IOT Module 4
IOT Module 4
Cost benefit analysis has been used as the main tool for economic analysis. cost
benefit analysis of RFID usage is most often based on best guesses While RFID and
other Auto-ID technologies continue to be major components of the Internet of
Things, there are other technologies, such as sensors, actuators, and networked
infrastructures that will further add to the ongoing cost discussion. The cost for
hardware, software, integration, maintenance, business process reengineering
and data analysis are major hurdles in the process of deploying the Internet of
Things. Costs and benefits are not always balanced between all stakeholders. For
RFID adoption across supply chains, cost benefit sharing has been suggested to
solve this issue.
There are several problematic aspects in cost benefit analysis and sharing:
• It is difficult to identify, measure and analyse all costs and benefits associated
with an Internet of Things
• Cost benefit sharing models do not scale, as they are subject to bi-directional
negotiations
The first cost level in the Internet of Things includes mobile devices that are linked
to physical objects. These can be RFID tags fixed to a product, as well as sensors,
actuators (e.g., signal lights, power switches) or smart devices that combine
multiple technologies. The price of RFID tags has been an important issue.
Consequently, the price for the tags should always be compared to the benefit it
generates. However, if RFID is compared with other IT-investments, one has to
bear in mind the reoccurring costs for tags. When we consider the integration of
sensors, actuators and smart devices in the Internet of Things there will be even
more expensive ubiquitous mobile technologies that need to be paid for.
Therefore, the costs of mobile devices and their installation on things will remain
a major topic in the cost discussion for the Internet of Things.
The second cost level includes aggregation devices and aggregation software,
such as readers, antennas, cabling, controllers and other edge hardware and
software as well as the corresponding installation costs. Hardware costs include
hardware portal frames to hold the reader and antennas. Some retailers have
used large metal housings to shield between dock doors in order to avoid false
reads. Newer installations use intelligent filtering mechanisms provided by
corresponding middleware components. The setup of the gates may require
considerable costs for hardware and installation. Controllers and middleware are
used for managing low-end hardware and abstracting these from the applications.
Sometimes the middleware is further divided into solutions interfacing with
hardware (edgeware) and the middleware interfacing with applications. In this
case, middleware may be considered to be part of the integration level.
The third cost level includes all integration costs to legacy systems, middleware
and updates of existing system. The cost for the middleware acquisition is further
increased by the necessary installation cost. Middleware can be based on
freeware. In the Internet of Things, middleware does not only link to internal
applications, but additionally allows multidirectional communication between
companies, end-users and public institutions. Costs for updating applications,
such as Enterprise Resource Planning (ERP), Supply Chain Management (SCM),
and Product Lifecycle Management (PLM) systems, need to be considered.
The fourth level includes cost for educating the project team and end-users as
well as cost of reorganisation. The necessity of training and education for
endusers is quite important, because the Internet of Things requires fundamental
knowledge about different technologies, such as Auto-ID and sensors as well as
knowledge about real-time data handling and analysis. Certain aspects of the
Internet of Things raise privacy and security concerns of workers and unions,
which may lead to a total failure of the project. Training and education help to
provide the corresponding skills and to address technology-related fears. The cost
of reorganising the business processes result from traditional management tools,
such as business process reengineering or newer approaches, like business model
innovation. As a result, further infrastructural investments may be required. It can
be estimated that the cost for the new roundabout exceeded the cost of the RFID
infrastructure. While this example shows an investment in a single process
optimisation, new business models may require extensive organisational changes.
The fifth cost level includes new internal applications, which are rolled out in a
firm to unleash the full potential of the Internet of Things. The costs include
standard software, such as PLM or SCM systems, as well as individual software
and all associated costs for installation, customisation and training. These
applications interface to the Internet of Things and provide tools for data-entry
and retrieval, analysis, planning, forecasting and more.
The sixth cost level considers the fact that an Internet of Things needs
communication and collaboration across enterprise boundaries, non-commercial
stakeholders, such as governmental institutions, and end-users. While
middleware provides some functionality in the Internet of Things for collaboration
and communication, further investments are necessary. Some suppliers,
especially in retail, have to consider an investment into an Electronic Data
Interchange (EDI-) infrastructure, as EDI represents the current state of the art.
Negotiations with partners, suppliers and customers about data requirements and
service level agreements will be necessary. For machine-to-machine
communication, detailed syntax and semantics are required. Finally, trust and
security issues need to be addressed in a networked environment.
The seventh cost level covers operating costs for maintaining, running, improving
and extending the system. The hardware and software need to be maintained and
updated regularly. Electricity costs, to operate the infrastructure, are usually quite
low in comparison with the other costs involved. However, as Green IT initiatives
are becoming more and more significant Internet of Things is no exception. Above
all, the labour involved to provide high quality product data has to be taken into
account. As these costs are difficult to calculate, they are most often omitted
from any calculations. Besides keeping the technical infrastructure alive, day to
day tasks, such as data storage and analysis as well as overall improvements and
upgrades to cope with growth, are adding up to considerable recurring costs.
There are different options to pay for the costs of RFID adoption. These differ
between implementation and operation.
One of the reasons for this could be the missing technical infrastructure to
measure and bill the corresponding usage. For operation, a usage-based
accounting did receive higher acceptance levels. While pricing based on target
agreements still was preferred, a pricing scheme based on transponder volume,
followed as second preference. It may be assumed that one of the reasons for the
reluctance to use usage-based pricing schemes, based on pay per read, process
times or data volume, may be once more the lack of an integrated technical billing
solution
• Increased inventory, shipping and data accuracy: e.g., differences between real
stock numbers and assumed stock
• Product rotation: methods of inventory control, such as First In, First Out (FIFO)
can be used more accurately to ensure efficient stock rotation e.g. in time sales
for perishable goods
• Customer service: RFID can be used to simplify checkouts and payments as well
as for promotion management
• Lower inventory: reduced stockouts and smaller buffer stocks, due to improved
inventory data
• Promotion execution: RFID and the Internet of Things may be used to obtain
better visibility for timely placements of promotional items
• After sales services: in after-sales service, RFID may be used for warranty issues,
repair and goods authentication
a. Calculation of costs
b. Evaluation of benefits
6. Controlling
The value proposition specifies what is actually delivered to the customer. This
goes beyond the product or service offered. It describes which customer need s
are satisfied and details what other quantitative (e.g., price or speed of service)
and qualitative aspects (e.g., brand, design, cost/risk reduction) contribute to the
offered value. In the Internet of Things consider raw data about physical objects
as well as any aggregated or processed information a core component of the
value proposition.
The financial perspective comprises the costs as well as the revenues. The
revenue structure depicts the sources and ways of revenue generation. Here, too,
different types of revenue streams can be distinguished: asset sale, usage fee,
subscription fee, lending / renting / leasing, licensing, brokerage fee, and
advertising The cost structure describes the most important costs (variable and
fixed) inherent to the business model. The business model can be rather value or
cost driven (cost leadership vs. differentiation strategy). Companies can use
economies of scale or economies of scope to create a successful business model.
Key partners, key activities and key resources can be referred to as the
infrastructure components. The key resources are the assets required to make the
business model work. Key resources can be physical, intellectual, human or
financial. The key activities describe the most important actions to be performed
by the company in order to create, offer and market the value proposition. These
can be producing, problem solving or developing and maintaining a platform,
respectively network. Key partners are the network of suppliers and collaboration
partners (strategic alliances, outsourcing partners, co-creation) the business
model depends on
Population model
Information cascade
A cascade then develops when people abandon their own information in favor of
inferences based on earlier people’s actions.
direct-benefit effect is different from the informational effects: here, the actions
of others are affecting your payoffs directly, rather than indirectly by changing
your information
Bayes’Rule predicts a model that cascades will form, with probability tending to 1
as the number of people goes to infinity.
the two possible states of the world as G, representing the state where the
option is a good idea, and B, representing the state where the option is a bad
idea. We suppose that each individual knows the following fact: the initial random
event that placed the world into state G or B placed it into state G with
probability p, and into state B with probability 1 − p. This will serve as the prior
probabilities of G and B; in other words, Pr[G] = p, and hence Pr[B] = 1−Pr[G] =
1−p.
i) Cascades can be wrong. If, for example, accepting the option is in fact a
bad idea but the first two people happen to get high signals, a cascade
of acceptances will start immediately, even though it is the wrong choice
for the population.
(ii) Cascades can be based on very little information. Since people ignore their
private information once a cascade starts, only the pre-cascade information
influences the behavior of the population. This means that if a cascade starts
relatively quickly in a large population, most of the private information that is
collectively available to the population (in the form of private signals to
individuals) is not being used.
(iii) Cascades are fragile. The previous point, that cascades can be based
on relatively little information, makes them easy to start; but it can also make
them easy to stop. One manifestation of this is that people who receive slightly
superior information can overturn even long-lived cascades.
Network Effects
Direct-benefit effects, also called network effects: for some kinds of decisions,
you incur an explicit benefit when you align your behavior with the behavior of
others.
Not everything is an externality — the key part is that the effect has to be
uncompensated. For example, if you drink a can of Diet Coke then there is one
less can of Diet Coke for the rest of the world to consume, so you decrease the
welfare of others by your action. But in this case, in order to drink the can of
Diet Coke you have to pay for it, and if you pay what it costs to make another
can of Diet Coke, then you have exactly compensated the rest of the world for
your action. That is, there is no uncompensated effect, and hence no
externality
Each consumer wants at most one unit of the good; each consumer has a
personal intrinsic interest in obtaining the good that can vary from one
consumer to another. When there are no network effects at work, we model a
consumer’s willingness to pay as being determined entirely by this intrinsic
interest. When there are network effects, a consumer’s willingness to pay is
determined by two things:
• the number of other people using the good — the larger the user population,
the more she is willing to pay.