Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains
Adnan Khan, Syed Hussain Murtaza, Parisa Maroufkhani, Sultan Sikandar Mirza
This study investigates how digital resilience enhances the adoption of AI and Internet of Things (IoT) practices within the supply chains of high-tech small and medium-sized enterprises (SMEs). Using survey data from 293 Chinese high-tech SMEs, the research employs partial least squares structural equation modeling to analyze the impact of these technologies on sustainable supply chain performance.
Problem
In an era of increasing global uncertainty and supply chain disruptions, businesses, especially high-tech SMEs, struggle to maintain stability and performance. There is a need to understand how digital technologies can be leveraged not just for efficiency, but to build genuine resilience that allows firms to adapt to and recover from shocks while maintaining sustainability.
Outcome
- Digital resilience is a crucial driver for the adoption of both IoT-oriented supply chain practices and AI-driven innovative practices. - The implementation of IoT and AI practices, fostered by digital resilience, significantly improves sustainable supply chain performance. - AI-driven practices were found to be particularly vital for resource optimization and predictive analytics, strongly influencing sustainability outcomes. - The effectiveness of digital resilience in promoting IoT adoption is amplified in dynamic and unpredictable market environments.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Today, we're diving into a fascinating new study titled "Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains."
Host: In simple terms, this study looks at how being digitally resilient helps smaller high-tech companies adopt AI and the Internet of Things, or IoT, in their supply chains, and what that means for their long-term sustainable performance. Here to break it all down is our analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: Thanks for having me, Anna.
Host: Alex, let's start with the big picture. We hear a lot about supply chain disruptions. What is the specific problem this study is trying to solve?
Expert: The core problem is that global uncertainty is the new normal. We’ve seen it with the pandemic, with geopolitical conflicts, and even cybersecurity threats. These events create massive shocks to supply chains.
Host: And this is especially tough on smaller companies, right?
Expert: Exactly. High-tech Small and Medium-sized Enterprises, or SMEs, often lack the resources of larger corporations. They struggle to maintain stability and performance when disruptions hit. The old "just-in-time" model, which prioritized efficiency above all, proved to be very fragile. So, the question is no longer just about being efficient; it’s about being resilient.
Host: The study uses the term "digital resilience." What does that mean in this context?
Expert: Digital resilience is a company's ability to use technology not just to operate, but to absorb shocks, adapt to disruptions, and recover quickly. It’s about building a digital foundation that is fundamentally flexible and strong.
Host: So how did the researchers go about studying this? What was their approach?
Expert: They conducted a survey with 293 high-tech SMEs in China that were already using AI and IoT technologies in their supply chains. This is important because it means they were analyzing real-world applications, not just theories. They then used advanced statistical analysis to map out the connections between digital resilience, the use of AI and IoT, and overall performance.
Host: A practical approach for a practical problem. Let's get to the results. What were the key findings?
Expert: There were a few really powerful takeaways. First, digital resilience is the critical starting point. The study found that companies with a strong foundation of digital resilience were far more successful at implementing both IoT-oriented practices, like real-time asset tracking, and innovative AI-driven practices.
Host: So, resilience comes first, then the technology adoption. And does that adoption actually make a difference?
Expert: It absolutely does. That’s the second key finding. When that resilience-driven adoption of AI and IoT happens, it significantly boosts what the study calls sustainable supply chain performance. This isn't just about profits; it means the supply chain becomes more reliable, efficient, and environmentally responsible.
Host: Was there a difference in the impact between AI and IoT?
Expert: Yes, and this was particularly interesting. While both were important, the study found that AI-driven practices were especially vital for achieving those sustainability outcomes. This is because AI excels at things like resource optimization and predictive analytics—it can help a company see a problem coming and adjust before it hits.
Host: And what about the business environment? Does that play a role?
Expert: A huge role. The final key insight was that in highly dynamic and unpredictable markets, the value of digital resilience is amplified. Specifically, it becomes even more crucial for driving the adoption of IoT. When things are chaotic, the ability to get real-time data from IoT sensors and devices becomes a massive strategic advantage.
Host: This is where it gets really crucial for our listeners. If I'm a business leader, what is the main lesson I should take from this study?
Expert: The single most important takeaway is to shift your mindset. Stop viewing digital tools as just a way to cut costs or improve efficiency. Start viewing them as the core of your company's resilience strategy. It’s not about buying software; it's about building the strategic capability to anticipate, respond, and recover from shocks.
Host: So it's about moving from a defensive posture to an offensive one?
Expert: Precisely. IoT gives you unprecedented, real-time visibility across your entire supply chain. You know where your materials are, you can monitor production, you can track shipments. Then, AI takes that firehose of data and turns it into intelligent action. It helps you make smarter, predictive decisions. The combination creates a supply chain that isn't just tough—it's intelligent.
Host: So, in today's unpredictable world, this isn't just a nice-to-have, it's a competitive necessity.
Expert: It is. In a volatile market, the ability to adapt faster than your competitors is what separates the leaders from the laggards. For an SME, leveraging AI and IoT this way can level the playing field, allowing them to be just as agile, if not more so, than much larger rivals.
Host: Fantastic insights. To summarize for our audience: Building a foundation of digital resilience is the key first step. This resilience enables the powerful adoption of AI and IoT, which in turn drives a stronger, smarter, and more sustainable supply chain. And in our fast-changing world, that capability is what truly defines success.
Host: Alex Ian Sutherland, thank you so much for your time and for making this research so accessible.
Expert: My pleasure, Anna.
Host: And thank you to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. We'll see you next time.
Digital Resilience, Internet of Things-Oriented Supply Chain Management Practices, AI-Driven Innovative Practices, Supply Chain Dynamism, Sustainable Supply Chain Performance
Rethinking Healthcare Technology Adoption: The Critical Role of Visibility & Consumption Values
Sonali Dania, Yogesh Bhatt, Paula Danskin Englis
This study explores how the visibility of digital healthcare technologies influences a consumer's intention to adopt them, using the Theory of Consumption Value (TCV) as a framework. It investigates the roles of different values (e.g., functional, social, emotional) as mediators and examines how individual traits like openness-to-change and gender moderate this relationship. The research methodology involved collecting survey data from digital healthcare users and analyzing it with structural equation modeling.
Problem
Despite the rapid growth of the digital health market, user adoption rates vary significantly, and the factors driving these differences are not fully understood. Specifically, there is limited research on how consumption values and the visibility of a technology impact adoption, along with a poor understanding of how individual traits like openness to change or gender-specific behaviors influence these decisions.
Outcome
- The visibility of digital healthcare applications significantly and positively influences a consumer's intention to adopt them. - Visibility strongly shapes user perceptions, positively impacting the technology's functional, conditional, social, and emotional value; however, it did not significantly influence epistemic value (curiosity). - The relationship between visibility and adoption is mediated by key factors: the technology's perceived usefulness, the user's perception of privacy, and their affinity for technology. - A person's innate openness to change and their gender can moderate the effect of visibility; for instance, individuals who are already open to change are less influenced by a technology's visibility.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. In a world buzzing with new health apps and wearable devices, why do some technologies take off while others flop? Today, we’re diving into a fascinating new study that offers some answers. Host: It’s titled "Rethinking Healthcare Technology Adoption: The Critical Role of Visibility & Consumption Values", and it explores how simply seeing a technology in use can dramatically influence our decision to adopt it. To help us unpack this, we have our expert analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: Alex, let's start with the big picture. The digital health market is enormous and growing fast, yet getting users to actually adopt these new tools is a real challenge for businesses. What’s the core problem this study wanted to solve? Expert: You've hit on the key issue. We have a multi-billion-dollar market, but user adoption is inconsistent. Companies are pouring money into developing incredible technology, but they're struggling to understand the final step: what makes a consumer say "yes, I'll use that"? This study argues that we've been missing a few key pieces of the puzzle. Expert: Specifically, how much does the simple "visibility" of a product—seeing friends or influencers use it—actually matter? And beyond its basic function, what other values, like social status or emotional comfort, are people looking for in their health tech? Host: So, it's about more than just having the best features. How did the researchers go about measuring something as complex as value and visibility? Expert: They took a very practical approach. The research team conducted a detailed survey with over 300 active users of digital healthcare technology in India. They asked them not just about the tools they used, but about their personal values, their perceptions of privacy, their affinity for technology, and how much they saw these products being used around them. Expert: They then used a powerful statistical method called structural equation modeling to map out the connections and find out which factors were the true drivers of adoption. It’s like creating a blueprint of the consumer’s decision-making process. Host: A blueprint of the decision. I love that. So what did this blueprint reveal? What were the key findings? Expert: The first and most striking finding was just how critical visibility is. The study found that seeing a health technology in the wild—on social media, used by friends, or in advertisements—had a significant and direct positive impact on a person's intention to adopt it. Host: That’s the power of social proof, right? If everyone else is doing it, it must be good. Expert: Exactly. But it goes deeper. Visibility didn’t just create a general sense of popularity; it actively shaped how people valued the technology. It made the tech seem more useful, more socially desirable, and even created a stronger emotional connection, or what the study calls 'technology affinity'. Host: So, seeing it makes it seem more practical and even cooler to use. Was there anything visibility *didn't* affect? Expert: Yes, and this was very interesting. It didn't significantly spark curiosity, or what the researchers call 'epistemic value'. People weren't adopting these apps just to explore them for fun. They needed to see a clear purpose, whether that was functional, social, or emotional. Novelty for its own sake wasn't enough. Host: And what about individual differences? Does visibility work on everyone the same way? Expert: Not at all. The study found that personality traits play a big role. For individuals who are naturally very open to change—your classic early adopters—visibility was far less important. They are intrinsically motivated to try new things, so they don't need the same external validation. The buzz is for the mainstream audience, not the trendsetters. Host: Alex, this is where it gets really crucial for our audience. What are the practical, bottom-line business takeaways from this study? Expert: I see four main takeaways for any leader in the tech or healthcare space. First, your most powerful marketing tool is making the *benefits* of your product visible. Go beyond ads. Focus on authentic user testimonials, case studies, and partnerships with trusted professionals who can demonstrate the product's value in a real-world context. Host: So it’s about showing, not just telling. What's the second takeaway? Expert: Second, understand that you are selling more than a function; you're selling a set of values. Is your product about the functional value of efficiency? The social value of being seen as health-conscious? Or the emotional value of feeling secure? Your marketing messages must connect with these deeper motivations. Host: That makes a lot of sense. And the third? Expert: The third is about trust. The study showed that as visibility increases, so do concerns about privacy. This was a huge factor. To succeed, companies must make their privacy and security features just as visible as their product benefits. Be transparent, be proactive, and build that trust from day one. Host: An excellent point. And the final takeaway? Expert: Finally, segment your audience. A one-size-fits-all message will fail. As we saw, early adopters don't need the same social proof as the mainstream. The study also suggests that men and women may respond differently, with marketing to women perhaps needing to focus more on reliability and security, while messages to men might emphasize innovation and ease of use. Host: Fantastic. So, to summarize: Make the benefits visible, understand the values you're selling, build trust through transparency on privacy, and tailor your message to your audience. Host: Alex, this has been incredibly insightful. Thank you for breaking down this complex research into such clear, actionable advice. Expert: My pleasure, Anna. It’s a valuable piece of work that offers a much-needed new perspective. Host: And thank you to our listeners for joining us on A.I.S. Insights — powered by Living Knowledge. We'll see you next time.
Adoption Intention, Healthcare Applications, Theory of Consumption Values, Values, Visibility
Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port
Shantanu Dey, Rajhans Mishra, Sayantan Mukherjee
This study investigates how next-generation connectivity, specifically 5G technology, can enhance both the resilience and sustainability of supply chains operating within smart ports. The researchers developed a comprehensive framework by systematically reviewing over 1,000 academic papers and conducting a detailed case study on a major smart port.
Problem
Global supply chains face constant threats from disruptions, ranging from pandemics to geopolitical events. There is a critical need to understand how modern technologies can help these supply chains not only recover from shocks (resilience) but also operate in an environmentally and socially responsible manner (sustainability), particularly at vital hubs like ports.
Outcome
- Next-generation connectivity like 5G can shape the interplay between resilience and sustainability at multiple levels, including facilities, supply chain ecosystems, and society. - 5G acts as an integrated data and technology platform that helps policymakers and practitioners justify investments in sustainability measures. - The technology is critical for supporting ecological resilience and community-centric initiatives, such as infrastructure development, asset maintenance, and stakeholder safety. - Ultimately, advanced connectivity drives a convergence where building resilience and achieving sustainability become mutually reinforcing goals.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I'm your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating new study titled "Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port". Host: It explores how advanced technologies, specifically 5G, can help our global supply chains become not just stronger, but also greener. Here to break it all down for us is our analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Thanks for having me, Anna. It’s a really timely topic. Host: Absolutely. So, let's start with the big picture. We've all felt the impact of supply chain disruptions over the last few years. What's the core problem this study is trying to solve? Expert: The core problem is that our supply chains are incredibly vulnerable. The study highlights events from the 2011 tsunami in Japan that hit the auto industry, to the massive increase in disruptions during the pandemic. Expert: For decades, the focus has been on efficiency, which often means very little buffer. But now, businesses are facing a double challenge: how to recover from these shocks, which we call resilience, while also meeting growing demands for environmental and social responsibility, which is sustainability. Host: And those two goals, resilience and sustainability, can sometimes seem at odds with each other, right? Expert: Exactly. Building resilience might mean holding extra inventory, which isn't always the most sustainable choice. This study investigates if next-generation technology can help bridge that gap, especially at critical hubs like our major ports. Host: So how did the researchers approach such a massive question? Expert: They took a two-pronged approach. First, they conducted a massive review of over a thousand existing academic studies to map out what we already know about 5G and supply chains. Expert: Then, to see how it works in the real world, they did a deep-dive case study on a major European smart port that was one of the first to deploy its own private 5G network. This gives us both a broad view and a concrete example. Host: A real-world test case is always so valuable. What were the main findings? What did they discover at this smart port? Expert: They found four really interesting things. First, 5G isn’t just a faster internet connection; it's a platform that can drive change at every level—from automating cranes at a specific facility, to coordinating the entire supply chain ecosystem, and even benefiting the surrounding society. Host: How does it benefit the wider society? Expert: That's the second key finding. The technology helps justify investments in sustainability. For example, the port deployed thousands of sensors on barges to monitor air and water quality in real-time. This data provides proof of environmental impact, making it easier to invest in cleaner operations. It helps build the business case for going green. Host: That's a powerful connection. What else? Expert: The third finding is that it directly supports what the study calls ecological resilience and community initiatives. By using augmented reality headsets, engineers could inspect and maintain railway switches and other assets remotely. This reduces travel, which cuts emissions, and improves worker safety. Host: So it's about making operations better for both the planet and the people. Expert: Precisely. And that leads to the final, and perhaps most important, finding: advanced connectivity drives a convergence. Instead of being conflicting goals, resilience and sustainability start to reinforce each other. A smarter, more efficient, and cleaner port is also a port that's better equipped to handle disruptions. Host: That's the part that I think will really capture the attention of business leaders. So, Alex, let's make this really practical. What is the key takeaway for a CEO or a supply chain manager listening right now? Expert: I think the biggest takeaway is to think beyond simple efficiency gains. This technology enables entirely new business models. The port in the study is moving toward a "port as a service" model, offering advanced, data-driven logistics services to its partners. That’s a new revenue stream. Host: And it sounds like this isn't something a company can do alone. Expert: Not at all. The case study repeatedly emphasized the critical role of the partner ecosystem. The port authority worked with telecom providers, tech companies, and logistics firms. The lesson for businesses is that you need to build these cross-industry collaborations to make it work. Host: So, if a company is considering this, where should they start? Expert: Start with a specific, high-value problem. The port didn’t just install 5G; they used it to target three specific areas: autonomous traffic management to reduce congestion, augmented reality for remote maintenance, and environmental sensing. This targeted approach delivers clear value and builds momentum for broader change. Expert: Ultimately, it allows you to build a business case that links operational improvements directly to strategic goals like ESG targets, satisfying everyone from the CFO to investors. Host: Fantastic insights, Alex. So, to sum it up: global supply chains are facing a dual challenge of resilience and sustainability. This study shows that next-generation connectivity like 5G can be a powerful platform to solve both at once, creating operations that are not only shock-proof but also green and community-focused. The key is a collaborative, problem-solving approach. Host: Alex Ian Sutherland, thank you so much for breaking down this complex topic for us. Expert: My pleasure, Anna. Host: And thanks to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. We'll see you next time.
Best Practices for Leveraging Data Analytics in Procurement
Benjamin B. M. Shao, Robert D. St. Louis, Karen Corral, Ziru Li
This study examines the procurement practices of 15 Fortune 500 companies to understand why most are not fully utilizing data analytics. Through surveys and in-depth interviews, the researchers investigated the primary challenges organizations face in advancing their analytics capabilities. Based on the findings, the paper proposes five best practices executives can follow to derive more value from data analytics in procurement.
Problem
Many large organizations are investing in data analytics to improve their procurement functions, but struggle to move beyond basic descriptive reports. This prevents them from achieving significant cost reductions, operational efficiencies, and strategic advantages. The study addresses the gap between the potential of advanced analytics and its current limited application in corporate procurement.
Outcome
- Most companies studied had not progressed beyond descriptive analytics (dashboards and visualizations). - Key challenges include inappropriate data granularity, data cleansing difficulties, reluctance to adopt advanced analytics, and difficulty demonstrating ROI. - Best Practice 1: Define clear taxonomies and processes for capturing high-quality procurement data. - Best Practice 2: Hire people with the right mix of technical and business skills and provide them with proper analytics tools. - Best Practice 3: Establish a clear vision for how data analytics will add value and create a competitive advantage. - Best Practice 4: Frame requests to analytics teams as business problems to be solved, not just data to be pulled. - Best Practice 5: Foster close collaboration between the procurement analytics team, the IT department, and the enterprise analytics team.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into a study called "Best Practices for Leveraging Data Analytics in Procurement." Host: It examines the practices of 15 Fortune 500 companies to understand why most are not fully utilizing data analytics, and it proposes five best practices executives can follow to derive more value. Host: With me is our expert analyst, Alex Ian Sutherland. Alex, welcome. Expert: Great to be here, Anna. Host: So, let's start with the big picture. Companies are investing heavily in data analytics. What's the problem this study is trying to solve? Expert: The problem is a significant gap between potential and reality. Many large organizations are stuck in first gear. They're investing in these powerful analytics engines but are only using them to generate basic descriptive reports, like dashboards showing past spending. Host: Like looking in the rearview mirror instead of at the road ahead? Expert: Precisely. The study found that nine of the fifteen companies hadn't progressed beyond this descriptive stage. They're missing out on the real strategic advantages—like predicting supply chain disruptions or optimizing costs in real-time. This prevents them from achieving significant savings and efficiencies. Host: So how did the researchers get this inside look at what's happening in these massive companies? Expert: It was a very direct approach. They conducted surveys with Chief Procurement Officers, or CPOs, from 15 different Fortune 500 companies—we’re talking major players in industries from auto manufacturing to financial services. They then followed up with in-depth interviews to really understand the day-to-day challenges. Host: And what did they find? What are these key challenges that are keeping companies stuck in that rearview-mirror mode? Expert: The challenges were surprisingly universal. The first big one was poor data quality—what the study calls inappropriate data granularity. Basically, the data being collected wasn't detailed enough to answer complex questions. Another was the sheer difficulty of cleaning and integrating data from different systems. Host: I can imagine that's a huge task. Any other roadblocks? Expert: Yes, two more that are less about technology and more about people. First, a reluctance from managers to adopt advanced analytics. They weren't comfortable with the complexity. And second, it was difficult to demonstrate a clear return on investment, or ROI, for moving to more advanced predictive or prescriptive analytics. Host: So if those are the problems, what does the study say about the solution? What are the key findings for best practices? Expert: The research laid out five clear best practices. The first two are foundational: Define clear rules, or taxonomies, for how data is captured to ensure it’s high quality from the start. And second, hire people with a blend of technical and business skills and give them the right tools. Host: That makes sense. Get your house in order first. What comes next? Expert: Next is about strategy and communication. The third practice is to establish a clear vision for how analytics will create a competitive advantage. The fourth is a game-changer: Frame requests to your analytics team as business problems to solve, not just data to pull. Host: Can you give me an example of that? That sounds crucial. Expert: Absolutely. Instead of asking your team to "pull a report on our top 20 suppliers," you ask, "how can we reduce supply chain risk from our top 20 suppliers by 15%?" It changes the entire dynamic. It turns your data analysts from report-generators into strategic problem-solvers. Host: That’s a powerful shift in perspective. And the final best practice? Expert: The fifth one is fostering close collaboration between the procurement analytics team, the central IT department, and any enterprise-wide analytics groups. You can't operate in a silo. Success requires shared knowledge, tools, and infrastructure. Host: So, Alex, this is the most important question for our listeners. Why does this matter for a business leader who might not even be in procurement? Expert: Because these principles are universal. That mindset shift from asking for data to asking for solutions applies to marketing, to sales, to HR, to any part of the business. It’s about leveraging your expert teams to solve core business challenges, not just track metrics. Expert: The study also highlights that without a clear vision and buy-in from the top, even the best data strategy will fail. It shows that driving value from data is as much about culture and communication as it is about technology. Host: So to summarize: get your data foundations right, build a team with both business and tech skills, create a clear vision, and—most importantly—empower your teams to solve business problems, not just pull reports. Host: It’s a clear roadmap for moving from simply looking at the past to actively shaping the future. Host: Alex, this has been incredibly insightful. Thank you for breaking it down for us. Expert: My pleasure, Anna. Host: And a big thank you to our listeners for tuning into A.I.S. Insights. We'll see you next time.
data analytics, procurement, best practices, supply chain management, analytics hierarchy, business intelligence, strategic sourcing
How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing
Mary C. Lacity, Remko Van Hoek
This case study examines how Walmart Canada implemented a blockchain-enabled solution, DL Freight, to overhaul its freight invoice processing system with its 70 third-party carriers. The paper details the business process reengineering and the adoption of a shared, distributed ledger to automate and streamline transactions between the companies. The goal was to create a single, trusted source of information for all parties involved in a shipment.
Problem
Before the new system, up to 70% of freight invoices were disputed, leading to significant delays and high administrative costs for both Walmart Canada and its carriers. The process of reconciling disparate records was manual, time-consuming, and could take weeks or even months, which strained carrier relationships and created substantial financial friction in the supply chain.
Outcome
- Drastically reduced disputed invoices from 70% to under 2%. - Shortened invoice finalization time from weeks or months to within 24 hours of delivery. - Achieved significant cost savings for Walmart Canada and improved cash flow and financial stability for freight carriers. - Increased transparency and trust, leading to improved relationships between Walmart and its partners. - Streamlined the process from a complex 11-step workflow to an efficient 5-step automated one.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we're diving into a fascinating case study titled "How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing." Host: It details how Walmart Canada and its 70 third-party carriers completely overhauled their freight invoicing system using a shared, blockchain-enabled platform to create a single, trusted source of information for every shipment. Host: And to help us unpack this, we have our analyst, Alex Ian Sutherland. Alex, welcome. Expert: Thanks for having me, Anna. Host: So, Alex, before we get into the high-tech solution, let's talk about the problem. What was so broken about the old system? Expert: It was a massive headache, Anna. The study highlights that up to 70% of freight invoices were disputed. Imagine that—seven out of every ten invoices caused a problem. Host: Seventy percent? That sounds incredibly inefficient. Expert: Exactly. This created huge administrative costs and long payment delays. The process of reconciling who was right and who was wrong was manual, complex, and could take weeks, sometimes months. Expert: It wasn't just about money; it was straining relationships. The study notes the situation had reached a 'breaking point', with carriers threatening to stop working with Walmart because they weren't getting paid on time. Host: So it was a financial drain and a relationship killer. A classic supply chain nightmare. Expert: Precisely. As the former CIO described it, it involved "a small army of people on both sides" just chasing down facts. Host: So Walmart Canada knew they needed a drastic change. How did they approach this? What does the study describe? Expert: They didn't just want to patch the old system. The study points out a senior executive asked a key question: ‘Instead of reducing reconciliations, can we remove them altogether?’ That reframed everything. Expert: They partnered with a technology firm, DLT Labs, to build a platform called DL Freight. The core idea was to stop creating separate invoices after delivery. Instead, they would jointly build one single, shared invoice on the blockchain while the shipment was in progress. Host: So it's like both parties are looking at the same digital document from start to finish? Expert: That's the perfect way to put it. A single source of truth, updated in near real-time with data from GPS and other IoT devices on the trucks. Host: And the results were... pretty impressive, from what the study found. Expert: Impressive is an understatement. The study reported that disputed invoices dropped from that 70% figure down to under 2%. Host: Wow. From 70 percent to less than two. What did that do for the payment timeline? Expert: It completely changed the game. Invoice finalization went from taking weeks or even months to happening within 24 hours of delivery. This meant carriers got paid on time, dramatically improving their cash flow and financial stability. Host: And the process itself must have gotten simpler. Expert: Absolutely. The study visually shows how the old, manual workflow had 11 complex steps. The new, automated process on the blockchain has just five efficient steps, eliminating all the manual checking and arguing. Expert: And just as importantly, it rebuilt trust. With full transparency, those strained relationships improved dramatically. Host: This is the key question for our listeners, Alex. It's a great story for Walmart, but what are the broader takeaways for other businesses, even those outside of logistics? Expert: The first big takeaway is that this is a prime example of blockchain solving a tangible, expensive business problem. It’s a model for any industry where multiple companies need to trust the same set of data. Expert: Think about royalty payments, insurance claims, or complex manufacturing. Anywhere you have disputes and reconciliation costs, a shared, distributed ledger could be the answer. Host: So it’s about identifying that costly friction that happens between companies. Expert: Exactly. And the study offers another critical strategic lesson: reengineer the process *before* you automate. They didn't just digitize a broken 11-step process. They re-imagined a better 5-step process and then built the technology to support it. Expert: One final point: the data becomes a new strategic asset. The study notes that Walmart is now using the trusted, real-time data to run predictive analytics and find new efficiencies in their business. Host: This has been incredibly insightful. So, to sum up: Walmart Canada faced a massive invoice dispute problem that was costing them money and damaging partnerships. Host: They implemented a blockchain solution, not just to speed things up, but to fundamentally reengineer the process, creating a single, trusted source of truth for themselves and their 70 carriers. Host: The results were a staggering drop in disputes, faster payments, and stronger relationships. And the key lesson for all businesses is to look for that friction between companies and consider how a shared, trusted system could eliminate it. Host: Alex Ian Sutherland, thank you so much for breaking this down for us. Expert: My pleasure, Anna. Host: And thank you for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we translate academic research into actionable business intelligence.
Blockchain, Supply Chain Management, Freight Invoice Processing, Walmart Canada, Interfirm Processes, Process Automation, Digital Transformation
How an Incumbent Telecoms Operator Became an IoT Ecosystem Orchestrator
Christian Marheine, Christian Engel, Andrea Back
This paper presents a case study on how a large, established European telecommunications company, referred to as "TelcoCorp," successfully transitioned into a central role in the Internet of Things (IoT) market. It analyzes the company's journey and strategic decisions in developing its IoT platform and managing a network of partners. The study provides actionable recommendations for other established companies looking to make a similar shift.
Problem
Established companies often struggle to adapt their traditional business models to compete in the fast-growing Internet of Things (IoT) landscape, which is dominated by digital platform models. These incumbents face significant challenges in building the right technology, creating a collaborative ecosystem of partners, and co-creating new value for customers. This study addresses the lack of clear guidance on how such companies can overcome these hurdles to become successful IoT leaders or "orchestrators."
Outcome
- Established firms can successfully enter the IoT market by acting as an 'ecosystem orchestrator' that manages a network of customers and third-party technology providers. - A key strategy is to license an existing IoT platform (a 'white-label' approach) rather than building one from scratch, which shortens time-to-market and reduces upfront investment. - To solve the 'chicken-and-egg' problem of attracting users and developers, incumbents should first leverage their existing customer base to create demand for IoT solutions. - Successfully moving from a simple technology provider to an orchestrator requires actively coordinating projects, co-financing promising use cases, and establishing clear governance rules for partners. - A hybrid growth strategy that balances creating custom, industry-specific solutions with developing scalable, generic components proves most effective for long-term growth.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I'm your host, Anna Ivy Summers. Host: In today's fast-paced digital world, many established companies are trying to pivot into new arenas like the Internet of Things, or IoT. But it's a difficult transition. Host: We're going to explore a study that provides a roadmap for success, titled "How an Incumbent Telecoms Operator Became an IoT Ecosystem Orchestrator." It's a fantastic case study on how a large telecoms company successfully moved into the IoT space. Host: And to help us break it down, we have our expert analyst, Alex Ian Sutherland. Welcome, Alex. Expert: Great to be here, Anna. Host: So, Alex, let's start with the big picture. Why is this such a challenge for established companies? They have resources, customers... why do they struggle with something like IoT? Expert: It's a great question. The study points out that the IoT landscape is dominated by a different business model—the digital platform. Think Google or Amazon. Established firms are often built to sell products or services in a linear way, not to manage a complex network of partners and customers. Expert: They face huge hurdles in building the right technology, creating a collaborative ecosystem, and figuring out how to co-create new value. The study even quotes an industry source saying that up to 80% of IoT projects fail, often because companies simply can't connect their devices to get the data they need. Host: Eighty percent is a staggering number. So how did the researchers in this study figure out what makes a company succeed where so many others fail? Expert: They did a deep dive. It's a case study that followed one large European company, which they call "TelcoCorp," over a five-year period, from 2015 to 2020. They interviewed executives, partners, and customers to get a complete picture of the journey. Host: A five-year journey. That must have yielded some incredible insights. What was the most important thing TelcoCorp did right? Expert: The absolute key was a shift in mindset. They decided not to be just another technology provider. Instead, they aimed to become an "ecosystem orchestrator." Host: Orchestrator. That sounds powerful, but what does it actually mean in a business context? Expert: It means they became the central hub that connects everyone. They managed the platform, brought in third-party technology providers, and worked directly with customers to develop solutions. They weren't just selling a product; they were enabling a network of companies to create value together. Host: Okay, so to be an orchestrator, you need a central platform. Did TelcoCorp spend a fortune and years building one from scratch? Expert: That's the second crucial finding. No, they didn't. They licensed an existing IoT platform from a technology provider—what's known as a "white-label" approach. This dramatically shortened their time-to-market and saved them from a massive upfront investment. Host: That’s a very pragmatic move. But a platform is useless without people using it. How did they solve that classic "chicken-and-egg" problem of attracting both users and developers? Expert: They focused on the "chickens" they already had: their massive existing base of business customers. Instead of trying to attract a new audience, they went to their current clients and showed them how IoT could solve their problems—moving them from just buying mobile connectivity to connecting all their industrial assets. This created immediate demand, which then made the platform very attractive to third-party developers and hardware partners. Host: And I imagine once you have customers and partners, the next challenge is getting them to work together effectively. Expert: Exactly. And that’s the final piece of the puzzle. TelcoCorp took an active role. They established clear rules for governance, created new roles like "ecosystem managers" to coordinate projects, and even co-financed promising but risky use cases to get them off the ground. Expert: They also used a hybrid strategy, balancing deep, custom solutions for specific industries with creating scalable, generic components that could be reused across different projects. Host: This is a fantastic roadmap. Alex, let’s get to the bottom line. For the business leaders listening, what are the key takeaways from TelcoCorp's success? Expert: I think there are three main lessons. First, you don't have to build everything yourself. Licensing a white-label platform can be a brilliant strategic shortcut that lets you focus on your customers. Expert: Second, your existing customer base is your most powerful asset. Start there. Solve their problems and use that momentum to build out your ecosystem. Expert: And finally, change your mindset. Don't think like a traditional seller. Think like an orchestrator. Your job is to create the environment, the rules, and the connections that allow your partners and customers to build the future together. Host: So the core message is to leverage your strengths, partner smartly, and shift from being a simple provider to the central orchestrator of your ecosystem. A powerful lesson for any incumbent company looking to innovate. Host: Alex, thank you so much for clarifying this for us. Expert: My pleasure, Anna. Host: And thank you to our audience for tuning in to A.I.S. Insights — powered by Living Knowledge. Join us next time as we decode another key study shaping the future of business and technology.
Internet of Things (IoT), Ecosystem Orchestrator, Telecoms Operator, Industry Incumbents, Platform Strategy, Value Co-creation, Case Study
Taking a Sociotechnical Perspective on Self-Sovereign Identity – A Systematic Literature Review
Lukas Florian Bossler, Teresa Huber, and Julia Kroenung
This study provides a comprehensive analysis of academic literature on Self-Sovereign Identity (SSI), a system that aims to give individuals control over their digital data. Through a systematic literature review, the paper identifies and categorizes the key sociotechnical challenges—both technical and social—that affect the implementation and widespread adoption of SSI. The goal is to map the current research landscape and highlight underexplored areas.
Problem
As individuals use more internet services, they lose control over their personal data, which is often managed and monetized by large tech companies. While Self-Sovereign Identity (SSI) is a promising solution to restore user control, academic research has disproportionately focused on technical aspects like security. This has created a significant knowledge gap regarding the crucial social challenges, such as user acceptance, trust, and usability, which are vital for SSI's real-world success.
Outcome
- Security and privacy are the most frequently discussed challenges in SSI literature, often linked to the use of blockchain technology. - Social factors essential for adoption, including user acceptance, trust, usability, and control, are significantly overlooked in current academic research. - Over half of the analyzed papers discuss SSI in a general sense, with a lack of focus on specific application domains like e-government, healthcare, or finance. - A potential mismatch exists between SSI's privacy needs and the inherent properties of blockchain, suggesting that alternative technologies should be explored. - The paper concludes there is a strong need for more domain-specific and design-oriented research to address the social hurdles of SSI adoption.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I'm your host, Anna Ivy Summers. Today, we're diving into the world of digital identity and asking a crucial question: who really controls your data online?
Host: We're looking at a fascinating study titled "Taking a Sociotechnical Perspective on Self-Sovereign Identity – A Systematic Literature Review". It provides a comprehensive analysis of what’s called Self-Sovereign Identity, or SSI, a system designed to put you, the individual, back in charge of your digital information.
Host: To help us unpack this, we have our expert analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: Thanks for having me, Anna.
Host: Alex, let's start with the big picture. Every time we sign up for a new app, a new service, or a new account, we're creating another little piece of our digital self that's stored on someone else's server. What's the problem with that?
Expert: The problem is exactly what you described – we've lost control. Our personal data is fragmented across countless companies, and they are the ones who manage, and often monetize, that information. Self-Sovereign Identity is proposed as the solution, a way to give us back the keys to our own digital kingdom.
Expert: But this study found a major disconnect. The academic world has been overwhelmingly focused on the technical nuts and bolts of SSI, especially things like blockchain security.
Host: And that sounds important, doesn't it? Security is key.
Expert: It absolutely is. But what the research highlights is a huge knowledge gap on the social side of the equation. Things like user acceptance, trust, and simple usability. If a system is technically perfect but people don't trust it or find it too complicated to use, it will never be widely adopted. That's the core problem this study tackles.
Host: So how did the researchers get a handle on this? What was their approach?
Expert: They conducted what’s called a systematic literature review. In simple terms, they gathered and meticulously analyzed 78 different academic studies on SSI to map out the entire research landscape. This allowed them to see what topics get all the attention and, more importantly, what critical areas are being ignored.
Host: A bird's-eye view of the research. So, what were the main findings? What did this map reveal?
Expert: It revealed a few key things. First, as we mentioned, security and privacy were by far the most discussed challenges, appearing in over 80% of the studies they reviewed. And these discussions are almost always tied to blockchain technology.
Host: Which leads to what was being missed.
Expert: Exactly. The study found that those crucial social factors we talked about—acceptance, trust, usability—are significantly underrepresented in the research. These are the elements that determine whether a technology actually succeeds in the real world.
Host: So we have the blueprints, but we're not thinking enough about the people who will live in the house.
Expert: A perfect analogy. Another major finding was that over half of the studies discuss SSI in a very general, abstract way. There's a serious lack of focus on specific industries. How would SSI actually work for a hospital, a bank, or a government agency? The research often doesn't go there.
Expert: And one last, slightly more technical point. The study suggests a potential mismatch between SSI's privacy goals and the nature of blockchain. A public blockchain is designed to be permanent and transparent, which can directly conflict with privacy regulations like GDPR's "right to be forgotten."
Host: This is incredibly insightful. Let's shift to the big "so what" for our listeners. What are the practical business takeaways from this study?
Expert: I think there are three crucial ones. First, if your business is exploring identity solutions, don't just focus on the tech. You must invest in the user experience. You need to understand if your customers will trust it and if it's easy enough for them to use. Success depends on the human factors, not just the code.
Expert: Second, context is everything. A generic, one-size-fits-all identity solution is unlikely to work. A system for verifying a patient's identity in healthcare has vastly different requirements than one for verifying age for e-commerce. Businesses need to think in terms of these specific, real-world applications.
Host: And the third takeaway?
Expert: Don't assume blockchain is a magic bullet. This study shows that while powerful, its features can sometimes be a hindrance to privacy and scalability. Businesses should critically evaluate whether it's the right tool for their specific needs or if other technologies might be a better fit.
Host: So, to summarize: Self-Sovereign Identity holds immense promise for giving us control over our digital lives. But for businesses to make it a reality, they must look beyond the technology. The focus needs to be on building user trust, ensuring usability, and designing solutions for specific, practical industry needs.
Host: Alex, this has been an incredibly clear explanation of a complex topic. Thank you for your insights.
Expert: My pleasure, Anna.
Host: And thank you to our listeners for tuning in to A.I.S. Insights, powered by Living Knowledge.
self-sovereign identity, decentralized identity, blockchain, sociotechnical challenges, digital identity, systematic literature review
“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain
Hauke Precht, Marlen Jirschitzka, and Jorge Marx Gómez
This study investigates why blockchain technology, despite its acclaimed benefits for transparency and traceability, has not been adopted in the German pig value chain. Researchers conducted eight semi-structured interviews with industry experts, analyzing the findings through the technology-organization-environment (TOE) framework to identify specific barriers to implementation.
Problem
There is a significant disconnect between the theoretical advantages of blockchain for food supply chains and its actual implementation in the real world. This study addresses the specific research gap of why the German pig industry, a major agricultural sector, is not utilizing blockchain technology, aiming to understand the practical factors that prevent its adoption.
Outcome
- Stakeholders perceive their existing technology solutions as sufficient, meeting current demands for data exchange and traceability without needing blockchain. - Trust, a key benefit of blockchain, is already well-established within the industry through long-standing business relationships, interlocking company ownership, and neutral non-profit organizations. - The vast majority of industry experts do not believe blockchain offers any significant additional benefit or value over their current systems and processes. - There is a lack of market demand for the features blockchain provides; neither industry actors nor end consumers are asking for the level of transparency or immutability it offers. - Significant practical barriers include the high investment costs required, a general lack of financial slack for new IT projects, and insufficient digital infrastructure across the value chain.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge. I'm your host, Anna Ivy Summers. Host: Today, we're exploring a fascinating case of technology hype versus real-world adoption. Host: We’re diving into a study titled, “‘We don't need it’ - Insights into Blockchain Adoption in the German Pig Value Chain.” Host: With me is our expert analyst, Alex Ian Sutherland. Alex, welcome. Expert: Thanks for having me, Anna. Host: To start, what was this study trying to figure out? Expert: It investigated a simple question: why has blockchain technology, which is so often praised for enhancing transparency and traceability in supply chains, seen virtually no adoption in the massive German pig industry? Host: So there's a real disconnect. We hear constantly about how blockchain can revolutionize food supply chains, but here we have a major industry in Europe that isn't using it. What’s the core problem the researchers were addressing? Expert: The problem is that gap between the theoretical promise of a technology and the practical reality of implementing it. Expert: The German pig value chain is a huge, complex economic sector. You would expect that technological advances would move beyond the research phase and into practice. Expert: But they haven't. The study wanted to identify the specific, real-world factors that are preventing adoption in such a significant industry. Host: How did the researchers go about finding those factors? Expert: They went directly to the source. Instead of just analyzing the technology, they analyzed the *need* for the technology. Expert: They conducted in-depth interviews with eight senior experts from across the value chain. These were decision-makers from slaughterhouses, IT providers, and quality assurance organizations. Expert: They then analyzed these conversations to map out the barriers based on technology, organization, and the wider business environment. Host: And the study’s title, "We don't need it," gives us a pretty big clue about what they found. What were the key discoveries? Expert: The title says it all. The first major finding was that industry stakeholders believe their existing technology solutions are perfectly sufficient. Expert: They already have systems for data exchange and traceability that meet current demands. From their perspective, there is no problem that requires a blockchain solution. Six of the eight experts interviewed saw no additional benefit. Host: That’s a huge point. But what about trust? We're always told that's blockchain's biggest selling point. Expert: That was the second critical finding, and it’s perhaps the most interesting one. The industry doesn't have a trust problem for blockchain to solve. Expert: Trust is already built into the very structure of the industry. They have long-standing business relationships, interlocking company ownership, and neutral, non-profit organizations that oversee quality and data. Expert: These organizational structures have created a trusted environment over decades, making a "trustless" technology like blockchain simply redundant. Host: So the problem that blockchain is famous for solving doesn't actually exist here. Were there any other barriers? Expert: Yes, very practical ones. The experts reported there is simply no market demand. No one—not their business partners, and not the end consumers—is asking for the radical level of transparency blockchain could offer. Expert: On top of that, you have the usual suspects: the high investment costs, a general lack of spare budget for new IT projects, and an insufficient digital infrastructure in some parts of the value chain. Host: Alex, this moves us to the most important question for our listeners. What does this mean for business? What are the key takeaways for leaders considering new technologies? Expert: I think there are three powerful lessons. First, don't start with the technology; start with the problem. Ask yourself, what is the specific, urgent pain point we are trying to solve? If you can't clearly define it, a new technology won't help. Host: A solution in search of a problem. A classic pitfall. What's the second lesson? Expert: Don't underestimate your existing, non-technical systems. This study showed that trust was achieved through business structure and relationships, not software. Expert: Before investing in a technical solution, business leaders should analyze how their current partnerships, contracts, and organizational models are already solving key problems. Sometimes the best system isn't digital at all. Host: A great reminder to look at the human element. And the final takeaway? Expert: Follow the demand. The researchers found no market pull for blockchain's features. If your customers and partners aren't asking for it, you have to question the business case. Expert: The crucial question for any new tech adoption should be: who wants this, and what tangible value will they get from it? If the answer is vague, the risk is high. Host: So, to summarize: the German pig industry isn't using blockchain, not because the technology failed, but because their existing systems work well, they've already built trust through their business structures, and there's no market demand for what it offers. Expert: Exactly. The final verdict from the industry was a clear and simple, “We don’t need it.” Host: A powerful lesson in looking past the hype to the practical reality. Alex Ian Sutherland, thank you for breaking this down for us. Expert: My pleasure, Anna. Host: And thanks to our audience for listening to A.I.S. Insights, powered by Living Knowledge. Join us next time for more actionable insights from the world of business and technology research.
blockchain adoption, TOE, food supply chain, German pig value chain, qualitative research, supply chain management, technology adoption barriers
How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity
Jillian K. Kwong, Keri Pearlson
This study investigates the cybersecurity challenges faced by small and medium-sized enterprise (SME) suppliers and proposes actionable strategies for large companies to help them improve. Based on interviews with executives and cybersecurity experts, the paper identifies key barriers SMEs encounter and outlines five practical actions large firms can take to strengthen their supply chain's cyber resilience.
Problem
Large companies increasingly require their smaller suppliers to meet the same stringent cybersecurity standards they do, creating a significant burden for SMEs with limited resources. This gap creates a major security vulnerability, as attackers often target less-secure SMEs as a backdoor to access the networks of larger corporations, posing a substantial third-party risk to entire supply chains.
Outcome
- SME suppliers are often unable to meet the security standards of their large partners due to four key barriers: unfriendly regulations, organizational culture clashes, variability in cybersecurity frameworks, and misalignment of business processes. - Large companies can proactively strengthen their supply chain by providing SMEs with the resources and expertise needed to understand and comply with regulations. - Creating incentives for meeting security benchmarks is more effective than penalizing suppliers for non-compliance. - Large firms should develop programs to help SMEs elevate their cybersecurity culture and align security processes with their own. - Coordinating with other large companies to standardize cybersecurity frameworks and assessment procedures can significantly reduce the compliance burden on SMEs.
Host: Welcome to A.I.S. Insights — powered by Living Knowledge. I’m your host, Anna Ivy Summers. In today's interconnected world, your company’s security is only as strong as its weakest link. And often, that link is a small or medium-sized supplier.
Host: With me today is our analyst, Alex Ian Sutherland, to discuss a recent study titled, "How Large Companies Can Help Small and Medium-Sized Enterprise Suppliers Strengthen Cybersecurity." Alex, welcome.
Expert: Thanks for having me, Anna. This is a critical topic. The study investigates the cybersecurity challenges smaller suppliers face and, more importantly, proposes actionable strategies for large companies to help them improve.
Host: So let's start with the big problem here. Why is the gap in cybersecurity between large companies and their smaller suppliers such a major risk?
Expert: It’s a massive vulnerability. Large companies demand their smaller suppliers meet the same stringent security standards they do. But for an SME with limited staff and budget, that's often an impossible task. Attackers know this. They specifically target less-secure suppliers as a backdoor into the networks of their bigger clients.
Host: Can you give us a real-world example of that?
Expert: Absolutely. The study reminds us of the infamous 2013 data breach at Target. The hackers didn't attack Target directly at first. They got in using credentials stolen from a small, third-party HVAC vendor. That single point of entry ultimately exposed the data of over 100 million customers. It’s a classic case of the supply chain being the path of least resistance.
Host: A sobering reminder. So how did the researchers in this study approach such a complex issue?
Expert: They went straight to the source. The study is based on 27 in-depth interviews with executives, cybersecurity leaders, and supply chain managers from both large corporations and small suppliers. They gathered insights from people on the front lines who deal with these challenges every single day.
Host: And what were the biggest takeaways from those conversations? What did they find are the main barriers for these smaller companies?
Expert: The study identified four key barriers. The first is what they call "unfriendly regulation." Most cybersecurity rules are designed for big companies with legal and compliance departments. SMEs often lack the expertise to even understand them.
Host: So the rules themselves are a hurdle. What’s the second barrier?
Expert: Organizational culture clashes. For an SME, the primary focus is keeping the business running and getting products out the door. Cybersecurity can feel like a costly, time-consuming distraction, so it constantly gets pushed to the back burner.
Host: That makes sense. And the other two barriers?
Expert: Framework variability and process misalignment. Imagine being a small supplier for five different large companies, and each one asks you to comply with a slightly different security framework. One interviewee described it as "trying to navigate a sea of frameworks in a rowboat, without a map or radio." It creates a huge, confusing compliance burden.
Host: That's a powerful image. It really frames this as a partnership problem, not just a technology problem. So this brings us to the most important question for our listeners: what can businesses actually *do* about it?
Expert: This is the core of the study. It moves beyond just identifying problems to proposing five concrete actions large companies can take. First, provide your SME suppliers with the resources and expertise they lack. This could be workshops, access to your legal teams, or clear guidance on how to comply with regulations.
Host: So it's about helping, not just demanding. What’s the next action?
Expert: Create positive incentives. The study found that punishing suppliers for non-compliance is far less effective than rewarding them for meeting security benchmarks. One CTO put it perfectly: suppliers need to be rewarded for their security efforts, not just punished for failure. This changes the dynamic from a chore to a shared goal.
Host: I like that reframing. What else?
Expert: The third and fourth actions are linked. Large firms should develop programs to help SMEs elevate their security culture. And, crucially, they should coordinate with other large companies to standardize security frameworks and assessments. If competitors can agree on one common questionnaire, it saves every SME countless hours of redundant work.
Host: That seems like such a common-sense solution. What's the final recommendation?
Expert: Bring cybersecurity into the procurement process from the very beginning. Too often, security is an afterthought, brought in after a deal is already signed. This leads to delays and friction. By discussing security expectations upfront, you ensure it's a foundational part of the partnership.
Host: So, to summarize, this isn't about forcing smaller suppliers to fend for themselves. It’s about large companies taking proactive steps: providing resources, offering incentives, standardizing requirements, and making security a day-one conversation.
Expert: Exactly. The study’s main message is that strengthening your supply chain's cybersecurity is an act of partnership. When you help your suppliers become more secure, you are directly helping yourself.
Host: A powerful and practical takeaway. Alex, thank you for breaking this down for us.
Expert: My pleasure, Anna.
Host: And thanks to our audience for tuning in to A.I.S. Insights. Join us next time as we continue to explore the intersection of business, technology, and living knowledge.
Cybersecurity, Supply Chain Management, Third-Party Risk, Small and Medium-Sized Enterprises (SMEs), Cyber Resilience, Vendor Risk Management
Promoting Cybersecurity Information Sharing Across the Extended Value Chain
Olga Biedova, Lakshmi Goel, Justin Zhang, Steven A. Williamson, Blake Ives
This study analyzes an alternative cybersecurity information-sharing forum centered on the extended value chain of a single company in the forest and paper products industry. The paper explores the forum's design, execution, and challenges to provide recommendations for similar company-specific collaborations. The goal is to enhance cybersecurity resilience across interconnected business partners by fostering a more trusting and relevant environment for sharing best practices.
Problem
As cyberthreats become more complex, industries with interconnected information and operational technologies (IT/OT) face significant vulnerabilities. Despite government and industry calls for greater collaboration, inter-organizational cybersecurity information sharing remains sporadic due to concerns over confidentiality, competitiveness, and lack of trust. Standard sector-based sharing initiatives can also be too broad to address the specific needs of a company and its unique value chain partners.
Outcome
- A company-led, value-chain-specific cybersecurity forum is an effective alternative to broader industry groups, fostering greater trust and more relevant discussions among business partners. - Key success factors for such a forum include inviting the right participants (security strategy leaders), establishing clear ground rules to encourage open dialogue, and using external facilitators to ensure neutrality. - The forum successfully shifted the culture from one of distrust to one of transparency and collaboration, leading participants to be more open about sharing experiences, including previous security breaches. - Participants gained valuable insights into the security maturity of their partners, leading to tangible improvements in cybersecurity practices, such as updating security playbooks, adopting new risk metrics, and enhancing third-party risk management. - The collaborative model strengthens the entire value chain, as companies learn from each other's strategies, tools, and policies to collectively improve their defense against common threats.
Host: Welcome to A.I.S. Insights, powered by Living Knowledge, where we translate complex research into actionable business strategy. I’m your host, Anna Ivy Summers.
Host: Today, we’re talking about a challenge that keeps leaders up at night: cybersecurity. We’ll be discussing a fascinating study titled "Promoting Cybersecurity Information Sharing Across the Extended Value Chain."
Host: It explores a new model for cybersecurity collaboration, one centered not on an entire industry, but on the specific value chain of a single company, aiming to build a more trusting and effective defense against cyber threats.
Host: And to help us unpack this is our analyst, Alex Ian Sutherland. Welcome, Alex.
Expert: Great to be here, Anna.
Host: Alex, we all know cybersecurity is important, but collaboration between companies has always been tricky. What’s the big problem this study is trying to solve?
Expert: The core problem is trust. As cyber threats get more complex, especially in industries that blend physical machinery with digital networks, the risks are huge. Think of manufacturing or logistics.
Expert: Government and industry groups have called for companies to share threat information, but it rarely happens. Businesses are worried about confidentiality, losing a competitive edge, or legal repercussions if they admit to a vulnerability or a breach.
Host: So everyone is guarding their own castle, even though the attackers are collaborating and sharing information freely.
Expert: Exactly. And the study points out that even when companies join traditional sector-wide sharing groups, the information can be too broad to be useful. The threats facing a specific paper company and its logistics partner are very different from the threats facing an automotive manufacturer in the same general group.
Host: So this study looked at a different model. How did the researchers approach this?
Expert: They facilitated and analyzed a real-world forum initiated by a single large company in the forest and paper products industry. This company, which the study calls 'Company A', invited its own key partners—suppliers, distributors, and customers—to form a private, focused group.
Expert: They also brought in neutral university researchers to facilitate the discussions. This was crucial. It ensured that the organizing company was seen as an equal participant, not a dominant force, which helped build a safe environment for open dialogue.
Host: A private club for cybersecurity, but with your own business partners. I can see how that would build trust. What were some of the key findings?
Expert: The biggest finding was that this model works incredibly well. It created a level of trust and relevance that broader forums just can't match. The conversations became much more transparent and collaborative.
Host: Can you give us an example of that transparency in action?
Expert: Absolutely. One of the most powerful moments was when a company that had previously suffered a major ransomware attack openly shared its story—the details of the breach, the recovery process, and the lessons learned. That kind of first-hand account is invaluable and only happens in a high-trust environment. It moved the conversation beyond theory into real, shared experience.
Host: That’s incredibly powerful. So this open dialogue actually led to concrete improvements?
Expert: Yes, that’s the critical outcome. Participants started seeing the security maturity of their partners, for better or worse. This led to tangible changes. For instance, the organizing company completely revised its cybersecurity playbook based on new risk metrics discussed in the forum. Others updated their third-party risk management and adopted new tools shared by the group.
Host: This is the most important part for our listeners, Alex. What does this all mean for business leaders, regardless of their industry? What’s the key takeaway?
Expert: The biggest takeaway is that your company’s security is only as strong as the weakest link in your value chain. You can have the best defenses in the world, but if a key supplier gets breached, your operations can grind to a halt. This model strengthens the entire ecosystem.
Host: So it’s about taking ownership of your immediate business environment, not just your own four walls.
Expert: Precisely. You don’t need to wait for a massive industry initiative. As a business leader, you can be the catalyst. This study shows that an invitation from a key business partner is very likely to be accepted. You have the power to convene your critical partners and start this conversation.
Host: What would you say is a practical first step for a leader who wants to try this?
Expert: Start by identifying your most critical partners—those you share sensitive data or network connections with. Then, frame the conversation around shared risk and mutual benefit. The goal isn't to point fingers; it's to learn from each other's strategies, policies, and tools to collectively raise your defenses against common threats.
Host: Fantastic insights, Alex. To summarize for our audience: traditional, broad cybersecurity forums often fall short due to a lack of trust and relevance. A company-led forum, focused specifically on your own business value chain, is a powerful alternative that builds trust, encourages transparency, and leads to real, tangible security improvements for everyone involved.
Host: It’s a powerful reminder that collaboration isn’t just a buzzword; it’s a strategic imperative for survival in today’s digital world.
Host: Alex Ian Sutherland, thank you so much for your time and expertise today.
Expert: My pleasure, Anna.
Host: And thanks to all of you for listening to A.I.S. Insights, powered by Living Knowledge. Join us next time as we continue to bridge the gap between academia and business.
cybersecurity, information sharing, extended value chain, supply chain security, cyber resilience, forest products industry, inter-organizational collaboration
SUPPORTING COMMUNITY FIRST RESPONDERS IN AGING IN PLACE: AN ACTION DESIGN FOR A COMMUNITY-BASED SMART ACTIVITY MONITORING SYSTEM
Carmen Leong, Carol Hsu, Nadee Goonawardene, Hwee-Pink Tan
This study details the development of a smart activity monitoring system designed to help elderly individuals live independently at home. Using a three-year action design research approach, it deployed a sensor-based system in a community setting to understand how to best support community first responders—such as neighbors and volunteers—who lack professional healthcare training.
Problem
As the global population ages, more elderly individuals wish to remain in their own homes, but this raises safety concerns like falls or medical emergencies going unnoticed. This study addresses the specific challenge of designing monitoring systems that provide remote, non-professional first responders with the right information (situational awareness) to accurately assess an emergency alert and respond effectively.
Outcome
- Technology adaptation alone is insufficient; the system design must also encourage the elderly person to adapt their behavior, such as carrying a beacon when leaving home, to ensure data accuracy. - Instead of relying on simple automated alerts, the system should provide responders with contextual information, like usual sleep times or last known activity, to support human-based assessment and reduce false alarms. - To support teams of responders, the system must integrate communication channels, allowing all actions and updates related to an alert to be logged in a single, closed-loop thread for better coordination. - Long-term activity data can be used for proactive care, helping identify subtle changes in behavior (e.g., deteriorating mobility) that may signal future health risks before an acute emergency occurs.
Host: Welcome to A.I.S. Insights, the podcast at the intersection of business and technology, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we're diving into a topic that affects millions of families worldwide: helping our elderly loved ones live safely and independently in their own homes. Host: We’ll be exploring a fascinating study titled "SUPPORTING COMMUNITY FIRST RESPONDERS IN AGING IN PLACE: AN ACTION DESIGN FOR A COMMUNITY-BASED SMART ACTIVITY MONITORING SYSTEM". Host: To help us unpack this is our analyst, Alex Ian Sutherland. Alex, welcome to the show. Expert: Thanks for having me, Anna. Host: So, Alex, this study details the development of a smart activity monitoring system. In simple terms, what's it all about? Expert: It’s about using simple, in-home sensors not just for the elderly person, but specifically to support the friends, neighbors, and volunteers—the community first responders—who check in on them. These are people with big hearts, but no formal medical training. Host: That’s a crucial distinction. Let's start with the big problem this study is trying to solve. Expert: The problem is a global one. We have an aging population, and the vast majority of seniors want to 'age in place'—to stay in their own homes. But this creates a safety concern. A fall or a sudden medical issue could go unnoticed for hours, or even days. Host: That’s a terrifying thought for any family. Expert: Exactly. The challenge this study tackles is how to give those community responders the right information, at the right time, so they can effectively help without being overwhelmed. The initial systems they looked at had major issues. Host: What kind of issues? Expert: Three big ones. First, unreliable data. A sensor might be in the wrong place and miss activity. Second, a massive number of false alarms. An alert would be triggered if someone was just napping or sitting quietly, leading to what we call 'alarm fatigue'. Host: And the third? Expert: Fragmented communication. A responder might get an SMS alert, then have to jump over to a WhatsApp group to discuss it with other volunteers. It was confusing and inefficient, especially in an emergency. Host: So how did the researchers approach such a complex, human-centered problem? Expert: They used a method called action design research. It’s very hands-on. They didn't just design a system in a lab; they deployed it in a real community in Singapore for three years. Expert: They would release a version of the system, get direct feedback from the elderly residents and the volunteer responders, see what worked and what didn't, and then use that feedback to build a better version. They went through several of these iterative cycles. Host: So they were learning and adapting in the real world. What were some of the key findings that came out of this process? Expert: The first finding was a bit counterintuitive. It’s not just about adapting the technology to the person; the person also has to adapt to the technology. Host: What do you mean? Expert: Well, a door sensor is great for knowing if someone has left the house. But if the person just pops next door to a neighbor's and leaves their own door open, the system incorrectly assumes they're still home. This could lead to a false inactivity alarm later. Expert: The solution was a partnership. They introduced a small, portable beacon the resident could carry when they left home. The user’s small behavioral change made the whole system much more accurate. Host: It's a two-way street. That makes sense. What else did they find? Expert: The second major finding was that context is more valuable than just an alert. A simple message saying "Inactivity Detected" is stressful and not very helpful. Expert: So they redesigned the alerts to include context. For example, an alert might say: "Inactivity alert for Mrs. Tan. Last activity was in the bedroom at 10:15 PM. Her usual sleep time is 10 PM to 7 AM." Host: Ah, so the responder can make a much more informed judgment call. It's likely she's just asleep, not in distress. Expert: Precisely. It empowers human decision-making and dramatically cuts down on false alarms. Host: And you mentioned these responders often work in teams. How did the system evolve to support them? Expert: This was the third key finding: the need for integrated, closed-loop communication. They moved all communication into a single platform where each alert automatically created its own dedicated conversation thread. Expert: Everyone on the team could see the alert, see who claimed it, and follow all the updates in one place. Once the situation was resolved, the thread was closed. It made coordination seamless. Host: It sounds like they also uncovered an opportunity beyond just reacting to emergencies. Expert: They did. The final insight was about shifting from reactive to proactive care. Over months, the system collects a lot of data on daily routines. By visualizing this data, responders could spot subtle changes. Expert: For example, a gradual decrease in movement or more frequent nighttime trips to the bathroom could be early indicators of a developing health issue. This allows for proactive intervention before an acute emergency ever occurs. Host: This is incredibly insightful. So, Alex, let's get to the bottom line. Why does this matter for businesses, especially those in the tech or healthcare space? Expert: There are a few critical takeaways. First is the principle of human-centric design. For any IoT or health-tech product, you have to design for the entire system—the device, the user, and their social environment. User adaptation should be seen as a feature to be designed for, not a bug. Host: So it's about the whole experience, not just the gadget. Expert: Right. Second, data is for insight, not just alarms. The business value isn't in creating the loudest alarm; it's in providing rich, contextual information that augments human intelligence. Help your user make a better decision. Host: What about the business model itself? Expert: This study points towards a "Care-as-a-Service" model. It's not just about selling sensors. It's about providing a platform that enables an ecosystem of care, connecting individuals, community organizations, and volunteers. There are opportunities in platform management and data analytics. Expert: And finally, the biggest opportunity is the shift to preventative health. The future of this multi-billion dollar 'aging in place' market isn’t just emergency buttons. It’s using long-term data to predict and prevent health crises before they happen. That’s the frontier. Host: Fantastic. So, to recap: true innovation in this space means creating a partnership between the user and the technology, providing context to empower human judgment, building platforms that support care teams, and using data to shift from reaction to prevention. Host: Alex, thank you so much for breaking down this complex topic into such clear, actionable insights. Expert: My pleasure, Anna. Host: And a big thank you to our audience for tuning in. Join us next time on A.I.S. Insights, powered by Living Knowledge.
Activity monitoring systems, community-based model, elderly care, situational awareness, IoT, sensor-based monitoring systems, action design research