Information Systems and IT Solution: Design and Development Theories, Globalisation Effects, Digital Infrastructure, and Risks of Outsourcing
VerifiedAdded on 2023/06/11
|12
|3343
|143
AI Summary
This report covers the design and development theories of McAfee and MS Office, explanation of DSS, ESS, TPS, MIS, and KSM with relevant examples, globalisation effects on IT, advantages and disadvantages of digital infrastructure, and risks associated with information systems outsourcing. The subject is Information Systems and Big Data, course code BMP4005, for the 2019/2020 academic year, February 2020/Semester 1.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Business Management
Cohort 2
BMP4005
Information Systems and Big Data
Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Contents
1
Cohort 2
BMP4005
Information Systems and Big Data
Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Contents
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction p
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS Office
p
Task 2: Explanation of the systems below with relevant
examples p
Task 3: Globalisation and the effects of IT on globalisation
p
Task 4: Definition, example, advantages and disadvantages
of digital infrastructure p
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to digital
transformation! P
Conclusion p
References p
2
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS Office
p
Task 2: Explanation of the systems below with relevant
examples p
Task 3: Globalisation and the effects of IT on globalisation
p
Task 4: Definition, example, advantages and disadvantages
of digital infrastructure p
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to digital
transformation! P
Conclusion p
References p
2
Introduction
Information system is stated as a set of components that involves network,
database, software, hardware and people. These components are meant to perform
various activities such as process, input, control, feedback and output. This system is
used by various organisation in order to turn the vague data into a useful information
which may be used by the firms to make an effective decisions. Data analysis is a also
same like Information system which is a procedure of converting the data into a useful
information that supports the decision-making. In this report, theories, methods and
techniques which relate to the design and development of McAfee and MS Office are
discussed below in the report(Al-Emran and et. al., 2018). Globalisation and the effects
of IT on globalisation as well as the advantages and disadvantages of global
infrastructure are also discussed. At last the risks that are usually associated with the
information systems outsourcing and the importance of IT infrastructure in digital
transformation.
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS Office
McAfee :- It is a computerized system software that is designed in 1987 by John
McAfee. This software is very famous known for its antivirus application that is used for
detecting viruses and malware, and offers the users a potent protection for their laptops
or personal computers. The main work of this software is to conduct various scans of
the whole system of laptops or computers and make the system more potent to conduct
the work. Agile or continuous integration is mere the methodology that enables the
developers to develop the design of all the software of McAfee(Avison., Davison, and
Malaurent., 2018). Agile is basically a tool that allows the different developers to make
software by using the method of iteration procedure that involves three stages such as
planning, collaborating and delivery and this whole procedure is done by gathering the
3
Information system is stated as a set of components that involves network,
database, software, hardware and people. These components are meant to perform
various activities such as process, input, control, feedback and output. This system is
used by various organisation in order to turn the vague data into a useful information
which may be used by the firms to make an effective decisions. Data analysis is a also
same like Information system which is a procedure of converting the data into a useful
information that supports the decision-making. In this report, theories, methods and
techniques which relate to the design and development of McAfee and MS Office are
discussed below in the report(Al-Emran and et. al., 2018). Globalisation and the effects
of IT on globalisation as well as the advantages and disadvantages of global
infrastructure are also discussed. At last the risks that are usually associated with the
information systems outsourcing and the importance of IT infrastructure in digital
transformation.
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS Office
McAfee :- It is a computerized system software that is designed in 1987 by John
McAfee. This software is very famous known for its antivirus application that is used for
detecting viruses and malware, and offers the users a potent protection for their laptops
or personal computers. The main work of this software is to conduct various scans of
the whole system of laptops or computers and make the system more potent to conduct
the work. Agile or continuous integration is mere the methodology that enables the
developers to develop the design of all the software of McAfee(Avison., Davison, and
Malaurent., 2018). Agile is basically a tool that allows the different developers to make
software by using the method of iteration procedure that involves three stages such as
planning, collaborating and delivery and this whole procedure is done by gathering the
3
feedbacks. Iteration tool helps to enhance the efficiency of the systems by identifying
the errors or mistakes and then correct them. This software is used effectively in
detecting the viruses and malware and the amount of threat that virus and malware may
do to the system. It helps the company to update their database in regular manner by
identifying the different techniques to deal with the virus attacks.
MS Office :- Microsoft office is a system software developed by a famous
company that is Microsoft and it was announced by the owner of the company whose
name is Bill gates. It is considered as a group of sever that is managed by various
people who has done a course of the computer languages. It consists of different types
of applications under it such as MS Word, MS Excel, MS PowerPoint, email outlook etc.
This programming language of MS office is done by C++ which enables the software in
performing the work effectively and efficiently. The company also uses different types of
technology with the aim to enhance the features of its software such as .NET framework
which helps the MS office to create various web applications and use more
advancement tools to improvise the software(Chaw and Tang., 2018).
Task 2: Explanation of the systems below with relevant
examples
DSS (Decision Support System)
A decision support system or DSS is an application of computer that enables to
make more impactful decisions by the firm. The main work of this application is to
analyse a big amount of data of the firm and helps them to choose an effectual
information for an organisation. It enables to bring all the data together from different
areas to offer an effectual message to the users. This is conducted or done in order to
help the different users to take effective decisions. It is basically an informational
application that offers the users with applicable data from the pile of data sources to
enable the users to make a helpful decision(Chen., 2018). The example which is linked
4
the errors or mistakes and then correct them. This software is used effectively in
detecting the viruses and malware and the amount of threat that virus and malware may
do to the system. It helps the company to update their database in regular manner by
identifying the different techniques to deal with the virus attacks.
MS Office :- Microsoft office is a system software developed by a famous
company that is Microsoft and it was announced by the owner of the company whose
name is Bill gates. It is considered as a group of sever that is managed by various
people who has done a course of the computer languages. It consists of different types
of applications under it such as MS Word, MS Excel, MS PowerPoint, email outlook etc.
This programming language of MS office is done by C++ which enables the software in
performing the work effectively and efficiently. The company also uses different types of
technology with the aim to enhance the features of its software such as .NET framework
which helps the MS office to create various web applications and use more
advancement tools to improvise the software(Chaw and Tang., 2018).
Task 2: Explanation of the systems below with relevant
examples
DSS (Decision Support System)
A decision support system or DSS is an application of computer that enables to
make more impactful decisions by the firm. The main work of this application is to
analyse a big amount of data of the firm and helps them to choose an effectual
information for an organisation. It enables to bring all the data together from different
areas to offer an effectual message to the users. This is conducted or done in order to
help the different users to take effective decisions. It is basically an informational
application that offers the users with applicable data from the pile of data sources to
enable the users to make a helpful decision(Chen., 2018). The example which is linked
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
to this system is GPS application that offers assistance to the users to navigate and
find routes by undertaking different factors like time, distance and cost.
ESS (Executive Support System)
An executive support system or ESS enables the users to turn the enterprises
data into executive level and easily accessible reports that are used by many big
organizations. It helps the different companies and organizations to increase the
efficiency of decision making process for the executives. The characteristics of this
system is given down below :-
It provides an in depth understanding of different online analysis such as
scenario analysis, trend analysis etc.
It enables to offer a direct and fast access to reports of management.
It enables the users to extract data and solve the complex adversity that is
related to computer(Dara., Chowdary. and Kumar., 2020).
It has the quality to get the access of both the types of data that is external data
and internal data.
The example which is related to this system is integrated with the investment plan for
the Ministry of Transportation in Canada that was developed by Cambridge systematic
firm.
TPS (Transaction Processing System)
It is a highly processed system which main work is to record and perform the
daily regular transaction that is necessary to conduct effective work in the company. It is
considered as a information processing system for the firms transactions that involves
the modification, collection and recovery of all the data that is somehow related to
transactions. It is too called as real time processing which means that all the
transactions and events that happens in the company or over the system causes no
delay in performing the procedure. This system is considered as very much consistent,
5
find routes by undertaking different factors like time, distance and cost.
ESS (Executive Support System)
An executive support system or ESS enables the users to turn the enterprises
data into executive level and easily accessible reports that are used by many big
organizations. It helps the different companies and organizations to increase the
efficiency of decision making process for the executives. The characteristics of this
system is given down below :-
It provides an in depth understanding of different online analysis such as
scenario analysis, trend analysis etc.
It enables to offer a direct and fast access to reports of management.
It enables the users to extract data and solve the complex adversity that is
related to computer(Dara., Chowdary. and Kumar., 2020).
It has the quality to get the access of both the types of data that is external data
and internal data.
The example which is related to this system is integrated with the investment plan for
the Ministry of Transportation in Canada that was developed by Cambridge systematic
firm.
TPS (Transaction Processing System)
It is a highly processed system which main work is to record and perform the
daily regular transaction that is necessary to conduct effective work in the company. It is
considered as a information processing system for the firms transactions that involves
the modification, collection and recovery of all the data that is somehow related to
transactions. It is too called as real time processing which means that all the
transactions and events that happens in the company or over the system causes no
delay in performing the procedure. This system is considered as very much consistent,
5
reliable and efficient in terms of transaction process because It is the best technology to
conduct online transaction and therefore it is also known as Online Transaction
Processing System. The example which is relevant to this system is that it is used in
reservation systems of any firm where the services or products offers to a specific
consumer(Izquierdo and et. al., 2021).
MIS (Management Information System)
This system is basically a study of technology, people, organisation and the
study of relationship between them. Many management of the firms uses this system to
create a good report that offers the management team to provide an overview of all the
gathered information which may be used to make an effective decision. It is considered
as a set of systems and procedures that helps the user to collect data from various
sources and then compile the data and present it in the readable format. For an
example, this system can be used to create or design the next year budget plans, So
the manager can collect the data and examine the external and internal trends and with
the help of these collected data and analysed trends a manager can make an
appropriate plan for forecasting the next year budget.
KSM (Knowledge Management System)
This system main work is to easily turn the complex documents, asked questions
and other data of various firms into easily accessible format for both the external and
internal customers(Jiang., Huo. and Song., 2018). It overall enables the different firms
to assist the consumers in ascertaining their own answers and to keep updated
documentation procedures. It is basically a system that is used by both employees and
customers to share, create and ascertain the database as soon as possible. Example
related to this system is to establishing the employee on boarding system that can
provide in depth knowledge to new employees about the working culture of the
company.
6
conduct online transaction and therefore it is also known as Online Transaction
Processing System. The example which is relevant to this system is that it is used in
reservation systems of any firm where the services or products offers to a specific
consumer(Izquierdo and et. al., 2021).
MIS (Management Information System)
This system is basically a study of technology, people, organisation and the
study of relationship between them. Many management of the firms uses this system to
create a good report that offers the management team to provide an overview of all the
gathered information which may be used to make an effective decision. It is considered
as a set of systems and procedures that helps the user to collect data from various
sources and then compile the data and present it in the readable format. For an
example, this system can be used to create or design the next year budget plans, So
the manager can collect the data and examine the external and internal trends and with
the help of these collected data and analysed trends a manager can make an
appropriate plan for forecasting the next year budget.
KSM (Knowledge Management System)
This system main work is to easily turn the complex documents, asked questions
and other data of various firms into easily accessible format for both the external and
internal customers(Jiang., Huo. and Song., 2018). It overall enables the different firms
to assist the consumers in ascertaining their own answers and to keep updated
documentation procedures. It is basically a system that is used by both employees and
customers to share, create and ascertain the database as soon as possible. Example
related to this system is to establishing the employee on boarding system that can
provide in depth knowledge to new employees about the working culture of the
company.
6
Task 3: Globalisation and the effects of IT on globalisation
Globalisation is the procedure of integrating and interacting with different
governments, companies and people. This term main aim is to conduct the
development of all the person of the whole world by not taking any charge for the flow of
knowledge, information, services, goods and people.
The effects of IT on globalisation are discussed below :-
Rise of the Personal computer: - The personal computers enables the various
people to make their own content digitally and share the same with all over the
world(Kumar., Mookerjee. and Shubham., 2018). The globalisation has a significant
impact on the rise of window based PC which helps every individuals to create and
distribute the information with various ways.
Creation of work flow structure: - The major impact of IT to the businesses is
the creation of work flow software, it helps the employees to design, manage and
collaborate the data of businesses in some other locations in the same company.
Previously, it was done manually by the individuals of various departments through
doing a physical walk and pass the information.
Task 4: Definition, example, advantages and disadvantages
of digital infrastructure
Digital infrastructure basically defines the advanced technologies which offers an
organisation vital information about the operations. It helps the firms to become more
advanced as well as smarter and enables them to provide quality experiences to fulfil
the demand of customers and increase the efficiency of the productivity of employees.
The main aim of this digital infrastructure is to do every attempt in order to enable the
high advancement of technology by breaking the restrictions of geographical
boundaries. There are different examples of digital infrastructure like Internet,
Broadband, End user devices, communication satellites and data centres.
7
Globalisation is the procedure of integrating and interacting with different
governments, companies and people. This term main aim is to conduct the
development of all the person of the whole world by not taking any charge for the flow of
knowledge, information, services, goods and people.
The effects of IT on globalisation are discussed below :-
Rise of the Personal computer: - The personal computers enables the various
people to make their own content digitally and share the same with all over the
world(Kumar., Mookerjee. and Shubham., 2018). The globalisation has a significant
impact on the rise of window based PC which helps every individuals to create and
distribute the information with various ways.
Creation of work flow structure: - The major impact of IT to the businesses is
the creation of work flow software, it helps the employees to design, manage and
collaborate the data of businesses in some other locations in the same company.
Previously, it was done manually by the individuals of various departments through
doing a physical walk and pass the information.
Task 4: Definition, example, advantages and disadvantages
of digital infrastructure
Digital infrastructure basically defines the advanced technologies which offers an
organisation vital information about the operations. It helps the firms to become more
advanced as well as smarter and enables them to provide quality experiences to fulfil
the demand of customers and increase the efficiency of the productivity of employees.
The main aim of this digital infrastructure is to do every attempt in order to enable the
high advancement of technology by breaking the restrictions of geographical
boundaries. There are different examples of digital infrastructure like Internet,
Broadband, End user devices, communication satellites and data centres.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Advantages of digital infrastructure
Adoption of new technologies :- With the use of digital infrastructure, it
enables the companies to discover some new technology and adopt the same
technology. The firms must changed the technology in regular manner to keep
up to date and compete with the rivalry companies(Li., Shih, and Wang., 2018).
Boost economic growth :- The whole world is changing very fast with a
continuous improvement in the technologies which enables to develop the
economy. It enables the firms to increase the efficiency of performing the
activities. This however also enables to create more job opportunities which has
an impact on the growth of employment rate.
Connection between the people :- Digital infrastructure makes it enable for all
the people of the world to interact with each other and share the valuable
information. This makes very easy for all the person to communicate or convey
the thoughts to other individual who live very far from each other by just simple
steps.
Enhance Productivity :- It enables the different companies to interchange the
innovations and notions which can be useful for the company to improve their
scope for development and growth. The conducting of online business has
increased very much in the last few years and this happens by the effective use
of technology to enable the digitalization.
Disadvantages of digital infrastructure
Concerns regarding privacy :- Digitalization has a major impact on the
intrusion of the users privacy in between the exchange of informations through
the online platforms. Due to advancement of technology it is very difficult for a
typical individual to secure its private data's from the hackers(Li and et. al.,
2018).
Social media manipulation :- Digital infrastructure provides a new technology
that is known as social media in the worldwide level to all the users. But, It also
enables the various individual to get manipulated by the wrong information.
8
Adoption of new technologies :- With the use of digital infrastructure, it
enables the companies to discover some new technology and adopt the same
technology. The firms must changed the technology in regular manner to keep
up to date and compete with the rivalry companies(Li., Shih, and Wang., 2018).
Boost economic growth :- The whole world is changing very fast with a
continuous improvement in the technologies which enables to develop the
economy. It enables the firms to increase the efficiency of performing the
activities. This however also enables to create more job opportunities which has
an impact on the growth of employment rate.
Connection between the people :- Digital infrastructure makes it enable for all
the people of the world to interact with each other and share the valuable
information. This makes very easy for all the person to communicate or convey
the thoughts to other individual who live very far from each other by just simple
steps.
Enhance Productivity :- It enables the different companies to interchange the
innovations and notions which can be useful for the company to improve their
scope for development and growth. The conducting of online business has
increased very much in the last few years and this happens by the effective use
of technology to enable the digitalization.
Disadvantages of digital infrastructure
Concerns regarding privacy :- Digitalization has a major impact on the
intrusion of the users privacy in between the exchange of informations through
the online platforms. Due to advancement of technology it is very difficult for a
typical individual to secure its private data's from the hackers(Li and et. al.,
2018).
Social media manipulation :- Digital infrastructure provides a new technology
that is known as social media in the worldwide level to all the users. But, It also
enables the various individual to get manipulated by the wrong information.
8
Issues regarding the securities of data :- Due to the enhancement of
digitalization it becomes very hard for the individuals to keep the data safe. The
leakage of private data of the users can lead to exploitation of the reputation of
user if the data is handed to wrong person. It enables the transmission of large
amount of data through the internet that contains personal information which is
a major concern of the users.
Increasing activities of crime :- The increasing in digital infrastructure has a
direct impact on the expansion of digital crimes. This enhancement also
increases the number of hackers, that make an effective use of digital
technology in committing the crimes because it is possible to misguide various
individual through digital technology. The cyber crime activities is increasing day
by day due to the increasing of networks in digitalization(Roccetti and et. al.,
2020).
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to digital
transformation!
Risks associated with information systems outsourcing
Outsourcing of information systems refers to perform the various business practice by
handling the operations of information technology that is infrastructure solutions,
software development and software support by using the external providers. The risks
that are associated with the outsourcing of information system is discussed below :-
Hidden Costs :- Outsourcing of information systems sometimes arises hidden
costs which is basically remain unidentified in the procedure. These hidden costs
also involves the cost that is related to the third party service provider.
Declining technical understanding :- The less understanding about the IT
services to the customers may results in an ineffective outsourcing. The major
9
digitalization it becomes very hard for the individuals to keep the data safe. The
leakage of private data of the users can lead to exploitation of the reputation of
user if the data is handed to wrong person. It enables the transmission of large
amount of data through the internet that contains personal information which is
a major concern of the users.
Increasing activities of crime :- The increasing in digital infrastructure has a
direct impact on the expansion of digital crimes. This enhancement also
increases the number of hackers, that make an effective use of digital
technology in committing the crimes because it is possible to misguide various
individual through digital technology. The cyber crime activities is increasing day
by day due to the increasing of networks in digitalization(Roccetti and et. al.,
2020).
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to digital
transformation!
Risks associated with information systems outsourcing
Outsourcing of information systems refers to perform the various business practice by
handling the operations of information technology that is infrastructure solutions,
software development and software support by using the external providers. The risks
that are associated with the outsourcing of information system is discussed below :-
Hidden Costs :- Outsourcing of information systems sometimes arises hidden
costs which is basically remain unidentified in the procedure. These hidden costs
also involves the cost that is related to the third party service provider.
Declining technical understanding :- The less understanding about the IT
services to the customers may results in an ineffective outsourcing. The major
9
drawback is that it increases the dependency of a firm on a third party that may
reduces the effectiveness in performing the activities.
Dubious accessibility :- One of the most risks in outsourcing the information
system is of failing in performing the operation due to the failure of system which
moreover leads to great loss of an organization.
Threat of vulnerability :- It is very hard for an individual to manage and secure
a big amount of sensitive or personal data. The frequency of overcoming from
this problem is much less due to the involvement of third party which however
rises the threat of maintaining the confidential data rise.
Why is IT infrastructure so critical to digital transformation!
IT infrastructure is considered to be very vital in digital transformation and the
root for the enhancement of digital transformation. It has been recognized that the
companies who will fail to understand the importance of data centre infrastructure will
limit themselves to gain more profits. It is not a very easy process to implement a digital
transformation in the company because it requires a lot critical thinking. An organisation
needed to invest in the technologies at the vital time when they want to stabilize its
operations in future(Leung., 2019). A potent IT infrastructure is very much important for
the companies to perform the firms activities very smoothly and effectively. It also
enables to conduct a better collaboration within the departments of organisation or
between two more than two organisation.
Conclusion
From the above report, it has been concluded that there are various
computerized programmes that helps the system to function properly. Globalisation and
the effects of IT on the globalisation states that it is imperative for the firms to enhance
their productivity. The various advantages as well as disadvantages of digital
infrastructure to an organization are too stated in the above report. It has also been
analysed that there are lot of risks that are associated with the outsourcing of
10
reduces the effectiveness in performing the activities.
Dubious accessibility :- One of the most risks in outsourcing the information
system is of failing in performing the operation due to the failure of system which
moreover leads to great loss of an organization.
Threat of vulnerability :- It is very hard for an individual to manage and secure
a big amount of sensitive or personal data. The frequency of overcoming from
this problem is much less due to the involvement of third party which however
rises the threat of maintaining the confidential data rise.
Why is IT infrastructure so critical to digital transformation!
IT infrastructure is considered to be very vital in digital transformation and the
root for the enhancement of digital transformation. It has been recognized that the
companies who will fail to understand the importance of data centre infrastructure will
limit themselves to gain more profits. It is not a very easy process to implement a digital
transformation in the company because it requires a lot critical thinking. An organisation
needed to invest in the technologies at the vital time when they want to stabilize its
operations in future(Leung., 2019). A potent IT infrastructure is very much important for
the companies to perform the firms activities very smoothly and effectively. It also
enables to conduct a better collaboration within the departments of organisation or
between two more than two organisation.
Conclusion
From the above report, it has been concluded that there are various
computerized programmes that helps the system to function properly. Globalisation and
the effects of IT on the globalisation states that it is imperative for the firms to enhance
their productivity. The various advantages as well as disadvantages of digital
infrastructure to an organization are too stated in the above report. It has also been
analysed that there are lot of risks that are associated with the outsourcing of
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Information systems. At last it has also been acknowledged that the IT infrastructure
has a lot of importance in digital transformation.
References
Al-Emran and et. al., 2018. The impact of knowledge management processes on
information systems: A systematic review. International Journal of Information
Management, 43, pp.173-187.
Avison, D.E., Davison, R.M. and Malaurent, J., 2018. Information systems action
research: Debunking myths and overcoming barriers. Information &
Management, 55(2), pp.177-187.
Chaw, L.Y. and Tang, C.M., 2018. What makes learning management systems effective
for learning?. Journal of Educational Technology Systems, 47(2), pp.152-169.
Chen, H., 2018. Personalized recommendation system of e-commerce based on big
data analysis. Journal of Interdisciplinary Mathematics, 21(5), pp.1243-1247.
Dara, S., Chowdary, C.R. and Kumar, C., 2020. A survey on group recommender
systems. Journal of Intelligent Information Systems, 54(2), pp.271-295.
Izquierdo and et. al., 2021. Clinical management of COPD in a real-world setting. A big
data analysis. Archivos de Bronconeumología (English Edition), 57(2), pp.94-
100.
Jiang, D., Huo, L. and Song, H., 2018. Rethinking behaviors and activities of base
stations in mobile cellular networks based on big data analysis. IEEE
Transactions on Network Science and Engineering, 7(1), pp.80-90.
Kumar, S., Mookerjee, V. and Shubham, A., 2018. Research in operations management
and information systems interface. Production and Operations
Management, 27(11), pp.1893-1905.
Leung, C.K.S., 2019. Big data analysis and mining. In Advanced methodologies and
technologies in network architecture, mobile computing, and data analytics (pp.
15-27). IGI Global.
Li, C.T., Shih, D.H. and Wang, C.C., 2018. Cloud-assisted mutual authentication and
privacy preservation protocol for telecare medical information
systems. Computer methods and programs in biomedicine, 157, pp.191-203.
Li and et. al., 2018. Fast and parallel trust computing scheme based on big data
analysis for collaboration cloud service. IEEE Transactions on Information
Forensics and Security, 13(8), pp.1917-1931.
Roccetti and et. al., 2020. A cautionary tale for machine learning design: why we still
need human-assisted big data analysis. Mobile Networks and
Applications, 25(3), pp.1075-1083.
11
has a lot of importance in digital transformation.
References
Al-Emran and et. al., 2018. The impact of knowledge management processes on
information systems: A systematic review. International Journal of Information
Management, 43, pp.173-187.
Avison, D.E., Davison, R.M. and Malaurent, J., 2018. Information systems action
research: Debunking myths and overcoming barriers. Information &
Management, 55(2), pp.177-187.
Chaw, L.Y. and Tang, C.M., 2018. What makes learning management systems effective
for learning?. Journal of Educational Technology Systems, 47(2), pp.152-169.
Chen, H., 2018. Personalized recommendation system of e-commerce based on big
data analysis. Journal of Interdisciplinary Mathematics, 21(5), pp.1243-1247.
Dara, S., Chowdary, C.R. and Kumar, C., 2020. A survey on group recommender
systems. Journal of Intelligent Information Systems, 54(2), pp.271-295.
Izquierdo and et. al., 2021. Clinical management of COPD in a real-world setting. A big
data analysis. Archivos de Bronconeumología (English Edition), 57(2), pp.94-
100.
Jiang, D., Huo, L. and Song, H., 2018. Rethinking behaviors and activities of base
stations in mobile cellular networks based on big data analysis. IEEE
Transactions on Network Science and Engineering, 7(1), pp.80-90.
Kumar, S., Mookerjee, V. and Shubham, A., 2018. Research in operations management
and information systems interface. Production and Operations
Management, 27(11), pp.1893-1905.
Leung, C.K.S., 2019. Big data analysis and mining. In Advanced methodologies and
technologies in network architecture, mobile computing, and data analytics (pp.
15-27). IGI Global.
Li, C.T., Shih, D.H. and Wang, C.C., 2018. Cloud-assisted mutual authentication and
privacy preservation protocol for telecare medical information
systems. Computer methods and programs in biomedicine, 157, pp.191-203.
Li and et. al., 2018. Fast and parallel trust computing scheme based on big data
analysis for collaboration cloud service. IEEE Transactions on Information
Forensics and Security, 13(8), pp.1917-1931.
Roccetti and et. al., 2020. A cautionary tale for machine learning design: why we still
need human-assisted big data analysis. Mobile Networks and
Applications, 25(3), pp.1075-1083.
11
12
1 out of 12
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.