[1]. Ronaghi, M. H., & Forouharfar, A. (2020). A contextualized study of the usage of the Internet of things (IoTs) in smart farming in a typical Middle Eastern country within the context of Unified Theory of Acceptance and Use of Technology model (UTAUT). Technology in Society, 63, 101415. https://doi.org/10.1016/j.techsoc.2020.101415
[2]. Atlam H., Walters R. and Wills G. (2018). Fog computing and the internet of things: a review. Big data cogn. comput. 2(10): 2-18.
[3]. Moin S., Karim A., Safdar Z., Safdar K., Ahmed E. and Imran M. (2019). Securing IoTs in distributed blockchain: Analysis, requirements and open issues, Future Generation Computer Systems, 100: 325–343.
[4]. Ronaghi, M. H. (2022). Contextualizing the impact of blockchain technology on the performance of new firms: The role of corporate governance as an intermediate outcome. The Journal of High Technology Management Research, 33(2), 100438. https://doi.org/10.1016/j.hitech.2022.100438
[5]. Zhang Z., et al., (2014). IoT security: ongoing challenges and research opportunities, in: Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on, IEEE, 2014.
[6]. Dinh T.N. and Thai M.T. (2018). Ai and blockchain: A disruptive integration, Computer 51(9): 48–53.
[7]. Biswas K. and Muthukkumarasamy V. (2016). securing smart cities using blockchain technology, in: High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on, IEEE.
[8]. Ronaghi, M. H. (2022). Blockchain Technology Acceptance in Iran's Banking Industry. Journal of Management Improvement, 16(1), 30-53. (In Persian)
[9]. Spearpoint M. (2017). A proposed currency system for academic peer review payments using the blockchain technology, Publications 5(3): 19-25.
[10]. Khan M.A. and Salah K. (2018). IoT security: Review, blockchain solutions, and open challenges, Future Gener. Comput. Syst. 82: 395–411.
[11]. Underwood S. (2016). Blockchain beyond bitcoin, Commun. ACM 59 (11): 15–17.
[12]. Singh S., Jeong Y. and Park J.H. (2016). A survey on cloud computing security: Issues, threats, and solutions, J. Netw. Comput. Appl. 75: 200–222.
[13]. Xu T., Wendt J. and Potkonjak M. (2014). Security of IoT systems: Design challenges and opportunities, in: Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, IEEE Press.
[14]. Lin I. and Liao T. (2017). A survey of blockchain security issues and challenges, Int. J. Netw. Secur. 19 (5): 653–659.
[15]. Wortmann F. and Flüchter K. (2015). Internet of things, Bus. Inf. Syst. Eng. 57(3): 221–224.
[16]. Yeoh P. (2017). Regulatory issues in blockchain technology, J. Financ. Regul. Compliance 25 (2): 196–208.
[17]. Grosse R. (2012). Bank regulation, governance and the crisis: a behavioral finance view, J. Financ. Regul. Compliance 20 (1) (2012) 4–25.
[18]. Kewell B., Adams R. and Parry G. (2017). Blockchain for good? Strateg. Change 26 (5): 429–437.
[19]. Ronaghi, M. H. (2021). Open-source software migration under sanctions conditions. International Journal of System Assurance Engineering and Management, 12(6), 1132-1145. https://doi.org/10.1007/s13198-021-01329-y
[20]. Fabiano N. (2017) The internet of things ecosystem: The blockchain and privacy issues, The challenge for a global privacy standard, in: Internet of Things for the Global Community (IoTGC), 2017 International Conference on, IEEE.
[21]. Norta A. (2015). Creation of smart-contracting collaborations for decentralized autonomous organizations, in: International Conference on Business Informatics Research, Springer, 2015.
[22]. Pashaeizad H. (2008). Delphi method: a comprehensive approach. Peyk noor. 6(2): 63-80 (In Persian)
[23]. Mendel. J. M., (2007). Type-2 Fuzzy Sets and Systems: An Overview, Computational Intelligence Magazine, IEEE, 2:20-29.
[24]. Tasatanattakool P. and Techapanupreeda C. (2018). Blockchain: Challenges and applications, in: Information Networking (ICOIN), 2018 International Conference on, IEEE.
[25]. Rehiman K. and Veni S. (2015). Privacy and trust for smart mobile devices in internet of things—A literature study, Int. J. Adv. Res. Comput. Eng. Technol. 4(5): 1775–1779.
[26]. Ronaghi M. and Hosseini F. (2018). Identifying and Ranking IoT Services in Healthcare Sector, Journal of health administration, 21(73):29-41 (In Persian)