University Research Report: IOT Impact on Business Organizations
VerifiedAdded on 2023/06/03
|16
|2172
|159
Report
AI Summary
This report investigates the impact of the Internet of Things (IOT) on business organizations. It begins with an objective to outline the data collection process, gathering information from various sources like journals and databases. The methodology includes data pre-computing, feature selection, and experiment design, utilizing both qualitative and quantitative approaches through surveys. The implementation phase details the software tools used and presents the experiment results, including demographic data and responses to survey questions. The report analyzes the results, estimating the impact of IOT on employee satisfaction, safety, and the use of sensors. The findings highlight the benefits of IOT in streamlining communication, enhancing efficiency, and connecting various aspects of business operations. The report concludes with a summary of the research, emphasizing the importance of IOT in modern business environments and providing an outline of the research process. It also includes a bibliography of cited sources.

IOT in Business Organization
Name of the Student
Name of the University
Name of the Student
Name of the University
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Objective..........................................................................................................................................3
Data Collection................................................................................................................................3
1.3 Data Storage..........................................................................................................................4
2. Design and Implementation.........................................................................................................5
2.1 Data pre-computing...............................................................................................................5
2.2 Feature selection or dimension reduction.........................................................................6
2.3 Experiment Designing.......................................................................................................7
2.4 Implementation..........................................................................................................................9
2.4.1 Software tool used..............................................................................................................9
2.4.2 Experiment results............................................................................................................10
3.1 Result Estimation.................................................................................................................12
3.2 Result Summary..............................................................................................................12
4. Outline of the research...............................................................................................................13
Objective..........................................................................................................................................3
Data Collection................................................................................................................................3
1.3 Data Storage..........................................................................................................................4
2. Design and Implementation.........................................................................................................5
2.1 Data pre-computing...............................................................................................................5
2.2 Feature selection or dimension reduction.........................................................................6
2.3 Experiment Designing.......................................................................................................7
2.4 Implementation..........................................................................................................................9
2.4.1 Software tool used..............................................................................................................9
2.4.2 Experiment results............................................................................................................10
3.1 Result Estimation.................................................................................................................12
3.2 Result Summary..............................................................................................................12
4. Outline of the research...............................................................................................................13

Objective
The goal of task is to break down information and data with legitimate outline process.
This task have assessed different journals, so as information is gathered with the assistance of
optional technique information accumulation. Information and data identified with IOT in
business organizations is gathered from different online journals, books and s from different
sources. Every one of the journals are distributed after 2012.
Data Collection
Prior to starting test investigation and results, information accumulation is an essential
advance to follow in the exploration. Along these lines, information is gathered from different
secondary sources such as journals and government databases. Following areas will help in
distinguishing different sources of information gathering identified with cloud security. We have
utilized different association as contextual analyses to gather information and data with respect
to cloud assaults and security challenges. All information and data are put into table for making
records in an appropriate way.
1.1 Data Source
Before starting the analysis, data sources have been an important part of the study. Data sources
for the research have been provided below:
Online Journals
Articles
Books
Private Companies
1.2 Collection of data
The goal of task is to break down information and data with legitimate outline process.
This task have assessed different journals, so as information is gathered with the assistance of
optional technique information accumulation. Information and data identified with IOT in
business organizations is gathered from different online journals, books and s from different
sources. Every one of the journals are distributed after 2012.
Data Collection
Prior to starting test investigation and results, information accumulation is an essential
advance to follow in the exploration. Along these lines, information is gathered from different
secondary sources such as journals and government databases. Following areas will help in
distinguishing different sources of information gathering identified with cloud security. We have
utilized different association as contextual analyses to gather information and data with respect
to cloud assaults and security challenges. All information and data are put into table for making
records in an appropriate way.
1.1 Data Source
Before starting the analysis, data sources have been an important part of the study. Data sources
for the research have been provided below:
Online Journals
Articles
Books
Private Companies
1.2 Collection of data
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

A data table has been prepared for stored and collecting data from different data sources.
Data
Sourc
e
Name
Source
Organizati
on
Data Description Data
File
Format
Charge
fee
Target data
source
Data 1 Public How many employees are
using IOT in the company?
Txt Free No
Data 2 Public How many employees have
been satisfied with the use of
IOT?
Txt Free Yes
Data 3 Public How many feel unsafe with
IOT in their business?
Txt Free Yes
Data 4 Public How many are satisfy with
solutions provided by IOT?
Txt Free Yes
Data 5 Public How many employees are
using sensors at their work?
Txt Free No
1.3 Data Storage
After creation and completion of data table, the storage of data has been an important task to
perform. The table contains all the recorded data collected from participates and other data
sources.
Data Source name Date of Saved File Saved File name Saved No. of
Data
Sourc
e
Name
Source
Organizati
on
Data Description Data
File
Format
Charge
fee
Target data
source
Data 1 Public How many employees are
using IOT in the company?
Txt Free No
Data 2 Public How many employees have
been satisfied with the use of
IOT?
Txt Free Yes
Data 3 Public How many feel unsafe with
IOT in their business?
Txt Free Yes
Data 4 Public How many are satisfy with
solutions provided by IOT?
Txt Free Yes
Data 5 Public How many employees are
using sensors at their work?
Txt Free No
1.3 Data Storage
After creation and completion of data table, the storage of data has been an important task to
perform. The table contains all the recorded data collected from participates and other data
sources.
Data Source name Date of Saved File Saved File name Saved No. of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Collection Location File
Forma
t
Data
Records
Survey from business
organization
15/8/2017 //raw data/ Survey.txt txt 2000
Survey from business
organization
20/8/2017 //raw data/ Survey.txt txt 1000
Survey from business
organization
13/3/2018 //raw data/ Survey.txt txt 738
Survey from business
organization
23/5/2018 //raw data/ Survey.txt txt 896
Survey from business
organization
5/10/2018 //raw data/ Survey.txt txt 478
2. Design and Implementation
2.1 Data pre-computing
Information pre-processing has been an imperative section in information accumulation
strategy as all information sources are not qualified for utilized in examination. Different
channels are connected for this situation for choosing proper information and data identified with
cloud security.
2.2 Feature selection or dimension reduction
Forma
t
Data
Records
Survey from business
organization
15/8/2017 //raw data/ Survey.txt txt 2000
Survey from business
organization
20/8/2017 //raw data/ Survey.txt txt 1000
Survey from business
organization
13/3/2018 //raw data/ Survey.txt txt 738
Survey from business
organization
23/5/2018 //raw data/ Survey.txt txt 896
Survey from business
organization
5/10/2018 //raw data/ Survey.txt txt 478
2. Design and Implementation
2.1 Data pre-computing
Information pre-processing has been an imperative section in information accumulation
strategy as all information sources are not qualified for utilized in examination. Different
channels are connected for this situation for choosing proper information and data identified with
cloud security.
2.2 Feature selection or dimension reduction

Date Data
Sour
ce
Nam
e
Purpos
e of
Prepro
cessi
ng
Prepro
cessi
ng
Metho
d
No.
Orig
inal
Data
Reco
rds
No.
Result
Data
Records
No.
Original
Features
No.
Result
Featur
es
New Data File
Name
20/8/
2017
Data
1
Clean
missin
g data
Data
filterin
g
1000 1000 8 8 Final_survey.t
xt
13/3/
2018
Data
2
Avoid
duplicit
y
Data
reducti
on
738 738 4 4 Final_survey.t
xt
23/5/
2018
Data
3
Feature
selecte
d
Data
integrat
ion
896 896 7 7 Final_survey.t
xt
5/10/
2018
Data
4
Filter
the
data
Data
reducti
on
400 400 2 2 Final_survey.t
xt
2.3 Experiment Designing
Analyses depended on an approach which has been purposed for research. I chose mixed
technique which include Qualitative and Quantitative methodology. I include 5 Inquiries in
survey, which are principle questions are my review.
Sour
ce
Nam
e
Purpos
e of
Prepro
cessi
ng
Prepro
cessi
ng
Metho
d
No.
Orig
inal
Data
Reco
rds
No.
Result
Data
Records
No.
Original
Features
No.
Result
Featur
es
New Data File
Name
20/8/
2017
Data
1
Clean
missin
g data
Data
filterin
g
1000 1000 8 8 Final_survey.t
xt
13/3/
2018
Data
2
Avoid
duplicit
y
Data
reducti
on
738 738 4 4 Final_survey.t
xt
23/5/
2018
Data
3
Feature
selecte
d
Data
integrat
ion
896 896 7 7 Final_survey.t
xt
5/10/
2018
Data
4
Filter
the
data
Data
reducti
on
400 400 2 2 Final_survey.t
xt
2.3 Experiment Designing
Analyses depended on an approach which has been purposed for research. I chose mixed
technique which include Qualitative and Quantitative methodology. I include 5 Inquiries in
survey, which are principle questions are my review.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Sex Male
Female
Age range 18-25
26-35
36-45
Over 45
Education High school
College Diploma
Graduation
Masters
Background Manager
IT officer
Accountant
Employee
Question no. Description
Question 1 How many employees are using IOT in the
company?
Question 2 How many employees have been satisfied
with the use of IOT?
Question 3 How many feel unsafe with IOT in their
business?
Question 4 How many are satisfy with solutions provided
Female
Age range 18-25
26-35
36-45
Over 45
Education High school
College Diploma
Graduation
Masters
Background Manager
IT officer
Accountant
Employee
Question no. Description
Question 1 How many employees are using IOT in the
company?
Question 2 How many employees have been satisfied
with the use of IOT?
Question 3 How many feel unsafe with IOT in their
business?
Question 4 How many are satisfy with solutions provided
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

by IOT?
Question 5 How many employees are using sensors at
their work?
Table 5: Survey Questionnaires
So these are demographic and primary survey questions which I made for survey to ask.
Demographic data makes it easy to design new application including background, age etc. can
add feature according to this information.
2.4 Implementation
2.4.1 Software tool used
The next step is all about implementation. After designing survey, implementing survey has been
main purpose of the researcher.
Features Responses
Sex
Male
Female
75
55
Age
18-25
26-35
36-45
45-50
Over 50
35
45
30
15
5
Question 5 How many employees are using sensors at
their work?
Table 5: Survey Questionnaires
So these are demographic and primary survey questions which I made for survey to ask.
Demographic data makes it easy to design new application including background, age etc. can
add feature according to this information.
2.4 Implementation
2.4.1 Software tool used
The next step is all about implementation. After designing survey, implementing survey has been
main purpose of the researcher.
Features Responses
Sex
Male
Female
75
55
Age
18-25
26-35
36-45
45-50
Over 50
35
45
30
15
5

Education
High school
Diploma
Commerce
Graduation
Masters
27
22
46
20
15
Background
Manager
IT officer
Accountant
Employee
40
15
35
40
High school
Diploma
Commerce
Graduation
Masters
27
22
46
20
15
Background
Manager
IT officer
Accountant
Employee
40
15
35
40
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 3 Records of Demographic Information
2.4.2 Experiment results
Orange: 18-25
Red: 26-35
Green: 36-45
Blue: 45-50
Purple: above 50
Orange: High School
Red: Diploma
Green: Graduation
Blue: Masters
Purple: above 50
Orange: satisfied
Red: Strongly satisfied
Green: Neutral
Blue: Dissatisfied
Purple: strongly
dissatisfied
2.4.2 Experiment results
Orange: 18-25
Red: 26-35
Green: 36-45
Blue: 45-50
Purple: above 50
Orange: High School
Red: Diploma
Green: Graduation
Blue: Masters
Purple: above 50
Orange: satisfied
Red: Strongly satisfied
Green: Neutral
Blue: Dissatisfied
Purple: strongly
dissatisfied
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Questions Responses
How many employees are using IOT in the
company?
107
How many employees have been satisfied
with the use of IOT?
98
How many feel unsafe with IOT in their
business?
70
How many are satisfy with solutions provided
by IOT?
66
How many employees are using sensors at
their work?
35
Figure 5: Pie chart of % responses
3 Result analysis
3.1 Result Estimation
Orange: Question 1
Red: Question 2
Green: Question 3
Blue: Question 4
Purple: Question 5
How many employees are using IOT in the
company?
107
How many employees have been satisfied
with the use of IOT?
98
How many feel unsafe with IOT in their
business?
70
How many are satisfy with solutions provided
by IOT?
66
How many employees are using sensors at
their work?
35
Figure 5: Pie chart of % responses
3 Result analysis
3.1 Result Estimation
Orange: Question 1
Red: Question 2
Green: Question 3
Blue: Question 4
Purple: Question 5

This is an idea wherein different gadgets associated shrewdly to make simple correspondence
of section of data. This can be utilized with the assistance of any gadget like savvy TVs, PDAs,
keen watches, workstations, work areas and even brilliant homes. According to the pie charts,
there have been 34.7% male and 65.3% female involved in the survey. These data shows that
female employees have been using IoT devices in the business organization. 33% employees are
satisfied with the use of the IoT in the business organization. IoT have been helping in
maintaining several duties in the organization. This framework helps in giving a remarkable
personality to the earth where the correspondence is required. This condition helps in
empowering interface of human, items and gadgets with the goal that information and data can
be moved or exchanged. In contrast to the customary network, the Internet of Things (IoT)
encourages in interfacing with a more extensive scope of gadgets alongside empowering the help
of observing of the correspondence being finished. The present discourse is to distinguish and
assess impact of IoT in business in any association. The work is organized to an exploration
work that will have an examination issue or issue pursued by recognizing the approaches to
address the equivalent. The work is fundamentally founded on writing references alongside
investigation of different s and researchers related it the theme. The IT field are benefitted by use
of the distributed computing.
The difficulties and troubles in the distributed computing are examined about in these
reports. The past looks into in cloud security are talked about in region. A drew in philosophy are
used in order to examinations composing. The aggregate of what online are really related to
distribute computing security. Unmistakable particular parts of the distributed computing are
talked about in on the web. These online have had the ability to recognize security issues in the
distributed computing. Distributed computing is a continuous thought in the IT field. The usage
of section of data. This can be utilized with the assistance of any gadget like savvy TVs, PDAs,
keen watches, workstations, work areas and even brilliant homes. According to the pie charts,
there have been 34.7% male and 65.3% female involved in the survey. These data shows that
female employees have been using IoT devices in the business organization. 33% employees are
satisfied with the use of the IoT in the business organization. IoT have been helping in
maintaining several duties in the organization. This framework helps in giving a remarkable
personality to the earth where the correspondence is required. This condition helps in
empowering interface of human, items and gadgets with the goal that information and data can
be moved or exchanged. In contrast to the customary network, the Internet of Things (IoT)
encourages in interfacing with a more extensive scope of gadgets alongside empowering the help
of observing of the correspondence being finished. The present discourse is to distinguish and
assess impact of IoT in business in any association. The work is organized to an exploration
work that will have an examination issue or issue pursued by recognizing the approaches to
address the equivalent. The work is fundamentally founded on writing references alongside
investigation of different s and researchers related it the theme. The IT field are benefitted by use
of the distributed computing.
The difficulties and troubles in the distributed computing are examined about in these
reports. The past looks into in cloud security are talked about in region. A drew in philosophy are
used in order to examinations composing. The aggregate of what online are really related to
distribute computing security. Unmistakable particular parts of the distributed computing are
talked about in on the web. These online have had the ability to recognize security issues in the
distributed computing. Distributed computing is a continuous thought in the IT field. The usage
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.