Journal Pone 0304118
Journal Pone 0304118
RESEARCH ARTICLE
1 Department of Industrial Engineering and Management, Khulna University of Engineering and Technology
(KUET), Khulna, Bangladesh, 2 Department of Computer Science, American International University-
a1111111111 Bangladesh, Dhaka, Bangladesh
a1111111111
a1111111111 ‡ KA and MAJ are contributed equally to this work as co-first authors.
* [email protected]
a1111111111
a1111111111
Abstract
Integrating Internet of Things (IoT) technology inside the cold supply chain can enhance
OPEN ACCESS transparency, efficiency, and quality, optimize operating procedures, and increase produc-
Citation: Ahmad K, Islam M.S, Jahin M.A, Mridha tivity. The integration of the IoT in this complicated setting is hindered by specific barriers
MF (2024) Analysis of Internet of things that require thorough examination. Prominent barriers to IoT implementation in a cold supply
implementation barriers in the cold supply chain:
chain, which is the main objective, are identified using a two–stage model. After reviewing
An integrated ISM-MICMAC and DEMATEL
approach. PLoS ONE 19(7): e0304118. https://doi. the available literature on IoT implementation, 13 barriers were identified. The survey data
org/10.1371/journal.pone.0304118 were cross–validated for quality, and Cronbach’s alpha test was employed to ensure valid-
Editor: Mohamed Rafik N. Qureshi, King Khalid ity. This study applies the interpretative structural modeling technique in the first phase to
University, SAUDI ARABIA identify the main barriers. Among these barriers, “regulatory compliance” and “cold chain
Received: February 24, 2024 networks” are the key drivers of IoT adoption strategies. MICMAC’s driving and dependence
power element categorization helps evaluate barrier interactions. In the second phase of
Accepted: May 7, 2024
this study, a decision-making trial and evaluation laboratory methodology was employed to
Published: July 12, 2024
identify causal relationships between barriers and evaluate them according to their relative
Copyright: © 2024 Ahmad et al. This is an open importance. Each cause is a potential drive, and if its efficiency can be enhanced, the sys-
access article distributed under the terms of the
tem benefits as a whole. The findings provide industry stakeholders, governments, and
Creative Commons Attribution License, which
permits unrestricted use, distribution, and organizations with significant drivers of IoT adoption to overcome these barriers and opti-
reproduction in any medium, provided the original mize the utilization of IoT technology to improve the effectiveness and reliability of the cold
author and source are credited. supply chain.
Data Availability Statement: All data and related
metadata underlying the findings of this study have
been deposited in Figshare, an appropriate public
data repository. The datasets are accessible at the
following DOI: https://doi.org/10.6084/m9.figshare.
25826077.v1. 1 Introduction
Funding: The author(s) received no specific Recent developments in Internet of Things (IoT) technology have the potential to significantly
funding for this work. change several industries via the introduction of data-driven insights, increased connectivity,
Competing interests: The authors have declared and a replacement of long-established ways of doing things. The supply chain (SC) is a net-
that no competing interests exist. work of related entities that includes every procedure step, from the procurement of raw
materials or components to the consummation of the finished good. Supply chains in the
modern day have developed into intricate value networks and are now an important differen-
tiator for businesses. A growing number of barriers make it harder than ever to track items
and goods as they go through the value chain and confirm where they came from [1]. Cold SC
(CSC) is a procedure that includes activities regulated by temperature and a specialized logisti-
cal infrastructure designed to maintain product quality and temperature consistency through-
out its entire transit, beginning with the point of origin in manufacturing or procurement and
ending with its eventual delivery to the final consumer [2]. Everything from preparing, storing,
transporting, and monitoring temperature-sensitive goods from their providing areas to their
receiving locations involves a sequence of activities in CSC. Food, flowers, medicines, and
chemicals are examples of temperature-sensitive items because of their perishable nature [3].
To increase sales and profits, companies are creating a cold chain in transportation by reduc-
ing costs, reducing delivery times, improving product quality, and offering personalized
goods.
The Internet of Things (IoT) is a network that links physical items to the Internet and
allows them to broadcast data to intelligently identify themselves and enable their location,
tracking, monitoring, and management with the assistance of radio frequency identification
tags, sensors, actuators, and positioning systems [4]. IoT allows previously inaccessible physi-
cal and everyday items to separately gather and share data via the use of built-in sensors and
network connection. IoT emerged from networked devices, which started at MIT’s Auto-ID
Center in the nineties, according to Center Director Kevin Ashton, who purportedly devel-
oped the concept of IoT at the turn of the millennium. The current concept of IoT is supported
by the addition of GPS devices, smartphones, social networks, cloud computing, and data ana-
lytics to existing networks [5]. IoT plays a significant part in Industry 4.0, which encompasses
a variety of innovative and revolutionary technologies, cyber-physical systems, IoT, and cloud
computing [6]. It links objects, sensors, actuators, and other smart technologies, allowing
immediate access to physical commodity data to support new services with high efficiency and
productivity [7]. IoT deployment may boost the likelihood of reliably transferring flow from
source to sink, which is the potential of the cold chain network to withstand increased rivalry
among enterprises [8].
Improved operating processes, reduced risk and expense, greater visibility and transpar-
ency, and greater adaptability and flexibility across the supply chain are merely a few of the
many advantages of incorporating IoT into the supply chain [9]. IoT technology may drasti-
cally boost the monitoring and control of CSCs, particularly in areas such as medication, food,
and logistics where temperature-sensitive commodities are moved and preserved [10].
This study conducts an exhaustive analysis of the barriers that hinder the successful imple-
mentation of the IoT in cold supply chains. Integrated interpretive structural modeling and
decision-making trial and evaluation laboratory (ISM-DEMATEL) is an extensively used tech-
nique for decision-making and analysis in complex systems. ISM is beneficial for building
hierarchical links among factors and analyzing the structure of complex systems, whereas
DEMATEL delivers a quantitative assessment of the intensity and direction of interactions
between factors [11, 12]. Both approaches allow for a combination of qualitative and quantita-
tive research, with DEMATEL specifically addressing the feedback loops. They are straightfor-
ward and obvious, making them easier to explain and grasp by decision-makers [13–15].
The increasing volume of international trade and consumer spending has spurred the rapid
growth of supply chains for perishable commodities. The logistics for “cold chain” items, such
as perishables and frozen foods, constantly evolve. Global revenue for the sector is forecasted
to reach USD 277.69 billion by 2023, growing at a CAGR (cumulative aggregate gross revenue)
of 7.24 percent between 2018 and 2023 [16].
3. To identify the most significant barriers and underlying causes and effects hindering the
enhancement of IoT implementation.
Several studies have delved into barriers within specific countries and contexts; however,
these investigations are not without their limitations. Some have explored sectors unrelated to
the CSC, and while certain studies have focused on IoT adoption in this context, they often fall
short of establishing connections among identified barriers or evaluating their respective
effects on the overall system. Moreover, the exploration of IoT implementation barriers in
CSCs represents a significant gap in the literature, with no prior comprehensive studies identi-
fied in this specific domain. The lack of scholarly attention to this crucial aspect of CSC under-
scores the need for an in-depth investigation. Our research is a pioneering effort to bridge this
gap by employing an integrated ISM-DMATEL approach.
The literature gap is particularly evident in the scarcity of empirical examinations and theo-
retical frameworks dedicated to understanding the intricacies of IoT implementation in CSCs.
The unique challenges posed by the CSC environment, characterized by stringent temperature
control requirements and perishable goods logistics, warrant further exploration.
To address these gaps, this study contributes to the literature in the following ways:
1. An in-depth analysis of research on essential barriers to CSC IoT adoption, considering
various perspectives, including supply chain stages, environmental effects, socio-economic
scenery, and data complexity.
2. A survey-based approach was employed to gather data and expert opinions regarding these
barriers.
3. The utilization of the ISM method to determine the interdependencies among the selected
barriers.
4. The MICMAC strategy was applied to comprehensively analyze the fundamental con-
structs, thereby offering valuable insights into their significance.
5. The DEMATEL approach was used to validate causal relationships among the components
within the model.
6. Key barriers that play a fundamental role in efficiently managing the cold chain are
highlighted, offering insights to overcome challenges in IoT adoption.
7. Systematic identification and ranking of barriers based on their influence on the system
addresses the current lack of comprehensive assessments in the literature.
8. Contribution towards filling research gaps by focusing specifically on the CSC, distinguish-
ing it from studies that extend across different sectors.
9. Providing a structured approach to understanding and addressing the challenges associated
with IoT implementation in CSC, contributing to enhanced operational efficiency and
reliability.
10. It offers valuable insights for enterprises, governments, and technology developers to navi-
gate and overcome obstacles in integrating IoT into CSC operations.
The rest of the paper is arranged as follows: “Literature review” provides a comprehensive
literature review of IoT implementation in CSCs, including implementation challenges and
comparable methodologies utilized in the present era; “Methodology” presents the research
methodology that was used for the study; “Numerical illustration for results interpretation”
covers the data analysis, along with the application of ISM-DEMATEL to the obtained barriers;
2 Literature review
The aim of this section is to provide a summary of how CSC procedures may use IoT. We used
Google Scholar and many other publishers’ websites, including Springer, Elsevier, Emerald,
and Taylor-and-Francis, to compile the literature most relevant to our study.
the reliability of a cold chain network by considering both flow and time factors simulta-
neously, with the ultimate goal of determining the network reliability for actual products. Sha-
shi [38] revealed two primary themes: the existing cold chain system’s known or unknown
limits, as well as the use of digital enablers based on the IoT.
Numerous deployment strategies, constraints, and barriers in cold chain monitoring appli-
cations have been discussed [39]. Sallam et al. [34] analyzed future developments in the field of
supply chain management and offers a thorough analysis of the IoT applications in this area,
including problems, possibilities, and best practices. The feasibility of implementing modern
technologies such as IoT to enhance cold SC was assessed by Gupta et al. [40]. To enhance ser-
vice quality, the organization must invest additional funds for maintenance. Umamaheswari
et al. [41] suggested smart cold storage that uses cutting-edge supply chain technology and the
IoT to boost productivity and reduce wait times at all levels. Luo et al. [42] presented a smart
monitoring system that stores data on defined servers to monitor cold chain items in real time
while cutting costs, enhancing network capacity, and simplifying protocols. Cold chain transit
is easy to track using this strategy. Afreen and Bajwa [43] implemented a system that utilizes
the IoT to track and notify users of changes in cold storage conditions such as humidity, tem-
perature, light, and gas concentration in real-time., alerting workers when these variables
exceed safe thresholds. Goodarzian et al. [44] proposed a model for improving the precision,
swiftness, and fairness of vaccine injection and implemented an inaugural responsive green-
cold vaccine supply chain network in response to the COVID-19 pandemic. Intelligent control
technology, cellular networks, wireless communication technology, temperature and humidity
sensors, IoT, and database technology all come together to form a cold chain management sys-
tem [45]. Ceken and Abdurahman [46] presented an IoT-based cold chain logistics system
that controls and monitors the cold chain’s ambient temperature in real time and estimates
perishable item shelf life to help all stakeholders make better decisions. The paper by Tsang
et al. [22] presented an IoT-based risk monitoring solution to handle product quality and
safety concerns in the cold chain. Using this technology, the cold chain can be monitored in
real-time, and risks can be assessed to ensure the safety of workers. Hernandez and Yamaura
[47] suggested that IoT-enabled devices may reduce pharmaceutical waste caused by tempera-
ture changes. It also demonstrated consistency in IoT implementation, including infrastruc-
ture, security, and device management. Owing to perishable food and cross-regional transit,
cold chain systems encounter several challenges in the perishable food supply chains. Atyam
et al. [48] explained the complexity and problems associated with modern supply chain man-
agement, the importance of IoT in monitoring items, and how IoT and blockchain might
improve supply chain performance. Kumar et al. [49] highlighted the need of efficient cost
management and waste reduction as key performance indicators and also emphasized the pos-
sibility of boosting operational efficiency and optimizing resource utilization via the integra-
tion of the IoT. IoT-enabled smart monitoring and control systems could provide long-term
solutions to energy consumption and managerial reluctance in the cold supply chain [50]. This
study of Zhang et al. [51] addressed these difficulties by creating a perishable food supply
chain model utilizing real-time IoT data and two supply hubs to increase performance. Future
cold supply networks can become more resilient and sustainable if IoT technologies are used.
This advancement is expected to result in less waste and decreased operational expenses, there-
fore benefiting both businesses and consumers [40, 52].
with data privacy laws. First, it is necessary to identify the barriers that hinder IoT implemen-
tation in CSC in order to overcome these challenges. Table 1 lists the barriers to implementing
the IoT in CSC.
system into many sub-systems and construct a multi-level structural model [11]. Raut et al.
[76] employed the ISM approach to establish the interconnections among drivers, enabling a
comprehensive knowledge of the relative connections among the critical success factors and
defining their dependency when implementing sustainability.
The DEMATEL technique has been used extensively to identify critical barriers in various
vital processes, which were created to support methodical evaluations and organized decision-
making processes. The effect connections map shows the relational linkages, with numbers
denoting the degree of influence and arrows denoting the direction of influence. It is a com-
prehensive tool for assessing the interrelations between system variables and emphasizing the
core-driving components [12]. Manoharan et al. [77] presented the DEMATEL model, which
aids in comprehending the importance of drivers and barriers, creating matrices or digraphs
to represent complex causal interactions, and identifying the relationships between these fac-
tors. The barrier analysis techniques employed in recent studies are presented in Table 2.
The literature investigation discusses every element of the CSC, covering transportation,
cold storage, procurement, and occupational security across the cold chain. IoT supports SCM
by enhancing visibility and stability, but problems include regulatory limitations and poor
infrastructure. Most studies focus on distinct problems and seek to solve these challenges using
the solutions provided. In the combined ISM-MICMAC-DEMATEL approach, ISM-MICMAC
is used to construct hierarchical relationships among barriers and analyze the structure of sys-
tems, while DEMATEL delivers a numerical evaluation of the strength and direction of interac-
tions between factors. Numerous barrier analysis strategies have been employed in modern
methods, which are also used to analyze obstacles. The choice between these tactics varies
depending on individual circumstances, available data, and decision-makers’ preferences. Thir-
teen barriers, and from the different barrier analysis techniques utilized in recent approaches,
ISM-DEMATEL was chosen to analyze these barriers.
3 Methodology
Research initiation involves several key stages, including the design of surveys, meticulous data
collection, selection procedures, and rigorous reliability testing, as illustrated in Fig 2. Subse-
quently, the second phase unfolds with a process flow diagram outlining the development of
the ISM model. The third phase is characterized by a process flow diagram that delineates the
systematic steps employed in constructing the DEMATEL model.
Fig 2. Flowchart depicting the research methodology, encompassing phases such as data collection and validation,
implementation of ISM-MICMAC, and execution of the DEMATEL procedure.
https://doi.org/10.1371/journal.pone.0304118.g002
forms detailing the purpose of the study, their rights as participants, and the procedures for
data handling. Participation in the survey was voluntary, and participants had the right to
withdraw at any time without penalties. This study was approved by the Ethics Review Board
of the Research & Extension Center, Khulna University of Engineering & Technology, Bangla-
desh, to conduct this survey research.
3.1.3 Establish relationships between barriers. Once possible obstacles are discovered, it
is essential to understand how these barriers are interrelated or impact each other. This step
helps in understanding the complexity of the system and how different challenges may be con-
nected. To determine which pairs of barriers require further investigation, a contextual rela-
tionship between them is established.
3.1.4 Cronbach’s alpha testing. The reliability coefficient Cronbach’s alpha can be used
to evaluate the internal consistency of the survey or test items. Many psychological and educa-
tional surveys and assessments have used Cronbach’s alpha for their formulation and testing.
This aids researchers and practitioners in ensuring that their measuring equipment accurately
measures the idea in question. Cronbach’s alpha reliability is a measure of how well a sum or
average of k measurements holds, where k measures might be anything from k raters to alter-
nate forms to items on a questionnaire or exam. We used a 156-item questionnaire (k = 156)
to measure implementation barrier influence, with each item scored on a 0–4 Likert scale. A
Cronbach’s alpha value should exceed 0.7 since a value equal to or more than 0.7 falls within
an acceptable range [86].
The variance of the total score (270.52) and the sum of the item variances (67.88) provide
this dependability measure. The survey dataset had an acceptable degree of internal consis-
tency, as indicated by a Cronbach’s alpha value of 0.7534. This measuring tool reliably captures
the targeted construct because the coefficient is greater than the generally recognized require-
ment of 0.7.
3.2.2 Step 2: Developing reachability matrix. The SSIM generates a reachability matrix;
four symbols are converted to 0s and 1s to implement the SSIM in the initial reachability
matrix. matrix.
Specific rules of replacement are as follows:
• If D(i, j) of SSIM is shown with the symbol “V,” D(i, j) = 1 and D(j, i) = 0 should be assigned
in the initial reachability matrix;
• If D(i, j) of SSIM is shown with the symbol “A,” D(i, j) = 0 and D(j, i) = 1 should be assigned
in the initial reachability matrix;
• If D(i, j) of SSIM is represented by an “X,” then D(i, j) = 1 and D(j, i) = 1 should be placed in
the initial reachability matrix,
• If D(i, j) of SSIM is represented by an “O,” then D(i, j) = 0 and D(j, i) = 0 should be assigned.
3.2.3 Step 3: Developing final reachability matrix. A transitivity test is then performed
on the initial reachability matrix. ISM presupposes, as a given, that contextual relations are
transitive. If barrier A is connected to barrier B, and B is related to barrier C, then barrier A
must also be related to barrier C.
3.2.4 Step 4: Developing level partition. Level partitioning refers to categorizing or clas-
sifying distinct levels inside the information system. This involves dividing the system into lev-
els or hierarchies to better understand its structure at various levels. The resultant final
reachability matrix is segmented into several hierarchical levels.
3.2.5 Step 5: Developing conical form. The conical form describes structuring or orga-
nizing an information system in an arrangement that resembles a conical shape, indicating a
hierarchical structure. Subsequently, a conical form of the reachability matrix was created.
3.2.6 Step 6: Developing ISM model. A directed graph was constructed using a reachabil-
ity matrix to eliminate transitive linkages. By exchanging the nodes of the variables for state-
ments, they converted into an ISM from the resultant digraph.
3.2.7 Step 7: Reviewing to check for inconsistency. After establishing the level partition,
conical shape, and ISM model, it’s important to examine the full system to detect and resolve
discrepancies. This step verifies that the system was consistent and functions smoothly without
conflicting factors. The generated ISM model is reviewed for conceptual coherence, and any
necessary revisions were implemented.
3.4 DEMATEL
The DEMATEL method transforms the complex web of interrelations between barriers into a
clear structural model of the system by categorizing them into two groups: causes and effects.
This is a practical method for ranking the relative importance of different aspects of a complex
system to inform strategic decisions over the long run and identify potential development
areas [89]. It is extensively implemented across numerous domains, such as SCM, traceability,
smart cities, healthcare, and consumer behavior [90]. The following is a detailed description of
how DEMATEL works [15, 37].
3.4.1 Step 1: Computation of average matrix. The expert panel that filled out the survey
was asked to provide an integer value between 0 and 4 to represent the degree of influence
they saw between any two barriers, using five different integer scales as “very high influence
(4)”, “high influence (3)”, “moderate influence (2)”, “low influence (1)”, and “no influence
(0)”. A respondent’s estimate of how much variable i influences variable j is denoted by the xij
symbol. For i = j, 0 is assigned to each diagonal element.
For every respondent, we may generate a non-negative n × n matrix using the formula
X k ¼ ½xijk �, where k means that there were a total of responders with 1 � k � H and the total
number of factors is denoted by n. In this case, the H responder matrices are denoted by X1,
X2, X3, . . ., XH.
The average matrix can be created as
1Xk¼1
aij ¼ xk ð1Þ
H H ij
3.4.3 Step 3: Calculation of the total relation matrix. The total relation matrix T is repre-
sented as
1
T ¼ DðI DÞ ; ð3Þ
" #0
0
X
j 1
C ¼ ½C �
j 1�n ¼ tij ; j ¼ 1; . . . :; n ð5Þ
n 1�n
The transpose value of the jth column, denoted by [Cj]0 , and the sum of the values of the jth
column, Cj, shows the effect of the jth attribute on the other attributes. The influence of the ith
row, denoted by ri, indicates the cause of the ith attribute on other attributes. The sum (Ri + Ci)
represents the cumulative effects experienced and exerted by factor i. This signifies the degree
of importance of element i in the overall system. The difference (Ri − Ci) indicates the net
effects of factor i on the system. If the difference between Di and Ri is positive, the influence
factor i may be considered as a net cause. Conversely, if the difference between Di and Ri is
negative, then factor i can be regarded as a net receiver.
3.4.5 Step 5: Calculation of the threshold value. Determination of the threshold value is
necessary to construct an interrelationship map. The interrelationship map only displays equa-
tions with penetration matrix values greater than the threshold value. The mean of the ele-
ments inside the entire penetration matrix is computed using Eq 6.
Pn Pn
i¼1 j¼1 tij
a¼ ð6Þ
N
utilizing MICMAC is to evaluate the importance of the dimensions that affect a system. Using
this methodology, researchers can examine the complex interrelationships and dependencies
between different components and identify important factors that have a major impact on the
system as a whole. The ISM-MICMAC technique has two main phases that have been applied
in various settings such as supply chains, industry, and healthcare. A hierarchical structure of
the chosen IoT adoption barriers was first constructed using the ISM. The relative importance
and hierarchy of each barrier were then determined by methodically examining cause-and-
effect interactions. After the dimensions are established, professionals evaluate the correla-
tions, resulting in the development of a binary relation matrix that is then converted into a
reachability matrix. The hierarchy of the barriers is displayed in this matrix, highlighting their
key and consequential functions within the CSC framework. The MICMAC technique is used
in the next step to further explore the relationships and interactions among the various IoT
adoption barriers that have been identified. The emphasis is on understanding the dynamic
behavior of barriers and classifying them according to their reliance and driving forces. Identi-
fying driving barriers with high influence but low dependence and dependent barriers with
high influence but low driving power is made easier using MICMAC analysis. With this cate-
gorization, the role of each barrier in the bigger picture and the vital links between them can
be better understood.
4.1.1 Structural self-interaction matrix (SSIM) development. Experts’ judgments on the
relationships between the 13 identified barriers are used to inform the SSIM’s development,
which involves using four symbols to depict these interactions in a pairwise fashion, as
described insubsubsection 3.2.1. In Table 4, SSIM depicts the element intrinsic linkages and
internal dynamics.
The symbols V, A, X, and O represent the specific sort of connection between the two com-
ponents (i, j) being examined. The notation “V” indicates that element i will exert influence on
element j. “A” signifies that element i will be impacted by element j. The symbol “X” denotes a
bidirectional link, indicating that elements i and j will mutually impact each other. There is no
relationship or connection between the elements of the symbol “O”.
Table 5 lists IoT adoption barriers using abbreviations for convenience. Each abbreviation
provides a concise overview of the main barriers that each one represents. Researchers and
stakeholders seeking to overcome and resolve these obstacles in the rapidly evolving field of
IoT technology will find the table invaluable.
4.1.2 Reachability matrix formation. The four symbols in Table 4 are converted to 0s
and 1s to implement SSIM in the first reachability matrix using the rules described in subsub-
section 3.2.2. A square matrix is prepared in Table 6 with binary values that show whether the
parts influence one other. The observed barriers are interconnected and have complicated
relationships, which can be better understood using the reachability matrix.
4.1.3 Final reachability matrix formation. Transitivity was used to create the final reach-
ability matrix, as shown in Table 7. Following the completion of the analytical phase of the
ISM technique, the final reachability matrix, which contains the discovered hierarchical link-
ages among the system parts, is produced. The final reachability matrix determines the “driv-
ing and dependency power”, providing insight into the dynamics of the system. Analyzing
“driving and dependency power,” Table 7 classifies parameters into “dependent, autonomous,
linkage, and independent” categories. The barriers that display a significant driving force and
dependence are categorized as belonging to the linking group; none of them are classified as
autonomous, non-dependent, or dependent.
4.1.4 Level partition. Barriers are broken down into three distinct sets: the reachability
set, which contains the factor and all other factors it influences; the antecedent set, which con-
tains the factor and all other factors that influence it; and the intersubsection set, which con-
tains all the factors in both sets.
Table 8 provides an overview of the final reachability matrix’s detailed reachability set, ante-
cedent set, and inter-subsection set of IoT implementation barriers in CSC. All the barriers
were categorized into levels.
4.1.5 Conical matrix. The conical matrix in Table 9 displays the transitivity interactions
between adoption barriers. Identifying indirect linkages between components reveals the dom-
ino impact of system effects. A more complete picture of the system dynamics and structure is
achieved using this matrix, which assists in understanding the wider effect of changing one ele-
ment on other elements. The conical shape of the final reachability matrix is illustrated in Fig 3.
The hierarchical relationships among the different system parts are better understood
using a conical matrix (Table 9), which is a tool for creating conical structures. This conical
form clarifies the architecture of the system by visually depicting the hierarchical
connections.
4.1.6 MICMAC analysis. MICMAC analysis is a useful tool for determining the drive and
dependence power of barriers. This analysis was conducted using barriers to divide the struc-
ture into separate groups.
There are four distinct categories of barriers described in Fig 4:
Autonomous barriers: These barriers were located in the first quadrant. They were not very
strong in driving or being dependent.
Dependent barriers: These barriers are shown in Quadrant-II. The driving power of the subject
was weak, whereas the dependence power was strong.
Linkage barriers: These are inside Quadrant-III and exhibit strong driving and dependent
power. In general, the instability of these barriers arises from the interconnectedness of
their actions since any action done on one barrier might have consequences for others and
could affect the barrier itself.
Independent barriers: These are shown in Quadrant-IV and exhibit strong driving power but
weak dependence power.
4.1.7 ISM model. The digraph in Fig 5 shows the barriers preventing IoT adoption. It was
used to identify the hierarchy levels associated with the implementation of the IoT in cold SC.
The conceptual coherence of the produced ISM model was checked, and any required adjust-
ments were made.
4.2.2 Normalized direct relation matrix formation. Using Eq 2, the normalized direct
relation matrix is formulated from the average matrix in Table 11. The maximum summation
was 32.333, which functions as a divisor, and every cell value from the average matrix was
divided by this value.
4.2.3 Total relation matrix formation. The total relation matrix is formulated using Eq 3
in Table 12. The values in the matrix indicate the degree of relation between the pairs of fac-
tors. A higher value suggests a stronger relationship.
4.2.4 Identification of cause and effect. Table 13 provides information on the degree of
influence of various factors related to IoT adoption on cold SC barriers. Each row represents a
specific factor, and each column provides different metrics or totals. The row total and column
total were calculated using Eqs 4 and 5. Causes have Ri − Ci values greater than 0, whereas the
effects have smaller Ri − Ci values.
4.2.5 Developing interrelationship map. A digraph illustrating the influential relation-
ship between the barriers is shown in Fig 6, where the threshold value calculated using Eq 6 is
0.099. Once the threshold value is determined, an interrelationship map is produced. In this
map, the values above the threshold reflect the influence of barrier i on barrier j. By contrast,
when the value is lower than the threshold value, barrier i is influenced by barrier j. The arrows
demonstrate the influence, demonstrating an important link among the barriers. Values posi-
tioned above the neutral horizontal line are categorized as belonging to the cause group, while
values positioned below the neutral horizontal line are categorized as belonging to the effect
group.
4.2.6 Developing final ranking of attributes. DIM > TI > DSP > SC > AA > LSW >
RI > HIC > CCN > ROI > RC > CEC > EE
Where Full form of these abbreviations described in Table 5.
5 Discussions
Numerous interconnected barriers to extensive IoT implementation in cold SC were analyzed
in this study. Data from the survey were double-checked to ensure accuracy. The Cronbach’s
alpha test was used to ensure that the survey results were acceptable and valid. A reliable mea-
surement is ensured by this coefficient, which evaluates the internal consistency of the survey
questions. After it was confirmed that the alpha value was above the acceptable range, the sub-
sequent stage of the process was initiated.
To ascertain this, The ISM-MICMAC-DEMATEL method is constructed to determine
important barriers, which are divided into three subsections: subsection 4.1 for ISM, subsec-
tion 4.1.6 for MICMAC and the other subsection 4.2 for DEMATEL.
The ISM model was created to determine the hierarchy levels of IoTBs so that CSC practi-
tioners could see their dependence links and focus on the largest adoption barriers to IoT
deployment. This study identified five hierarchical layers to explain the linkages between the
chosen IoTBs. The implementation barrier at higher levels exhibits greater susceptibility to the
effect of other factors, while components situated at lower levels strongly influence other
factors.
Variables classified as high levels, namely Levels 1 and 2, are prone to being influenced by
other variables. We identified acceptance, adoption, and reliability issues at the top of the hier-
archy, driven by the four hierarchies below. At the second level, we identified two barriers:
high implementation cost and ROI uncertainty caused by the three hierarchical layers below it.
In the third tier, six interconnected barriers have mutual effects. These barriers include a lack
of skilled workforce, data security and privacy, technological infrastructure, scalability chal-
lenges, cultural and ethical considerations, data integration and management, and extreme
environments. Conversely, components categorized as low levels, namely Levels 4 and 5, can
influence the other factors more. The IoT adoption barriers in Level 4 are cold chain networks
and Level 5 is regulatory compliance. These factors serve as foundational elements in a broader
network of relationships.
The analysis of barriers identifies regulatory compliance as an important factor that hinders
the implementation of the IoT. The implementation of government regulations that promote
the adoption of IoT will result in a significant transformation of the supply chain system. Infra-
structure, environmental factors, a trained workforce, cultural-ethical considerations, scalabil-
ity, and other factors influence the cold chain network. Most of the supply chain stages are
apprehensive about implementing IoT, as is typical with every new technology. An efficient
technological infrastructure is necessary for the successful deployment of the IoT across supply
chains, which involves a vast network of linked devices and systems. Adoption of the IoT
depends on this infrastructure, which allows integration, data transfer, and communication
among components in the supply chain ecosystem. Industries may face challenges with
scalability and performance if the infrastructure is insufficient for the IoT. To oversee such a
vast and complex system, experts with the necessary level of expertise are required. Reducing
the challenges associated with IoT adoption requires secure network cloud data. Preventing
spyware and attacks is crucial since the number of connected devices and sensitive data is
growing. As the nature of threats evolves, more sophisticated security measures and solutions
designed for IoT systems may be required. A massive investment is necessary to hire experts,
educate current employees, and build infrastructure. Industries are hesitant to implement IoT
due to concerns about the potential lack of return on investment. In order to feel certain about
the ROI, small companies need to be presented with a handful of positive examples.
According to the MICMAC analysis, independent barriers are cold chain networks and reg-
ulatory compliance; dependent barriers are ROI uncertainty and high implementation costs.
The other seven were linkage barriers, and no autonomous barriers existed. Among the many
types of barriers, linkage and independent barriers exhibit significant driving forces, making
them crucial barriers.
The interdependence of the barriers is depicted in the interrelationship map. Regulatory
compliance, lack of skilled workforce, data security and privacy, technological infrastructure,
scalability challenges, cultural and ethical considerations, data integration and management
issues, extreme environment issues, and cold chain networks are in the cause group. High
implementation cost, acceptance and adoption, reliability issues, and ROI uncertainty are in
the effect group. Regulatory compliance and cold chain networks were identified as the most
important causes, with respective values of 1.8719 and 1.2308. These two barriers drive more
in a larger context; thus, improving performance may promote system development. Reliabil-
ity issues, acceptance and adoption, and high implementation costs are the most important
effects influenced by other barriers. These effects were quantified with values of -1.7808,
-1.4118, and -94707, respectively. According to the final ranking of attributes, the most impor-
tant criteria are technological infrastructure, data security and privacy, and data integration
and management. The criterion for extreme environments is of the least importance.
To overcome the barriers associated with data integration and management, it is essential
to implement standardized software that enables communication between devices on the same
system. Priority should be given to privacy and security during IoT implementation, and it is
difficult to develop and investigate a gateway that connects devices using multiple protocols.
Faculty and industry must collaborate to resolve this challenge. Significant investment and
research are needed for solving security and data integration challenges at the ground level.
barriers and their effect on CSC. ISM provides hierarchical linkages, but the impact of IoTBs
on each other has not been quantified. The DEMATEL method was employed to identify the
most crucial IoTBs and overcome the limitations of ISM, which prioritizes the interactions
between the selected barriers more than ISM. According to the research results, there are two
primary factors that practitioners in CSCs should focus on regulatory compliance and cold
chain networks, which serve as a catalyst for advancement by focusing on the barriers hinder-
ing development. With MICMAC’s element classification based on driving and dependence
powers, the interconnections inside a complicated system may be fully understood, and deci-
sions can be made more effectively. According to the DEMATEL attribute ranking, the three
most important factors preventing the widespread adoption of the IoT are data integration
and management (DIM), technological infrastructure (TI), and data security and privacy
(DSP). While these barriers do pose a serious threat to the system, it is vital to remember that
they could not be the main causes influencing the dependability and efficiency of IoT deploy-
ment as a whole. Regardless of whether they are not the most crucial barriers discovered by
DEMATEL analysis, practitioners aiming for long-term viability in IoT deployment should
prioritize resolving the most important causes. Challenges with regulatory compliance and
cold chain networks are likely to be among these root reasons, as are other essentials for the
successful implementation of IoT. The long-term success and stability of IoT deployments
may be assured if practitioners concentrate on fixing these underlying issues. On the other
hand, where there is a need for rapid or immediate improvement to enhance IoT implementa-
tion, it can be practical to tackle the most important obstacles found by DEMATEL first.
Although these obstacles may not solve the root problems, they may improve some parts of the
IoT deployment, which can lead to rapid success and show stakeholders how beneficial the
technology could be. The efficient implementation of IoT in CSC depends on government
rules and a strong cold chain structure. Government engagement may solve data privacy, secu-
rity, integration, and reliability issues, boosting industry confidence and IoT adoption. Secur-
ing and tackling these barriers properly leads to higher reliability in the IoT implementation.
The total system becomes more expensive due to the scalability issues and harsh environmen-
tal issues. The most important thing to remember is that the long-term advantages will be
worth it, even if the initial investment in the IoT is expensive. It will increase the acceptance
and adoption of the IoT implementation in CSC.
Practitioners must pay special attention to the highlighted barriers to the adoption of IoT.
Hence, this study highlights the present barriers and provides the groundwork for future
developments that might revolutionize the use of the IoT in cold SC. Although our research
has shed light on significant insights into IoT implementation barriers within CSCs, it is
imperative to acknowledge certain limitations and outline avenues for future exploration. Our
primary constraint lies in the indirect nature of our investigation as we could not directly
observe industry-specific barriers. Instead, we thoroughly examined existing IoT studies on
CSCs. Another limitation of this research is the lack of digital archives, such as Scopus and the
ACM Digital Library, in the systematic literature review. However, we selected respectable sci-
entific archives, such as IEEE Xplore, Springer, Elsevier, Taylor & Francis, Wiley Online
Library, ResearchGate, and Science Direct. These repositories provide high-quality research.
The references of selected publications were traced using all relevant studies using the back-
ward snowballing method. Identifying thirteen major IoT implementation barriers is the foun-
dation, but it is essential to recognize that additional barriers may surface during real-world
implementation. To mitigate potential bias, we sought input from thirty experts. However, the
evaluation by these topic experts introduced a degree of subjectivity to our study’s final conclu-
sions. Enhancing the robustness of our findings involves soliciting inputs from an extensive
array of industry firms. Increased participation would validate our identified barriers and
enrich the diversity of perspectives, thereby improving the overall quality of our study. Fur-
thermore, our study’s focus on CSC prompts the need for broader investigations into other
sectors, such as the food supply chain, agriculture, and perishable goods. Conducting addi-
tional research in these areas will provide a more comprehensive contextual understanding
and allow for the generalization of our findings beyond the specific case at hand. Additionally,
alternative methods should be explored to test the hypotheses regarding the interrelationships
among IoT barriers. Although our research has made valuable contributions, addressing these
limitations and pursuing future avenues of exploration will undoubtedly refine and extend the
scope of our understanding of IoT implementation challenges in various industries.
Supporting information
S1 Data.
(XLSX)
Author Contributions
Conceptualization: Kazrin Ahmad.
Formal analysis: Md. Saiful Islam.
Investigation: Md. Saiful Islam.
Methodology: Md. Abrar Jahin.
Resources: Md. Abrar Jahin.
Supervision: M. F. Mridha.
Validation: M. F. Mridha.
Writing – original draft: Kazrin Ahmad.
Writing – review & editing: Md. Abrar Jahin.
References
1. Rejeb A, Keogh JG, Treiblmaier H. Leveraging the internet of things and blockchain technology in sup-
ply chain management. Future Internet. 2019; 11(7):161. https://doi.org/10.3390/fi11070161
2. Khan AU, Ali Y. Sustainable supplier selection for the cold supply chain (CSC) in the context of a devel-
oping country. Environment, development and sustainability. 2021; p. 1–30.
3. Li L. Managing supply chain and logistics: Competitive strategy for a sustainable future. World Scientific
Publishing Company; 2014.
4. Tan MII, Desa MI, et al. Logistics and information technology: Previous research and future research
expension. In: 2010 The 2nd International Conference on Computer and Automation Engineering
(ICCAE). vol. 5. IEEE; 2010. p. 242–246.
5. Ben-Daya M, Hassini E, Bahroun Z. Internet of things and supply chain management: a literature
review. International journal of production research. 2019; 57(15-16):4719–4742. https://doi.org/10.
1080/00207543.2017.1402140
6. Frederico GF, Garza-Reyes JA, Anosike A, Kumar V. Supply Chain 4.0: concepts, maturity and
research agenda. Supply Chain Management: An International Journal. 2019; 25(2):262–282. https://
doi.org/10.1108/SCM-09-2018-0339
7. Li dX. Engineering informatics: state of the art and future trends. Frontiers of Engineering Management.
2015; 1(3):270–282.
8. Nguyen TP, Huang CL, Lin YK. Estimation of the Network Reliability for a Stochastic Cold Chain Net-
work with Multi-State Travel Time. Applied Sciences. 2023; 13(13):7897. https://doi.org/10.3390/
app13137897
30. Krotov V. The Internet of Things and new business opportunities. Business Horizons. 2017; 60(6):831–
841. https://doi.org/10.1016/j.bushor.2017.07.009
31. Saleem J, Hammoudeh M, Raza U, Adebisi B, Ande R. IoT standardisation: Challenges, perspectives
and solution. In: Proceedings of the 2nd international conference on future networks and distributed sys-
tems; 2018. p. 1–9.
32. Ben-Daya M, Hassini E, Bahroun Z, Banimfreg BH. The role of internet of things in food supply chain
quality management: A review. Quality management journal. 2020; 28(1):17–40. https://doi.org/10.
1080/10686967.2020.1838978
33. Salomon VAP. Multi-Criteria Methods and Techniques Applied to Supply Chain Management. Rijeka:
IntechOpen; 2018. Available from: https://doi.org/10.5772/intechopen.71296.
34. Sallam K, Mohamed M, Mohamed AW. Internet of Things (IoT) in supply chain management: chal-
lenges, opportunities, and best practices. Sustainable Machine Intelligence Journal. 2023; 2:3–1.
https://doi.org/10.61185/SMIJ.2023.22103
35. Yesodha KRK, Jagadeesan A, Logeshwaran J. IoT applications in Modern Supply Chains: Enhancing
Efficiency and Product Quality. In: 2023 IEEE 2nd International Conference on Industrial Electronics:
Developments & Applications (ICIDeA). IEEE; 2023. p. 366–371.
36. Bahl S. Role of Internet of Things (Iot) in Supply Chain Management Effectiveness: An Empirical Study.
INFORMATION TECHNOLOGY IN INDUSTRY. 2018; 6(3). https://doi.org/10.17762/itii.v6i3.824
37. Kamble SS, Gunasekaran A, Parekh H, Joshi S. Modeling the internet of things adoption barriers in
food retail supply chains. Journal of Retailing and Consumer Services. 2019; 48:154–168. https://doi.
org/10.1016/j.jretconser.2019.02.020
38. Shashi M. Digitalization of pharmaceutical cold chain systems using IoT digital enabler. Int J Eng Adv
Technol. 2022; 11:133–137. https://doi.org/10.35940/ijeat.E3622.0611522
39. Badia-Melis R, Mc Carthy U, Ruiz-Garcia L, Garcia-Hierro J, Villalba JR. New trends in cold chain moni-
toring applications-A review. Food Control. 2018; 86:170–182. https://doi.org/10.1016/j.foodcont.2017.
11.022
40. Gupta VK, Chaudhuri A, Tiwari MK. Modeling for deployment of digital technologies in the cold chain.
IFAC-PapersOnLine. 2019; 52(13):1192–1197. https://doi.org/10.1016/j.ifacol.2019.11.360
41. Umamaheswari K, Susneha M, Kala BS. IoT based smart cold storage system for efficient stock man-
agement. In: 2020 International Conference on Communication and Signal Processing (ICCSP). IEEE;
2020. p. 0051–0055.
42. Luo H, Zhu M, Ye S, Hou H, Chen Y, Bulysheva L. An intelligent tracking system based on internet of
things for the cold chain. Internet Research. 2016; 26(2):435–445. https://doi.org/10.1108/IntR-11-
2014-0294
43. Afreen H, Bajwa IS. An IoT-based real-time intelligent monitoring and notification system of cold stor-
age. IEEE Access. 2021; 9:38236–38253. https://doi.org/10.1109/ACCESS.2021.3056672
44. Goodarzian F, Navaei A, Ehsani B, Ghasemi P, Muñuzuri J. Designing an integrated responsive-green-
cold vaccine supply chain network using Internet-of-Things: artificial intelligence-based solutions.
Annals of Operations Research. 2023; 328(1):531–575. https://doi.org/10.1007/s10479-022-04713-4
45. Zhang N, Liu Y. NB-IOT drives intelligent cold chain for best application. In: 2019 IEEE 9th international
conference on electronics information and emergency communication (ICEIEC). IEEE; 2019. p. 1–4.
46. Çeken C, Abdurahman D. Simulation modeling of an iot based cold chain logistics management sys-
tem. Sakarya University Journal of Computer and Information Sciences. 2019; 2(2):89–100. https://doi.
org/10.35377/saucis.02.02.598963
47. Hernández A, Yamaura M. Cold chain management with Internet of Things (IoT) enabled solutions for
pharmaceutical industry. Malaysia Institute for Supply Chain Innovation. 2017; p. 1–6.
48. Atyam NR, Ponmurugan P, Senthamil LS, Augustine PJ, Govindarajan A, et al. Integrated Internet of
Things with Blockchains for Vendor-Management Inventory System. In: 2022 6th International Confer-
ence on Computing Methodologies and Communication (ICCMC). IEEE; 2022. p. 86–99.
49. Kumar N, Tyagi M, Sachdeva A. Visualization and analysis of key performance indicators for agricul-
tural cold supply chain in Indian context using fuzzy DEMATEL approach. Journal of Agribusiness in
Developing and Emerging Economies. 2023;. https://doi.org/10.1108/JADEE-10-2022-0223
50. Kumar N, Tyagi M, Sachdeva A. A sustainable framework development and assessment for enhancing
the environmental performance of cold supply chain. Management of Environmental Quality: An Inter-
national Journal. 2023; 34(4):1077–1110. https://doi.org/10.1108/MEQ-03-2022-0046
51. Zhang Y, Zhao L, Qian C. Modeling of an IoT-enabled supply chain for perishable food with two-echelon
supply hubs. Industrial Management & Data Systems. 2017; 117(9):1890–1905. https://doi.org/10.
1108/IMDS-10-2016-0456
52. Abdel-Basset M, Manogaran G, Mohamed M. Internet of Things (IoT) and its impact on supply chain: A
framework for building smart, secure and efficient systems. Future generation computer systems. 2018;
86(9):614–628. https://doi.org/10.1016/j.future.2018.04.051
53. Babagolzadeh M, Shrestha A, Abbasi B, Zhang Y, Woodhead A, Zhang A. Sustainable cold supply
chain management under demand uncertainty and carbon tax regulation. Transportation Research Part
D: Transport and Environment. 2020; 80:102245. https://doi.org/10.1016/j.trd.2020.102245
54. Stuurman K, Kamara I. IoT Standardization-The Approach in the Field of Data Protection as a Model for
Ensuring Compliance of IoT Applications? In: 2016 IEEE 4th International Conference on Future inter-
net of things and Cloud Workshops (FiCloudW). IEEE; 2016. p. 336–341.
55. Jerkins JA. Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In:
2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE; 2017.
p. 1–5.
56. Zhou W, Piramuthu S. IoT and supply chain traceability. In: Future Network Systems and Security: First
International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings 1. Springer;
2015. p. 156–165.
57. Urbano O, Perles A, Pedraza C, Rubio-Arraez S, Castelló ML, Ortola MD, et al. Cost-effective imple-
mentation of a temperature traceability system based on smart RFID tags and IoT services. Sensors.
2020; 20(4):1163. https://doi.org/10.3390/s20041163 PMID: 32093218
58. Manavalan E, Jayakrishna K. A review of Internet of Things (IoT) embedded sustainable supply chain
for industry 4.0 requirements. Computers & industrial engineering. 2019; 127:925–953. https://doi.org/
10.1016/j.cie.2018.11.030
59. Madanayake U, Seidu R, Young B. Investigating the Skills and Knowledge Requirements for IOT Imple-
mentation in Construction. In: 5th NA International Conference on Industrial Engineering and Opera-
tions Management; 2020.
60. Hussain MI. Internet of Things: challenges and research opportunities. CSI transactions on ICT. 2017;
5:87–95. https://doi.org/10.1007/s40012-016-0136-6
61. Seet PS, Jones J, Klarin A, Suseno Y. IoT and the Future Workforce: Potential Implications. Australian
Council of Learned Academies; 2021.
62. Zhang H, Sakurai K. Blockchain for iot-based digital supply chain: A survey. In: Advances in Internet,
Data and Web Technologies: The 8th International Conference on Emerging Internet, Data and Web
Technologies (EIDWT-2020). Springer; 2020. p. 564–573.
63. Nakamura S, Enokido T, Takizawa M. A TBOI (time-based operation interruption) protocol to prevent
late information flow in the IoT. In: International Conference on Broadband and Wireless Computing,
Communication and Applications. Springer; 2019. p. 93–104.
64. Mohsin A, Yellampalli SS. IoT based cold chain logistics monitoring. In: 2017 IEEE International Confer-
ence on Power, Control, Signals and Instrumentation Engineering (ICPCSI). IEEE; 2017. p. 1971–1974.
65. Karimi T, Azar A, Mohebban B, Ghasemi R. Developing an Internet of Things-based Intelligent Trans-
portation Technology Roadmap in the Food Cold Supply Chain. Industrial Management Journal. 2022;
14(2):195–219.
66. Raut RD, Gardas BB, Narwane VS, Narkhede BE. Improvement in the food losses in fruits and vegeta-
ble supply chain-a perspective of cold third-party logistics approach. Operations research perspectives.
2019; 6:100117. https://doi.org/10.1016/j.orp.2019.100117
67. Li G. Development of cold chain logistics transportation system based on 5G network and Internet of
things system. Microprocessors and Microsystems. 2021; 80:103565. https://doi.org/10.1016/j.micpro.
2020.103565
68. Sodhi MS, Tang CS. Supply chain management for extreme conditions: research opportunities. Journal
of Supply Chain Management. 2021; 57(1):7–16. https://doi.org/10.1111/jscm.12255
69. Kokkinos K, Exadactylos A, Vafidis D, Hatziioannou M. Efficient traceability of aquatic products on the
cold supply chain management via IoT and artificial neural networks. In: Proceedings of the 3rd Interna-
tional Congress on Applied Ichthyology & Aquatic Environment, Volos, Greece; 2018. p. 8–11.
70. Gillespie J, da Costa TP, Cama-Moncunill X, Cadden T, Condell J, Cowderoy T, et al. Real-Time Anom-
aly Detection in Cold Chain Transportation Using IoT Technology. Sustainability. 2023; 15(3):2255.
https://doi.org/10.3390/su15032255
71. Sarkar S, Akshatha K, Saurabh A, Samanvitha B, Sarwar MF. IoT Enabled Cold Supply Chain Monitor-
ing System. In: 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT). IEEE;
2022. p. 1–6.
72. Tsang Y, Choy K, Wu CH, Ho G, Lam H, Koo P. An IoT-based cargo monitoring system for enhancing
operational effectiveness under a cold chain environment. International Journal of Engineering Busi-
ness Management. 2017; 9:1847979017749063. https://doi.org/10.1177/1847979017749063
73. Soh ZHC, Zamri LBM, Sulaiman SN, CheAbdullah SA, Yahaya SZ, Ibrahim MN. Cold Chain Manage-
ment System via Low Power Wide Area Network and IoT. In: 2021 6th IEEE International Conference
on Recent Advances and Innovations in Engineering (ICRAIE). vol. 6. IEEE; 2021. p. 1–6.
74. Zhang P, Liu X, Li W, Yu X. Pharmaceutical cold chain management based on blockchain and deep
learning. Journal of Internet Technology. 2021; 22(7):1531–1542. https://doi.org/10.53106/
160792642021122207007
75. Wanganoo L, Shukla VK, Panda BP. NB-IoT Powered Last-Mile Delivery Framework for Cold Supply
Chain. In: Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020.
Springer; 2021. p. 257–268.
76. Raut RD, Narkhede B, Gardas BB. To identify the critical success factors of sustainable supply chain
management practices in the context of oil and gas industries: ISM approach. Renewable and Sustain-
able Energy Reviews. 2017; 68:33–47. https://doi.org/10.1016/j.rser.2016.09.067
77. Manoharan S, Pulimi VSK, Kabir G, Ali SM. Contextual relationships among drivers and barriers to cir-
cular economy: An integrated ISM and DEMATEL approach. Sustainable Operations and Computers.
2022; 3:43–53. https://doi.org/10.1016/j.susoc.2021.09.003
78. Gokarn S, Choudhary A. Modeling the key factors influencing the reduction of food loss and waste in
fresh produce supply chains. Journal of environmental management. 2021; 294:113063. https://doi.org/
10.1016/j.jenvman.2021.113063 PMID: 34139647
79. Singh R, Bhanot N. An integrated DEMATEL-MMDE-ISM based approach for analysing the barriers of
IoT implementation in the manufacturing industry. International Journal of Production Research. 2020;
58(8):2454–2476. https://doi.org/10.1080/00207543.2019.1675915
80. Cui Y, Liu W, Rani P, Alrasheedi M. Internet of Things (IoT) adoption barriers for the circular economy
using Pythagorean fuzzy SWARA-CoCoSo decision-making approach in the manufacturing sector.
Technological Forecasting and Social Change. 2021; 171:120951. https://doi.org/10.1016/j.techfore.
2021.120951
81. Abkenar ZA, Lajimi HF, Hamedi M, Parkouhi SV. Determining the importance of barriers to IoT imple-
mentation using bayesian best-worst method. In: Advances in Best-Worst Method: Proceedings of the
Second International Workshop on Best-Worst Method (BWM2021). Springer; 2022. p. 144–159.
82. Kumar A, Dixit G. An analysis of barriers affecting the implementation of e-waste management practices
in India: A novel ISM-DEMATEL approach. Sustainable Production and Consumption. 2018; 14:36–52.
https://doi.org/10.1016/j.spc.2018.01.002
83. Meng B, Lu N, Lin C, Zhang Y, Si Q, Zhang J. Study on the influencing factors of the flight crew’s TSA
based on DEMATEL–ISM method. Cognition, Technology & Work. 2022; p. 1–15.
84. Song W, Zhu Y, Zhao Q. Analyzing barriers for adopting sustainable online consumption: A rough hier-
archical DEMATEL method. Computers & Industrial Engineering. 2020; 140:106279. https://doi.org/10.
1016/j.cie.2020.106279
85. Chauhan A, Singh A, Jharkharia S. An interpretive structural modeling (ISM) and decision-making trail
and evaluation laboratory (DEMATEL) method approach for the analysis of barriers of waste recycling
in India. Journal of the Air & Waste Management Association. 2018; 68(2):100–110. https://doi.org/10.
1080/10962247.2016.1249441 PMID: 28278038
86. Bonett DG, Wright TA. Cronbach’s alpha reliability: Interval estimation, hypothesis testing, and sample
size planning. Journal of organizational behavior. 2015; 36(1):3–15. https://doi.org/10.1002/job.1960
87. Dewangan DK, Agrawal R, Sharma V. Enablers for competitiveness of Indian manufacturing sector: an
ISM-fuzzy MICMAC analysis. Procedia-Social and Behavioral Sciences. 2015; 189:416–432. https://
doi.org/10.1016/j.sbspro.2015.03.200
88. Sindhwani R, Malhotra V. Modelling and analysis of agile manufacturing system by ISM and MICMAC
analysis. International Journal of System Assurance Engineering and Management. 2017; 8:253–263.
89. Si SL, You XY, Liu HC, Zhang P. DEMATEL technique: A systematic review of the state-of-the-art litera-
ture on methodologies and applications. Mathematical Problems in Engineering. 2018; 2018:1–33.
https://doi.org/10.1155/2018/3696457
90. Khan S, Singh R, Haleem A, Dsilva J, Samar Ali S. Exploration of Critical Success Factors of Logistics
4.0: A DEMATEL Approach. Logistics 2022, 6, 13; 2022.