literature
does not deal with issues related to the adoption of these solutions in our country. To cover
these gaps identified in the literature, we presented in this article the results of a research that
allowed us to discover the level of understanding the IoT concept and the adoption of IoT
solutions for smart home by Romanians from different socio-demographic categories.
The key to successfully adopting these technologies is to understand the reasons why
people might use them, the features they need, the problems they have identified and the
barriers to accepting them, and we have identified all of these in this research.
Although, the Internet of Things is still at the beginning in terms of its applicability in
Romania, most of the respondents to our questionnaire (82% of the 471 respondents) stated
they use IoT devices and applications that allow remote control and monitoring.
Respondents in our study use such solutions for smart TVs, ventilation and air conditioning
systems, access, safety and surveillance systems and heating systems. The main benefits of
adopting these solutions have been related to the fact that they save time and energy, make
their lives easier and improve the comfort of their homes, and identified problems include
technology dependence, high cost of devices, privacy, and information security issues.
Also, we note there are still many obstacles that need to be overcome, and our respondents
have also identified problems especially related to the data used throughout the process. At
the same time, new technologies and synergies have the potential to address them, such as
5G technology, which brings the benefit of an increased Internet speed, as well as the use of
artificial intelligence (AI), which helps both predictability and making the best decisions.
To identify the relationship between certain determinants (sex, age, income) and the option
to use IoT smart home solutions, we used the binary logistic regression model, showing that
References
ANCOM, 2019. Strategia 5G pentru România. [pdf] Available at: <https://www.ancom.ro/
uploads/articles/Strategia%205G_rev%2010_06_2019%20-%20final%20no%20track.pdf>
[Accessed 7 December 2020].
Anstee, D., 2019. Rise of the Internet of Things (IoT). [online] TechRadar. Available at:
<https://www.techradar.com/news/rise-of-the-internet-of-things-iot> [Accessed 20
November 2020].
Ashton, K., 2009. That “Internet of Things” Thing. RFID Journal, 22(7), pp.97-114.
Atzori, L., Iera, A. and Morabito, G., 2010. The Internet of Things: A Survey. Computer
Networks, 54(15), pp.2787-2805.
Ben-Daya, M., Hassini, E. and Bahroun, Z., 2017. Internet of Things and Supply Chain
Management: A Literature Review. International Journal of Production Research,
57(3), pp.1-24. https://doi.org/10.1080/00207543.2017.1402140.
Bing, X., 2014. Key IoT Technology and Application Research. Applied Mechanics and
Materials, 543, pp.3411-3414.
Chen, Y.-Q., Zhou, B., Zhang, M. and Chen, C.-M., 2020. Using IoT Technology for
Computer-Integrated Manufacturing Systems in the Semiconductor Industry. Applied
Soft Computing Journal, 89(C), 106065. https://doi.org/10.1016/j.asoc.2020.106065.
Columbus, L., 2018. 10 Charts that will Challenge your Perspective of IoT's Growth.
[online] Forbes. Available at: <https://www.forbes.com/sites/louiscolumbus/ 2018/06/
06/10-charts-that-will-challenge-your-perspective-of-iots-growth/?sh=7abe785e3ecc>
[Accessed 20 November 2020].
Cox, D.R. and Snell, E.J. 1989. Analysis of Binary Data. 2nd ed. London: Chapman and
Hall/CRC.
Das, S., Lee, S.-H., Kumar, P., Kim, K.-H., Lee, S.S. and Bhattacharya, S.S., 2019. Solid
Waste Management: Scope and the Challenge of Sustainability. Journal of Cleaner
Production, 228, pp.658-678. https://doi.org/10.1016/j.jclepro.2019.04.323.
Dhana Shree, K., Janani, B., Reenadevi, R. and Rajesh, R., 2019. Garbage Monitoring
System Using Smart Bins. International Journal of Scientific and Technology Research,
11(8), pp.1921-1925.
Dian, F.J., Vahidnia, R. and Rahmati, A., 2020. Wearables and the Internet of Things (IoT),
Applications, Opportunities, and Challenges: A Survey. IEEE Access, 8, pp.69200-
69211. https://doi.org/10.1109/ACCESS.2020.2986329.
Elkhodr, M., Shahrestani, S. and Cheung, H., 2013. The Internet of Things: Vision &
Challenges. In: IEEE 2013 Tencon – Spring Conference Proceedings. Sydney,
Australia, 17-19 April 2013. New Jersey: IEEE. pp.218-222.
Fortune Business Insights, 2020. Smart Home Market Size, Share & Industry Analysis, By
Product and Regional Forecast, 2019-2026. [online] Fortune Business Insights.
Available at: <https://www.fortunebusinessinsights.com/enquiry/request-sample-
pdf/smart-home-market-101900> [Accessed 20 November 2020].
Gao, L. and Bai, X., 2014. A Unified Perspective on the Factors Influencing Consumer
Acceptance of Internet of Things Technology. Asia Pacific Journal of Marketing and
Logistics, 26(2), pp.211-231. https://doi.org/10.1108/APJML-06-2013-0061.
Gigli, M. and Koo, S., 2011. Internet of Things: Services and Applications Categorization.
Advances in Internet of Things, 1(2), pp.27-31. https://doi.org/10.4236/ait.2011.12004.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT):
A Vision, Architectural Elements, and Future Directions. Future Generation Computer
Systems, 29(7), pp.1645-1660. http://dx.doi.org/10.1016/j.future.2013.01.010.
Horrigan, B., 1987. The Home of Tomorrow: 1927-45. In: J. Corn, ed. Imagining Tomorrow:
History Technology and the American Future. Cambridge: MIT Press. pp.137-163.
Hosmer, D.W. and Lemeshow, S., 2000. Applied Logistic Regression. Hoboken: John
Wiley & Sons, Inc.
Hsu, C.L. and Lin, J.C.C, 2016. An Empirical Examination of Consumer Adoption of
Internet of Things Services: Network Externalities and Concern for Information Privacy
Perspectives. Computers in Human Behavior, 62, pp.516-527. http://doi.org/10.1016/
j.chb.2016.04.023.
DOI: 10.24818/EA/2021/57/342
Abstract
The main objective of this research is to test the IoT model of acceptance technologies (the
Internet of Things) among the economics students from Romania. The Internet of Things
refers to the interconnection between different devices via the Internet. Through this
interconnection, the communication is no longer limited to the usual “human to human”
form but is complemented by a new “object-to-object” form, which has a direct impact on
the company’s functions. In this context, the IoT technologies acceptance by the future
economists and managers is extremely important. The study included 1,179 students from
four university centers from Romania and the included factors from the acceptance of IoT
technologies model (Internet of Things) were analyzed using the quantitative statistical
methods in SPSS, applying a series of tests processed to highlight the research results,
respectively the reliability test, the validity test, the chi-square test and the Person's
correlation coefficient.
The results of the study show the existence of a positive correlation between the research
variables and indicate that the students from the economic studies, are ready to accept the
new technological advances in IoT and to implement them in their future jobs.
∗
Corresponding author, Mariana Bunea – e-mail: mariana.bunea@cig.ase.ro
Authors’ ORCID:
Liliana Ionescu-Feleaga: orcid.org/0000-0002-2087-2186
Bogdan-Ștefan Ionescu: orcid.org/0000-0003-0021-2938
Mariana Bunea: orcid.org/0000-0003-2879-2065
functions and affects the customer satisfaction and their loyalty, it is important to underline
whether the economics students are ready to accept the new IoT technological advances and
to implement them in their future jobs.
To achieve the objective it has used a conceptual framework inspired by the model of
technology acceptance (Technology Acceptance Model: TAM) proposed by Davis (1989),
which explains the use of new technologies by adopting a causal relationship between
beliefs, perceptions, attitudes, intentions and behavior. The use of conceptual framework
took into account other suggestions found in the literature for improving TAM.
The content of the research is structured as follows: the first part is a review the relevant
literature on the IoT technologies use and their influence on the education system. The next
section presents the methodology research, followed by the analysis of the research results
and the final section presents the conclusions of the work, the implications and future
directions of research.
problems /difficulties by IoT, while highlighting the importance of the security, the
confidentiality and the data ownership. However, Asseo et al. (2016) appreciate that one of
the biggest advantages of IoT in the educational process is the personalized interaction that
the teachers can have with the students, who have the opportunity to receive the
recommendations and the individual homework.
However, the use of IoT in the education sector should not be viewed only from a
quantitative, physical perspective. It actually shows the universities ability to adapt to the
changing needs of the future employees, of the future labor market and of the future
economy.
2. Research methodology
In the present study, the research was conducted both from a descriptive perspective, thus
ensuring an accurate understanding of the IoT system by questionnaire respondents,
undergraduate, master and doctoral students, and from an explanatory perspective, being
established the relationships between the analyzed variables (Saunders et al., 2016).
This research aims to significantly identify the factors (and their interdependence
relationships) that determine the behavior of respondents in the sense of accepting or
rejection of the IoT technology. Thus, in order to achieve the research objectives, the
authors conducted and transmitted between October 27 and November 2, 2020, an online
survey among the enrolled students at the universities from the economics and business
administration area at Babeș Bolyai University in Cluj-Napoca (UBB), Alexandru Ioan
Cuza University from Iași (UAIC), the West University from Timișoara (UVT) and the
Academy of Economic Studies (ASE) from Bucharest.
The selection of the 4 university centers is largely ensuring our national representation
meaning that it covers the following geographical areas: UVT ‒ West region, ASE ‒
Bucharest Ilfov Region, UBB ‒ North West Region, Iasi ‒ North East region. At the same
time, inside these universities, is concentrated the largest number students from the
economic studies in Romania. Knowing that the total number of students enrolled in
bachelor's, master's and doctoral programs in the Social Sciences fundamental field (which
includes economics students) in the academic year 2019-2020 was 68305 (ANS, 2020) the
sample of 1179 is considered , in the literature (Rotariu, 1999) as a very large one and, as a
result, ensures a significant representativeness.
To ensure the completeness of the answers, we have formulated a series of questions, which
must be checked before sending the answers. As a consequence, all our answers were
complete in terms of the questions asked, with no non-answers. The applied questionnaire
had two parts. The first part included four demographic and profile questions. Table no. 1
describes the researched sample.
The demographic results of the study indicate that three out of four respondents are female,
which is in line with the high share of female representatives among students enrolled in
Romania in the field of university economic studies. However, the situation in Romania is
atypical given that in many countries, women are underrepresented among graduates of
economic studies (Goldin, 2013; Crawford et al., 2018). Most respondents are under
26 years old and are mainly enrolled in undergraduate programs (78.97%). The situation of
the average ages of the respondents on each level of study is presented in table no. 2.
The model includes the determinants, moderation factors and the relationships between
them. The factors with the elements associated with each variable are presented into the
table no. 4.
Table no. 4. The situation of the factors with the associated elements
Encoding
Factors / domains Statement
items
TU1 The use of IoT technologies increases the effectiveness of learning
TU2 IoT technologies are useful in the learning process
The usefulness of IoT Using IoT technologies allows me to accomplish my
technologies in the TU3
professional tasks faster
learning process TU4 The use of IoT technologies increases the quality of learning
TU5 IoT technologies make learning easier
EOU1 IoT technologies should be easy to use in the learning process
The interaction with IoT in the learning process should be clear
Ease of use IoT EOU2
and intelligible
technologies in the
Using IoT in the learning process should not require a high
learning process EOU3
mental effort
EOU4 Interaction with IoT in the learning process should be flexible
IU1 I intend to use IoT technologies in the learning process
Intention to use IoT I believe that in the next period I will use more and more IoT
technologies in the IU2
technologies in the learning process
learning process I would recommend other students to use IoT technologies in the
IU3
learning process
The support of IoT teachers encourages me to use these
FC1
technologies in the learning process
Facilitating Having a user guide can enhance the knowledge and skills of
FC2
conditions for the use using IoT technologies in the learning process
of IoT technologies The existence of a technical support team for cases where I
FC3 encounter difficulties in using IoT technologies encourages me
to use these technologies
Organizing training courses for the use of IoT technologies
UT1 would encourage me to use these technologies more in the
learning process
Training in the use of
Organizing training courses on computer systems would encourage
IoT technologies UT2
me to use IoT technologies more in the learning process
The existence of materials on IoT technologies improves my
UT3
skills in using these technologies
3. Results
Reliability test
Through the reliability test the consistency of the data is calculated and determined and is
achieved by applying the test method of the Cronbach’s alpha coefficient (Saunders et al.,
2016). Thus, this method tests the reliability of the questionnaire data. In the present
research, the values of the factors of the IoT technologies acceptance model were calculated
as the average of all the elements that contribute to the evaluation of this model. For
example, the IoT Technologies Utility (TU) is the overall average of the elements TU1 –
TU5 for all cases, using the data analysis and processing functions using SPSS software.
The table no. 6 presents the results of the reliability test from the IBM SPSS tool.
According to Cortina (1993), the reliability test is performed for a value of the Cronbach's
alpha coefficient greater than 0.7.
Table no. 6. The situation of the reliability tests results
for the factors of the IoT technologies acceptance model
Factors / domains Element/ Item Result Coefficient Cronbach’s alpha
The usefulness of IoT technologies TU1, TU2, TU3, TU4, 0.916 (> 0.7)
in the learning process TU5
Ease of use IoT technologies in EOU1, EOU2, EOU3, 0.812 (> 0.7)
the learning process EOU4
Intention to use IoT technologies IU1 IU2, IU3 0.907 (> 0.7)
in the learning process
Validity test
The validity test assesses “the extent to which a variable measures what it should measure”
(Samouel et al., 2015). The objective of using this research tool is to test the correlation
between the identified factors and the intensity attributed to this correlation. In this study,
the validity test was performed for each element of the IoT technology acceptance model,
using the analyse_dimension reduction_factor function within SPSS. Table no. 7 presents
the situation of the results of the analysis of validity tests.
Table no. 7. Validity test results
Initial Eigenvalue
Validity No. of % of variance Std
Element item significant by extracted Mean Result
Dev
loading extracted factors factor
TU1 .895 1 74.884 3.69 1.097 Item questions
are valid
TU2 .834 4.03 .996
TU3 .802 4.08 .989
TU4 .895 3.51 1.166
TU5 .896 3.56 1.158
EOU1 .818 1 65.816 4.44 .843 Item questions
are valid
EOU2 .861 4.56 .794
EOU3 .700 4.05 1.053
EOU4 .856 4.43 .839
IU1 .927 1 84.437 3.98 .974 Item questions
are valid
IU2 .914 4.08 .999
IU3 .916 3.84 1.084
FC1 .728 1 68.162 3.66 1.123 Item questions
are valid
FC2 .884 4.21 .940
FC3 .856 4.29 .934
UT1 .939 1 86.575 4.02 1.026 Item questions
are valid
UT2 .945 4.04 1.008
UT3 .907 4.20 .959
Chi-square test
The Chi-square test is used to determine the probability that the two variables are
independent. In other words, Chi-square tests whether two variables are associated and
whether this association is significant (Saunders et al., 2016). A significance threshold of
0.05 is considered to indicate that there is a five percent chance that the data collected will
appear only by chance.
The mean values, the totals, the standard deviations, the minimum and maximum values of
each element were calculated for each case, being presented in table no. 7.
The newly calculated values were then tested according to the designed hypotheses. In IBM
SPSS, the analytical descriptive statistics crosstabs function was used. Into the table no. 8
are presented the results of the Chi-square test, demonstrating that the factors selected from
the IoT technology acceptance model are associated and this association is significant at
Asimp. Sig. <0.01.
Table no. 8. The situation of chi-square test results
Asymptotic
Association test Chi square value Result
significance
TU*IU 1.511 0.000 <0.01 The association is significant
EOU*TU 1.096 0.000 <0.01 The association is significant
EOU*IU 1.135 0.000 <0.01 The association is significant
UT*TU 932 0.000 <0.01 The association is significant
UT*EOU 1.362 0.000 <0.01 The association is significant
FC*IU 1.251 0.000 <0.01 The association is significant
Thus, the results of the analysis by the chi-square test method demonstrate the existence of
a significant probability of correlation between the variables of the model of acceptance of
IoT technologies.
The demographic and profile variables of the respondents allow us to deepen the study and
to perform a cross-sectional analysis according to the characteristics: gender, age, level of
education and university. In this sense, in order to show the difference of the respondents'
perception according to the listed characteristics, in this article it was analyzed successively
for each factor the testing of the hypothesis regarding the difference of two averages
H 0 : μ 1 = μ 2 H 1 : μ 1 ≠ μ 2 (z-test: Two Sample for Means) thus:
• on testing the difference in perception of female and male responses to the factors:
The usefulness of IoT technologies in learning (TU), the perception of the ease of use of IoT
technologies in learning (EOU), the intention to use IoT technologies in learning (IU) and
the Facilitating Conditions for the use of IoT technologies in learning (FC) resulted in a
p-value <0.05 respectively, the calculated statistical value z = 1.966 is higher than critical z
in both types of tests. Consequently, we cannot reject Ho, as a result, the difference
between the opinions of the respondents of the two genders is insignificant at a significance
threshold of 95%. While, in the case of the factor “Training for the use of IoT technologies
in the learning process (UT)”, the alternative hypothesis is confirmed regarding the fact
that the female gender considers the training in the learning process to be much more
necessary than the male gender. The results of the statistical processing are presented into
the table no. 9 and table no. 10.
Table no. 9. The averages of the analyzed factors according
to the gender characteristic
Gender No. resp. Average of TU Average of EOU
Women 902 3.7541 4.3800
Men 277 3.8440 4.3439
Grand Total 1179 3.7752 4.3715
Table no. 10. z-test: Two sample for means Training for the use of IoT technologies
in the learning process (UT)
women men
Mean 4.114190 3.98315
Known Variance 0.8242 0.9763
Observations 902 277
Hypothesized Mean Difference 0
z 1.966929
P(Z<=z) one-tail 0.024596
z Critical one-tail 1.644854
P(Z<=z) two-tail 0.049191
z Critical two-tail 1.959964
• from the comparative analysis of the respondents’ perception by age groups, the
averages of the 5 factors analyzed by age groups (under 25 years and over 25 years) do not
show significant variations, respectively the assessments are uniform. The results of the
statistical processing are presented in the table no. 11.
Table no. 11. Averages of the analyzed factors by the age groups
No. Average Average Average Average Average
Age groups
resp. of TU of EOU of IU of FC of UT
• from the comparative analysis and testing the hypothesis of the difference in the
perception of respondents by university centers resulted in all cases p-value> 0.05 at a
significance threshold of 95%, therefore, the H0 hypothesis cannot be rejected, there are no
significant differences in students' perception in different university centers. The results of
the statistical processing are presented into the table no. 15.
Table no. 15. The averages of the analyzed factors by university centers
No Average Average Average Average Average
University
of resp. of TU of EOU of IU of FC of UT
ASE ‒ Bucharest 753 3.7578 4.3825 3.9602 4.0416 4.1040
UBB ‒ Cluj-Napoca 125 3.9856 4.3500 4.1120 4.0907 4.1173
UAIC ‒ Iași 110 3.6418 4.3568 3.8848 4.0364 4.0758
UVT ‒ Timișoara 191 3.7832 4.3508 3.9599 4.0995 3.9843
Total 1179 3.7752 4.3715 3.9692 4.0557 4.0834
It turns out that regardless of the age and the university center where the students are
trained, the perception of respondents accepting IoT (Internet of Things) technologies
among economics students in Romania was similar.
TU EOU IU FC UT
TU 1
EOU 0.4182 1
IU 0.7290 0.4842 1
FC 0.5728 0.5121 0.6125 1
UT 0.4496 0.4708 0.4971 0.6182 1
The Pearson correlation coefficient shows the meaning of the relationship between the
variables, being able to take values between -1 and +1. If it has a value of zero or close to
zero, then there is no connection between the variables. The plus sign shows a direct link
(as the values of variable X increase, so do the values of variable Y), and the minus sign
Conclusions
The main purpose of this research is to test the model of acceptance of IoT (Internet of
Things) technologies among students from the economic studies in Romania. To do so, we
have conducted an online survey among students enrolled in universities with a profile in
economics and business administration from four universities representing the economic
field in Romania, considered regional leaders. The results of the study demonstrate the
existence of a positive correlation between research variables and indicate that economics
students are ready to accept new technological advances in IoT and implement them in their
future jobs.
Thus, by testing the factors included in the acceptance model of the IoT technologies used,
through the SPSS software (Reliability test, Validity test, Chi-squared and Pearson's
correlation test) the research objectives were met by demonstrating that when people are
trained to use IoT technologies, they tend to believe that these products are useful and easy
to use, increasing the intention to use them. In addition, the chances of people using these
technologies are considered to increase considerably if there are facilitating conditions for
their use, factors that have become increasingly important in the workforce, in the context
of digitalisation and online activities amid the current pandemic of disease. with SARSCo
V-2 virus.
However, the research has limitations determined primarily by the age distribution of
survey respondents, most of whom (95%) are between 18 and 25 years old, students in
economic higher education, bachelor or master degree, they are much more open in the use
of IoT technologies. Despite these limitations, we appreciate that this work is a challenge
for future research in the use of IoT technologies, the challenges posed by their increasing
use in the economic field, by expanding research on the degree of acceptance of IoT
technologies by professionals within this segment of activity, respectively economists,
experts, auditors, managers, research that can be an important source of information and
reflection for practitioners and not only.
References
Abed, S., Alyahya, N. and Altameem, A., 2020. IoT in education: Its impacts and its future
in saudi universities and educational environments. Advances in Intelligent Systems and
Computing, [e-journal] 1045, pp.47-62. https://doi.org/10.1007/978-981-15-0029-9_5.
Abu, F., Jabar, J. and Yunus, A.R., 2015. Modified of UTAUT Theory in Adoption of
Technology for Malaysia Small Medium Enterprises (SMEs) in Food Industry.
Australian Journal of Basic and Applied Sciences, 9(4), pp.104-109.
Alotaibi, S.J., 2015. Attendance system based on the Internet of Things for supporting
blended learning. In: s.n, World Congress on Internet Security (WorldCIS). Dublin,
Ireland, 19-21 October 2015. S.l: IEEE, pp.78-78. DOI: 10.1109/WorldCIS.2015.
7359418.
Al-Momani, A.M., Mahmoud, M.A. and Sharifuddin, M., 2016. Modeling the adoption of
internet of things services: A conceptual framework. International Journal of Applied
Research, 2(5), pp.361-367.
Almetere, E.S., Kelana, B.W.Y. and Mansor, N.N.A., 2020. Using UTAUT Model to
Determine Factors Affecting Internet of Things Acceptance in Public Universities.
International Journal of Academic Research in Business and Social Sciences, 10(2),
pp.142-150.
ANS, 2020. Platforma naţională de colectare a datelor statistice pentru învăţământul
superior [online]. Available at: <www.https://date.invatamant-superior.ro/> [Accessed
20 November 2020].
Han, W., 2011. Research of intelligent campus system based on IOT. Advances in
Multimedia, Software Engineering and Computing, [e-journal] 1, pp.165-169.
https://doi.org/10.1007/978-3-642-25989-0_29.
Hjenaabadi, H., 2017. On the relationship between loneliness and social support and cell
phone addiction among students. Journal of School Psychology, 5(4), pp.7-30.
King, W.R. and He, J., 2006. A meta-analysis of the technology acceptance model.
Information and Management, [e-journal] 43, pp.740-755. https://doi.org/10.1016/
j.im.2006.05.003.
Kowatsch, T. and Maass, W., 2012. Critical privacy factors of internet of things services:
An empirical investigation with domain experts. Knowledge and Technologies in
Innovative Information Systems, 129, pp.200–211.
Jiang, Z., 2016. Analysis of student activities trajectory and design of attendance
management based on internet of things. In: s.n, International Conference on Audio,
Language and Image Processing. Shanghai, China, 11-12 July 2016. S.l: IEEE,
pp.600–603. DOI: 10.1109/ICALIP.2016.7846537.
Li, X.J. and Wang, D., 2013. Architecture and existing applications for internet of things.
Applied Mechanics and Materials, 347, pp. 3317-3321.
Lyapina, I., Sotnikova, E., Lebedeva, O., Makarova, T. and Skvortsova, N., 2019. Smart
technologies: perspectives of usage in higher education. International Journal of
Educational Management, [e-journal] 33(3), pp.454-461. https://doi.org/10.1108/IJEM-
08-2018-0257.
Medaglia, C.M. and Serbanati, A., 2010. An overview of privacy and security issues in the
internet of things. In: D. Giusto, A. Iera, G. Morabito and L. Atzori, eds. 2010. The
Internet of Things. 20th Tyrrhenian Workshop on Digital Communications. New York:
Springer, pp.389-395.
Mudaly, S., Singh, P. and Olugbara, O.O., 2013. Improved technology acceptance model
applied to study enterprise resource planning usage. The Science and Information
Conference [online] Available at: <www.conference.thesai.org> [Accessed 10
November 2020].
Nie, X., 2013. Constructing smart campus based on the cloud computing platform and the
internet of things. [online] Available at: <https://www.atlantis-press.com/proceedings/
iccsee-13/4826> [Accessed 15 November 2020].
O'Brien, H.M., 2016. The internet of things. Journal of Internet Law, 19(12), pp 1-20.
Park, E., Cho, Y., Han, J. and Kwon, S.J., 2017. Comprehensive Approaches to User
Acceptance of Internet of Things in a Smart Home Environment. IEEE Internet of
Things Journal, [e-journal] 6(4). https://doi.org/10.1109/JIoT.2017.2750765.
Rotariu, T., 1999. Eșantionarea. In: T. Rotariu, ed. 1999. Metode statistice aplicate în
științele sociale. Iași: Polirom, pp.85-118.
Samouel, P., Page, M., Money, A., Celsi, M. and Hair JR, J.F., 2015. The Essentials of
Business Research Methods. New York: Routledge. https://doi.org/10.4324/
9781315704562.
Saunders, M., Lewis, P. and Thornhill, A., 2016. Research methods for business students.
Harlow; Munich: Pearson.
DOI: 10.24818/EA/2021/57/360
Abstract
The study examines the causal relationship between the level of IoT adoption in tourism
services and trust in these systems, on the one hand, and individual internal consumer
behaviours, on the other. Influencing factors are grouped into six categories: awareness,
confidentiality and safety, cost, convenience, social influence, and habits. Each category is
described by several items, and the correctness of their aggregation is tested with the
Cronbach's alpha coefficient. The dependent variable is defined on an ordinal scale, to be
able to progressively evaluate the degree of IoT adoption. The research methodology uses
the ordered multinomial logit model, applied to a database of 431 tourists from Romania.
The main results show the significant influence of behavioural variables related to
awareness, convenience, habits, and cost. Among the socio-demographic factors, the role of
age and education was highlighted. The conclusions of the study make policy
recommendations necessary for the development of IoT systems in tourism industry.
∗
Corresponding author, Sorin Paul Lazăr – e-mail: paul.lazar@ubbcluj.ro
Authors’ ORCID:
Vasile Dinu: orcid.org/0000-0003-3606-2548
Sorin Paul Lazăr: orcid.org/0000-0003-0775-9231
Iustin Atanasiu Pop: orcid.org/0000-0002-6687-3109
equipped with artificial intelligence systems that perform several functions: passenger
information, train control through autonomous systems or WiFi networks, predictive
maintenance, traffic signalling and monitoring, consumption efficiency (Verma and Shukla,
2019). In the hotel industry, IoT facilities are used for custom rooms, repair and predictive
maintenance of hotel room facilities or electronic cards sent to the smartphone to avoid
wasting time at the hotel reception (Martijn, 2018). The client's health can be monitored
through sensors and can be communicated if necessary, to a clinic (Diachuk, 2018). Soon,
the rooms of Marriot hotels will be equipped with mirrors with smart screen functions,
lights and temperature will be adjusted by ordering from the smartphone, the shower will
adjust the water temperature according to guests' requirements, and any malfunctions will
be reported to staff. Smart parking and remote control for the pool will be used (McMullen,
2017). Tourist attractions also benefit from the recent implementation of IoT systems that
can allow monitoring of attractions inside museums and visitor reactions by analysing data
and sensors. Travel booking websites also have intelligent algorithms that allow
customization of customer preferences. Using the user's IP address and other equipment
associated with it, personalized offers are sent. The data processing algorithms follow the
profile of the potential client by monitoring the internet searches related to tourism and
considering the profile of previous reservations. According to Angelova (2017), the use of
IoT in tourism has advantages and disadvantages. The main advantages are communication
control, automation, enhanced experience, higher revenue, and cost saving. The
disadvantages are the dangers related to data risk (security, protection, quality, accurate
analysis, and compatibility) and confidentiality issues (lack of standards, protocols,
interoperability, and legal issues).
Numerous academic studies explore various aspects of IoT systems. They focus mainly on
system design issues, protocols and security, confidentiality, data risk, data analysis
methods and economic effects. The literature on the effects of IoT systems on consumer
behaviour is still very poor. The main objective of our study is to fill part of this gap,
investigating the behavioural and socio-demographic influencing factors of consumer
adoption of IoT usage results in accommodation reservation systems. The article is
organized as follows. In the Review of the scientific Literature section, academic studies on
IoT are reviewed, starting from general aspects, and converging to specific aspects related
to the approval and use by consumers of such systems. The Methodology of Research
section describes the consumer database, the variables and items used and how to use the
multinomial logit model in the regressions that model the causal relationships. The Results
and Discussions focus on the main trends emerging from the regression analysis and on the
comparison with similar results obtained in other fields. The Conclusions summarize the
study and focus on the recommendations that can be made because of the study results.
determines the intention of behavior towards the adoption of new technologies (Del Giudice
et al., 2016). An equally important factor in accepting new intelligent systems is social
influence (Aldossari and Sidorova, 2018). The influence of family, friends, colleagues, and
the media can influence the intention of consumers to adopt IoT products and services of
banks (Almugari et al., 2019). Habits have also been identified as a significant factor in the
adoption of digital technologies (Alalwan et al., 2015). Abushakra and Nikbin (2019) also
found an important strong relationship between habits and IoT adoption. The stated
determinants are found in many consumer-oriented marketing studies. They appear in
various forms in market research and as questions in questionnaires on purchase intentions
for all types of products. Instead, there are specific factors related to the adoption of
technologies in general and the IoT in particular: safety and privacy. The peculiarity lies in
the fact that artificial intelligence systems operate with data that consumers do not want to
make public. These determinants have been shown to be significant in empirical studies
(Axelrod, 2015; Atlam and Wills, 2020). Consumers may be concerned that digital service
providers may use personal information for the benefit of the company or collect personal
data without customer permission. Consequently, there may be negative effects on IoT
service demand. Another component of the TAM model is the awareness and understanding
of how to use the new technology. The Internet of Things is a new phenomenon for a large
part of consumers of tourism products, because of which service providers are interested in
making them aware of new technologies. Awareness as a factor in technology adoption has
been explored for IoT systems in general (Guo et al., 2013; Gite and Agrawal, 2016), but
there are also some studies that address specific sectors, such as banking (Almugari et al.,
2019). Cost is a factor with more general coverage, not necessarily specific to the TAM
model. It is found as a determinant in most empirical studies on demand for a particular
product or service. Sometimes it is viewed in a narrow sense, referring to the price of
providing the product or service (Tehranipoor et al., 2018; McPherson and Irvine, 2020).
Sometimes it is considered in a broader sense, including collateral costs (lost time ‒
Almugari et al., 2019). In addition to the components of the TAM model, interesting
correlations can be identified with some socio-demographic variables such as age, sex,
income, level of education or marital status. However, there are few studies (eg.: Gunasekara
and Fernando, 2017) that link the adoption of IoT to such indicators.
2. Research methodology
To evaluate the importance of the determinants of the adoption of the tourist services
provided with the help of IoT systems, we use an econometric model with discrete
regressions. The level of consumer adoption of the services provided is measured in our study
by the ordinal variable ADOPTION (see the paragraph on regression variables and table 1 for
the complete definition of the variable). Ordinal scaling allows the identification of variables
that increase the probability of situating at higher levels the adoption of IoT technology. For
statistical estimates we use Ordered Logit Model with the following structure:
Prob( yi = j | x, b, c) = F (c j +1 − xi b) − F (c j − xi b) (1)
exp(c j +1 − xi b) exp(c j − xi b)
Prob( yi = j | x, b, c) = - (2)
1 + exp(c j +1 − xi b) 1 + exp(c j − xi b)
c0 = −∞ , c3 = ∞
c1 and c2 are estimated by the maximum likelihood method.
The model is also controlled for heteroskedasticity by Davidson and MacKinnon’s (1984)
test, based on the Lagrange multiplier (LM) principle. The coefficients reported in the
regression are robust, corrected for heteroskedasticity. The robustness of the prediction is
verified by the Receiver Operating Characteristics curve developed for multinomial models
(Dragos, 2010).
Following the study of the literature, using the data and methodology described above, we
formulate the following research hypothesis: the level of adoption by Romanian consumers
of IoT technologies in tourism is influenced by TAM model components: convenience,
social influence, habits, confidentiality and safety, awareness, and costs.
Data
The data are collected by sampling between August and September 2020 using the CATI
(Computer-Assisted Telephonic Interview) method. To avoid as much as possible, the
biases of the values of the variables, the personal numerical code was used as an
identification element, which allows a stratified and proportional survey in relation to the
geographical area, gender, and age. The survey is balanced at national level, there are
between 8 and 15 respondents from each county, proportional to the number of inhabitants.
The survey is conducted nationwide, finally comprising 431 respondents who provided
complete data on the questions in the sample. A part of the Romanian population,
especially elderly people from the rural area do not go on vacation and as a result they
could not answer the questions, so they were excluded from the sample. This elimination
caused some biases of the average values of the socio-demographic factors in relation to the
national values (see Table no. 1).
Variables
The endogenous variable ADOPTION (Y in the theoretical model) is a proxy that measures
on an ordinal scale from 1 to 3 the level of use of services provided by IoT systems in
tourism. Special offers offered by online accommodation booking websites are especially
considered. They collect information about the potential consumer following the specifics
of his internet searches regarding the type of destination (sea, mountain, city, spa), the
profile of the accommodation units pursued (hotel, pension, holiday home), etc. As a result
of running artificial intelligence algorithms, tourist destinations or accommodation units are
proposed through alert systems on the smartphone, tablet, or computer. The variable
ADOPTION follows on an ordinal scale how often tourists use the destinations and
accommodations proposed by IoT systems. The variable takes the value 1 if the individual
never uses services provided by IoT in tourism; value 2 if he rarely uses such services and
value 3 if he uses it regularly. The explanations regarding such mechanisms for proposing
offers through IoT systems in tourism are explained to the people in the sample during the
interview. The results regarding the answers are summarized in table no. 1.
Table no. 1. Variables used in analysis and descriptive statistics: mean,
standard deviation, minimum and maximum value
Variable Explanations Mean St. Dev. Min Max
ADOPTION Adoption of services provided through IoT 0.93 0.74 1 3
systems in tourism. Measured ordinarily, on a
scale from 1 to 3 in ascending order of degree of
adoption.
CONV Convenience. Measured quantitatively, as an 3.55 0.92 1 5
average of 3 ordinal items: SAVING_TIME,
AVOID_MOV and ELAST_TIME (complete
description of the items in the Appendix no. 1).
SOC_INFL Social influence. Measured quantitatively, as an 2.80 0.82 1 4.67
average of 3 ordinal items: FRQ_ENTOUR,
REC_ENTOUR and PUB_AUTH (complete
description of the items in the Appendix no. 2).
HABITS Habits regarding the use of IoT and other digital 3.05 0.99 1 5
systems. Measured quantitatively, as an average
of 3 ordinal items: FRQ_PROF, FREE_TIME
and DIGITAL (complete description of the
items in the Appendix no. 3).
PRIV_SAFE Privacy and safety. Measured quantitatively, as 2.74 0.85 1 4.67
an average of 3 ordinal items:
RISK_PRODUCT, PRIV_DATA and
RISK_UNSUCC (complete description of the
items in the Appendix no. 4).
AWAR Awareness. Measured quantitatively, as an 2.87 1.08 1 5
average of 3 ordinal items: ADV_IOT,
DISADV_IOT and OTHER_EXP (complete
description of the items in the Appendix no. 5).
COST Costs ‒ the importance of the best price and the 3.52 0.95 1 5
confidence that it is identified by IoT systems.
Measured quantitatively, as an average of 2
ordinal items: IMP_PRICE and
IDENT_PRICE (full description of the items in
the Appendix no. 6).
GENDER Gender (1 if male, 0 if female). 0.51 0.50 0 1
MARRIED Marital status (1 if the consumer is married or in 0.74 0.44 0 1
a long-term relationship, 0 if he is unmarried,
alone).
AGE Age of the consumer (years). 45.3 12.0 18 66
For example, on a Likert scale from 1 to 5 we can have exaggeratedly large proportions of
answers 1 or 5. The effects on regression can be very serious in these cases, practically
trying to identify correlations between an endogenous variable and a constant. In such a
situation, even if the phenomenon exists, it being poorly measured, the results are degraded.
In our study, because of pretesting the sample, some questions were recalibrated.
Consequently, there is a good variability of the answers for all the items used, even if some
distributions are asymmetric (Figure no. 1).
.4
.4
.4
.3
.3
.3
.3
.3
.2
.2
Density
Density
Density
Density
Density
.2
.2
.2
.1
.1
.1
.1
.1
0
0
0
0
0
0 1 2 3 4 5 0 1 2 3 4 5
0 1 2 3 4 5 0 1 2 3 4 5 0 1 2 3 4 5 RECOM_ENTOUR
AVOID_MOV FRQ_ENTOUR
SAVING_TIME ELAST_TIME
.3
.4
.3
.4
.3
.3
.3
.2
.2
Density
Density
Density
Density
Density
.2
.2
.2
.1
.1
.1
.1
.1
0
0
0
0
0
0 1 2 3 4 5 0 1 2 3 4 5
0 1 2 3 4 5 0 1 2 3 4 5 DIGITAL 0 1 2 3 4 5
PUB_AUTH FREE_TIME RISK_PRODUCT
FRQ_PROF
.3
.4
.3
.3
.3
.3
.2
.2
.2
Density
Density
Density
Density
Density
.2
.2
.1
.1
.1
.1
.1
0
0
0
0
0 1 2 3 4 5 0 1 2 3 4 5 0 1 2 3 4 5 0 1 2 3 4 5
0 1 2 3 4 5 OTHER_EXP
PRIV_DATA RISK_UNSUCC ADV_IOT DISADV_IOT
IMP_PRICE IDENT_PRICE
.3
.4
.3
.2
Density
Density
.2
.1
.1
0
0 1 2 3 4 5 0 1 2 3 4 5
IMP_PRICE IDENT_PRICE
with the development of IoT systems there is an essential element of controlling these risks
through the large number of online reviews and recommendations from other consumers.
A positive influence with lower significance (p = 0.055) has awareness (variable
AWARENESS). This is partly explained by the knowledge to a lesser extent by the
population of the advantages and especially of the disadvantages of using IoT in tourism
(the average value of the DISADV_IOT item is equal to 2.76). Instead, consumers are
better acquainted with other people's experiences (the average value of the OTHER_EXP
item is 3.42), which is encouraging, proving that the population is trying to inform itself
and offers a favourable perspective for the development of IoT systems in the future.
Romanian consumers of tourist services seem to be the most sensitive (p <0.001) to costs
(variable COST). This result is also in contradiction with studies on the banking services
market (Almugari et al., 2019), where the cost is insignificant, the most decisive for the
adoption of services being convenience and awareness. In fact, of all the items from the
questionnaire, the importance of the price (IMP_PRICE item) had the highest average
value, of 4.27. Among the socio-demographic variables are significant age (AGE variable,
p = 0.027) and education (EDUC variable, p = 0.037). The signs of the coefficients are the
expected ones, the younger and more educated people having a higher probability of
frequent use of IoT systems in tourism. Gender and marital status do not have a significant
impact. The RESID variable is not significant at all (p = 0.089), its effect being probably
taken over by education, in rural areas there is a much lower percentage of people with
higher education than in urban areas.
Conclusion
The issue of IoT systems is relatively recent in the literature but is currently an important
topic. Most studies refer to technical aspects: programming algorithms, technical reliability,
communication protocols, design, development, implementation, and maintenance of high
quality IoT systems. Concerns about the effects on human society have gradually
developed, discussing the advantages and disadvantages of radical change in modern
society because of the development of interconnected artificial intelligence systems. The
fields of study are diverse: energy and sustainable environment, smart hats, E-health ‒
environmentally assisted living systems, transport technologies, low carbon products, etc.
However, the effects on consumers have been much less explored. Specialists turned rather
to the effect of applications in the banking system. Our study aims to fill a gap in the
literature, highlighting specific determinants of IoT adoption in tourism in general and in
reservation systems. Econometric estimates indicate the significant influence of behavioural
variables related to awareness, convenience, habits, and cost. There are notable differences
from the banking system, where social influence, confidentiality and security of
transactions are decisive. Among the socio-demographic factors, the role of age and
education was highlighted, the younger and more educated people having higher
probabilities of frequent use of the tourist services proposed by IoT systems.
The mechanisms highlighted by this study can be used to better match demand with supply.
By observing the frequency of use and the type of service chosen or not by consumers, IoT
system programmers can adapt algorithms to select relevant information on consumer
behavior in relation to the type of tourist offers. Thus, the offers that are rarely purchased
by tourists, come from defective algorithms, which must be corrected. Public authorities
References
Abushakra, A. and Nikbin, D., 2019. Extending the UTAUT2 model to understand the
entrepreneur acceptance and adopting Internet of Things (IoT). In: L. Uden, I.-H. Ting
and J.M. Corchado, eds. 2019. Knowledge Management in Organizations. Cham:
Springer, pp. 339-347. DOI: 10.1007/978-3-030-21451-7_29
Ahmed, E., Yaqoob, I., Hashem, I. A. T., Khan, I., Ahmed, A. I. A., Imran, M. and
Vasilakos, A. V., 2017. The role of big data analytics in Internet of Things. Computer
Networks, 129, pp. 459-471. DOI: 10.1016/j.comnet.2017.06.013
Alalwan, A. A., Dwivedi, Y. K., Rana, N. P., Lal, B. and Williams, M. D. (2015).
Consumer adoption of Internet banking în Jordan: Examining the role of hedonic
motivation, habit, self-efficacy and trust. Journal of Financial Services Marketing,
20(2), pp. 145-157. DOI: 10.1057/fsm.2015.5
Aldossari, M. Q. and Sidorova, A., 2020. Consumer acceptance of Internet of Things (IoT):
Smart home context. Journal of Computer Information Systems, 60(6), pp. 1-11. DOI:
10.1080/08874417.2018.1543000
Almugari, F., Bajaj, P., Tabash, M. I., Khan, A. and Ali, M. A., 2020. An examination of
consumers’ adoption of internet of things (IoT) in Indian banks. Cogent Business &
Management, 7(1). DOI: 10.1080/23311975.2020.1809071
Angelova, N., Kiryakova, G. and Yordanova, L., 2017. The great impact of internet of
things on business. Trakia Journal of Sciences, 15(1), pp. 406-412. DOI:
10.15547/tjs.2017.s.01.068
Atlam, H. F. and Wills, G. B., 2020. IoT security, privacy, safety and ethics. In: M. Farsi,
A. Daneshkhah, A. Hosseinian-Far and H. Jahankhani, eds. 2020. Digital Twin
Technologies and Smart Cities. Cham: Springer, pp. 123-149.
Axelrod, C. W., 2015. Enforcing security, safety and privacy for the Internet of Things. In:
s.n., 2015 Long Island Systems, Applications and Technology. Farmingdale, NY, USA,
1 May 2015. S.l: IEEE, pp. 1-6. DOI: 10.1109/LISAT.2015.7160214.
Bodea, C.-N., Purnuș, A., 2018. Legal implications of adopting Building Information
Modeling (BIM). Juridical Tribune – Tribuna Juridica, 8(1), pp. 63-72.
Cho, Y. C. and Sagynov, E., 2015. Exploring factors that affect usefulness, ease of use,
trust, and purchase intention in the online environment. International Journal of
Management & Information Systems (IJMIS), 19(1), pp. 21-36. DOI: 10.19030/
ijmis.v19i1.9086
Conti, M., Dehghantanha, A., Franke, K. and Watson, S., 2018. Internet of Things security
and forensics: Challenges and opportunities. S.l.: Elsevier. DOI: 10.1016/
j.future.2017.07.060
Cronbach, L. J., 1951. Coefficient alpha and the internal structure of tests. Psychometrika,
16(3), pp. 297-334. DOI: 10.1007/BF02310555
Annexes
Annex no. 1. Items of the CONV variable and the distribution of answers
Item Explanations regarding the item. All items are Percentage of response options
scaled up from 1 to 5 1 2 3 4 5
SAVING_TIME Saving time. The importance of saving time
by using IoT (not at all important to very 2.3 18.8 26.2 32.0 20.6
important).
AVOID_MOV Avoiding movement. The importance of
avoiding the inconveniences of movement to
a travel agency: congestion, waiting times, the 5.6 20.9 31.3 28.5 13.7
possibility of meeting less pleasant people
(not at all important to very important).
ELAST_TIME Elasticity of time. The importance of
elasticity given by the possibility of accessing
2.1 10.4 25.5 34.6 27.4
IoT services 24 hours a day and 7 days a week
(from not important to very important).
Annex no. 2. Items of the SOC_INFL variable and the distribution of answers
Item Explanations regarding the item. All items are Percentage of response options
scaled up from 1 to 5 1 2 3 4 5
FRQ_ENTOUR Entourage frequency. How high is the use of
IoT by people around you (friends,
7.4 28.3 40.1 20.9 3.2
colleagues, relatives)? (from very low
frequency to very high frequency).
REC_ENTOUR Entourage recommendations. How big is the
effect of your entourage's recommendations to
5.3 22.3 34.3 29.5 8.6
use IoT in tourism? (from very low to very
high).
PUB_AUTH Public authorities. How encouraged do you
think you are in using IoT by public
authorities (community service, relationship 18.8 29.5 36.4 13.0 2.3
with public institutions, etc.)? (not at all
encouraged to total encouragement)
Annex no. 3. Items of the HABITS variable and the distribution of answers
Item Explanations regarding the item. All items are Percentage of response options
scaled up from 1 to 5 1 2 3 4 5
FRQ_PROF Professional IoT frequency. How often do
you consider using IoT in your professional
17.4 23.2 32.7 21.1 5.6
activities (service tasks)? (from very low
frequency to very high frequency).
FREE_TIME IoT in your free time. How often do you
consider using IoT in other areas of your
activities, in your free time (financial-banking 10.0 23.0 30.6 26.2 10.2
activities, online shopping, etc.)? (from very
low frequency to very high frequency).
DIGITAL Use of digital technologies. How common are
you to use digital technologies in your general
activities, compared to the national average? 6.5 19.0 27.4 28.8 18.3
(from very low frequency to very high
frequency).
Annex no. 5. Items of the AWARENESS variable and the distribution of answers
Item Explanations regarding the item. All items are Percentage of response options
scaled up from 1 to 5 1 2 3 4 5
ADV_IOT Awareness of IoT benefits. How well are you
aware of the comparative advantages offered
by IoT systems in relation to the classic
13.2 25.5 29.9 21.6 9.7
methods of choosing the tourist product or
service? (from very low knowledge to very
high knowledge).
DISADV_IOT Awareness of IoT disadvantages. How well
are you aware of the comparative
disadvantages offered by IoT systems in
19.5 30.9 28.3 16.7 4.6
relation to the classic methods of choosing the
tourist product or service? (from very low
knowledge to very high knowledge).
OTHER_EXP Knowing the experiences of others. How well
do you know the pleasant or unpleasant
experiences of other tourists in their 6.7 22.3 30.2 23.7 17.2
relationship with IoT systems? (from very low
knowledge to very high knowledge).
Annex no. 6. Items of the COST variable and the distribution of answers
Item Explanations regarding the item. All items are Percentage of response options
scaled up from 1 to 5 1 2 3 4 5
IMP_PRICE The importance of the best price. How
important is it for you to identify the best
0.7 5.3 22.0 28.5 43.4
price for the tourist product or service? (not at
all important to very important).
IDENT_PRICE Optimal price identification via IoT. How
convinced are you that IoT systems allow you
7.2 20.9 29.0 30.6 12.3
to identify the best price for the tourist
product or service you are looking for?
DOI: 10.24818/EA/2021/57/376
Abstract
The Internet of Things (IoT) has gained particular attention, both from academia and from
companies and industries, as a result of its characteristics and the opportunities that this
technology generates for end-users and for the business environment. Thus, the creation of
this network that connects the objects around us allowed optimization and improvement of
activities in various fields.
The adaptation and deployment of IoT in wearable smart devices has created an important
market, due to the popularity, the functionality and the use of these devices in various
professional and everyday activities. The purpose of this paper was to examine the adoption
of wearable technology in the broader context of the development of innovations and
technologies in the field of IoT. A new theoretical model based on Technology Acceptance
Model (TAM) was developed and tested to identifying the relations between factors
influencing the attitude towards use and the intention to use of wearable devices. A survey
carried out on Romanian students provided the necessary data to test the model. The results
of Structural Equation Modelling (SEM), based on the Partial Least Squares (PLS) method,
led to the acceptance of eight out of the nine issued hypotheses, indicating that the three
exogenous variables (perceived usefulness, perceived enjoyment and visual attractiveness of
wearable devices) have a significant positive influence (with one exception) on endogenous
variables (intention to use and attitude towards the use of wearable devices).
Keywords: Wearable Devices, Internet of Things (IoT), Technology Adoption, Technology
Acceptance Model (TAM), Structural Equation Modelling (SEM), Partial Least Squares (PLS)
JEL Classification: L86, O33, C12
*
Corresponding author, Mihai Felea – e-mail: mihai.felea@com.ase.ro
Authors’ ORCID:
Mihai Felea: orcid.org/0000-0001-9375-6912
Mihaela Bucur: orcid.org/0000-0003-0867-2971
Cristian Negruțiu: orcid.org/0000-0003-1857-8567
Maria Nițu: orcid.org/0000-0001-6314-9601
Dragoș Andrei Stoica: orcid.org/0000-0002-7846-189X
1. Literature review
1.1. Internet of Things
Following the explosive development of practical IoT applications in recent times, there has
been and continues to be increased interest from researchers for this field. Therefore, the
scientific literature in the field of IoT is extensive and encompasses various research
perspectives.
Concerning the historical evolution of the IoT concept, Ibarra-Esquel et al (2017) distinguish
three major phases of evolution. Phase I includes the birth and first clarifications of the
concept on the basis of the definitions cited above. At this stage, the concept was generally
referring to connecting computers in various fields. In Phase II we are witnessing a
consolidation of the concept, as well as the integration of objects, different from computers.
The IoT paradigm is defined at the intersection of three visions, the semantic one, the one
related to objects, and the Internet (Figure no. 1). Finally, in Phase III, we notice a clear trend
towards the growth of the data and services area by developing diverse applications, both in
the professional and domestic area.
At this stage of clarification, it is also important to define what the term of objects in the IoT
concept refers to. According to Ibarra-Esquer et al (2017), these objects have the following
properties: identification, localization and tracking, detection, actuation and processing. The
last feature is specific to more technically advanced objects, but the first four properties are
essential for defining an object in the notion of IoT. In the same note, Klein, Pacheco and
Righi (2017) identify several additional elements, related to cooperation and the user
interface. This last aspect is particularly relevant in the consumer application area.
Internet-oriented
visions
Things-oriented Semantic-oriented
visions visions
Internet
of Things
• Communicate with each other (they are able to exchange information over an IoT
wireless network)
• Works in the background (the user can operate independently; the device does not need
his attention)
Table No. 1. Classification of smart devices
Sector Type Body area
Consumers • Smartwatch • Head
• Health • Fitness tape • Ear
• Sport and fitness • Virtual glasses • Eye
• Information • Smart Clothes • Shoulders
• Games and free time • Medical devices • Elbow
Professional • Games • Wrists
• Commercial • Feet
• Industrial
• Military
• Others
Source: adapted from Tarabasz and Poddar, 2019, p. 127
The adoption of smart devices has increased in recent times, driven by both consumer
demand and the growing supply proposed by flagship companies such as Apple, Microsoft
or Google. However, the adoption of this technology is subject to the same types of factors
influencing consumer decisions in general. Following quantitative research conducted in
Dubai, Tarabasz and Poddar (2019) identify the following important factors in the adoption
of smart devices: safety, product attributes, behavioral motivations, perceived utility and
perceived easy use. In the same note and in a similar procedure, based on TAM, Yu-Sheng,
Nawata and Huang (2019) examine the adoption of one of the most widespread devices, the
fitness band. The authors mention the following factors as the most important: perceived
use, expected performance, perceived utility, external network connection, degree of
innovation, degree of knowledge of technology, adoption intent, and usage behavior.
1.3. Theories about Technology Acceptance: TAM and TAM 2
In order to effectively implement an information system or technology, it is essential to
understand the user's consumer behavior and preferences. In recent decades, the focus has
been on developing theoretical models that can explain and predict user’s acceptance of new
technologies. One of the most representative models of acceptance of technology is TAM,
which has been extended to TAM 2.
TAM (Figure no. 2), is a component part of the Theory of Reasoned Action (TRA), theory
that analyses human behavior. Thus, according to the two dimensions: perceived usefulness
and perceived ease of use it can predict the intention of consumer behavior and acceptance
of technology (Venkatesh and Davis, 2000). The first dimension refers to the possible level
of effortless use of technology, and the perceived ease of use demonstrates the extent to which
consumers believe that their use would not require a major effort (Gao and Bai, 2014, Davis,
1989). The Technology Acceptance Model has been used in various studies such as: adopting
online shopping (McCloskey, 2003); e-learning and mobile financial services (Lee et al.,
2012); internet banking (Al-Ajam and Nor, 2013).
Improving the TAM model by introducing those three interconnected social forces (image,
voluntariness and the subjective norm) will predict how an individual will react when faced with
the situation of rejecting or accepting a new system/technology (Venkatesh and Davis, 2000):
• The image reflects the level by which a consumer uses technology to improve and
present their status within a social group (Moore and Benbasat, 1991);
• Voluntariness presents the optional decision of the users on the purchase process;
• The subjective norm investigates the use of technology according to an individual's
perception of the opinion of those close to him.
The process of cognitive instruments in the TAM 2 model reflects (Venkatesh and Davis,
2000, p.190):
• Job relevance describes the user's perception of the applicability of the technology
within the service;
• Output quality demonstrates the consumer's opinion on the results of the use of
innovative technology in its service;
• The perceived ease of use remained the same from the original TAM model, being a
direct factor of perceived utility (F. D. Davis, 1989);
• Result demonstrability suggests the concrete result of the use of technology/innovation.
Perceived
Usefulness
Attitude
towards Intention
Perceived Use to Use
Enjoyment
Visual
Attractiveness
a technology (Davis, 1989). Regarding wearable devices, previous studies that applied TAM
found a positive relationship between the attitude toward use and the intention to adopt these
technologies. (Jung, Kim and Choi, 2016). Thus, we also hypothesizes that:
H9. There will be a positive relationship between the attitude toward the use of wearable
devices and the intention to use of wearable devices.
3. Research methodology
A quantitative research design was adopted for this exploratory study. An online survey was
administered to business students at The Bucharest University of Economic Studies, a higher
education institution from Romania. The survey began with a brief description and examples of
wearable technologies. Students were also informed that participation in the study was entirely
voluntary and guarantees anonymity. The first part of the questionnaire included demographic
items relating to the participants' age, gender, years of studies and employment status. The
second part of the survey consisted of multi-item measures on a seven-point Likert scales (from
1 totally disagree to 7 totally agree) that were adapted in the context of wearable technologies.
An overview of the constructs, items and references are presented in Table no. 2.
Table no. 2. Survey items used in this study
Construct Item Contents References
Perceived PU1 I think that smart wearable devices are useful Davis,
Usefulness for my life 1989; Park,
(PU) PU2 Using smart wearable devices increases my 2020
productivity
PU3 Using smart wearable devices helps me
conveniently perform many tasks
PU4 Wearable devices provide very useful service
and information to me
Perceived PE1 Using wearable devices is truly fun Yang et al,
Enjoyment PE2 I enjoy using smart wearable devices 2016;
(PE) PE3 Using smart wearable devices gives me a lot of Park, 2020
enjoyment
PE4 The use of wearable devices makes me feel
good
Visual VA1 The design of wearable devices is attractive to Jeong et al,
Attractiveness me 2017;
(VA) VA2 The user interface of wearable devices (i.e., Yang et al,
colours, boxes, menus, etc.) is attractive 2016;
VA3 The design of wearable devices is cool to me
VA4 The overall look and feel of wearable devices
is visually appealing
Attitude ATU1 I feel positive regarding the utilization of Davis et al,
Towards Use wearable devices 1989
(ATU) ATU2 In general, I admire the utilization of wearable
devices
ATU3 I think it is a trend to use wearable devices
ATU4 Overall, I like using the wearable devices
Variance Extracted is 0.50 (Hair et al. 2014). Table no 4 shows that Cronbach's alpha,
Composite reliability and Average Variance
Table no 4. Constructs Reliability and Validity
Cronbach's Composite Average Variance
Alpha >0.7 Reliability >0.7 Extracted (AVE) >0.5
Attitude Towards Use 0.829 0.885 0.662
Intention to Use 0.917 0.942 0.802
Perceived Enjoyment 0.885 0.921 0.745
Perceived Usefulness 0.841 0.894 0.678
Visual Attractiveness 0.912 0.938 0.792
Extracted values for each of the five constructs of the proposed model exceeds the minimum
thresholds indicating high convergent reliability and validity.
To evaluate the discriminant validity, the square root of the Average Variance Extracted of
each construct have to be compared with its inter-construct correlation. The square root of
each construct’s AVE should be higher than the correlation between the constructs in order
to satisfy discriminant validity requirement (Fornell and Larcker, 1981). Table no. 5 shows
that all square roots of the AVEs on the diagonal are higher than the correlations between
constructs and indicates adequate discriminant validity of the measurements.
Table no. 5. Discriminant Validity Results
Attitude Intention Perceived Perceived Visual
Towards Use to Use Enjoyment Usefulness Attractiveness
Attitude
Towards Use 0.814
Intention to
Use 0.683 0.896
Perceived
Enjoyment 0.704 0.642 0.863
Perceived
Usefulness 0.632 0.702 0.649 0.823
Visual
Attractiveness 0.527 0.342 0.447 0.383 0.89
In addition, an inspection of the overall model reveals a satisfactory model fit, as shown by
the Standardized Root Mean Square Residual (SRMR=0.072). The SRMR is the square root
of the sum of the squared differences between the model-implied and the empirical
correlation matrix (Henseler, Hubona, and Pauline, 2016). A value of 0.08 as proposed by
Hu and Bentler (1999) indicates an acceptable fit for PLS path models.
4.3. Structural model
Structural equation modelling (SEM) has become widely applied in many social science
researches to analyse the cause–effect relations between latent variables. Among variance-
based SEM methods, Partial Least Squares (PLS) path modelling approach is considered as
a “silver bullet” and can be applied to a wider range of situations (Hair, Ringle and Sarstedt,
2011).
Conclusions
The study is part of the wider context of the explosion of IoT technology in all fields, both in
the professional and the personal sphere and is comprised of// comprises an exploratory study
focused on understanding the elements that impact Romanian students’ attitude towards use
and intention to use wearable devices. The research is part of the wider context of the
explosion of IoT technology in all fields, both in the professional and the personal sphere. To
accomplish this, the paper proposes a structural model based on the Technology Acceptance
Model (TAM) to which were added other two variables: Perceived Enjoyment and Visual
Attractiveness. Wearable devices that are perceived as useful, enjoyable and attractive are
the most likely to be adopted by young people and are more likely to gain a larger market
share. To test the proposed conceptual model, first a quantitative research was conducted and
online survey responses from Romanian students were collected. Second, Partial Least
Squares (PLS) analysis was used to measure the reliability and validity of the proposed
model. Subsequently, PLS-SEM was used to analyse the relationship between variables and
test the hypothesis. The results of the study showed that perceived usefulness, perceived
enjoyment and visual attractiveness positively influenced the attitude towards use and
intention to use wearable devices with one exception. Visual attractiveness had no significant
influence on the intention to use although it positively influenced attitude towards using
wearable devices. These results extend the literature regarding the adoption of wearable
devices technology among young users and provide useful information to the industry.
The limits of this study are primarily the size and structure of the sample. Young people,
especially those with higher education, have a natural predisposition to the use of new
technologies, being very receptive and curious. On the other hand, they are also the main
References
Al-Ajam, A.S. and Nor, K.M., 2013. Internet banking adoption: integrating technology
acceptance model and trust. European Journal of Business and Management, 5(3),
pp.207-215.
Borowski-Beszta, M. and Polasik, M., 2020. Wearable devices: New quality in sports and
finance. Journal of Physical Education and Sport, 20, pp.1077-1084.
Chin, W. W., 1998. The partial least squares approach for structural equation modeling. In G.A.
Marcoulides ed. 1998. Methodology for business and management. Modern methods for
business research. NJ: Lawrence Erlbaum Associates Publishers, pp. 295-336.
Choi, J. and Kim, S., 2016. Is the smartwatch an IT product or a fashion product? A study on
factors affecting the intention to use smartwatches. Computers in Human Behavior, 63,
pp.777-786.
Chuah, S., Rauschnabel, P., Krey, N., Nguyen, B., Ramayah, T. and Lade, S., 2016. Wearable
technologies: The role of usefulness and visibility in smartwatch adoption. Computers in
Human Behavior, 65, pp.276-284.
Cohen, J., 2013. Statistical Power Analysis for The Behavioral Sciences. Hoboken: Taylor
and Francis.
Davis, F.D. and Venkatesh, V., 1996. A critical assessment of potential measurement biases
in the technology acceptance model: three experiments. International Journal of Human-
Computer Studies, 45(1), pp.19-45.
Davis, F.D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance in
Information Technology, MIS Quarterly, 13(3), pp.319-340.
Davis, F.D., Bagozzi, R.P., Warshaw, P.R., 1989. User acceptance of computer technology:
a comparison of two theoretical models. Management Science, 35(8), pp. 982-1003.
Fornell, C. and Larcker, D.F., 1981. Evaluating Structural Equation Models with
Unobservable Variables and Measurement Error. Journal of Marketing Research, 18,
pp. 39-50.
Gao, L. and Bai, X., 2014. A unified perspective on the factors influencing consumer
acceptance of internet of things technology. Asia Pacific Journal of Marketing and
Logistics, 26(2), pp.211-231.
Hair, J., Black, W., Babin, B. and Anderson, R., 2014. Multivariate data analysis. 7th ed.
Upper Saddle River: Pearson Education.
Hair, J.F., Ringle, C.M., and Sarstedt, M., 2011. PLS-SEM: indeed a silver bullet. Journal of
Marketing Theory and Practice, 19(2), pp. 139-151.
Hair, J.F., Risher, J.J., Sarstedt, M., and Ringle, C. M., 2019. When to use and how to report
the results of PLS-SEM. European Business Review, 31(1), pp. 2-24.
Henseler, J., Hubona, G., and Pauline, A.R., 2016. Using PLS path modeling in new
technology research: Updated guidelines. Industrial Management and Data Systems,
116(1), pp.2-20.
Hu, L.T. and Bentler, P.M., 1999. Cutoff criteria for fit indexes in covariance structure
analysis: conventional criteria versus new alternatives, Structural Equation Modeling,
6(1), pp. 1-55.
Ibarra-Esquer, J., González-Navarro, F., Flores-Rios, B., Burtseva, L. and Astorga-Vargas,
M., 2017. Tracking the Evolution of the Internet of Things Concept Across Different
Application Domains. Sensors, 17(6), p.1379.
ITU, 2012. Recommendation ITU-T Y.2060: Overview of the Internet of things. [online]
Available at: <https://www.itu.int/rec/T-REC-Y.2060-201206-I/en> [Accessed 16
December 2020].
Jeong, S., Kim, S., Park, J. and Choi, B., 2017. Domain-specific innovativeness and new product
adoption: A case of wearable devices. Telematics and Informatics, 34(5), pp.399-412.
Jin, Y. & Ji, S. 2018. Mapping hotspots and emerging trends of business model innovation
under networking in Internet of Things. EURASIP Journal on Wireless Communications
and Networking, 2018(1), pp. 1-12.
Jung, Y., Kim, S. and Choi, B., 2016. Consumer valuation of the wearables: The case of
smartwatches. Computers in Human Behavior, 63, pp.899-905.
Khakurel J., Pöysä S., Porras J., 2017. The Use of Wearable Devices in the Workplace ‒ A
Systematic Literature Review. In: O. Gaggi, P. Manzoni, C. Palazzi, A. Bujari and
J. Marquez-Barja (eds.). Smart Objects and Technologies for Social Good.
GOODTECHS 2016. Lecture Notes of the Institute for Computer Sciences, Social
Informatics and Telecommunications Engineering, vol 195. Springer, Cham.
Kim, K.J. and Shin, D.H., 2015. An acceptance model for smart watches: Implications for
the adoption of future wearable technology. Internet Research, 25(4), pp. 527-541.
Kim, T. and Chiu, W., 2019. Consumer acceptance of sports wearable technology: the role
of technology readiness. International Journal of Sports Marketing and Sponsorship,
20(1), pp.109-126.
Klein, A., Pacheco, F.B. and Righi, R.d.R., 2017. Internet of things-based products/ services:
process and challenges on developing the business models. Journal of Information
Systems and Technology Management: JISTEM, 14(3), pp. 439-461.
Ko, E., Sung, H. and Yun, H., 2009. Comparative Analysis of Purchase Intentions Toward
Smart Clothing Between Korean and U.S. Consumers. Clothing and Textiles Research
Journal, 27(4), pp.259-273.
Lee, Y.K., Park, J.H., Chung, N. and Blakeney, A., 2012. A unified perspective on the factors
influencing usage intention toward mobile financial services. Journal of Business
Research, 65(11), pp. 1590-1599.
Li, J., Ma, Q., Chan, A. and Man, S., 2019. Health monitoring through wearable technologies
for older adults: Smart wearables acceptance model. Applied Ergonomics, 75, pp.162-169.
DOI: 10.24818/EA/2021/57/392
Abstract
Business model innovation is a key success factor for IT companies competing in
technologically uncertain environments. Despite the need of IoT solution developers to
renew their business models to effectively create value for customers and capture value for
the company, the strategic factors of business model innovation for IoT solutions have
remained under-researched so far. The paper addresses this knowledge gap by exploring the
strategic factors of business model innovation and its results from the perspective of RBV
(Resource-Based View) theory. The theoretical foundation of this research is based on the
literature of the business model innovation and the strategic marketing literature. In the
empirical exploration of the strategic factors of the business model innovation, we adopted
a qualitative research strategy having as methodological basis Grounded theory. More
precisely, we conducted 12 semi-structured interviews with top managers at IT companies
operating in Romania that have successfully developed IoT solutions. Proactive market
orientation, technology orientation, entrepreneurial orientation, and adaptive marketing
capabilities have been identified as strategic factors of business model innovation for IoT
solutions, while competitive advantage and customer satisfaction as the main expected
outcomes.
resources and capabilities” (p. 25) has an essential contribution to the strategy that ensures
the competitiveness and performance of the organization. RBV theory has been the
theoretical foundation of many previous researches in strategic management and marketing
(Kozlenkova, Samaha and Palmatier, 2014).
Market orientation positively influences the level of innovation which, in turn, leads to
superior firm performance (Han, Kim and Srivastava, 1998). From the perspective of
innovation type, Zhou, Yim and Tse (2005) found that market orientation positively
influences technology-based innovations, and Najafi-Tavani, Sharifi and Najafi-Tavani
(2016) identified a positive influence of market orientation on the performance of a new
product. From the perspective of market uncertainty, Gatignon and Xuereb (1997) found that
customer orientation positively influences the market performance of innovation in
environments with high uncertainty. However, some critics have questioned the value of
market orientation in the context of innovation (Berthon, Hulbert and Pitt, 1999).
Consequently, Narver, Slater and MacLachlan (2004) argued that the market orientation of
the company lies in two types of behaviour: responsive market orientation that meets the
needs expressed by the customer, and proactive market orientation that uncover latent needs
and anticipates future ones and take the initiative in developing new solutions. Empirical
findings have shown that proactive market orientation is positively related to the market
success of a new product (Narver, Slater and MacLachlan, 2004; Lamore, Berkowitz and
Farrington, 2013), supporting the company's long-term profitability and position on the
market (Jaeger, Zacharias and Brettel, 2016). More specifically, Blocker et al. (2011) found
that proactive customer orientation is the most important factor in creating customer value
that leads to a higher level of customer satisfaction and loyalty. The value of proactive market
orientation has proven to be higher in times of greater technological uncertainty, creating
opportunities for more radical innovation (Tsai, Chou and Kuo, 2008). However, in markets
with a culture of avoiding uncertainty, increasing the level of proactive market orientation,
beyond a certain threshold, can negatively affect market performance due to customer
resistance in learning new behaviours (Ozdemir, Kandemir and Eng, 2017). Recently, three
proactive market strategies have been proposed as useful in the process of creating value for
customers and creating new markets: market shaping, customer involvement and innovative
leadership (Brege and Kindstrom, 2020). Consequently, we will focus on exploring the role of
proactive market orientation in business model innovation in the context of the technological
uncertainty generated by disruptive digital technologies.
Company’s survival in technologically uncertain environments requires a high level of
innovation in adopting new technologies and developing new solutions to meet the needs of
new customers (Gatignon and Xuereb, 1997). Innovative and proactive companies have
adopted a strategic technology orientation defined as “the ability and will to acquire a
substantial technological background and use it in the development of new products”
(Gatignon and Xuereb, 1997, p. 78). These companies are focused on monitoring future
technological developments to identify and evaluate the business potential of new
technologies and their impact on the evolution of the company and its market. Previous
literature provides empirical evidence to support the contribution of customer orientation and
technology orientation to the success of innovation in specific contexts, such as high-tech
industries (Zhou, Yim and Tse, 2005) and markets with high uncertainty (Gatignon and
Xuereb, 1997). Hortinha, Lages and Lages (2011) found that customer orientation and
technology orientation play equally important roles in enhancing exploratory innovation
capabilities. Moreover, Zhou and Li (2010) identified stronger effects on adaptive capability
2. Research methodology
This research focused on exploring strategic factors and expected outcomes of business
model innovation in organizations that have successfully developed IoT solutions.
Therefore, we looked for answers to three research questions: a) what strategic orientations
of the company lead to the innovation of the business model? b) What marketing
capabilities are involved in this process? c) What are the expected outcomes of business
model innovation for IoT solutions?
Due to the shortage of previous theoretical and empirical studies aimed at explaining strategic
factors of business model innovation in general, in the context of IoT solutions in particular,
we have chosen an exploratory research approach. More specifically, we decided to adopt the
model of Grounded theory in our qualitative research design. This decision is justified by the
fact that the grounding of a theory in qualitative data is recommended for research topics not
consistently informed by any previous theories (Amit and Zott, 2001). To this end, we
collected qualitative data through semi-structured interviews with 12 top managers at
companies with operations in Romania that, through pioneering, have successfully developed
and launched new IoT solutions for operations management, logistics, retailing, public
utilities and services, and environmental sustainability (Table no. 1).
Table no. 1: Sample profile
Participants Role The company's IoT solution projects
Participant 1 General manager Operations management
Participant 2 General manager Public utilities and services
Participant 3 General manager Environmental sustainability
Participant 4 General manager Logistics
Participant 5 General manager Operations management
Participant 6 General manager Retailing
Participant 7 R& D director Operations management
Participant 8 R& D director Public utilities and services
Participant 9 R& D director Operations management
Participant 10 R& D director Logistics
Participant 11 Sales manager Operations management
Participant 12 Sales manager Public utilities and services
The sample was constructed using the convenience sampling method. Participants were
included in the sample based on their knowledge and experience in managing projects for
the successful development and launch of IoT solutions by their companies. These
managers were qualified to share their companies experience in IoT projects, which is
useful in revealing a realistic perspective on the phenomenon studied. In addition, their
views and critical assessments have helped us develop a deeper understanding of business
model innovation for IoT solutions. The sample size of 12 managers is comparable to that
of samples used in other qualitative research based on semi-structured interviews that
explored aspects of business model innovation in the context of adopting next-generation
digital technologies (Alberti-Alhtaybat, Al-Htaybat and Hutaibat, 2019; Barbour and Luiz,
2019). Moreover, Guest, Bunce and Johnson (2006) found through an experiment that the
number of 12 interviews represents a threshold for data saturation in the case of in-depth
interviews. Also, this sample size is justified in the case of exploring an emerging
innovation of the value proposition and innovation of the value capture process (Clauss,
2017); b) proactive market orientation (Narver and Slater, 2004); c) technology orientation
(Gatignon and Xuereb, 1987); d) entrepreneurial orientation (Miller, 1983); e) adaptive
marketing capabilities, namely vigilant market learning, market experimentation and open
marketing (Day, 2011; Guo et al., 2018); f) facilitative leadership (Slater and Narver,
1995); and g) organizational culture (Moorman, 1995). The way of aggregating the
constructs is presented in the table in the next section. To increase confidence in the results
of the coding process, two general managers and two business consultants separately
assessed the congruence of codes, categories and themes.
3. Results
In the following sections we will present the main constructs that emerged from the coding
process as supported by interview excerpts.
3.1. Business model innovation for IoT solutions
To identify the elements of the business model for IoT solutions on which innovation
efforts revolve, we adopted Clauss's (2017) conceptualization of business model innovation
as a third-order construct consisting of three second-order constructs: a) value creation
innovation, with four dimensions (i.e. new competencies, new technology and/or
equipment, new partnerships and new processes); b) value proposition innovation, with
four dimensions (new offers, new customers and markets, new channels and new customer
relationships); and c) value capture innovation with two dimensions (new revenue models
and new cost structures) (Table no. 2).
A. Value creation innovation. The company's commitment to developing IoT solutions
triggers a learning process in order to develop complementary skills for innovation, i.e.
technical, business and marketing skills. Managers try to capitalize on the company core
competencies for developing IoT solutions, so that employees can more easily develop new
complementary technical skills. From a marketing perspective, the seller is assigned an
integrative role, developing a comprehensive view of the customer and the market and
becoming a reliable customer consultant. As an R&D director mentions, “The customer
becomes the responsibility of the seller who supports him in the decision-making process.
(...) The seller becomes a reliable customer consultant”. Furthermore, the technical product
owner must acquire commercial and marketing skills for understanding the business, the
expected benefits and future needs of the customer, and for initiating proactive actions to
offer solutions that the customer hasn't thought of.
Innovation for value creation requires the use of new technologies and equipment to
develop new technical capabilities to create solutions to customer problems. Relevant in
this regard is the description of the sales manager of an IT company in the sample that has
become an IoT network operator, also providing data services: “Our company has
developed new technological capabilities to become an IoT network operator, acquired and
installed new HW equipment with software applications, sensors deployed, and network
applications installed to provide data to customers or the community”.
B. Value proposition innovation. In developing new IoT solutions, the focus is on services,
not devices. The managers interviewed revealed that their companies develop IoT solutions
that provide non-invasive data capture services and real-time data that help managers to
make better decisions which in turn create higher customer value. IoT developers are
looking for standardization, modular architecture and scalability of the solutions they
develop, allowing customers to integrate and customize these modules according to their
needs and activities. Successful IoT solutions have proven to be simple, customized, easy to
implement and low cost for customers. The provision of new solutions for the development
of the customer’s core business is particularly important. In this regard, summarizing his
company's future plans, an R&D director said that “In the future, we will provide analytics
services using algorithms that identify patterns in the data collected, thus creating new
value for the customer. Instead of applications, customers request new services through a
sharing model”.
IoT developers focus on customer problems that can be solved by the real time data
collected, displayed, and analyzed by the IoT solution. For example, an R&D director
highlights that his company “began providing air quality data collected by sensors in its
IoT network. Requests were made by non-traditional customers like not-for-profit
organizations”.
The companies that develop IoT solutions create direct marketing channels. The process of
customer communication and negotiation starts at the level of top management and
operations managers (the latter as direct users of the proposed solution), in contrast to
conventional IT products and services for which this process begins and takes place
through the IT department. New collaborative relationships with customers were found to
emerge. The sample companies develop the IoT solutions together with the customers, the
process of co-creating value being a key success factor in the development and
commercialization of new IoT solutions. The need for continuous interaction,
communication and collaboration with the customer throughout the value creation process
(i.e. discovering customer needs, designing the IoT solution, implementing, providing
maintenance and updating the IoT solution) was highlighted. As the general manager of a
company explained, “In the case of a solution for monitoring the manufacturing process,
the idea arose during discussions with a customer about the possibility of monitoring the
electricity consumption of the equipment. Then the idea of monitoring the operation of
equipment based on monitoring electricity consumption crystallized, the IoT solution being
developed together. Moreover, when the customer receives the first benefits that strengthen
his trust, he requests the gradual expansion of the solution by adding new features.”
C. Value capture innovation. Companies are put in a position to renew their revenue and
cost models to capture value from the IoT solutions they develop. For example, Product-as-
a-Service was revealed as a new way of value capture, the customer paying for the service
provided by IoT solution. Customers are a driving force behind the adoption of new
revenue-generating model by requiring access to IoT solution as a service according to a
sharing model rather than buying it as a unique product. From a cost perspective, the
sample companies focus on developing simple, scalable, and easy to implement solutions to
keep costs low to increase access and to intensify their use. The R&D director of a
company explained these aspects as follows: “There are many customers who discuss an
IoT solution with us, then request it as a service, which leads to a different approach to the
potential of IoT and the complementarities with the specific core activities of the company
have been identified. Initially, the innovation division focused on research, identifying new
ideas and developing projects (...) that could lead to the discovery of new market niches
and the development of proprietary solutions. Then, among market trends, the future
business potential of the IoT was identified and became the focus. ”
The third strategic orientation adopted by companies in the sample is the entrepreneurial
orientation. The companies in the sample are innovative and proactive in their strategic
actions, taking the initiative and calculated risks to develop IoT solutions, and are among
the first movers in the market. As one general manager explained, “Once top management
understood the IoT phenomenon, we made the decision to be proactive, to be among the
first to develop IoT solutions and to create a new IoT business”.
The theoretical coding of our qualitative data led us to discover that adaptive marketing
capabilities also play an important role in business model innovation for IoT solutions. The
capability of vigilant market learning allows the generation of valuable insights about the
latent and future needs of the customers. For example, an R&D director pointed out that
“they have identified the need for new solutions to ensure resource planning and product
traceability, simultaneously solving the problem of capturing data from existing
equipment”. Thus, speaking and listening to customers are essential activities to discover
unarticulated needs and to help identify potentially disruptive trends that require business
model changes. In addition, IoT developers are expanding their understanding of how IoT
technology can improve the customer's operations processes and how it can add value to the
customer's business.
Adaptive market experimentation capability has been identified as an important factor in
driving business model innovation. Some managers adopt a trial and error approach to
conducting internal and market experiments to enhance learning and good practice
development. The general manager of a company explained this approach as follows:
“Initially, we test the IoT solution at home and only after that we offer it to the market.
Testing products and services in the real context of customer use is essential. The feedback
provided by the customer gives us the opportunity to learn how to continuously improve the
quality of the products and services we offer to the market. Different types of solutions have
been tested on the market and some of them have proven their viability.”
Open marketing capability seems to play a significant role in driving business model
innovation for IoT solutions. The IoT developers in the sample strive to integrate into
alliances, business ecosystems, networks and communities for organizational learning and
marketing communication. In this regard, an R&D director pointed out that “The first thing
was to join an alliance that aims to standardize a communication protocol to promote
market development. The company benefits from access to information about this protocol,
its standards and the accessibility of IoT technology solutions”. Furthermore, these
managers also leverage the resources of any external partners, such as virtual communities
of interest, to build customer awareness and trust in IoT solutions.
An innovation-centred company culture has been revealed as a factor that encourages
innovative behaviours such as experimenting with new technologies and business models.
In this line, a general manager from the sample emphasized that “company culture
stimulates openness to new technological trends”. Encouraging the exploration of the
unknown is an another interesting feature of this culture, as revealed by an R&D director:
4. Discussions
Companies need to innovate continuously their business model in response to the
uncertainty generated by technology and market changes in order to sustain their long-term
competitive advantage (Foss and Saebi, 2018). Successful innovation of the business model
for IoT solutions requires companies to adopt strategic orientations towards market,
technology and entrepreneurship (Chesbrough and Rosenbloom, 2002). These strategic
orientations generate a value system (Zhou, Yim and Li, 2005) and an external perspective
in aligning the company's strategies with the environmental dynamics (Zhou and Li, 2010),
creating the conditions for increasing long-term performance. Despite this, in the field of
strategic management and marketing, limited efforts have been dedicated to studying the
strategic factors of business model innovation for IoT solutions. To fill this knowledge gap,
this paper contributes to deepening the understanding of the business model innovation
phenomenon and guiding managers in this process.
First, this study identified links between proactive market orientation, technology
orientation, and entrepreneurial orientation with business model innovation for IoT
solutions. This is consistent with previous research in strategic marketing that demonstrates
the positive influence of these strategic orientations on innovation and performance
(Gatignon and Xuereb, 1997; Atuahene-Gima, 2001; Zhou, Yim and Tse, 2005). Second,
the potential of adaptive marketing capabilities to facilitate business model innovation for
IoT solutions was highlighted. This finding confirms the idea that capitalizing on the
company's strategic orientations requires complementary resources such as marketing
capabilities (Zhou, Yim and Li, 2005; Zhou and Li, 2010). Third, a facilitative leadership
and an innovative organizational culture have been found to play an important role in
stimulating business model innovation for IoT solutions. This finding is in line with
previous empirical research that revealed the role of top management support in
implementing market orientation (Narver and Slater, 1990) and the role of top managers in
developing new capabilities for capitalizing on new technologies (Srinivasan, Lilien and
Rangaswamy, 2002). Fourth, managers have formulated their expectation that competitive
advantage and customer satisfaction will be the main results of business model innovation
for IoT solutions. This is consistent with the results of previous research that supports the
contribution of business model innovation to competitive advantage (Casadesus-Masanell
and Zhu, 2013; Bashir and Verma, 2019) and to company performance (Karimi and Walter,
2016; Visnjic, Wiengarte and Neely, 2016).
Conclusions
This research makes some theoretical contributions to explaining the strategic factors of
business model innovation for IoT solutions from the perspective of RBV theory. Thus,
links were identified between proactive market orientation, technology orientation and
entrepreneurial orientation with business model innovation for IoT solutions. Moreover,
adaptive marketing capabilities have the potential to facilitate business model innovation
for IoT solutions, while a facilitative leadership and an innovative organizational culture
play an important role in supporting business model innovation for IoT solutions.
Consequently, the competitive advantage and customer satisfaction are the main results of
the innovation of the business model for the IoT solutions expected at the managerial level.
From a methodological point of view, this paper expands the scope of Grounded theory in
researching the phenomenon of business model innovation for IoT solutions in the context
of an emerging economy.
The results of this research are relevant for business practice, providing managers with
guidance in business model innovation for IoT solutions. Understanding the strategic
factors of business model innovation for IoT solutions will help managers make decisions
about developing the complementary assets and capabilities needed to facilitate business
model innovation for IoT solutions and to take advantage of technological innovations.
Capitalizing on technological innovations requires innovation both in terms of components
References
Adams, P., Bodas Freitas, I.M., and Fontana, R., 2019. Strategic orientation, innovation
performance and the moderating influence of marketing management. Journal of
Business Reseach, 97, pp. 129-140.
Alberti-Alhtaybata, L.V., Al-Htaybat, K., and Hutaibat, K., 2019. A knowledge
management and sharing business model for dealing with disruption: The case of
Aramex. Journal of Business Research, 94, pp. 400-407.
Amit, R. and Zott, C., 2001. Value creation in e-business. Strategic Management Journal,
22(6/7), pp. 493-520.
Aspara, J., Hietanen, J., and Tikkanen, H., 2010. Business model innovation vs. replication:
Financial performance implications of strategic emphases. Journal of Strategic
Marketing, 18(1), pp. 39-56.
Atuahene-Gima, K., 2001. An empirical investigation of the effect of market orientation
and entrepreneurship orientation alignment on product innovation. Organization
Science, 1(2), pp. 54-74.
Avlonitis, G.J. and Salavou, H.E., 2007. Entrepreneurial orientation of SMEs, product
innovativeness, and performance. Journal of Business Research, 60, pp. 566-575.
Barbour, O. and Luiz, J., 2019. Embracing solutions-driven innovation to address
institutional voids: The case of uber and the middle of the pyramid. California
Management Review, 62(1), pp. 31-52.
Barney, J., 1991. Firm resources and sustained competitive advantage. Strategic
Management Journal, 17(1), pp. 99-120.
Barney, J., 2014. How marketing scholars might help address issues in resource-based
theory. Journal of the Academy of Marketing Science, 42, pp. 24-26.
Bashir, M. and Verma, R., 2019. Internal factors and consequences of business model
innovation. Management Decision, 57(1), pp. 262-290.
Berthon, P., Hulbert, J.M., and Pitt, L.F., 1999. To Serve or create? Strategic orientations
toward customers and innovation. California Management Review, 42(1), pp. 37-58.
Blocker, C.P., Flint, D.J., Myers, M.B., and Slater, S.F., 2011. Proactive customer
orientation and its role for creating customer value in global markets. Journal of the
Academy of Marketing Science, 39(2), pp. 216-233.
Brege, H. and Kindstrom, D., 2020. Exploring proactive market strategies. Industrial
Marketing Management, 84, pp. 75-88.
Casadesus-Masanell, R. and Ricart, J.E., 2010. From strategy to business models and onto
tactics. Long Range Planning, 43(2/3), pp. 195-215.
Casadesus-Masanell, R. and Zhu, F., 2013. Business model innovation and competitive
imitation: The case of sponsor-based business models. Strategic Management Journal,
34(4), pp. 464-482.
Chen, Y.-C., Li., P.-C. and Evans, K.R., 2012. Effects of interaction and entrepreneurial
orientation on organizational performance: Insights into market driven and market
driving. Industrial Marketing Management, 41, pp. 1019-1034.
Chesbrough, H., 2007. Business model innovation: it’s not just about technology anymore.
Strategy and Leadreship, 35(6), pp. 12-17.
Chesbrough, H. and Rosenbloom, R.S., 2002. The role of the business model in capturing
value from innovation: evidence from Xerox Corporation’s technology spin-off
companies. Industrial and Corporate Change, 11(3), pp. 529-555.
Chryssochoidis, G., Dousios, D. and Tzokas, N., 2016. Small firm adaptive capability,
competitive strategy, and performance outcomes: Competing mediation vs. moderation
perspectives. Strategic Change, 25(4), pp. 441-466.
Ciampi, F., Demi, S., Magrini, A., Marzi, G. and Papa, A., 2021. Exploring the impact of
big data analytics capabilities on business model innovation: The mediating role of
entrepreneurial orientation. Journal of Business Reseach, 123, pp. 1-13.
Clauss, T., 2017. Measuring business model innovation: Conceptualization, scale
development, and proof of performance. R&D Management, 47(3), pp. 385-403.
Kozlenkova, I.V., Samaha, S.A. and Palmatier, R.W., 2014. Resource-based theory in
marketing. Journal of the Academy of Marketing Science, 42, pp. 1-21.
Lamore, P.R., Berkowitz, D. and Farrington, P.A., 2013. Proactive/responsive market
orientation and marketing-research and development integration. Journal of Product
Innovation Management, 30(4), pp. 695-711.
Lumpkin, G.T. and Dess, G.G., 1996. Clarifying the entrepreneurial orientation construct
and linking it to performance. Academy of Management Review, 21, pp. 135-172.
Martin, S.L. and Javalgi, R.G., 2016. Entrepreneurial orientation, marketing capabilities
and performance: The Moderating role of Competitive Intensity on Latin American
International New Ventures. Journal of Business Research, 69, pp. 2040-2051.
Mezger, F., 2014. Toward a capability-based conceptualization of business model
innovation: Insights from an explorative study. R &D Management, 44(5), pp. 429-449.
Miller, D., 1983. The correlates of entrepreneurship in three types of firms. Management
Science, 29(7), pp. 770-791.
Moorman, C., 1995. Organizational market information processing: Cultural antecedents
and new product outcomes. Journal of Marketing Research, 32(3), pp. 318-335.
Moorman, C. and Rust, R.T., 1999. The role of marketing. Journal of Marketing, 62(SI),
pp. 180-197.
Morris, M.H., and Paul, G.W., 1987. The relationship between entrepreneurship and
marketing in established firms. Journal of Business Venturing, 2(2), pp. 247-259.
Mütterlein, J. and Kunz, R.E., 2017. Innovate alone or with others? Influence of
entrepreneurial orientation and alliance orientation on media business model innovation.
Journal of Media Business Studies, 14(3), pp. 173-187.
Narver, J.C. and Slater, S.F., 1990. The effect of a market orientation on business
profitability. Journal of Marketing, 54, pp. 9-16.
Narver, J.C., Slater, S.F. and MacLachlan, D.L., 2004. Responsive and proactive market
orientation and new-product success. Journal of Product Innovation Management,
21(5), pp. 334-347.
Oktemgil, M. and Gordon, G., 1997. Consequences of high and low adaptive capability in
UK companies. European Journal of Marketing, 31(7), pp. 445-466.
Osterwalder, A., Pigneur, Y. and Tucci, C.L., 2005. Clarifying business models: Origins,
present, and future of the concept. Communications of the Association for Information
Systems, 16, pp. 1-25.
Ozdemir, S., Kandemir, D. and Eng, T.-E., 2017. The role of horizontal and vertical new
product alliances in responsive and proactive market orientations and performance of
industrial manufacturing firms. Industrial Marketing Management, 64, pp. 25-35.
Paiola, M. and Gebauer, H., 2020. Internet of things technologies, digital servitization and
business model innovation in BtoB manufacturing firms. Industrial Marketing
Management, 89, pp. 245-264.
Porter, M.E. and Happelmann, J.E., 2014. How smart, connected products are transforming
competition. Harvard Business Review, 92(11), pp. 64-88.
Saeed, S., Yousafzai, S.Y. and Engelen, A., 2014. On Cultural and Macroeconomic
Contingencies of the Entrepreneurial Orientation-Performance Relationship.
Entrepreneurship Theory and Practice, 38(2), pp. 255-290.
DOI: 10.24818/EA/2021/57/412
Abstract
The adoption of wind energy has grown significantly in recent years. New, cost-effective
technologies have been developed, led by customer awareness of green technologies and a
legal framework proposed at the European Union level. The stochastic nature of wind speed
is transferred to wind turbine output, making wind energy difficult to predict. The main scope
of predicting wind energy production is to be proactive in balancing and reserving energy to
meet demand. When the prediction identifies a potential gap between supply and demand,
additional energy from other sources must be generated and supplied. Creating a synergy of
physical devices through advanced sensing capabilities, software, storage and analytics
capabilities, the Industrial Internet of Things is enabling the effective transition to wind
energy through automation by removing many of the disadvantages in a way that has recently
become accessible. This research focuses on the data analytics, proposing a fast univariate
network-based approach for wind energy prediction, using Feed Forward Neural Networks,
Recurrent Neural Networks, Long-Short Term Memory, Gated Recurrent Unit, and
Convolutional Neural Networks. Moreover, by introducing the theoretical fundamentals, the
implementation method and the hyperparameters of the final models, this article becomes
unique in the context of wind energy. At the time of this study, no prior research studies have
presented a direct comparison between feedforward, recurrent, and convolutional neural
networks ‒ these being the most important in the field of supervised learning.
Keywords: machine learning, artificial neural networks, wind energy, internet of things,
industrial internet of things
JEL Classification: O13, O14, O31, Q47, C45
*
Corresponding author, Adrian-Nicolae Buturache ‒ e-mail: ad.buturache@yahoo.ro
Authors’ ORCID:
Adrian-Nicolae Buturache: orcid.org/0000-0002-6146-2992
Stelian Stancu: orcid.org/0000-0002-4727-993X
1. Literature review
Methods for wind energy prediction can be grouped depending on the timescale (short-term,
medium-term, long-term), model type (physical, statistical, machine learning, hybrid) and
the variety of parameters (univariate, multivariate). Physical models are built on the
exogenous variables that influence energy production. However, being deterministic, they
are dependent on the location and physical properties of the environment in which the wind
turbines are located, making them less versatile than other models. In these models, another
important aspect is that for all methods of prediction, either the output energy is predicted
directly, either firstly wind speed is predicted and then based on power curves, the energy is
determined analytically. Most literature uses the indirect method, as described below. An
error correction model, based on a bidirectional gated recurrent unit neural network, is
proposed to correct the error of the numerical weather prediction of wind speed (Ding, et al.,
2019). The results outperformed the selected benchmark models for short-term power
prediction and the same approach could also be used for medium and long-term predictions.
Using the same univariate machine learning model, Long-Short Term Memory (LSTM) and
One-dimensional Convolutional Neural Networks (1D-CNN) can be implemented (Fukuoka,
et al., 2018). In this study both LSTM and 1D-CNN provide better performances than the
Feed Forward Neural Networks (FFNN). Another way to extract meaningful information
from a time series is represented by Empirical Wavelet Transform (Wang and Hu, 2015),
then the GPR (Gaussian Process Regression) model combines, in a nonlinear way, the
predictions generated by other models like ARIMA (Autoregressive Integrated Moving
Average), ELM (Extreme Learning Machine) and SVM (Support Vector Machine). This
method is more accurate than the standalone models for predicting short-term wind speed at
two sites. An example of ARIMA implementation on real operational data illustrates the
improvement in reducing energy buffers, resulting in a cost reduction by accurately
predicting wind speed (Eldali, et al., 2016). A similar outcome can be achieved by direct
predicting of the wind power (Pant and Garg, 2016). The model performance can also be
improved by dividing the year into months and building separate models for each of them
(Chen and Lai, 2011). The comparison of ARIMA and FFNN reveals that for each month,
and for one hour, two hours, three hours, and four hours ahead, FFNN outperforms ARIMA.
Under the direct wind energy prediction, a hybrid approach has been tried that consists of
using a non-linear model for the non-linear component of the time series, and a statistical
model for the linear factor. An example of this is using ARIMA for the linear and RBFNN
(Radial Basis Function Neural Network) for the non-linear component. For large data
similarity and a high-density time series, a preprocessing step for extracting the change trend
information can be used (Liu, Ding and Jia, 2020). A K-means clustering method is proposed
for obtaining a new time series that compresses the data, facilitates storage and utilization,
and eliminates noise. The resulting time series is then used as input for ARIMA, SVM, GPR,
ESN (Echo State Network), GRU (Gated Recurrent Unit), A-RNN (Attention Recurrent
Neural Network), Input-Attn-RNN (Input Attention Recurrent Neural Network) and DA-
RNN (Dual-stage Attention based Recurrent Neural Network). Except SVM, the results from
all of the selected models were similar, proving the versatility of the network-based models.
Machine learning-based approaches enable researchers to study wind energy production
without having much industry experience. These flexible and highly scalable models
outperform existing models in fast univariate prediction tasks. Currently, there is a gap in
direct univariate wind energy prediction. Furthermore, a comprehensive analysis of the most
important network-based models is necessary, specifically to align with the challenges faced
2. Theoretical fundamentals
2.1. Feed Forward Neural Networks
The artificial neural network (ANN) concept was first introduced by McCulloch and Pitts
(1943). Inspired by the human brain, ANN aims to replicate the way information flows
between neurons. However, only after backpropagation was introduced (Rumelhart, Hinton
and Williams, 1986) did ANN start to demonstrate its capabilities. By implementing
backpropagation, the synaptic weights between neurons are updated according to the expected
result. The value of the synaptic weight provides information about how important the inputs
are to achieve the maximum possible accuracy. FFNN represents an instance of the ANN in
which the information is processed while passing forward through the network, traveling from
the input layer through hidden layers and, finally, the output layer (figure no. 1). Each layer
consists of neurons, representing the computational units of the network.
y=f(z) (1)
n
z= � xi wi +b (2)
i=1
Using the activation function introduces non-linearity into the neuron’s output. The neuron
will be fired if the output value is greater than a given threshold, or it can be inhibited if the
output is smaller than the threshold (equation 3). For the RELU (rectified linear unit)
activation function:
y=f(z)=max(0,z) (3)
Backpropagation means the information travels back from the output layer to the input layer.
The model’s error is used to update the network parameters, with respect to the objective
function (i.e., error minimization). The way network parameters are updated is governed by
the optimization algorithm (Kingma and Ba, 2015).
2.2. Recurrent Neural Networks
A Recurrent Neural Network (RNN) can be obtained when feedback connections are added,
and are performant while using sequential data. The applications in the time series field are
important since the prediction of a time step may depend on multiple steps backwards. The
RNN can be defined using the following equations (Pascanu, et al., 2014):
Where xt = input vector; ht = hidden state; ht-1 = previous step hidden state; yt = output vector;
W, U, V= parameter matrices and fh , fo =activation functions. The input xt and the previous
hidden state ht-1 are concatenated. The newly created vector contains information of both the
current input and the previous state. This vector is passed through a tanh activation function,
resulting in output of the current state. The tanh layer regulates the output by fitting the values
between -1 and 1 (figure no. 2).
Where U f and W f are the weights of the current state input and previous cell output, with
respect to the forget gate. The input gate consists of two mathematical layers. The first layer
decides the new information that will be stored in the cell state (equation 7). This layer acts
in a similar way to the forget gate: current state input and previous state cell output are passed
through a sigmoid function. The differentiation is made by considering its own bias and
weights for the current input and previous state cell output, bi , U i and W i , respectively.
The second layer of the input gate takes the same current input and previous cell state and passes
them through a tanh activation function (equation 8). This time, the bias and the weight matrices
are specific to this second layer. The new candidate for the cell state is calculated as:
At this point, it decides what information is to be kept from the previous cell state, through
the pointwise multiplication of the forget gate vector with the previous state cell vector. The
newly computed cell state (equation 9), current input 𝑥𝑥𝑡𝑡 and previous hidden state ht-1 are
then used to compute a new hidden state. The output is calculated using the current state input
and the previous hidden state, both with weights appropriate for this gate:
ot =σ(xt U o +ht-1 W o +bo ) (10)
Through a tanh activation function, the newly calculated cell state Ct is regulated and further
multiplied with the output gate result:
ht =tanh(Ct )∙ot (11)
Now the current cell state Ct , known as long-term memory and the hidden state ht , known as
short-term memory are computed. The logic described above is repeated for all the new time
steps considered. The output of each time step is obtained using the short-term memory.
2.4. Gated Recurrent Unit
GRU it is a relatively new design (Cho, et al., 2014), which has been gaining popularity since
its inception. As with the LSTM, this design aims to reduce the issues related to long-term
dependencies and vanishing or exploding gradients. GRU logic is similar to that implemented
in the LSTM, in that the information flow is regulated by a gating system (figure no. 4).
The update gate works in the same way as LSTM’s input gate, filtering the information
coming from the previous state and the information of the current input, selecting the new
information to be added.
Where r (equation 12) and z (equation 13) indicate that the weights are proper for the reset
gate and the update gate. If the values of the update gate are close to one, then the information
of the old state is kept, while the current state input is ignored. The reset gate ensures the
short-term dependencies are captured, while the update gate does the same but for long-term
dependencies. The new hidden state candidate is governed by the following equation:
� � �
h�t =tanh�xt U h +(ht-1 ∙rt )W h +b ht � (14)
After assimilating the effect of the reset gate into the new hidden state candidate, then the
impact of the update gate output is incorporated into the current hidden state:
In this way, GRU manages to deal with short and long-term dependencies and gradient-
related issues with less calculations, being less computationally expensive than the LSTM.
The forward propagation in a 1D CNN layer uses the following equation (Kiranyaz, et al.,
2020):
Nl-1
through the activation function, the input xkl , the intermediate output ykl can be obtained.
As a step-by-step approach, first a kernel must be selected, which is then translated along the
time series, one step at a time. For each step, the dot product of the kernel is calculated and
fitted to the time series. The convolution is represented by the resulting sequence of dot
products between the kernel and time series (End to End Machine Learning School, 2020).
The pooling layer functions to reduce the number of trainable parameters and to retain the
information. Flattening the pooling layer output results in a one-dimensional array, which
has the right shape for using in the fully connected layer, which is essentially a feed forward
neural network.
3. Methodology
Between 2005 and 2017 the amount of wind energy produced by the European Union
increased by 414%. Romania is one country which has reached the European Commission
target for renewable energy for 2020 (European Court of Auditors, 2019), having a total wind
power capacity of 3040 MW (Sava, 2020). In 2018, 42% of Romania’s energy consumption
was represented by renewable energy, while the average in the European Union is 32%. Of
this, 15% of Romania’s renewable energy is created by wind energy (Botea, 2020). This
Wind energy
15336 774.03 665.99 0 237 573 1165.5 2809
production
Note: Count = total number of data points; std = standard deviation; min = minimum value; 25% =
first quartile; 50% = median value; 75% = third quartile; max = maximum value.
Figure no. 7 shows the average wind energy production, plotted by day. This data confirms
the intermittent nature of wind energy.
Results
Model Parameters
Training
𝑅𝑅2 MAE
Time[s]
FFNN batch=8, e=197, nn=47, hl=2, opt=Adam, 0.963 82.3 350.7
lr=0.001, wi=Xavier Uniform, activation=RELU
Due to the highly configurable character of network-based models and their outstanding
capability to learn and generalize, the results can be considered meaningful and reliable.
There are no significant differences between RNN, LSTM and GRU, in terms of 𝑅𝑅2 and
MAE. However, the LSTM training time is expected to be the longest, due to its complex
Conclusions
The energy industry must keep pace with the other industries that it is setting in motion.
Energy demand, and the way customers use it, is becoming more complex. The pattern of
consumption is highly influenced by the devices used, while the distributed character of the
power systems is influenced by household or small business renewable energy systems. The
key to safe and optimal operation of power grids relies on predictability across the entire
energy supply chain. IoT technologies can act as enablers, gathering together all the “things”
to create synergy. Geographically dispersed assets can, with the help of IIoT technologies,
be managed more efficiently, preventing and minimizing the costly downtimes, while
maximizing the output and reducing the negative impact of production volatility. Through
IIoT, multiple energy resources, such as solar, geothermal, hydro and biomass, can be
integrated and managed. As well as the IIoT, the CIoT is crucial for providing an end-to-end
solution. The predictive analysis results from this case study show that LSTM produced the
best prediction. Even with the long training time, the impact of such a prediction in a business
will create the premises for a proper hardware upgrade to reduce the training time. This will
allow the prediction to be made within consecutive data points for a more discrete time scale.
MAE gives a measure of the performance in relation to an absolute value, namely the energy
produced. In the case of RNN, LSTM, and GRU, the MAE values are differentiated at the
decimal level and even if the unit of measurement is MW, at the time of deployment in
production other elements must be considered. For a fully informed deployment, it is
important that the three models are used in parallel to determine the best solution. The
complexity of the tasks for identifying the parameters and the stability of the models or the
frequency with which the training must be repeated are decisive in selecting the best solution.
The values of R2 are close between the selected models and are also close to the value 1,
meaning that the models can, to a large extent, explain the variability in the results.
Comparing the results with those obtained by other researchers was not possible due to the
way the metrics are typically selected; specifically, the metrics allow a comparison of models
that are trained using the same data set, but do not allow a comparison of models trained on
different data sets. In this regard, the use of the coefficient of determination, the complete
description of the models’ parameters, and the software and hardware configuration will
allow other researchers to use this article for comparative studies. The performance of the
models might be increased by adding exogenous variables, such as wind speed, wind shear,
ambient temperature and pressure, dew point temperature and humidity.
References
Abdeljaber, O., Avci, O., Kiranyaz, S., Boashash, B., Sodano, H. and Inman, D., 2017. 1-D
CNNs for Structural Damage Detection: Verification on a Structural Health Monitoring
Benchmark Data. Neurocomputing, [e-journal] 275, pp.1308-1317. 10.1016/
j.neucom.2017.09.069.
Al-Ali, A.R., 2016. Internet of Things Role in the Renewable Energy Resources. Energy
Procedia, [e-journal] 100, pp.34-38. 10.1016/j.egypro.2016.10.144.
Ashton, K., 2009. That “Internet of Things” Thing: In the Real World Things Matter More
than Ideas. RFID Journal, 22(7), pp.97-114.
Bengio, Y., Simard, P. and Frasconi, P., 1994. Learning long-term dependencies with
gradient descent is difficult. IEEE Transactions on Neural Networks, [e-journal] 5(2),
pp.157-166. 10.1109/72.279181.
Botea, R., 2020. Energiile regenerabile au acoperit 42% din consumul de energie al
României, cu 10 puncte procentuale peste media europeană. [online] Available at:
<https://www.zf.ro/eveniment/energiile-regenerabile-au-acoperit-42-din-consumul-de-
energie-al-romaniei-cu-10-puncte-procentuale-peste-media-europeana-18764797>
[Accessed 19 October 2020].
Chen, L. and Lai, X., 2011. Comparison between ARIMA and ANN models used in short-
term wind speed forecasting. In: IEEE, 2011 Asia-Pacific Power and Energy Engineering
Conference. Wuhan, China, 25-28 March 2011. S.l.: IEEE. 10.1109/
APPEEC.2011.5748446.
Cho, K., van Merriënboer, B., Gulcehre, C., Bougares, F., Schwenk, H. and Bengio, Y., 2014.
Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine
Translation. In: s.n., Proceedings of the 2014 Conference on Empirical Methods in
Natural Language Processing (EMNLP). Doha, Qatar, 25-29 October 2014. S.l.: s.n.
10.3115/v1/D14-1179.
Chollet, F., 2017. Deep Learning with Python. Greenwich: Manning Publications.
Ding, M., Zhou, H., Xie, H., Wu, M., Nakanishi, Y. and Yokoyama, R., 2019. A gated
recurrent unit neural networks based wind speed error correction model for short-term
wind power forecasting. Neurocomputing, [e-journal] 365, pp.54-61.
10.1016/j.neucom.2019.07.058.
McCulloch, W.S. and Pitts, W., 1943. A logical calculus of the ideas immanent in nervous
activity. Bulletin of Mathematical Biophysics, 5, pp.115-133.
Neon Neue Energieökonomik, 2020. Open Power Systems Data: Load, wind and solar,
prices in hourly resolution. [online] Available at: <https://data.open-power-system-
data.org/time_series/2020-10-06> [Accessed 19 October 2020].
Pant, P. and Garg, A., 2016. Forecasting of Short Term Wind Power Using ARIMA Method.
International Journal for Research in Applied Science & Engineering Technology
(IJRASET), 4(3), pp.356-361.
Pascanu, R., Gulcehre, C., Cho, K. and Bengio, Y., 2014. How to Construct Deep Recurrent
Neural Networks. In: ICLR, 2nd International Conference on Learning Representations.
Banff, Canada, 14-16 April 2014. S.l.: s.n.
Rumelhart, D., Hinton, G. E. and Williams, R.J., 1986. Learning representations by back-
propagating errors. Nature, [e-journal] 323, pp.533-536. 10.1038/323533a0.
Sava, J.A., 2020. Onshore wind energy capacity in Romania 2008-2019. [online] Available
at: <https://www.statista.com/statistics/870766/onshore-wind-energy-capacity-in-
romania/> [Accessed 21 December 2020].
Singh, V., 2020. 10 Benefits of Using Cloud Storage. [online] Available at:
<https://cloudacademy.com/blog/10-benefits-of-using-cloud-storage/> [Accessed 19
October 2020].
Yun, M. and Yuxin B., 2010. Research on the architecture and key technology of Internet of
Things (IoT) applied on the smart grid. In: IEEE. 2010 International Conference on
Advances in Energy Engineering. Beijing, China, 19-20 June 2010. S.l.: s.n.
10.1109/ICAEE.2010.5557611.
Wang, J. and Hu, J., 2015. A robust combination approach for short-term wind speed
forecasting and analysis – Combination of the ARIMA (Autoregressive Integrated
Moving Average), ELM (Extreme Learning Machine), SVM (Support Vector Machine)
and LSSVM (Least Square SVM) forecasts using a GPR (Gaussian Process Regression)
model. Energy, [e-journal] 93(P1), pp.41-56. 10.1016/j.energy.2015.08.045.
Zhang, A., Lipton Z.C., Li, M. and Smola, A.J., 2020. Dive into Deep Learning. [online]
Available at: <https://d2l.ai/chapter_convolutional-neural-networks/index.html>
[Accessed 20 December 2020].
DOI: 10.24818/EA/2021/57/429
Abstract
The use of Internet of Things devices (IoT) by individuals in their homes has led to new
opportunities for companies, to adapt their products, services and offers, based on the user
profile. At the same time, these new services involve the reinterpretation of existing
requirements regarding data protection, especially in terms of the ethics of using data and
the security of personal data. The paper analyses in the scientific literature the intrusiveness
generated by aggregations of personal data, the responsibility for data protection and user's
perception of these issues. It presents further the results of a quantitative research on
183 respondents of all genders and working in different sectors of activity, with the aim of
assessing the perception of intrusiveness and data protection in the use of their smart
devices, with potential for IoT home interconnection. The results provide a new perspective
on how smart device users relate to key issues from European data protection legislation.
The study shows that there are differences explained by gender, age and parental status in
the perception of intrusiveness and responsibilities for ensuring the security of aggregated
data through IoT solutions. The results also show that accessing certain types of data is
perceived as being more intrusive than others, and that respondents rely on other users'
reviews to learn how data protection is provided through the IoT device.
Keywords: Internet of Things (IoT); GDPR; smart homes; smart devices; intrusiveness;
data protection; data security;
JEL Classification: L86, M31, N44
∗
Corresponding author, Irina Maiorescu – e-mail: irina.maiorescu@com.ase.ro
Authors’ ORCID:
Irina Maiorescu: orcid.org/0000-0003-1472-5136
Larisa Gabudeanu: orcid.org/0000-0002-2562-5344
Alexandru - Lucian Vîlcea: /orcid.org/0000-0002-0870-5668
Gabriel – Cristian Sabou: orcid.org/0000-0001-6428-2930
Marian Dârdală: orcid.org/0000-0003-2087-8817
Introduction
IoT solutions can be used in various areas, from industrial ones (e.g. factories, agriculture,
producing and distributing energy), to those in the public interest (e.g. smart cities, smart
and interconnected vehicles) and individual ones, such as smart homes (Maayan, 2020). In
the last years, the use of smart devices with the potential of interconnection within IoT
networks has increased (Statista, 2021). This rise has been noticed both for businesses,
approximatively 34% of them using IoT solutions in 2019 (Vodafone, 2019), and for
individuals (Maple, 2017).
People use various types of IoT solutions for their personal comfort and within their homes,
such as smart TV, smart personal assistants, utility devices (e.g. light sources, outlets),
smart surveillance cameras, smart electronic devices such as refrigerator, vacuum cleaner,
air conditioning (Zheng et al., 2018), often in connection with a smart phone, smart watch
or computer. There are debates in the scientific literature whether the smartphone can be
included in the category of IoT objects (Futurelearn, 2020). However, the capabilities of
this device to collect and transmit user data, such as location, pulse, temperature,
applications used etc., turn it into IoT object (El Khaddar and Boulmalf, 2017; Norton,
2020). Furthermore, the European Union considers the term Internet of Things (IoT) as
making reference to “the general concept of objects (electronic devices and daily used
objects) that can be read, recognized, accessed, tracked and/or controlled remotely through
the internet” (JO, 2010). An IoT device is “smart” through its hardware part, but also
through its software part that can communicate and interact with the external environment,
with other IoT devices or with the general management of the IoT device network
(Dorsenmaine et al., 2015).
The interaction of these objects with the external environment and with other devices/IT
systems involves the collection, storing and transfer of significant amounts of data,
including personal data of their users or of those individuals found in their proximity. Such
aggregated data are very valuable for companies, because they lead to understanding
behavioural patterns, to creating user profiles (EDPS, 2016) – and, implicitly, exploiting
these for own commercial purposes. At the same time, these smart devices can be the target
of specific cybernetic attacks with the purpose of intercepting the data they transmit and
obtaining gains for such data.
Data collected by the IoT devices – most often personal data, are usually stored also in
other locations than in the IoT device used at home (such as cloud, various servers). For
this reason, their protection, which is a legal requirement (EU Regulation 679/2016) is
essential. The manner in which data has to be protected (including ensuring their security
against improper processing and against unauthorized access) and used is stated by existing
European legislation which includes the GDPR (EU Regulation 679/2016), liability for
products and services and consumer protection. The proportionality of data processing (as
mentioned under article 5 of the GDPR) implies the management of personal data in a
manner expected by the user and not in manners which have an unjustified effect over the
individual (ICO, 2018). Breaching the proportionality of data processing is closely linked to
the intrusiveness concept described in the GDPR. At the same time, certain types of
personal data need to be processed in order to ensure the security of IoT solution and for
the improvement of existing systems.
1. Literature review
In the last years, researchers and public or private entities have been focused on data
protection following its two main dimensions: collection, distribution and processing of
data, respectively, ensuring security of data (Torre et al., 2016; Duan et al., 2019).
Intrusiveness, as a consequence of insufficient data protection, brings different damages to
users (CNIL, 2018). As per European legislation, there are multiple principles to be taken
into account for ensuring data protection, such as predictability of data processing,
transparency of data protection mechanisms, reduction of aggregation to the minimum
required and accountability for data protection (EU Regulation 679/2016). However, this is
a topic that is not evaluated in a uniform manner, given the cultural differences, personal
opinion, evaluation criteria and the actual subjective nature of this concept (Solove and
Citron, 2017).
The user, whose personal data is being collected and processed, is the only one that can
evaluate the degree of feeling used and the damages incurred in this respect. The European
legislation provides the framework through which the user of smart devices benefits from
data protection, but whether he/she is informed and uses his/her rights is debatable (Haney,
Furman and Acar, 2020).
1.1. Intrusiveness of data provided through IoT devices
The breach of the GDPR principles by entities involved in the provision of IoT solutions
generates intrusiveness in the personal life of individuals whose data is collected and used
without their consent. The principle of predictability of processing, in order to be properly
implemented, requires a clear description of the reasons for which the data processing is
needed. For example, the automated security solutions, for providing efficient services,
have to access and analyse data that are not necessarily needed for the functioning of smart
devices (for example, IP address of the source/destination of the communication, patterns
of the traffic data, information concerning the network to which the device is connected
etc.) (Von Maltzan, 2019).
In addition, in order to avoid intrusiveness, the principle of data minimization has to be
implemented, which entails that only the data necessary for providing the service should be
collected and processed (Wright and Raab, 2014), taking into account the purpose of
processing, disclosing or processing the data (Comas and Ferrer, 2015). If the data have
already been collected and stored, the processing or disclosure to third parties has to respect
this principle as well (Bolognini et al., 2019). An example in this respect is the decision of
the European Court of Justice (ECJ, 2014) in terms of the metadata collected about an
individual. This decision found the collection of data for providing voice messaging or call
location, such as the telephone number or IP address of the device as being excessive, since
these can provide a detailed profile of the user (Barbaro, Zeller and Hansell, 2006). There is
research in this direction that has concentrated on the amount of data collected that is
considered by users as justified in exchange for benefiting from a specific service provided
by the IoT device (Naeini et al., 2017; de Boer, van Deursen and Van Rompay, 2019), but
finding a common ground for the proper data quantity that should be collected and
processed is difficult.
Unauthorized access to data is channelled through the vulnerabilities of the security
protocols. These cybernetic attacks target different level of the IoT networks and,
consequently, require a wide range of incident identification and prevention measures in
order to ensure protection. Initially, such measures targeted identification of known attack
types and static measures (Andrea, Chrysostomou and Hadjichristofi, 2015; Amanullah, et
al., 2020; Yoon, 2020). Nevertheless, in the last years, given the development rate of new
attack types, the idea of dynamic solutions has been adopted by using machine learning
(Badsha, Vakilinia and Sengupta, 2019; Chesney, Roy and Khorsandroo, 2020), for
identification of incidents in early stages (e.g. before exploitation). Currently, the security
solutions focus on confidentiality, integrity and availability, but they are beginning also to
analyse matters related to monitoring of data protection (Leloglu, 2017).
From a business perspective, preventing intrusiveness is closely linked to the principles
mentioned by the consumer protection legislation, and as such, influencing the way IoT
solutions are designed and implemented. Finding the balance between data confidentiality
and data processing in a non-intrusive manner ensures the stability for selling products and
services, given that users show a higher level of trust in such cases (Feng and Xie, 2019).
Thus, although European legislation aims to minimize the intrusiveness felt by the user, it is
important to find out how the user perceives this intrusiveness in relation to his/her personal
data that is taken and processed.
1.2. The responsibility for protecting data accessed through IoT devices
The accountability principle, according to the GDPR, refers to the responsibility for
implementing all appropriate mechanisms, procedures and controls (Wolters, 2017), to
ensure that all legal requirements concerning personal data are implemented and can be
proven (Working Party Article 29/2010). The clear explanation of the role and
responsibility of each stakeholder for personal data processing leads to increasing the trust
of the consumer and, implicitly, to positive effects on the long term.
raise the question of how appropriate, in fact, the different methods of informing users
about their data protection are.
1.4. Aspects concerning data protection in the context of data aggregation for
commercial purposes
Data aggregation is essential for creating user profiles to improve services or products, for
creating personalized offers (EDPS, 2016), as well as for providing targeted security
functionalities that can identify a threat at the moment it enters the network or very soon
after that moment (Working Party Article 29/2010). Big Data analysis on the aggregated
data about previous attacks ensures a better learning mechanism for the machine learning
algorithms used to identify and manage IoT network anomalies (Hussain et al., 2020). This
represents a method of enhancing the security of the entire IoT home system and,
consequently, of increasing users’ trust in such devices, and accordingly the number of IoT
devices in their homes (Thierer, 2015).
In case of complex systems, such as smart homes are, aggregation of data can be performed
by multiple entities: IoT device manufacturer, providers of IoT management software,
providers of the security solution installed etc. The aggregation can be local or general,
including all devices managed by the respective providers in the world; further, the
providers can transfer data between themselves with the aim of understanding better the
different user profiles (Datta, Tschantz and Datta, 2015).
Aggregation of users' personal data brings various benefits to companies, such as: reducing
costs and resources needed to create the traditional customer profile, hence increased time
and budget for research and innovation, appropriate delivery of services to customers etc.
Consumers also benefit from useful services provided at the right time, at a lower price,
without straining to find the most suitable offers (Elvy, 2017). On the other hand, data
aggregation and distribution can jeopardize transparency in the relationship with consumers
and involve great responsibilities (Tene and Polonetsky, 2013). From a user’s perspective,
collecting a large quantity of personal data or transferring it to third parties can be seen as
intrusive, except in cases when it is necessary for the functioning of the devices and the
negative consequences on him/her are mitigated (Kleek et al., 2018). This raises the
question of whether users perceive the intrusiveness differently, depending on the purpose
for which the data is aggregated (i.e. commercial purposes vs. data security).
1.5. Perception on data protection by users of smart home IoT devices
The studies concerning the perception of data confidentiality and security by IoT home
devices users indicate, in general, that they do not fully understand what data protection
entails and what happens to their data. The research performed by Abdi, Ramokapane and
Such (2019), which analyses the perception of users on Intelligent Personal Assistants
(IPA), shows that users did not understand or had an incomplete image about where their
personal data is stored, processed and disclosed. Another aspect of this research showed
that, although users are aware that IPAs have the capacity to learn, they are reluctant to
allow these devices to learn everything about them and about their behaviour. Even if users
are sceptical about the policies that IoT manufacturers have about how personal data is
processed, their confidentiality behaviour is not strongly influenced by these (Tabassum,
Kosinki and Lipford, 2019).
H6 – The perception of intrusiveness with the purpose of providing data security services is
not influenced by a) gender; b) age; c) parental status; corresponding to O 3 .
H7 – The perceived responsibility for processing data retrieved through IoT home devices
is not influenced by: a) gender; b) age; corresponding to O 4 .
H8 – The perceived liability for ensuring the security of respondents' data, when using IoT
home devices, is not influenced by: a) gender; b) age; corresponding to O 4 .
Consequently, we conducted a quantitative research aimed at assessing the intrusiveness
and protection of personal data, as perceived by users of IoT smart home solutions. Studies
indicate that using online questionnaires is increasingly popular, both in academia and in
business, because it has notable advantages (Aaker et al., 2013). Hence, the quantitative
research was based on an online questionnaire, designed on the Question Pro platform,
which contained 19 questions. It was initially tested in terms of clarity of wording on a mini
sample of 8 people. Following the feedback received, the questionnaire was revised for a
better understanding of the questions meaning. It was online distributed in October 2020 to
277 people, aged between 19 and 65, professionally active, living in different regions of the
country, through several accounts of LinkedIn social network which belong to people
working in the legal, teaching, business environment (sales and marketing), IT and
constructions ‒ engineering. Respondents who stated at the beginning of the questionnaire
that they do not have a smart device were asked to stop completing the questionnaire. The
sampling was non-probabilistic, with a total of 183 complete and valid questionnaire
responses.
The data taken from the online reporting platform of the questionnaire were first processed
with Microsoft Excel and then analysed with the statistical software Minitab 16. The
internal consistency of the results for the intrusion perception was verified, the Cronbach
Alfa coefficient being 0.773. Similarly, for the responsibility for data protection, the
Cronbach Alpha coefficient is 0.719, which provides the premises for their validity.
Table no. 2: The One Sample Wilcoxon Signed Rank test for evaluating respondents’
attitude about obtaining information about the processing of their personal data
Null hypothesis (H 0 ) vs.
Respondent’ Estimated
alternative hypothesis (H a ) P-value* Decision
s attitude median
– statistic context
I read the terms,
conditions and policies
Accept
regarding data 0.386 3.0
H0
protection related to the
device
I rely on friends’ median = 3.0 Accept
0.204 3.0
recommendations H0
vs. median >3.0
I rely on other users’
0.002 Reject H 0 3.5
reviews
I take into account the
utility of the device
Accept
without analysing how 0.991 3.0
H0
personal information is
processed
* significance level <0.05
Next, respondents were asked to rate on a scale of 1-5 the usefulness of the different
manners of obtaining their consent when being informed about data processing policies (see
table no. 3). Due to the skewness to the left of the analysed data sets (the skewness
coefficients being -1.61, respectively -0.94, -1.69 and -1.81) we tested the median against
the value of 4, on a scale from 1-5, using the Sign Test (Rotenstein, 2020).
Table no. 3: The sign test regarding the proper manners of giving informed consent
for the processing of personal data
Null hypothesis (H 0 ) vs.
Manner to get informed
alternative hypothesis (H a ) P-value* Decision Median
and give consent
– statistic context
During the installation 0.0000 Reject H 0 5.0
process
On the website of IoT median = 4.0 0.0046 Reject H 0 5.0
device manufacturer
versus
On email 0.0000 Reject H 0 5.0
median >4.0
In the software 0.0000 Reject H 0 5.0
application for the
management of the IoT
device
* 0.05 significance level
for commercial purposes (neither for personalized offers, nor for offers dedicated to all
users) and the intrusion in personal data for developing security solutions, the associated p-
values being 0.63, respectively 0.15). It is confirmed thus the set hypothesis H5.
To verify H6, whether the perception of the intrusiveness of data aggregation for
developing security solutions is influenced by the variables: gender, age or parental status,
we applied the Kruskal Wallis test. The test resulted in a statistically significant association
between intrusion and parental status. It appears that respondents, who are also parents,
consider in higher percentage than respondents without children (p-value = 0.049 <0.05, the
significance threshold) that access to their personal data and that of their family is highly
intrusive. No statistically significant differences in respondents' perceptions by gender or
age were observed. This invalidates H6.
In order to identify possible differences regarding the entities responsible for data
protection (O 4 ), depending on gender and age, we performed an analysis, both in terms of
appropriate, ethical collection and processing of data retrieved through IoT devices (H7), as
well as from the point of view of data security (H8).The respondents over 35 years consider
in a higher percentage than the other age categories that the responsibility for processing
the personal data belongs to the cloud storing solution provider (p value - 0.04). The male
respondents consider in a higher extent than female respondents, that the responsibility for
the collecting and processing of personal data by IoT devices belongs to the user and to the
manufacturer of the IoT device (p value 0.034, respectively 0.036). Therefore, H7 is
invalidated. Testing H8, we remarked that respondents over 45 years, consider in a higher
proportion than other age categories that the cloud storing solution administrator (p value -
0.001) and the provider of the security solution installed on the IoT devices (p-value 0.052)
are entities responsible in a very high degree for ensuring the security of the data. Again,
the male respondents consider in a higher percentage that the responsibility for ensuring the
security of data pertains to the user in a high degree (p-value 0.004). H8 is invalidated.
Table no. 9. Median of responsibilities for data protection (collecting – processing
and ensuring security) of various entities, on a scale from 1 to 5
Security
Mobile/desktop
IoT device solutions Cloud storage
Responsibility IoT management User
producer installed by administrator
software provider
user
Collecting and
4.0 5.0 4.0 5.0 4.0
processing data
Ensuring the
4.0 5.0 4.0 5.0 4.0
security of data
It is interesting to notice that, even though the questions related to the responsibility of
different entities on processing personal data and ensuring data security were not
consecutive in the survey, the median is identical (see table no.9). Confirming previous
research, the majority of users consider that the IoT device producers are responsible in a
high extent for data security (Zheng et al., 2018). However, from our analysis, that included
the other entities involved in data protection, the provider of the management software
solution and the cloud database administrators also share a high responsibility in processing
and securing personal data from IoT smart home solutions.
for which privacy policies are not read, in order to identify aspects that have to be improved
to ensure wider awareness and understanding of personal data processing consequences.
References
Aaker, D.A., Kumar, V., Leone, R.P. and Day, G.S., 2013. Marketing Research. 11th ed.
Danvers: John Wiley & Sons.
Abdi, N., Ramokapane, K.M. and Such, J.M., 2019. More than Smart Speakers: Security
and Privacy Perceptions of Smart Home Personal Assistants. In USENIX Association,
Fifteenth Symposium on Usable Privacy and Security, Santa Clara, CA, USA, 12-13
August 2019. Santa Clara: The USENIX Association.
Amanullah, M.A., Habeeb, R.A.A., Nasaruddin, F.H., Gani, A., Ahmed, E., Nainar, A.S.M.
and Imran, M., 2020. Deep Learning and Big Data Technologies for IoT Security.
Computer Communications, 151, pp. 495-517.
Andrea I., Chrysostomou C. and Hadjichristofi G., 2015. Internet of Things: Security
Vulnerabilities and Challenges. In IEEE, IEEE Symposium on Computers and
Communication (ISCC IEEE 2015), Larnaca, Cyprus, 6-9 July 2015. Larnaca: IEEE.
Badsha, S., Vakilinia, I. and Sengupta, S., 2019. Privacy Preserving Cyber Threat
Information Sharing and Learning for Cyber Defense. In IEEE, 2019 IEEE 9th Annual
Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV,
USA, 7-9 January 2019. Las Vegas: IEEE.
Barbaro, M., Zeller, T. and Hansell, S., 2006. A Face is Exposed for AOL Searcher no.
4417749. New York Times. 9 Aug, p.8.
Bolognini, L. and Balboni, P., 2019. IoT and Cloud Computing: Specific Security and Data
Protection Issues. Internet of Things Security and Data Protection ‒ Internet of Things,
pp. 71-70.
Castelluccia, C., Cunche, M., Le Metayer, D. and Morel, V., 2018. Enhancing
Transparency and Consent in The IoT. In IEEE, 2018 IEEE European Symposium On
Security and Privacy Workshops (Euros&Pw), London, 23-27 April. London: IEEE.
Chesney, S., Roy, K. and Khorsandroo, S., 2020. Machine learning algorithms for
preventing IoT cybersecurity attacks. In Arai K., Kapoor S., Bhatia R. (eds),
Proceedings of SAI Intelligent Systems Conference, London, 3-4 September. London:
Springer, Cham.
CNIL, 2018. Privacy Impact Assessment Guidance. French Data Protection Authority
[online]. Available at: <https://www.cnil.fr/en/privacy-impact-assessment-pia>
[Accessed 6 December 2020].
Comas, J.S. and Ferrer, J.D., 2015. Big Data Privacy: Challenges to Privacy Principles and
Models. Data Science and Engineering, 1, pp. 21-28.
Datta, A., Tschantz, M.C. and Datta, A., 2015. Automated Experiments on Ad Privacy
Settings: A Tale of Opacity, Choice and Discrimination. Proceedings on Privacy
Enhancing Technologies, 2015(1), pp. 92-112.
De Boer, P.S., van Deursen, A.J. and Van Rompay, T.J., 2019. Accepting the Internet-of-
Things in our homes: The role of user skills. Telematics and Informatics, 36, pp. 147-156.
Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N. and Urien, P., 2015. Internet of Things:
a definition & taxonomy. In Khalid Al-Begain and Nidal AlBeiruti, 2015 9th
International Conference on Next Generation Mobile Applications, Services and
Technologies, Cambridge, UK, 9-11 September. Cambridge: IEEE.
Kaltheuner, F. and Bietti, E., 2018. Data is power: Towards additional guidance on
profiling and automated decision-making in the GDPR. Journal of Information Rights,
Policy and Practice, 2(2), p.None.
Kim, S. and Yoon, J., 2016. An exploratory study on consumer’s needs on smart home in
Korea. In Marcus A. (eds), International Conference of Design, User Experience and
Usability, Toronto, Canada, 17-22 July 2016. Toronto: Springer, Cham.
Kleek, M.V., Liccardi, I., Binns, R., Zhao, J., Weitzner, D.J. and Shadbolt, N., 2017. Better
the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps. In
Association for Computing Machinery, Proceedings of The 2017 Chi Conference On
Human Factors in Computing Systems, Denver, 2 May. New York: Association for
Computing Machinery, pp.5208-5220.
Lee, G.Y., Cha, K.J. and Kim, H.J., 2019, Designing the GDPR Compliant Consent
Procedure for Personal Information Collection in the IoT Environment. In: IEEE,
Internet of Things (ICIOT) 2019 IEEE International Congress, Milan, 8-13 July. Milan:
IEEE.
Lee, S., 2019. Internalizing the Harm of Privacy Breaches: Do Firms Have an Incentive to
Improve Data Protection? An Event Study. TPRC47: The 47th Research Conference on
Communication, Information and Internet Policy.
Leloglu, E., 2017. A review of Security Concerns in Internet of Things. Journal of
Computer and Communications, 5, pp. 121-136.
Maayan, G.D., 2020. The IoT Rundown for 2020: Stats, Risks and Solutions. [online]
Available at: <https://securitytoday.com/articles/2020/01/13/the-iot-rundown-for-
2020.aspx> [Accessed 28 February 2021].
Maple, C., 2017. Security and privacy in the internet of things. Journal of Cyber Policy,
2(2), pp. 155-184.
Melicher, W., Sharif, M., Tan, J., Bauer, L., Christodorescu, M. and Leon, G.P., 2016. (Do
Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking.
Proceedings on Privacy Enhancing Technologies, 2, pp. 135-154.
Naeini, P.E., Bhagavatula, S., Habib, H., Degeling, M., Bauer, L. and Cranor, L.F., 2017.
Privacy expectations and preferences in an IoT world. Thirteenth Symposium on Usable
Privacy and Security ({SOUPS} 2017), pp. 399-412.
Neagu, L., 2021. Cum a schimbat pandemia piața de roboți casnici. [online] Available at:
<https://www.economica.net/cum-a-schimbat-pandemia-piata-de-roboti-
casnici_196906.html> [Accessed 28 February 2021].
Norton, 2021. What is The Internet of Things (IoT)? [online] Available at: <
https://us.norton.com/internetsecurity-iot.html> [Accessed 28 February 2021].
Polonetsky, J., Tene, O. and Finch, K., 2016. Shades of gray: seeing the full spectrum of
practical data de-identification. Santa Clara Law Review, 56(3), pp. 594-618.
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016
on the protection of natural persons with regard to the processing of personal data and
on the free movement of such data 2016. [online] Available at: <https://eur-
lex.europa.eu/eli/reg/2016/679/oj> [Accessed 2 December 2020].
Rey D., Neuhäuser M., 2011. Wilcoxon-Signed-Rank Test. In: M. Lovric (ed) International
Encyclopedia of Statistical Science. Berlin, Heidelberg: Springer.
DOI: 10.24818/EA/2021/57/448
Abstract
One may notice that there is a lack at a national level of studies providing scientific answers
to problems such as: data safety, security and confidentiality of the data, economic viability,
and impact, regarding internet interconnection of devices and equipment called the Internet
of objects, and in English the Internet of Things. The implementation in industry,
transportation and related services of the Internet of Things system is relatively new, being
known and developed by Romanian companies more in the last five years, according to our
study. The scientific research carried out was based on the semi-structured interview method,
recorded audio and video through the Zoom interface. Data processing of was carried out by
statistical methods advanced in the R program. The data obtained within the study provides
relevant information at the level of users in the analysed fields based on a qualitative research
and allows the creation of a first impression on the state of the implementation of the Internet
of Objects in Romania, which represents the basis for the initiation of more focused
quantitative research on all the implications of the development and use of the
interconnection of devices via the Internet or other interconnection access systems.
*
Corresponding author, Silviu-Gabriel Szentesi – e-mail: silviuszentesi@yahoo.com
Authors’ ORCID:
Silviu-Gabriel Szentesi: orcid.org/0000-0001-7254-040X
Lavinia Denisia Cuc: orcid.org/0000-0002-6416-259X
Ramona Lile: orcid.org/0000-0002-0021-0046
Paul Nichita Cuc: orcid.org/0000-0001-7434-3645
area in the future and new challenges for the research, for literature’s revision, research
methodology, results and their interpretation and conclusions.
1. The development of the IoT field in the coming period and the new challenges for
research
IoT development gained a huge momentum in 2013-2020, thus there was an increase in the
number of IoT devices from half to twice as many compared to traditionally connected
devices(Blanter and Holman, 2020). By 2020, IoT technology will have an impact of almost
6% of the global economy and will take years for the potential of IoT to be realized (Blanter
and Holman, 2020). The challenges for the implementation of IoT and the evaluation of IoT's
perspectives span several areas, so we have: the lack of integrated head-to-tail solutions that
offer value; lack of standards for critical aspects of IoT solutions (such as security-related
ones); organizational and governmental policies that do not keep pace with technological
advances; complex interoperability; companies' concern about the design and complexity of
implementation (Blanter and Holman, 2020). All these aspects lead to the need to carry out
studies for IoT in Romania and to the knowledge and analysis of aspects that stimulate or
hinder the development of IoT in the field of industry and support services for industry.
In this period there is a development of the Internet of things worldwide and as a result there
are large-scale initiatives or they are ongoing in China, Japan, the US, India, South Korea
and European countries where industry, associated organisations and government collaborate
on complex programmes addressing the large-scale IoT implementation (Ghaffari et al.,
2019; Blanter and Holman, 2020), and from this point of view research on various aspects of
IoT at this circumstance is desirable at this time.
There is a lack of national studies providing scientific answers to issues such as: data safety,
security and confidentiality, economic viability, impact on Internet interconnection of
devices and equipment (Internet of Things) under various aspects. The collection of quality
data by the semi-structured interview method is not currently carried out at the level of
Romania, and an analysis of the Internet of Things (IoT) is not sufficiently studied in terms
of use, development, and implementation in Romania, and even in the European Union,
compared to the USA and China and other Asian countries. The development of the Gaia-X
system, an EU project proposed by Germany and France (Bundesministerium für Wirtschaft
und Energie, 2020), a project to be completed in 2021 and which is taking an important step
towards an European sovereign digital infrastructure will boost the development of IoT and
related applications. On the other hand, there are a number of serious user concerns about the
dangers of the Internet of things growth, in particular in the areas of privacy and security
(Brass et al., 2020).
In the current pandemic and economic conjuncture conditions, the study on the Internet of
objects from industrial area, also called industrial Internet (IIoT) is clearly required because
it has great potential for almost all aspects of industrial operations, including quality control,
predictive maintenance, real-time monitoring of asset status, sustainability, and business
continuity. IIoT also promises increased safety, better reliability, smart metering, as well as
efficient inventory management, equipment tracking and installation management.
According to IBM, the latent business value that can be unlocked by the industrial IoT vision
could reach up to $3.7 trillion in 2025. However, there are also numerous challenges in the
adoption of IIoT, including operational complexity, connectivity challenges, service
IoT standards. Therefore, interoperability and quality assurance of services are two of the
basic requirements for current and future standards operating in the IoT ecosystem (Bello
and Zeadally, 2019).
The adoption and implementation of "Internet of things" (IoT) technologies leads to
architectural changes to automation and industrial control systems, including greater
connectivity to industrial systems (Boyes et al., 2018). In this case, the risks associated with
a gradual or sudden opening of the internal system also increase the risk of external exposure
(Boyes et al., 2018).
In the specialized literature diverse concerns are expressed regarding the dangers in the growth
connected to the IoT implementation and development, particularly in the areas of privacy and
security (Colakovic et al., 2018). Security and privacy issues are identified as key challenges
in implementing IoT solutions, as there are numerous examples of threats, vulnerabilities, and
risks (Qi, J., et al. 2014). Several security models and threat taxonomy models for IoT systems
have been proposed (Chen et al., 2018). According to the Hewlett Packard Enterprise Research
study, most problems related to the privacy of devices raised due to: insufficient authentication
and authorization, lack of transport encryption, unsafe web interface, unsafe software and
firmware, etc. Colakovic and Hadžialic examine the most common IoT security and privacy
issues. These may include: attack detection, scalable approach, encryption, data leakage, data
integrity, antivirus protection, trust management, recovery and self-recovery, access control,
authentication, context awareness, standardized mechanisms and real-time protection. Security
features must be incorporated at each level of the IoT architecture and effective trust
management must be implemented (Adat and Gupta, 2018).
This is the reason that IoT security architecture is still under development (Sicaria et al.,
2016), as well as various mechanisms developed to improve security and privacy. Security
mechanisms should provide authentication, controlled access (access control), data integrity
and privacy, encryption and other functions, while allowing automatic data processing based
on user-configured policies and rules. These mechanisms must work in real time and must
be cost-effective and scalable in order to minimise complexity and maximise usability. It
should be noted that there are many key features of IoT that make it difficult to develop robust
security architectures for IoT applications (Chen, et al., 2018) and for this reason these
aspects must also be studied from the user's perspective. Challenges in applying IoT security
risk mitigation due to physical connection, heterogeneity, resource constraints,
confidentiality, high level of activities, trust management and a certain lack of preparation to
ensure the security of IoT system activities are current challenges (Mohamad Noor and
Hassan, 2019).
The future of IoT is based on technological developments that allow easy use of the Internet
of things and a large-scale development of this device connection technology. Such an
example is the traditional wireless communications technologies, such as Bluetooth and Wi-
Fi, which were widely used over the past two decades (Muratkar et al., 2020). They offer
various advantages, such as: higher levels of data connection, good coverage, mobility,
expandability, ease of use, etc. Even in this way, traditional wireless communications
solutions are expensive and also consume the battery life of devices connected to them. The
Internet of things (IoT) requires devices consuming very little energy and are less bulky
(Muratkar et al., 2020). Such a solution to this is the new passive technology called the
Ambient Backscatter Communication System. It is a first version of a cutting-edge
technology allowing wireless communication between devices by using ambient radio
industrial car transportation in the fleet system of trains, are related to the tracking,
monitoring and transport of targets, can make extensive use of Wireless Sensor Networks
(WSN) technology. The development of cloud computing technologies and the increasing
increase in big-data traffic caused by the incorporation of the Internet of things (IoT) poses
the problem of secure authentication. At this situation generated by the reality of the end of
2020, secure authentication of users for remote access plays a crucial role. In the future,
cloud-based IoT applications will be developed to enable easy and secure remote access to
the system (Deebak and Al-Turjman, 2021).
With rapid technological progress in the Internet of things (IoT) and Artificial Intelligence
(AI), various human-machine touch interfaces (ITOM-HMI) have been widely developed as
critical elements for providing information between people and machines in large
applications. Recently, ITOMs based on wearable flexible sensors have been extensively
investigated on the basis of intelligent skin in applications of physiological monitoring,
motion detection, robotics, healthcare and virtual reality / augmented reality (Tang et al.,
2021). With the rapid growth of distributed renewable energy and the development of IoT-
related technologies, energy can be transferred bidirectional and traded flexibly in an open
market, which opens up a new operational field for the extensive use of IoT (Wu, et al., 2021).
An important aspect which worth further studying is related to concerns about the
environmental and human health impact of the Internet of things (IoT). Greater social
responsibility, in English Corporate Social Responsibility (CSR), towards the natural
environment and public health, due to side effects that could occur due to the use of these
technologies Industry 4.0, the Internet of things and the use of the 5G network, are important
research concerns in Romania (Feher et al., 2019). Thus, CSR contribution to the
development of society is a subject of extensive debate in the literature (Crișan-Mitra and
Stanca and Dabija, 2020). Despite the proliferation of CSR in academic and organisational
spheres, empirical evidence in this area remains limited, especially in the context of emerging
countries such as Romania. (Crișan-Mitra et al., 2020).
3. Research methodology
Starting from the research literature review within the research, we sought answers to issues
such as: 1) some barriers that are considered relevant, by involved persons and decision-
makers, in the integration of the Internet of objects into industry, in transportation for industry
and support services. Support services consist of information and communication technology
(ITC) activities to support and implement IoT in the work of organizations, as well as
activities of specialized companies providing IoT solutions and services to industrial and
domestic consumers; (2) what is the perspective of the decision-makers involved in IoT on
the factors influencing the decision to extend IoT into industry, transportation and support
services, the risks and the perception of the existence of barriers to implementation, such as
staff scarcity; 3) the influence of the level of knowledge of IoT, on the one hand, and
familiarity with the benefits of the Internet of Things, on the other, on the expansion of the
Internet of Things in industry (IOT); 4) what is the view of users on the prospects for the
development and implementation of IoT in their own activity in the industry, car
transportation for industry and support services regarding support and implementation.
The research methodology used by the research team is based on the semi-structured
interview technique and the use of a communication interface, in this case the Zoom platform.
• Do you want to develop and implement more and more IoT solutions in your business
in the near future?
• Do you consider that the advantages compared to the disadvantages/risks of
implementing an IoT system are on the side of the advantages?
• In the sector where you operate this system is suitable/fits very well:
• On a scale of 1 to 100 (percentage) how safe are you in the future development or large-
scale implementation of the IoT system in your company/organization?
• Do you think this IoT will transform the way we live and work over the next 3 years?
• How Pandemic Sars-Cov-2 influenced the development of the Internet of Things in your
enterprise
In addition to the aspects mentioned in the specific reviewed literature, such as the risks and
prospects of IoT development, we have proposed to verify also some hypotheses with regards
to issues reported by respondents during the interviews which are interesting or sensitive to
the IoT problem in Romania. The questions raised in the interview were aimed at capturing
the qualitative aspects of IoT in Romania and the foundation of the testing of some
hypotheses. Based on the responses obtained on the basis of the semi-structured interview,
we have encoded the data, and a centralization and aggregation of data was carried out for
qualitative analysis and further quantitative processing.
The hypotheses proposed by the research team are:
H 1 : The Internet of Things is implemented in industry on a smaller scale than in
transportation and support services, namely there are fewer types of devices.
H 2 : The level of implementation of IoT in the organization depends on the familiarity with
the concept of IoT.
H 3 : The large-scale implementation of the IoT system in the company/organisation depends
on the benefit (benefit)/risk(cost) ratio.
H 4 : The most important risk perceived by respondents (over 50%) is related to the possibility
of computer attack on devices and data when using IoT.
H 5 : The number of Connected Devices IoT depends on the size of the company.
H 6 : Respondents' impression of how we will live and work over the next 3 years also depends
on their knowledge of the Gaia X project.
H 7 : A large number over 3, respectively from 4-7 problems that displease respondents
regarding the use of these devices/equipment/cars/installations in IoT system affect the desire
to develop and implement more and more IoT solutions in the company's activity.
H 8 : Respondents' impression that IoT will transform the way we live and work over the next
3 years also depends on work and remote work control/telework/homework within the
organization.
H 9 : Respondents' impression of the development of IoT and how we will live and work over
the next 3 years also depends on the influence of the pandemic and Covid 19 disease.
The data have been processed in programme R and the results obtained allow an analysis of
the assumptions made. Hypothesis H 1 : The Internet of Things is implemented in industry on
a smaller scale than in transportation and support services, namely the answers at the Q5
question associated with the answers at question Q17, namely the fact that there are fewer
types of devices in the industry than in support services is an unconfirmed hypothesis. Based
on the result obtained on the test, Cramer’s V coefficient is 0,04 and indicates no association.
H 2 : The level of implementation of IoT in the organization depends on the familiarity with
the concept of IoT. According to Cramer’s V and chi-squared hypothesis H 2 is not confirmed,
thus the level of implementation of IoT in the organization does not depend on the familiarity
regarding the concept of IoT. The H 3 hypothesis assumes that the large-scale implementation
of the IoT system in the company depends on the benefit-risk ratio. The value of the chi-
squared test is greater than 3,814 (table value), but we do not reject the null hypothesis since
the p value of the test is 0.96, being above the significance level of 0.05. Thus, a clear link
between the desire for implementation and the benefit-risk ratio is not confirmed. Hypothesis
H 4 : The most important perceived risk of respondents (over 50%) is related to the possibility
of computer attack on devices and data when using IoT. The association between Q7abc and
secure implementation over 90% at Q15 is confirmed. It is found that the p value of the chi-
squared test is 0.001 and Cramer's V correlation coefficient is 0.54 and therefore there is a
strong relationship between the perceived risk and the desire to develop new IoT systems and
applications.
It is noted that there is no relationship between the desire to implement more and more IoT
solutions in the company's activity and the number of problems that displease respondents
regarding the use of devices in ioT (H 7) system, between the respondents' opinion on the
impact of IoT on the way of life and the knowledge of the Gaia X project (H 6 ) and between
the number of IoT devices connected and the size of the company (H 5 ), since the p values of
the chi-squared tests are 0.65, 0.29 and 0.17; assumptions H 5 , H 6 and H 7 are infirmed.
Hypothesis H 8 : The impression of respondents on how we will live and work over the next
3 years also depends on the work and control of remote work within the organization, namely
Q16 related to Q24, is confirmed. Based on the chi-squared dining test, the p value of which
was 0.03, it results that there is a relationship between the fact that IoT technology will
change society over the next three years (Q16) and remote work control within the
company. Cramer's V correlation coefficient is 0.46, which is a fairly strong association.
Hypothesis H 9 : Respondents' impression of how we will live and work over the next three
years also depends on the influence of the pandemic and Covid19 disease, respectively Q16
related to Q25 is also confirmed. In this case, the null hypothesis is: the two variables are
independent, and the alternative hypothesis is: the two variables are dependent. We reject the
null hypothesis because the p-value of the test is 0.03, being below the significance level of
0.05. We conclude that they are not independent, so we continue to check how strong this
relationship is by calculating Cramer's V correlation coefficient for the two sets. We get a
value of 0.54, which is a strong association.
It also checks the normality of the Q15 dataset, the certainty of the future implementation of
IoT, by performing a Shapiro-Wilk test. We take the null hypothesis H 0 : the population
is distributed normally and the alternative hypothesis H1: the population is not distributed
normally. The p-value of 0.0016 of the test suggests that we should reject the null hypothesis
and conclude the same, this set was not collected from a normal distribution. We checked the
two groups associated with production and services respectively. We used a non-parametric
Wilcoxon test to check the median of the two associated groups. We take the null H0
Figure no. 2. Number of devices per Figure no. 3. Risks percentage analysis
company per risk type
Source: own research Source: own research
Conclusions
a. Theoretical contributions. The study is important for business and academia because it
brings to the attention a first perception of the use, barriers and risks associated with use as
well as the prospects for the development of the Internet of Things in the industry and support
services (IIoT) in Romania. Information has been learned about the impact of remote and
home office work and of the pandemic on how we will live and work over the next three
years (H 8 and H 9 , confirmed). The implementation of IoT in the opinion of the company
representatives also depends on how much it fits at the moment the use of an IoT system in
their field of activity. In Romanian companies there is, according to h 2 conclusions, a definite
relationship between the level of implementation of IoT in the organization and the
familiarity regarding the concept of IoT which indicates a determination at the decision-
making level to implement IoT even if there is no high familiarity regarding the industrial
of IoT development in the next period, provides a first impression on the use of IioT in the
Romanian industry and support services, the barriers to the use and implementation on a
larger scale of IoT and provides a first forecast of the future on the development of IoT and
how we will live and work in the coming years. From the literature review we conclude that
IoT is a forward-looking technology but over average duration it can only develop with a
substantial input from artificial intelligence systems.
References
Adat, V., Gupta, B.B., 2018. Security in Internet of Things: issues, challenges, taxonomy,
and architecture. Telecommunication Systems, 67(3), pp.423-441.
Bello, O., Zeadally, S., 2019. Toward efficient smartification of the Internet of Things (IoT)
services. Future Generation Computer Systems, 92, pp.663-673.
Blanter, A., Holman, M., 2020. Internet of Things, 2020: A Glimpse into the Future. [pdf]
Available at: <https://aradinfocenter.com/wp-content/uploads/2017/07/A.T.%20
Kearney_Internet%20of%20Things%202020%20Presentation_Online.pdf > [Accessed
02.10.2020].
Boyes H., Hallaq, B., Cunningham, J., 2018. The industrial internet of things (IIoT): An
analysis framework. Computers in Industry, 101, pp.1-12.
Brass, I., Sowell, J., H., 2020. Adaptive governance for the Internet of Things: Coping with
emerging security. Regulation & Governance, pp.3-8.
Bundesministerium für Wirtschaft und Energie, 2020. GAIA-X vollzieht wichtigen Schritt hin
zu einer souveränen europäischen digitalen Infrastruktur. [online] Available at:
<https://www.kooperation-international.de/aktuelles/nachrichten/detail/info/gaia-x-
vollzieht-wichtigen-schritt-hin-zu-einer-souveraenen-europaeischen-digitalen-
infrastruktur/> [Accessed 6 October 2020].
Chang V., Munoz, V. M., Ramachan M., 2020. Emerging applications of internet of things,
big data, security, and complexity: special issue on collaboration opportunity for IoTBDS
and COMPLEXIS. Computing, 102, pp.1301-1304.
Chen, J-H., Ha, N., T., T., Tai H-W., Chang, C-A., 2020. The willingness to adopt the internet
of things (IoT) conception in Taiwan’s construction industry. Journal of Civil
Engineering and Management, 26(6), pp.534-550.
Chen, K., Zhang, S., Li, Z. et al. 2018. Internet-of-Things Security and Vulnerabilities:
Taxonomy, Challenges, and Practice. Journal of Hardware and Systems Security, 2,
pp.97-110.
Colakovic A., Hadžialic M., 2018. Internet of Things (IoT): A review of enabling
technologies, challenges, and open research issues. Computer Networks, 144, pp.17-39.
Crișan-Mitra, C., Stanca, L., Dabija, D.C., 2020. Corporate social performance: an
assessment model on an emerging market. Sustainability, 12(10), pp.7-21.
Deebak, B., D., AL-Turjman, F., 2021. Lightweight authentication for IoT/Cloud-based
forensics in intelligent data computing. Future Generation Computer Systems, 116,
pp.406-425.
Feher, A., Tabita, A., Orboi, M.D., Raicov, M., Banes, A., 2019. Education as basis of
sustainable development, Proceedings of the 9th International Scientific Congerence
Rural Development 2019, pp. 376-380.
Gershenfeld, N., 1999. When Things Start to Think. 1st ed. New York: Holt Paperbacks.
Wang, C., Gill, Ch., Lu, Ch., 2020. Adaptive Data Replication in Real-Time Reliable Edge
Computing for Internet of Things. 2020 IEEE/ACM Fifth International Conference on
Internet-of-Things Design and Implementation (IoTDI), pp.123-145.
Wu, Yi., Wu, Ya., Guerrero, J.M., Vasquez, J.C., 2021. Digitalization and decentralization
driving transactive energy Internet: Key technologies and infrastructures, International
Journal of Electrical Power & Energy Systems, 126(A), pp.127-139.
Economic Interferences
The Effect of Corporate Income Tax of Agricultural Companies on
National Budget ‒ the Case of the Slovak Republic ...................................................... 466
Juraj Chebeň, Renáta Krajčírová, Alexandra Ferenczi Vaňová and Michal Munk
DOI: 10.24818/EA/2021/57/466
Abstract
Corporate income tax significantly affects the overall amount of government tax revenue. In spite of
the attention being paid to many macroeconomic indicators (e.g. GDP, inflation, unemployment rate,
etc.) influencing the total amount of tax revenues influence, we can hardly find empirical research
focused on the microeconomic view where the data is based on of the individual financial statements
and tax returns of companies. Although the study is very practical, it assesses the extent of the mutual
co-dependence between the corporate income tax and assorted variables via non-parametric correlation.
Moreover, it presents the impact of the corporate income tax on the national tax revenue of the Slovak
Republic within the sample of evaluated taxpayers operating in agriculture, forestry and fishing in
2011-2015 from SK NACE Rev. 2 section “A” category of companies as legal entities ‒ Agriculture,
forestry and fishing in 2011-2015. The study theoretically contributes to microeconomic-based view
grounded on the adequate data of the legal entities, which were obtained from the corporate income tax
returns provided by the Slovak Republic’s Financial Directorate.
The authors found out a significant rate of dependency between selected evaluated variables in all
groups in the reviewed period. This dependency, especially between total income and tax base, as well
as between total income and corporate income tax, is an essential part of the accounting result
determined in the double-entry bookkeeping. The reliance is also the basis for the income tax base
calculation from which the adjusted tax base is declared, and subsequently the corporate income tax is
calculated. Research results tell the corporate income tax revenue of our sample makes up for, largely,
1.6% of the total tax revenue flowing to the Slovak national budget. Therefore, a set of
recommendations was put forth in order to strive for a maximization of these tax revenues within the
agricultural sector.
Keywords: tax revenues, corporate income tax, corporate income tax rate, accounting result, income
tax base
JEL Classification: H25, H61, H71, K34
their increasing, more precisely a stagnating trend with decreasing statutory tax rates and
with increasing amount of actions to expand the tax base (Tahlová and Banociová, 2019).
The paper is structured as follows: first, a literature review on factors influencing the total amount
of tax revenues, then a conceptual framework in the methodological part including the sample,
and analytical methods. Finally, results, discussion, and conclusions are presented.
2. Research methodology
The article assesses the extent of the mutual codependence between the corporate income tax
and assorted variables via non-parametric correlation. Moreover, it focuses the impact the
corporate income tax on the national tax revenue of the Slovak Republic within the sample
of evaluated taxpayers doing business in agriculture, forestry and fishing in the period of
2011-2015. The variables represent indicators that significantly affect transformation of
accounting result into corporate income tax base in the Slovak Republic, as well as the
amount of payable income tax as one of major sources of the national budget revenue.
The data that helped us to accurately describe the problematics was provided by the Financial
Directorate of the Slovak Republic as a sample of legal entities that were categorized
according to statistical classification of economic activities – SK NACE Rev. 2, section A –
Agriculture, forestry and fishing. These were obtained from filed corporate income tax
returns of taxpayer for taxation period of 2011-2015. This article assesses mutual
dependencies among assorted variables (Figure no. 1), such as:
• Total income represents gross taxable income of the legal entity recorded from all
economic activities of the legal entity;
• Accounting result is from the accounting perspective to be defined as the final result
of the entity’s activities achieved during the accounting and taxation period. It is calculated
as the difference between the total income and total expenses;
• Tax base is generally the total income of the entity decreased by related expenses,
modified by a number of adjusting items. The adjusting items are to be (i) tax deductible
items which increase the tax base and (ii) non-taxable items decrease the tax base. The
adjusted tax base is taxed by the standard corporate income tax rate;
• Corporate income tax (CIT) is calculated from the adjusted tax base of the legal entity.
It can be determined as corporate income tax before applying tax reliefs and corporate income
tax after tax reliefs. Tax reliefs represent the amount of reliefs by which the corporate income
tax is decreased in accordance with the national tax legislation. Generally, tax reliefs may
have a form of investment grants or subtraction of expenditures for research and development
(R&D) as well as the reliefs of a foreign tax credit. Investment grants and subtraction of
expenditures for R&D are subject to special rules. A credit for foreign tax paid by a Slovak
tax resident on foreign source income taxable in the Slovak Republic is available in case
where the bilateral treaties concluded between the Slovak Republic and the foreign country
states so. The credit of foreign tax can be applied up to the amount of tax that would be
payable on that income in the Slovak Republic.
• Corporate income tax before reliefs (CIT before reliefs) is treated as tax liability
before applying tax reliefs mentioned above;
• Corporate income tax after tax reliefs (CIT after reliefs) is to be calculated as final
tax liability of the legal entity for the respective taxation period.
the reliefs of incentive beneficiaries and subtraction of expenditures for R&D as well as the
reliefs of a foreign tax credit. The results show that the assessed variables – Corporate income
tax before and after reliefs are identical.
Table no. 4. All Groups Kendall Tau Correlations for the year 2014
within the framework of which a nearly perfect dependency rate was found in the same period
(Kendall Tau = 1.00). It naturally follows that these variables show identical values.
The amount of corporate income tax is contingent on a valid statutory corporate income tax
rate in the respective year as well as the volume of accounting result before tax and its
transformation into tax base outside double-entry bookkeeping. In the Slovak Republic in
2019, the valid corporate tax rate is set to 21%.
The corporate income tax rate in the Slovak Republic has undergone significant
developments. Since 1993, the corporate income tax rate has been 45%, which, along with
the taxation of profit shares in the same period, represented a 60% taxation of businesses. In
our opinion, the most favourable model of the tax system can be seen in the period from 2004
to 2010. In general, the 2004 tax reform meant a simplification of tax legislation, the
introduction of a flat rate income tax, the elimination of double taxation, and thus meant a
positive change in the business environment and attracted foreign investors. Tax reforms
affect economic performance by changing incentives for business formation, expansion and
operation (Hines, 2017).
A very similar development could be seen in the Czech Republic, since both countries were
based on a common legislative concept. However, the Czech Republic is more conservative.
It does not make radical changes and plays a waiting game in a carry out the relevant
measures later. The income tax system in the Slovak Republic is more effective, less costly
and more socially just than the income tax system of the Czech Republic (Lipková, Grešš
and Poncarová, 2017). Hungary may be considered the most progressive in its system of
corporate income tax rates, where the tax rate of 18% was introduced in 1995. Since 2017,
the tax rate has only been 9%, which is the lowest corporate income tax rate within the V4
countries.
From the international perspective, corporate income tax has been characterised in recent
years by a gradual decrease of the nominal tax rate and the countries of the EU are no
exception (Delgado, Fernandez-Rodriguez and Martinez-Arias, 2014).
The research results achieved in the assessed sample of taxpayers doing business in the field
of agriculture, forestry and fishing in the observed period of 2011-2015 show a significant
level of dependencies between total income and tax base as well as total income and corporate
income tax.
Tax revenues represent the highest portion of the Slovak Republic’s budget income, which
also includes the corporate income tax. Both of these are significantly affected by the
corporate income tax rate as well as the total taxable income, calculation of the tax base,
identification of non-taxable expenses and total non-taxable income.
In the assessed time period of 2011-2015 it is possible to observe a constant development of
the growth of the national tax revenues as well as a positive development of the corporate
income tax classified SK NACE Rev. 2 in Section A – Agriculture, forestry and fishing of
the statistical classification of economic activities. Based on an actual collection of revenues
of the Slovak national budget, the total tax revenue in 2014 amounted EUR 9,296,027,088.
In 2014, the corporate income tax revenue amounted EUR 1,917,032,718 (Overview on
collection of tax and non-tax revenue as at 31 December 2014).
Similarly, in 2015 the actual tax revenue collected for the state budget of the Slovak Republic
in amounted to EUR 10,614,245,541, specifically the corporate income tax amounted to EUR
Conclusion
The accounting result, as a difference between the total income and total expenses calculated
in double-entry bookkeeping, provides conclusive data for the determination of the corporate
income tax base. The correct determination of the tax base and consequently the calculation
of the corporation tax payable depends on several factors set by the national law. The basis
for the determination of tax obligations is provided by the Slovak accounting system, which
requires application of the provability of tax laws in the subject and content of business
accounting. Business management should include a tax analysis to optimize the income tax
base and consequently the corporate income tax liability for the respective taxation period.
Based on a statistical assessment, statistically significant rate of dependency is declared
between total income and accounting result, total income and tax base, total income and CIT
before reliefs, total income and CIT after reliefs, accounting result and tax base and CIT before
reliefs and CIT after reliefs in all groups of the assessed sample of taxpayers in the field in
agriculture, forestry and fishing within SK NACE Rev. 2, within the reviewed period with
exception of dependency between total income and accounting result in 2012 and 2013. It is
due to the fact that total income is an essential part of the accounting result determined in the
double-entry bookkeeping and the latter is the basis for the income tax base calculation from
which the adjusted tax base is declared and subsequently the corporate income tax is calculated.
The range of items adjusting the accounting result as well as the applicable tax rate affect the
tax burden on corporate income tax. Departing from the achieved results, we are of the
opinion that businesses operating in the field of agriculture, forestry and fishing do not make
sufficient use of the conditions and scope of the application of the items affecting the income
tax base regulated by the Slovak tax legislation. We believe that the generated and recognized
revenues represent primarily total income, i.e. subject to corporate income tax and the
subsequently recognized expenses are primarily tax expenses in the assessed sample of
agricultural companies.
In general, tax reliefs regulating the amount of corporate income tax do not apply in the field
of agriculture, forestry and fishing (Report on agriculture and food industry in the Slovak
Republic for the year 2017) and were provided to other sectors of the national economy of
the Slovak Republic in the monitored period. For this reason, we propose to consider granting
special tax reliefs to taxpayers operating in the sector concerned. In our opinion, the
agricultural’s taxation should be in any way supported within the national tax system.
Based on the author’s research studies and surveys and in terms of our research results
concerning the impact of the value of corporate income tax on the national tax revenues, it
can be stated that decreasing the corporate income tax rate in the EU countries has a positive
impact on the amount of the state budget. In regard to the above-mentioned, it is therefore
reasonable to consider introducing a reduced Slovak corporate income tax rate for taxpayers
engaged in agriculture, forestry and fishing in the Slovak Republic within Section A of
NACE Rev. 2. In addition, it is proposed preferential rules for subtraction of expenditures
for R&D in the sector concerned due to unique nature of their activities.
Based on the previous research, it can be also stated that the tax license was a significant
source of tax revenues to the state budget of the Slovak Republic in 2014-2018 in the case of
corporate income tax. We believe that doing away with it will significantly affect the amount
of tax revenues to the state budget. Therefore, we recommend considering a reintroduction
of a tax license for taxpayers regardless of the classification within the national economy of
Acknowledgement
This work was supported by the Scientific Grant Agency of the MoESRS and of Slovak
Academy of Sciences under the contract No. VEGA-1/0776/18.
References
Act no. 595/2003 Coll. on Income Tax as amended. [online] Available at:
<https://www.zakonypreludi.sk/zz/2003-595> [Accessed 30 December 2019].
Andrejovská, A. and Puliková, V., 2018. Tax revenues in the context of economic
determinants. Montenegrin Journal of Economics, [e-journal] 14(1), pp.133-141. DOI:
10.14254/1800-5845/2018.14-1.10.
Baštincová, A., 2016. Účtovníctvo a dane právnických osôb. Bratislava: Wolters Kluwer,
S.R.O.
Brennan, G. and Buchanan, J., 1980. The power to tax: analytical foundations of a fiscal
constitution. Cambridge: Cambridge University Press.
Clausing, K.A., 2007. Corporate tax revenues in OECD countries. International Tax and Public
Finance, [e-journal] 14(2), pp.115-133. https://doi.org/10.1007/s10797-006-7983-2.
Clausing, K.A. 2016. Strengthening the indispensable U.S corporate tax. Washington DC:
Washington Center for Equitable Growth.
Collier, R., 2017. Tax competition, tax co-operation and beps. Journal of Tax Administration,
3(1), pp.22-56.
Delgado, F.J., Fernandez-Rodriguez, E. and Martinez-Arias, A., 2014. Effective Tax Rates
in Corporate Taxation: a Quantile Regression for the EU. Inžineriné Ekonomika-
Engineering Economics, [e-journal] 25(5), pp.487-496. http://dx.doi.org/10.5755/
j01.ee.25.5.4531.
Delgado, F.J., Fernandez-Rodriguez, E., Martinez-Arias, A. and Presno, M.J., 2019. Club
convergence in the corporate income tax: The case of European effective rates. Physica
A: Statistical Mechanics and Its Application, 523, pp.942-953.
Dvořáková, D., 2012. Specifika účetnictví a oceňování v zemědělství. Praha: Wolters Kluwer
ČR, a. s.
Działo, J., 2015. Tax competition or tax coordination? What is better for the European
Union?. Comparative Economic Research-Central and Eastern Europe, [e-journal]
18(2), pp.37-55. http://dx.doi.org/10.1515/cer-2015-0011.
Freebairn, J., 2017. Comparison of a lower corporate income tax rate for small and large
businesses. EJournal of Tax Research, 15(1), pp.4-21.
Gesko, M., 2014. Inefficient corporate taxation and hidden taxes in Slovakia. In: s.n,
International Multidisciplinary Scientific Conferences on Social Sciences and Arts
(SGEM 2014). Albena, Bulgaria, 1-10 September 2014. S.l: s.n.
Graham, J.R., Hanlon, M., Shevlin, T. and Shroff, N., 2017. Tax Rates and Corporate
Decision-making. Review of Financial Studies, 30(9), pp. 3128-3175.
Gyurián, N. and Kútna, A., 2015. Direct taxes in Slovakia and their impact on economy of
companies operating in agriculture and food producing industry. Studia Mundi –
Economica, 2(1), pp. 21-29.
Hill, T. and Lewicki, P., 2007. STATISTICS: Methods and Applications. Tulsa, OK:
StatSoft.
Hines, J.R.Jr., 2017. Business Tax Burdens and Tax Reform. Brookings Papers on Economic
Activity, [e-journal] pp. 449-477. DOI: 10.1353/eca.2017.0019.
Janíčová, L. and Baranová, V., 2013. Vliv efektivních daňových sazeb a jejich komponent
na přímé zahraniční investice – případ členských zemí EU. Politická ekonomie, 61(2),
pp.209-228.
Johansson, A., Heady, C., Arnold, J., Brys, B. and Vartia, L., 2008. Tax and Economic
Growth. Working Papers No. 621. Paris: OECD Economics Department.
Jones, L.E., Manuelli, R.E. and Rossi, P.E., 1997. On the optimal taxation of capital income.
Journal of Economic Theory, 73, pp. 93-117.
Kim, J.H. and Im, C.C., 2017. Reported Profits and Effective Tax Rate Following Accounting
Standards Changes Analysis of Consolidated Financial Statements and Separate Financial
Statements. Journal of Applied Business Research, 33(6), pp.1171-1186.
Kotlán, I., 2013. Level and Volatility of Taxes: The Impact on Economic Growth. In:
Machová, Z., ed. 2013. Proceedings of the 3rd International Scientific Conference Taxes
in the World. S.l: VSB – Technical University of Ostrava, pp.69-82.
Lee, Y. and Gordon, R., 2005. Tax Structure and Economic Growth. Journal of Public
Economics, 89, pp.1027-1043.
Lipková, Ľ., Grešš, M. and Poncarová, A., 2017. Tax systems in the Czech Republic and the
Slovak Republic: comparison with an emphasis on income tax. Economic Annals-XXI,
[e-journal] 165(5/6), pp.47-51. https://doi.org/10.21003/ea.V165-10.
Lisztwanova, K. and Ratmanova, I., 2017. Assessment of Impact of Items Reducing Tax
Base and Tax on Total Amount of Corporate Income Tax in the Czech Republic in
Selected Periods. In: European Financial Systems 2017, Proceedings of the
14th International Scientific Conference. Brno, Czech Republic, 26-27 June 2017, Brno,
Czech Republic: Masaryk Univ, Fac Econ & Adm, Dept Finance; Inst Financial Market.
Luna, L. and Murray, M.N., 2010. The effects of state tax structure on business organizational
form. National Tax Journal, 63(4), pp.995-1022.
Margan, F., 2012. Competitiveness in the EU on the Context of the Globalized Economy.
Proceedings of the 1st International Conference on European Integration, pp. 188-199.
Munk, M., Pilková, A., Benko, L. and Blažeková, P., 2017. Pillar 3: market discipline of the
key stakeholders in CEE commercial bank and turbulent times. Journal of Business
Economics and Management, 18(5), pp.954-973.
Environment. Brno, Czech Republic, 9-10 March 2017. Brno, Czech Republic: Mendel
Univ Brno, Fac Business & Econ.
Sobotovičová, S. and Blechová, B., 2017. Disparities of the Regions of the Czech Republic
in Terms of Tax Revenues. Ekonomika Regiona-Economy of Region, [e-journal] 13(4),
pp. 1304-1313. DOI: 10.17059/2017-4-26.
Stejskal, J., 2008. Daňova teorie a politika. Pardubice: Univerzita Pardubice.
Svoboda, J., Lososová, J. and Zdeněk, R., 2015. Analysis of operating costs of subsidies in
the field of agriculture of EU countries. Agris on-line papers in economics and
informatics, 7(4), pp.161-173.
Tahlová, S. and Banociová, A., 2019. Assessment of Corporate Income Tax Revenues in the
Light of Their Current Determinants. Montenegrin Journal of Economics, [e-journal]
15(1), pp. 087-097. DOI: 10.14254/1800-5845/2019.15-1.7.
Thematic information overview of European semester: Tax system, 2017. Thematic
information overview of European semester: Tax system [online] Available at:
<https://ec.europa.eu/info/sites/info/files/file_import/european-semester_thematic-
factsheet_taxation_sk_0.pdf/> [Accessed 20 September 2019].
Tóth, M., Matveev, V. and Boháčiková, A., 2016. Risk of agricultural production in Russian
Orel region. Potravinarstvo, [e-journal] 10(1), pp.557-562. https://dx.doi.org/10.5219/664.
Vavrová, K., 2015. Tax incentives of business entities in selected countries of the EU in the
context of globalization. [online] Available at: <http://ke.uniza.sk/sites/default/files/
content_files/part_iv_final_1.pdf> [Accessed 14 June 2019].
Vintila, G., Gherghina, S. C. and Paunescu, R. A. 2018. Study of Effective Corporate Tax
Rate and Its Influential Factors: Empirical Evidence from Emerging European Markets.
Emerging Markets Finance and Trade, 54(3), pp.571-590.
Vítek, L., 2012. Changes in the Taxation of Personal and Corporate Income in Developed
Countries. Acta Universitatis Agriculturae et Silviculturae Mendeleianae Brunensis,
60(2), pp.465-474.
Zabinski, A., 2017. Problems of building effective tax system in the countries of central
Europe. In: s.n., 15th International Scientific Conference on Hradec Economic Days 2017.
Hradec Kralove, Czech Republic, 31 January - 1 February 2017. Hradec Kralove, Czech
Republic: Univ Hradec Kralove, Fac Informat & Management.
DOI: 10.24818/EA/2021/57/483
Abstract
The sustainable organization culture is one of the most important intangible assets and driver
of competitiveness of organizations. The aim of this article is to reveal the role of various
form of leadership in shaping organisational culture by conducting empirical study in the
network of pharmaceutical companies distinguished with high share of young females
working in such companies in Lithuania. This is very competitive sector and has important
implications on public health and other sustainability issues therefore this area was selected
for the empirical study on testing leadership impacts. The main focus of the study is leader’s
personal features and their impact on team work and relationships with clients, what effect
male and female managers have on innovation culture in the network of pharmaceutical
companies and what impact leader’s characteristics have on sustainable of organizational
culture and long-term development goals of the company. The study results showed that
transformational leadership can provide for more effective organisational culture than
transactional leader, because such a leader is oriented towards the transformation of
employee expectations and can create more opportunities for sustainable organizational
culture.
Keywords: leadership, sustainability, organizational culture, pharmaceutical companies.
JEL Classification: O10, D23, M14
*
Corresponding author, Dalia Streimikiene – e-mail: daliastreimikiene@mruni.eu
Authors’ ORCID:
Dalia Streimikiene: orcid.org/0000-0002-3247-9912
Asta Mikalauskiene: orcid.org/0000-0002-4301-2058
Grigorios Kyriakopoulos: orcid.org/0000-0003-4875-8534
Introduction
Nowadays, with the ongoing process of globalisation, dynamic change in organisations, it is
important to maintain the organisational culture by pointing it in the right direction in order
to achieve efficiency. Each organisation has its own peculiar organisational culture. Each
culture has deep-rooted values that are difficult to change (Schein, 2004). However, a leader,
by using own power, influence and employing creativity, is capable to change organisational
culture. A human being spends most of time at work; thus, it is important to ensure that a
person feels good at work, works productively, does not experience negative emotions (due
to bullying, ignorance, misfit).
The main task of organisational leaders is to ensure such environment, where members of the
organisation, reaching common organisational goals, would be motivated to gain knowledge,
develop, use and share (Yang, et al., 2020). Leadership has a direct and indirect impact on
the organisational culture, its value, symbols, heroes and rituals (Hofstede, 2001).
Organisational culture is a powerful force that directs and shapes individual behaviour in the
organisation, while also unveiling personal traits of a leader including ability to reflect on
other people’s emotions, high emotional intelligence, and determination.
The presence of a leader is very important in the contemporary organisations, because
organisations usually are oriented towards results, regardless the long-term perspective, only
thinking of a good/profitable present. Leadership is the driving force as an organizational
tool of understanding business world and peoples’ needs. Another important asset of
leadership is how a leader can shape organisational culture towards sustainability (Bedrule-
Grigoruta, et al., 2019). The creation of organisational culture of the surrounding
environment enable organisational effectiveness and competitiveness, since it impacts on
regional competitiveness successful organisations are directly related to satisfied and well
living conditions of working employees (Saseanu, et al, 2019; Bedrule-Grigoruta, et al.,
2019; Wang, et al., 2020).
Though there are several studies conducted on the impact of leadership on organizational
development (Silva, et al., 2015; Halle, 2016; Ukaidi, 2016, Khan and Nawaz, 2016;
Mathews, 2017). However these studies are lacking to systematically consider the impact of
leadership on sustainability of organizational culture. The aim of this article is to reveal the
role of a leader in shaping organisational culture by conducting an empirical study in the
network of pharmaceutical companies in Lithuania. This is very competitive sector having
important implications on public health and arouses other sustainability issues. Research
focus was given on leader’s personal features and their impact on team work and relationships
developed with clients. Besides, the key-aspects affecting male and female managers to
nurture an innovation culture in the network of pharmaceutical companies and leadership
characteristics, they were also examined towards achieving organisational and personal
development goals linked to sustainability (Chalikias, et al., 2014).
In the first section of paper literature review on the subject is provided; in section 2 the study
framework and methods are introduced; in section 3 the methodology has been developed,
and in section 4 the results are discussed and compared with results of other studies, while in
section 5 conclusions are given.
(transactions’) leaders, it is most important to retain efficiency standards and determine what
actions can reduce conflicts, how to change one goal with another and implement decisions.
However, these leaders are not capable to create a strong connection with workers as, for
example, a transformational leader. Transformational leadership, as well called leadership
of changes, is a process where leaders and followers lift one another into the higher level of
morale and motivation (Paraschiv, 2013).
Transformational leadership is related to emotions, values, ethics, standards and long-term
goals. In contrast to other leadership theories, transformational leadership is focused on
mutual growth, development of a leader and follower. This style of leadership reflects a
possibility to take risks and provide dynamics to the organisation. These leaders distinguish
from others with high motivation and strong emotional connection (Wiltshire, 2012;
Nerdinger and Pundt, 2012). Changes are one of the main motives of transformational
leadership. Leaders of changes view their followers as future leaders. The goal of a leader is
to initiate changes in followers, motivate them and expand the limits of workers’ motivation.
However, aiming to reach this goal, one should have certain characteristics that are peculiar
to a leader, but not every manager can claim to have them. A leader can be a manager, but
not every manager can be a leader (Northouse, 2007; Zaleznik, 2012). Therefore, it could be
stated that a leader encourages change, new challenges, works to understand other people’s
needs (aiming their acknowledgement), focuses more on people, trusts them and encourages
to act. The main task of a leader is not to gather as many followers as possible, but to raise
as many leaders as possible. Managers, on the contrary, encourage stability, authority; they
work in order to accomplish tasks, focusing on present, short-term perspective. Matthews
(2017) analysing the characteristics of effective leaders has distinguished seven of them:
Emotional intelligence. Leader’s emotional intelligence, as the ability to recognize and
interpret, manage the emotions of surrounding people, is one of the essential components in
organisational management. Emotional competences allow leader to treat personal and
workers’ emotions as resources and improve the effectiveness of personal and organisational
activities (Simanskiene and Zuperkiene, 2014).
Integrity. According to Hooijberg and Lane (2005), integrity is the likelihood of a leader and
the ability to transform words and promises into actions, real behaviour. This characteristic
is attributed to “authentic leadership”, because a person acts sincerely. Such leader has more
moral capacities to solve dilemmas. Honesty is named as one of the most important
characteristics of a leader, because workers want honest and trustworthy leaders. Honesty in
a workplace is being a moral and honest leader that always wants to do the right things, firmly
following the code of work ethics, procedures and framework (Bashir, 2017; Moorman and
Grover, 2009).
Drive. Effective leader has to have ambitious goals. This tenaciousness shows leader’s inner
motivation, achievement of personal goals and encouragement of others to reach the set goals
together. The tenaciousness and energy of a leader inspire unlimited curiosity and need for
continuous learning.
Leadership motivation. Leaders have a strong need for power, because they want to influence
others. Effective leaders have the need for socialised power, because motivation is thought
to be a strong source of altruism and several responsibilities.
Self-confidence. Effective leaders have to be self-confident in order to be able to lead others.
According to McCosh (2012) those leaders that have self-confidence can be less humble to
Organisational culture, according to Jahanian and Salehi (2013) has the following
characteristics:
• Culture is learned, not innate culture or instinctive trait;
• Culture is learned, humans can pass on their learned habits;
• Culture is a subjective phenomenon, the idea of which is that culture come from the
group’s habits or patterns of behaviour norms;
• Compatibility of the detector. Culture change, adapt and cope with the changes that occur;
• Culture is the only instrument. Elements of each culture tend to have a unified body and
grow together to create a consistency and consistency for time needs.
According to Yueh-Shian and Weng-Kun (2012), cultural differences influence leadership
behaviours. Leaders can utilize the effect of organisational culture to direct subordinates to
the highest level of motivation for accomplishing organisational goals. It is important to
stress that the need for power, implied by leadership, is not caused by violence, dictatorship
or repression for a leadership to be effective. On the contrary, power can be used as a non-
compulsory way to mobilize members of the organisation, direct them and manage them in
order to achieve the main goals of the organisation and ensure sustainable development of it
(Yueh-Shian and Weng-Kun, 2012). Hofstede and Hofstede (2005) when analysing
organisational culture, have distinguished six dimensions: Process-oriented versus results-
oriented; Job-oriented versus employee-oriented; Professional versus parochial; Open
systems versus closed systems; Tight versus lose control; Pragmatic versus normative.
According to Schein (2004) organisational culture is very important because it reveals what
decisions organisation consider to be the right ones. Moreover, it shows what workers value,
what behaviour is considered acceptable in the organisation, and how they interact within the
organisation; it defines the speed and effectiveness when performing tasks, organisation’s
openness to change, which is as well important for the external stakeholders’ opinion that
they have considering the organisation (Kyriakopoulos, 2011). In other words, culture can
encourage or prevent from showing initiative or achieve personal goals. Indeed, since
organisational culture is usually created by the managers, the personality of a manager is very
important. Future questions arise: how to measure and assess organisational culture in an
organisation, what methods to choose, and where to focus on the data analysis.
2. Methodology
It is important to create organisational culture for a particular organisation as well for regional
competitiveness, because the more successful are the organisations, the more satisfied and
well working people live in that specific region. The authors have provided three levels of
organisational culture:
• What is seen; it includes: symbols, external features, organisational structure and
control systems;
• Values and norms; it encompasses rituals and procedures;
• Silent beliefs and assumptions; it is stated that organisational culture can encourage
workers’ productivity, and this is the best motivation for successful activities.
As it is seen in table no. 2, Simanskiene (2018) and Ott (1989) have unanimously
distinguished that when wanting to research organisational culture, it is very important to
analyse not only the physical environment, but the opinion of organisation’s employees as
well, because employees put their physical efforts, knowledge and share emotions. All this
determines how an employee will feel at work and contribute to the organisation’s success.
Another important method of analysis is to analyse organisation’s cultural symbols and their
meanings. Values, symbols, heroes, rituals strengthen the organisation’s image, encourage
employee loyalty to the organisation and faster adaptation of new employees. Thus, the
effects of inner as well as external environments are important (Kyriakopoulos, 2011). While
conducting organisational culture analysis, the characteristics of organisational culture are
analysed as well (table no. 3).
Table no. 3. Characteristics of organisational culture analysis
Characteristics of OC analysis Steps of analysis
Personal initiative It is advised to determine the level of employee
independence and accountability.
Risk level It is advised to determine the risk norms in the
organisation.
Compatibility of actions It is advised to determine the level of cooperation
between different departments of the organisation.
Manager support It is advised to determine whether employees feel the
manager support.
Control It is advised to determine how norms and rules are
followed in the organisation.
Identification It is advised to determine the level of employee
identification with the organisation that is analysed.
Reward system It is advised to determine how employees are
rewarded.
Conflict level It is advised to determine if employees have the right
to express a controversial opinion.
Cooperation, expressed It is advised to research managerial structure of the
by formal hierarchy organisation.
Source: created by authors based on Simanskiene and Sandu (2014)
As it could be seen in (table no. 3), various characteristics are assessed when conducting
analysis. For example, manager support is assessed. If a manager has characteristics and traits
of a leader, then, the employees will feel the support, take on new challenges, grow as
persons, create a future vision together and, maybe, one day become leaders themselves,
because the calling of a leader is not to increase the number of followers but to educate new
leaders. The manager’s style of management can be reflected in the risk level as well as
control: strict manager that does not trust employees will want to be in control all the time,
demonstrate personal authority, in contrast to a leader who tries to gather teams, uses conflicts
for positive changes. Another important step in the process is the choice of data collection
methods. According to Schein (2004), cultural research can be qualitative as well as
quantitative. Qualitative research help to compose a full picture of a culture, what is
impossible to achieve when conducting a quantitative research, but it is not always possible
to compare data objectively.
Leadership and culture could be seen as two sides of a coin: one side alone does not tell
anything. On the one hand, cultural norms show how an organisation defines what leadership
is: who and for what merits will receive promotion, who will receive the attention of the
followers. On the other hand, it could be proved that the main goal of a leader is to create and
leadership is an effective tool to form the organisation’s culture. The creation of such good
organisational culture in a company requires constant maintenance, fostering as well as
reaction to changes happening in organisation and environment. The creation and fostering
of organisational culture, as well as the compatibility of values with the organisation’s
employees, is a difficult problem. When organisation’s culture is strong, companies on the
market are competitive and reach a wide range of objectives such as higher profits, satisfied
customers, productivity, declining costs, and reduction of pollution and negative impact on
the environment. When an organisation reaches these objectives, it becomes sustainable and
can spread sustainability by constantly monitoring and evaluating whether a higher level is
achieved (Kyriakopoulos, 2012). The following components are necessary for the formation
of an organisation’s culture, formulation of values and leadership of cultural changes in the
organisation: to lead the process, to appoint a leader of change, to identify threats that
stimulate change, to carry out transition rituals, to organise intensive training, to provide new
direction signs, and to emphasise employment security. As someone can infer from these
components, only through leadership the new organisation’s culture can be created and
transformed into a harmonious one (Streimikiene, et al., 2019). High culture organisations
recognise and foster values of sustainable development and strive for sustainable
development objectives. These organisations recognise the principles of social responsibility
and their importance and seek to position themselves as socially responsible companies since
this, in particular, meets their values (Streimikiene, et al., 2019).
Based on the reviewed scientific literature on the theoretical level and conducted empirical
research in Lithuania and abroad, there was created a hypothetical assessment model that
illustrates the influence of the role of a leader in shaping organisational culture and bringing
organization towards sustainable development path (figure no. 1). In the creation of
assessment model scientists agree that leadership can shape good and effective organisational
culture. A questionnaire survey has been used to perform this research. This method, in
comparison to the number of interview, allows gathering more questionnaires; respondents
can fill the questionnaire at a convenient time and their own pace. The questionnaire
sustained 19 questions’ grouped according to the research objectives. Most of the questions
are closed, requiring a short answer; it is easy to qualitatively process, classify the responses.
There was provided a possibility to write own response (named as “other”) that the
respondents could express their opinion on certain issues and not only answer given
questions. The researcher does not have to upload data, because it is instantly moved to the
database; data can be processed right away. Moreover, it is possible to know how the
respondents behaved in the past, what are their future intentions. The questionnaire is
composed of three parts:
• The introductory part of the questionnaire shortly presents who and for what purpose is
conducting the research. The significance of responses is stressed in the introductory part of
the questionnaire, and it is informed that the questionnaire is anonymous.
• The main part of the questionnaire contains questions of the performed research.
• The demographic part of the questionnaire contains the questions about the respondent
(sex, age, education, work experience, occupied position in the organisation).
achievement of organisational and personal goals. Most of the respondents are female (90%);
almost half of the respondents are 26-35 years old; most of the respondents have acquired
higher university education and have been working in the organisation for 3-5 years.
3. Discussion of results
3.1. Characteristics of managers
The first question of the research showed that most of the respondents that participated in the
research named as the most important characteristics of a leader self-confidence (9.5%) and
responsibility (8.1%). Moreover, a big part of respondents that participated in the research
consider communicability (7%), creativity (5.9%), positivity (6%), agility (5.7%),
intelligence (6.3%), charisma (5.6%), high emotional intelligence (5.5%) and determination
(5.8%) to be important characteristics of a leader. The respondents that participated in the
research identified a developed sense of humour (3.5%) to be the least important
characteristic of a leader. During the research, it has been determined that the importance of
positivity (χ2= 12.436; p<0.05), courage (χ2= 16.934; p<0.05), determination (χ2= 23.982;
p<0.05) for a leader were mentioned more by 26-35 year old respondents rather than
36-42 year old respondents (χ2= 12.436; p<0.05). Whereas the intelligence as a characteristic
of a leader was more important for the respondents whose work experience is 3-5 years,
rather than <1 year (χ2= 11.752; p<0.05). Thus, it could be stated that manager’s positivity,
courage and determination are more important for younger (26-35 years old) people, because,
as they are young, wanting to learn from the best managers/leaders they have ever met, it
would not restrain youth maximalism, as the whole carrier is in the future. Employees that
have recently graduated from studies are full of enthusiasm and academic knowledge. For
the employees that have been working in a company for a longer period, the intelligence of
a manager is more important, because such a manager will probably try to see rationality and
expect rational basis from the others.
The second question asked what functions a leader should perform at work. Data allowed
determining the functions in organisational activities that are most frequently assigned to a
leader and revealed that most of participants considered that the most important functions of
a leader at work are determining strategy and vision (19.3%), initiating changes (15.7%) and
team building (16.2%). The participants named the following functions as the most important
ones for a leader less frequently: creating workplaces (3.7%) and minimising risks (5.2%).
During the research, it has been noticed that team building as a function of a leader is more
important for 26-35 year olds, rather than 36-42-year-old participants (χ2= 17.408; p<0.05).
It is noteworthy because a leader develops employee involvement, gathers a team and
stimulates individuals, forms general vision, develops the talents and creates a synergic
effect: teamwork can accomplish more than individual work. Leadership is a science (seeking
to understand business nuances) and art (aiming to understand people).
The following question stated what personal characteristics their managers have. Most of
participants stated that their managers have such characteristics as responsibility (11.1%),
self-confidence (11.2%), demand (10.7%), control (8.7%), tolerance (7.3%). The most rarely
mentioned characteristics of a leader selected by the participants were emotionality (3.9%)
and a developed sense of humour (4.6%).
career development (what is very relevant for the younger employees), innovation, possible
promotions, career opportunities more. The results of the research reaffirmed the conclusions
that males, in comparison to females, usually have a higher status in the organisation’s
hierarchy; thus, due to the climate of independence, they can make decisions and decide by
themselves what is right or wrong, based on personal moral beliefs. Female managers are
more creative, because an assumption could be made that females, more than males,
appreciate the positive psychological climate in the organisation, seek to maintain a friendly
atmosphere, favour communication more; thus, the creativity needs to be employed.
Almost one third of respondents (30%) that participated in the research have identified that
they are very satisfied with their relationships with colleagues. Slightly more than half of the
respondents were satisfied with their relationships with clients (56%), trust (54%), workload
(53%), control (52%), working environment (51%), time planning (50%), rational work
organisation (50%). The respondents most rarely were likely to agree with the statement that
they are satisfied with a reward system (31%). During the research, it has been determined
that 26-35-year-old respondents, rather than 36-42 year old respondents, were satisfied more
with their emotional environment (χ2= 35.154; p<0.05), values (χ2= 39.891; p<0.05). Less
than half of the respondents that participated in the research (47%) declared that when urgent
tasks appear, they instantly complete the tasks by themselves, because they do not trust
anyone, and only a small part of participants (18%) said that when urgent tasks appear, they
instantly delegate them to the others who are competent to perform the given task, while they
carry on with their work. Thus, it could be stated that even in delegating tasks, the aspect of
control prevails strong as well as a strong sense of responsibility. Slightly less than half of
participants were likely to completely agree with the statement that in their opinion, when
working together, people should create such an atmosphere that they would be not afraid to
express their dissatisfaction (42%). Slightly more than half of the participants (59%) argued
that the opinions of other people that participate in the discussion matters to them. Whereas
one third of participants (29%) agreed with the statement that they are more listeners than
active participants in a discussion.
3.3. Organisational features and goals
During the research, it has been determined that respondents whose work experience is less
than 1 year, rather than more than 11 years, more frequently agreed with the statement that
they are more listeners than active participants in a discussion (χ2= 26.510; p<0.05). An
assumption could be made that employees with shorter work experience in the organisation
are afraid to express their opinion, stay silent, avoiding rejection or talking in a way that
would be considered unacceptable. Less than half of the respondents (44%) that participated
in the research stated that there is a strong connection between them and their team, whereas
a similar part of respondents (47%) said that there is a neither strong, nor week connection
between them and their leader. Thus, an assumption could be made that respondents have
created stronger connections between themselves and the team, because they are united by
more commonalities: work results and motivational system depend on the concentration at
work. Whereas a leader is more occupied with organisational goals, creating and achieving
strategic goals; thus, it is possible that the connection between a leader and the team is
weaker.
The most of the respondents that participated in the research said that the appearance of
innovation at work are mostly influenced by creativity (12.5%), manager support (12.2%),
safe environment for sharing ideas (9.2%), allowing to make mistakes (8.8%), organisational
Conclusions
Based on the analysis of definitions of leadership and organisational culture, it is noteworthy
that leadership is a process, art and ability to make vision into reality, trying to achieve the
set goal by attracting as many people/followers as possible, influence them to put efforts
independently in order to reach group goals.
Organisational culture is proven one of the most important staff characteristics; having it own
deeply rooted values that are difficult to change. Organisational culture is also important for
the staff. However, a leader by using own power, influence and employing creativity s/he is
capable to change organisational culture.
A leader is reciprocally influencing organisational culture and vice versa: A leader by using
his/her influence, power, personal characteristics and employing creativity can create an
effective organisational culture that would ensure all: emotional climate, innovation,
effective teamwork, strong expression of community spirit, can encourage moral values.
References
Adewale, O.O. and Anthonia, A.A., 2013. Impact of Organizational Culture on Human
Resource Practices: A Study of Selected Nigerian Private Universities, [online] Available
at: <http://www.cjournal.cz/files/154.pdf> [Accessed 22 August 2020].
Ahmed, A.D. and Bach, C., 2014. Major Traits/Qualities of Leadership, [online] Available
at: <https://goo.gl/GdtCKE> [Accessed 22 August 2020].
Algahtani, A., 2014. Are Leadership and Management Different? A Review, [online]
Available at: <http://jmppnet.com/journals/jmpp/Vol_2_No_3_September_2014/4.pdf>
[Accessed 22 August 2020]. DOI: 10.15640/jmpp.v2n3a4.
Bashir, N.A., 2017. Leadership Connection to Emotional Intelligence and Stress at
Workplace, [online] Available at: <http://www.macrothink.org/journal/index.php/jmr/
article/view/9338/8419> [Accessed 22 August 2020]. DOI: 10.5296/jmr.v9i1.9338.
Bass, B.M., 1990. Bass & Stogdill's Handbook of Leadership: Theory, Research, and
Managerial Applications, [online] Available at: <https://goo.gl/QaTO9f> [Accessed
22 August 2020]. ISBN 0-02-90150-6.
Bedrule – Grigoruta, M.V., Neculaesei, A.-N., Tătăruşanu M. and Anastasiei, B.A., 2019.
Model of the Relationship between Organizational Culture, Social Responsibility and
Performance. Transformations in Business & Economics, 18, pp. 489-509.
Bogenschneider, B.N., 2016. Leadership Epistemology, [online] Available at:
<https://pdfs.semanticscholar.org/c3c3/6c21aa308670a86a103f7c1ba81a2b42e8e5.pdf >
[Accessed 22 August 2020]. DOI: 10.17062/CJIL.v2i2.37
Brackett, M.C., Rivers, S.E. and Salovey, P., 2011. Emotional Intelligence: Implications for
Personal, Social, Academic, and Workplace Success, [online] Available at:
<http://ei.yale.edu/wp-
content/uploads/2013/09/pub184_Brackett_Rivers_Salovey_2011_Compass-1.pdf>
[Accessed 22 August 2020].
Camerer, C. and Vepsalainen, A., 1988. The Economic Efficiency of Corporate Culture,
[online] Available at: <http://onlinelibrary.wiley.com/doi/10.1002/smj.4250090712/pdf>
[Accessed 22 August 2020].
Cha, J., Kim, Y., Lee, J.Y. and Bachrach, D.G., 2015. Transformational Leadership and
Inter-Team Collaboration: Exploring the Mediating Role of Teamwork Quality and
Moderating Role of Team Size, [online] Available at: <http://journals.sagepub.com/
doi/pdf/10.1177/1059601114568244> [Accessed 22 August 2020]. DOI: 10.1177/
1059601114568244.
Chalikias, M., Kyriakopoulos, G., Skordoulis, M., Koniordos, M., 2014. Knowledge
Management for Business Processes: Employees' Recruitment and Human Resources'
Selection: A Combined Literature Review and a Case Study. Communications in
Computer and Information Science, CCIS, 466, pp.505-520. DOI: 10.1007/978-3-319-
11854-3_44.
Chang, C.L. and Lin, T.C., 2015. The role of organizational culture in the knowledge
management process, [online] Available at: <http://www.emeraldinsight.com/
doi/pdfplus/10.1108/JKM-08-2014-0353> [Accessed 22 August 2020]. DOI:
10.1108/JKM-08-2014-0353.
Fang, T., 2006. From “Onion” to “Ocean”. Paradox and Change in National Cultures,
[online] Available at: <http://ibr.hi.is/sites/ibr.hi.is/files/fang-2006.pdf ISSN 0020-
8825 > [Accessed 22 August 2020].
Fiedeldey Van D. and Freedman, J., 2007. Differentiating Emotional Intelligence in
Leadership, [online] Available at: <http://www.6seconds.org/wp-content/uploads/
2012/08/JLS_Differt_Leadership.pdf> [Accessed 22 August 2020].
Garcia, J., 2012. Leadership Intelligence: The Four Intelligences of a Leader, [online]
Available at: <http://www.regent.edu/acad/global/publications/lao/issue_22/4Garcia_
intelligence_lao_22.pdf> [Accessed 22 August 2020].
Halle, Y., 2016. Influence of leader and follower behavior on employee voice, team task
responsibility, and team effectiveness, [online] Available at: <http://essay.utwente.nl/
69169/1/terHalle_MA_BMS.pdf> [Accessed 22 August 2020].
Hao, J. and Yazdanifard, D.R., 2015. How Effective Leadership can Facilitate Change in
Organizations through Improvement and Innovation. Global Journal of Management
And Business Research, [online] Available at: <https://journalofbusiness.org/
index.php/GJMBR/article/view/1737> [Accessed 22 August 2020].
Hofstede, G., 2001. Culture’s Consequences: Comparing Values, Behaviors, Institutions and
Organizations Across Nations, [online] Available at: <https://goo.gl/CjCE0T> [Accessed
22 August 2020].
Hofstede, G. and Hofstede, G.J., 2005. Cultures and Organizations: Software of the Mind,
[online] Available at: <http://www.idemployee.id.tue.nl/g.w.m.rauterberg/lecturenotes/
DG000%20SCA/Cultures%20and%20Organizations.Hofstede.EBS.pdf> [Accessed 22
August 2020].
Hogan, R. and Kaiser, B.R., 2005. What We Know About Leadership, [online] Available at:
<http://psychology.illinoisstate.edu/ktschne/psy376/Hogan_Kaiser.pdf> [Accessed 22
August 2020]. DOI 10.1037/1089-2680.9.2.169.
Hooijberg, R. and Lane, N., 2005. Leader effectiveness and Integrity: wishful Thinking?
[online] Available at: <https://www.imd.org/research/publications/upload/Hooijberg_
Lane_WP_2005_1_Level_1.pdf> [Accessed 22 August 2020].
Jahanian, R. and Salehi, S., 2013. Organizational Culture, [online] Available at:
<http://hrmars.com/hrmars_papers/Organizational_Culture.pdf> [Accessed 22 August
2020].
Jiang, W., Zhao, X. and Ni, J., 2017. The Impact of Transformational Leadership on
Employee Sustainable Performance: The Mediating Role of Organizational Citizenship
Behavior. Sustainability, 9, p.1567. DOI: 10.3390/su9091567.
Khan, I. and Nawaz, A., 2016. The Leadership Styles and the Employees Performance: the
Review, [online] Available at: <https://www.researchgate.net/publication/313624131_
THE_LEADERSHIP_STYLES_AND_THE_EMPLOYEES_PERFORMANCE_A_RE
VIEW>[Accessed 22 August 2020].
Northouse, P.G., 2007. Leadership: Theory and Practice, [online] Available at:
<https://books.google.lt/books?id=Ctq4cZS5JfsC&printsec=frontcover&source=gbs_ge
_summary_r&cad=0#v=onepage&q&f=false> [Accessed 6 September 2020].
Ott, J.S., 1989. The Organizational Culture Perspective. Pacific Grove, Calif.: Brooks/Cole
Publishing Company.
Paraschiv, D., 2013. A review of leadership, [online] Available at:
<http://www.anstuocmath.ro/mathematics/pdf29/18.pdf> [Accessed 22 August 2020].
DOI: 10.2478/auom-2013-0037.
Sahgal, P. and Pathak, A., 2007. Transformational Leaders: Their Socialization, Self-
Concept, and Shaping Experiences, [online] Available at: <https://www.regent.edu/
acad/global/publications/ijls/new/vol2iss3/sahgal/SahgalPathak_Vol2Iss3.pdf>
[Accessed 22 August 2020].
Saleem, H., 2014. The impact of leadership styles on job satisfaction and mediating role of
perceived organizational politics, [online] Available at: <https://www.sciencedirect.com/
science/article/pii/S1877042815004401> [Accessed 22 August 2020]. DOI:
10.1016/j.sbspro.2015.01.403.
Saseanu, A.S., Ghita, S.I. and Gogonea, R.M., 2019. Perspective of Feminine Leadership in
the Socio-Political Field. Comparative Analysis of the European Countries.
Transformations in Business & Economics, 18(3), pp.137-154.
Schein, E.H., 2004. Organizational Culture and Leadership, [online] Available at:
<http://www.untagsmd.ac.id/files/Perpustakaan_Digital_2/ORGANIZATIONAL%20C
ULTURE%20Organizational%20Culture%20and%20Leadership,%203rd%20Edition.p
df> [Accessed 29 June 2020].
Sergiovanni, T.J., 1990. Adding Value to Leadership Gets Extraordinary Results, [online]
Available at: <http://www.ascd.org/ASCD/pdf/journals/ed_lead/el_199005_
sergiovanni.pdf> [Accessed 22 August 2020].
Sharma, M.K. and Jain, S., 2013. Leadership Management: Principles, Models and Theories,
[online] Available at: <https://www.ripublicat+ion.com/gjmbs_spl/gjmbsv3n3spl_14.pdf>
[Accessed 22 August 2020].
Silong, A.D. and Hassan, Z., 2009. Participative and Effective Community Leadership
Practice in Malaysia, [online] Available at: <http://www.hraljournal.com/Page/
16%20Madinah%20Mohamad.pdf> [Accessed 22 August 2020].
Silva, V.L.S., Camelo, S.H.H., Soares, M.I., Resck, Z.M.R., Chaves, L.D.P., Santos, F.C.
and Leal, L.S., 2015. Leadership practices in hospital nursing: a self of manager nurses,
[online] Available at: <http://www.scielo.br/pdf/reeusp/v51/1980-220X-reeusp-51-
e03206.pdf> [Accessed 22 August 2020]. DOI: 10.1590/S1980-220X2016024403206.
Simanskiene, L. and Sandu, L., 2014. Organizational culture assessment methods. Regional
Formation and Development Studies, 2, pp. 201-210.
Simanskiene, L. and Zuperkiene, E., 2014. Sustainable leadership: The new challenge for
organizations. Forum Scientiae Oeconomia, 2, pp. 81-93.
Streimikiene, D., Mikalauskiene, A. and Ciegis, R., 2019. Sustainable Development,
Leadership and Innovation. CRC Press: Boca Raton US.
Ukaidi, C.U.A., 2016. The Influence of Leadership Styles on Organizational Performance in
Nigeria, [online] Available at: <http://www.eajournals.org/wp-content/uploads/
DOI: 10.24818/EA/2021/57/504
Abstract
The efficiency of correlation-regression analysis would significantly expand if both of its
essential variables – a dependent and an independent – conveyed the information on the
dynamic rather than static state of a phenomenon under consideration. For this objective,
the dynamic development of the socioeconomic processes should be based on the
quantitative assessment. Existing methodologies call for improvement as they do not fully
reflect the state of particular phenomena. In this article, authors provide the quantitative
assessment methodology to analyse the dynamics of socioeconomic processes. It was
applied for assessing real situations, which confirmed adequacy and applicability of this
methodology.
*
Corresponding author, Romualdas Ginevičius – e-mail: romualdas.ginevicius@vgtu.lt
Authors’ ORCID:
Romualdas Ginevičius: orcid.org/0000-0003-2067-4398
Martin Schieg: orcid.org/0000-0003-0843-7605
Magdalena Kot-Radojewska: orcid.org/0000-0002-7323-1913
Marta Jarocka: orcid.org/0000-0002-2610-8007
1. The potential of quantitative assessment of the dynamics for the SEP development
Being multiple and complex by their nature, socioeconomic processes are affected by a
number of destabilising factors. Together, they form the environment that requires a
constant adaptation. The result of such situation is that the development of the
socioeconomic processes is not ideal, i.e. it is not smooth, and its intensity may vary in
different time slots. The development is considered to be ideally smooth, if an increase in
the SEP development is equal over all time slots during the entire period under
consideration, i.e. if ∆q i = ∆q i + 1 ; here ∆q i represents an increase in the SEP development
over the ith time slot of the entire period T, e.g. a year ( i = 1, n ). In this case, an ideal
trajectory of the SEP development would look as depicted in Figure no. 1:
Figure no. 2. The factual SEP development during the analysed time period
The method of Measuring of Dynamics of Development (MDD) is proposed as the one that
allows to quantitatively assess the factual trajectory of the SEP development depicted in
Figure no. 2. Based on this method, the dynamics of economic development was estimated
for a group of the EU member states (Ginevičius, et al., 2018). The SEP development itself
li = 1 + Δqi 2 . (1)
The length L i of the SEP development factual trajectory over the entire analysed time
period T is equal to the sum of the values l i :
N
LT = ∑ li . (2)
i =1
The indicator D T represents the SEP development smoothness over the analysed period T is
estimated by formula:
T . (3)
DT =
Li
Intensity, another partial indicator of the SEP development dynamics, is evaluated as the
ratio of of the SEP development the value at the start of period T and the SEP development
value at the end of this period:
Qf
DI = , (4)
Qb
here D I represents intensity of the SEP development over the entire period T; Q f marks the
value the SEP development at the beginning of period T; Q b stands for the value of the SEP
development at the end of period T.
The main SEP development dynamics indicator is described as the result of the
development smoothness and intensity factors:
D = DT ⋅ DI. (5)
seen in Figure no. 2, the length of one perpendicular in the right triangle in time slot i over
the period T is equal to the difference in the values at the beginning and the end of this time
slot. The length of the other perpendicular is evaluated based on the duration of period T (in
years), is divided by the number years. For example, if T = 10 years, it covers 10 time slots.
In this case, length l i of the perpendicular is equal to l i = 10 : 10 = 1.
In order to improve the existing methodology and not to abandon its principles, it is
necessary to clarify the estimation of both the ideal and factual trajectories of the SEP
development and calculate the development intensity indicator.
Evaluation of the SEP development ideal trajectory length. Based on MDD methodology,
this length is equal to the duration of period T. In essence, a separate case of the SEP
development is faced when no increase in the development is recorded during all time slots
of period T, i.e. ∆q = ∆q i+1 . The indicators of the SEP development show that such cases
are practically non-existent because any process functions only when it evolves. Thus, real
processes develop with varying intensity.
The structure of the ideal trajectory length estimation for the SEP development over time
period T is represented in Figure no. 1 which shows that the length of this trajectory is
equal to the length of the diagonal line Q b Q f in the triangle Q b Q f Q′ b . It is represented in
following formula (Ginevičius, et al., 2018):
LT = T 2 + ∆Q 2 , (6)
l i is the SEP development ideal trajectory length in ith time slot over period T.
The SEP development value for ith time slot corresponding to the ideal trajectory of the SEP
development over the period under consideration is estimated as follows:
∆Q , (8)
∆q~i = Qb + i
n
∆q~i is the value of the SEP development for ith time slot represented by the ideal trajectory
of the SEP development.
Evaluation of the SEP development factual trajectory length. Accordingly, in previously
described method for the SEP development ideal trajectory length, the factual trajectory
length of the of the SEP development in ith time slot over period T is evaluated based on the
triangle ∆q i ∆q i+1 ∆q′ i (Figure no. 3).
qi + 1
∆q i
qi q′i
The factual trajectory length of the SEP development over period T is equal to:
n
2
Lf = ∑ 1 + ∆qi . (10)
i =1
Estimation of the SEP development dynamics index. With reference to formulas (6) and
(10), the index representing the SEP development smoothness over period T can be
estimated as follows:
LT T 2 + ∆Q 2 , (11)
DT = = n
LF ∑ 1 + ∆q 2
i
i =1
here: D T marks the index representing the SEP development smoothness over period T.
Formula (11) shows that the SEP development smoothness value in an ideal situation is
equal to 1 regardless of the existing development intensity. Based on the MDD
methodology for the quantitative analysis of the dynamics of SEP development, the
smoothness indicator should be applied in combination with the development intensity
indicator. The MDD methodology proposes to estimate this index based on formula (5). A
deeper analysis of its implication, however, shows that the methodology calls for
improvement. In an ideal case, the SEP development smoothness D T = 1.0. If ∆Q = 0
(Figure no. 1), then Q f = Q b and D I = 1.0, while D = 1.0. This goes against logic because if
∆Q = 0, i.e. if no SEP development over period T has been observed, the SEP dynamics
index should be equal to 0. Considering this, the SEP development intensity index should
be estimated as follows:
Q f − Qb . (12)
DI =
Qf
Formula (13) indicates that when Q f = Q b , then D I = 0. With growing ∆Q, i.e. the
difference Q f − Q b , the value of the SEP development intensity index is also rising.
Formula (5), for the quantitative analysis of the dynamics of SEP development, remains
unchanged, only both of its variables – the development smoothness D T and the
development intensity D I – are determined in a different way:
Q f − Qb T 2 + ∆Q 2 . (13)
D = DT ⋅ DI = ⋅ n
Qf ∑ 1 + ∆qi
2
i =1
The economic development analysis in different countries revealed that there exists a rather
elastic relationship between the development smoothness and intensity: when intensity is
growing, smoothness is decreasing (Ginevičius, et al., 2018). This proposes that formula (5),
representing the SEP development dynamics, should incorporate both quantitative and
qualitative factors affecting this dynamics. Methods that take into account both the values and
significance of the indicators, i.e. multi-criteria assessment methods (Hwang and Yoon, 1981;
Hwang and Lin, 1987), are best suited for this purpose. These days multi-criteria assessment
methods are applied for quantitative assessment of a wide variety of complex engineering-
technological (Álvarez, et al., 2017; Juodagalvienė, 2018; Bielinskas, 2018; Binkytė, 2018),
socio-economic (Ejdys, et al., 2016; Gedvilaitė, 2018; Oželienė, 2019; Volkov, 2018) and
other phenomena and processes. Some of them are less (Hwang and Yoon, 1981; Hwang and
Lin, 1987; Zavadskas, et al., 1994), while others are more sophisticated (Balcomb and
Curtner, 2000; Saaty, 1980; Vallee and Zielniewicz, 1994; Hwang and Yoon, 1981).
In any case, the philosophy of multi-criteria assessment is embodied in the most common
classical SAW (Simple Additive Weighting) method, expressed as follows (MacCrimmon
1968; Hwang and Yoon 1981):
n
kj = ∑ ωi ⋅ q~i , (14)
j =1
here k j marks the value of the multi-criteria assessment by the SAW method estimated for
jth variation of a phenomenon under consideration; ω i is the significance of the ith indicator;
q~i ‒ a normalised value of the ith indicator.
Based on formula (14), the SEP development dynamics is quantitatively assessed as
follows:
~
D = ω1 ⋅ DI + ω2 ⋅ DT , (15)
~
here D – the SEP development dynamics index incorporating the significance of both the
development intensity and smoothness; ω1 – the SEP development intensity significance;
ω 2 – the SEP development smoothness significance.
Romania GDP
Cyprus GDP
26 12
24 10
Cyprus
22 8
Romania
20 6
2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Year
Figure no. 4. Changes in GDP per capita data in Cyprus (axis 1) and Romania (axis 2)
over the 2009-2018 period
Source: compiled by the author with reference to Eurostat, 2020
Table no. 2 shows the values for the variables Q b , Q f , ∆Q and ∆q̃.
Table no. 2. The values of indicators Q b , Q f , ∆Q and ∆q̃ for the economic development
in Cyprus and Romania over the 2009-2018 period
Indicator values, EUR
Country
Qb Qf, ∆Q ∆q ̃
Cyprus 23.1 24.3 1.2 0.133
Romania 6.1 10.5 4.4 0.489
The ideal trajectory of GDP fluctuations in the countries under consideration over the 2009-
2018 period can be depicted as follows (Figures no. 5-6):
Figure no. 6. Representation of the ideal trajectory of the GDP changes in Romania
K j – is the coefficient for the economic development intensity adjustment of in the jth
country in relation to the other country;
Q fj – is the economic development value of the j th country at the end of the analysed period;
Q max
f
– is the economic development value of the country which is higher at the end of the
analysed period.
For further analysis formulas (12) and (16), are used for the evaluation of the intensity of
the economic development in the j th country in relation to the other country:
~ Q fj − Qbj ∆Q j . (17)
Dj = = max
Q max
f Qj
After application of the formula (17) and reassessment of the economic development
intensity indicator in the analysed countries, the development dynamics values also
changed (Table no. 4):
Table no. 4. Economic development dynamics indicators of the Cyprus and Romania
based of the context of the other country (2009-2018)
Indicator values
Country
Dj D Tj D
Cyprus 0.05 0.802 0.04
Romania 0.18 0.974 0.18
For the evaluation of the development intensity and smoothness impact on the development
dynamics, it is important to evaluate the significance those indicators on the development
process. The expert evaluation showed that ω 1 = 0.7, while ω2 = 0.3, which defines the
development dynamics indicator values (Table no. 5):
Table no. 5. Economic development dynamics indicators based on the significance
of the development intensity and smoothness (2009-2018)
Country The value of the economic development dynamics indicator
Cyprus 0.28
Romania 0.54
Implemented analysis shows that the dynamics indicator value is more affected by the
development intensity rather than the development smoothness.
Conclusions
1. In order to increase the efficiency of correlation-regression analysis, which these days is
the most common method of the SEP analysis and fluctuation forecast, both independent,
i.e. input, and dependent, i.e. output, variables need to be expressed in their dynamic rather
than static condition. For this purpose, their fluctuations over a particular period, i.e. the
dynamics of their fluctuations, need to be quantitatively assessed.
2. The main point if the SEP development dynamics quantitative analysis is the difference
ratio between the ideal and the factual trajectory lengths of the development. Ideal trajectory
length reflects the maximum possible smoothness. The current MDD (Measuring of
Dynamics of Development) methodology calls for improvement for several reasons: firstly, it
does not fully reflect the real SEP development; also, the factual trajectory length of the SEP
development in all cases is compared with the duration of analysed time period T.
3. Based on the proposed methodology, which is named as MDD-M, SEP development
factual trajectory length is evaluated based on the length of the diagonal line in the triangle.
Perpendicular in this triangle represents the SEP development scale over the analysed
period of time, while the other one is represents to the duration of this time period.
4. For the evaluation of the SEP development factual trajectory length the sum of the
diagonals in the triangles based on separate time slots inside the analysed whole time
period. In order to evaluate the length of a perpendicular inside triangles it is needed to
divide the total duration of the analysed time period by the number of separate time slots. In
this analysis the length of another perpendicular is evaluated as the difference between the
the development factual value at the end of the ith time slot and the ideal trajectory value in
this time slot.
5. The more accurate result of quantitative assessment is obtained by considering the
significance of both quantitative and qualitative sides of the SEP development, represented
by the development intensity and smoothness respectively.
The proposed quantitative assessment methodology, for the analysis of the SEP
development dynamics, can be applied not only to raise the adequacy of correlation-
regression. It can also be applied for analysing the development of various socio-economic
processes: assessment of GDP, investment, sectoral economic, social, shadow economy
related fluctuations and tendencies, etc.
Lisiński, M., Augustinaitis, A., Nazarko, L. and Ratajczak, S., 2020. Evaluation of
dynamics of economic development in Polish and Lithuanian regions. Journal of
Business Economics and Management, 21(4), pp. 1093-1110.
MacCrimmon, K.R., 1968. Decision making Among Multiple-Attribute Alternatives. A
Survey and Consolidated Approach, s.l.: RAND Memorandum RM-4823-ARPA.
Molendowski, E. and Petraškevičius, V., 2020. International competitive positions of the
Baltic States – changes and determinants in the post-accession period. Journal of
Business Economics and Management, 21(3), pp. 706-724.
Nikonenko, U., Hanushchyn, S., Boikivska, G., Andriichuk, Y. and Kokhan, V., 2020.
Influence of world commodity prices on the dynamics of income of exporting countries
of natural resources under globalization. Business: Theory and Practice, 21(1), p. 440.
Oželienė, D., 2019. Modelling the factors of a company’s sustainable development.
Doctoral dissertation. Vilnius: Technika.
Radlińska, K., Klonowska-Matynia, M., Jakubowska, A. and Kwiatkowski, G., 2020. Labor
hoarding: an old phenomena in modern times? Case study for EU countries. Journal of
Business Economics and Management, 21(3), pp. 872-889.
Saaty, T.L., 1980. The Analytic Hierarchy Process. New York: McGraw-Hill.
Vallee, D. and Zielniewicz, P., 1994. ELECTRE III-IV, Version 3x. Aspects
Methodologiques (tome 1). Paris: Universite de Paris Dauphine.
Volkov, A., 2018. Assessment of the impact of the common agricultural policy direct
payments system on agricultural sustainability. Doctoral dissertation. Vilnius:
Technika.
Zavadskas, E.K., Kaklauskas, A. and Sarka, V., 1994. The new method of multicriteria
complex proportional assessment of projects. Technological and Economic
Development of Economy, 1(3), pp. 131-139.
DOI: 10.24818/EA/2021/57/517
Abstract
The purpose of this paper is to compare the accuracy of the three types of models:
Autoregressive Integrated Moving Average (ARIMA) models, Holt-Winters models and
Neural Network Auto-Regressive (NNAR) models in forcasting the Harmonized Index of
Consumer Prices (HICP) for the countries of European Union and the Western Balkans
(Montenegro, Serbia and Northern Macedonia). The models are compared based on the
values of ME, RMSE, MAE, MPE, MAPE, MASE and Theil's U for the out-of-sample
forecast. The key finding of this paper is that NNAR models give the most accurate forecast
for the Western Balkans countries while ARIMA model gives the most accurate forecast of
twelve-month inflation in EU countries. The Holt-Winters (additive and multiplicative)
method proved to be the second best method in case of both group of countries. The obtained
results correspond to the fact that the European Union has been implementing a policy of
strict inflation targeting for a long time, so the ARIMA models give the most accurate
forecast of inflation future values. In the countries of the Western Balkans the targeting policy
is not implemented in the same way and the NNAR models are better for inflation forecasting.
*
Corresponding author, Vesna Karadzic – e-mail: vesnaka@ac.me
Authors’ ORCID:
Vesna Karadzic: orcid.org/0000-0003-4979-7674
Bojan Pejovic: orcid.org/0000-0001-9220-9327
Introduction
Price stability is one of the goals of all countries, especially the countries of the European
Union and its potential members, as documented through the political agendas of the
European Union and the Maastricht convergence criteria (Golinelli and Orsi, 2002).
Predicting the future value of inflation is of particular importance for all countries, whether
or not they have clearly declared inflation targeting policies. Historically, the European
Union has successfully pursued a policy of targeting inflation and has not had high
inflationary developments in the past, while the countries of the Western Balkans aspiring to
become members of the European Union had high inflation during the late twentieth century
caused by the numerous factors. The countries of the Western Balkans have diverse foreign
exchange systems, Montenegro is a dollarized (euroized) economy, while Serbia and
Macedonia have their own currencies. The Harmonized Index of Consumer Prices (HICP)
monitored for the European Union comprises a number of countries and their diverse foreign
exchange systems.
The paper examins the possibilities for application of Auto-Regressive Integrated Moving
Average (ARIMA), Holt-Winters and Neural Network Auto-Regressive (NNAR) models in
the inflation forecasting for the three countries of the Western Balkans (Montenegro, Serbia,
North Macedonia) and full member countries of the European Union during the observed
2010-2020 period. The dual possibility of comparing the models is considered. Firstly,
models are compared within their own class, and then the best models from each class are
mutually compared.
There are many models that can be used for inflation modeling and forecasting. In this paper
the possibility of inflation modeling and accuracy of its forecasting with univariate models
are tested. The forecast of future values is based only on historical data on inflation. This
type of models often give a faster and more accurate forecast compared to more complex
factor models. This is a consequence of the unpredictability and impossibility of accurate
measurement and evaluation of numerous factors, as well as their erroneous specifications in
the models of traditional econometric analysis. An additional limitation is the need to predict
the values of all determinants of the observed series, which further complicates the work and
leads to inaccuracies in forecasting.
The paper is organized as follows. A literature review is presented in the next section. The
third section reviews the basic methodological bases of development and specifications of
econometric models. The fourth section presents the empirical analyses and comparison of
estimated models. Finally, conclusions are presented in the fifth section.
1. Literature review
Today, in modern monetary theory and central banking practice price stability is usually
associated with moderate price growth (Ascari and Sbordone, 2014). The level and degree of
change in inflation have always been an interesting research topic for many researchers.
Researchers' interest in the field reflected the current level of development of empirical
apparatus for forecasting time series.
Meyler, Kenny and Quinn (1998) forecast inflation in Ireland by comparing the ARIMA
models obtained using the Box-Jenkins methodology and objective penalty function
methods. Pufnik and Kunovac (2006) give a forecast of short-term inflation based on the
2. Research methodology
2.1. ARIMA models
ARIMA models are particularly suitable for short-term forecasts and the model evaluation
methodology is the result of the work of Box and Jenkins (1976). ARIMA models have two
components, the autoregressive component (AR) and the moving average component (MA).
The AR component refers to the autocorrection coefficients of the previous data, while the
MA component represents moving averages with a corresponding lag. I represents the level
of integration of the series, i.e. is the series stationary with the original data, on the first or
second difference. After model identification, evaluation of model parameters is tested to
meet the statistical and econometric criteria of model validity. If the model meets all the
validity criteria it can be used for forecasting. Seasonal ARIMA models can be represented
by ARIMA (p, d, q) (P, D, Q) s , where (p, d, q) represents the non-seasonal part of the model,
while (P, D, Q) s is the seasonal part where s represents the number of periods during one
year.
(1 − 𝜙𝜙1 𝐵𝐵) (1 − Φ1 𝐵𝐵12 )(1 − 𝐵𝐵)(1 − 𝐵𝐵12 )𝑦𝑦𝑦𝑦 = (1 + θ1 𝐵𝐵) (1 + Θ1 𝐵𝐵12 )𝜀𝜀𝑡𝑡 (1)
In seasonal ARIMA models p represents the number of autoregressive elements, d is the level
of series differentiation, q is the number of moving average elements, while P is the number
of seasonal autoregressive elements, D is the number of seasonal differences and Q is the
number of seasonal moving average elements.
future values of a time series, values that are closer to the current one are more important
than previous values that are further away. The method can be used for short, medium and
long term forecasts. There are two types of methods in relation to the nature of time series,
and these are additive and multiplicative models. The additive method is used when
seasonal fluctuations are at approximately the same level during a time series, while the
multiplicative method is used when seasonal variations change in proportion to the time
series level.
Equations for the additive method:
Forecast: 𝑦𝑦�𝑡𝑡+ℎ|t = ℓ𝑡𝑡 + ℎ𝑏𝑏𝑡𝑡 + 𝑠𝑠𝑡𝑡+ℎ−𝑚𝑚(𝑘𝑘+1) (2)
Level: ℓ𝑡𝑡 = α(𝑦𝑦𝑡𝑡 − 𝑠𝑠𝑡𝑡−𝑚𝑚 ) + (1 − α)(ℓ𝑡𝑡−1 + 𝑏𝑏𝑡𝑡−1 ) (3)
Trend: 𝑏𝑏𝑡𝑡 = 𝛽𝛽 ∗ (ℓ𝑡𝑡 − ℓ𝑡𝑡−1 ) + (1 − 𝛽𝛽 ∗)𝑏𝑏𝑡𝑡−1 (4)
Seasonal: 𝑠𝑠𝑡𝑡 = γ(𝑦𝑦𝑡𝑡 − ℓ𝑡𝑡−1 − 𝑏𝑏𝑡𝑡−1 ) + (1 − γ)𝑠𝑠𝑡𝑡−𝑚𝑚 (5)
Equations for the multiplicative method:
Forecast: 𝑦𝑦�𝑡𝑡+ℎ|t = (ℓ𝑡𝑡 + ℎ𝑏𝑏𝑡𝑡 )𝑠𝑠𝑡𝑡+ℎ−𝑚𝑚(𝑘𝑘+1) (6)
𝑦𝑦
Level: ℓ𝑡𝑡 = α 𝑡𝑡 + (1 − α)(ℓ𝑡𝑡−1 + 𝑏𝑏𝑡𝑡−1 ) (7)
𝑠𝑠𝑡𝑡−𝑚𝑚
Trend: 𝑏𝑏𝑡𝑡 = β ∗ (ℓ𝑡𝑡 − ℓ𝑡𝑡−1 ) + (1 − β ∗)𝑏𝑏𝑡𝑡−1 (8)
𝑦𝑦
Seasonal: st = γ (ℓ 𝑡𝑡 ) + (1 − γ)𝑠𝑠𝑡𝑡−𝑚𝑚 (9)
𝑡𝑡−1 +𝑏𝑏𝑡𝑡−1
where is the observed series, s is the length of the seasonal cycle, gives the level of the
series, represents the trend, 0 ≤ α ≤ 1, 0 ≤ β ≤ 1, 0 ≤ ≤1 and presents forecast for
h-periods ahead.
1 𝑔𝑔
Root mean square error: 𝑅𝑅𝑅𝑅𝑅𝑅𝑅𝑅 = � ∑𝑗𝑗=1(𝑥𝑥𝑚𝑚+𝑗𝑗 − 𝑥𝑥�𝑚𝑚(𝑗𝑗) )2 (11)
𝑔𝑔
𝑔𝑔 1
Mean absolute error: 𝑀𝑀𝑀𝑀𝑀𝑀 = ∑𝑗𝑗=1�𝑥𝑥𝑚𝑚+𝑗𝑗 − 𝑥𝑥�𝑚𝑚(𝑗𝑗) � (12)
𝑔𝑔
� 𝑡𝑡+1 −𝑋𝑋𝑡𝑡+1 2
𝑋𝑋
∑𝑛𝑛−1
𝑡𝑡=1 � �
𝑋𝑋𝑡𝑡
Theil's U statistic: 𝑈𝑈 = � 𝑋𝑋𝑡𝑡+1 −𝑋𝑋𝑡𝑡 2
(17)
∑𝑛𝑛−1
𝑡𝑡=1 � �
𝑋𝑋𝑡𝑡
where 𝑥𝑥𝑚𝑚+1 − 𝑥𝑥�𝑚𝑚(𝑗𝑗) represents the forecast error, i.e. the difference between the actual and
the predicted value of the time series. Smaller values of forecast accuracy statistics
correspond to a better forecast model. In theory there are no exact limits for the values of
forecast statistics that separate good from bad models. Therefore, we take the criterion that
the best model has lower values of all statistics compared to competitors. The best model
minimizes all ME, RMSE, MAE, MPE, MAPE, MASE and Theil's U values.
Data base for this research consist of time series of Harmonized Index of Consumer Prices
(HICP). The data are presented on a monthly basis, for the period from January 2010 to
March 2020.
R software package was used for analysis purposes.
Figure no. 2. HICP log for the period from 2010 to 2019
Source: MONSTAT, 2020 and EUROSTAT, 2020
countries will minimize the values of all information criteria: Akaike information criterion
(AIC), Akaike information criterion for small sample (AICc), and Bayesian information
criterion (BIC).
In the case of data for Serbia, we previously concluded that the series on the first difference
is not stationary, so the second difference of the original data series was determined and its
stationarity examined. Based on the statistics values of all unit root tests, it is confirmed that
the second difference of the series is stationary. (Table no. 4)
The ARIMA (0,1,0) (1,0,1) [12] with drift model is chosen as the best model in the case of
North Macedonia. Analyzing the results of the unit root test of the first time series difference
for the European Union, it was noticed that the series is characterized by the presence of a
unit seasonal root. In order to minimize the assessment of the standard deviation in the time
series, in addition to the first difference of the series, the seasonal difference of order 12 was
determined. (Table no. 6)
Table no. 6. Identification and evaluation of the model in the case of North Macedonia
Models AICc Best model: ARIMA(0,1,0)(1,0,1)[12] with drift
ARIMA(1,1,0)(1,0,1)[12] Series: North Macedonia
-849.391
with drift ARIMA(0,1,0)(1,0,1)[12] with drift
ARIMA(0,1,0)(1,0,1)[12] Coefficients:
-851.086
with drift sar1 sma1 drift
ARIMA(0,1,0)(1,0,0)[12] 0.785 -0.443 0.001
-849.487
with drift s.e. 0.125 0.178 0.001
ARIMA(0,1,0)(2,0,0)[12] sigma^2 estimated as 2.37e-05: log
-850.123
with drift likelihood=429.73
ARIMA(0,1,0)(1,0,1)[12] -850.867 AIC=-851.47 AICc=-851.09 BIC=-840.67
The ARIMA (1,1,0) (0,1,1) [12] model is chosen as the best model in the case of European
Union. (Table no. 7)
Table no. 7. Identification and evaluation of the model in the case of European Union
Model AICc Best model: ARIMA(1,1,0)(0,1,1)[12]
ARIMA(0,1,1)(0,1,1)[12] -950.854 Series: EU
ARIMA(0,1,1)(0,1,2)[12] -950.837 ARIMA(1,1,0)(0,1,1)[12]
ARIMA(1,1,0)(0,1,1)[12] -954.105 Coefficients:
ARIMA(1,1,0)(0,1,2)[12] -953.569 ar1 sma1
ARIMA(1,1,0)(1,1,2)[12] -953.257 0.37 -0.693
s.e. 0.10 0.152
sigma^2 estimated as 5.8e-06: log
likelihood=480.18
After selecting the best models for each AIC=-954.36 AICc=-954.11 BIC=-946.61
country separately, minimizing the values of the information criteria, it is necessary to
examine the existence of an autocorrelation between the residuals and the normality of their
distribution. Based on the value of Ljung-Box statistics and the corresponding p value with
a risk of error of 5%, the null hypothesis can be confirmed that all autocorrelation coefficients
are statistically equal to zero, even up to 22th lag. The residual distributions from all the
described models can be approximated by the normal distribution. Hence, the models meet
both required characteristics of model validity (absence of autocorrelation and normality of
residual distribution), and can be used in further analysis as a benchmark in model
comparison. (Table no. 8)
Table no. 8. Ljung-Box residual test for all ARIMA model
Montenegro Serbia North Macedonia EU
Ljung-Box test Ljung-Box test Ljung-Box test Ljung-Box test
data: Residuals data: Residuals data: Residuals data: Residuals
from from from from
ARIMA(1,1,0)(1,0, ARIMA(1,2,1)(1,0, ARIMA(0,1,0)(1,0, ARIMA(1,1,0)(0,1,
0)[12] with drift 0)[12] 1)[12] with drift 1)[12]
Q* = 20.86, df = Q* = 22.19, df = Q* = 12.64, df = Q* = 11.97, df =
19, p-value = 0.345 19, p-value = 0.275 19, p-value = 0.857 20, p-value = 0.917
Model df: 3. Total Model df: 3. Total Model df: 3. Total Model df: 2. Total
lags used: 22 lags used: 22 lags used: 22 lags used: 22
Models that meet all the required properties can be used to predict future time series values.
Figure no. 5 gives 12-month forecasts of all four selected ARIMA models with 80% and 95%
confidence intervals. Forecasts of the future value of the logarithm of the Harmonized Index
of Consumer Prices represent the basis for calculating the statistics of the evaluation of the
forecast in comparison with the actually realized values. The predicted values will be used
not only for comparison with the actual values but also for comparison with the predicted
values obtained by the Holt-Winters method and the use of neural networks. A comparison
of prognostic methods will be given separately for each of the observed countries.
prognostic performance. Previously calculated forecast statistics and the choice of a better
forecast method can also be clearly seen in the figure no. 6 because these values are closer to
the actual observed data that serve as test data.
Holt-Winters model for forecasting (multiplicative or additive) gives slightly worse results,
while the use of autoregressive moving averages (ARIMA) models give the most inaccurate
forecast of inflation. In the case of the inflation forecast for the European Union, the
autoregressive moving averages (ARIMA) model gives the most accurate forecast, followed
by the Holt-Winters multiplicative model, while the Neural Network Auto-Regressive
(NNAR) model gives the most inaccurate forecast of twelve-month inflation. (Figure no. 8)
Figure no. 8. Comparison of the models for the 12-month inflation forecast
Conclusions
Inflation targeting is one of the key goals of all European Union countries, as well as of the
countries aspiring to become future members of EU. It is of particular importance to all
Western Balkan countries that experienced severe hyper-inflation at the end of the twentieth
century. Having in mind the convergence criteria that EU has put before its future member
states, the dynamics of inflation measured by the change of the harmonized index of
consumer prices (HICP) and its forecast is very important topic.
The purpose of this paper was to estimate adequate models for inflation forecasting and to
compare their forecasting performances for the case of the three Western Balkans countries
(Montenegro, Serbia, North Macedonia) and EU countries. This analysis has been carried out
considering three methodologies, ARIMA, Holt-Winters and NNAR models. A comparison
of the models for forecasting monthly inflation at several levels was performed. When
comparing the models from the ARIMA class, the AICs information criterion was used. The
Holt-Winters method comparison was performed based on the forecast error. An automatic
evaluation procedure was used to evaluate the NNAR model. After selecting the best model
from each of the model classes, a final comparison of the prognostic performances of the
models is done on the bases of the forecast errors. For all analyzed countries of the Western
References
Alnaa, S.E. and Ahiakpor, F., 2011. ARIMA (autoregressive integrated moving average)
approach to predicting inflation in Ghana. Journal of economics and international
finance, 3(5), pp.328-336.
Ascari, G. and Sbordone, A.M., 2014. The macroeconomics of trend inflation. Journal of
Economic Literature, 52(3), pp.679-739.
Box, G.E., Jenkins, G.M. and Reinsel, G.C., 2011. Time series analysis: forecasting and
control. S.l: John Wiley & Sons.
EUROSTAT, 2020. European Statistics. [online] Available at: <https://ec.europa.eu/
eurostat> [Accessed 3 October 2020].
Fritzer, F., Moser, G. and Scharler, J., 2002. Forecasting Austrian HICP and its components
using VAR and ARIMA models. Working Paper No. 73. Wien: Oesterreichische
Nationalbank.
Golinelli, R. and Orsi, R., 2002. Modelling inflation in EU accession countries: the case of
the Czech Republic, Hungary and Poland. Ezoneplus working paper No. 9.
Holt, C.C., 2004. Forecasting seasonals and trends by exponentially weighted moving
averages. International journal of forecasting, 20(1), pp.5-10.
Hubrich, K., 2005. Forecasting euro area inflation: Does aggregating forecasts by HICP
component improve forecast accuracy?. International Journal of Forecasting, 21(1),
pp.119-136.
Hyndman, R.J. and Athanasopoulos, G., 2018. Forecasting: principles and practice. S.l:
OTexts.
McNelis, P.D. and McAdam, P., 2004. Forecasting inflation with thick models and neural
networks. European Central Bank Working Paper Series No. 352.
Meyler, A., Kenny, G. and Quinn, T., 1998. Forecasting Irish inflation using ARIMA models.
Central Bank and Financial Services Authority of Ireland Technical Paper Series ,
Vol. 1998, No. 3/RT/98.
Book Review: 10 (ten) projects Internet of Things. Author: Radu Pietraru .............. 570
Daniel-Marian Merezeanu
DOI: 10.24818/EA/2021/57/534
Abstract
The subject of this paper is a critique of the quasi-neoliberal violence of alternative institutions, which are
the most problematic and most threatening brake phenomenon of transition. They have been produced,
strengthened and reproduced by the authorities of most post-socialist countries in the last three decades.
The aim of this paper is to demystify neoliberalism, its ideological, philosophical, and monistic
absolutizations, as well as quasi-neoliberal manifestations, which in many post-socialist countries were
carried out directly under the auspices of alternative institutions. Also, the goal is to shed light on the
causes of the long-term crisis, chaos, institutional violence, and lawlessness, and to enable the recognition
of too visible (albeit blurred), rhetorical and “messianic” recipes, which are, in fact, developmental
shackles. The paper is based on two hypotheses: first, that alternative institutions have abused and
enslaved formal and informal institutions in most transition countries, which has led to numerous
economic and social problems, including threats to the rule of law, freedoms, and civilizational
development, and second, that a transitional hindering mechanism was created, which generated a neo-
exploitative, apologetic, neo-totalitarian and crisis environment. The paper uses common methods of
social and economic sciences, including the methods of generalization, description, abstraction,
comparison, induction and deduction. In conclusion, it is stated that the phenomenological identification
and critical demystification of the interest connections and conditioning of neoliberalism, alternative
institutions, and the crisis have been carried out, and that their exponents (alleged reformers and new
elites) had an extremely negative impact on social, economic, scientific, educational, cultural and
institutional development, because they degraded and destroyed them.
Keywords: Neoliberalism, quasi-neoliberal violence, alternative institutions, transition countries,
transitional crisis.
JEL Classification: O17, P37
*
Corresponding author, Veselin Draskovic – e-mail: vesodraskovic@gmail.com
Authors’ ORCID:
Veselin Draskovic: orcid.org/0000-0003-3968-422X
Sergey A. Kravchenko: orcid.org/0000-0003-2528-5703
Milica Delibasic: orcid.org/0000-0003-1036-3836
1. Neoliberal ideology
The practice of post-socialist countries which have implemented neoliberal ideology,
philosophy, culture and the alleged messianic recipe for development, has immorally
legitimized egoism, individualism of privileged and alternative institutions, instead of
legitimizing widely propagated individualism and freedom on a mass scale. On the other
hand, it has ignored goodwill, sacrifice, commitment, solidarity, and many civilizational
values, and rejected every form of collectivism, even the most positive and socially
necessary forms. Privileged interests have been turned into the sole guide and motive for
economic and every other behavior. This has turned society into a managerial organization
in which all social values have been marginalized and adapted to the greedy culture of
business (Horvathova and Mokrisova, 2020), that has produced new risks and
vulnerabilities (Kravchenko, 2018).
What has long been called neoliberalism in literature and rhetoric was actually a cover for
the plunder of the people (middle and lower classes) by the top authorities (as the leaders of
the alleged new elites and big capital). Neoliberalism has proved to be very strong and
resilient in the United States, Great Britain, and the EU. It was based on the economic
dominance of financial capital, the instruments of globalization, the phrases and apologetics
of some theorists, and the control of economy and society by the leading parties.
Accordingly, the neoliberals were ideological employees of financial and corporate capital
(Tomas, 2000).
In most transition countries, however, the seductiveness of neoliberalism was much greater
in terms of ideological symbolism, rhetoric, and false promises, than in the real and chaotic
life (results) of post-socialist civilization. Under the slogan of neoliberalism, a quasi-
neoliberal project has been realized secretly or openly, with all its vices, which spread
everywhere like weeds, not even bringing the illusion of happiness and welfare, but only
negative phenomenology, which openly and repeatedly threatens to destroy many
achievements of previous civilizations in most post-socialist countries (Draskovic, 2020).
Neoliberalism was and remains an ideological attempt to impose a universal and
submissive concept of power, which Western elites exported to many post-socialist and
other underdeveloped countries. They presented it as the only (non-alternative) solution to
all social and economic problems. But in fact, it was only a temporary and palliative
solution to the accumulated problems of global elites, who have been buying foreign
resources cheaply for years. At the same time, it was the main problem of the vast majority
of the world's population and an effective instrument for realizing the interests of the
political, corporate, and financial elite of the Western world.
For reminders, neoliberalism has advocated that the Washington Consensus
recommendations should be seen as the ultimate (absolute) truth. Neoliberal ideology has
been presented as a supposedly scientifically based, socially, economically, politically,
geopolitically and geoeconomically useful philosophy ‒ as the end of history. However, its
basis was neither theoretical, nor consistent. It was an attempt of interest parties
(organizations and individuals) to present this interest-driven and highly unjust ideology as
sustainable and infallible.
There is no official state ideology in Western countries. But that does not mean that there is
no quasi-state, a dominant ideology. This was and remains the illusion produced by many
neoliberals. In the West (as a general term, and not specifically in each country) still
dominates neoliberal ideology, which is persistently and sophisticatedly imposed on the rest
of the world. Unlike culture as the most general social milieu, which essentially consists of
many subcultures, different teachings and trends (multi-culturalism, which has no
authoritarian inner core), each ideology strives for the privileged status of addressed social
domination. Because of this, the attempt to impose neoliberal ideology as a neoliberal
culture to the world is a great deception. A feature of every ideology is the desire of its
bearers to spread concepts beyond the boundaries of the system ruled by that ideology.
minimal state (or mockingly: market state – a term by D. Stojanov, 2013, p. 295) and the
consequent modern anti-civilization shackles, people must understand the vicious role of
intoxicating privileged interests, which are contained in the foundations of neoliberal
philosophy.
The difference between small and large nations, underdeveloped and developed countries,
post-socialist (institutionally hybrid) and Western (civil) societies is, among other things, in
a very noticeable, widespread, and negative phenomenon. Namely, the former glorify,
advocate, and respect the opinions of unruly alibi-economists and classic interest-driven
party switchers, who have transformed from one monism to another, from socialist planners
through neoliberal ideologues to alleged returnees to institutional frameworks. In latter,
they are (very rare) simply marginalized.
Hayek's idea that neoliberalism (embodied in the free market) is the main weapon against
the elements of neototalitarianism has been turned by false (alibi) reformers through
alternative institutions into the ideology of neototalitarianism! In that sense, they used not
only this new invention (alternative institutions) for controlling political, economic and
social processes, but also the latest information and communication technologies, the so-
called tools of soft power, smart power strategies, methods of organizing pink and velvet
revolutions, information, network and hybrid wars.
The entire civilized, developed and democratic world is fighting resolutely and consistently
against privileges with all its might. The existence of alternative institutions and other
forms of institutional monism is inconceivable there (Popovic, et al., 2020). Due to this
fact, normal people must ask themselves: why exemplary models of developed countries
were not an inspiration in most post-socialist countries, but quasi-institutional, quasi-
neoliberal, non-market, and illegal enrichment at any cost, which led to the functioning of
the economy and society under the limited access to resources regime (North, et al.,
2009)?!
The neoliberal story on structural reforms (without real institutional reforms) has always
been and continues to be ‒ illusion, fiction, absurdity, mere mask and farce. For,
everywhere politics dominates over the economy. This is not only a problem of economics,
but also of history, psychology, philosophy, sociology, and culture, without which
economics cannot be understood and functions successfully.
In the three-decade period of transition, alternative institutions were active. They were
closely linked to neoliberal recipes. This negative synergistic connection has constantly
deepened the destructive economic, social, legal, ethical, and cultural phenomena, which
have turned into a negative trend of breaking without building, and have significantly
contributed to the overall crisis environment of transition. The mosaic of this general crisis
picture was completed by the following problems:
• lack of political consensus with very pronounced internal political, religious, identity,
and other divisions, as well as intensified political struggle for power,
• collectivist mentality of the people in relation to the government,
• manifestation of some anachronistic behaviors characteristic of patriarchal and
paternalistic society,
• emphasized rhetoric of false promises,
We hypothesized that there are four basic areas that have predominantly influenced the
generation of so-called new shackles: international community, culture, institutions and
knowledge. In that sense, only the neo-imperialists shackles were generated in all of the
mentioned areas. In three areas (culture, institutions and knowledge), five types of shackles
were generated: neo-totalitarian, ideological and political, apologetic, quasi-neoliberal and
alternative institutions. Finally, in two areas (institutions and knowledge), four types of
shackles were generated: non-market, system, monistic and anti-development.
Starting from the criteria of the so-called systemic paradigms (Kornai, 2002), all analyzes
of practice in most transition countries clearly show that this is a quasi-neoliberal concept
of interest, as a new, disastrous and dogmatic experiment. Through the formation and
strengthening of alternative institutions, it contributed to the emergence of new shackles,
i.e. great abuses, turmoil, and anti-development issues problems in many transition
countries. Therefore, this paper indicates the need to reconsider and eliminate the
aforementioned socially unjust order.
3. Alternative institutions
The challenge of transitional (reform) changes in post-socialist countries appeared long
ago, at a time when they were burdened by the ballast of the past and the uncertainty of the
future. Most of them have not yet found a rational and effective response to that challenge.
We believe that the main cause is insufficient and unsuccessful institutional change, i.e. the
act of alternative institutions. There are very few articles in the economic literature which
directly determine the existence and/or analyze the functioning of alternative institutions.
This is understandable for Western authors, due to the absence or negligible importance of
alternative institutions in developed countries. But, the authors from transition countries
unjustifiably neglect the existence, functioning and great social and economic impact of
alternative institutions.
They are always associated with quasi-institutional actions (from the shadow, criminal,
opportunistic), therefore, they are not easy to investigate and explain. However, there are
institutional and other indicators, which directly or indirectly indicate existence and
negative impact of alternative institutions. These include the rule of law index, economic
freedoms, innovation capacity, perceptions of corruption, global competitiveness, degree of
inequality, non-market redistribution of resources, etc.
Although alternative institutions are not a direct subject of research in developed countries,
nevertheless, traces related to them can be found in Western literature, such as:
• “exploitative approach to the state” within the so-called “interest approach” (North,
1981, p. 22) and the theory of social (public) choice (Buchanan, 1990),
• “rent-oriented motivation theory” (Krueger, 1974; Posner, 1975; Buchanan, et al.,
1980; Tullock, 1996; Rose-Ackerman, 1999; Acemoglu and Verdier, 2000; Congleton and
Hillman, 2015),
• theory of externalities (Buchanan and Tullock, 1997),
• theory of “predatory states” (Evans, 1993; Robinson, 1999; Przeworski and Limongi,
1993; Marcouiller and Young, 1995),
and illusions about individualism were applied in many countries. They were
methodologically, epistemologically (understood as the difference between truth and faith), and
ontologically in constant (inevitable) conflict with neo-institutional economic theories and
practices of developed countries, which promote institutional pluralism.
The mentioned monistic dogmas were based on the so-called market fundamentalism. That
corresponded to the abstract, amoral, and unfounded story about the so-called minimal
state. We have long ago proved the methodological unsustainability of this primitive, futile,
vulgar, and orchestrated story, stating that it is not clear whether it refers to a social,
economic, political or legal state?! Minimizing each of these state functions would
realistically mean its collapse (Figure no. 4).
Conclusion
This descriptive analysis has clearly shown that alternative institutions are the result of
systemic and institutional fiasco, which in a paradoxical and organized way (through abuse
and manipulation) enabled the domination of privileged elections, as well as interest-driven
individualism over institutionalism. The alternative institutions are a weird transition child.
Their domination over freedoms, knowledge, institutions, and truths is certainly the result
of the influence of traditional culture and dogmatic thinking, susceptibility to some
anachronistic cults, myths and prejudices, but also the actions of neoliberal ideology. To
overcome them, it is necessary to accept the civilizational and pluralistic paradigm of
development of humanistic type, as well as scientifically consistent and well-argued
critiques of all monistic conceptions and illusions, especially neoliberal and dirigistic ones,
which have always been an integral part of the braking mechanism, due to their
restrictiveness and exclusivity.
Instead of individual greed and fraudulent neoliberal grail, socio-economic development
must be sought in the civilizational adjustment – to political, economic, institutional,
geopolitical, geo-economic, environmental, and etic norms. For decades, on all meridians,
it has been lived on paradoxical and ironic consensus of fear, domination, blackmail,
interests, stratification, division, integration, identity, greed, negative selection, apologetics
and much more that confuses common sense. And all this under the thick and blurry layers
of apparent democracy, doomed to betrayal by the dirigistic forces of power, alienated from
the people (who elected them)!
For the success (sustainable development) of any country and/or nation, it is necessary to
have a critical culture and humanistic thinking, rule of law, education, knowledge, science,
institutions, patriotism, morality, freedom of choice, competition, control, transparency,
security, solidarity, employment, work habits, entrepreneurship, private property on a mass
scale, and innovation. Otherwise, the significant influence (and especially the dominance)
of alternative institutions, opportunity and redistributive behavior, social pathology and all
other traumatic trends, which are pointed out in this text ‒ will not enable social and
economic progress and will juristically lead to multiple crises.
Aggressive neoliberal values have been established for 30 years in society, economy and
impersonal market, flooded with vanity, egoism, monism, ideology, politics, anachronism,
monopoly, paradoxes and privileges. Freedom, democracy, sustainable development, rule
of law, strong and efficient institutions, knowledge and other civilizational achievements,
i.e. elimination of greedy nomenclatures of power and privileged abuse of state and
people's interests are needed for a better, fairer and more humane order. This is the only
way to realize in practice the acceptable world (term by H. Simon), which implies the
parallel construction and improvement of the state and society.
References
Acemoglu, D. and Verdier, T., 2000. The choice between market failure and corruption.
American Economic Review, 90(1), pp. 194-211.
Acemoglu, D., Johnson, S. and Robinson, J., 2004. Institutions as the Fundamental Cause
of Long-Run Growth. NBER Working Paper, No. 10481, Cambridge, MA, pp. 385-472.
Acemoglu, D. and Robinson, J.A., 2012. Why Nations Fail – the Origins of Power,
Prosperity, and Poverty. New York: Random House, Inc.
Alesina, A. and Gulisano, P., 2015. Culture and Institutions. Journal of Economic
Literature, 53(4), pp. 898-944.
Allais, M., 1999. La mondialisation: la destruction des emplois et de la croissance;
l'évidence empirique. Paris: Juglar.
Buchanan, J.M., 1990. The Domain of Constitutional Economics. Constitutional Political
Economy, 1(1), pp. 1-18.
Buchanan, J.М., Robert, D.T. and Tullock, G. eds., 1980. Toward a Theory of the Rent-
Seeking Society. College Station: Texas A&M University Press,.
Buchanan, J.М. and Tullock, G., 1997. Calculus of Consent as the Logical Basis of
Constitutional Democracy. in Nobel laureates in economics: Dzheyms B'yukenen,
Moskow: Thaurus-Alfa, pp. 277-444 (in Russian).
Clark, G., 2009. A Farewell to Alms: A Brief Economic History of the World. Princeton:
Princeton University Press.
Congleton, R.D. and Hillman, A.L. eds., 2015. Companion to the political economy of rent
seeking. Cheltenham: Edward Elgar.
Delibasic, M., 2019. The Impact of Neoliberal Economic Policy on Economic
Development in the Countries of Southeast Europe. Transformations in Business &
Economics. 18(2 / 47, pp. 323-336.
Draskovic, V., 2018. Clokotrization of Transition ‒ critical essays. Scezecin: Agharta
Science Publishing House and Centre of Sociological Research.
Draskovic, V., 2020. New shackles: quasi-neoliberal violence of alternative institutions.
Belgrade & Podgorica: Tipo Makarije & ELIT (in Serbian).
Draskovic, V., Draskovic, M. and Bilan, S., 2019. Motivation, Methodology, and
Phenomenology of Institutional Nihilism in the SEE Countries. Montenegrin Journal of
Economics, 15(2), pp. 7-14.
Draskovic, V., Jovovic, R., Streimikiene, D. and Bilan, S., 2020. Formal and Informal vs.
Alternative Institutions. Montenegrin Journal of Economics, 16(2), pp. 193-201.
Evans, P., 1993. Rethinking on Embedded Autonomy. Berkley: University of California.
Goffman, E.A., 1968. Etudes sur la condition sociale des maladesmentaux et autres reclus.
Paris: Les Éditions de Minuit.
Hayami, Y. and Godo, Y., 1997. Development Economics: From the Poverty to the Wealth
of Nations (Third Edition). Oxford: Oxford University Press.
Horvathova, J. and Mokrisova, M., 2019. Business Competitiveness, its Financial and
Economic Parameters. Montenegrin Journal of Economics, 16(1), pp. 139-153.
Kornai, J., 2002. System paradigm. Economic issues, 4, pp. 4-22 (in Russian).
Kravchenko, S.A., 2018. The becoming of non-linear knowledge: New risks, vulnerabilities
and hopes. Montenegrin Journal of Economics, 14(4), pp. 191-202.
DOI: 10.24818/EA/2021/57/548
Abstract
Dominance of theory-based education is not well connected by the current practices. So, the
knowledge delivered within higher education institutions cannot create adequate value in the
market and in turn which causes the youth unemployment to become a chronicle problem.
Therefore, work placement opportunities within higher education create significant
advantages during the transition to the labour market. This study aims to evaluate the
efficiency of the Social Work Program in Turkey, in which students work at public
institutions during their university education to gain experience, professional skills, and
knowledge about the labour market. The research makes use of mixed methods and a cross-
sectional approach. In terms of the research analysis, descriptive and inferential methods, as
well as content analysis, are utilized. The findings show that, while the Social Work Program
procured remarkable attainments for the students about the labour market, it is mostly
inadequate for professional skill-building. The reason, it is determined as a lack of overlap
between the students’ field of education and their designated work placement. If the program
is redesigned according to this approach, it might be predicted to become prominent as an
active and robust workplace policy in fighting youth unemployment.
Keywords: youth unemployment, social work program, utility program, professional skills,
labour market.
JEL Classification: E24, R23, J2, J21
∗
Corresponding author, Aynur Yumurtaci – e-mail: aynur.yumurtaci@gmail.com
This study has been presented at the VII. International Strategic Researches Congress (ISRC) as an oral
presentation.
Authors’ ORCID:
Bulent Arpat: orcid.org/0000-0002-3512-9969
Mete Kaan Namal: orcid.org/0000-0002-0937-8355
Mustafa Kocanci: orcid.org/0000-0002-3950-3532
Aynur Yumurtaci: orcid.org/0000-0003-0277-5750
Introduction
As an essential factor of material and non-material development, education has a vital
function in creating a qualified labour force and making it easier for individuals to enter the
labour market (Ozguler, 2019). However, young people in higher education who take place
in the final and efficient link of schooling are more disadvantaged than the other groups in
the matter of facing unemployment during the transition from school to the labour market.
With the working conditions gradually worsening and turning into vulnerable employment,
problems, especially about employment and unemployment, become prominent for
university graduate young people nowadays. During the transition of young graduates into
the labour market, low wages, lack of experience, and their qualifications falling short of
labour force demands cause this group to come face to face with important problems
transitioning into the labour market (Cansever and Namal, 2019). Social Work Program
(SWP) is a program created to solve this problem and aid the economic situation of higher
education students (Arpat, 2020). The program is based on having higher education students
(excluding distance education and postgraduate students) get to know work-life and gain
work discipline by working at public institutions for a maximum of three months within June,
July, August, and September. The students work in public workplaces, which undertake
environmental protection, restoration, protection and introduction of the cultural heritage,
maintenance and organization of the libraries and supporting the cultural and social services
of the public institutions (Regulation of the Amendment of the Active Workforce Services
Code, 2018 )Unemployment is both an individual and social problem that has been presented
since the expansion of the labour force for production, and it has exponentially grown against
all economic and social precautions in the last century (Kumas, 2001). It may occur because
of the lack of labour force demand and workplaces, non-operation of the current workplaces,
low wages, and workers not having the necessary skills and abilities for the job (Koklu,
1984). Therefore, the present research focuses on the supply aspect of the labour market.
One of the critical life stages sustaining the development of the skills and abilities is the
university education stage. In the context of the relationship between education and
unemployment, it is stated that unemployment will decrease as the education level rises
(Gursel and Ulusoy, 1999). However, despite the increase in education level, the expected
decrease in unemployment does not occur (Bozdaglioglu, 2008).
Thus, there is a high unemployment rate among university graduates. The reasons for this are:
• The theoretical education is not well connected to the current practices, the knowledge
delivered within higher education cannot create adequate value in the market (Ozdemir, 2012).
• University graduates look for jobs with higher pay than their elementary school or high
school graduate counterparts and thus remain unemployed longer (Guney, 2019). Active Labour
Market Policies (henceforth ALMP) that help solve these problems and help university graduates
get to know and experience the working life and gain adequate professional skills are becoming
more critical. In this way, it will be possible for university graduates to achieve decent work
opportunities in line with their expectations and qualifications within the primary labour market.
The number of university graduate unemployed people in Turkey is overwhelmingly high.
According to the Turkish Employment Agency (TEA) data, as of April 2020, there are 370,169
unemployed people with associate degrees and 565,265 with bachelor’s degrees registered in
their database. The ratio of registered associate and bachelor’s degree-owning unemployed
people is 26% out of all registered unemployed people, which shows that a quarter of the
registered people awaiting employment is university graduates (TEA, 2020a). The university
graduate unemployment is within the scope of youth unemployment. The rate of youth
unemployment in Turkey is 24.4%, and the number of unemployed young people is 1,032,000
(TURKSTAT, 2020b).
This research aims to assess the SWP in Turkey, wherein students work at public institutions
throughout their university education to gain experience, professional skills, and knowledge
about the labour market. Our study carries importance because it provides in-depth
information with help of survey analysis about the impact of ALMP and SWP in the fight
against youth unemployment. The first part of the study deals extensively with the labour
market in Turkey and SWP. The second part analyses the problems of university graduates
during their transition into the labour market. The third part explains the methodology, and
finally, the fourth part demonstrates and discusses the findings before moving onto the
conclusion and policy suggestions.
and experience the labour market as well as acquire better professional skills to make a
satisfactory contribution.
Specific additional criteria must also be met to benefit from SWP. Below are the conditions
where the students’ SWP applications will be rejected:
• Applicants who have an ongoing internship, who work within the scope of long term
insurance programs or who state being insured by only short term insurance programs from
another workplace at the date of application or the period of the program,
• Students who have a GPA below 2.00 out of 4.00 or below 53.33 out of 100 (TEA,
2019b).
According to these criteria, those who are in mandatory university internships and full or
part-time workers are excluded from the program during these times. In addition, it is
observed that students with low academic performance are also excluded from the SWP
application. When the irrelevance between a student’s professional knowledge and
experience gained by workplace practices and academic performance is taken into account,
the 53.33 point academic achievement criteria is an important restraint against students with
low academic performance who have a potential to raise their professional performance
(Aksit, Arpat and Kalfa, 2017).
1.2. Youth unemployment amongst university graduates and the Social Work Program
Unemployment is a situation described as an individual’s inability to find employment
despite being willing to work and using all manners of job hunting (Akyildiz, 2019). On the
other hand, unemployment at the social level is defined difference between the number of
labour force and the number of people employed in the labour market in a country (Zaim,
1997). At the same time, it is described as a part of the productive forces’ inability to find a
place within the labour market (Erkol, 2012). Unemployed is defined as a person who is
willing and able to work within the current wage range but cannot find a reasonable and
suitable job (Yavuz, 2010). Turkish Statistical Institute (TURKSTAT, 2020a) describes
unemployment as in following:
individuals at the age of 15 and above who have approached at least one channel of
employment and can start working in 2 weeks which has been unemployed in the reference
period (people who have never worked at a workplace in exchange of profit, daily wage, by
the wage of or free of charge and have no connection with a workplace whatsoever) are
included in the unemployed population (TURKSTAT, 2020a).
Meanwhile, an unemployed young person is defined as an individual between the ages of
15-24 who have not worked more than one hour in the reference period but ready to start
working and actively looking for a job (Ata, 2007; Murat and Sahin, 2011). According to
February 2020 data, the rate of youth unemployment in Turkey is 24.4% (TURKSTAT,
2020b). In Turkey, the ratio of unemployment in associate and bachelor degree owners is
twice as high compared to other groups (Arpat, 2018). According to International Labour
Organization (ILO) data, youth unemployment is 2.9 times higher than the ratio of adult
unemployment (ILO, 2015). While demand for skilled labour is increasing in Turkey, it has
seen that there is a mismatch between labour demand and labour supply in the context of
competence dimension (Izgi, 2012). Taking this into account it is expressed that the
1.3. The possible effects of the Social Work Program on the labour force
The active population of a country is the total of people within and out of the labour force.
SWP is an implementation expected to contribute to the groups of people who are employed,
unemployed, and out of the labour force which shows in the (figure no.1).
Active Population
Youth In Higher
Employed Unemployed Graduate NEET Other Groups
Education
Unemployed Young
Gradutae Employees Other Employees Other Unemployed
Graduates
Figure no. 1. The scope of active population and the groups in which the Social
Working Program is expected to create a positive effect
Source: Adapted by the authors from Gundogan, 2013.
The possible positive effects of the SWP on these groups are explained as follows:
• Effect on employment: SWP has two positive effects on the employment of university
graduates. The first being the graduates’ possibility of finding work in better quality jobs.
After graduation, students are expected to have the chance to work in jobs with better pay
and higher working conditions, with the positive effects of SWP. It also allows the graduate
to transition into a position more relevant to his education. One of the fundamental conditions
required to find a job related to one’s expertise is experience. The SWP can be used to help
university graduates find a post relevant to his education by matching him with a suitable
workplace. If not handled properly, however, SWP could even cause the graduate to face
unemployment, as well as not making any contribution towards his transition into a
workplace or finding a suitable job. In other words, even if these graduates can find
employment opportunities within the labour market, they may have to work in insecure jobs
with low wages and/or informal sector which is unrelated to their education. Thus when the
National Employment Strategy of the Republic of Turkey is analyzed, it can be seen that the
education-employment connection is given a high level of priority. In the document, it is
stated that it is the education system's responsibility to supply the qualified labour force that
the labour market needs and to continually enhance current skills and abilities (Ministry of
Family, Labour and Social Services, 2017) SWP as a practice, demonstrating that the
government also contributes to the execution of the obligations given to the educational
institutions. In order to get the maximum benefits from these practices, a policy of choosing
suitable students for SWP and taking education relevance into account should be adopted.
• The effect on youth unemployment: SWP can eliminate or lessen the probability of
unemployment by providing college students who face post-graduation unemployment the
opportunity to get to know and experience the labour market, especially in economies with
high unemployment rates such as Turkey. Also, through these policies, university students
will have the chance to experience working within the labour market and increase their
professional skills during their student years.
• The effect on groups out of the labour force: Groups out of the labour force include
students, retirees, home-makers, seasonal workers, and those who cannot work because of
disability, illness, and old age. SWP can also employ groups outside this definition, such as
students in ongoing education (those who are willing to work but not looking for a job) and
university graduates Not in Employment, Education or Training (NEET). The probable
effects of SWP on these two groups are explained as follows:
- Continuing University Studies: Students within secondary education (evening school)
prefer to work part-time or full time in the morning hours. Students in this group who are
willing can have the option of working before they complete their university education using
the experience and skills gained through the SWP. Indeed, Karadeniz and Kumas (2016)
shows that 44% of senior students who undertake long-term vocational education within the
labour force receive business offers. Also, this rate is 37% in the study of Arpat, et al. (2017).
- Unemployed university graduates who gave up looking for a job because of repeated
failure in finding one, but they are ready to start working who are included within the out of
labour force group, are categorized as other. These individuals are also named discouraged
workers. Within this group, people who are not employed nor studying have an important
place and include young university graduates (NEET). i SWP practices can save this students
from entering the NEET category. Thus, the students will get to know the qualities,
characteristics, and necessary skills required by the labour market, and at the same time,
gradually attain them through professional experience in the workplace.
As can be seen, SWP is a procedure capable of obtaining solutions to problems such as
university graduates not being able to find a job (youth unemployment), and increasing the
quality of the labour force, provided it is implemented well. Likewise, unemployment
(especially youth unemployment) is the first and foremost macroeconomic problem area for
all countries, whatever their development stage is (Isik, 2019). Furthermore, as
unemployment has become chronic in the young population, some of these groups are
starting to be referred to as disadvantaged (Cansever and Namal, 2019). According to the
research of Arpat (2018), which is based on TURKSTAT data, the percentage young people
between the ages of 15 and 24 holding an associate degree is 26.6%, three times higher than
their peers. When the number of young people who are discouraged about finding a job is
also taken into account, the unemployment rate of associate and bachelor degree graduates is
stated to rise to 40.6%. It is highly essential to enable these young people to join the labour
market through ALMPs. If SWP is applied with a view of helping this group to get to know
and experience the work environment and to gain professional skills, it can become an
effective kind of ALMPs that will ensure employments rates rising after graduation.
2. Methodology
The aim of this research is to recognize SWP applications and analyze the effects of these
applications on students. Thus, it will be evaluated through the eyes of students who have
iTurkey has the highest young NEET population amongst OECD member countries (Tas, et al., 2018),
standing at 26.7% as of February 2020 (TURKSTAT, 2020b).
experienced the practice of how SWP serves its mission. The research questions are as
follows:
• Did the SWP practice contribute towards the students getting to know the labour
market?
• Did the SWP contribute towards the students’ developing their professional skills in
their area of expertise?
• What are the SWPs needs for reformation? Do university students think that SWP is a
useful application?
The study is designed under the cross-sectional and mixed methods. Cross-sectional research
aims to observe a sample during a certain timeframe (Tutar, 2020). The primary principle in
mixed methods research is expressed as gathering multiple data using different strategies,
methods, and approaches (Johnson and Turner, 2003). By using both quantitative and
qualitative approaches together, researchers can better understand and solve the problems
compared to using only one of these approaches (Creswell, 2006) and different views and
understandings that could be otherwise overlooked are brought into the light (Johnson and
Onwuegbuzie, 2004). Mixed methods research also used for increasing the generalization of
the data (Baki and Gokcek, 2012). By using mixed methods study, we thoroughly analyze
whether the SWP practices as a whole serve the purpose of getting to know and aim to
generalize these findings with more certainty.
The SWP was put into practice for the first time in Turkey during the June-September 2019
period. 20,000 students benefited from it in the first year. According to this, the research
population comprised of 20,000 students. In the instance of a 20,000 person, the primary
audience, the population size is calculated to be 377 participants for a 95% confidence interval
with a 5% error margin (Krejcie and Morgan, 1970). Based on this, a student group of 500
people from seven regions of Turkey has been randomly chosen for research (figure no. 2).
Figure no. 2. The regional distribution of the cities where the participants worked
In this study, questionnaire has been used for data collection. The questionnaire consists of
three parts. In the first part, eight questions with 5-point Likert scale answers have been
directed to students in order to determine the SWP’s performance in getting to know and
experiencing the workplace. The second part, it has comprised of 10 questions to specify the
participants’ demographic characteristics and correspondence of the work and the areas
where they are studying. As a last part, within the survey form, two open-ended questions
3. Findings
When the demographic data are examined, it is observed that there are more females (70.2%)
than males. Also, there are more 21 years and above students (60.2%) than 18-20-year-olds.
Meanwhile, equal weight students (41.7%) constitute a more dominant group than others. In
addition, students with a GPA between 2.51-3.00 (35.8%) are the most remarkable group
(table no. 1).
Table no. 1. Demographic characteristics of the students
Basic
58 12.1 3.01-3.50 118 24.6
Competences*
Gender Age
* The score type used to place students into vocational schools of higher education.
Meanwhile, the students ideas about SWPs contribution to get to know the market have been
evaluated by the 5-point Likert scale at the level of I agree (59.4%). When the options I agree
and I completely agree are evaluated together, this ratio reaches 81.1%. The median score on
this item is 3.9813 (table no. 2). This score represents a high level on the interval scale in a
5-point scale ii. It is possible to say that SWP fulfilled an important function towards the
university students in getting to know the working life. According to this, the students had
the opportunity to get to know and experience working life in public workplaces.
Table no. 2. SWP’s Contribution in Getting to Know the Labour Market
¯
Frequency % % 𝒙𝒙 Median
I disagree 2 0.4
2.5 4
I completely disagree 10 2.1 0.76569
(I Agree)
Total 480 100.0 100.0
iiThe Likert component of 5 has a range of 4 points. This range has been split into five equal parts and
interpreted as between 1.00-1.79 is “very low”, 1.80-2.59 “low”, 2.60-3.39 “average”, 3.40-4.19
“high”, 4.20-5.00 “very high” (Yurekli and Kalfa, 2016).
¯
Frequency % % 𝒙𝒙 Median
I disagree 70 14.6
19.2 3
I completely disagree 22 4.6 (Neither agree 1.03562
Nor disagree)
Total 480 100.0 100.0
For students the idea of finding a job is difficult or not after graduation has been evaluated.
In this context, how much awareness students have reached regarding the transition to labour
force and difficulties during employment has been analyzed by SWP applications. The
students think that being employed is hard after the SWP experience (52.6%). 21.3% of the
students are undecided whether they will find a job after SWP. Moreover, 27.1% of the
students have not assessed the transition into the work-life as difficult (table no. 4). The
reasoning for the latter 27.1% of the group could be interpreted as them having done a work
placement with better correspondence to their field of education compared to the other
students, and because of them having better The Higher Education Institutions Examination
(YKS) iii scores and thus pursue their education in better-qualified universities. Another
reason for this finding could be that these students had prior work experience with pay.
Indeed, when this 27.1% is analyzed, it was found that 47% of these students have GPAs
over 3.00 (out of 4.00), and the remaining 53% have GPAs under 3.00.
iii TheHigher Education Institutions Examination is made for student’s selection to the university. YKS
is conducted by Measurement, Selection and Placement Center (OSYM) in order to place students in
higher education institutions on the basis of their preferences depending on their exam score. YKS
covers 3 sessions. First Session of YKS is the Basic Proficiency Test (TYT). Attending the first session
is mandatory for all candidates. The second session includes the Field Proficiency Test (AYT) and the
third session covers the Foreign Language Test (YDT). These two sessions are optional to attend. The
TYT includes the Turkish Test, Social Sciences Test, Basic Mathematics Test and Science Test. The
AYT covers the Turkish Language and Literature-Social Sciences-1 Test, Social Sciences-2 Test,
Mathematics Test and Science Test. YDT contains the German, Arabic, French, English and Russian
tests. All applications are made online via the web page on http://www.osym.gov.tr (OSYM, 2020).
Table no. 4. Evaluation of the statement after SWP experience that it is difficult to
find a job after graduation
¯
Frequency % % 𝒙𝒙 Median
The reason for the former group of students feeling that employment after graduation is easy
could be because of their high self-confidence due to deeming themselves successful. The
reason for the latter group could be that they had a working relationship before SWP and
having the experience of employment and sustaining a working relationship due to this.
When the effects of SWP on students’ professional experiences are evaluated, it can be seen
that 45.2% of the students could not gain (adequate) any professional experience after SWP
experience. On the contrary, 40.8% of students express that SWP added professional
experience to them. The median score of 2.83 indicates that the professional expertise gained
is on an average level. The most used score being 1 and average score being 3 shows that
SWP could not make enough contribution to their professional experience (table no. 5).
Table no. 5. Contribution of SWP to professional experience of students
¯
Frequency % % 𝒙𝒙 Median
According to the findings, it is understood that the students were appointed to individual
institutions without taking the field of education-work placement correspondence into account.
With this lack of relevance and the median score of 2.83 in mind, it is understood that SWP is
not an application that provides professional knowledge and skills to students. Furthermore, the
Forming good
relationships with 51 10.6 129 26.9 161 33.5
colleagues
The internship practices during one’s university education is a relatively short practice that
puts the students into the workplace and is similar to SWP in terms of its purpose and
application. Because of this similarity, it is expected that a significant difference will emerge
between students who have previously practiced internship and did not, in terms of
recognizing the labour market. In our study, the ratio of students who have done internships
amongst the students who participated in SWP is quite low (17.7%) (table no. 7). Thus, one
can argue that internship activities within the university curricula in which students can gain
practical skills by utilizing their technical knowledge is quite limited in Turkey. Even though
the GPAs of those who completed internships are high, it is not statistically significant at the
0.05 significance level (p=0.686 > 0.05). Thus, there is no statistically significant difference
between those who have or have not done professional practices such as internships. Looking
at table (table no. 7), one can argue that the students have benefited from having a chance to
put their knowledge into practice by joining the labour force in terms of knowing the labour
market. It is argued that the longer workplace practices are, the more detailed the knowledge
students have obtained (Arpat, et al., 2017).
Doing ¯
Frequency % 𝒙𝒙 S.D. t df p
Internship
At the same time, university internships are criticized for not helping to gain professional
skills due to their shortness. When the effects on professional gains obtained by internships
and SWP are examined, it can be said that there is no statistically significant difference
between the two groups regarding gaining professional experience (p=0.959>0.05). Thus, all
students, whether they have completed internships or not, obtain similar professional gains
from SWP (table no. 8).
Table no. 8. The internship-SWP correlation in terms of gaining job experience
Doing ¯
Frequency % 𝒙𝒙 S.D. t df p
Internship
In the other hand, the average scores of students who have prior work experience to SWP on
the getting to know the labour market is lower than students without experience.
The difference between the groups is statistically significant (%95 significance value, α=0.05
margin of error, p=0.041<0.05) (table no. 9).
Table no. 9. The effect of prior work practice on getting to know the labour market
Working ¯
Frequency % 𝒙𝒙 S.D. t df p
State
Previous
¯
Work Frequency % 𝒙𝒙 S.D. t df p
Experience
Considering the relationship between the SWP students’ field of study and their assigned
work placement, it is seen that the students’ assigned workplaces and their fields of study are
largely unrelated or poorly connected (57.5%) (table no. 11). These scores shed light on the
reason why students participating in SWP claim not to have had professional contributions.
Table no. 11. The relationship between SWP and the field of study
Education-Work
¯
placement Frequency % % 𝒙𝒙 Median
relationship
Average
102 21.3 21.3 Mode S.D.
Relationship
Also, the open-ended questions base on participants’ non-quantitative observations show that
there are differences among students of social sciences, STEM students, and life sciences and
languages in terms of field of study-work placement relationship. While there is a closer
relationship between work placement and field of study for students in the field of social
sciences, this relationship is weakened for mathematics, engineering, languages, medicine
and nursing schools students (figure no. 3).
In this context, private sector workplaces could be included within the scope. If the
application is made in the same period of the year, economic incentives can be given to
workplaces such as premiums and tax reductions. Thus, professional skill development and
cost advantages can be obtained. Furthermore, students may obtain high quality vocational
skills, abilities, and experience with practices available in the private sector. More students
may have access to this program with the economic benefits obtained. Thus the macro-
economic indicators of Turkey could get better, and socio-economic problems could be
solved. Also, it could also be possible that student-private sector interactions could be
increased, and universities could obtain information about the expectations regarding the
skills-abilities of the labour market and update their curricula accordingly with the
collaboration of universities and the industry. The practical implementation of the program
could also provide cost advantages. Especially, it reduces the training costs of workplaces
such as orientation processes for the students post-graduation.
Some universities in Turkey arrange work placement opportunities for their students under
the name of on-the-job training to gain skills-qualifications and get to know the working life
within the private sector for 14-16 weeks (per semester). These placements cannot take place
at public institutions, and few students utilize this opportunity since it is not part of their
universities’ curricula. By merging the on-the-job programs with SWPs under the
coordination of TEA and financing them with public funds, significant gains could be
obtained in terms of designing SWP to have an effective content and fighting against youth
unemployment. When employers need new labour, they will select people who have
experience before in their own company under the SWP instead of training new employees
which will decrease youth unemployment and make important contributions towards fighting
structural unemployment. To combat with youth unemployment, further research is needed
and it should be carried out within the frame of specifying the procedures and principles of
merging job training with the SWP practices of the public authorities as per the benefits
discussed in this paper. Briefly, SWPs, which aim to get to know the labour market and to
provide professional skills, it should also have an education-work harmony and cover private
sector workplaces and all students.
References
Aksit, A., Arpat, B. and Kalfa, V.R., 2017. Analysis of the Conribution to Professional
Knowledge of the Job Training within the Student Perspective in the 3+1 Education
Model-The Example of the Honaz Vocational School. European Scientific Journal,
Special Iss., pp.176-192.
Akyildiz, Y., 2019. İşsizlik ve İşkur’un Aktif İstihdam Politikaları. Akademik Bakış Dergisi,
71, p.94-119.
Alpar, R., 2011. Uygulamalı Çok Değişkenli İstatistiksel Yöntemler. 3rd ed. Ankara: Detay
Yayıncılık.
Arpat, B., 2020. Social Work Program as an Active Employment Policy: An Application on
University Students. Manas Journal of Social Studies, 9(1), pp.327-340.
Arpat, B., 2018. Türkiye’de Genç İşsizlikle Mücadelede Meslek Yüksekokullarında
Uygulanan İşbaşı Eğitimlerinin Rolü ve Önemi: Honaz MYO Örneği. Çalışma ve
Toplum, 59, pp.2193-2229.
ILO, 2015. Gençlerde Küresel İstihdam Eğilimleri 2017. [online] Available at:
<http://www.ilo.org/ankara/news/WCMS_600486/lang--tr/index.htm> [Accessed 10
October 2019].
Isik, V., 2019. Toplum Yararına Program (TYP) Yeni Bir Model Önerisi. İstanbul: Seta
Analiz Seta Vakfı.
Izgi, B.B., 2012. Genç İşsizliği ve Eğitim ile Olan İlişkisi. Elektronik Sosyal Bilimler Dergisi,
11(41), pp.295-310.
Johnson, B. and Turner, L.A., 2003. Data Collection Strategies in Mixed Methods Research.
In: A. Tashakkori and C. Tedlie, eds. 2003. Handbook of Mixed Methods in Social and
Behavioral Research. Thousand Oaks, CA: Sage. pp.297-319.
Johnson, R.B. and Onwueguzie, A.J., 2004. Mixed Methods Research: A Research Paradigm
Whose Time has Come. Educational Researcher, 33(7), pp.14-26.
Kaboub, F., 2007. Employment Guarantee Programs: A Survey of Theories and Policy
Experiences. The Levy Economics Institute of Bard College. Working Paper no. 498.
Kapar, R., 2005. Aktif İşgücü Piyasası Politikaları. İstanbul Üniversitesi İktisat Fakültesi
Mecmuası, 55(1), pp.341-371.
Karadeniz, O. and Kumas, H., 2016. Meslek Yüksekokulu Öğrencilerinin İstihdam
Edilebilirliğini Arttırmada Mesleki Uygulamalar Dersi (3+1 Programlarının)
ile İŞKUR İşbaşı Eğitim Programlarının Rolü: Honaz MYO Örneği. In: UMYOS, 5th
International Vocational Schools Symposium (UMYOS 2016). Prizren, Kosova, 18-20
May 2016. S.l:s.n.
Koklu, A., 1984. Makro İktisat. Ankara: S yayınları.
Krejcie, R.J. and Morgan, D.W., 1970. Determining Sample Size For Research Activities.
Educational and Psychological Measurement, 30, pp.607-610.
Kumas, H., 2001. The Psychosocial Dimension of Unemployment and It`s Efect`s on the
Value of Work Life. PhD. Dokuz Eylul University.
Lerman, R.I., 2013. Are Employability Skills Learned in U.S. Youth Education and Training
Programs?. IZA Journal of Labor Policy, 2(6), pp.1-20.
Marques, P. and Hörisch, F., 2019. Understanding Massive Youth Unemployment During
the EU Sovereign Debt Crisis: A Configrational Study. Comparative European Politics,
pp.1-23.
Ministry of Family, Labor and Social Services, 2017. Ulusal İstihdam Stratejisi (2014-2023)
ve Eylem Planları Kitabı. [online] Available at: <http://www.uis.gov.tr/
announcements/27102017/> [Accessed 28 January 2020].
Murat, S. and Sahin, L., 2011. Gençlerin İstihdamı/İşsizliği Bakımından Türk Eğitim
Sisteminin Değerlendirilmesi. Çalışma ve Toplum, 3, pp.93-135.
Nunnaly, Jum C., 1978. Psychometric Theory, 2nd ed. New York: Mc Graw-Hill.
OECD, 2017. OECD Employment Outlook 2017. [online] Available at: <http://www.oecd.org/
els/oecd-employment-outlook-19991266.htm> [Accessed 28 July 2019].
Okursoy, A. and Turan, A.H., 2014. An Empirical Examination to Define Factors Affecting
Customers’ Satisfaction Perceptions at a University Cafeteria. Doğuş Üniversitesi
Dergisi, 15(1), pp.65-78.
Book Review
DOI: 10.24818/EA/2021/57/570
The Internet of Things (IoT) is an increasingly widely used term lately, as people use smart
devices to take advantage of advanced features and their connectivity. At the same time,
however, given the multitude of devices, the Internet of Things also raises the issue of
security risks, for example as regards access to the local equipment or network to which they
belong, i.e. the collection of users' personal data.
Generically speaking, the Internet of Things includes any device
that can communicate with other devices over the Internet. From
the point of view of the field of use we identify two major areas
for the Internet of Things: the industrial field and the living
space. The main difference between the two areas is the
implementation scale.
The book 10 (ten) Internet of Things projects is aimed at those
who want to take the first steps in the world of the Internet of
Things. Over the course of 233 pages, the author aims to provide
readers with knowledge and skills in this fascinating field
through the realization of attractive projects, a total of ten in
number. Each of these projects is designed to highlight the
implementation of various aspects of the Internet of Things
domain. We will review the ten chapters of the book, insisting on the main ideas brought by
each project. The book is structured in ten chapters, with the author allocating a separate
chapter for each of the ten projects under discussion.
In the first chapter, “Internet of Flowers” is described the realization of a project for an
Internet monitoring system of environmental conditions (soil moisture and ambient
temperature) for houseplants ‒ flower pots or other decorative plants. Even if the intended
purpose for this project is limited to houseplants, it can be easily extended to plant
greenhouses or outdoor gardens.
This service allows forecasts based on information from a personal weather station. The
Weather Underground service complements the functionality of the weather station with the
history and prediction of the weather evolution and will also be how the user will be able to
view the information provided by the weather station. The system is based on Internet
communication via GSM 2G – GPRS mobile networks and can be located wherever there is
coverage of such a network – even in an isolated area. Autonomous operation in an isolated
area can be sustained by a battery-based rechargeable battery through a solar energy capture
system using a photovoltaic panel.
The “Internet of Solar Cells” project describes the development of a system for monitoring
the production capacity of electricity for photovoltaic panels. Monitoring elements,
measuring stations, are autonomous and will communicate wirelessly with a central station –
the Emoncms gateway station. The role of the central gateway station is to retrieve data from
all measuring stations and forward it via the Internet network to the emoncms.org server, a
dedicated server that provides specialized IoT services to monitor the production,
consumption and exchange of electricity. The user can then track from a smart mobile station
or device connected to the Internet the power generated by each photovoltaic panel, thus
being able to accurately assess the operating efficiency, the state of operation and the quality
of the location for each photovoltaic panel. The user has access to the stored data and reports
generated by Emoncms through a web browser or through the Android Emoncms Open
Energy Monitor Tools mobile app. The radio communication structure between the
measuring stations and the central gateway station has been chosen in such a way as to ensure
long-range reporting capacity, through the possibility of retransmitting information from one
station to another to the central station with low consumption – thus ensuring a long range of
measurement stations.
The “Internet of Lonely Cars” project examines the possibility of remote surveillance of
parked cars using LoRa long-range radio communications and details a simple and efficient
way of monitoring cars that stay in the parking lot for long periods. Given the likely large
distance between the parking space and a central monitoring station, the project uses a
433MHz LoRa (Long Range) ISM band radio transmission. Reporting of information from
the machine module is done to a basic module that is intended to forward via the Internet to
an IoT service the data received. Due to the technical characteristics of the LoRa module, the
radio transmission may have a coverage of several kilometers (up to 20 km). Thanks to
integration with the IoT service, information from the machine module can be viewed by the
user from anywhere via a web browser or mobile app. As with other projects, the operation
of the IoT system is based on two online data collection platforms: DeviceHub.net and
SmartLiving.
The “Internet of Sunsets” project presents an automatic solution for shooting and saving
sunset images in the cloud. Among the most sought after photos by all the beautiful
aficionados are those that capture the sunset. Obviously, choosing the perfect moment can
make the difference between a spectacular photo and a banal one. And how is it usually a
gamble to capture the exact moment when the sun casts the last rays before sunset by
reddening the sky and coloring the clouds what if we can do this automatically? Not just once,
but every day. It's exactly the goal of the “Internet of Sunsets” project – to photograph every
day sunset and save photography to the cloud and on a social network. It's an Internet-
connected video camera that's able to calculate every day what time the sun goes down, take
Given the clarity of the presentation of ideas, the wealth of the bibliographic resources made
available, and the multitude of examples used as support for the ideas discussed in the ten
chapters of the book reviewed, I believe this book will be of real use to anyone who wants to
learn more about the IoT field and either has average technical knowledge or is even new to
the field but has a desire to learn.
E-mail: radu.pietraru@upb.ro
Mr. Radu Pietraru is a graduate of the Faculty of Automatics and Computers, specializing in
“Systems Engineering”, Class of 2000. He graduated from the in-depth study cycle “Open
Architecture Systems” in 2001. He has been a doctor in the field of Systems Engineering
since 2009 and is a professor in the Department of Automatics and Industrial Informatics,
Polytechnic University of Bucharest, since 2000 he has held the undergraduate courses
“Integrated Microprocessor Systems”, “Microprocessor Systems” and “Performing
Computer Architects”.
He has published 7 books in the Romanian language of CNCSIS-recognized publishers and
more than 20 scientific papers. He is a member of the Romanian Society of Automatics and
Technical Informatics and is part of the editorial staff of the international magazine “Journal
of Control Engineering and Applied Informatics”. He has been the leader of more than
100 diploma and dissertation papers in the last 10 years. The main areas of research are
Internet of Things systems, Low Power Wide Area Network communication systems and
hazard management.