TY - JOUR AU1 - Ahmad, Kazrin AU2 - Islam, Md. Saiful AU3 - Jahin, Md. Abrar AU4 - Mridha, M. F. AB - 1 Introduction Recent developments in Internet of Things (IoT) technology have the potential to significantly change several industries via the introduction of data-driven insights, increased connectivity, and a replacement of long-established ways of doing things. The supply chain (SC) is a network of related entities that includes every procedure step, from the procurement of raw materials or components to the consummation of the finished good. Supply chains in the modern day have developed into intricate value networks and are now an important differentiator for businesses. A growing number of barriers make it harder than ever to track items and goods as they go through the value chain and confirm where they came from [1]. Cold SC (CSC) is a procedure that includes activities regulated by temperature and a specialized logistical infrastructure designed to maintain product quality and temperature consistency throughout its entire transit, beginning with the point of origin in manufacturing or procurement and ending with its eventual delivery to the final consumer [2]. Everything from preparing, storing, transporting, and monitoring temperature-sensitive goods from their providing areas to their receiving locations involves a sequence of activities in CSC. Food, flowers, medicines, and chemicals are examples of temperature-sensitive items because of their perishable nature [3]. To increase sales and profits, companies are creating a cold chain in transportation by reducing costs, reducing delivery times, improving product quality, and offering personalized goods. The Internet of Things (IoT) is a network that links physical items to the Internet and allows them to broadcast data to intelligently identify themselves and enable their location, tracking, monitoring, and management with the assistance of radio frequency identification tags, sensors, actuators, and positioning systems [4]. IoT allows previously inaccessible physical and everyday items to separately gather and share data via the use of built-in sensors and network connection. IoT emerged from networked devices, which started at MIT’s Auto-ID Center in the nineties, according to Center Director Kevin Ashton, who purportedly developed the concept of IoT at the turn of the millennium. The current concept of IoT is supported by the addition of GPS devices, smartphones, social networks, cloud computing, and data analytics to existing networks [5]. IoT plays a significant part in Industry 4.0, which encompasses a variety of innovative and revolutionary technologies, cyber-physical systems, IoT, and cloud computing [6]. It links objects, sensors, actuators, and other smart technologies, allowing immediate access to physical commodity data to support new services with high efficiency and productivity [7]. IoT deployment may boost the likelihood of reliably transferring flow from source to sink, which is the potential of the cold chain network to withstand increased rivalry among enterprises [8]. Improved operating processes, reduced risk and expense, greater visibility and transparency, and greater adaptability and flexibility across the supply chain are merely a few of the many advantages of incorporating IoT into the supply chain [9]. IoT technology may drastically boost the monitoring and control of CSCs, particularly in areas such as medication, food, and logistics where temperature-sensitive commodities are moved and preserved [10]. This study conducts an exhaustive analysis of the barriers that hinder the successful implementation of the IoT in cold supply chains. Integrated interpretive structural modeling and decision-making trial and evaluation laboratory (ISM-DEMATEL) is an extensively used technique for decision-making and analysis in complex systems. ISM is beneficial for building hierarchical links among factors and analyzing the structure of complex systems, whereas DEMATEL delivers a quantitative assessment of the intensity and direction of interactions between factors [11, 12]. Both approaches allow for a combination of qualitative and quantitative research, with DEMATEL specifically addressing the feedback loops. They are straightforward and obvious, making them easier to explain and grasp by decision-makers [13–15]. The increasing volume of international trade and consumer spending has spurred the rapid growth of supply chains for perishable commodities. The logistics for “cold chain” items, such as perishables and frozen foods, constantly evolve. Global revenue for the sector is forecasted to reach USD 277.69 billion by 2023, growing at a CAGR (cumulative aggregate gross revenue) of 7.24 percent between 2018 and 2023 [16]. A simplified and technology-enhanced logistics method for CSC IoT implementation is illustrated in Fig 1. The figure depicts IoT sensors installed across the CSC to track moisture, temperature, and other important factors, including refrigerated vehicles, warehouses, and storage facilities. The chosen parameters were controlled and monitored using a network of sensors and data-collecting microcontrollers [17]. To provide immediate insight into the state of products in transit, data collected from these sensors are wirelessly connected and relayed in real-time to a centralized system [18]. In sectors such as pharmaceuticals and food, where maintaining the proper temperature is crucial to product quality and safety, IoT devices make sure that temperature-sensitive commodities are stored and transported within a designated temperature range [19, 20]. By considering traffic, weather, and supply quality, IoT may help enhance delivery routes [21]. This guarantees that the perishable goods arrive on schedule and in the best possible shape. IoT sensors can monitor inventory levels to minimize overstocking or understocking of temperature-sensitive products, which lowers spoilage and perishable goods losses [22]. Well-organized logistics and transportation systems significantly affect product quality. Adopting a high-quality logistics system, especially for perishable items, involves frequent temperature monitoring, real-time product quality assessment, and shelf life determination [23]. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 1. IoT implementation in the cold supply chain. https://doi.org/10.1371/journal.pone.0304118.g001 The objectives of the study are to apprehend the following: To identify the dominant barriers of IoT implementation in cold supply chains. To Investigate the influential relationship among barriers using ISM and DEMATEL technique. To identify the most significant barriers and underlying causes and effects hindering the enhancement of IoT implementation. Several studies have delved into barriers within specific countries and contexts; however, these investigations are not without their limitations. Some have explored sectors unrelated to the CSC, and while certain studies have focused on IoT adoption in this context, they often fall short of establishing connections among identified barriers or evaluating their respective effects on the overall system. Moreover, the exploration of IoT implementation barriers in CSCs represents a significant gap in the literature, with no prior comprehensive studies identified in this specific domain. The lack of scholarly attention to this crucial aspect of CSC underscores the need for an in-depth investigation. Our research is a pioneering effort to bridge this gap by employing an integrated ISM-DMATEL approach. The literature gap is particularly evident in the scarcity of empirical examinations and theoretical frameworks dedicated to understanding the intricacies of IoT implementation in CSCs. The unique challenges posed by the CSC environment, characterized by stringent temperature control requirements and perishable goods logistics, warrant further exploration. To address these gaps, this study contributes to the literature in the following ways: An in-depth analysis of research on essential barriers to CSC IoT adoption, considering various perspectives, including supply chain stages, environmental effects, socio-economic scenery, and data complexity. A survey-based approach was employed to gather data and expert opinions regarding these barriers. The utilization of the ISM method to determine the interdependencies among the selected barriers. The MICMAC strategy was applied to comprehensively analyze the fundamental constructs, thereby offering valuable insights into their significance. The DEMATEL approach was used to validate causal relationships among the components within the model. Key barriers that play a fundamental role in efficiently managing the cold chain are highlighted, offering insights to overcome challenges in IoT adoption. Systematic identification and ranking of barriers based on their influence on the system addresses the current lack of comprehensive assessments in the literature. Contribution towards filling research gaps by focusing specifically on the CSC, distinguishing it from studies that extend across different sectors. Providing a structured approach to understanding and addressing the challenges associated with IoT implementation in CSC, contributing to enhanced operational efficiency and reliability. It offers valuable insights for enterprises, governments, and technology developers to navigate and overcome obstacles in integrating IoT into CSC operations. The rest of the paper is arranged as follows: “Literature review” provides a comprehensive literature review of IoT implementation in CSCs, including implementation challenges and comparable methodologies utilized in the present era; “Methodology” presents the research methodology that was used for the study; “Numerical illustration for results interpretation” covers the data analysis, along with the application of ISM-DEMATEL to the obtained barriers; “Discussions” describes the results of the implementation of ISM-DEMATEL techniques and discusses the results. Finally, the study concludes with conclusions, limitations, and recommendations for future work in “Conclusions and future works.” 2 Literature review The aim of this section is to provide a summary of how CSC procedures may use IoT. We used Google Scholar and many other publishers’ websites, including Springer, Elsevier, Emerald, and Taylor-and-Francis, to compile the literature most relevant to our study. 2.1 Internet of Things (IoT) The IoT is among the most revolutionary technological developments brought about by the digital era [24]. The Internet of Things is anticipated to become the most popular form of internet traffic in the next years, with a predicted CAGR of 40 in the commercial sector [25]. The economy, communication patterns, and technology development are all expected to be profoundly affected [26]. First invented in 1999 by Kevin Ashton and many other scholars at the Massachusetts Institute of Technology, IoT has gained broad interest because it can provide comfort, efficiency, and competitive benefits to the corporate sector [27]. The IoT is an essential idea in the coming period. Numerous smart buildings and smart houses are built using IoT technologies [28]. The IoT presents a new opportunity to reduce risks, manage complexity, and produce concrete economic benefits by increasing transparency and flexibility across the supply chain [29]. The physical components that link IoT include wireless devices such as portable computers, smartphones, wearable gadgets, RFID tags, RFID readers, and wireless sensors. Users may interact with the IoT network using a variety of devices, including cellphones, implanted RFID transponders, wirelessly connected PCs, and wearable technology [30]. The popularity and success of IoT have skyrocketed in recent years. Industry leaders, technologists, and consumers recognize the importance of IoT, which has led to an industrial revolution and automated operations in organizations and homes [31]. Human-to-thing communication and autonomous coordination among “things” is possible even when they are kept at a facility or transported from one entity in the supply chain to another. Increased supply chain visibility, responsiveness, and adaptability to a variety of SCM challenges are all made possible by IoT [5, 32]. 2.2 IoT in CSC IoT, often known as the third wave of IT, has revolutionized supply chain management (SCM) and other sectors. This helps expand the supply chain function by offering technical assistance for greater visibility, stability, and intelligent management [33, 34]. Ben-Daya et al. [5] analyzed the existing literature to learn more about the IoT and how it influences SCM. IoT has transformed supply chain management by improving efficiency, allowing predictive maintenance, and enabling real-time reactions to change circumstances, improving operational efficiency, waste reduction, and overall customer happiness [35]. Bahl [36] explores how supply chain management has been transformed by IoT technology, which offers real-time data insights, improves visibility, and allows proactive decision-making to satisfy consumer expectations in a changing marketplace and optimize operations. In addition, the majority of research has concentrated on the steps in the supply chain pertaining to food production, distribution, and processing. Kamble et al. [37] proposed an integrated ISM-DEMATEL model to identify the most significant barriers to the widespread deployment of IoT technologies in the food retail supply chain. The two most significant barriers to the widespread use of IoT were a lack of government regulation and insufficient network infrastructure. Nguyen et al. evaluated the reliability of a cold chain network by considering both flow and time factors simultaneously, with the ultimate goal of determining the network reliability for actual products. Shashi [38] revealed two primary themes: the existing cold chain system’s known or unknown limits, as well as the use of digital enablers based on the IoT. Numerous deployment strategies, constraints, and barriers in cold chain monitoring applications have been discussed [39]. Sallam et al. [34] analyzed future developments in the field of supply chain management and offers a thorough analysis of the IoT applications in this area, including problems, possibilities, and best practices. The feasibility of implementing modern technologies such as IoT to enhance cold SC was assessed by Gupta et al. [40]. To enhance service quality, the organization must invest additional funds for maintenance. Umamaheswari et al. [41] suggested smart cold storage that uses cutting-edge supply chain technology and the IoT to boost productivity and reduce wait times at all levels. Luo et al. [42] presented a smart monitoring system that stores data on defined servers to monitor cold chain items in real time while cutting costs, enhancing network capacity, and simplifying protocols. Cold chain transit is easy to track using this strategy. Afreen and Bajwa [43] implemented a system that utilizes the IoT to track and notify users of changes in cold storage conditions such as humidity, temperature, light, and gas concentration in real-time., alerting workers when these variables exceed safe thresholds. Goodarzian et al. [44] proposed a model for improving the precision, swiftness, and fairness of vaccine injection and implemented an inaugural responsive green-cold vaccine supply chain network in response to the COVID-19 pandemic. Intelligent control technology, cellular networks, wireless communication technology, temperature and humidity sensors, IoT, and database technology all come together to form a cold chain management system [45]. Ceken and Abdurahman [46] presented an IoT-based cold chain logistics system that controls and monitors the cold chain’s ambient temperature in real time and estimates perishable item shelf life to help all stakeholders make better decisions. The paper by Tsang et al. [22] presented an IoT-based risk monitoring solution to handle product quality and safety concerns in the cold chain. Using this technology, the cold chain can be monitored in real-time, and risks can be assessed to ensure the safety of workers. Hernandez and Yamaura [47] suggested that IoT-enabled devices may reduce pharmaceutical waste caused by temperature changes. It also demonstrated consistency in IoT implementation, including infrastructure, security, and device management. Owing to perishable food and cross-regional transit, cold chain systems encounter several challenges in the perishable food supply chains. Atyam et al. [48] explained the complexity and problems associated with modern supply chain management, the importance of IoT in monitoring items, and how IoT and blockchain might improve supply chain performance. Kumar et al. [49] highlighted the need of efficient cost management and waste reduction as key performance indicators and also emphasized the possibility of boosting operational efficiency and optimizing resource utilization via the integration of the IoT. IoT-enabled smart monitoring and control systems could provide long-term solutions to energy consumption and managerial reluctance in the cold supply chain [50]. This study of Zhang et al. [51] addressed these difficulties by creating a perishable food supply chain model utilizing real-time IoT data and two supply hubs to increase performance. Future cold supply networks can become more resilient and sustainable if IoT technologies are used. This advancement is expected to result in less waste and decreased operational expenses, therefore benefiting both businesses and consumers [40, 52]. 2.3 IoT implementation barriers IoT deployment is challenging because of device and data security, interoperability issues, scalability, trust, privacy concerns, financial issues, lack of qualified personnel, and compliance with data privacy laws. First, it is necessary to identify the barriers that hinder IoT implementation in CSC in order to overcome these challenges. Table 1 lists the barriers to implementing the IoT in CSC. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 1. Barriers to IoT implementation in the cold supply chain. https://doi.org/10.1371/journal.pone.0304118.t001 2.4 Methodology related literature ISM is a computer-based learning method that assists individuals or groups in creating a visual representation of intricate connections between several aspects of a complex situation. The fundamental idea is to use the practical skills and knowledge of specialists to dissect a complex system into many sub-systems and construct a multi-level structural model [11]. Raut et al. [76] employed the ISM approach to establish the interconnections among drivers, enabling a comprehensive knowledge of the relative connections among the critical success factors and defining their dependency when implementing sustainability. The DEMATEL technique has been used extensively to identify critical barriers in various vital processes, which were created to support methodical evaluations and organized decision-making processes. The effect connections map shows the relational linkages, with numbers denoting the degree of influence and arrows denoting the direction of influence. It is a comprehensive tool for assessing the interrelations between system variables and emphasizing the core-driving components [12]. Manoharan et al. [77] presented the DEMATEL model, which aids in comprehending the importance of drivers and barriers, creating matrices or digraphs to represent complex causal interactions, and identifying the relationships between these factors. The barrier analysis techniques employed in recent studies are presented in Table 2. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 2. Various barrier analysis methodologies used in recent approaches. https://doi.org/10.1371/journal.pone.0304118.t002 The literature investigation discusses every element of the CSC, covering transportation, cold storage, procurement, and occupational security across the cold chain. IoT supports SCM by enhancing visibility and stability, but problems include regulatory limitations and poor infrastructure. Most studies focus on distinct problems and seek to solve these challenges using the solutions provided. In the combined ISM-MICMAC-DEMATEL approach, ISM-MICMAC is used to construct hierarchical relationships among barriers and analyze the structure of systems, while DEMATEL delivers a numerical evaluation of the strength and direction of interactions between factors. Numerous barrier analysis strategies have been employed in modern methods, which are also used to analyze obstacles. The choice between these tactics varies depending on individual circumstances, available data, and decision-makers’ preferences. Thirteen barriers, and from the different barrier analysis techniques utilized in recent approaches, ISM-DEMATEL was chosen to analyze these barriers. 2.1 Internet of Things (IoT) The IoT is among the most revolutionary technological developments brought about by the digital era [24]. The Internet of Things is anticipated to become the most popular form of internet traffic in the next years, with a predicted CAGR of 40 in the commercial sector [25]. The economy, communication patterns, and technology development are all expected to be profoundly affected [26]. First invented in 1999 by Kevin Ashton and many other scholars at the Massachusetts Institute of Technology, IoT has gained broad interest because it can provide comfort, efficiency, and competitive benefits to the corporate sector [27]. The IoT is an essential idea in the coming period. Numerous smart buildings and smart houses are built using IoT technologies [28]. The IoT presents a new opportunity to reduce risks, manage complexity, and produce concrete economic benefits by increasing transparency and flexibility across the supply chain [29]. The physical components that link IoT include wireless devices such as portable computers, smartphones, wearable gadgets, RFID tags, RFID readers, and wireless sensors. Users may interact with the IoT network using a variety of devices, including cellphones, implanted RFID transponders, wirelessly connected PCs, and wearable technology [30]. The popularity and success of IoT have skyrocketed in recent years. Industry leaders, technologists, and consumers recognize the importance of IoT, which has led to an industrial revolution and automated operations in organizations and homes [31]. Human-to-thing communication and autonomous coordination among “things” is possible even when they are kept at a facility or transported from one entity in the supply chain to another. Increased supply chain visibility, responsiveness, and adaptability to a variety of SCM challenges are all made possible by IoT [5, 32]. 2.2 IoT in CSC IoT, often known as the third wave of IT, has revolutionized supply chain management (SCM) and other sectors. This helps expand the supply chain function by offering technical assistance for greater visibility, stability, and intelligent management [33, 34]. Ben-Daya et al. [5] analyzed the existing literature to learn more about the IoT and how it influences SCM. IoT has transformed supply chain management by improving efficiency, allowing predictive maintenance, and enabling real-time reactions to change circumstances, improving operational efficiency, waste reduction, and overall customer happiness [35]. Bahl [36] explores how supply chain management has been transformed by IoT technology, which offers real-time data insights, improves visibility, and allows proactive decision-making to satisfy consumer expectations in a changing marketplace and optimize operations. In addition, the majority of research has concentrated on the steps in the supply chain pertaining to food production, distribution, and processing. Kamble et al. [37] proposed an integrated ISM-DEMATEL model to identify the most significant barriers to the widespread deployment of IoT technologies in the food retail supply chain. The two most significant barriers to the widespread use of IoT were a lack of government regulation and insufficient network infrastructure. Nguyen et al. evaluated the reliability of a cold chain network by considering both flow and time factors simultaneously, with the ultimate goal of determining the network reliability for actual products. Shashi [38] revealed two primary themes: the existing cold chain system’s known or unknown limits, as well as the use of digital enablers based on the IoT. Numerous deployment strategies, constraints, and barriers in cold chain monitoring applications have been discussed [39]. Sallam et al. [34] analyzed future developments in the field of supply chain management and offers a thorough analysis of the IoT applications in this area, including problems, possibilities, and best practices. The feasibility of implementing modern technologies such as IoT to enhance cold SC was assessed by Gupta et al. [40]. To enhance service quality, the organization must invest additional funds for maintenance. Umamaheswari et al. [41] suggested smart cold storage that uses cutting-edge supply chain technology and the IoT to boost productivity and reduce wait times at all levels. Luo et al. [42] presented a smart monitoring system that stores data on defined servers to monitor cold chain items in real time while cutting costs, enhancing network capacity, and simplifying protocols. Cold chain transit is easy to track using this strategy. Afreen and Bajwa [43] implemented a system that utilizes the IoT to track and notify users of changes in cold storage conditions such as humidity, temperature, light, and gas concentration in real-time., alerting workers when these variables exceed safe thresholds. Goodarzian et al. [44] proposed a model for improving the precision, swiftness, and fairness of vaccine injection and implemented an inaugural responsive green-cold vaccine supply chain network in response to the COVID-19 pandemic. Intelligent control technology, cellular networks, wireless communication technology, temperature and humidity sensors, IoT, and database technology all come together to form a cold chain management system [45]. Ceken and Abdurahman [46] presented an IoT-based cold chain logistics system that controls and monitors the cold chain’s ambient temperature in real time and estimates perishable item shelf life to help all stakeholders make better decisions. The paper by Tsang et al. [22] presented an IoT-based risk monitoring solution to handle product quality and safety concerns in the cold chain. Using this technology, the cold chain can be monitored in real-time, and risks can be assessed to ensure the safety of workers. Hernandez and Yamaura [47] suggested that IoT-enabled devices may reduce pharmaceutical waste caused by temperature changes. It also demonstrated consistency in IoT implementation, including infrastructure, security, and device management. Owing to perishable food and cross-regional transit, cold chain systems encounter several challenges in the perishable food supply chains. Atyam et al. [48] explained the complexity and problems associated with modern supply chain management, the importance of IoT in monitoring items, and how IoT and blockchain might improve supply chain performance. Kumar et al. [49] highlighted the need of efficient cost management and waste reduction as key performance indicators and also emphasized the possibility of boosting operational efficiency and optimizing resource utilization via the integration of the IoT. IoT-enabled smart monitoring and control systems could provide long-term solutions to energy consumption and managerial reluctance in the cold supply chain [50]. This study of Zhang et al. [51] addressed these difficulties by creating a perishable food supply chain model utilizing real-time IoT data and two supply hubs to increase performance. Future cold supply networks can become more resilient and sustainable if IoT technologies are used. This advancement is expected to result in less waste and decreased operational expenses, therefore benefiting both businesses and consumers [40, 52]. 2.3 IoT implementation barriers IoT deployment is challenging because of device and data security, interoperability issues, scalability, trust, privacy concerns, financial issues, lack of qualified personnel, and compliance with data privacy laws. First, it is necessary to identify the barriers that hinder IoT implementation in CSC in order to overcome these challenges. Table 1 lists the barriers to implementing the IoT in CSC. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 1. Barriers to IoT implementation in the cold supply chain. https://doi.org/10.1371/journal.pone.0304118.t001 2.4 Methodology related literature ISM is a computer-based learning method that assists individuals or groups in creating a visual representation of intricate connections between several aspects of a complex situation. The fundamental idea is to use the practical skills and knowledge of specialists to dissect a complex system into many sub-systems and construct a multi-level structural model [11]. Raut et al. [76] employed the ISM approach to establish the interconnections among drivers, enabling a comprehensive knowledge of the relative connections among the critical success factors and defining their dependency when implementing sustainability. The DEMATEL technique has been used extensively to identify critical barriers in various vital processes, which were created to support methodical evaluations and organized decision-making processes. The effect connections map shows the relational linkages, with numbers denoting the degree of influence and arrows denoting the direction of influence. It is a comprehensive tool for assessing the interrelations between system variables and emphasizing the core-driving components [12]. Manoharan et al. [77] presented the DEMATEL model, which aids in comprehending the importance of drivers and barriers, creating matrices or digraphs to represent complex causal interactions, and identifying the relationships between these factors. The barrier analysis techniques employed in recent studies are presented in Table 2. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 2. Various barrier analysis methodologies used in recent approaches. https://doi.org/10.1371/journal.pone.0304118.t002 The literature investigation discusses every element of the CSC, covering transportation, cold storage, procurement, and occupational security across the cold chain. IoT supports SCM by enhancing visibility and stability, but problems include regulatory limitations and poor infrastructure. Most studies focus on distinct problems and seek to solve these challenges using the solutions provided. In the combined ISM-MICMAC-DEMATEL approach, ISM-MICMAC is used to construct hierarchical relationships among barriers and analyze the structure of systems, while DEMATEL delivers a numerical evaluation of the strength and direction of interactions between factors. Numerous barrier analysis strategies have been employed in modern methods, which are also used to analyze obstacles. The choice between these tactics varies depending on individual circumstances, available data, and decision-makers’ preferences. Thirteen barriers, and from the different barrier analysis techniques utilized in recent approaches, ISM-DEMATEL was chosen to analyze these barriers. 3 Methodology Research initiation involves several key stages, including the design of surveys, meticulous data collection, selection procedures, and rigorous reliability testing, as illustrated in Fig 2. Subsequently, the second phase unfolds with a process flow diagram outlining the development of the ISM model. The third phase is characterized by a process flow diagram that delineates the systematic steps employed in constructing the DEMATEL model. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 2. Flowchart depicting the research methodology, encompassing phases such as data collection and validation, implementation of ISM-MICMAC, and execution of the DEMATEL procedure. https://doi.org/10.1371/journal.pone.0304118.g002 3.1 Data collection method 3.1.1 Barriers identification. This involves identifying and recognizing the possible obstacles or challenges inside the system. These obstacles may be technical, organizational, or connected to other system operation elements. Using literature research and expert comments, potential barriers to the system were identified, as described in Table 1. 3.1.2 Survey development and data selection procedure. Thirty experts participated in the survey. The diagonal values in the ISM method are zero. Only one side of the diagonal value is used to create the initial reachability matrix. All 13 rows and 13 columns of the matrix were surveyed, with the exception of diagonal values. This verification process guaranteed that the data provided by the respondents were valid. After determining that the impact of barrier 1 on barrier 2 is V, an expert must conclude that the impact of barrier 2 on barrier 1 is A. If O and X are diagonal, their opposing sides must be the same. These checks will improve the quality of the survey, even if the initial reachability matrix ultimately determines the entire system. The DEMATEL impact factor survey, which is likewise associated with the ISM survey, is also measured on a scale from 0 to 4. The next issue concerns the impact factor, which must be greater than or equal to 1 if the effect of barrier 1 on barrier 2 is V. A value of 0 is required for the influence factor if it is O. A positive number is also required for X. Therefore, this cross-checking method will enhance the quality of the survey. Twelve reasonable answers were selected for each question, and twelve 13 × 13 matrices were constructed. The average of these matrices was calculated to determine the average matrix. For the ISM, the structural self-interaction matrix is also prepared using the value that appears most often in these logical replies. Table 3 provides a brief overview of the various characteristics of the expert panel. Quantification of each category offers vital information regarding the makeup of the group. A table of this type assists in visually representing and examining the distribution of expertise. The organized survey data from these 30 experts helps the comprehensibility of the information, which is essential for generating the outcome. The sex distribution comprised 26 males and 4 females. Thirteen panelists are below 30, 8 fall in the 30–40 range, 5 are aged 41–50, and 4 are 51 years and above. Regarding experience in their respective fields, 10 experts had less than five years, 7 possessed 5–10 years, 10 had 10–15 years, and 6 held 15 years and above. The domain of expertise includes eight in academics (Industrial Engineering), five in System Integration, four in Data Analysts, six in Data Security, and seven in cold chain executives. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 3. Demographic profile of the selected experts. https://doi.org/10.1371/journal.pone.0304118.t003 The survey was conducted using Google Forms, and the recruitment period was from 27 Sep 2023 to 11 Oct 2023. Participants were selected based on their expertise in supply chain, system integration, data analysis, data security, and cold chain. The survey consisted of 312 questions, focusing on the influential relationships among the barriers. Confidentiality of participant responses was strictly maintained. All the collected data were anonymized and stored. Only the research team had access to the raw data, and the findings were reported in aggregate form to ensure the anonymity of the participants. This study adhered to the ethical principles outlined in the Declaration of Helsinki. Participants were provided with informed consent forms detailing the purpose of the study, their rights as participants, and the procedures for data handling. Participation in the survey was voluntary, and participants had the right to withdraw at any time without penalties. This study was approved by the Ethics Review Board of the Research & Extension Center, Khulna University of Engineering & Technology, Bangladesh, to conduct this survey research. 3.1.3 Establish relationships between barriers. Once possible obstacles are discovered, it is essential to understand how these barriers are interrelated or impact each other. This step helps in understanding the complexity of the system and how different challenges may be connected. To determine which pairs of barriers require further investigation, a contextual relationship between them is established. 3.1.4 Cronbach’s alpha testing. The reliability coefficient Cronbach’s alpha can be used to evaluate the internal consistency of the survey or test items. Many psychological and educational surveys and assessments have used Cronbach’s alpha for their formulation and testing. This aids researchers and practitioners in ensuring that their measuring equipment accurately measures the idea in question. Cronbach’s alpha reliability is a measure of how well a sum or average of k measurements holds, where k measures might be anything from k raters to alternate forms to items on a questionnaire or exam. We used a 156-item questionnaire (k = 156) to measure implementation barrier influence, with each item scored on a 0–4 Likert scale. A Cronbach’s alpha value should exceed 0.7 since a value equal to or more than 0.7 falls within an acceptable range [86]. The variance of the total score (270.52) and the sum of the item variances (67.88) provide this dependability measure. The survey dataset had an acceptable degree of internal consistency, as indicated by a Cronbach’s alpha value of 0.7534. This measuring tool reliably captures the targeted construct because the coefficient is greater than the generally recognized requirement of 0.7. 3.2 Interpretative structural model (ISM) The initial development of ISM can be attributed to J. Warfield in 1973 who examined intricate socioeconomic systems [85]. This method may help individuals or teams better grasp a topic by organizing their understanding of it into a network diagram. The following is a detailed description of how ISM works [13, 14]. 3.2.1 Step 1: Developing structural self-interaction matrix (SSIM). The pair-wise connection between barriers in the system can be observed by employing SSIM. The following four symbols indicate a unique set of relationships: V: Barrier i influences barrier j; A: Barrier j influences barrier i; X: Barriers i and j influence each other; O: Barriers i and j have no relationship. 3.2.2 Step 2: Developing reachability matrix. The SSIM generates a reachability matrix; four symbols are converted to 0s and 1s to implement the SSIM in the initial reachability matrix. matrix. Specific rules of replacement are as follows: If D(i, j) of SSIM is shown with the symbol “V,” D(i, j) = 1 and D(j, i) = 0 should be assigned in the initial reachability matrix; If D(i, j) of SSIM is shown with the symbol “A,” D(i, j) = 0 and D(j, i) = 1 should be assigned in the initial reachability matrix; If D(i, j) of SSIM is represented by an “X,” then D(i, j) = 1 and D(j, i) = 1 should be placed in the initial reachability matrix, If D(i, j) of SSIM is represented by an “O,” then D(i, j) = 0 and D(j, i) = 0 should be assigned. 3.2.3 Step 3: Developing final reachability matrix. A transitivity test is then performed on the initial reachability matrix. ISM presupposes, as a given, that contextual relations are transitive. If barrier A is connected to barrier B, and B is related to barrier C, then barrier A must also be related to barrier C. 3.2.4 Step 4: Developing level partition. Level partitioning refers to categorizing or classifying distinct levels inside the information system. This involves dividing the system into levels or hierarchies to better understand its structure at various levels. The resultant final reachability matrix is segmented into several hierarchical levels. 3.2.5 Step 5: Developing conical form. The conical form describes structuring or organizing an information system in an arrangement that resembles a conical shape, indicating a hierarchical structure. Subsequently, a conical form of the reachability matrix was created. 3.2.6 Step 6: Developing ISM model. A directed graph was constructed using a reachability matrix to eliminate transitive linkages. By exchanging the nodes of the variables for statements, they converted into an ISM from the resultant digraph. 3.2.7 Step 7: Reviewing to check for inconsistency. After establishing the level partition, conical shape, and ISM model, it’s important to examine the full system to detect and resolve discrepancies. This step verifies that the system was consistent and functions smoothly without conflicting factors. The generated ISM model is reviewed for conceptual coherence, and any necessary revisions were implemented. 3.3 MICMAC analysis The multiplication of impact matrix applied to classification (MICMAC) study seeks to create a graph to categorize various barriers. The MICMAC algorithm is based on the multiplication characteristics of matrices [87]. The ISM framework requires the construction of a conical matrix to depict the interrelationships of a system’s components. For each element, the driving and dependence powers were calculated by adding the values in the rows and columns, respectively. These elements were further classified according to the effectiveness of their driving and dependent power in the MICMAC analysis. Factors were grouped into four categories: autonomous, dependent, linkage, and independent [88]. Group I (Autonomous factors): Comprises autonomous factors characterized by minimal interdependencies. Group II (Dependent factors): Encompasses dependent factors exhibiting a substantial reliance but limited generative capacity. Group III (Linkage factors): Consists of linkage factors possessing a robust propelling force and reliability. Group IV (Independent factors): Involves factors that significantly impact the outcomes of sustainable energy initiatives but are not significantly influenced by other variables. These factors can be utilized to manipulate other elements, thereby contributing to the preservation of sustainable energy objectives. 3.4 DEMATEL The DEMATEL method transforms the complex web of interrelations between barriers into a clear structural model of the system by categorizing them into two groups: causes and effects. This is a practical method for ranking the relative importance of different aspects of a complex system to inform strategic decisions over the long run and identify potential development areas [89]. It is extensively implemented across numerous domains, such as SCM, traceability, smart cities, healthcare, and consumer behavior [90]. The following is a detailed description of how DEMATEL works [15, 37]. 3.4.1 Step 1: Computation of average matrix. The expert panel that filled out the survey was asked to provide an integer value between 0 and 4 to represent the degree of influence they saw between any two barriers, using five different integer scales as “very high influence (4)”, “high influence (3)”, “moderate influence (2)”, “low influence (1)”, and “no influence (0)”. A respondent’s estimate of how much variable i influences variable j is denoted by the xij symbol. For i = j, 0 is assigned to each diagonal element. For every respondent, we may generate a non-negative n × n matrix using the formula , where k means that there were a total of responders with 1 ≤ k ≤ H and the total number of factors is denoted by n. In this case, the H responder matrices are denoted by X1, X2, X3, …, XH. The average matrix can be created as (1) 3.4.2 Step 2: Calculation of the normalized direct-relation matrix. Normalize direct-relation matrix D by D = A × S, where (2) 3.4.3 Step 3: Calculation of the total relation matrix. The total relation matrix T is represented as (3) where I is the identity matrix. 3.4.4 Step 4: Calculation of cause and effect values. R and C values, representing the sum of the values in the rows and columns, are now used in the calculations. Where, (4) (5) The transpose value of the jth column, denoted by [Cj]′, and the sum of the values of the jth column, Cj, shows the effect of the jth attribute on the other attributes. The influence of the ith row, denoted by ri, indicates the cause of the ith attribute on other attributes. The sum (Ri + Ci) represents the cumulative effects experienced and exerted by factor i. This signifies the degree of importance of element i in the overall system. The difference (Ri − Ci) indicates the net effects of factor i on the system. If the difference between Di and Ri is positive, the influence factor i may be considered as a net cause. Conversely, if the difference between Di and Ri is negative, then factor i can be regarded as a net receiver. 3.4.5 Step 5: Calculation of the threshold value. Determination of the threshold value is necessary to construct an interrelationship map. The interrelationship map only displays equations with penetration matrix values greater than the threshold value. The mean of the elements inside the entire penetration matrix is computed using Eq 6. (6) 3.4.6 Step 6: Drawing interrelationship map. An interrelationship map is created to comprehensively analyze the final solution, considering the values of Ri + Ci and Ri − Ci for each attribute in relation to the threshold value. 3.4.7 Step 7: Calculation of the final ranking of attributes. The interrelationship map derives a potential framework and hierarchy of these factors. This is achieved by organizing the values of Ri + Ci in descending order. 3.1 Data collection method 3.1.1 Barriers identification. This involves identifying and recognizing the possible obstacles or challenges inside the system. These obstacles may be technical, organizational, or connected to other system operation elements. Using literature research and expert comments, potential barriers to the system were identified, as described in Table 1. 3.1.2 Survey development and data selection procedure. Thirty experts participated in the survey. The diagonal values in the ISM method are zero. Only one side of the diagonal value is used to create the initial reachability matrix. All 13 rows and 13 columns of the matrix were surveyed, with the exception of diagonal values. This verification process guaranteed that the data provided by the respondents were valid. After determining that the impact of barrier 1 on barrier 2 is V, an expert must conclude that the impact of barrier 2 on barrier 1 is A. If O and X are diagonal, their opposing sides must be the same. These checks will improve the quality of the survey, even if the initial reachability matrix ultimately determines the entire system. The DEMATEL impact factor survey, which is likewise associated with the ISM survey, is also measured on a scale from 0 to 4. The next issue concerns the impact factor, which must be greater than or equal to 1 if the effect of barrier 1 on barrier 2 is V. A value of 0 is required for the influence factor if it is O. A positive number is also required for X. Therefore, this cross-checking method will enhance the quality of the survey. Twelve reasonable answers were selected for each question, and twelve 13 × 13 matrices were constructed. The average of these matrices was calculated to determine the average matrix. For the ISM, the structural self-interaction matrix is also prepared using the value that appears most often in these logical replies. Table 3 provides a brief overview of the various characteristics of the expert panel. Quantification of each category offers vital information regarding the makeup of the group. A table of this type assists in visually representing and examining the distribution of expertise. The organized survey data from these 30 experts helps the comprehensibility of the information, which is essential for generating the outcome. The sex distribution comprised 26 males and 4 females. Thirteen panelists are below 30, 8 fall in the 30–40 range, 5 are aged 41–50, and 4 are 51 years and above. Regarding experience in their respective fields, 10 experts had less than five years, 7 possessed 5–10 years, 10 had 10–15 years, and 6 held 15 years and above. The domain of expertise includes eight in academics (Industrial Engineering), five in System Integration, four in Data Analysts, six in Data Security, and seven in cold chain executives. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 3. Demographic profile of the selected experts. https://doi.org/10.1371/journal.pone.0304118.t003 The survey was conducted using Google Forms, and the recruitment period was from 27 Sep 2023 to 11 Oct 2023. Participants were selected based on their expertise in supply chain, system integration, data analysis, data security, and cold chain. The survey consisted of 312 questions, focusing on the influential relationships among the barriers. Confidentiality of participant responses was strictly maintained. All the collected data were anonymized and stored. Only the research team had access to the raw data, and the findings were reported in aggregate form to ensure the anonymity of the participants. This study adhered to the ethical principles outlined in the Declaration of Helsinki. Participants were provided with informed consent forms detailing the purpose of the study, their rights as participants, and the procedures for data handling. Participation in the survey was voluntary, and participants had the right to withdraw at any time without penalties. This study was approved by the Ethics Review Board of the Research & Extension Center, Khulna University of Engineering & Technology, Bangladesh, to conduct this survey research. 3.1.3 Establish relationships between barriers. Once possible obstacles are discovered, it is essential to understand how these barriers are interrelated or impact each other. This step helps in understanding the complexity of the system and how different challenges may be connected. To determine which pairs of barriers require further investigation, a contextual relationship between them is established. 3.1.4 Cronbach’s alpha testing. The reliability coefficient Cronbach’s alpha can be used to evaluate the internal consistency of the survey or test items. Many psychological and educational surveys and assessments have used Cronbach’s alpha for their formulation and testing. This aids researchers and practitioners in ensuring that their measuring equipment accurately measures the idea in question. Cronbach’s alpha reliability is a measure of how well a sum or average of k measurements holds, where k measures might be anything from k raters to alternate forms to items on a questionnaire or exam. We used a 156-item questionnaire (k = 156) to measure implementation barrier influence, with each item scored on a 0–4 Likert scale. A Cronbach’s alpha value should exceed 0.7 since a value equal to or more than 0.7 falls within an acceptable range [86]. The variance of the total score (270.52) and the sum of the item variances (67.88) provide this dependability measure. The survey dataset had an acceptable degree of internal consistency, as indicated by a Cronbach’s alpha value of 0.7534. This measuring tool reliably captures the targeted construct because the coefficient is greater than the generally recognized requirement of 0.7. 3.1.1 Barriers identification. This involves identifying and recognizing the possible obstacles or challenges inside the system. These obstacles may be technical, organizational, or connected to other system operation elements. Using literature research and expert comments, potential barriers to the system were identified, as described in Table 1. 3.1.2 Survey development and data selection procedure. Thirty experts participated in the survey. The diagonal values in the ISM method are zero. Only one side of the diagonal value is used to create the initial reachability matrix. All 13 rows and 13 columns of the matrix were surveyed, with the exception of diagonal values. This verification process guaranteed that the data provided by the respondents were valid. After determining that the impact of barrier 1 on barrier 2 is V, an expert must conclude that the impact of barrier 2 on barrier 1 is A. If O and X are diagonal, their opposing sides must be the same. These checks will improve the quality of the survey, even if the initial reachability matrix ultimately determines the entire system. The DEMATEL impact factor survey, which is likewise associated with the ISM survey, is also measured on a scale from 0 to 4. The next issue concerns the impact factor, which must be greater than or equal to 1 if the effect of barrier 1 on barrier 2 is V. A value of 0 is required for the influence factor if it is O. A positive number is also required for X. Therefore, this cross-checking method will enhance the quality of the survey. Twelve reasonable answers were selected for each question, and twelve 13 × 13 matrices were constructed. The average of these matrices was calculated to determine the average matrix. For the ISM, the structural self-interaction matrix is also prepared using the value that appears most often in these logical replies. Table 3 provides a brief overview of the various characteristics of the expert panel. Quantification of each category offers vital information regarding the makeup of the group. A table of this type assists in visually representing and examining the distribution of expertise. The organized survey data from these 30 experts helps the comprehensibility of the information, which is essential for generating the outcome. The sex distribution comprised 26 males and 4 females. Thirteen panelists are below 30, 8 fall in the 30–40 range, 5 are aged 41–50, and 4 are 51 years and above. Regarding experience in their respective fields, 10 experts had less than five years, 7 possessed 5–10 years, 10 had 10–15 years, and 6 held 15 years and above. The domain of expertise includes eight in academics (Industrial Engineering), five in System Integration, four in Data Analysts, six in Data Security, and seven in cold chain executives. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 3. Demographic profile of the selected experts. https://doi.org/10.1371/journal.pone.0304118.t003 The survey was conducted using Google Forms, and the recruitment period was from 27 Sep 2023 to 11 Oct 2023. Participants were selected based on their expertise in supply chain, system integration, data analysis, data security, and cold chain. The survey consisted of 312 questions, focusing on the influential relationships among the barriers. Confidentiality of participant responses was strictly maintained. All the collected data were anonymized and stored. Only the research team had access to the raw data, and the findings were reported in aggregate form to ensure the anonymity of the participants. This study adhered to the ethical principles outlined in the Declaration of Helsinki. Participants were provided with informed consent forms detailing the purpose of the study, their rights as participants, and the procedures for data handling. Participation in the survey was voluntary, and participants had the right to withdraw at any time without penalties. This study was approved by the Ethics Review Board of the Research & Extension Center, Khulna University of Engineering & Technology, Bangladesh, to conduct this survey research. 3.1.3 Establish relationships between barriers. Once possible obstacles are discovered, it is essential to understand how these barriers are interrelated or impact each other. This step helps in understanding the complexity of the system and how different challenges may be connected. To determine which pairs of barriers require further investigation, a contextual relationship between them is established. 3.1.4 Cronbach’s alpha testing. The reliability coefficient Cronbach’s alpha can be used to evaluate the internal consistency of the survey or test items. Many psychological and educational surveys and assessments have used Cronbach’s alpha for their formulation and testing. This aids researchers and practitioners in ensuring that their measuring equipment accurately measures the idea in question. Cronbach’s alpha reliability is a measure of how well a sum or average of k measurements holds, where k measures might be anything from k raters to alternate forms to items on a questionnaire or exam. We used a 156-item questionnaire (k = 156) to measure implementation barrier influence, with each item scored on a 0–4 Likert scale. A Cronbach’s alpha value should exceed 0.7 since a value equal to or more than 0.7 falls within an acceptable range [86]. The variance of the total score (270.52) and the sum of the item variances (67.88) provide this dependability measure. The survey dataset had an acceptable degree of internal consistency, as indicated by a Cronbach’s alpha value of 0.7534. This measuring tool reliably captures the targeted construct because the coefficient is greater than the generally recognized requirement of 0.7. 3.2 Interpretative structural model (ISM) The initial development of ISM can be attributed to J. Warfield in 1973 who examined intricate socioeconomic systems [85]. This method may help individuals or teams better grasp a topic by organizing their understanding of it into a network diagram. The following is a detailed description of how ISM works [13, 14]. 3.2.1 Step 1: Developing structural self-interaction matrix (SSIM). The pair-wise connection between barriers in the system can be observed by employing SSIM. The following four symbols indicate a unique set of relationships: V: Barrier i influences barrier j; A: Barrier j influences barrier i; X: Barriers i and j influence each other; O: Barriers i and j have no relationship. 3.2.2 Step 2: Developing reachability matrix. The SSIM generates a reachability matrix; four symbols are converted to 0s and 1s to implement the SSIM in the initial reachability matrix. matrix. Specific rules of replacement are as follows: If D(i, j) of SSIM is shown with the symbol “V,” D(i, j) = 1 and D(j, i) = 0 should be assigned in the initial reachability matrix; If D(i, j) of SSIM is shown with the symbol “A,” D(i, j) = 0 and D(j, i) = 1 should be assigned in the initial reachability matrix; If D(i, j) of SSIM is represented by an “X,” then D(i, j) = 1 and D(j, i) = 1 should be placed in the initial reachability matrix, If D(i, j) of SSIM is represented by an “O,” then D(i, j) = 0 and D(j, i) = 0 should be assigned. 3.2.3 Step 3: Developing final reachability matrix. A transitivity test is then performed on the initial reachability matrix. ISM presupposes, as a given, that contextual relations are transitive. If barrier A is connected to barrier B, and B is related to barrier C, then barrier A must also be related to barrier C. 3.2.4 Step 4: Developing level partition. Level partitioning refers to categorizing or classifying distinct levels inside the information system. This involves dividing the system into levels or hierarchies to better understand its structure at various levels. The resultant final reachability matrix is segmented into several hierarchical levels. 3.2.5 Step 5: Developing conical form. The conical form describes structuring or organizing an information system in an arrangement that resembles a conical shape, indicating a hierarchical structure. Subsequently, a conical form of the reachability matrix was created. 3.2.6 Step 6: Developing ISM model. A directed graph was constructed using a reachability matrix to eliminate transitive linkages. By exchanging the nodes of the variables for statements, they converted into an ISM from the resultant digraph. 3.2.7 Step 7: Reviewing to check for inconsistency. After establishing the level partition, conical shape, and ISM model, it’s important to examine the full system to detect and resolve discrepancies. This step verifies that the system was consistent and functions smoothly without conflicting factors. The generated ISM model is reviewed for conceptual coherence, and any necessary revisions were implemented. 3.2.1 Step 1: Developing structural self-interaction matrix (SSIM). The pair-wise connection between barriers in the system can be observed by employing SSIM. The following four symbols indicate a unique set of relationships: V: Barrier i influences barrier j; A: Barrier j influences barrier i; X: Barriers i and j influence each other; O: Barriers i and j have no relationship. 3.2.2 Step 2: Developing reachability matrix. The SSIM generates a reachability matrix; four symbols are converted to 0s and 1s to implement the SSIM in the initial reachability matrix. matrix. Specific rules of replacement are as follows: If D(i, j) of SSIM is shown with the symbol “V,” D(i, j) = 1 and D(j, i) = 0 should be assigned in the initial reachability matrix; If D(i, j) of SSIM is shown with the symbol “A,” D(i, j) = 0 and D(j, i) = 1 should be assigned in the initial reachability matrix; If D(i, j) of SSIM is represented by an “X,” then D(i, j) = 1 and D(j, i) = 1 should be placed in the initial reachability matrix, If D(i, j) of SSIM is represented by an “O,” then D(i, j) = 0 and D(j, i) = 0 should be assigned. 3.2.3 Step 3: Developing final reachability matrix. A transitivity test is then performed on the initial reachability matrix. ISM presupposes, as a given, that contextual relations are transitive. If barrier A is connected to barrier B, and B is related to barrier C, then barrier A must also be related to barrier C. 3.2.4 Step 4: Developing level partition. Level partitioning refers to categorizing or classifying distinct levels inside the information system. This involves dividing the system into levels or hierarchies to better understand its structure at various levels. The resultant final reachability matrix is segmented into several hierarchical levels. 3.2.5 Step 5: Developing conical form. The conical form describes structuring or organizing an information system in an arrangement that resembles a conical shape, indicating a hierarchical structure. Subsequently, a conical form of the reachability matrix was created. 3.2.6 Step 6: Developing ISM model. A directed graph was constructed using a reachability matrix to eliminate transitive linkages. By exchanging the nodes of the variables for statements, they converted into an ISM from the resultant digraph. 3.2.7 Step 7: Reviewing to check for inconsistency. After establishing the level partition, conical shape, and ISM model, it’s important to examine the full system to detect and resolve discrepancies. This step verifies that the system was consistent and functions smoothly without conflicting factors. The generated ISM model is reviewed for conceptual coherence, and any necessary revisions were implemented. 3.3 MICMAC analysis The multiplication of impact matrix applied to classification (MICMAC) study seeks to create a graph to categorize various barriers. The MICMAC algorithm is based on the multiplication characteristics of matrices [87]. The ISM framework requires the construction of a conical matrix to depict the interrelationships of a system’s components. For each element, the driving and dependence powers were calculated by adding the values in the rows and columns, respectively. These elements were further classified according to the effectiveness of their driving and dependent power in the MICMAC analysis. Factors were grouped into four categories: autonomous, dependent, linkage, and independent [88]. Group I (Autonomous factors): Comprises autonomous factors characterized by minimal interdependencies. Group II (Dependent factors): Encompasses dependent factors exhibiting a substantial reliance but limited generative capacity. Group III (Linkage factors): Consists of linkage factors possessing a robust propelling force and reliability. Group IV (Independent factors): Involves factors that significantly impact the outcomes of sustainable energy initiatives but are not significantly influenced by other variables. These factors can be utilized to manipulate other elements, thereby contributing to the preservation of sustainable energy objectives. 3.4 DEMATEL The DEMATEL method transforms the complex web of interrelations between barriers into a clear structural model of the system by categorizing them into two groups: causes and effects. This is a practical method for ranking the relative importance of different aspects of a complex system to inform strategic decisions over the long run and identify potential development areas [89]. It is extensively implemented across numerous domains, such as SCM, traceability, smart cities, healthcare, and consumer behavior [90]. The following is a detailed description of how DEMATEL works [15, 37]. 3.4.1 Step 1: Computation of average matrix. The expert panel that filled out the survey was asked to provide an integer value between 0 and 4 to represent the degree of influence they saw between any two barriers, using five different integer scales as “very high influence (4)”, “high influence (3)”, “moderate influence (2)”, “low influence (1)”, and “no influence (0)”. A respondent’s estimate of how much variable i influences variable j is denoted by the xij symbol. For i = j, 0 is assigned to each diagonal element. For every respondent, we may generate a non-negative n × n matrix using the formula , where k means that there were a total of responders with 1 ≤ k ≤ H and the total number of factors is denoted by n. In this case, the H responder matrices are denoted by X1, X2, X3, …, XH. The average matrix can be created as (1) 3.4.2 Step 2: Calculation of the normalized direct-relation matrix. Normalize direct-relation matrix D by D = A × S, where (2) 3.4.3 Step 3: Calculation of the total relation matrix. The total relation matrix T is represented as (3) where I is the identity matrix. 3.4.4 Step 4: Calculation of cause and effect values. R and C values, representing the sum of the values in the rows and columns, are now used in the calculations. Where, (4) (5) The transpose value of the jth column, denoted by [Cj]′, and the sum of the values of the jth column, Cj, shows the effect of the jth attribute on the other attributes. The influence of the ith row, denoted by ri, indicates the cause of the ith attribute on other attributes. The sum (Ri + Ci) represents the cumulative effects experienced and exerted by factor i. This signifies the degree of importance of element i in the overall system. The difference (Ri − Ci) indicates the net effects of factor i on the system. If the difference between Di and Ri is positive, the influence factor i may be considered as a net cause. Conversely, if the difference between Di and Ri is negative, then factor i can be regarded as a net receiver. 3.4.5 Step 5: Calculation of the threshold value. Determination of the threshold value is necessary to construct an interrelationship map. The interrelationship map only displays equations with penetration matrix values greater than the threshold value. The mean of the elements inside the entire penetration matrix is computed using Eq 6. (6) 3.4.6 Step 6: Drawing interrelationship map. An interrelationship map is created to comprehensively analyze the final solution, considering the values of Ri + Ci and Ri − Ci for each attribute in relation to the threshold value. 3.4.7 Step 7: Calculation of the final ranking of attributes. The interrelationship map derives a potential framework and hierarchy of these factors. This is achieved by organizing the values of Ri + Ci in descending order. 3.4.1 Step 1: Computation of average matrix. The expert panel that filled out the survey was asked to provide an integer value between 0 and 4 to represent the degree of influence they saw between any two barriers, using five different integer scales as “very high influence (4)”, “high influence (3)”, “moderate influence (2)”, “low influence (1)”, and “no influence (0)”. A respondent’s estimate of how much variable i influences variable j is denoted by the xij symbol. For i = j, 0 is assigned to each diagonal element. For every respondent, we may generate a non-negative n × n matrix using the formula , where k means that there were a total of responders with 1 ≤ k ≤ H and the total number of factors is denoted by n. In this case, the H responder matrices are denoted by X1, X2, X3, …, XH. The average matrix can be created as (1) 3.4.2 Step 2: Calculation of the normalized direct-relation matrix. Normalize direct-relation matrix D by D = A × S, where (2) 3.4.3 Step 3: Calculation of the total relation matrix. The total relation matrix T is represented as (3) where I is the identity matrix. 3.4.4 Step 4: Calculation of cause and effect values. R and C values, representing the sum of the values in the rows and columns, are now used in the calculations. Where, (4) (5) The transpose value of the jth column, denoted by [Cj]′, and the sum of the values of the jth column, Cj, shows the effect of the jth attribute on the other attributes. The influence of the ith row, denoted by ri, indicates the cause of the ith attribute on other attributes. The sum (Ri + Ci) represents the cumulative effects experienced and exerted by factor i. This signifies the degree of importance of element i in the overall system. The difference (Ri − Ci) indicates the net effects of factor i on the system. If the difference between Di and Ri is positive, the influence factor i may be considered as a net cause. Conversely, if the difference between Di and Ri is negative, then factor i can be regarded as a net receiver. 3.4.5 Step 5: Calculation of the threshold value. Determination of the threshold value is necessary to construct an interrelationship map. The interrelationship map only displays equations with penetration matrix values greater than the threshold value. The mean of the elements inside the entire penetration matrix is computed using Eq 6. (6) 3.4.6 Step 6: Drawing interrelationship map. An interrelationship map is created to comprehensively analyze the final solution, considering the values of Ri + Ci and Ri − Ci for each attribute in relation to the threshold value. 3.4.7 Step 7: Calculation of the final ranking of attributes. The interrelationship map derives a potential framework and hierarchy of these factors. This is achieved by organizing the values of Ri + Ci in descending order. 4 Numerical illustration for results interpretation 4.1 ISM-MICMAC application ISM and MICMAC techniques are strong ways to create a hierarchy and reveal contextual interactions between IoT adoption barriers, especially regarding the CSC. The principal aim of utilizing MICMAC is to evaluate the importance of the dimensions that affect a system. Using this methodology, researchers can examine the complex interrelationships and dependencies between different components and identify important factors that have a major impact on the system as a whole. The ISM-MICMAC technique has two main phases that have been applied in various settings such as supply chains, industry, and healthcare. A hierarchical structure of the chosen IoT adoption barriers was first constructed using the ISM. The relative importance and hierarchy of each barrier were then determined by methodically examining cause-and-effect interactions. After the dimensions are established, professionals evaluate the correlations, resulting in the development of a binary relation matrix that is then converted into a reachability matrix. The hierarchy of the barriers is displayed in this matrix, highlighting their key and consequential functions within the CSC framework. The MICMAC technique is used in the next step to further explore the relationships and interactions among the various IoT adoption barriers that have been identified. The emphasis is on understanding the dynamic behavior of barriers and classifying them according to their reliance and driving forces. Identifying driving barriers with high influence but low dependence and dependent barriers with high influence but low driving power is made easier using MICMAC analysis. With this categorization, the role of each barrier in the bigger picture and the vital links between them can be better understood. 4.1.1 Structural self-interaction matrix (SSIM) development. Experts’ judgments on the relationships between the 13 identified barriers are used to inform the SSIM’s development, which involves using four symbols to depict these interactions in a pairwise fashion, as described insubsubsection 3.2.1. In Table 4, SSIM depicts the element intrinsic linkages and internal dynamics. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 4. Structural self-interaction matrix (SSIM). https://doi.org/10.1371/journal.pone.0304118.t004 The symbols V, A, X, and O represent the specific sort of connection between the two components (i, j) being examined. The notation “V” indicates that element i will exert influence on element j. “A” signifies that element i will be impacted by element j. The symbol “X” denotes a bidirectional link, indicating that elements i and j will mutually impact each other. There is no relationship or connection between the elements of the symbol “O”. Table 5 lists IoT adoption barriers using abbreviations for convenience. Each abbreviation provides a concise overview of the main barriers that each one represents. Researchers and stakeholders seeking to overcome and resolve these obstacles in the rapidly evolving field of IoT technology will find the table invaluable. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 5. Barrier abbreviation table. https://doi.org/10.1371/journal.pone.0304118.t005 4.1.2 Reachability matrix formation. The four symbols in Table 4 are converted to 0s and 1s to implement SSIM in the first reachability matrix using the rules described in subsubsection 3.2.2. A square matrix is prepared in Table 6 with binary values that show whether the parts influence one other. The observed barriers are interconnected and have complicated relationships, which can be better understood using the reachability matrix. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 6. Initial reachability matrix. https://doi.org/10.1371/journal.pone.0304118.t006 4.1.3 Final reachability matrix formation. Transitivity was used to create the final reachability matrix, as shown in Table 7. Following the completion of the analytical phase of the ISM technique, the final reachability matrix, which contains the discovered hierarchical linkages among the system parts, is produced. The final reachability matrix determines the “driving and dependency power”, providing insight into the dynamics of the system. Analyzing “driving and dependency power,” Table 7 classifies parameters into “dependent, autonomous, linkage, and independent” categories. The barriers that display a significant driving force and dependence are categorized as belonging to the linking group; none of them are classified as autonomous, non-dependent, or dependent. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 7. Final reachability matrix. https://doi.org/10.1371/journal.pone.0304118.t007 4.1.4 Level partition. Barriers are broken down into three distinct sets: the reachability set, which contains the factor and all other factors it influences; the antecedent set, which contains the factor and all other factors that influence it; and the intersubsection set, which contains all the factors in both sets. Table 8 provides an overview of the final reachability matrix’s detailed reachability set, antecedent set, and inter-subsection set of IoT implementation barriers in CSC. All the barriers were categorized into levels. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 8. Final level partition. https://doi.org/10.1371/journal.pone.0304118.t008 4.1.5 Conical matrix. The conical matrix in Table 9 displays the transitivity interactions between adoption barriers. Identifying indirect linkages between components reveals the domino impact of system effects. A more complete picture of the system dynamics and structure is achieved using this matrix, which assists in understanding the wider effect of changing one element on other elements. The conical shape of the final reachability matrix is illustrated in Fig 3. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 3. Conical form of the final reachability matrix. https://doi.org/10.1371/journal.pone.0304118.g003 Download: PPT PowerPoint slide PNG larger image TIFF original image Table 9. Conical matrix (CM). https://doi.org/10.1371/journal.pone.0304118.t009 The hierarchical relationships among the different system parts are better understood using a conical matrix (Table 9), which is a tool for creating conical structures. This conical form clarifies the architecture of the system by visually depicting the hierarchical connections. 4.1.6 MICMAC analysis. MICMAC analysis is a useful tool for determining the drive and dependence power of barriers. This analysis was conducted using barriers to divide the structure into separate groups. There are four distinct categories of barriers described in Fig 4: Autonomous barriers: These barriers were located in the first quadrant. They were not very strong in driving or being dependent. Dependent barriers: These barriers are shown in Quadrant-II. The driving power of the subject was weak, whereas the dependence power was strong. Linkage barriers: These are inside Quadrant-III and exhibit strong driving and dependent power. In general, the instability of these barriers arises from the interconnectedness of their actions since any action done on one barrier might have consequences for others and could affect the barrier itself. Independent barriers: These are shown in Quadrant-IV and exhibit strong driving power but weak dependence power. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 4. MICMAC diagram for barriers. https://doi.org/10.1371/journal.pone.0304118.g004 4.1.7 ISM model. The digraph in Fig 5 shows the barriers preventing IoT adoption. It was used to identify the hierarchy levels associated with the implementation of the IoT in cold SC. The conceptual coherence of the produced ISM model was checked, and any required adjustments were made. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 5. Digraph depicting the relationship between barriers. https://doi.org/10.1371/journal.pone.0304118.g005 4.2 DEMATEL application 4.2.1 Average matrix formation. Each expert on the panel completed a survey with an integer value between 0 and 4 to indicate the level of impact they noticed between every given pair of obstacles. Using the matrix format of the survey data, the average matrix is determined using Eq 1 in Table 10. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 10. Average matrix. https://doi.org/10.1371/journal.pone.0304118.t010 4.2.2 Normalized direct relation matrix formation. Using Eq 2, the normalized direct relation matrix is formulated from the average matrix in Table 11. The maximum summation was 32.333, which functions as a divisor, and every cell value from the average matrix was divided by this value. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 11. Normalised direct relation matrix (D). https://doi.org/10.1371/journal.pone.0304118.t011 4.2.3 Total relation matrix formation. The total relation matrix is formulated using Eq 3 in Table 12. The values in the matrix indicate the degree of relation between the pairs of factors. A higher value suggests a stronger relationship. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 12. Total relation matrix. https://doi.org/10.1371/journal.pone.0304118.t012 4.2.4 Identification of cause and effect. Table 13 provides information on the degree of influence of various factors related to IoT adoption on cold SC barriers. Each row represents a specific factor, and each column provides different metrics or totals. The row total and column total were calculated using Eqs 4 and 5. Causes have Ri − Ci values greater than 0, whereas the effects have smaller Ri − Ci values. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 13. Degree of influences. https://doi.org/10.1371/journal.pone.0304118.t013 4.2.5 Developing interrelationship map. A digraph illustrating the influential relationship between the barriers is shown in Fig 6, where the threshold value calculated using Eq 6 is 0.099. Once the threshold value is determined, an interrelationship map is produced. In this map, the values above the threshold reflect the influence of barrier i on barrier j. By contrast, when the value is lower than the threshold value, barrier i is influenced by barrier j. The arrows demonstrate the influence, demonstrating an important link among the barriers. Values positioned above the neutral horizontal line are categorized as belonging to the cause group, while values positioned below the neutral horizontal line are categorized as belonging to the effect group. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 6. Digraph showing the influential relationship between the barriers. https://doi.org/10.1371/journal.pone.0304118.g006 4.2.6 Developing final ranking of attributes. DIM > TI > DSP > SC > AA > LSW > RI > HIC > CCN > ROI > RC > CEC > EE Where Full form of these abbreviations described in Table 5. 4.1 ISM-MICMAC application ISM and MICMAC techniques are strong ways to create a hierarchy and reveal contextual interactions between IoT adoption barriers, especially regarding the CSC. The principal aim of utilizing MICMAC is to evaluate the importance of the dimensions that affect a system. Using this methodology, researchers can examine the complex interrelationships and dependencies between different components and identify important factors that have a major impact on the system as a whole. The ISM-MICMAC technique has two main phases that have been applied in various settings such as supply chains, industry, and healthcare. A hierarchical structure of the chosen IoT adoption barriers was first constructed using the ISM. The relative importance and hierarchy of each barrier were then determined by methodically examining cause-and-effect interactions. After the dimensions are established, professionals evaluate the correlations, resulting in the development of a binary relation matrix that is then converted into a reachability matrix. The hierarchy of the barriers is displayed in this matrix, highlighting their key and consequential functions within the CSC framework. The MICMAC technique is used in the next step to further explore the relationships and interactions among the various IoT adoption barriers that have been identified. The emphasis is on understanding the dynamic behavior of barriers and classifying them according to their reliance and driving forces. Identifying driving barriers with high influence but low dependence and dependent barriers with high influence but low driving power is made easier using MICMAC analysis. With this categorization, the role of each barrier in the bigger picture and the vital links between them can be better understood. 4.1.1 Structural self-interaction matrix (SSIM) development. Experts’ judgments on the relationships between the 13 identified barriers are used to inform the SSIM’s development, which involves using four symbols to depict these interactions in a pairwise fashion, as described insubsubsection 3.2.1. In Table 4, SSIM depicts the element intrinsic linkages and internal dynamics. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 4. Structural self-interaction matrix (SSIM). https://doi.org/10.1371/journal.pone.0304118.t004 The symbols V, A, X, and O represent the specific sort of connection between the two components (i, j) being examined. The notation “V” indicates that element i will exert influence on element j. “A” signifies that element i will be impacted by element j. The symbol “X” denotes a bidirectional link, indicating that elements i and j will mutually impact each other. There is no relationship or connection between the elements of the symbol “O”. Table 5 lists IoT adoption barriers using abbreviations for convenience. Each abbreviation provides a concise overview of the main barriers that each one represents. Researchers and stakeholders seeking to overcome and resolve these obstacles in the rapidly evolving field of IoT technology will find the table invaluable. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 5. Barrier abbreviation table. https://doi.org/10.1371/journal.pone.0304118.t005 4.1.2 Reachability matrix formation. The four symbols in Table 4 are converted to 0s and 1s to implement SSIM in the first reachability matrix using the rules described in subsubsection 3.2.2. A square matrix is prepared in Table 6 with binary values that show whether the parts influence one other. The observed barriers are interconnected and have complicated relationships, which can be better understood using the reachability matrix. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 6. Initial reachability matrix. https://doi.org/10.1371/journal.pone.0304118.t006 4.1.3 Final reachability matrix formation. Transitivity was used to create the final reachability matrix, as shown in Table 7. Following the completion of the analytical phase of the ISM technique, the final reachability matrix, which contains the discovered hierarchical linkages among the system parts, is produced. The final reachability matrix determines the “driving and dependency power”, providing insight into the dynamics of the system. Analyzing “driving and dependency power,” Table 7 classifies parameters into “dependent, autonomous, linkage, and independent” categories. The barriers that display a significant driving force and dependence are categorized as belonging to the linking group; none of them are classified as autonomous, non-dependent, or dependent. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 7. Final reachability matrix. https://doi.org/10.1371/journal.pone.0304118.t007 4.1.4 Level partition. Barriers are broken down into three distinct sets: the reachability set, which contains the factor and all other factors it influences; the antecedent set, which contains the factor and all other factors that influence it; and the intersubsection set, which contains all the factors in both sets. Table 8 provides an overview of the final reachability matrix’s detailed reachability set, antecedent set, and inter-subsection set of IoT implementation barriers in CSC. All the barriers were categorized into levels. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 8. Final level partition. https://doi.org/10.1371/journal.pone.0304118.t008 4.1.5 Conical matrix. The conical matrix in Table 9 displays the transitivity interactions between adoption barriers. Identifying indirect linkages between components reveals the domino impact of system effects. A more complete picture of the system dynamics and structure is achieved using this matrix, which assists in understanding the wider effect of changing one element on other elements. The conical shape of the final reachability matrix is illustrated in Fig 3. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 3. Conical form of the final reachability matrix. https://doi.org/10.1371/journal.pone.0304118.g003 Download: PPT PowerPoint slide PNG larger image TIFF original image Table 9. Conical matrix (CM). https://doi.org/10.1371/journal.pone.0304118.t009 The hierarchical relationships among the different system parts are better understood using a conical matrix (Table 9), which is a tool for creating conical structures. This conical form clarifies the architecture of the system by visually depicting the hierarchical connections. 4.1.6 MICMAC analysis. MICMAC analysis is a useful tool for determining the drive and dependence power of barriers. This analysis was conducted using barriers to divide the structure into separate groups. There are four distinct categories of barriers described in Fig 4: Autonomous barriers: These barriers were located in the first quadrant. They were not very strong in driving or being dependent. Dependent barriers: These barriers are shown in Quadrant-II. The driving power of the subject was weak, whereas the dependence power was strong. Linkage barriers: These are inside Quadrant-III and exhibit strong driving and dependent power. In general, the instability of these barriers arises from the interconnectedness of their actions since any action done on one barrier might have consequences for others and could affect the barrier itself. Independent barriers: These are shown in Quadrant-IV and exhibit strong driving power but weak dependence power. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 4. MICMAC diagram for barriers. https://doi.org/10.1371/journal.pone.0304118.g004 4.1.7 ISM model. The digraph in Fig 5 shows the barriers preventing IoT adoption. It was used to identify the hierarchy levels associated with the implementation of the IoT in cold SC. The conceptual coherence of the produced ISM model was checked, and any required adjustments were made. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 5. Digraph depicting the relationship between barriers. https://doi.org/10.1371/journal.pone.0304118.g005 4.1.1 Structural self-interaction matrix (SSIM) development. Experts’ judgments on the relationships between the 13 identified barriers are used to inform the SSIM’s development, which involves using four symbols to depict these interactions in a pairwise fashion, as described insubsubsection 3.2.1. In Table 4, SSIM depicts the element intrinsic linkages and internal dynamics. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 4. Structural self-interaction matrix (SSIM). https://doi.org/10.1371/journal.pone.0304118.t004 The symbols V, A, X, and O represent the specific sort of connection between the two components (i, j) being examined. The notation “V” indicates that element i will exert influence on element j. “A” signifies that element i will be impacted by element j. The symbol “X” denotes a bidirectional link, indicating that elements i and j will mutually impact each other. There is no relationship or connection between the elements of the symbol “O”. Table 5 lists IoT adoption barriers using abbreviations for convenience. Each abbreviation provides a concise overview of the main barriers that each one represents. Researchers and stakeholders seeking to overcome and resolve these obstacles in the rapidly evolving field of IoT technology will find the table invaluable. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 5. Barrier abbreviation table. https://doi.org/10.1371/journal.pone.0304118.t005 4.1.2 Reachability matrix formation. The four symbols in Table 4 are converted to 0s and 1s to implement SSIM in the first reachability matrix using the rules described in subsubsection 3.2.2. A square matrix is prepared in Table 6 with binary values that show whether the parts influence one other. The observed barriers are interconnected and have complicated relationships, which can be better understood using the reachability matrix. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 6. Initial reachability matrix. https://doi.org/10.1371/journal.pone.0304118.t006 4.1.3 Final reachability matrix formation. Transitivity was used to create the final reachability matrix, as shown in Table 7. Following the completion of the analytical phase of the ISM technique, the final reachability matrix, which contains the discovered hierarchical linkages among the system parts, is produced. The final reachability matrix determines the “driving and dependency power”, providing insight into the dynamics of the system. Analyzing “driving and dependency power,” Table 7 classifies parameters into “dependent, autonomous, linkage, and independent” categories. The barriers that display a significant driving force and dependence are categorized as belonging to the linking group; none of them are classified as autonomous, non-dependent, or dependent. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 7. Final reachability matrix. https://doi.org/10.1371/journal.pone.0304118.t007 4.1.4 Level partition. Barriers are broken down into three distinct sets: the reachability set, which contains the factor and all other factors it influences; the antecedent set, which contains the factor and all other factors that influence it; and the intersubsection set, which contains all the factors in both sets. Table 8 provides an overview of the final reachability matrix’s detailed reachability set, antecedent set, and inter-subsection set of IoT implementation barriers in CSC. All the barriers were categorized into levels. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 8. Final level partition. https://doi.org/10.1371/journal.pone.0304118.t008 4.1.5 Conical matrix. The conical matrix in Table 9 displays the transitivity interactions between adoption barriers. Identifying indirect linkages between components reveals the domino impact of system effects. A more complete picture of the system dynamics and structure is achieved using this matrix, which assists in understanding the wider effect of changing one element on other elements. The conical shape of the final reachability matrix is illustrated in Fig 3. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 3. Conical form of the final reachability matrix. https://doi.org/10.1371/journal.pone.0304118.g003 Download: PPT PowerPoint slide PNG larger image TIFF original image Table 9. Conical matrix (CM). https://doi.org/10.1371/journal.pone.0304118.t009 The hierarchical relationships among the different system parts are better understood using a conical matrix (Table 9), which is a tool for creating conical structures. This conical form clarifies the architecture of the system by visually depicting the hierarchical connections. 4.1.6 MICMAC analysis. MICMAC analysis is a useful tool for determining the drive and dependence power of barriers. This analysis was conducted using barriers to divide the structure into separate groups. There are four distinct categories of barriers described in Fig 4: Autonomous barriers: These barriers were located in the first quadrant. They were not very strong in driving or being dependent. Dependent barriers: These barriers are shown in Quadrant-II. The driving power of the subject was weak, whereas the dependence power was strong. Linkage barriers: These are inside Quadrant-III and exhibit strong driving and dependent power. In general, the instability of these barriers arises from the interconnectedness of their actions since any action done on one barrier might have consequences for others and could affect the barrier itself. Independent barriers: These are shown in Quadrant-IV and exhibit strong driving power but weak dependence power. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 4. MICMAC diagram for barriers. https://doi.org/10.1371/journal.pone.0304118.g004 4.1.7 ISM model. The digraph in Fig 5 shows the barriers preventing IoT adoption. It was used to identify the hierarchy levels associated with the implementation of the IoT in cold SC. The conceptual coherence of the produced ISM model was checked, and any required adjustments were made. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 5. Digraph depicting the relationship between barriers. https://doi.org/10.1371/journal.pone.0304118.g005 4.2 DEMATEL application 4.2.1 Average matrix formation. Each expert on the panel completed a survey with an integer value between 0 and 4 to indicate the level of impact they noticed between every given pair of obstacles. Using the matrix format of the survey data, the average matrix is determined using Eq 1 in Table 10. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 10. Average matrix. https://doi.org/10.1371/journal.pone.0304118.t010 4.2.2 Normalized direct relation matrix formation. Using Eq 2, the normalized direct relation matrix is formulated from the average matrix in Table 11. The maximum summation was 32.333, which functions as a divisor, and every cell value from the average matrix was divided by this value. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 11. Normalised direct relation matrix (D). https://doi.org/10.1371/journal.pone.0304118.t011 4.2.3 Total relation matrix formation. The total relation matrix is formulated using Eq 3 in Table 12. The values in the matrix indicate the degree of relation between the pairs of factors. A higher value suggests a stronger relationship. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 12. Total relation matrix. https://doi.org/10.1371/journal.pone.0304118.t012 4.2.4 Identification of cause and effect. Table 13 provides information on the degree of influence of various factors related to IoT adoption on cold SC barriers. Each row represents a specific factor, and each column provides different metrics or totals. The row total and column total were calculated using Eqs 4 and 5. Causes have Ri − Ci values greater than 0, whereas the effects have smaller Ri − Ci values. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 13. Degree of influences. https://doi.org/10.1371/journal.pone.0304118.t013 4.2.5 Developing interrelationship map. A digraph illustrating the influential relationship between the barriers is shown in Fig 6, where the threshold value calculated using Eq 6 is 0.099. Once the threshold value is determined, an interrelationship map is produced. In this map, the values above the threshold reflect the influence of barrier i on barrier j. By contrast, when the value is lower than the threshold value, barrier i is influenced by barrier j. The arrows demonstrate the influence, demonstrating an important link among the barriers. Values positioned above the neutral horizontal line are categorized as belonging to the cause group, while values positioned below the neutral horizontal line are categorized as belonging to the effect group. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 6. Digraph showing the influential relationship between the barriers. https://doi.org/10.1371/journal.pone.0304118.g006 4.2.6 Developing final ranking of attributes. DIM > TI > DSP > SC > AA > LSW > RI > HIC > CCN > ROI > RC > CEC > EE Where Full form of these abbreviations described in Table 5. 4.2.1 Average matrix formation. Each expert on the panel completed a survey with an integer value between 0 and 4 to indicate the level of impact they noticed between every given pair of obstacles. Using the matrix format of the survey data, the average matrix is determined using Eq 1 in Table 10. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 10. Average matrix. https://doi.org/10.1371/journal.pone.0304118.t010 4.2.2 Normalized direct relation matrix formation. Using Eq 2, the normalized direct relation matrix is formulated from the average matrix in Table 11. The maximum summation was 32.333, which functions as a divisor, and every cell value from the average matrix was divided by this value. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 11. Normalised direct relation matrix (D). https://doi.org/10.1371/journal.pone.0304118.t011 4.2.3 Total relation matrix formation. The total relation matrix is formulated using Eq 3 in Table 12. The values in the matrix indicate the degree of relation between the pairs of factors. A higher value suggests a stronger relationship. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 12. Total relation matrix. https://doi.org/10.1371/journal.pone.0304118.t012 4.2.4 Identification of cause and effect. Table 13 provides information on the degree of influence of various factors related to IoT adoption on cold SC barriers. Each row represents a specific factor, and each column provides different metrics or totals. The row total and column total were calculated using Eqs 4 and 5. Causes have Ri − Ci values greater than 0, whereas the effects have smaller Ri − Ci values. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 13. Degree of influences. https://doi.org/10.1371/journal.pone.0304118.t013 4.2.5 Developing interrelationship map. A digraph illustrating the influential relationship between the barriers is shown in Fig 6, where the threshold value calculated using Eq 6 is 0.099. Once the threshold value is determined, an interrelationship map is produced. In this map, the values above the threshold reflect the influence of barrier i on barrier j. By contrast, when the value is lower than the threshold value, barrier i is influenced by barrier j. The arrows demonstrate the influence, demonstrating an important link among the barriers. Values positioned above the neutral horizontal line are categorized as belonging to the cause group, while values positioned below the neutral horizontal line are categorized as belonging to the effect group. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 6. Digraph showing the influential relationship between the barriers. https://doi.org/10.1371/journal.pone.0304118.g006 4.2.6 Developing final ranking of attributes. DIM > TI > DSP > SC > AA > LSW > RI > HIC > CCN > ROI > RC > CEC > EE Where Full form of these abbreviations described in Table 5. 5 Discussions Numerous interconnected barriers to extensive IoT implementation in cold SC were analyzed in this study. Data from the survey were double-checked to ensure accuracy. The Cronbach’s alpha test was used to ensure that the survey results were acceptable and valid. A reliable measurement is ensured by this coefficient, which evaluates the internal consistency of the survey questions. After it was confirmed that the alpha value was above the acceptable range, the subsequent stage of the process was initiated. To ascertain this, The ISM-MICMAC-DEMATEL method is constructed to determine important barriers, which are divided into three subsections: subsection 4.1 for ISM, subsection 4.1.6 for MICMAC and the other subsection 4.2 for DEMATEL. The ISM model was created to determine the hierarchy levels of IoTBs so that CSC practitioners could see their dependence links and focus on the largest adoption barriers to IoT deployment. This study identified five hierarchical layers to explain the linkages between the chosen IoTBs. The implementation barrier at higher levels exhibits greater susceptibility to the effect of other factors, while components situated at lower levels strongly influence other factors. Variables classified as high levels, namely Levels 1 and 2, are prone to being influenced by other variables. We identified acceptance, adoption, and reliability issues at the top of the hierarchy, driven by the four hierarchies below. At the second level, we identified two barriers: high implementation cost and ROI uncertainty caused by the three hierarchical layers below it. In the third tier, six interconnected barriers have mutual effects. These barriers include a lack of skilled workforce, data security and privacy, technological infrastructure, scalability challenges, cultural and ethical considerations, data integration and management, and extreme environments. Conversely, components categorized as low levels, namely Levels 4 and 5, can influence the other factors more. The IoT adoption barriers in Level 4 are cold chain networks and Level 5 is regulatory compliance. These factors serve as foundational elements in a broader network of relationships. The analysis of barriers identifies regulatory compliance as an important factor that hinders the implementation of the IoT. The implementation of government regulations that promote the adoption of IoT will result in a significant transformation of the supply chain system. Infrastructure, environmental factors, a trained workforce, cultural-ethical considerations, scalability, and other factors influence the cold chain network. Most of the supply chain stages are apprehensive about implementing IoT, as is typical with every new technology. An efficient technological infrastructure is necessary for the successful deployment of the IoT across supply chains, which involves a vast network of linked devices and systems. Adoption of the IoT depends on this infrastructure, which allows integration, data transfer, and communication among components in the supply chain ecosystem. Industries may face challenges with scalability and performance if the infrastructure is insufficient for the IoT. To oversee such a vast and complex system, experts with the necessary level of expertise are required. Reducing the challenges associated with IoT adoption requires secure network cloud data. Preventing spyware and attacks is crucial since the number of connected devices and sensitive data is growing. As the nature of threats evolves, more sophisticated security measures and solutions designed for IoT systems may be required. A massive investment is necessary to hire experts, educate current employees, and build infrastructure. Industries are hesitant to implement IoT due to concerns about the potential lack of return on investment. In order to feel certain about the ROI, small companies need to be presented with a handful of positive examples. According to the MICMAC analysis, independent barriers are cold chain networks and regulatory compliance; dependent barriers are ROI uncertainty and high implementation costs. The other seven were linkage barriers, and no autonomous barriers existed. Among the many types of barriers, linkage and independent barriers exhibit significant driving forces, making them crucial barriers. The interdependence of the barriers is depicted in the interrelationship map. Regulatory compliance, lack of skilled workforce, data security and privacy, technological infrastructure, scalability challenges, cultural and ethical considerations, data integration and management issues, extreme environment issues, and cold chain networks are in the cause group. High implementation cost, acceptance and adoption, reliability issues, and ROI uncertainty are in the effect group. Regulatory compliance and cold chain networks were identified as the most important causes, with respective values of 1.8719 and 1.2308. These two barriers drive more in a larger context; thus, improving performance may promote system development. Reliability issues, acceptance and adoption, and high implementation costs are the most important effects influenced by other barriers. These effects were quantified with values of -1.7808, -1.4118, and -94707, respectively. According to the final ranking of attributes, the most important criteria are technological infrastructure, data security and privacy, and data integration and management. The criterion for extreme environments is of the least importance. To overcome the barriers associated with data integration and management, it is essential to implement standardized software that enables communication between devices on the same system. Priority should be given to privacy and security during IoT implementation, and it is difficult to develop and investigate a gateway that connects devices using multiple protocols. Faculty and industry must collaborate to resolve this challenge. Significant investment and research are needed for solving security and data integration challenges at the ground level. 5.1 Managerial and practical implications Given that the implementation of IoT is in its early stages, the results presented in this paper offer valuable guidance for practitioners. This study has revealed several implications for both managerial and practical considerations, providing insights that can inform decision-making in this evolving field. This article guides innovative supply chain methods that use new technologies such as IoT. This study provides crucial barriers to understanding supply chain strategies by considering IoT while creating a coordinating system. Managers can also learn about the most prevalent IoT technological difficulties. With additional insight, managers can quickly improve processes, fix issues, and make decisions more informedly. This research can help CSC managers plan IoT programs to protect perishable goods from packaging and processing to storage, transportation, and distribution by providing precise temperature and humidity data with a data integration system. IoT sensors may warn of temperature changes or equipment breakdown. Managers schedule proactive maintenance to prevent breakdowns and product spoilage. High-quality goods and adequate regulations may benefit from this research. This study promotes new efforts to provide supply chain stakeholders with a single platform to exchange information to establish a strong system. This study’s focus on efficient information transmission made cold SC more trustworthy. IoT devices collect sufficient data to enable managers to observe patterns and trends. Analytics can optimize processes, routes, and resource use. This study suggests that IoT technology might enhance cold SC product quality, customer demand, and services. If this study is used well, management may replace conventional supply chain linkages with real-time data interchange via radio frequency identification tags, readers, and other embedded electronic devices. The findings of this study can convince managerial staff to invest in GPS, RFID tags, readers, and other monitoring technologies. Managers will hire suitable candidates to maximize the use of IoT technology using this knowledge. The conclusions of this study may also motivate higher management to expand staff training and development. 5.2 Unique theoretical contribution To guarantee a long-term, IoT-based CSC system, this study examined the challenges associated with using the IoT in CSC. Thirteen obstacles were identified with the assistance of stakeholders. According to the results of this study, various stakeholders in CSC require distinct responses. As the transport management system (TMS) is the most influential party, it follows that TMS should take the initiative and rely on policies to guide its actions. These stakeholders initiate the HIC, TI, SC, DIM, EE, and CCN barriers. Additionally, any and all obstacles may serve as a roadmap for different groups of people engaged in logistics, product processing, quality inspection, and secure packaging. To sum up the theoretical contribution, this study found two kinds of barriers—cause and effect—based on stakeholder theory that prevents the implementation of IoT in CSC systems. The specific barriers to the effective deployment of IoT in CSC may be better understood by exploring each of these categories. Combining insights from management, engineering, logistics, and information systems into a comprehensive plan. This approach facilitates the identification of problems as a whole and the development of comprehensive solutions. This study also used a socio-technical systems approach to examine social-technical interactions inside the CSC. Human traits, organizational culture, and socioeconomic context influence the process of identifying and removing barriers. This model demonstrated how obstacles in one part of a system may affect other parts of the system and how the removal of certain obstacles can cause other benefits to trickle down. 5.1 Managerial and practical implications Given that the implementation of IoT is in its early stages, the results presented in this paper offer valuable guidance for practitioners. This study has revealed several implications for both managerial and practical considerations, providing insights that can inform decision-making in this evolving field. This article guides innovative supply chain methods that use new technologies such as IoT. This study provides crucial barriers to understanding supply chain strategies by considering IoT while creating a coordinating system. Managers can also learn about the most prevalent IoT technological difficulties. With additional insight, managers can quickly improve processes, fix issues, and make decisions more informedly. This research can help CSC managers plan IoT programs to protect perishable goods from packaging and processing to storage, transportation, and distribution by providing precise temperature and humidity data with a data integration system. IoT sensors may warn of temperature changes or equipment breakdown. Managers schedule proactive maintenance to prevent breakdowns and product spoilage. High-quality goods and adequate regulations may benefit from this research. This study promotes new efforts to provide supply chain stakeholders with a single platform to exchange information to establish a strong system. This study’s focus on efficient information transmission made cold SC more trustworthy. IoT devices collect sufficient data to enable managers to observe patterns and trends. Analytics can optimize processes, routes, and resource use. This study suggests that IoT technology might enhance cold SC product quality, customer demand, and services. If this study is used well, management may replace conventional supply chain linkages with real-time data interchange via radio frequency identification tags, readers, and other embedded electronic devices. The findings of this study can convince managerial staff to invest in GPS, RFID tags, readers, and other monitoring technologies. Managers will hire suitable candidates to maximize the use of IoT technology using this knowledge. The conclusions of this study may also motivate higher management to expand staff training and development. 5.2 Unique theoretical contribution To guarantee a long-term, IoT-based CSC system, this study examined the challenges associated with using the IoT in CSC. Thirteen obstacles were identified with the assistance of stakeholders. According to the results of this study, various stakeholders in CSC require distinct responses. As the transport management system (TMS) is the most influential party, it follows that TMS should take the initiative and rely on policies to guide its actions. These stakeholders initiate the HIC, TI, SC, DIM, EE, and CCN barriers. Additionally, any and all obstacles may serve as a roadmap for different groups of people engaged in logistics, product processing, quality inspection, and secure packaging. To sum up the theoretical contribution, this study found two kinds of barriers—cause and effect—based on stakeholder theory that prevents the implementation of IoT in CSC systems. The specific barriers to the effective deployment of IoT in CSC may be better understood by exploring each of these categories. Combining insights from management, engineering, logistics, and information systems into a comprehensive plan. This approach facilitates the identification of problems as a whole and the development of comprehensive solutions. This study also used a socio-technical systems approach to examine social-technical interactions inside the CSC. Human traits, organizational culture, and socioeconomic context influence the process of identifying and removing barriers. This model demonstrated how obstacles in one part of a system may affect other parts of the system and how the removal of certain obstacles can cause other benefits to trickle down. 6 Conclusions and future works The primary purpose of this study was to identify and examine the barriers that hinder IoT implementation in cold SC. Our research sought to identify and examine the barriers preventing the IoT from being widely used. As a result of IoT’s infancy, CSC partners are unaware of their technological requirements and the benefits that accompany them; consequently, they are hesitant to implement it. Significant findings and insights were derived from the ISM-MICMAC-DEMATEL analysis, which clarified the connection between implementation barriers and their effect on CSC. ISM provides hierarchical linkages, but the impact of IoTBs on each other has not been quantified. The DEMATEL method was employed to identify the most crucial IoTBs and overcome the limitations of ISM, which prioritizes the interactions between the selected barriers more than ISM. According to the research results, there are two primary factors that practitioners in CSCs should focus on regulatory compliance and cold chain networks, which serve as a catalyst for advancement by focusing on the barriers hindering development. With MICMAC’s element classification based on driving and dependence powers, the interconnections inside a complicated system may be fully understood, and decisions can be made more effectively. According to the DEMATEL attribute ranking, the three most important factors preventing the widespread adoption of the IoT are data integration and management (DIM), technological infrastructure (TI), and data security and privacy (DSP). While these barriers do pose a serious threat to the system, it is vital to remember that they could not be the main causes influencing the dependability and efficiency of IoT deployment as a whole. Regardless of whether they are not the most crucial barriers discovered by DEMATEL analysis, practitioners aiming for long-term viability in IoT deployment should prioritize resolving the most important causes. Challenges with regulatory compliance and cold chain networks are likely to be among these root reasons, as are other essentials for the successful implementation of IoT. The long-term success and stability of IoT deployments may be assured if practitioners concentrate on fixing these underlying issues. On the other hand, where there is a need for rapid or immediate improvement to enhance IoT implementation, it can be practical to tackle the most important obstacles found by DEMATEL first. Although these obstacles may not solve the root problems, they may improve some parts of the IoT deployment, which can lead to rapid success and show stakeholders how beneficial the technology could be. The efficient implementation of IoT in CSC depends on government rules and a strong cold chain structure. Government engagement may solve data privacy, security, integration, and reliability issues, boosting industry confidence and IoT adoption. Securing and tackling these barriers properly leads to higher reliability in the IoT implementation. The total system becomes more expensive due to the scalability issues and harsh environmental issues. The most important thing to remember is that the long-term advantages will be worth it, even if the initial investment in the IoT is expensive. It will increase the acceptance and adoption of the IoT implementation in CSC. Practitioners must pay special attention to the highlighted barriers to the adoption of IoT. Hence, this study highlights the present barriers and provides the groundwork for future developments that might revolutionize the use of the IoT in cold SC. Although our research has shed light on significant insights into IoT implementation barriers within CSCs, it is imperative to acknowledge certain limitations and outline avenues for future exploration. Our primary constraint lies in the indirect nature of our investigation as we could not directly observe industry-specific barriers. Instead, we thoroughly examined existing IoT studies on CSCs. Another limitation of this research is the lack of digital archives, such as Scopus and the ACM Digital Library, in the systematic literature review. However, we selected respectable scientific archives, such as IEEE Xplore, Springer, Elsevier, Taylor & Francis, Wiley Online Library, ResearchGate, and Science Direct. These repositories provide high-quality research. The references of selected publications were traced using all relevant studies using the backward snowballing method. Identifying thirteen major IoT implementation barriers is the foundation, but it is essential to recognize that additional barriers may surface during real-world implementation. To mitigate potential bias, we sought input from thirty experts. However, the evaluation by these topic experts introduced a degree of subjectivity to our study’s final conclusions. Enhancing the robustness of our findings involves soliciting inputs from an extensive array of industry firms. Increased participation would validate our identified barriers and enrich the diversity of perspectives, thereby improving the overall quality of our study. Furthermore, our study’s focus on CSC prompts the need for broader investigations into other sectors, such as the food supply chain, agriculture, and perishable goods. Conducting additional research in these areas will provide a more comprehensive contextual understanding and allow for the generalization of our findings beyond the specific case at hand. Additionally, alternative methods should be explored to test the hypotheses regarding the interrelationships among IoT barriers. Although our research has made valuable contributions, addressing these limitations and pursuing future avenues of exploration will undoubtedly refine and extend the scope of our understanding of IoT implementation challenges in various industries. Supporting information S1 Data. https://doi.org/10.1371/journal.pone.0304118.s001 (XLSX) TI - Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approach JF - PLoS ONE DO - 10.1371/journal.pone.0304118 DA - 2024-07-12 UR - https://www.deepdyve.com/lp/public-library-of-science-plos-journal/analysis-of-internet-of-things-implementation-barriers-in-the-cold-Mxf09uEYuE SP - e0304118 VL - 19 IS - 7 DP - DeepDyve ER -