The Digital Revolution - Internet of Things 5G and Beyond PDF
The Digital Revolution - Internet of Things 5G and Beyond PDF
Volume 38 Article 40
5-2016
J. P. Shim
Georgia State University
Recommended Citation
French, Aaron M. and Shim, J. P. (2016) "The Digital Revolution: Internet of Things, 5G, and Beyond," Communications of the
Association for Information Systems: Vol. 38 , Article 40.
DOI: 10.17705/1CAIS.03840
Available at: http://aisel.aisnet.org/cais/vol38/iss1/40
This material is brought to you by the Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the
Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact
[email protected].
C ommunications of the
A ssociation for
I nformation
S ystems
Abstract:
Over the past decade, the world has been swimming in an ocean of technology, which has opened the doors for many
opportunities as industrial boundaries continue to change. “Blue oceans” have opened their waters for new industries
such as social networking, smart technology, mobility, and big data. Looking forward, new trends such as the Internet
of things (IoT) and technology advancements towards 5G mobile technology are paving the way for new markets and
industries along with further advancements in big data. A panel discussion consisting of industry leaders and
researchers addressed these topics and the emerging technologies that are changing the world.
This manuscript underwent editorial review. It was received 01/26/2016 and was with the authors for 1 month for 1 revision. Anders
Hjalmarsson served as Associate Editor.
1 Introduction
Researchers and practitioners today are the metaphorical Christopher Columbus set out to prove the
world is no longer analog. The digital revolution has created many new technologies but none with a more
widespread impact than mobile technology and the Internet. These technologies individually have
changed our lives and the way we interact with each other, but, together, they have changed the world
that we live in by creating a “blue ocean” of new opportunities.
In simple terms, a blue ocean refers to the rise of a completely new industry or advances in an existing
industry that alter the boundaries of competition that results in a market free of competition (Kim &
Mauborgne, 2004). Historically, blue oceans have been industry specific and resulted from innovations by
a single company, such as FedEx, Starbucks, Napster, Netflix, Apple (iPhone), Uber, Airbnb, and so on.
However, the combination of mobile technology and the Internet has turned the blue ocean into a sea of
the Internet of things (IoT). The combination of these technologies affects all industries simultaneously as
opportunities appear.
The Internet of things refers to things (i.e., objects) connected to the Internet that one can access through
ubiquitous technologies (Atzori, Iera, Morabito, & Nitti, 2012). The IoT has resulted in many new
technologies referred to as “smart” technologies (i.e., Internet enabled). We now live amid a smart
revolution in which many objects in our everyday lives connect to each other through Internet technology.
Table 1 lists a few examples of smart technologies resulting from mobile computing and IoT technologies.
Table 1. Internet of Things Examples
As we progress towards 5G capabilities, the ease and speed at which IoT connections take place will
become more simplified and, thus, allow for further advancements in technology. However, the effects of
mobile technology and IoT extend beyond the creation of new technological capabilities. As we add digital
components to every object we interact with in our daily lives, we also contribute to the amount of data
being generated. As a result, big data is no longer big—it’s enormous, and it will continue to grow as
industries start moving towards increased connectivity among people and objects. The ramifications for
data analysts is astronomical as we continue to create solutions for analyzing the data. With younger
generations (i.e., digital natives) growing up with these technologies, it’s not really a question of if we
should respond to the need of more connectivity but rather how. Companies across all industries need to
address user needs for increased connectivity among people, devices, and objects.
This paper results from a panel discussion on these emerging topics that took place at AMCIS 2015 in
Puerto Rico. The panel comprised practitioner experts and researchers who discussed the different
technologies from both a practitioner and theoretical perspective. The panelists took a proactive approach
by evaluating the current direction of technology and providing recommendations that can benefit
academics and practitioners alike. The panelists presented cases from the Central Intelligence Agency
and Via Studios, a technology development company creating IoT solutions, to demonstrate some of the
capabilities and challenges of disruptive technologies, which we discuss here. Subsequently, we
summarize the discussion and provide recommendations for future research as we continue to explore the
future of ubiquitous computing and IoT technologies.
Volume 38 Paper 40
Communications of the Association for Information Systems 842
Gartner (2014) has predicted a 30 percent growth in IoT enabled objects from 2014 to 2015 with over 25
billion IoT enable things by 2020. Gartner has said that IoT products and service suppliers will generate
incremental revenues exceeding US$263 billion, mostly in services, in 2020. It will result in US$1.9 trillion
in global economic value-add through sales into diverse end markets (Gartner, 2013). These trends are
creating many opportunities for development companies as we continue to move towards the future and
create a digitally connected world.
Via Studios is one example of a development company providing services that help businesses transition
to IoT. They describe their services as more than just developing objects but rather developing a user
experience. Via Studios is working in conjunction with General Electric’s (GE) microfactory to produce
innovative home appliance products to create an integrated app ecosystem where everything is
connected. From this electronic ecosystem, users can get updates and reports from all appliances in the
home (e.g., a coffee roaster) and control the objects as needed.
Volume 38 Paper 40
843 The Digital Revolution: Internet of Things, 5G, and Beyond
Continuing the coffee roaster example, the president of Via Studios, Jason Clark, describes roasting
coffee as a complicated process that requires significant time and attention to detail. Via Studios reports
that home roasting and brewing coffee have grown in popularity. The roasting process includes both
heating and cooling. The initial process is endothermic, which means that the coffee beans absorb heat.
Once the beans are heated to a certain temperature, they become exothermic and start giving off heat.
Heating the beans requires careful attention because the exothermic beans will start cooking themselves
if the roaster does not lower the temperature to cool them. This process may sometimes require one to
raise and lower the heat multiple times. The IoT-enabled coffee roaster enables the consumer to enjoy
home-roasted coffee without having to spend the time watching the beans throughout the process. With a
mobile app, the user can monitor and control the temperature from anywhere to ensure the beans are
high quality and ready for grinding and brewing once the user gets home or have the beans ready to be
started on a timer for morning brewing when they wake up.
Other IoT capabilities for the kitchen include a refrigerator inventory system. Using an IoT-enabled scale
used to weigh milk inside the refrigerator, the user can get a report on how much milk they have based on
the weight. Egg trays can report on the number of eggs remaining. Combining these technologies with
other ideas currently under development, the user can get an accurate estimate of what they need to
purchase when at the grocery store through a mobile app by connecting to their IoT-enabled refrigerator.
Not only are people connected to their objects through IoT but also objects are connected to other objects,
and, in recent cases, users’ objects are connected to businesses that provide products and services they
need. Amazon’s Dash replenishing service connects the user’s device to Amazon and allows the object to
order supplies when they start to run low (Amazon, 2015). This takes the “just-in-time” concept used in the
automobile industry and applies it to everyday life. The user no longer needs to order washing detergent
or fabric softener—the IoT enabled objects can place the order for the user to ensure the user always has
what the user needs. Other replenishment services that Amazon provides include batteries, water, printer
ink, toner, paper, pet food, and so on. One can directly install the replenishment device into the object as
a physical button the user controls or as an automated system using sensors that orders products for the
user as supplies get low. This example is just the beginning of what is possible. As telecommunications
and networks continue to grow, the speed at which data travels and the ability of IoT-enabled objects will
continue to grow. This explosion in connectivity continues to increase as we reach 4G networks and start
moving towards 5G.
Volume 38 Paper 40
Communications of the Association for Information Systems 844
Even though no consensus about 5G exists, many industry leaders agree on the types of performance
criteria (e.g., latency, network coverage, energy efficiency, massive multiple-in multiple-out (MIMO), power
consumption, connected devices, coverage, and higher security requirements). Looper (2015) shows that
Verizon aims to be the first United States carrier to offer a 5G network for deployment in 2017. Several
other countries, such as South Korea and Japan, are making strides to offer the 5G field trial in the next
several years. As we mention earlier, 5G’s growth and success will be built on the success of the entire
information communication and technology (ICT) ecosystem. The entire ICT ecosystem will be a key
driver in value creation and value capture.
4 Unification of Technologies
Technology is continually advancing towards unification. When the Internet was commercialized in the
1990s, this created new capabilities emerged that would start a ripple effect of technology growth. In the
1990s, objects did not possess Internet capabilities. All technologies of this era operated independently of
other technologies. The 2000s saw a new trend of smart objects as phones and TVs came equipped with
Internet connectivity. In this era, technologies began to grow by including functions that required the
Internet. As the networks continued to advance, data rates increased and the capabilities of smart objects
also began to increase, which gave rise to the Internet of things as we progressed from a theoretical
perspective to implementing these capabilities in the 2010s. Now, objects not only come equipped with
Volume 38 Paper 40
845 The Digital Revolution: Internet of Things, 5G, and Beyond
Internet capabilities but also have the ability to connect to each other and exchange data. Using sensors
and smart devices, objects can connect to each other exchanging information and providing new services
to users ubiquitously. As more objects continue to become IoT enabled, we continue moving towards an
interconnected world where all objects will be able to communicate with all objects accessed by users
anytime from anywhere. This shift towards IoT introduces new possibilities such as social networks of
intelligent objects that are ubiquitously connected to each other (Atzori et al., 2012). Figure 3 displays the
evolution of smart technology as we progressed from independent objects to social networks of the IoT.
Many researchers view social IoT (SIoT) as the next evolution of smart technology (Atzori, Iera, &
Morabito, 2014). SIoT encompasses a network of intelligent, interrelated objects that work together to
share information and provide services to the user. Currently, SIoT is a theoretical concept under
development with no clear definition. Following human social networking, we can obtain a sense of how
one could implement SIoT. Just as one may describe telecommunications based on personal networks,
local areas networks and wide area networks, one can describe SIoT as various levels such as personal,
group, or public access to objects accessed through Internet technology. Personal SIoT might comprise
several objects that (only) a single individual accesses and controls. One possible implementation of a
personal SIoT network could be related to health and fitness. Having IoT objects that monitor workouts,
sleeping habits, and vitals that share information with each other could create many benefits for users
concerned about their well-being. IoT monitoring may also be linked to nutrition information and an IoT
inventory system of grocery items in the home to make sure the user has what they need for a balanced
and healthy lifestyle.
The group SIoT might have intelligent objects that individuals could access based on a controller’s
providing permission. In this scenario, one permits or does not permit objects to communicate with each
other and users to access the objects. Each user interacts with the objects as these objects exchange
information with each other to understand the group usage, habits, or gather other information that would
be beneficial to the group. One could expand the previous of health and fitness example to a group of
individuals that are part of a fitness club. Each user could have their own IoT-enabled objects that monitor
their progress and performance as they exercise. They could share this information with other users and
objects in the group to create more effective workouts based on performance increases made based on
other users’ efficiency. As more users obtain permission to join the network, the network collects and
analyzes more data to benefit all users involved.
The third SIoT network might include publically available networks where users and their objects connect
publically to other users or objects to share information. One would consider such a network as open access
in that anybody could join just by opting into the network. One possible implementation of a public SIoT
network would be public transportation systems. As cars continues to increase in Internet connectivity and
GPS becomes standardized, one could link the objects to public networks that give real-time updates on
traffic conditions. Connected cars could have their speed and location transmitted to the network, which
could provide information to other drivers on the flow of traffic. If a road that a person commonly takes to
work shows that cars driving on that road are either stopped or driving slower than normal speeds, the user’s
GPS could recognize this disruption and update the directions to help the user avoid these conditions. Such
a system would allow drivers to avoid construction zones and accidents, which would not only help individual
drivers but also help emergency vehicles get to the incident scene much faster.
As we can see, unifying technologies provides many capabilities and several benefits that one can realize
from the individual, group, or societal perspectives. While we need to do much work to continue
integrating these technologies, the possibilities present many exciting opportunities and challenges for
both practitioners and researchers alike.
Volume 38 Paper 40
Communications of the Association for Information Systems 846
Volume 38 Paper 40
847 The Digital Revolution: Internet of Things, 5G, and Beyond
The most obvious opportunities from an organizational perspective is the continued development of an all-
inclusive digital dossier for each individual customer. To put it another way, someone, somewhere has a
full understanding of how we live (i.e., through predictive analytics). One can view individuals as data
generators because digital devices continuously collect data on them (Newell & Marabelli, 2015). Next,
predictive analytics will transition to preordained analytics. Since firms can figure out consumers’ past
behaviors, proactive firms can offer goods and services to individuals based on behaviors and then
reinforce those same behaviors. In this situation, firms no longer predict but reinforce and preordain
consumers’ behavior patterns. While there are unlimited possibilities over the horizon, various issues will
likely arise.
The continued development of IoT-enabled objects poses various challenges in regards to privacy and
security. IoT will become an integral part of individuals’ lives by connecting them to everything in various
ways. The data would record everything we write, what we see, things we do, and places we visit. Anyone
who connects to the Internet via device(s) would be identifiable and pinpointed inside a massive cloud of
data. This point raises issues associated with privacy and security with ethical concerns related to the use
of this data (Newell & Marabelli, 2015).
Volume 38 Paper 40
Communications of the Association for Information Systems 848
creating paperless offices that are ubiquitous, but having mobile technology using data rates that exceed
broadband speeds would provide constant and instant connectivity and increase the flow of data. Real-
time operations could exist ubiquitously because all processes and business objects become Internet
enabled. Companies could easily expand globally without significant capital investments. IoT technology’s
implementation in everyday objects provides unlimited possibilities to create new industries for products
and services and expand existing industries. While some organizations view 5G service and IoT as
disruptive technologies, others view them as innovative technologies that they can use to gain a
competitive advantage. Companies such as Boeing have begun to extend their use of technology to
create an IT ecosystem for constructing and operating commercial airplanes (Nolan, 2012).
While practitioners have many opportunities due to these innovative technologies, they should be aware
of and learn how to overcome the many associated challenges. The most obvious challenge revolves
around big data. Having Internet-enabled objects will significantly increase the amount of data that users
generate, which will require expertise in data management and analytics to capture, store, organize,
disseminate, and analyze. Data analytics will be a highly sought-after skill needed to manage and analyze
the growing amounts of data. More data collection will also raise ethical issues about the types of
information collected about users and how that data is used. While few legal issues have arose directly
from the amount of data that organizations now collect, various ethical issues concerning how
organizations use data have arose. One recommendation to handle both the legal and ethical issues
would be to create an information recourses (IR) department responsible for information in the same vein
human resources departments look after employees. The IR department would set the policies and
manage how the organization collects, stores, and uses data. Organizations that learn to manage these
emerging technologies and develop the skills to analyze the data will be the organizations that lead the
path towards the future. While we discuss the academic and practitioner implications separately, both the
research community and business are working towards common goals to increase our understanding of
emerging technologies and further develop our capabilities with them.
6 Conclusion
As researchers, we need to continue working with industry leaders to understand the world’s technological
changes and lead the charge rather than report on what has happened and why. As we continue to grow
towards 5G and increased connectivity, we are moving toward a ubiquitous world in which we are all
connected to everybody and everything. The IoT provides unlimited possibilities and opportunities for
academics and practitioners alike. Indeed, new technologies continually arise, and big data continues to
create answers to questions that haven’t been asked yet. As a result, we need an increased number of
analysts to generate knowledge and theories from the data being produced. Although the future is
uncertain, the path is being set as these various technologies converge providing the promise of exciting
things to come.
Volume 38 Paper 40
849 The Digital Revolution: Internet of Things, 5G, and Beyond
References
Amazon. (2015). Amazon dash replenishment service. Retrieved from https://www.amazon.com/oc/dash-
replenishment-service
Ashton, K. (2009). That “Internet of things” thing: In the real world, things matter more than ideas. RFID
Journal. Retrieved from http://www.rfidjournal.com/article/print/4986
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social Internet of things (SIoT)—when social
networks meet the Internet of things: Concept, architecture and networking characterization.
Computer Networks, 56(16), 3594-3608.
Atzori, L., Iera, A., & Morabito, G. (2014). From “smart objects” to “social objects”: The next evolutionary
step of the Internet of things. IEEE Communications Magazine, 52(1), 97-105.
Harris, K., Kim, A., & Schwedel, A. (2011). The great eight trillion-dollar growth trends to 2020. Bain &
Company. Retrieved from http://www.bain.com/publications/articles/eight-great-trillion-dollar-growth-
trends-to-2020.aspx
Cheyney, T. (2014). Understanding the generational differences in your church. Retrieved from
http://renovateconference.org/generational-differences-church
Gartner. (2013). Gartner says the Internet of things installed base will grow to 26 billion units by 2020.
Retrieved from http://www.gartner.com/newsroom/id/2636073
Gartner. (2014). Gartner says 4.9 billion connected “things” will be in use in 2015. Retrieved from
http://www.gartner.com/newsroom/id/2905717
Huawei Technologies. (2013). 5G: A technology vision. Retrieved from www.huawei.com/5gwhitepaper/
Kim, W., & Mauborgne, R. (2004). Blue ocean strategy. Harvard Business Review, 82(10), 76-84.
Lancaster, L. C., & Stillman, D. (2002). When generations collide: Who they are. Why they clash. How to
solve the generational puzzle at work. New York, NY: HarperCollins.
Looper, C. (2015). Verizon to begin testing 5G network for deployment in 2017. Tech Times. Retrieved
from http://www.techtimes.com/articles/83007/20150909/verizon-begin-testing-5g-network-deploym
ent-2017.htm
Newell, S., & Marabelli, M. (2015). Strategic opportunities (and challenges) of algorithmic decision-
making: A call for action on the long-term societal effects of “datafication”. Journal of Strategic
Information Systems, 24(1), 3-14.
Nolan, R. (2012). Ubiquitous IT: The case of the Boeing 787 and implications for strategic IT research.
Journal of Strategic Information Systems, 21(2), 91-102.
Pais-Vieira, M., Chiuffa, G., Lebedev, M., Yadav, A., & Nicolelis, M. (2015). Building an organic computing
device with multiple interconnected brains. Nature. Retrieved from
http://www.nature.com/articles/srep11869
Raynor M. E., & Cotteleer, M. J. (2015). The more things change: Value creation, value capture, and the
Internet of Things. Deloitte Review, 17, 51-65.
Raynor, M. E., & Cotteleer, M. J. (2015). The more things change. Deloitte Review, 17, 53.
Shim, J. P., French, A., Guo, C., & Jablonski, J. (2015). Issues, solutions, and ROI of big data and
analytics. Communications of the Association for Information Systems, 37, 797-810.
Volume 38 Paper 40
Communications of the Association for Information Systems 850
Copyright © 2016 by the Association for Information Systems. Permission to make digital or hard copies of
all or part of this work for personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear this notice and full citation on
the first page. Copyright for components of this work owned by others than the Association for Information
Systems must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on
servers, or to redistribute to lists requires prior specific permission and/or fee. Request permission to
publish from: AIS Administrative Office, P.O. Box 2712 Atlanta, GA, 30301-2712 Attn: Reprints or via e-
mail from [email protected].
Volume 38 Paper 40