You are on page 1of 20

Falta introducción

Revisión de la literatura ajustada con nuevas referencias


Falta diagrama de flujo ISM-MICMAC
APA
Depurar variables 10-1 = 9
Research questions:

RQ1. What are the key challenges in parcel delivery with drones?
RQ2. How is the relationship between these key challenges?
RQ3. What are the identified key challenges that should be addressed and overcome to
make possible parcel delivery with drones?

2. Literature review

2.1 Research methodology

The methodology used in the paper research to identify the variables in parcel delivery with
drones is the following:

Information resources:
A research was made using Scopus with the key words “drones” and its synonyms like
“UAS”, “UAV”, “RPAS”, etc. within the title of the paper. Likewise, restrain key words were
added like, “barrier”, “challenges”, “risk” etc. in titles in English. After that, documents were
excluded like conferences, revisions, surveys, and only papers and book chapters were
considered for this research. Time filter was considered from 2015 through 2022.

Research strategy.

Research Engine Strategy

SCOPUS #1 = ( TITLE ("Unmanned Aerial Device" OR "Unmanned


Aerial Devices" OR "Unmanned Aircraft System" OR Drones
OR Drone OR "Unmanned Aerial Vehicle" OR "Unmanned
Aerial Vehicles" OR "Drone Aircraft" OR "Drone Aircrafts" OR
UAS OR UAV OR "Remotely piloted aircraft system" OR
RPAS))

#2 = ( TITLE (barrier OR challenge OR driver OR factor


OR limitation OR concern OR risk OR problem OR
issue))

#3 = #1 AND #2

2.2 Selection process

For the selection process, documents that had to do with parcel delivery, logistics, last-mile
were chosen and all operational approach, path optimization, mathematical models, take-off
efficiency, etc. were excluded.
Phase Papers identified via SCOPUS

Identification Identified documents out of: Duplicated records: (0)


Data base (n=1) Removed records: (0)
Records: (n=1383)

Filtered by time Year of publication: (2015-2022) Excluded records: 296


Records: (n=1087)

Filtered by kind of Document: Paper and book Excluded records: 591


publication chapter: (n=496)

Analysis Analyzed records: (n=496) Excluded records: 477

Included Found papers: 18 Not found books: 1

After the variable research, we found the following variables in parcel delivery with drones.
Table xxx1
Major restraints in parcel delivery with drones.

#V Variable Description
V1 Delivery risk The package that the drones is carrying might be stolen, lost or damaged
V2 Risk of collision Drone collision in the air or with an obstacle on the ground
High cost to It includes purchase cost of drones, operational cost of using drones to
V3 operate drones perform related missions and maintenance cost.
Parcel delivery The cost of using drone food delivery services is likely to be burdensome
V4 cost
Regulations Government regulations are laws that control the way a business can
operate.
V5 It includes insurance obligations, pilot certification and training, etc.
Altitude and Lack of guidelines and regulations in some national settings defined
distance limitations on the radiofrequency employed by drones,
limitations their altitude and distance in ways participants saw as incompatible with the
V6 mission of drones.
Drone The critical flight performance considerations of a drone include flight speed,
performance range, endurance,
V7 flight altitude, payload, and take-off and landing way.
Bad weather Current drones in use cannot operate in certain weather conditions like
V8 conditions severe wind and thunderstorms.
Maintenance Simplicity of maintenance and acquisition of parts and operation
V9* consumables.
Drone´s route Help decide the drone routes, schedule drones, etc. Also, the topography of
V10 flight paths could make it challenging
to fly and operate the drone.
Noise pollution Flying drones might create a disturbing high-pitch noise. This buzzing noise
V11 can result in sound pollution.
Congestion of The widespread use of drones can generate visual pollution
V12 airspace
V13 Harming wildlife Drones could possibly hit birds and other wildlife animals.
Intention to Use Willingness to use drone delivery services.
V14 drone
V15 Psychological risk Using drone delivery services might make customers feel anxious.
Privacy Risk Drones delivery will cause customers to lose control over their privacy.
V16 (Taking pictures with a camera, etc.)
4. Data Analysis
Based on the literature review, we found the main challenges that are present in parcel
delivery with drones. In order to know the interlink between those challenges, data was
collected from 10 experts. These experts had experience either in drone technology,
electronic commerce or entrepreneurship related with drone delivery. These experts were
contacted via email or social media such as Facebook and they were interviewed using
Google meets. Some of these experpert held a manager position in logistics within their
companies. The information of these experts and their background is shown in the following
table xxx.

Experts (with
pseudo name) Job Role Years of Experience Group Gender
Researcher in
C.O. Electronic commerce 10 years Academia Male
C.V. Electronic commerce 4 years Industry Male
Researchers in
B.K. Electronic commerce 2 years Academia Female
G.I Mechanical Engineer 4 years Industry Male
International
cooperation on
B.A. Entrepreneurship 3 years Industry Female
T.R. PhD student 10 years Academia Male
T.O. Logistics Manager 4 years Industry Male
Researcher in
Transportation
C.G. Engineering 7 years Academia Male
C.M. Electronic commerce 4 years Industry Male
Entrepreneurship in
C.C. Drone Delivery 3 years Industry Male
Table xxx.
Expert profiles

4.1 Self-structured interaction matrix (SSIM)


The data was collected from the experts and the SSIM was filled with links between each
pair of challenges for Parcel Delivery with drones. Since there are 10 matrices from 10
experts, this data was gathered and the answer with higher frequency was chosen. In case
of a draw, a full expert opinion was skipped randomly to select an answer. The following
letters were used to describe the kind of relationship between variables.

V: Variable i has influence on Variables j:


A: Variable j has influence on Variable i;
X: Variable i and j help achieve or influence each other; and
O: Variable i and j are nor related to each other (Hughes XXX et al.)

Table xxx
Self-structured interactions matrix.

i/j 16 15 14 13 12 11 10 8 7 6 5 4 3 2
1 O V V O O O A A A A O O A A
2 O V V V A O A A A A X O A
3 O O O O O O V O V O V O
4 O V V O O O O O A O O
5 O O O O O O V O O A
6 V V V O O O V O V
7 O V V O O V V O
8 O V V O V O V
10 V O V V X O
11 O V V O O
12 O V V V
13 O V V
14 V V
15 A

4.2 Initial reachability matrix (IRM) and final reachability matrix (FRM) development

In this step, the letters from the SSIM table were translated into binary answers (0 and 1).
The procedure to translate letters V, A, X and O into 0s and 1s is the following (Rana et al.
xxx)

● For each ´V´ in SSIM include ´1´ in (i, j) and ´0´ in (j, i) cell,
● For each ´A´ in SSIM include ´0´ in (i, j) and ´1´ in (j, i) cell,
● For each ´X´ in SSIM include ´1´ in (i, j) and ´1´ in (j, i) cell,
● For each ´O´ in SSIM include ´0´ in (i, j) and ´0´ in (j, i) cell,

By translating all the letters using the above procedure in SSIM, the Initial reachability matrix
(IRM) of the variables in Parcel Delivery using drones is shown in Table XXX in below.

Table xxx
Initial reachability matrix (IRM).

V# V1 V2 V3 V4 V5 V6 V7 V8 V10 V11 V12 V13 V14 V15 V16


V1 1 0 0 0 0 0 0 0 0 0 0 0 1 1 0
V2 1 1 0 0 1 0 0 0 0 0 0 1 1 1 0
V3 1 1 1 0 1 0 1 0 1 0 0 0 0 0 0
V4 0 0 0 1 0 0 0 0 0 0 0 0 1 1 0
V5 0 1 0 0 1 0 0 0 1 0 0 0 0 0 0
V6 1 1 0 0 1 1 1 0 1 0 0 0 1 1 1
V7 1 1 0 1 0 0 1 0 1 1 0 0 1 1 0
V8 1 1 0 0 0 0 0 1 1 0 1 0 1 1 0
V10 1 1 0 0 0 0 0 0 1 0 1 1 1 0 1
V11 0 0 0 0 0 0 0 0 0 1 0 0 1 1 0
V12 0 1 0 0 0 0 0 0 1 0 1 1 1 1 0
V13 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0
V14 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1
V15 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
V16 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1

[Note: V1: Risk stolen, lost or damaged package; V2: Risk of Collision; V3: Lack of economic
resources to operate; V4: Service cost; V5:administrative procedures in accordance of the
legal regulations; V6: Operational Restraints (minimal and maximal distances); V7: Dron
Performance; V8: Bad weather; V9: Facility of repairment; V10: Flight route; V11: Acoustic
pollution; V12: Heavy air traffic; V13: Animal harm; V14: Intention of Use of Drones; V15:
Reject of Use of Drones; V16: Privacy lost]

The Final Reachability Matrix (FRM) as shown in table xxx extends the IRM to include
transitivity (Rana xxx).Transitivity is highlighted in the FRM by the notation 1*. The high-level
concept of transitivity can be described in the context of:
If A is connected to B (A→B) and B is connected to C (B→C), then it can be said that there
exists a transitive relationship between A and C (A→C). The process to develop the FRM
from the IRM to include transitivity can be written as:

∀i ∀j ∀k, if ∃ k Such that k ≠ i and k ≠j (M [i, k] =1)


[1]
Λ (M [k, j] = 1) Λ (M [i, j] = 0) then M [i, j] = 1*
where M is the IRM, i,j represent the rows and columns, respectively, and k represents the (i,
j) cell reference in the transitivity process. The symbol ∀ represents for all instances of: i, j,
k.
Then, if ∃ denotes a match between column instance ´1´ at location k, the interjection
symbol Λ is used to verify: (M [k, j] = 1 Λ (M [k, j] =1). If all three conditions are true, i.e. If (M
[i, j] = 0) and (M [i, k] = 1) and (M [k, j] = 1), then we set M [i, j] = 1* to signify transitivity at
this cell reference in matrix M. k≠i and k ≠ j represent the n:n instances that are ignored for
this method. The approach used to identify transitivity outlined in equation (1) to populate the
FRM is as follows:

Step 1: Star from row 1 of the IRM and work down to row n.
Identify all instances of ´1´ in row 1 (j) and note these to aid the next step. Ignore n:n
references, e.g 1:1.
Step 2: For each instance of a 0 across the full row (j), look down on the specific column (i)
and reference against each previously noted instance of ´1´ from first row but now against
the column.

Step 3: If a match is found in step 2, then convert any instances of 0 in above scenario to 1*
and continue to the next instance of 0 across the row (j). Continue with this method until the
complete matrix is checked for transitivity. (Hughes et al., 2016). The final reachability matrix
(FRM) can be seen in below, in Table xxx

Table xxx4
Final reachability matrix (FRM).

V# V1 V2 V3 V4 V5 V6 V7 V8 V10 V11 V12 V13 V14 V15 V16


V1 1 0 0 0 0 0 0 0 0 0 0 0 1 1 1*
V2 1 1 0 0 1 0 0 0 1* 0 0 1 1 1 1*
V3 1 1 1 1* 1 0 1 0 1 1* 1* 1* 1* 1* 1*
V4 0 0 0 1 0 0 0 0 0 0 0 0 1 1 1*
V5 1* 1 0 0 1 0 0 0 1 0 1* 1* 1* 1* 1*
V6 1 1 0 1* 1 1 1 0 1 1* 1* 1* 1 1 1
V7 1 1 0 1 1* 0 1 0 1 1 1* 1* 1 1 1*
V8 1 1 0 0 1* 0 0 1 1 0 1 1* 1 1 1*
V10 1 1 0 0 1* 0 0 0 1 0 1 1 1 1* 1
V11 0 0 0 0 0 0 0 0 0 1 0 0 1 1 1*
V12 1* 1 0 0 1* 0 0 0 1 0 1 1 1 1 1*
V13 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1*
V14 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1
V15 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
V16 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1

[Note: V1: Risk stolen, lost or damaged package; V2: Risk of Collision; V3: Lack of economic
resources to operate; V4: Service cost; V5:administrative procedures in accordance of the
legal regulations; V6: Operational Restraints (minimal and maximal distances); V7: Dron
Performance; V8: Bad weather; V9: Facility of repairment; V10: Flight route; V11: Acoustic
pollution; V12: Heavy air traffic; V13: Animal harm; V14: Intention of Use of Drones; V15:
Reject of Use of Drones; V16: Privacy lost]

4.3 Partitioning of levels

Now that we have FRM from the last step, it should be computed based on the reachability
and antecedent sets for each variable in the matrix (Warfield 1974). These variables are
going to be separated into several layers of hierarchical structure using both IRM and FRM
matrices. The reachability set R(Pi) lies on the variable itself along with other elements,
which it may help to achieve. This is established in Figure xxx4 as the instances of 1 and 1*
for each of the variables (i) across all the rows (j).

The antecedent set A(Pi) are compounds of the element itself and other variables, which
might help to achieve it. This is shown in Figure xx5 by registering all the instances of 1 and
1* for the column (j) that coincide with each variable (i).The intersection of both R(Pi) and A
(Pi) sets is the final element of the first level partition matrix where the common elements
between R(Pi) and A(Pi) are displayed in the final column.
In the first

Variable Intersection R(Pi) ∩ Lev


P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) A(Pi) el
1 1,14,15,16 1,2,3,5,6,7,8,10,12 1
2 1,2,5,10,13,14,15,16 2,3,5,6,7,8,10,12 2,5,10
1,2,3,4,5,7,10,11,12,13,14,
3 15,16 3 3
4 4,14,15,16 3,4,6,7, 4
5 1,2,5,10,12,13,14,15,16 2,3,5,6,7,8,10,12 2,5,10,12
1,2,4,5,6,7,10,11,12,13,14,
6 15,16 6 6
1,2,4,5,7,10,11,12,13,14,15
7 ,16 3,6,(7) 7
8 1,2,5,8,10,12,13,14,15,16 8 8
10 1,2,5,10,12,13,14,15,16 2,3,5,6,7,8,10,12 2,5,10,12
11 11,14,15,16 3,6,7,11 11
12 1,2,5,10,12,13,14,15,16 3,5,6,7,8,10,12 5.10.12
13 13,14,15,16 2,3,5,6,7,8,10,12,13 13
14 14,15,16 1,2,3,4,5,6,7,8,10,12,13,14 14
1,2,3,4,5,6,7,8,10,11,12,13,14,
15 15 15,16 15 I
1,2,3,4,5,6,7,8,10,11,12,13,14,
16 15,16 16 16

Level Partition -Iteration I

In the first level partition, the top level of hierarchy can be identified by looking where there is
a match between the reachability set R(Pi) and intersection set R(Pi) ∩ A(Pi). In table xxx6,
there is a match in variable V9 (Bad weather) and V15 (Reject of Use of Drones). Also, I was
inserted to win the row to show that they are in the Top level, which means that they help to
achieve the variables below in the ISM model but there are no higher levels over them.
This process is repeated for the following level partition but the elements outlined in level I
need to be removed from the matrix. That means that variable 9 and 15 won't appear in the
following table.
During the second level partition, it is only composed of variable 16 (Privacy lost). This factor
will be positioned at the second level of the ISM model. Next, variable 16 will be removed
from the 3rd Level partition. Once again, there is only one variable which it Reachability Set
R(Pi) is the same as Intersection R(Pi) ∩ A(Pi). This time variable 14 (Intention of Use of
Drones) is on the 3rd level of ISM model.

On an IV level partition, we have 4 variables; V1 .(Risk of stolen, lost or damaged package),


V4 (Service cost), V11 (Acoustic pollution) and V13 (Animal harm). In the 5th level of ISM
model, there are 4 variables which are V2 (Risk of Collision), V5 (Administrative procedures
in accordance with the legal regulations), V10 (Flight route and V11 (Acoustic).

It can be noticed that there are fewer variables in the lower levels of the ISM model, since
they are removed in each iteration. Variable V7 (Dron Performance) is positioned in level 6th
of the ISM model. Finally, variables V3 (Lack of economic resources to operate) and V6
(Operational Restraints (minimal and maximal distances)).The summary of the importance
level of each challenge is shown in Table xxx7

4.4 Canonical form matrix development

The following step in the ISM procedure is to develop the canonical form of the matrix. This
is shown in the following figure xxx7. This is done by reorganizing all the variables from FRM
matrix as they are clustered to align with the groupings from the level partition stage. The
Driving Power DRP is the sum of all the 1s in the column and the Dependence power is the
sum of all 1s in the column of table xxx7. This way to reorganize FRM table is helpful to
better place all variables in the MICMAC model for its analysis in the following step.
Table xxx7
Different levels of challenges to adopt drones in parcel deliveries.
Iteration Level# Variable
1st I Psychological risk (15)
2nd II Privacy Risk (16)
3rd III Intention to Use Drones (14)
4th IV Delivery Risk (1)
Parcel delivery cost (4)
Noise pollution (11)
Harming wildlife (13)
5th V Risk of Collision (2)
Regulations (5)
Drone´s flight route (10)
6th VI Congestion of airspace (12)
7th VII Dron Performance (7)
Bad weather conditions (8)
8th VIII High cost to operate drones (3)
Altitude and distance limitations (6)

Table 7
Canonical form of the FRM matrix

V# V15 V16 V14 V1 V4 V11 V13 V2 V5 V10 V12 V7 V8 V3 V6 LEVEL DRP


V15 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 I 1
V16 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 II 2
V14 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 III 3
V1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 IV 4
V4 1 1 1 0 1 0 0 0 0 0 0 0 0 0 0 IV 4
V11 1 1 1 0 0 1 0 0 0 0 0 0 0 0 0 IV 4
V13 1 1 1 0 0 0 1 0 0 0 0 0 0 0 0 IV 4
V2 1 1 1 1 0 0 1 1 1 1 0 0 0 0 0 V 8
V5 1 1 1 1 0 0 1 1 1 1 1 0 0 0 0 V 9
V10 1 1 1 1 0 0 1 1 1 1 1 0 0 0 0 V 9
V12 1 1 1 1 0 0 1 1 1 1 1 0 0 0 0 VI 9
V7 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 VII 12
V8 1 1 1 1 0 0 1 1 1 1 1 0 1 0 0 VII 10
V3 1 1 1 1 1 1 1 1 1 1 1 1 0 1 0 VIII 13
V6 1 1 1 1 1 1 1 1 1 1 1 1 0 0 1 VIII 13
DPP 15 14 13 9 4 4 9 8 8 8 7 3 1 1 1 105

4.5 MICMAC analysis

The purpose of the MICMAC method is to identify the key variables and to know which ones
have more driving power and dependence power. It is also important to classify the
relationship between them. Then, the driving and dependence power are plotted within the
MICMAC model and it helps to determine the positions of every challenge. There are four
quadrants in the MICMAC model and depending on which quadrant the variable is located, it
indicates the driving or dependence nature. It can be seen the different levels of the
hierarchy in the ISM model. There are four quadrants that are (Alexandra 1991xx)

Power zone - variables have the higher driving power and less dependence power. They are
really important because they help to achieve or have influence on the majority of variables
and they are not dependent on them because they are strong. If they are modified, the
system is modified as well.
Output zone - These variables have low driving power but high dependence. They are driven
by other variables.

Conflict zone - In this zone are found all variables with high driving power and dependence.
It means that they have influence on others but they are also driven by them. If they are
modified, it will affect other variables than belong to this zone and the Output zone.

Autonomous zone - The variables with low driving power and dependence can be found
here. These kinds of variables do not influence the system.

In our MICMAC model, it is shown that the variables V8 bad weather, V3 Lack of economic
resources to operate, V10 Flight route and V6 Operational Restraints are in the Power zone
since they have high driving power but very little dependence. In the conflict zone, V5
Administrative procedures and V2 Risk of collision are located there because they have high
driving power and dependence. Variables V9 Facility of repairment and V16 Privacy lost are
in the Autonomous zone and they have no influence on the system. Finally, variables V1
Risk of stolen, lost or damaged package, V14 Intention of Use of Drones and V15 Reject of
Use of drones are located there because they are driven by other variables in the ISM
model.
[Note: V1: Risk of stolen, lost or damaged package; V2: Risk of Collision; V3: Lack of
economic resources to operate; V4: Service cost; V5:administrative procedures in
accordance of the legal regulations; V6: Operational Restraints (minimal and maximal
distances); V7: Dron Performance; V8: Bad weather; V9: Facility of repairment; V10: Flight
route; V11: Acoustic pollution; V12: Heavy air traffic; V13: Animal harm; V14: Intention of
Use of Drones; V15: Reject of Use of Drones; V16: Privacy lost]

4.6 ISM model

The ISM model brings out the challenges and the relationship between them. All the
variables are located in different layers as per their level in the hierarchy based on their
driving and dependence power. The links between them are given by taking the FRM matrix
as reference. This is a visual help of the associations of the variables and this model is
structured of the variables within the canonical matrix. To develop this model, the following
axioms should be followed: (i) no two distinct lines are parallel and (ii) there are no loops
(Sage 1977). The top level of the ISM model, identifies two variables that were identified in
the level I partition processing. They are variables V9 Facility of repairment and V15 Reject
of Use of Drones.

Fig. 4 ISM model for challenges of implementation of drones in parcel delivery

.
6 Discussion

The research questions asked at the beginning of the study were: What are the key
challenges in parcel delivery with drones and how is the relationship between them?. This
will be answered in this section. After a thorough analysis in the previous section, it was
identified clear connections between barriers and the level of the relationships based on their
dependency and driving power. As a result of identifying causal links between barriers, it was
possible to find key variables associated with parcel delivery with drones before planning a
project and to anticipate them in a proper way.

The data group of Parcel delivery barriers with drones (Table xxx) was processed following
the ISM methodology and the relationship between them was identified using the MICMAC
analysis and model (Figures xxx and xxx). In the following sections, we present a more
detailed analysis of the findings, emphasizing the theoretical contribution and the alignment
to existing research as well as their implications for practice.

6.1 Discussion of findings

The half of barriers in parcel delivery with drones are located in the power zone within the
MICMAC model (Figure xxx) and the other half of the barriers are found in the Output zone.
The power zone includes the variables with high levels of driving power and low levels of
dependency. While the Output zone contains the barriers with high levels of dependency and
low levels of driving power. That means that when variables within the Power zone are
modified, the barriers within the Output zone have a direct impact.

Hence, in an instance where, e.g. a parcel delivery with drones experience a change in the
(7) Drone performance, (8) Bad weather conditions, (3) Lack if economic resources to
operate, (6) Operational Restraints or (12*) Heavy air traffic, we can tell that because of their
Power behavior, other variables in the Output zone could potentially be affected. Also,
variables located in the middle of Power and Conflict quadrant like (2) Risk of Collision, (5)
Administrative procedures or (10*) Flight route, can impact the variables within the Output
quadrant like (1) Risk of stolen, lost or damaged package, (13*) Animal harm, (14*) Intention
to use drones, (16*) Privacy Lost and/or (15*) Reject Use of Drones.

The variable (8) Bad weather is a key challenge in the context of its influence on other
variables in the model.. This variable has a value of 10 out of 16 driving power and its
dependence level is only 1 since it is not affected by any other variables in the ISM model.
Additionally, its location and links in the model, shows its height influence on the other
variables except only (4) Service cost and (4) Acoustic pollution in levels in above. It is
confirmed with Kwon, Kim, and Park (2017)** that bad weather might cause a drone to crash
which could result in physical injuries and property damage. It increases the probability of
malfunctioning and not being able to deliver the product and it can affect the adoption for this
technology by the public (Sah, 2021). In the practice, Jeyabalan (2020) states that weather
conditions could pose a major challenge in participants´ experience since current drones in
use cannot operate in certain weather conditions like severe wind and thunderstorms.

The variable (2) Risk of collision affects (5) Administrative procedures and some variables at
a higher level like (1) Risk of stolen, lost or damaged packaged and (13*) Animal harm. It is
affected by (12*) Heavy air traffic. It is mentioned that drones flying at low altitudes will
produce safety hazards such as crashes (Ren, 2020*). Furthermore, an air accident
involving a drone may cause damage to persons and property directly involved in a flight
(Passengers, luggage, goods, mail, etc.) (Konert, 2021).

Certain variables in the model at the fourth level like (1) Risk of stolen, lost or damaged
package, (13*) Animal harm, (4) Service cost and (11*) Acoustic pollution exhibit significant
influence on social factors such as (14*) Intention of use of drones, (16*) Privacy lost and
(15*) Reject of Use of Drones. This shows that in order to embrace drone technology in
parcel delivery, these variables need to be addressed properly and diminish its impact in the
Public acceptance.

The variable (7) Dron performance is only affected by (3) Lack of economic resources to
operate and (6) Operational Restraints. Variable (7) Dron performance is located in the
Power zone because it has high influence in the other barriers at higher levels. Hwang et
al.** states that the main performance of a drone should include speed, altitude, range,
payload and specific operational activity. Emerging simple and cheaper technologies are
motivating organizations to adopt for better drone performance as it was mentioned by Kwon
et al(2017**). Variable (6) Operational Restraints depend on drone guidelines or regulations
in some national settings that define drone altitude and distance and theri cargo weight
(Jeyabalan 20xx*). In practice, drone operators see this as incompatible with the mission of
drones..

6.2 Theoretical contribution

Even though previous studies have analyzed the parcel delivery with drones using foresight
methods such as Delphy and AHP method (Fu, 2021 and Sah, 2021), there is only one
study that explores the potential links between factors using grey-DEMATL based approach
(Raj, 2019).Furthermore, previous parcel delivery studies with drones have not used ISM
method to explore the interaction between barriers. We hold this study is the first (to our
understanding and knowledge) to integrate ISM and MICMAC methodology to analyze the
barriers associated in parcel delivery with drones and to expand associative links between
the variables as it was illustrated in the ISM and MICMAC model in this study. In this way, we
are able to provide new insight into the interrelationships between barriers that have not
previously been examined. We consider this a key contribution to the field of parcel delivery
with drones.

In addition, this study makes a key contribution by identifying links between challenges and
interpreting these links in the context of their dependence and driving power in relation to
other variables. It is shown in the ISM model in Figure xxx; the model sets in the top-three
level social variables such as: (14*) Intention of use of drones, (16*) Privacy lost and (15*)
Reject of Use of Drones. All of these variables are represented at the top-three level in the
ISM model since they have the highest meaning in terms of dependency on other barriers. It
means that they are easily influenced by all connected variables represented and it is
important since the public needs to embrace drone technology in order to consider it as a
viable project.
At the bottom of the ISM model, we can find different kinds of challenges from economical
issues like (3) lack of economic resources to operate to regulations issues like (6)
operational Restraints, and technology issues like (7) drone performance and (8) bad
weather. Because of their high driving power, they demonstrate significant influence on other
challenges in the model. Taking into account this knowledge, stakeholders can understand
the early symptoms or warning signs of implications of how to address key challenges in
order to guarantee and achieve success in parcel delivery with drones as well to improve
benefits from a project like this.

An important contribution is the formal development of these links and the subsequent
identification of potential causal relationships between challenges identified in this research.

6.3 Implications for practice

7. Conclusions

The literature has studied the barriers presented in parcel delivery with drones but they focus
on the challenges themselves without taking into account their relationship and the links
between them. Throughout this study, ISM was used as the methodology for analyzing and
contextualizing the key relationships among the variables. The key contribution of this
research has been the development of new insight into the interrelationships between parcel
delivery challenges with drones.

In this study, we attempt to better understand the interrelationships among the many
variables that are present in parcel delivery with drones.We found fifteen key challenges
from the literature review and then this data was processed following the ISM methodology.
The ISM model shown in Figure xxx has identified the key challenges associated with high
levels of driving power and their influence over other variables in the system. They are
located at the bottom of the model. This is crucial to better understand the success or failure
in a project of parcel delivery with drones because at the top-three levels of the ISM model
are found the social levels such as (14*) Intention of use of drones, (16*) Privacy lost and
(15*) Reject of Use of Drones.

This evidence shows that these variables have the highest level of dependency on the rest
of the challenges in the system. It is important because there are many studies that focus on
Public acceptance of drones since it is an emerging technology but they do not deepen the
linked variables that have an impact on it.

The outcome of this study can help to make better decisions in projects related to parcel
delivery with drones and stakeholders can expand their knowledge in this kind of systems
and then address the variables behind public acceptance, so the rejection of Using drones
will diminish. Future research can use the outcome of this study to develop other foresight
studies taking into account stakeholders and possible scenarios.

7.1 Limitation of study


This study is limited by the selection of a single specific methodology - ISM. There is an
inability to differentiate and compare the findings of a greater number of contrasting
methodologies, rather than relying solely on ISM. Furthermore, although the process
followed in this study follows the steps outlined in the ISM process and, as such, has an
empirical element, the results have not been statistically validated.
Appendix I

Intersect
Variable ion R(Pi)
P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) ∩ A(Pi) Level
1 1,14,16 1,2,3,5,6,7,8,10,12 1
2 1,2,5,10,13,14, 2,3,5,6,7,8,10,12 2,5,10
3 1,2,3,4,5,7,10,11,12,13,14,16 3 3
4 4,14,16 3,4,6,7 4
5 1,2,5,10,12,13,14,16 2,3,5,6,7,8,10,12 2,5,10,12
6 1,2,4,5,6,7,10,11,12,13,14,16 6 6
7 1,2,4,5,7,10,11,12,13,14,16 3,6,7 7
8 1,2,5,8,10,12,13,14,16 8 8
10 1,2,5,10,12,13,14,16 2,3,5,6,7,8,10,12 2,5,10,12
11 11,14,16 3,6,7,11 11
12 1,2,5,10,12,13,14,16 3,5,6,7,8,10,12 5,10,12
13 13,14,16 2,3,5,6,7,8,10,12,13 13
14 14,16 1,2,3,4,5,6,7,8,10,11,12,13,14 14
16 16 1,3,4,5,6,7,8,10,11,12,13,14,16 16 II
Level Partition -Iteration II

Intersectio
Variable n R(Pi) ∩
P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) A(Pi) Level
1 1,14 1,2,3,5,6,7,8,10,12 1
2 1,2,5,10,13,14 2,3,5,6,7,8,10,12 2,5,10
3 1,2,3,4,5,7,10,11,12,13,14 3 3
4 4,14 3,4,6,7 4
5 1,2,5,10,12,13,14 2,3,5,6,7,8,10,12 2,5,10,12
6 1,2,4,5,6,7,10,11,12,13,14 6 6
7 1,2,4,5,7,10,11,12,13,14 3,6,7 7
8 1,2,5,8,10,12,13,14 8 8
10 1,2,5,10,12,13,14 2,3,5,6,7,8,10,12 2,5,10,12
11 11,14 3,6,7,11 11
12 1,2,5,10,12,13,14 3,5,6,7,8,10,12 5,10,12
13 13,14 2,3,5,6,7,8,10,12,13 13
14 14 1,2,3,4,5,6,7,8,10,11,12,13,14 14 III
Level Partition -Iteration III
Variable Intersection
P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) R(Pi) ∩ A(Pi) Level
1 1 1,2,3,5,6,7,8,10,12 1 IV
2 1,2,5,10,13 2,3,5,6,7,8,10,12 2,5,10
3 1,2,3,4,5,7,10,11,12,13 3 3
4 4 3,4,6,7 4 IV
5 1,2,5,10,12,13 2,3,5,6,7,8,10,12 2,5,10,12
6 1,2,4,5,6,7,10,11,12,13 6 6
7 1,2,4,5,7,10,11,12,13 3,6,7 7
8 1,2,5,8,10,12,13 8 8
10 1,2,5,10,12,13 2,3,5,6,7,8,10,12 2,5,10,12
11 11 3,6,7,11 11 IV
12 1,2,5,10,12,13 3,5,6,7,8,10,12 5,10,12
13 13 2,3,5,6,7,8,10,12,13 13 IV
Level Partition -Iteration IV

Variable Intersection
P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) R(Pi) ∩ A(Pi) Level
2 2,5,10 2,3,5,6,7,8,10,12 2,5,10 V
3 2,3,5,7,10,12 3 3
5 2,5,10,12 2,3,5,6,7,8,10,12 2,5,10,12 V
6 2,5,6,7,10,12 6 6
7 2,5,7,10,12 3,6,7 7
8 2,5,8,10,12 8 8
10 2,5,10,12 2,3,5,6,7,8,10,12 2,5,10,12 V
12 2,5,10,12 3,5,6,7,8,10,12 2,5,10,12 V
Level Partition -Iteration V

Variable Intersection
P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) R(Pi) ∩ A(Pi) Level
3 3,7 3 3
6 6,7 6 6
7 7 3,6,7 7 VI
Level Partition -Iteration VI
Variable Intersection
P(i) Reachability Set R (Pi) Antecedent Set: A (Pi) R(Pi) ∩ A(Pi) Level
3 3 3 3 VII
6 6 6 6 VII
Level Partition -Iteration VII

You might also like