[1] A. Abdali and A. Naseri, Expand the risk process to manage opportunities, Tadbir Month. J. 20 (2003), 12.
[2] K. Abolmaali, Qualitative research: from theory to practice, Alam Publishing, Tehran, 402 (1391).
[3] S. Ammirato, F. Sofo, A.M. Felicetti and C. Raso, A methodology to support the adoption of IoT innovation and
its application to the Italian bank branch security context, Eur. J. Innov. Manag. 22 (2019), no. 1, 146–174.
[4] B. Aronson, T. Gonzjlez, K.J. Parker, C. St¨over and A.B. Zampetti, Synergies for libraries in the least developed
countries: The technology bank in pursuit of sustainable development, 2017.
[5] A. Ashna, E. Golestani, A. Hosseini and J. Zati, A Study of smart homes and the role of the internet of things
and the smart assistant in it, Fifth Conf. New and Up to Date Achiev. Engin. Sci. New Technol., Rasht, Guilan
Industrial Engineering Basij Organization, 2009.
[6] A. Boumlik and M. Bahaj, Big data and IoT: A prime opportunity for banking industry, Int. Conf. Adv. Inf.
Technol. Serv. Syst., Springer, Cham, April, 2017, p. 396–407.
[7] C. Brindley, Supply chain risk, Hampshire, Ashgate Publishing, 2004.[8] C.S. Choi, J.D. Jeong, J. Han, W.K. Park and I.W. Lee, Implementation of IoT based PV monitoring system
with message queuing telemetry transfer protocol and smart utility network, Int. Conf. Inf. Commun. Technol.
Convergence, IEEE, 2017, p. 1077–1079.
[9] S.E. Crager, Improving global access to new vaccines: intellectual property, technology transfer, and regulatory
pathways, Amer. J. Public Health 108 (2018), 414–420.
[10] L. Deng, D. Li, X. Yao, D. Cox and H. Wang, Mobile network intrusion detection for IoT system based on transfer
learning algorithm, Cluster Comput. 22 (2019), 9889—9904.
[11] L. Denis, D.T.K. Kumar, D. Karthikeyan and D.S. Sasipriya, Offline mobile based OTP technology for enterprise
IoT enabled architecture in banking cash logistics and ATM operations, Int. J. Adv. Res. Engin.Technol. 11 (2020),
no. 1, 61–69.
[12] M. Dogson, The management of technological innovation, Oxford University Press, 2000.
[13] A. Erumban, Cross country differences in ICT adoption, a consequence of culture, J. World Bus. 41 (2006), no.
4, 302–314.
[14] M. Faraji, Investigation of technology risks from the perspective of IT security in electronic banking in the field of
Internet banking, Int. Conf. New Res. Manag. Econ. Account., 2016.
[15] I. Ganchev, Z. Ji and M. O’Droma, Designing a low-cost data transfer unit for use in IoT applications, 8th Int.
Cong. Ultra Modern Telecommun. Control Syst. Workshops (ICUMT), IEEE, 2016, p. 85–88.
[16] W. Guo and Sh. Zhang, Analysis on technology spillover effect of multinational company’s technology transfer to
the investment of Chinese car industry, J. Zhengzhou Inst. Aeronautical Ind. Manag. 26 (2008), no. 2, 51–64.
[17] A. Habibi, Dematel technique training and its applications in management, Sharif Sci. Res. J. 45 (2012).
[18] J. Hallikas, I. Karvonen, U. Pulkkinen, V.M. Virolainen and M. Tuominen, Risk Management processes in supplier
networks, Int. J. Prod. Econ. 90 (2004), 47–58.
[19] M. Hosseini and J. Tarokh Mohammad, Type-2 fuzzy set extension of DEMATEL method combined with perceptual
computing for decision making, J. Ind. Engin. Int. 9 (2013), no. 1, 1–10.
[20] O. Houseman, A. Tiwari and R. Roy, A methodology for the selection of new technologies in the aviation industry,
Cranfield University, 2004.
[21] A. Jafarnejad, A. Ahmadi and M. Maleki, Evaluation of lean production using a combined approach of ANP and
DEMATEL techniques in fuzzy conditions, Quart. J. Ind. Manag. Stud. 8 (2011), p. 20.
[22] K. Kandasamy, S. Srinivas, K. Achuthan and V.P. Rangan, IoT cyber risk: a holistic analysis of cyber risk
assessment frameworks, risk vectors, and risk ranking process, EURASIP J. Inf. Secur. 2020 (2020), no. 1, 1–18.
[23] E. Karsak and E.Tolga, Fuzzy multi-criteria decision-making procedure for evaluating advanced manufacturing
system investments, Int. J. Prod. Econ. 69 (2002), 49–64.
[24] R. Kaur, R.S. Sandhu, A. Gera, T. Kaur and P. Gera, Intelligent voice bots for digital banking, Smart Systems
and IoT: Innovations in Computing. Springer, Singapore, 2020, p. 401-408.
[25] J. Kirchherr and N. Matthews, Technology transfer in the hydropower industry: An analysis of Chinese dam
developers’ undertakings in Europe and Latin America, Energy Policy 113 (2018), 546–558.
[26] R.S. Lande, S.A. Meshram and P.P. Deshmukh, Smart banking using IoT, Int. Conf. Res. Intell. Comput. Engin.,
IEEE, 4(2018).
[27] F. Latifi, Risk and risk-taking, Tadbir 9 (2000), 20–22.
[28] P.V. Lea, T.A. Manning and U.S. Patent, Washington, DC: U.S. Patent and Trademark office, US patent 3
(1967), no. 330, 697.
[29] E. Lee, Y. Park and J. Shin, Linguistic decision analysis:Steps for solving decision problems under linguistic
information, Fuzzy Sets Syst. 115 (2000), 67–82.
[30] W. Liang, W. Li and L. Feng, Information security monitoring and management method based on big data in the
internet of things environment, IEEE Access 9 (2021), 39798–39812.[31] M. Mazloomi, Risk management, Account. (1992), 91–92.
[32] L.M. Meade and A. Presley, Project selection using the analytic network process, IEEE Trans. Engin. Manag. 49
(2002), 59–66.
[33] L. Ming-Tsang, S. Lin and Y. Tang, Evaluating RFID adoption by using DEMATEL techniques approach: A case
study in Taiwan’s Healthcare Industry, Proc. 12th Asia Pacific Ind. Engin. Manag. Syst. Conf., 2011.
[34] H. Mirzaei, The need for growth and development of risk management in developing countries, World Insurance
News 59 (2003), 140–144.
[35] J.R.C. Nurse, S. Creese, D. De. Roure, Security risk assessment in internet of things systems, IT Prof. 19 (2017),
no. 5, 20–26.
[36] D.S. Olawuyi, From technology transfer to technology absorption: Addressing climate technology gaps in Africa,
J. Energy Nat. Resources Law 361 (2018), 61–84.
[37] M. Ordoobadi Sharon, Application of ANP methodology in evaluation of advanced technologies, J. Manufact.
Technol. Manag. 23 (2012), no. 2, 229–252.
[38] G.A. Papadakis, Assessment of requirements on safety management systems in EU regulations for the control of
major hazard pipelines, J. Hazardous Mater. 78 (2000), 63–89.
[39] M. Park, H. Oh and K. Lee, Security risk measurement for information leakage in IoT-based smart homes from
a situational awareness perspective, Sensors 19 (2019), no. 9, 2148.
[40] M. Sabeti, Identifying critical success factors in information systems technology transfer in Iranian organizations,
Manag. Age 4 (2010), 16–17.
[41] S. Stoukatch, F. Dupont, L. Seronveaux, D. Vandormael and M. Kraft, Additive low temperature 3D printed
electronic as enabling technology for IoT application, IEEE 19th Electron. Packag. Technol. Conf. IEEE, 2017, p.