1 Introduction

The business model innovation (BMI) describes the efforts made by the business for finding new business logic (Casadesus-Masanell and Zhu 2013). BMI, manifested as new ways of value creation for the stakeholders (Casadesus-Masanell and Ricart 2010; Casadesus-Masanell and Zhu 2013; Landau et al. 2016; Lindgardt et al. 2009), is driven by a change in one or more components of the business model (Chesbrough 2010; Demil and Lecocq 2010; Mitchell and Coles 2003; Teece 2010).

In this respect, BMI not only covers both meanings of BMD (Business Model Development and Business Model Design) (Cortimiglia et al. 2016; Laudien and Daxböck 2016), but also is considered a complement to NPD (New Product Development) (Amit and Zott 2012; Chesbrough 2010; Teece 2010). In addition, BMI is seen as the source of new business opportunities and a key source of competitive advantage (Chesbrough 2007; McGrath 2010; Teece 2010; Venkatraman and Henderson 2008). Change in the business perspective, made by technological change or the emergence of new technology, forms the basis of BMI (Cortimiglia et al. 2016). In other words, technological change can lead to sustainable business growth when coupled with an innovative business model (Keskin et al. 2016). One of the technological changes is the emergence of IoT(Internet of Things) technology, among others. IoT is regarded as a global infrastructure for the information society that makes it possible to offer advanced services resulting from the connection of physical and virtual things based on ICT(Information and Communication Technology) (ITU 2012).

This technology will significantly impact almost every industry (Fugl 2015), thanks to its potential for creating new markets and changing competitive business conditions (Metallo et al. 2018). Success in value creation in IoT hinges on innovating business models in the context of this technology (Metallo et al. 2018).

Despite the emphasis placed on business model innovation in IoT (Leminen et al. 2012; Metallo et al. 2018; Westerlund et al. 2014), so far, few studies have been conducted in this area (Rai and Tang 2014; Tesch et al. 2019; Westerlund et al. 2014; Wirtz et al. 2016). The lack of extensive studies in this area has resulted in a poor understanding of the role and significance of BMI in IoT (Tesch et al. 2019). This poor understanding has not only been reported as the main reason for the failure of IoT projects (Andersson and Mattson 2015; Schneider and Spieth 2013) but has reduced the speed of developing this technology, as well (Bilgeri and Wortmann 2015).

It must be mentioned that the main focus of previous studies in the IoT domain has been on a generic explanation of BMI in this domain (Tesch et al. 2017). Hence, its key aspects, including identifying value creation opportunities, offering value creation ideas based on the identified opportunities, and proposing and evaluating business models according to those ideas, have remained untouched (Burkhart et al. 2011; El Sawy and Pereira 2013; Veit et al. 2014). Meanwhile, some studies have concentrated on BMI analysis in the context of a specific market or industry (Massa and Testa 2011; Yunus et al. 2010).

However, to the best of our knowledge and according to Fleisch et al. (2015), no research study has so far addressed the innovative business models of the telecom industry given the emergence of IoT, particularly in the last mile connectivity section, which refers to the final leg from the smart things to the internet network. However, in the telecommunications industry, IoT has indeed not only emerged as the creator of growth opportunities in the ICT domain (OCDE 2015), but also the highest potential for value creation in IoT has been anticipated with access to the internet and its integrated services (Burkitt 2014), which is the core business of ISPs(Internet Service Providers) (Künsemöller et al. 2013). The ISPs’ success in creating value in the IoT domain will also depend on evolving and innovating their current business model (Sadowski et al. 2016; Sun et al. 2012).

The current business model of ISPs in the scope of connectivity service providing according to Hedman and Kalling’s (2003) ontology was described by Hanafizadeh et al. (2019). However, as mentioned earlier, no study has been conducted in the area of ISPs’ innovative business model driven by IoT (Fleisch et al. 2015). Despite the failure to propose ISPs’ business models driven by IoT, connectivity service providers (like ISPs) are considered as a part of the IoT value chain (ITU 2016b); thus, their presence in the IoT value chain is required.

Consequently, given that the highest potential for value creation in IoT (Burkitt 2014) is related to the core business of ISPsFootnote 1 (Künsemöller et al. 2013), the importance of their presence in the IoT value chain (ITU 2016b), the dependency of their success in creating value in the IoT domain on innovating their current business model (Sadowski et al. 2016; Sun et al. 2012), and the fact that there is no report of their innovative business model impacted by IoT (Fleisch et al. 2015), this research focuses on implementing BMI, driven by IoT, in the ISPs’ business context. Therefore, the research question (RQ) is posed as follows:

RQ: What will the innovative business model of ISPs driven by IoT technology be like?

It should be mentioned that the scope of ISPs’ business in the telecom industry is very vast, and in offering connectivity services, it supports all three types of WA(Wired Access), FWA(Fixed Wireless Access), and MWA (Mobile Wireless Access) services. The present study specifically focuses on proposing innovative business model(s) of WA + FWA providers driven by IoT. Hence, providing MWA is out of the scope of the current study and can be included in the working scope of MNOs (Mobile Network Operators).

Accordingly, the main scientific contributions of this study are identifying possible ideas for the value creation of ISPs (WA + FWA providers) in the IoT domain and explaining the relevant business models. Another potential contribution is validating the ideas and the proposed business models together with materializing them. Besides, explaining the implementation of the whole steps of the BMI process driven by IoT in the context of ISPs can be regarded as a proper guideline for implementing BMI driven by this technology in other businesses of the telecom industry.

Implementing BMI driven by IoT, in the ISPs’ context, reduces constraints imposed by the paucity of knowledge in BMI (Schneider and Spieth 2013), IoT (Patel 2016), and IoT-driven BMI (Wirtz et al. 2016), and provides a starting point for further studies in identifying new ways of value creation in other businesses in the telecom industry and even other industries influenced by this technology. The development of such a model can also help ISPs’ managers to anticipate and identify the IoT-based opportunities (Moqaddamerad et al. 2017) and respond to them in a novel way (Patel 2016).

The outline of the remainder of this paper is as follows: in Sect. 2 (Literature Review; Data Gathering), the relevant studies are reviewed. In Sect. 3 (Research Methodology), the research method of the present study is elaborated. Section 4 (Data Analysis) focuses on the implementation of the BMI process. Section 5 presents the discussion, and Sect. 6 is devoted to the conclusion of the results, implications, and outlook.

2 Literature review

Implementing BMI driven by IoT in the ISPs’ business context requires an understanding of the literature of three different areas, namely ISPs’ business, IoT technology, and the BMI concept. To gain an insight into the literature on ISPs’ business, a recent study conducted by Hanafizadeh et al. (2019) is cited, which has reviewed all research related to the ISPs’ business.

Therefore, the following two subsections focus solely on reviewing the literature on IoT technology and the BMI concept.

2.1 IoT literature review

To review the literature on IoT, first, we collected the studies conducted in this area (see Sect. 3). In order to enhance the accuracy of extracting secondary data, we logically classified the studies related to the present research through content analysis using the open coding technique (Hsieh and Shannon 2005) by Atlas -Ti software (“Appendix 1”).

As a result of conducting content analysis, the research on IoT was divided into the following six main classes (Table 1), including; IoT recognition, IoT architecture, IoT enabler technologies, IoT ontologies, the importance of innovating business models in the IoT domain, and IoT business components.

Table 1 The results of IoT literature review

In the following, the findings of studies in each of the six mentioned classes are presented.

2.1.1 The first class: IoT recognition

This class was subdivided into five sub-classes, including; definition and advantages of IoT, types of IoT, IoT potentials, IoT uncertainties, and IoT usecases.

The studies in definition and advantages of IoT sub-class, while offering various definitions of IoT, regard its standard and global definition as developing. In addition, they focus on the individual and corporate advantages of this technology, such as enhancing efficiency, intelligent management of products, increasing scalability and efficiency of the business, optimizing the processes, decision analysis based on the sensor, and finally, improving personal life quality.

The studies grouped in the types of IoT sub-class address the meaning and difference between the two main applications of the IoT technology, including IIoT (Industrial IoT) and CIoT (Consumer IoT).

In studies of IoT potentials sub-class, the focus is on the different growth opportunities based on the IoT technology for various businesses. Using those opportunities in each business depends upon the type of the business’s current value proposition, its key capabilities, and, most importantly, its ability to understand this new technology.

The studies in the IoT uncertainties sub-class, while defining uncertainty and its origins, explain the existence of uncertainty in IoT and focus on the main areas of uncertainty in IoT and its relevant areas (if any).

In the IoT usecases sub-class, studies address the characteristics, requirements, advantages, and limitations of the top ten IoT usecases according to the statistics presented by IoT analytics (2018).

2.1.2 The second class: IoT architecture

The studies in this class introduce ten important architectures in the area of IoT, as presented in Table 2.

Table 2 Kinds of IoT architecture

2.1.3 The third class: IoT enabler technologies

This class was subdivided into three sub-classes, including cellular technologies, LPWAN (Low Power Wide Area Network) technologies, and other technologies.

The studies in the cellular technologies sub-class focus on the characteristics of cellular technologies with special emphasis on the features of 5G technology. In other words, while pointing to the advantages of 5G technology as an enabler of IoT, including low energy use, high reliability, wireless communication coverage, low delay time, high throughput, and high scalability, these studies address some challenges of using this technology in IoT domain such as scalability and network management, interoperability between HetNet (Heterogeneous Network), guaranteeing security and privacy, and lack of compatibility and appropriate standards between different systems.

In the studies of LPWAN technologies sub-class, the capabilities of these technologies are presented as the connectivity need of IoT due to four key features, namely, long range, low cost, low bit rate, and low power consumption.

In the studies of the other technologies sub-class, the name of other IoT enabler technologies, including mmWave (millimeter Wave), fiber optic, Het-Net, D2D(Device to Device) communication, MTC (Machine-Type Communication), WSDN (Wireless Software-Defined Networks), SSIM (Spectrum Sharing and Interference Management), MEC (Mobile Edge Computing), WNFV (Wireless Network Function Virtualization), MCC (Mobile Cloud Computing), big data, and terrestrial, are presented, and the characteristics of some of them are mentioned.

2.1.4 The fourth class: IoT ontologies

The studies of this class introduce the ontologies in the area of IoT, as presented in Table 3.

Table 3 Types of IoT ontologies

2.1.5 The fifth class: the importance of innovating business model in the IoT domain

In the studies conducted in this class, while pointing to the concept of ecosystem, stressing the ecosystemic nature of IoT technology and value-creating roles in IoT ecosystem, the focus is on the necessity of innovation in the business model at the ecosystem level, as the requirement for the value creation of businesses in the IoT domain.

2.1.6 The sixth class: IoT business components

This class of studies describes some business components in the IoT domain as following:

The customer segmentation of IoT services is B2C and B2B (Leminen et al. 2012) or three groups of ordinary, vertical market, and global market customers (Ju et al. 2016). According to Turber and Smiela (2014) and Qin and Yu (2015), customer relationship methods in all IoT-related businesses involve co-creation, self-service communication, and fast feedback. Ju et al. (2016) introduced the internet and mobile as the IoT domain’s service distribution channels. Also, software providers, data analysis firms, and equipment manufacturers can be considered the IoT’s specialized key partners (Bucherer and Uckelmann 2011; Dijkman et al. 2015; Li and Xu 2013). Reza-Ullah et al. (2014) reported that the interaction among the IoT ecosystem members is of coopetition type, which means cooperation and competition beside each other. The types of value proposition in IoT for different industries can be convenience, performance, customization, and share (Dijkman et al. 2015; Leminen et al. 2012; Li and Xu 2013; Qin and Yu 2015; Sun et al. 2012). The general format of the cost structure in the IoT domain has been reported as IT cost, the required infrastructures’ cost, and the maintenance cost (Dijkman et al. 2015; Ju et al. 2016; Li and Xu 2013; Sun et al. 2012). According to previous studies, the IoT domain’s revenue streams can be in the form of a subscription fee, service fee (Bucherer and Uckelmann 2011; Dijkman et al. 2015), profit sharing, or products sale (Ju et al. 2016). On the other hand, the revenue streams of ISPs in the IoT domain have been reported as users’ subscription fees, service fees, and information-based service sales (Camponovo and Pigneur 2003; Coucheney et al. 2014). In addition to FAB (Fulfillment, Assurance and Billing) processes (Kelly 2003), the key processes of the IoT domain involve product promotion, platform development, partner management, big data analysis, and platform and resources integration (Dijkman et al. 2015; Qin and Yu 2015). According to VCT (Value Configuration Theory), the value configuration type of the telecom industry businesses in the IoT domain can be considered as value shop, due to the provision of supporting capabilities, and value network, due to the importance of value net model in this industry (Qin and Yu 2015). Finally, the key resources of the IoT domain, according to RBT (Resource Based Theory) (Bilgeri et al. 2015), include sensors, cloud service, IoT specialized network, and the capabilities required for data analysis (Ju et al. 2016), that, in sum, can be considered as three factors of software, information, and customer-required resources (Bucherer and Uckelmann 2011; Qin and Yu 2015; Sun et al. 2012).

2.2 BMI literature review

To review BMI literature, first, the studies conducted in this area were collected (see Sect. 3). To increase the accuracy of secondary data extraction, the focus was on the logical classification of the studies related to the present research through content analysis using the open coding technique (Hsieh and Shannon 2005) by Atlas-Ti software (“Appendix 2”).

As a result of conducting content analysis, the research on BMI was divided into four classes as follows: the concept of BMI, drivers of BMI implementation, advantages of BMI implementation, and BMI implementation procedures (Table 4).

Table 4 The results of BMI literature review

In the following, the findings of the studies in each of the four classes are presented.

2.2.1 The first class: concept of BMI

The studies in this class focus on the concept of BMI. They define it as business guidance through a new method, finding a new business logic, and describing new value creation methods for the stakeholders.

2.2.2 The second class: drivers of BMI implementation

The studies of this class address the factors such as globalization, changing laws, ICT development, and social and organizational factors as the BMI implementation drivers. In this regard, technological change is introduced as the main driver of BMI implementation. Success in the face of technological changes depends upon the provision of an innovative business model.

2.2.3 The third class: advantages of BMI implementation

The studies of this class concentrate on the necessity of BMI implementation. They consider BMI implementation as the origin of new business opportunities, the key source of competitive advantage, driver of profit enhancement, harnessing competitive threats, reducing costs, improving strategic flexibility, using new market opportunities, and reducing investment risk.

2.2.4 The fourth class: BMI implementation procedures

In this class, studies address the procedures of BMI implementation. Some studies have implemented BMI as a process (Frankenberger et al. 2013; Laudien and Daxböck 2016; Teece 2010). Frankenberger et al. (2013) argued that successful BMI implementation depends upon a four-stage iterative process including initiation, ideation, integration, and implementation (evaluation). Their proposed BMI process has been used in many studies as a framework of BMI implementation (Tesch et al. 2019). The main focus of the studies using the proposed process of Frankenberger et al. (2013) has been on the two initial stages, i.e., initiation and ideation (Bilgeri et al. 2015), and the lowest attention has been paid to the two final stages, i.e., integration and implementation (Tesch 2016; Veit et al. 2014). Besides, in the implementation stage, little emphasis has been put on the evaluation of the proposed business model(s) (De Reuver et al. 2013), while evaluation plays a significant role in promoting the validity and capability of the proposed business model(s) (Bouwman et al. 2012) as well as their successful implementation (Haaker et al. 2017). Therefore, in BMI implementation, particularly in new areas like IoT where there are many assumptions and uncertainties, performing an evaluation method, as part of the BMI process (Burkhart et al. 2011; Veit et al. 2014), is more valuable than implementing the BMI process alone (Tesch 2016).

3 Research methodology

In this section, the different aspects of the research, inspired by Saunders et al. (2009), are elaborated on as follows.

The philosophy of the present research is interpretivismFootnote 2 due to the study’s dependence upon the experts’ interpretations, description, experiences, and views, and the limited knowledge on the areas of IoT (Patel 2016) and BMI (Schneider and Spieth 2013), and BMI driven by IoT (Wirtz et al. 2016).

The present research employed a deductive-inductive approach because, on the one hand, it used Hedman and Kalling’s ontology as the business model framework (deductive), and on the other hand, it collected data and discovered the relationship among them to explain each component of Hedman and Kalling’s model (inductive).

To identify the appropriate strategy to elaborate on the innovative business model(s) of ISPs driven by IoT, from among the studies conducted on how BMI is implemented (the 4th class of Table 4), the four-stage process proposed by Frankenberger et al. (2013), as the most popular process (Tesch et al. 2019), was selected as follows.

  • In the initiationFootnote 3 stage, after identifying all drivers of BMI and selecting the driver of BMI implementation in this study, i.e., the emergence of IoT technology as a technological driver of BMI, the focus will be on identifying the different aspects of the selected driver.

  • In the ideation stage, the new business logic of ISPs driven by IoT will be explained based on business model thinking in the form of new ideas. The definition of new business logic influenced by IoT requires a change in the current business logic and a shift from the business level to the ecosystem level (Westerlund et al. 2014). Therefore in this stage, considering the current capabilities of ISPs, after identifying the ISP’s value creation opportunities in the IoT ecosystem, the best compatible solutions are proposed as the ideas of ISP’s value creation in the IoT ecosystem.

  • In the integration stage, the ISP’s business model influenced by IoT is explained in accordance with each of the ideas outlined in the ideation stage. In other words, after selecting an appropriate ontology in the IoT domain, at first, the ISPs’ business model components driven by IoT are described according to the selected ontology based on secondary data and then, the ISP’s business model components, related to each of the proposed ideas are elaborated based on the primary data and inspired by the described factors.

  • The evaluation stage of the BMI process, driven by IoT, focuses on evaluating the proposed business model(s) outlined in the integration stage. Due to the following purposes, using stress testing approach (STA) is recommended to evaluate the business model (Bouwman et al. 2012; Haaker et al. 2017); (1) the integration of BMI and STA in the field of IoT (Bouwman et al. 2009, 2012) enhances the credibility and robustness of the proposed business model(s) (Tesch 2016), (2) the use of STA can account for the relationship between the components of the proposed business model and the existing uncertainties, (3) the result of STA analysis can help one select a suitable model from among several innovative business models (Haaker et al. 2017) and, (4) it can provide an acceptable vantage point for implementing the proposed business models prior to any investment (Christensen et al. 2016). Therefore in this study, STA analysis is conducted in the evaluation stage of the BMI process as follows; at first, after identifying all uncertainties in the IoT domain, the IoT uncertainties affecting ISPs’ business and their anticipated outcomes are identified. Then, the impact of the selected uncertainties on the proposed ISPs’ business model components is explained.

The present study is a qualitative one from different perspectives: first, due to the dependency of this study on the experts’ knowledge and experiences in the different areas, the collected data are verbal that are analyzed qualitatively. Second, the research question has an explorative nature, answering which requires qualitative data analysis. Finally, in this study, predicting the behavior of ISPs’ business in the IoT ecosystem is rather difficult due to the variety of existing variables (Coze 2005).

The research time span is beyond a cross-section; since descriptive and explanatory studies of a specific phenomenon in a given time interval are considered cross-sectional studies, and value creation of ISPs in the IoT ecosystem is an evolutionary approach, the time span required to explain this phenomenon is beyond a cross-section and involves near future.

To elaborate on the research data collection and data analysis methods, it should be mentioned that the novel and multi-dimensional aspect of the present study and lack of sufficient knowledge in the domains of IoT (Patel 2016), BMI (Schneider and Spieth 2013), and BMI implementation driven by IoT (Wirtz et al. 2016) require the use of several data sources including primary and secondary data for the implementation of the four stages of BMI in this study. In the following, the data collection and analysis methods for both data types are presented as two successive steps.

3.1 The first step: secondary data collection and analysis method

Implementing BMI driven by IoT in the ISPs’ business context requires access to the secondary data of three different areas, i.e., ISP business, IoT technology, and BMI concept. To access the secondary data on the ISPs’ business, Hanafizadeh et al.’s (2019) study was used. Thus, we addressed the secondary data collection methods of IoT and BMI domains in what follows.

To review the research undertaken in the IoT domain, we searched google scholar, web of science, and Scopus search engines using the following keywords in the title, abstract, and keywords of the articles: Internet of things, Business model of IoT, IoT in the telecom industry, ‌Business model of IoT in the telecom industry and Value creation of ISPs in IoT domain. Therefore, articles extracted via scientific databases such as ProQuest, Science Direct, Emerald, Springer, IEEE Explore, etc., were taken into consideration. We determined the timeframe between 2000 and 2020 for choosing the articles. Hence, the number of research undertaken in the mentioned domain amounted to 168. In order to select the relevant articles, we performed the next step filtering based on the following criteria:

  • We did not consider the articles in which the term “internet of things (IoT)” was randomly used.

  • We selected the articles whose primary focus was on evaluating the impact of IoT on the industries’ value creation.

  • Our specific focus was on articles that sought to develop or describe a business model in IoT in a particular industry, especially in the telecom industry.

    According to Fig. 1, the result of the mentioned filtering was 112 articles that focused on the IoT domain.

    To review the research undertaken in the BMI domain, in the same search engines, databases, and the timeframe, we searched for the following keywords in the title, abstract, and keywords; Business model innovation (BMI), BMI implementation methods, and BMI implementation in IoT. Hence, the number of research undertaken in the mentioned domain amounted to 98. In order to select the relevant articles, we performed the next step filtering based on the following criteria:

  • We excluded the articles in which the term BMI was randomly used.

  • We selected the articles whose main focus was on BMI in different businesses.

  • Our specific focus was on articles that sought to implement BMI, especially in the IoT domain.

Fig. 1
figure 1

Selection process of the research in the IoT domain

According to Fig. 2, the result of the mentioned filtering was 47 articles that focused on the BMI domain.

Fig. 2
figure 2

Selection process of the research in the BMI domain

The secondary data analysis method was a content analysis of studies on IoT and BMI domains and then, descriptive analysis of studies related to each class or subclass related to both domains. In other words, for logically segmenting the collected data to enhance the accuracy of extracting the secondary data, at first, content analysis was performed through the open coding method (Hsieh and Shannon 2005) for each of the mentioned domains. Then, the studies of each segment (class or sub-class of Tables 1 and 4) were described based on the proposed pattern (Smith and Firth 2011).

The steps of content analysis in both domains are as follows:

  • Studying the title, abstract, and introduction of the selected articles to determine each study’s main class in each domain;

  • To determine the sub-classes of each class, the entire text of the selected articles was studied, and coding was done based on the implications of the study.

  • Since some articles were associated with more than one class or sub-class, the relationship between classes and sub-classes, if any, had to be elaborated in this step.

To ensure the reliability and integrity of the coding process, the articles were evaluated and coded separately by authors. The final coding was carried out after ensuring consistency.

3.2 The second step: primary data collection and analysis method

Given the novelty of IoT technology, the scant applied research in BMI implementation driven by IoT (Wirtz et al. 2016), and hence, deficiencies in the secondary data, it was inevitable to interview the experts to gather the knowledge needed to complete the implementation of the stages and substages of the BMI process. To this end, an attempt was made to consult the experts specialized in technical, industry, business, security, marketing, and regulation from different value networks in the two areas of IoT technology and ISP business. Working in the BMI projects (Laudien and Daxböck 2016) or participating in the IoT ecosystem were determined as criteria for selecting the experts. Accordingly, twenty-three experts from the mentioned areas (11 cases) were selected using the snowball sampling method, according to Table 5.

Table 5 The characteristics of the selected experts

The interviews were semi-structured. The interview questions for each stage of the BMI process were specific. Due to the iterative nature of the BMI process (Frankenberger et al. 2013), the number of interviews was more than the BMI stages. The same questions were asked from all participants, and the experts were free to provide their answers in any possible way. The participant's responses to the interview questions were recorded, and appropriate notes were taken in the form of voice or text.

Due to the variety of the interview questions, we will present the questions related to each stage of the BMI process in Sect. 4, describing the four stages of this process.

In order to analyze the collected responses to the interviews related to each stage of the BMI process, interpretative analysis was used based on the proposed pattern (Schmidt 2004) as follows; the interview transcripts were reviewed several times, and redundant points were omitted in each review while important and non-repetitive points were highlighted. The previous literature review yielded some insights into coding the themes and concepts (Vaismoradi 2016). Accordingly, after screening out the contents of the interviews, the codes were defined. Obviously, in summarizing the results, the coding sequence of the highlighted themes was taken into consideration. Accordingly, the concepts of the text content were analyzed and interpreted. Finally, peer review was performed to triangulate the analysis.

Since the type of coding performed when analyzing the responses related to each stage of the BMI process was different, in Sect. 4, in the analysis of the relevant responses, we will explain the codes related to the interview responses of each stage of the BMI process in detail.

To summarize the points mentioned so far, the stages and sub-stages of implementing the BMI and STA consolidated process, the required data, and the data collection and analysis method are presented in Table 6.

Table 6 The stages of BMI (Frankenberger et al. 2013) and STA (Haaker et al. 2017) consolidated implementation

4 Data analysis: BMI process implementation

Several drivers drive the business model innovation process. However, in this research, more attention is paid to the technological origin of the drivers that result from the emergence of IoT technology. As explained in the methodology section, first, the BMI process goes through a way that the opportunities driven by IoT in the ISPs’ business are identified. Then, ideas are presented to make the most advantage of these opportunities. These ideas are synergistically integrated to create new business models for ISPs in the IoT domain. Ultimately, the proposed business models are evaluated. The details of these steps are as follows:

4.1 Initiation (identification)

This stage focuses on identifying the driver of BMI implementation in this study and the different aspects of the selected driver.

4.1.1 Identifying the driver of BMI implementation

Generally, technology push or market pull can be considered BMI implementation drivers (Tesch et al. 2017). In other words, BMI is either creatively implemented by predicting or estimating the market needs or imposed by the business environment after the need arises (Casadesus‐Masanell and Zhu 2013; Sorescu et al. 2011). In this regard, the technological change is deemed to be the primary driver of BMI (Calia et al. 2007; Chesbrough 2007; Chesbrough and Rosenbloom 2002; Whitmore et al. 2015), and BMI implementation has come to be known as a prerequisite for business success in the context of technological changes (Keskin et al. 2016). It is worth mentioning that BMI implementation drivers are not confined to technological change; globalization, changes in law and regulation, the promotion of information and communication technology, and social and organizational factors have also been identified as BMI drivers (Casadesus-Masanell and Ricart 2010).

In this study, we focused on the main driver of BMI, technological change, i.e., the emergence of IoT technology. The reason for focusing on this technology is its high capability to create new markets, growth potentials, and changing competitive business conditions (Metallo et al. 2018) in many industries, mostly the telecommunication industry. In other words, in the telecommunication industry, IoT has not only emerged as the creator of growth opportunities in the ICT domain (OCDE 2015), but also the most potential for value creation in IoT has been anticipated in relation to access to the internet and its integrated services (Burkitt 2014), which is the core business of ISPs (Künsemöller et al. 2013).

4.1.2 Identifying the different aspects of the selected driver

This stage focuses on identifying the driver of BMI implementation in this study and the different aspects of the selected driver

In this sub-stage, the focus is on identifying the important aspects of the selected driver, the IoT technology, required for BMI implementation in the context of ISP’s business.

Given the complex technological nature of IoT, successful implementation of this technology relies on the collaboration and participation (Saarikko et al. 2017) of IoT value chain members, leading to the creation of an IoT ecosystem. Lucero’s research (2016) indicated that value creation in the IoT domain is contingent on the interaction of the four roles involved in the IoT value chain, including components and hardware provision, connectivity management, application enablement, and solution provision (Lucero 2016). Based on the mentioned research, in this study, the IoT value chain members whose participation leads to IoT ecosystem creation are determined as follows:

  • Design equipment + Implement and make equipment + Repair and sell equipment as components and hardware provision in Lucero’s research

  • Service operation and maintenance + Service providing as connectivity management and application enablement in Lucero’s research

  • Solution providing as solution provision in Lucero’s research

On the other hand, any IoT architecture layer can be considered as a source of value creation in this technology (Turber et al. 2014). To the authors’ best knowledge, among the types of IoT architectures (as shown in Table 2), the five-layer IoT architecture (Tan and Wang 2010; Wu et al. 2010) illustrates the different dimensions of this technology more lucidly. This architecture, known as IoT basic architecture (Khan et al. 2012), consists of five layers, including the perception layer, the network layer (communication layer), the middleware layer (information processing), the application layer, and the business layer. The main responsibility of each of the five layers mentioned is as follows:

  • The perception layer collects useful information from things or the environment.

  • The network layer or communication layer acts as an information bridge to provide a communication link between the sensing and service layers for the data transmission.

  • The middleware layer or information processing layer can process the information and make decisions without knowing the exact use of the application layer.

  • The application layer’s primary responsibility is to ensure effective communication among objects and build a reliable bond.

  • The business layer manages the whole IoT system, including applications, business and profit models, and users’ privacy.

After identifying the two important aspects of the IoT technology; the IoT ecosystem members based on Lucero’s study (Lucero 2016) and selecting the appropriate IoT architecture (Tan and Wang 2010; Wu et al. 2010), in the next stage of the BMI process, the innovative ideas of value creation of ISPs driven by the IoT are explained.

4.2 Ideation

In the ideation stage of the BMI process, driven by IoT, the new business logic of ISPs will be explained based on business model thinking in the form of new ideas. The definition of new business logic driven by IoT requires a change in the current business logic and a shift from the business level to the ecosystem level (Westerlund et al. 2014). The current business logic of ISPs without IoT, elaborated by Hanafizadeh et al. (2019), only involves how the value is created at ISPs’ business level in the telecom industry. In contrast, the definition of the new business logic of ISPs in the IoT domain involves ISPs’ value creation ideas at the IoT ecosystem level.

Explaining the ideas of ISPs’ value creation in the IoT ecosystem is undoubtedly dependent on the identification of their value creation opportunities in the IoT domain as well as their current capabilities and value creation methods, reported in the form of providing connectivity services, cloud computing services and content services (Altmann 2000; European Commission 2016; GSMA 2016).

In this respect, to elaborate on the ISPs’ value creation ideas in the IoT domain, we first focus on identifying ISPs’ value creation opportunities in the next sub-stage.

4.2.1 Identifying the ISPs’ value creation opportunities in the IoT domain

Research on the possibility of ISPs’ value creation opportunities in IoT has only dealt with the provision of connectivity services (Burkitt 2014), failing to provide relevant details. This sub-stage focuses on identifying all the opportunities for ISPs’ value creation in the IoT ecosystem. The ISPs’ value creation opportunities in the IoT ecosystem can be identified based on the contribution degree of ISPs, made by the roles involved in the IoT ecosystem for value creation in each layer of the IoT architecture. Therefore, the ISPs’ value creation opportunities in the IoT ecosystem, explained by Table 7, are elucidated based on the identified IoT ecosystem roles (Lucero 2016), the appropriate IoT architecture (Tan and Wang 2010; Wu et al. 2010), the three conditions of innovative opportunities selection in each businessFootnote 4 (Sarasvathy 2001) and the current value creation capabilities of ISPs (Altmann 2000; European Commission 2016; GSMA 2016). The results emanating from the experts’ interviews were also taken into consideration. Therefore experts were asked to answer the following questions:

Table 7 ISP’s value creation opportunities in the IoT ecosystem

Q2.1

Given the current value creation capabilities of ISPs (Altmann 2000; European Commission 2016; GSMA 2016), in what form of the six roles in the IoT ecosystem and in which layer of IoT architecture can ISPs create value?

Q2.2

Given the three conditions of determining value creation opportunities (Sarasvathy 2001), what is the fitness degree of ISPs’ current capabilities with each of the opportunities identified for value creation in the IoT ecosystem based on the weights 0 to 3?

Q2.3

Among the value creation opportunities for ISPs in the IoT ecosystem, which one has the potential to be realized as a core serviceFootnote 5, and which one can be considered as an enhancing service?Footnote 6

To analyze the Q2.1 responses, using interpretative analysis (Schmidt 2004), after screening out the contents of the interviews, 24 codes corresponding to each of the 24 cells of Table 7 were defined.

Based on the frequency count of the codes in each cell, we concluded about the presence or absence of ISPs’ value creation opportunities in each of the 24 cells of Table 7. Accordingly, the various value creation opportunities of ISPs were identified as each member of the IoT value chain in each layer of the IoT architecture.

After summing up the Q2.1 responses, the answers to the two questions Q2.2 and Q2.3 were analyzed using the codes defined in the legend.

It should be mentioned that the weights mentioned in Q2.2 are effective in proposing more proper ideas for ISPs’ value creation in the IoT domain. As mentioned before they were only defined for determining the fitness of the current capabilities of ISPs to their identified value creation opportunities in the IoT domain (resulting from summing up the responses to Q2.1). Therefore, they are not related to the investments required, the human resources needed, interests predicted for the identified opportunities.

The results of the interview analysis, according to Table 7, indicates that the participation of ISPs in the form of the six mentioned roles in the IoT ecosystem for creating value in IoT architecture is as follows:

  • The current capabilities of ISPs in providing connectivity service (Künsemöller et al. 2013) lead to their high participation (score 3) in the connectivity layer of the IoT architecture in the form of two roles; connectivity service providing as a core service (◼) and connectivity service operation & maintenance as an enhancing service (✱). As a result, there is a great potential to create value in these areas.

  • Medium participation (score 2) of ISPs in the IoT ecosystem was considered in the role of cloud service providing as a core service (◼) and three roles of connectivity solution providing, cloud service operation & maintenance, and data analytics service providing as enhancing services (✱). ISPs have a high degree of participation in providing technical solutions to their clients’ IoT networks (Score 3). However, in providing business solutions, ISPs need access to their customers’ IoT network data. They also need to have mastery over their B2B customers’ industry and, consequently, consultants from the industry in question. Since ISPs’ participation in providing a business solution is not high, their participation in solution providing is deemed medium (score 2) and is considered in the form of an enhancing service (✱).

  • Low participation (score 1) of ISPs in the IoT ecosystem was considered in the roles of repair and sell IoT equip., repair and sell connectivity equip., perception service operation and maintenance, cloud solution providing, and data analytics solution providing as enhancing services (✱).

Of course, ISPs’ no participation in design and manufacturing equip. in the IoT domain is predictable as this value creation method was not in the working scope of ISPs before the emergence of IoT (Altmann 2000; European Commission 2016; GSMA 2016).

Based on the identified value creation opportunities of ISPs in the IoT ecosystem, the next sub-stage focuses on elaborating their value creation ideas in the IoT ecosystem.

4.2.2 Elaborating the ISPs’ value creation ideas in the IoT ecosystem

Due to the paucity of reports on ISPs’ value creation ideas driven by IoT, for elaborating the mentioned ideas, considering the current capabilities of ISPs in value creation (Hanafizadeh et al. 2019) and their value creation opportunities in the IoT ecosystem (Table 7), experts were asked to answer the following question:

Q2.4

Considering the current capabilities of ISPs and their identified value creation opportunities, what are the best possible ideas for ISPs’ value creation in the IoT ecosystem?

Using interpretative analysis (Schmidt 2004), after screening out the contents of the interviews, the ISPs’ value creation opportunities in the IoT ecosystem were coded. The code sequences are presented in the conclusion. The results of the interviews analysis showed no consensus among experts on providing the best possible ideas for ISPs’ value creation in the IoT ecosystem. Therefore, given the iterative nature of the BMI process (Frankenberger et al. 2013) and perhaps the need to repeat the interview process, the interviews in this stage of the BMI process were repeated based on the questions raised to diminish the discrepancies. However, there were still some discrepancies, making it difficult to elaborate on the proposed ideas. Therefore, the Delphi method (Hallowell and Gambatese 2010) was used to reach a logical consensus over deciding the results of this stage because, in this case, all requirements for running the Delphi methodFootnote 7 were met. Hence, to elaborate on the best possible ideas for the ISPs’ value creation in the IoT domain, the points of disagreement resulting from the interpretive analysis of the interviews were provided to experts in the form of four decision options (Table 8). The experts were asked to choose from among the options and to give reasons for their choices.

Table 8 The decision options in ISPs’ value creation ideas in IoT ecosystem

It is worth mentioning that fifteen out of 23 available experts participated in this step. At most, ten rounds were specified as the number of rounds. At each round, the experts had to choose only one of the four options, being able to modify their choice based on the feedbacks and arguments provided by other experts. After seven rounds of discussion, the best possible ideas for ISPs’ value creation in the IoT ecosystem were provided as four ideas of choice C as follows:

The first possible idea: Connectivity S. P. + Technical solution P.

The second possible idea: Connectivity S. P. + Technical solution P. + Cloud S. P.

The third possible idea: Connectivity S. P. + Technical solution P. + Cloud S. P + Business solution P.

The fourth possible idea: Cloud S. P. + Technical solution P. + Business solution P.

The logic of proposing the four ideas of choice C as the possible ideas for ISPs’ value creation in the IoT domain, based on the identified opportunities, is as follows.

The start of ISPs’ value creation in the IoT domain was explained based on their key capability, which is connectivity service providing, focusing on the gateway (connectivity S. P. + technical solution P.). In continuation and as a result of providing connectivity service and gaining recognition in the IoT ecosystem, ISPs can move beyond the dumb pipe, as Delloitte (2015) puts it, and focus on providing value-added services. In this regard, the best option is to provide cloud services, in which ISPs also have valuable experiences. Therefore, focusing on providing cloud services, besides focusing on providing gateway, was the second value creation idea for ISPs in the IoT domain. Furthermore, as a result of providing cloud services and enabling the integration and access to their customers’ data, ISPs can focus on analyzing the aggregated data related to their customers to provide technical and practical solutions. Thus, focusing on providing business solutions in addition to providing gateway and cloud services was the third idea for ISPs’ value creation in the IoT domain. In order to identify all possible ideas for ISPs’ value creation, some ISPs may suffice to the existing communication networks to meet the connectivity needs of some IoT domain usecases, instead of investing in building an LPWAN network. For these ISPs, connectivity service providing is not considered an innovative value creation idea in the IoT domain. Their value creation in the IoT domain is defined based on the fourth proposed idea.

To complete the argument and the results presented, it should be noted that by proposing innovative ideas for value creation of WA + FWA providers in the IoT domain, this study aimed to suggest solutions based on their current capabilities to meet the specific needs of the IoT domain.

Based on the four identified ideas, the ISPs’ business models driven by IoT is explained in the next stage of the BMI process.

4.3 Integration

This stage of the BMI process focuses on explaining the ISPs’ business model influenced by IoT, according to each of the elaborated ideas, in accordance with substages in Table 6 as follows:

4.3.1 Selecting an appropriate ontology in the IoT context

Several studies have been carried out on the appropriate ontologies aimed at describing business models driven by IoT (see Table 3). Reviewing the mentioned studies illustrates that there is no consensus on the most appropriate IoT ontology. In other words, some of the studies (e.g., Chan 2015; Holler et al. 2014; Leminen et al. 2012; Li and Xu 2013; Qin and Yu 2015; Sun et al. 2012; Turber and Smiela 2014) have focused on presenting new ontologies in the field of IoT. Some other studies (e.g., Bucherer and Uckelmann 2011; Dijkman et al. 2015; Fan and Zhou 2011; Ju et al. 2016; Liu and Jia 2010) pointed to the inefficiency of existing ontologies for the following reasons (Ju et al. 2016) and accordingly proposed modifications in some of them (such as Canvas) to make them more suitable to IoT;

  • IoT’s need to focus on the ecosystem level, not the firm level (Turber and Smiela 2014)

  • The need of the IoT ecosystem’s nature to collaborate amid the competition with industries (Chan 2015) and to develop a shared value to motivate this type of collaboration (Bilgeri et al. 2015)

  • IoT’s need to diversify its activities, processes, required resources and create a network of actors (Leminen et al. 2015)

  • The possibility of earning money in the IoT domain through a direct or indirect exchange of information as a valuable asset (Bilgeri et al. 2015)

    Also, in one of the studies conducted in this field, the Value net model has been introduced as the appropriate ontology for the telecom industry (Qin and Yu 2015); however, this ontology and some other types of ontologies, such as the MOP model (Li and Xu 2013), lack the necessary details to account for the IoT technology’s key features (Ju et al. 2016). The results of some studies also indicate that the existing ontologies should meet two conditions to be used in the IoT domain as follows: (1) taking into account the ecosystem nature of the IoT (Turber and Smiela 2014) and hence value creation in the IoT ecosystem; and (2) taking into account data as a valuable asset which paves the way for value creation in business (Bilgeri et al. 2015).

    Based on the obtained results, in this research, to elaborate on the ISPs’ business model driven by IoT, a well-known existing ontology, Hedman and Kalling’s ontology (Hedman and Kalling 2003) was selected for the following reasons:

  • There is no consensus about the appropriate ontology specific to IoT, and it is still possible to use existing ontologies.

  • In this study, both conditions of using existing ontologies in IoT (Bilgeri et al. 2015; Turber and Smiela 2014) have been considered. In other words, in the ideation stage of the BMI process, the ISPs’ value creation opportunities were initially explained in the IoT ecosystem. Then, based on the identified opportunities, the possible ideas for the ISPs’ value creation were elaborated in the IoT ecosystem. Also, data was considered as a valuable asset with the ability to generate indirect revenue by incorporating business solutions providing, based on leveraging their customer data, in the ISPs’ value creation ideas in the field of IoT.

  • In addition, Hedman and Kalling’s ontology has also been used to explain the current business model of ISPs without IoT (Hanafizadeh et al. 2019). Therefore, its use in this research allows comparing the ISPs’ business model changes driven by IoT technology.

To describe the selected ontology, it should be mentioned that Hedman and Kalling (2003) consider the business model at four levels (market, offerings, activity & organization, and resources) and seven related components. These components that initiate with the market level comprise customers, competitors, value proposition, key activities, key resources, key suppliers, and the seventh dimension.

After selecting the appropriate ontology, the ISPs’ business model driven by the IoT is explained based on the selected ontology and corresponding to each of the four value creation ideas identified in the ideation stage.

4.3.2 Elaborating the ISPs’ business model influenced by IoT in accordance with each of the explained ideas

To elaborate on the ISPs’ business model in IoT, initially, their business components influenced by IoT are described based on the secondary data (the fifth class of Table 1) according to Hedman and Kalling’s ontology (Table 9).

Table 9 Describing the ISPs’ business components in the IoT domain

For elaborating the ISPs’ business model influenced by IoT, it is not possible to rely solely on the components described in Table 9 for the following two reasons:

  • First, in the secondary data, some business components of the ISPs in the IoT domain, including competitors, communication channels, key processes, key resources, and cost structure, are addressed generally concerning all industries, rather than specifically for the telecommunications industry.

  • Second, in the secondary data, the role of ISPs influenced by IoT in providing connectivity services has merely been pointed out (Burkitt 2014). There is no explicit reference to their role in other layers of the IoT architecture. It is, therefore, unclear whether the components described in the secondary data are exclusively related to the role of ISPs in providing connectivity services in the IoT area or whether another role for the ISPs has been selected but not explicitly addressed. Therefore, there is little reliability regarding the certainty or uncertainty and the adequacy or inadequacy of the components described in Table 9.

Accordingly, to explain the ISPs’ business model driven by the IoT, the selected experts were asked to explain the component of the ISPs’ business model driven by the IoT according to each of the four ideas presented, based on Hedman and Kaling’s ontology.

The number of interview questions (Q3.n) in this stage of the BMI process corresponds to Hedman and Kalling’s ontology components for each elaborated idea. The description of the ISPs’ business components in the IoT had yielded worthwhile ideas regarding themes and notions coding featured in the interviews. Hence, using interpretative analysis (Schmidt 2004), after screening out the contents of the interviews, the codes were defined based on the described ISPs’ business components (Table 9). Therefore, four business models based on the four ideas identified in the output of the ideation stage were explained as follows:

To explain the first business model based on the first idea (Fig. 3), the selected experts were asked to suggest all the components of Hedman and Kalling’s ontology corresponding to the ISPs’ value creation connectivity S. P. and technical solution P. The coding of the answers was extracted from Table 9 and the results were summarized based on the frequency count of the codes.

In explaining the second business model based on the second idea (Fig. 4), the experts were asked to explain all components of Hedman and Kalling’s ontology solely based on the ISPs’ value creation with regard to cloud service providing; because the second idea is the outcome of ISPs’ value creation based on the first idea plus their value creation on the basis of cloud service providing. Therefore, the explained components in blue were added to the business model components based on the first idea (Fig. 3) to explain the business model based on the second idea, as shown in Fig. 4.

To explain the third business model based on the third idea (Fig. 5), the experts were asked to explain all Hedman and Kalling’s ontology components solely based on the ISPs’ value creation concerning business solution providing. The reason was that the third idea of ISPs’ value creation has been proposed based on the second idea besides their value creation based on business solution providing. Hence, the explained components in green were added to the business model components based on the second idea (Fig. 4) to yield the business model based on the third idea presented in Fig. 5.

In explaining the fourth business model based on the fourth idea (Fig. 6), since the fourth idea was the result of ISPs’ value creation based on the third idea excluding their value creation based on connectivity service providing, it was sufficient to remove the components related to ISPs’ value creation based on connectivity service providing (explained by the experts in Fig. 3) from the third business model (Fig. 5). Thus, the business model based on the fourth idea was explained as indicated in Fig. 6.

Fig. 3
figure 3

The first of the proposed business models

Fig. 4
figure 4

The second of the proposed business models

Fig. 5
figure 5

The third of the proposed business models

Fig. 6
figure 6

The fourth of the proposed business models

Regarding the four proposed business models, it should be mentioned that the ISPs’ value creation in the IoT domain based on the connectivity service providing is justified when the ISPs create a distinct network specific to the IoT domain based on appropriate connectivity technologies for this area. For this group of ISPs, the three first ideas and hence, the three first proposed business models (Figs. 3, 4, 5) are applied. When the IoT connectivity requirements can be met by the existing ISPs’ network, connectivity service providing is not considered as an innovative value creation idea of the ISPs driven by the IoT. In this study, this condition is considered as the fourth idea and the fourth proposed business model (Fig. 6).

4.4 Evaluation

In this stage of the BMI process, to assess the robustness of the proposed business models, i.e., evaluation of the impact of IoT uncertainties on the components of the proposed business models, the STA method, adapted from Haaker et al. (2017), is used in accordance with sub-stages in Table 6 as follows.

4.4.1 Identification of the IoT uncertainties affecting ISPs’ business

Uncertainty refers to any change that may be unpredictable due to an absence of adequate information (Janasz 2009). Uncertainties driven by IoT technology, which are an integral part of this technology (Böhle 2011) and complicate the BMI process (Bilgeri and Wortmann 2017; Luchs et al. 2015), can be classified from different perspectives. Haaker et al. (2017) divided the IoT domain’s uncertainties into three categories: regulatory-related, technological, and market-related uncertainties. Brad and Murar (2014) reviewed the research related to IoT uncertainties and categorized them into four groups, including technological, sociological, legal, and other uncertainties unrelated to the three mentioned groups. Buntz (2015) also elaborated on ten types of the most important challenges and uncertainties in the IoT domain, ranking them according to their importance, while most were technological in nature.

The research results mentioned earlier show that the IoT uncertainties can be broadly classified into four groups, including technological, social, legal, and market-related categories. However, there is no report on the IoT uncertainties effective in the telecommunications industry.

Therefore, to elaborate on the IoT uncertainties effective in ISPs’ business in the telecom industry, experts were asked to answer the following questions:

Q4.1

Out of the uncertainties related to the IoT domain, what uncertainties affect the ISPs’ business?

Q4.2

What are the expected outcomes for each of the uncertainties elaborated in Q4.1?

Using interpretative analysis (Schmidt 2004), after screening out the contents of the interviews, to analyze the responses of Q4.1, the codes were defined based on the uncertainties reported in the three studies mentioned above. To analyze the responses of Q4.2, the codes were defined based on the items outlined as the outcome of each uncertainty elaborated in the analysis of the Q4.1 responses.

Centered on the results obtained through the experts’ consensus, IoT uncertainties affecting the ISPs’ business along with the anticipated outcomes were pointed out according to Table 10.

Table 10 Types of IoT uncertainties effective in ISPs’ business

According to Table 10, IoT uncertainties affecting ISPs’ business can be divided into two general groups, i.e., technological and legal. Evidently, both types of uncertainties also affect the market domain as they reduce market growth and market size; hence, they can be considered market-related.

After determining the uncertainties affecting ISPs’ business in the IoT domain, in the next sub-stage, the impact of these uncertainties on the proposed business models’ components (Figs. 3, 4, 5, 6) are elaborated.

4.4.2 Map the proposed business model components to the uncertainties and create a heat map

Footnote 8

Elaborating the impact of the selected uncertainties, based on their perceived outcome, on the components of the four ISPs’ business models in the IoT ecosystem (Figs. 3, 4, 5, 6), experts were asked to answer the following question:

Q4.3

What is the impact of each of the selected uncertainties given their expected outcomes on each component of the ISPs’ business models (Figs. 3, 4, 5, 6) based on Hedman and Kalling’s ontology?

To answer Q4.3, experts were asked to fill in Tables 11, 12, 13 and 14 cells with four codes 3, 2, 1, and 0 corresponding to red, yellow, green, and grey, which are defined respectively as high negative impact, low negative impact, positive impact, and no impact.

Table 11 The impact of the selected uncertainties on the components of the first of the proposed business models
Table 12 The impact of the selected uncertainties on the components of the second of the proposed business models
Table 13 The impact of the selected uncertainties on the components of the third of the proposed business models
Table 14 The impact of the selected uncertainties on the components of the fourth of the proposed business models

The results were summed up by counting the codes in each of the cells in Tables 11, 12, 13 and 14, which indicates the extent to which each ISPs’ business component is affected by each uncertainty.

4.4.3 Analysis of the results

The STA implementation results (according to Tables 11, 12, 13, 14) are as follows;

  • None of the four uncertainties affecting ISPs’ business influence the robustness of the components of key processes, key resources, key suppliers, the scope of management, customer segment, competitors type, customer relationship, channels, cost structure type, revenue streams type, and value configuration of the four proposed business models.

  • All four uncertainties will increase the costs and thus reduce the profits in the first three proposed business models (Figs. 3, 4, 5). Therefore, they can be considered a threat to the economic justification of these models. Regarding the fourth proposed business model corresponding to the fourth idea of value creation of ISPs driven by IoT, it should be noted that due to the failure to consider connectivity service providing in the mentioned idea, regulation license uncertainty will not have any impact on any of the components of the fourth proposed business model.

  • Two uncertainties, security/privacy and immaturity, lead to a fall in customer perception of value, which in turn can affect the number of customers and the amount of revenue generated.

  • The results of Tables 11, 12, 13 and 14 regarding the impact of four uncertainties on the value proposition component of the four proposed business models show that the greatest impact of these four uncertainties is conceivable on the value creation of ISPs based on connectivity service providing and then on cloud service providing. However, these four uncertainties have little effect on technical solution providing and business solution providing, which have a consulting nature. Based on the result, proposing connectivity S. P. and cloud S. P. seems infeasible at first glance, but on the one hand, the uncertainties raised are probable in nature, so their occurrence is not certain. On the other hand, connectivity S. P. and cloud S.P., according to three sources (Altmann 2000; European Commission 2016; GSMA 2016), are among the capabilities of ISPs; hence, ISPs are expected to be interested in using these capabilities in the field of IoT.

5 Discussion

Drawing on the research done by Frankenberger et al. (2013), this study used a four-stage BMI process to innovate the business model of ISPs driven by IoT. After implementing the three initial stages of the BMI process, four ISPs’ business models related to the four ISPs’ value creation ideas driven by the IoT were proposed. In the final stage of the BMI process, STA was used to determine the robustness of the proposed business model components drawing on Haaker et al. (2017).

Summarizing the results of STA showed that the greatest impact of the four uncertainties, affecting the ISPs’ business in the IoT domain, is conceivable on value creation of ISPs driven by IoT based on connectivity service providing and cloud service providing. This undermines the justification of ISPs’ value creation based on the two mentioned methods, which are part of the capabilities of today’s ISPs. ISPs are also interested in using these two capabilities in the IoT domain. Evidence of this claim is the IoT solutions of the four largest ISPs in the world, which despite the mentioned uncertainties, have addressed value creation based on connectivity service providing and cloud service providing in the IoT domain, according to Table 15.

Table 15 Parts of IoT solutions of the world's four well-known ISPs

Nevertheless, to increase the validity of the ISPs’value creation based on the two mentioned methods, in the following, more evidence is presented about the validation of ISPs’ value creation based on, first, connectivity service providing, and then, cloud service providing. Furthermore, the impact of IoT technology on the ISPs’ business components is explained at the end of this section.

5.1 Validation of ISPs’ value creation in the IoT domain based on connectivity service providing

More evidence about the value creation of ISPs (WA + FWA providers) based on connectivity service providing in the IoT domain is presented in this sub-section.

  • According to Deloitte (2018) report,Footnote 9 there is no single version to meet the connectivity needs of IoT applications and related use-cases. Instead, different connectivity solutions from three types of WA, FWA and MWA are needed in accordance with specific features of each IoT use-cases such as required battery life, data rates, latency, mobility, range, and network cost.

  • According to ITU (2016a) report based on Machina Research experts’ predictions in 2015,Footnote 10 MWA technologies will provide only 50% of the connectivity required by the IoT domain by 2025. Therefore, WA + FWA providers play an important role in meeting the remaining 50% of the connectivity needed by this area.

  • According to another report by ITU (2016b), connectivity service providers (e.g., ISPs) are a part of the IoT value chain, and their presence in this value chain is essential. In other words, to provide the connectivity needed by 90% of the rural population, 50% of home customers in developing countries, and 15% of home customers in developed countries to enter into the IoT domain, a vast range of WA, FWA and MWA technologies are required.

  • Due to the four valuable characteristics of LPWAN technologies, including; low power consumption, low bit rate, long range, and low cost, they are considered a leading technology (Rebbeck et al. 2014), an ideal alternative (Queralta et al. 2019), and unique solution for meeting connectivity of the IoT domain (Naik 2018). Since, at present, only 20% of the world population is covered by LPWAN technologies, promotion and improvement of the IoT networks’ connectivity infrastructure is still growing and is considered a good opportunity for value creation in this area (McKinsey 2018a). In this respect, Machina Research has predicted that by 2022 the number of LPWAN connections will reach 1.4 billion (GSMA 2017) and outnumber the connections related to 2G, 3G, and 4G technologies. Therefore, considering the ISPs’ capability to create LPWAN technologies-based networks, their value creation based on connectivity service providing is logical and growing according to the mentioned research.

The evidence presented points to the fact that the IoT domain’s connectivity requires ISPs’ connectivity service providing based on WA and FWA technologies (scope of ISPs in this study), particularly LPWAN technologies.

To enhance the obtained results, in the rest of this sub-section, the value creation of WA + FWA providers based on connectivity service providing in the IoT domain is materialized.

According to McKinsey (2018a), the value creation of every business in each of the IoT usecases depends upon understanding the needs of that IoT usecase and adapting the business capabilities to meet those usecases needs. In this respect, the value creation of ISPs to provide IoT usecases connectivity solutions requires understanding the capability of ISPs in providing different connectivity solutions, identifying the connectivity needs of the IoT usecases, and mapping the capabilities with the identified needs.

To gain an understanding of the ISPs’ capabilities in providing connectivity solutions and the advantages and limitations of their connectivity solutions in comparison to other connectivity solutions, the characteristics of different connectivity solutions applicable in the IoT domain, based on the studies on IoT enabler technologies (third class of Table 1), are presented as follows.

  • Connectivity solutions based on the cellular network: The advantages of the technologies in this group, such as 2G, 3G, and 4G LTE(Long Term Evolution), include high bandwidth, broad coverage, high availability, and high reliability. However, two features of these technologies, namely the high cost and high power consumption, have caused them not to be considered ideal choices for providing connectivity in the IoT domain (McKinsey 2018a). The newly emerging technology of this group, 5G, despite advantages like energy efficiency (Zhang et al. 2016), high data exchange speed, low delay, broad coverage, and high reliability (Li et al. 2018), is faced with numerous challenges, e.g., scalability (Modieginyane et al. 2018; Ndiaye et al. 2017), interoperability (Elkhodr et al. 2016; Ishaq et al. 2013), security and privacy (Girson 2017), and lack of compatibility (Li et al. 2018).

  • Connectivity solutions based on LPWAN technologies: The technologies of this group, like Sigfox, LoRaWAN (Long Range Wide Area Network), NB-IoT(Narrow Band Internet of Things) (Mermer and Zeydan 2017; Sinha et al. 2017), are used extensively due to the characteristics including; long transmission rangesFootnote 11 (Centenaro et al. 2016), low energy consumptionFootnote 12 (Patel and Won 2017), low-cost deploymentFootnote 13 (Raza et al. 2017) and the capability to transmit a few tiny messages per day in a long radio range specific to the IoT network (Mekki et al. 2018).

  • Connectivity solutions based on other connectivity technologies are; (1) Unlicensed short-range connectivity, i.e., BLE (Bluetooth Low Energy), Z-Wave, Zigbee, and Wi-Fi which is not possible due to the failure to meet the long transmission range need of the IoT applications (Mekki et al. 2018), (2) Extraterrestrial-based connectivity solutions, including satellite and other microwave technologies, with low-to-medium bandwidth, high range, and medium-to-high reliability and availability features. The high cost of this group of technologies has led to their niche role in providing the connectivity required by the IoT domain. They are solely used when there is no access to cellular and fiber networks (McKinsey 2018a), and (3) Deep fiber solutionFootnote 14 which is mostly used in the backhaul section of the network (not the last mile). Its advantages are reliability and robustness, ease of installation, ability to connect to existing infrastructure, and efficient use of space. Hence, according to the two different reports of Deloitte (2017a, b), deep fiber development (in the backhaul section of the network) is a prerequisite for 5G development. The development of 5G, as an IoT enabler, will further the growth and maturity of IoT technology; therefore, deep fiber development directly leads to the development of 5G and indirectly increases IoT’s growth and maturity. Accordingly, in the US and developed countries, the focus on developing deep fiber solution has been doubled.

The three groups of unlicensed short-range connectivity, LPWAN connectivity, and deep fiber connectivity solutions are related to the scope of ISPs in this study from among the connectivity solution groups discussed. Therefore, the ISPs’ capability to provide connectivity solutions is in line with the technological characteristics of these three solutions.

Due to the general requirements of IoT use-cases, i.e., long communication range, very low energy consumption (extended battery life), and cost-effectiveness (Mekki et al. 2018; Naik 2017; Naik et al. 2016; Naik and Jenkins 2016), it can be concluded that simultaneous coverage of all the mentioned requirements is only possible by LPWAN and 5G technologies (McKinsey 2018a). Since extensive access to 5G technology is not possible by 2023 (McKinsey 2018a), the annual economic interests projected for the IoTFootnote 15 require that investments in this area are not postponed to the extensive use of 5G (McKinsey 2018a). In this situation, the best alternative to meet the needs of IoT usecases is using LPWAN Technologies. It is expected that by 2022, most IoT applications use LPWAN-based connectivity solutions (McKinsey 2018a).

The obtained results point to the high capabilities of LPWAN technologies in meeting the connectivity needs of the IoT. This refers to the high capability of the ISPs in meeting the connectivity requirements of this area. Hence, it can be argued that there are ample value creation opportunities in this area for the ISPs. Although LPWAN technologies are regarded as proper alternatives for meeting the connectivity needs of the IoT usecases, not all LPWAN technologies, including LoRaWAN, SigFox, and NBIoT, are appropriate for different IoT usecases; because each type of LPWAN technologies is different in eight aspects, namely quality of service, battery life, latency, scalability, payload length, range, deployment model, and cost (Mekki et al. 2018a). Therefore, to describe the appropriate IoT usecases of each of the three LPWAN technologies more accurately, these eight aspects are compared in Table 16.

Table 16 Describing the characteristics of LPWAN technologies

After describing the characteristics of each LPWAN technology, this study focuses on identifying the specialized requirements of each IoT use-cases. Identification of each IoT usecase’s specialized requirements depends upon the mastery of all usecases in the IoT domain. In the statistics provided by IoT Analytics (2018), obtained from the analysis of 1600 real IoT projects, top ten usecasesFootnote 16 were introduced that have been investigated in this study for identifying the requirements of IoT usecases. Obviously, for meeting the connectivity requirements of some of them, including connected cars, smart supply chain, and smart health high range of mobility is required; hence their connectivity requirements will not be met by WA + FWA providers.

In order to accurately determine the type of LPWAN technology appropriate for each of the remained applications, the identified specific requirements of these applications were mapped with the capabilities of each of the three LPWAN technologies according to Table 17. So, Table 17 shows the position of using each of the three LPWAN technologies in the IoT use-cases.

Table 17 Mapping between the LPWAN technologies and the selected IoT applications

As mentioned before, the scope of ISPs in this study is WA + FWA providers. Accordingly, as setting up two networks based on SigFox and LoRaWAN, which are based on base station, is the specialty of the ISPs in this study, setting up a network based on NBIoT technology, due to its dependence on LTE infrastructure, is not within the scope of the ISPs of this research and is considered a subset of cellular technologies (Mekki et al. 2018) and the specialty of MNOs.

Hence according to Table 17, value creation of the ISPs in the scope of this research, based on connectivity service providing, is only possible through creating a specific network of IoT based on each of the two SigFox and LoRaWAN technologies in IoT use-cases of smart agriculture, asset tracking and status monitoring, pallet tracking for logistics, smart building, and smart cities.

It should be mentioned that LPWAN technologies, like other technologies, have a life cycle and gradually lose their freshness, become saturated, and may be replaced by new technologies. However, according to two different reports published by McKinsey (2018a, b), connectivity providing based on LPWAN technology not only is a growing field in itself, but its growth leads to the growth of IoT technology. Therefore, value creation based on this method can be a good option to maintain and develop the business and income attractiveness of WA + FWA providers in the IoT domain. The two reports revolved around the following issues:

  • The expected market share of the telecom industry in the field of IoT by 2025 (McKinsey 2018b)Footnote 17 and the role of providing connectivity required by IoT in the growth of this technology.Footnote 18

  • High capabilities of LPWAN technologies in simultaneously covering all connectivity requirements of the IoT domain,Footnote 19 alignment of the IoT growth with LPWAN Tech growthFootnote 20 and growing coverage of LPWAN technologies (McKinsey 2018a).Footnote 21

At the end of this subsection, it should be noted that among all components related to the value creation of ISPs based on connectivity service providing in the first three proposed business models (Figs. 3, 4, 5), the type of technology used is effective on only three components: key resources, cost structure, and key suppliers. According to the suggestion of the selected experts, these three components were explained in general and regardless of the type of technology used so that the three business models can be used for all industry level ISPs (with the same capabilities as ISPs in this study, even with different technological focus). At this stage of the research, based on the results of materializing the value creation of ISPs based on connectivity service providing in the IoT domain, the three components can be explained in more detail in the instance level (the usecase level of the IoT domain) according to Table 18.

Table 18 Explaining the details of the three components of ISPs BM based on connectivity service providing

5.2 Validation of ISPs’ value creation in the IoT domain based on cloud service providing

In this subsection, more evidence for the value creation of ISPs based on cloud service providing in the IoT domain is presented.

  • Accenture’s (2019) report states that the logical solution of Telcos(Telecom companies) for the optimal use of IoT technology-based opportunities is that they first focus on their key capability, connectivity service providing, and then, being known in an ecosystem of partners, use their existing infrastructures for delivering cloud computing services with low latency and high quality of service in the IoT domain -alone or in partnership with platform players. Then, they can focus on offering value-added services based on data analytics in the IoT domain.

  • According to Deloitte’s (2015) report, the complete realization of IoT-based opportunities depends on the value creation of businesses based on the information about their products and services’ performance. In this regard, there are valuable opportunities for connectivity service providers (such as ISPs); instead of focusing solely on connectivity service providing for creating and communicating information, they can focus on cloud service providing for aggregating and analyzing information through a partnership or acquiring platform providers.

  • Based on ITU’s (2018) report, two value creation methods in the IoT ecosystem are 1) network providing and 2) network providing and platform providing together. Value creation based on the second method becomes possible through a partnership with platform providers or acquiring them.

The evidence presented from accredited sources like Accenture, Deloitte, and ITU points to the validity of value creation of ISPs in the IoT ecosystem based on cloud service providing after focusing on their key capability, connectivity service providing.

5.3 Elaborating on the impact of IoT on the ISPs’ business models components

In order to elaborate on the impact of IoT on the ISPs’ business model components, this sub-section focuses on comparing the ISPs’ business model components driven by IoT in this study and the current ISPs’ business model components (Hanafizadeh et al. 2019). Obviously, the accumulation of reliable results hinges on choosing the same scope of focus in the two types of business models in question. Due to the focus area of Hanafizadeh et al. (2019) in elaborating on the current business model of ISPs, i.e., connectivity service providing, among the four business models driven by IoT (see Figs. 3, 4, 5, 6), only the first three proposed models related to the value creation of ISPs in the IoT domain based on connectivity service providing were addressed. According to the explanations given in the integration stage of the BMI process, the components of each of the three mentioned models were explained in the same way based on connectivity service providing.

Therefore, to explain the impact of IoT on ISPs’ business model components in the specified scope, the components of the three proposed business models based on connectivity service providing (Figs. 3, 4, 5) were recorded in the middle column of Table 19 (second column). The components of the current business model of ISPs based on Hanafizadeh et al. (2019) were recorded in the third column of Table 19. Peer-to-peer comparison between the components was performed based on Hedman and Kalling’s ontology.

Table 19 The comparison between the components of the current business model of ISPs (Hanafizadeh et al. 2019) and IoT driven ISPs’ business model

As shown by Table 19, the impact of IoT technology on the components of ISPs’ business model can be explained as follows:

  • IoT Technology will not change the following components of ISPs’ business model driven by IoT: customer segment, competitors, value configuration, the scope of management, longitudinal dimension, and value proposition; it is noteworthy that despite the same scope selection, in the ISPs’ business model driven by IoT, connectivity service providing between things is focused upon.

  • The key processes component of ISPs’ business model driven by IoT also requires other items such as IoT network design, development and deployment, partner management capability, supplier relationship management, customer relationship management, and the key processes of the current business model, FAB processes.

  • The maintenance and operation cost items, as an enhancing service, are added to the cost structure component of the ISPs’ business model driven by IoT in addition to the items in the current business model.

  • Usually, the two items of flat rate and traffic agreement with other ISPs incorporated in the current business model will not be considered in the revenue stream component of the business model of ISPs driven by IoT.

  • The types of items characterized in the key resource component are the same in the two current and innovated business models. The sheer difference is related to the nature of the equipment required by the business model driven by IoT, specific to IoT technology.

  • Regarding the comparison of the key suppliers’ component across the two current and business models driven by IoT, it is noteworthy that, in the innovated business model, in addition to providing communication service, operation and maintenance of the customer network are also offered as an enhancing service, so there is usually no need for the partnership of network operators and content providers.

6 Conclusion

The purpose of this study was to explain the new logic of ISPs (WA + FWA providers) under the influence of IoT technology to elaborate on their value creation in the IoT domain. To this aim, we first focused on identifying the value creation method of ISPs in the IoT domain. Accordingly, based on the research in IoT, various value creation methods in the IoT domain were identified in the form of NPD and BMI (Cortimiglia et al. 2016; Fleisch et al. 2015). As a result of comparing the two methods, it was found that not only is BMI operating profit margin growth more than five times the NPD, but also BMI is a driver of competitive advantage in business (McGrath 2010; Teece 2010), while the NPD does not necessarily lead to sustainable competitive advantage (Pohle and Chapman 2006). Therefore, in this study, to elaborate on the value creation of ISPs in the IoT domain, was focused on BMI implementation driven by IoT in the ISPs’ business context. To this aim, among the various procedures of BMI implementation, this study focused on the implementation of a four-step process of BMI based on Frankenberger et al.’s (2013) study. Due to the importance of evaluation of the proposed business model(s) as a part of the BMI process, in enhancing their credibility and robustness in the IoT domain (Bouwman et al. 2009, 2012; Tesch 2016), in the final stage of the BMI process in this study, the STA method based on Haaker et al.’s (2017) study was used.

To implement the stages of the BMI process, secondary data extracted through descriptive analysis (Smith and Firth 2011) from the studies conducted on the IoT and BMI, primary data obtained through interpretative analysis (Schmidt 2004) from the interviews with the experts, and the results of technical reports of accredited source like ITU, Accenture, Deloitte, and Mckinsey were used.

As a result of performing the BMI process integrated with the STA, driven by the IoT in the ISPs’ business context, four new ideas for value creation of ISPs driven by the IoT were identified at the output of the ideation stage of the process. Four business models for ISPs in the IoT domain based on the four proposed ideas were explained at the output of the integration stage of the process. In the fourth stage of the process, the evaluation stage, the robustness of the components of the four proposed business models based on the STA method was examined, which indicated that there were doubts in justifying the value creation of ISPs in the IoT domain based on connectivity service providing and cloud service providing. Therefore, after completing the BMI process, based on reliable sources, first, validation of the ISPs’ value creation based on connectivity service providing as well as materializing their value creation based on this method at the instance level (IoT use-cases level) were focused upon. Then, the value creation of ISPs based on cloud service providing was addressed. At the end of the research, the impact of IoT on the business model components of ISPs was explained.

The present study’s achievement is proposing four business models for ISPs (WA + FWA providers) driven by IoT, which means the new logic of their business in this technology. The findings of this study can help deepen the ISPs managers’ anticipation and identification of the opportunities based on IoT technology (Moqaddamerad et al. 2017). As a result, they can re-perceive and respond to IoT-based opportunities in a novel way (Patel 2016). In turn, responding to them helps its rapid growth, facilitates and accelerates taking its personal advantagesFootnote 22 (Chui et al. 2010) and corporate advantagesFootnote 23 (Sundmaeker et al. 2010).

On the other hand, given the dearth of research on IoT (Patel 2016), BMI (Schneider and Spieth 2013), and BMI driven by IoT (Wirtz et al. 2016) domains, BMI implementation driven by IoT in the ISPs’ business context can make a great contribution to the scholarship (Veit et al. 2014), provide a starting point for further studies in identifying value creation methods in other businesses in the telecom industry and even other industries influenced by this technology.

The scarcity of practical knowledge in both IoT and BMI domains was one of the limitations of this study. The most significant challenges and limitations of the present research are the limited background of studies in both areas and the experts’ disagreement over the responses to the interview questions and seeking to reach a final consensus among them. Ensuring the validity of the proposed business models is another limitation of this research.

Quantifying the STA method by adding quantitative assumptions and assigning quantitative value to the elaborated uncertainties, which is a way of boosting the reliability and validity of the components of the proposed business model in IoT, can be considered a research avenue. Furthermore, materializing the proposed business models of this research based on connectivity service providing at the instance level or IoT use-cases level for other industry-level ISPs outside the scope of this research with a different technological focus is recommended as another research avenue. Besides, the choice of basic theories in the field of IoT can also be considered an important pivotal theme for future research direction. The reason is that in this study, in explaining two components of the proposed business models, including key resources and value configuration of key processes, only two basic theories of RBT and VCT were used, respectively, depending on the nature of the problem, the nature of the IoT technology and the evidence available in the secondary data. There is no doubt that IoT technology also provides the foundation for other basic theories, such as information sharing. Accordingly, the choice of other basic theories whose assumptions come a step closer to realization under the influence of IoT technology can be the focus of future research.