Fig. 1From: Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspectiveResearch methodology guidelineBack to article page