Significance and Characteristics of Informational Privacy Globally in Transportation Sector
VerifiedAdded on 2023/06/14
|12
|3576
|300
AI Summary
This report evaluates the significance and characteristics of informational privacy globally in transportation sector. It also analyses the organisational opportunities and challenges posed to the transportation sector by information privacy and applies value chain analysis to analyse the efficiency of business in delivering information privacy to transportation sector businesses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Business information system
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction......................................................................................................................................3
Main Body ......................................................................................................................................3
Task 1...............................................................................................................................................3
Significance as well as characteristics of informational privacy globally 750...........................3
Task 2...............................................................................................................................................5
Analyse the organisational opportunities and challenges posed to your chosen sector by
information privacy.....................................................................................................................5
Task 3...............................................................................................................................................8
Value chain analysis....................................................................................................................8
Conclusion ......................................................................................................................................9
References......................................................................................................................................11
2
Introduction......................................................................................................................................3
Main Body ......................................................................................................................................3
Task 1...............................................................................................................................................3
Significance as well as characteristics of informational privacy globally 750...........................3
Task 2...............................................................................................................................................5
Analyse the organisational opportunities and challenges posed to your chosen sector by
information privacy.....................................................................................................................5
Task 3...............................................................................................................................................8
Value chain analysis....................................................................................................................8
Conclusion ......................................................................................................................................9
References......................................................................................................................................11
2
Introduction
The term information privacy relates to privacy of personal information of various
individuals with regards to personal data stored on computer systems. Taking contrast of
working in contemporary business environment there is a greater value added to the term
information privacy. Under the concept better output of results by a business firm can be
obtained when engaged in direct consumer dealings. This allows managers of respective firm to
show their respective transparency as well as accountability for business operations. For the
provided report document, key issues regarding information privacy will be evaluated for
transportation sector (Xiao and et. al., 2019). In the presented report document, evaluation over
characteristics and significance globally of information privacy will be taken into consideration.
In addition to this, relative opportunities as well as challenges posed to transportation sector by
information privacy will also being evaluated. Lastly, value chain model will be applied to
analyse efficiency of business in delivering information privacy to transportation sector
businesses (Song and et. al., 2018).
Main Body
Task 1
Significance as well as characteristics of informational privacy globally 750
The term information privacy or data privacy reflects towards that branch of security of
data that is concerned with proper handling of data. According to article published in Stanford
Encyclopedia of Philosophy, (2019), in contemporary business market there is a greater
important of privacy and its relative protection measures. In light of the fact that, human beings
tends to posses some control over their personal information or data when presenting working in
external environment. Although the growth of technology have resolved the issues and
challenges faced by business firm while operating in uncertain market situations, however is one
of the major contributor to threat of privacy to individuals (Gerber, Gerber and Volkamer, 2018).
Data privacy relates to management of information and data with accordance to how a
piece of private document is to be managed within the workforce. In today's market condition
informational privacy plays vital role in capturing good values of individuals that contributes
towards development of a society.
Significance of informational privacy globally
3
The term information privacy relates to privacy of personal information of various
individuals with regards to personal data stored on computer systems. Taking contrast of
working in contemporary business environment there is a greater value added to the term
information privacy. Under the concept better output of results by a business firm can be
obtained when engaged in direct consumer dealings. This allows managers of respective firm to
show their respective transparency as well as accountability for business operations. For the
provided report document, key issues regarding information privacy will be evaluated for
transportation sector (Xiao and et. al., 2019). In the presented report document, evaluation over
characteristics and significance globally of information privacy will be taken into consideration.
In addition to this, relative opportunities as well as challenges posed to transportation sector by
information privacy will also being evaluated. Lastly, value chain model will be applied to
analyse efficiency of business in delivering information privacy to transportation sector
businesses (Song and et. al., 2018).
Main Body
Task 1
Significance as well as characteristics of informational privacy globally 750
The term information privacy or data privacy reflects towards that branch of security of
data that is concerned with proper handling of data. According to article published in Stanford
Encyclopedia of Philosophy, (2019), in contemporary business market there is a greater
important of privacy and its relative protection measures. In light of the fact that, human beings
tends to posses some control over their personal information or data when presenting working in
external environment. Although the growth of technology have resolved the issues and
challenges faced by business firm while operating in uncertain market situations, however is one
of the major contributor to threat of privacy to individuals (Gerber, Gerber and Volkamer, 2018).
Data privacy relates to management of information and data with accordance to how a
piece of private document is to be managed within the workforce. In today's market condition
informational privacy plays vital role in capturing good values of individuals that contributes
towards development of a society.
Significance of informational privacy globally
3
There is a greater significance to informational privacy globally as threat to breach of
data can be eliminated. Through the analysis by implementation of information privacy measures
can be adopted at the working place for which better brand image of the business firm can be
displayed. Following are relevant significance of informational privacy globally that are being
stated below (Gandy, 2021); Human right to privacy: The term privacy is recognised as an individual human right in
terms of various international treaties and conventions such as the International Covenant
on Civil and Political Rights. The provided term i.e., informational privacy relates to
individual's ability to determine themselves when, for what and how their personal
information is being handled by other individuals. Avoiding Emotional distress: Through informational privacy coordinated efforts can be
produced at the workplace that will count with respect to avoiding emotional distress to
an individual. From the analysis trends can be established on the basis of which better
understandings of the workforce environment can be taken into consideration for which
positive working environment can be established. Avoiding discrimination: When taking instance of informational privacy discrimination
at the workplace can be avoided. For the reason being limited information or data will be
shared that will contributes towards better efforts when being engaged with group tasks
in the operational firm (Hamidi and Chavoshi, 2018).
Characteristics of informational privacy globally Security: The term informational privacy provides with high security of data and
information of an individual. This create positive sense of working for variety of
individuals at the workplace. Through the analysis better terms of actions can be
performed when being engaged in variety of business operations. Awareness: Another characteristics of informational privacy includes spreading
awareness about several privacy laws and regulation made available for individuals
within the society. When being engaged with workplace activities coordinated tasks can
be produced that might motivate individuals to perform guided efforts for completion of
desired workforce goals and objectives.
4
data can be eliminated. Through the analysis by implementation of information privacy measures
can be adopted at the working place for which better brand image of the business firm can be
displayed. Following are relevant significance of informational privacy globally that are being
stated below (Gandy, 2021); Human right to privacy: The term privacy is recognised as an individual human right in
terms of various international treaties and conventions such as the International Covenant
on Civil and Political Rights. The provided term i.e., informational privacy relates to
individual's ability to determine themselves when, for what and how their personal
information is being handled by other individuals. Avoiding Emotional distress: Through informational privacy coordinated efforts can be
produced at the workplace that will count with respect to avoiding emotional distress to
an individual. From the analysis trends can be established on the basis of which better
understandings of the workforce environment can be taken into consideration for which
positive working environment can be established. Avoiding discrimination: When taking instance of informational privacy discrimination
at the workplace can be avoided. For the reason being limited information or data will be
shared that will contributes towards better efforts when being engaged with group tasks
in the operational firm (Hamidi and Chavoshi, 2018).
Characteristics of informational privacy globally Security: The term informational privacy provides with high security of data and
information of an individual. This create positive sense of working for variety of
individuals at the workplace. Through the analysis better terms of actions can be
performed when being engaged in variety of business operations. Awareness: Another characteristics of informational privacy includes spreading
awareness about several privacy laws and regulation made available for individuals
within the society. When being engaged with workplace activities coordinated tasks can
be produced that might motivate individuals to perform guided efforts for completion of
desired workforce goals and objectives.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Participation: The provided term i.e., informational privacy helps in effective
participation of individuals while operating at a workplace. With its inclusion it can be
said that provided term helps in effective participation of individuals at the workplace.
Choices: Through the provided concept individuals working at the workplace can make
decent choices with regards sharing of information and data at the workplace. This
contributes towards extension form of human rights that are made available to an
individual while operating variety of tasks in an economy (Lopes de Sousa Jabbour and
et. al., 2018).
Task 2
Analyse the organisational opportunities and challenges posed to your chosen sector by
information privacy.
The mentioned business can face the number of factors by information privacy in their
operational sector. In regard to understand the mentioned trait more efficiently, below are the
brief discussion of various factor that deploy on the mentioned company operations. It will form
the number of opportunity as challenges regard to then business functions. The opportunity that
generate through the mentioned practice will include the protection of valuable data, competition
advantage, cost development efficiency as well as security of data. On the other hand various
challenges will also highlight in the mentioned assessment which is increase in maintenance cost,
management of data as well as storing the flood of data. All these factors are briefly evaluate in
the below discussion (Reis and et. al., 2018);
Opportunity
Protect valuable data- One of the major advantage by imposing the mentioned
technology in the organisation is to protect all the information regard to the business
activity. Through the use mentioned technology the respected business can easily protect
their reliable data such as critical assets. It provide the assistant in order to safeguard the
client and employee informations through third party. The respected business perform the
number of data informative transaction through the online portals in their operational
functions. Therefore, data leakage impacted on the complete business. Such mentioned
threat eliminated by protecting the data. These valuable information safeguards through
5
participation of individuals while operating at a workplace. With its inclusion it can be
said that provided term helps in effective participation of individuals at the workplace.
Choices: Through the provided concept individuals working at the workplace can make
decent choices with regards sharing of information and data at the workplace. This
contributes towards extension form of human rights that are made available to an
individual while operating variety of tasks in an economy (Lopes de Sousa Jabbour and
et. al., 2018).
Task 2
Analyse the organisational opportunities and challenges posed to your chosen sector by
information privacy.
The mentioned business can face the number of factors by information privacy in their
operational sector. In regard to understand the mentioned trait more efficiently, below are the
brief discussion of various factor that deploy on the mentioned company operations. It will form
the number of opportunity as challenges regard to then business functions. The opportunity that
generate through the mentioned practice will include the protection of valuable data, competition
advantage, cost development efficiency as well as security of data. On the other hand various
challenges will also highlight in the mentioned assessment which is increase in maintenance cost,
management of data as well as storing the flood of data. All these factors are briefly evaluate in
the below discussion (Reis and et. al., 2018);
Opportunity
Protect valuable data- One of the major advantage by imposing the mentioned
technology in the organisation is to protect all the information regard to the business
activity. Through the use mentioned technology the respected business can easily protect
their reliable data such as critical assets. It provide the assistant in order to safeguard the
client and employee informations through third party. The respected business perform the
number of data informative transaction through the online portals in their operational
functions. Therefore, data leakage impacted on the complete business. Such mentioned
threat eliminated by protecting the data. These valuable information safeguards through
5
the mentioned practises that can create the faith of employees and other business partners
towards the company operations (Hassan, Rehmani and Chen, 2019).
Staying ahead in competition- The privacy of information plays a vital role in
highlighting the business operations in the operational market. Hence, by protecting the
individual informations in the operational business can assist the respected company to
gain the confidence of other clients towards business operations. In regard to this by
adopting the mentioned trait in business operation the respected business can easily
generate the confidence of investors and other potential client to participate in their
business activity. By such function the respected business can increase the flow of funds
that can help them towards evaluating their business operations in the competitive
market. It generate the chances as well as also deploys opportunity to cater the market by
developing the faith between various channels.
Reduced cost of development- By installing the security prospective in the business
operations the mentioned business can easily decease cost in their transportation
operations. In relation to this it eliminate the threat of data loss that succours the
respected business in order to decrease the support time which can be rebound to other
operational activity. In light to the fact that inappropriate software and technology cost
the high price to company operations in relation to data loss and lost time. Therefore, by
adding the security measures the respected company can easily eliminate these cost that
unnecessary impacting their business operations by decreasing their operational activity
in the significant market. By such process they can smoothly saves a lot of money which
can be used in developing the more efficient functions in the company operations.
Protection from hackers- By following the respected privacy practices in the
operational functions create the high security walls that safeguard the informative data.
These reliable information could be anything regard to addresses, phone numbers, email
account details as well as health related data. Therefore, by installing the safety procedure
the respected business can easily safeguard the sensitive data of their client, employee or
other bank account details. It eliminate the fraudulent activity as well as determine the
theft Through their adaptive techniques. By following the mentioned approach in the
respected business operations they can eliminate all of the above traits from their
business functions which can provides the opportunity to focus on more reliable activity
6
towards the company operations (Hassan, Rehmani and Chen, 2019).
Staying ahead in competition- The privacy of information plays a vital role in
highlighting the business operations in the operational market. Hence, by protecting the
individual informations in the operational business can assist the respected company to
gain the confidence of other clients towards business operations. In regard to this by
adopting the mentioned trait in business operation the respected business can easily
generate the confidence of investors and other potential client to participate in their
business activity. By such function the respected business can increase the flow of funds
that can help them towards evaluating their business operations in the competitive
market. It generate the chances as well as also deploys opportunity to cater the market by
developing the faith between various channels.
Reduced cost of development- By installing the security prospective in the business
operations the mentioned business can easily decease cost in their transportation
operations. In relation to this it eliminate the threat of data loss that succours the
respected business in order to decrease the support time which can be rebound to other
operational activity. In light to the fact that inappropriate software and technology cost
the high price to company operations in relation to data loss and lost time. Therefore, by
adding the security measures the respected company can easily eliminate these cost that
unnecessary impacting their business operations by decreasing their operational activity
in the significant market. By such process they can smoothly saves a lot of money which
can be used in developing the more efficient functions in the company operations.
Protection from hackers- By following the respected privacy practices in the
operational functions create the high security walls that safeguard the informative data.
These reliable information could be anything regard to addresses, phone numbers, email
account details as well as health related data. Therefore, by installing the safety procedure
the respected business can easily safeguard the sensitive data of their client, employee or
other bank account details. It eliminate the fraudulent activity as well as determine the
theft Through their adaptive techniques. By following the mentioned approach in the
respected business operations they can eliminate all of the above traits from their
business functions which can provides the opportunity to focus on more reliable activity
6
that can be adopted in order to enhance the business operation regard to their target
market (Lu, Papagiannidis and Alamanos, 2018).
Prevention of website- The respected business has established their business operations
through websites. As the number of activity performs through the official webpage.
Hence, there are number of chances that the mentioned site could be downtime sue to
various unpredicted actions in which one of the main factor is cyber breach. The
unauthorised individual can force close the website which can majorly impact the
business operations badly. Hence, by using the information privacy the respected
business can develop the firewall protection through the sue of adaptive and efficient
tool. These tools ensures to bound the unauthorised activity that can help the respected
business to safeguarded their reliable information regard to the business and management
operations. Therefore, by the implication of above mentioned tool in the business
operations that respected business can enhance its business operations.
Better business Management- one of the main advantage of implying the mentioned
trait in the business operation is to from the efficient business management. As it is
clearly stated in the above discussion that information privacy is one of the main element
that helps the business to safeguard their reliable informations. Through the better data
protection the mentioned business can easily store their reliable data at a safe account.
These operations provides the better assistance to the respected business to develop the
business ethics and encourage the people to puts adaptive efforts. Hence, by developing
the trustworthy environment in the business activity also develop the opportunity to
attract the customers that seeking the trustworthiness environment (Ghobakhloo and
Fathi, 2019).
Challenges
Increase maintaining cost- One of the main challenge that can face by the respected
company by adopting the respected practice in the operational function is maintaining
cost. To maintain the data need the number tools which priced so high. Hence, these
tools Renewed on yearly basis that can high cost the company. In light to the fact it is
clear that the mentioned tool is foremost important for the respective business in order to
safeguard their data. In order to maintain the cost in budget the business can face the
issue in reducing the number data silos.
7
market (Lu, Papagiannidis and Alamanos, 2018).
Prevention of website- The respected business has established their business operations
through websites. As the number of activity performs through the official webpage.
Hence, there are number of chances that the mentioned site could be downtime sue to
various unpredicted actions in which one of the main factor is cyber breach. The
unauthorised individual can force close the website which can majorly impact the
business operations badly. Hence, by using the information privacy the respected
business can develop the firewall protection through the sue of adaptive and efficient
tool. These tools ensures to bound the unauthorised activity that can help the respected
business to safeguarded their reliable information regard to the business and management
operations. Therefore, by the implication of above mentioned tool in the business
operations that respected business can enhance its business operations.
Better business Management- one of the main advantage of implying the mentioned
trait in the business operation is to from the efficient business management. As it is
clearly stated in the above discussion that information privacy is one of the main element
that helps the business to safeguard their reliable informations. Through the better data
protection the mentioned business can easily store their reliable data at a safe account.
These operations provides the better assistance to the respected business to develop the
business ethics and encourage the people to puts adaptive efforts. Hence, by developing
the trustworthy environment in the business activity also develop the opportunity to
attract the customers that seeking the trustworthiness environment (Ghobakhloo and
Fathi, 2019).
Challenges
Increase maintaining cost- One of the main challenge that can face by the respected
company by adopting the respected practice in the operational function is maintaining
cost. To maintain the data need the number tools which priced so high. Hence, these
tools Renewed on yearly basis that can high cost the company. In light to the fact it is
clear that the mentioned tool is foremost important for the respective business in order to
safeguard their data. In order to maintain the cost in budget the business can face the
issue in reducing the number data silos.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
increasing scale of Data- Another challenge that faced by the respective company in
their business operations is to storage of never ending data. The amount of data will
grow on year by year. Hence respected company can face the issue in order to maintain
and store such data in their data system. Another challenge that can raise in during
storage of data is regard cloud storage cost. In order to maintain such process the
respected business need a strategic planing in which unnecessary data need to eliminate
through the mentioned company storage system. Hence, by such implication they can
easily maintain their vast number of data into a compact one (Strange and Humphrey,
2019).
Data architecture- Storing the data is not a big challenge, but maintaining such
information secure is one of the main challenge. In order to maintain the mentioned trait
in business operations they need to maintain the management more effectively in order
to reduce the human errors. The management plays a vital role in managing the privacy
and security. Therefore, lack of management can cause in data breaches. Another
challenge that can face by the respected company is to maintain such authentic data and
assess them according to their requirement is a big task. The mentioned company need to
deploy the effective management techniques in order to maintain the flood of data
according to the company requirement. Therefore, any inappropriate activity can impact
the data security as well as can raise the situation of data breach (Dzwigol, Dzwigol-
Barosz and Kwilinski, 2020).
Task 3
Value chain analysis
The term value chain refers to taking into consideration several business activities as well
as processes that are involved in performing a service or creating a product. In context to value
chain analysis multiple stages of product's or service's are being taken into consideration that are
being sold in provided marketplace. In context to transportation sector taking instance of
informational privacy value being derived by a business is being taken into consideration. For
the purpose being variety of organisational tasks and activities will be taken into consideration
that will be classified as primary and secondary activities (Müller, Buliga and Voigt, 2018).
Following is the value chain to analyse how value is created
8
their business operations is to storage of never ending data. The amount of data will
grow on year by year. Hence respected company can face the issue in order to maintain
and store such data in their data system. Another challenge that can raise in during
storage of data is regard cloud storage cost. In order to maintain such process the
respected business need a strategic planing in which unnecessary data need to eliminate
through the mentioned company storage system. Hence, by such implication they can
easily maintain their vast number of data into a compact one (Strange and Humphrey,
2019).
Data architecture- Storing the data is not a big challenge, but maintaining such
information secure is one of the main challenge. In order to maintain the mentioned trait
in business operations they need to maintain the management more effectively in order
to reduce the human errors. The management plays a vital role in managing the privacy
and security. Therefore, lack of management can cause in data breaches. Another
challenge that can face by the respected company is to maintain such authentic data and
assess them according to their requirement is a big task. The mentioned company need to
deploy the effective management techniques in order to maintain the flood of data
according to the company requirement. Therefore, any inappropriate activity can impact
the data security as well as can raise the situation of data breach (Dzwigol, Dzwigol-
Barosz and Kwilinski, 2020).
Task 3
Value chain analysis
The term value chain refers to taking into consideration several business activities as well
as processes that are involved in performing a service or creating a product. In context to value
chain analysis multiple stages of product's or service's are being taken into consideration that are
being sold in provided marketplace. In context to transportation sector taking instance of
informational privacy value being derived by a business is being taken into consideration. For
the purpose being variety of organisational tasks and activities will be taken into consideration
that will be classified as primary and secondary activities (Müller, Buliga and Voigt, 2018).
Following is the value chain to analyse how value is created
8
and delivered in business by information privacy;
Primary activities
Inbound logistics
Under this activities are performed that are with regards to warehousing, receiving and
inventory management of the source material and components. In terms of transportation sector,
management of inventory system can be taken into consideration for which informational
privacy can also be explored.
Outbound logistics
For this element of primary activity, processing of raw materials and components into a
finished product is being taken into consideration. With regards to transportation sector
operations such as delivery of products to their ultimate consumers are being taken into
consideration. In the process being goods are picked from manufacturing unit and are being
delivered to end consumer taking key consideration to privacy of personal information.
Marketing and Sales
For this element promotional activities of the business firm with regards to marketing are
being taken into consideration. With regards to transportation sector effective considerations are
being paid to advertising of products and services being obtained at the workplace (Hernandez‐
Aguilera and et. al., 2018).
After-sales services
In the provided element, activities including after-sales services including replacement of
products, returns etc. are being taken into consideration. For inclusive of the concept effective
terms are determined for which coordinated efforts are being produced with respect to promotion
of business products in the business market.
Through the analysis of value chain analysis, it can be said that effective tasks are being
produced that correlates to activities being performed in transportation sector. It can be analysed
that variety of tasks needs to performed that coordinates with consumer needs in a society taking
key trend analysis of informational privacy within an economy. Better understandings was being
made that coordinated with exclusive basis of understandings was made that displayed better
working of the workforce. Therefore, avoiding the use of privacy in workforce it can cause in
data breaches. Another challenge that can face by the respected company is to maintain such
authentic data and assess them according to their requirement is a big task. The mentioned
9
Primary activities
Inbound logistics
Under this activities are performed that are with regards to warehousing, receiving and
inventory management of the source material and components. In terms of transportation sector,
management of inventory system can be taken into consideration for which informational
privacy can also be explored.
Outbound logistics
For this element of primary activity, processing of raw materials and components into a
finished product is being taken into consideration. With regards to transportation sector
operations such as delivery of products to their ultimate consumers are being taken into
consideration. In the process being goods are picked from manufacturing unit and are being
delivered to end consumer taking key consideration to privacy of personal information.
Marketing and Sales
For this element promotional activities of the business firm with regards to marketing are
being taken into consideration. With regards to transportation sector effective considerations are
being paid to advertising of products and services being obtained at the workplace (Hernandez‐
Aguilera and et. al., 2018).
After-sales services
In the provided element, activities including after-sales services including replacement of
products, returns etc. are being taken into consideration. For inclusive of the concept effective
terms are determined for which coordinated efforts are being produced with respect to promotion
of business products in the business market.
Through the analysis of value chain analysis, it can be said that effective tasks are being
produced that correlates to activities being performed in transportation sector. It can be analysed
that variety of tasks needs to performed that coordinates with consumer needs in a society taking
key trend analysis of informational privacy within an economy. Better understandings was being
made that coordinated with exclusive basis of understandings was made that displayed better
working of the workforce. Therefore, avoiding the use of privacy in workforce it can cause in
data breaches. Another challenge that can face by the respected company is to maintain such
authentic data and assess them according to their requirement is a big task. The mentioned
9
company need to deploy the effective management techniques in order to maintain the flood of
data according to the company requirement. Therefore, any inappropriate activity can impact the
data security as well as can raise the situation of data breach (Srinivasan and Swink, 2018).
Conclusion
From the analysis of above report document, it can be concluded that informational
privacy proves to be an important component for individuals when being engaged with variety of
personal as well as professional workplace tasks. Through the analysis, it can be said that better
terms can be defined which relates to coordinate tasks when being exploring characteristics and
significance of the term. There are variety of opportunities as well as challenges that are
provided through informational privacy. Through value chain analysis deliver of effective
business operations can be ascertained.
10
data according to the company requirement. Therefore, any inappropriate activity can impact the
data security as well as can raise the situation of data breach (Srinivasan and Swink, 2018).
Conclusion
From the analysis of above report document, it can be concluded that informational
privacy proves to be an important component for individuals when being engaged with variety of
personal as well as professional workplace tasks. Through the analysis, it can be said that better
terms can be defined which relates to coordinate tasks when being exploring characteristics and
significance of the term. There are variety of opportunities as well as challenges that are
provided through informational privacy. Through value chain analysis deliver of effective
business operations can be ascertained.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
Books and Journals
Song, M.L., Fisher, R., Wang, J.L. and Cui, L.B., 2018. Environmental performance evaluation
with big data: Theories and methods. Annals of Operations Research, 270(1), pp.459-
472.
Xiao, J., Wang, L., Deng, L. and Jin, Z., 2019. Characteristics, sources, water quality and health
risk assessment of trace elements in river water and well water in the Chinese Loess
Plateau. Science of the Total Environment, 650, pp.2004-2012.
Gerber, N., Gerber, P. and Volkamer, M., 2018. Explaining the privacy paradox: A systematic
review of literature investigating privacy attitude and behavior. Computers &
security, 77, pp.226-261.
Gandy Jr, O.H., 2021. The panoptic sort: A political economy of personal information. Oxford
University Press.
Hamidi, H. and Chavoshi, A., 2018. Analysis of the essential factors for the adoption of mobile
learning in higher education: A case study of students of the University of
Technology. Telematics and Informatics, 35(4), pp.1053-1070.
Lopes de Sousa Jabbour, A.B., Jabbour, C.J.C., Godinho Filho, M. and Roubaud, D., 2018.
Industry 4.0 and the circular economy: a proposed research agenda and original
roadmap for sustainable operations. Annals of Operations Research, 270(1), pp.273-
286.
Reis, J., Amorim, M., Melão, N. and Matos, P., 2018, March. Digital transformation: a literature
review and guidelines for future research. In World conference on information systems
and technologies (pp. 411-421). Springer, Cham.
Hassan, M.U., Rehmani, M.H. and Chen, J., 2019. Privacy preservation in blockchain based IoT
systems: Integration issues, prospects, challenges, and future research directions. Future
Generation Computer Systems, 97, pp.512-529.
Lu, Y., Papagiannidis, S. and Alamanos, E., 2018. Internet of Things: A systematic review of the
business literature from the user and organisational perspectives. Technological
Forecasting and Social Change, 136, pp.285-297.
Ghobakhloo, M. and Fathi, M., 2019. Corporate survival in Industry 4.0 era: the enabling role of
lean-digitized manufacturing. Journal of Manufacturing Technology Management.
Strange, R. and Humphrey, J., 2019. What lies between market and hierarchy? Insights from
internalization theory and global value chain theory. Journal of International Business
Studies, 50(8), pp.1401-1413.
Dzwigol, H., Dzwigol-Barosz, M. and Kwilinski, A., 2020. Formation of global competitive
enterprise environment based on industry 4.0 concept. International Journal of
Entrepreneurship, 24(1), pp.1-5.
Müller, J.M., Buliga, O. and Voigt, K.I., 2018. Fortune favors the prepared: How SMEs
approach business model innovations in Industry 4.0. Technological Forecasting and
Social Change, 132, pp.2-17.
Hernandez‐Aguilera, J.N., Gómez, M.I., Rodewald, A.D., Rueda, X., Anunu, C., Bennett, R. and
van Es, H.M., 2018. Quality as a driver of sustainable agricultural value chains: the case
of the relationship coffee model. Business Strategy and the Environment, 27(2), pp.179-
198.
11
Books and Journals
Song, M.L., Fisher, R., Wang, J.L. and Cui, L.B., 2018. Environmental performance evaluation
with big data: Theories and methods. Annals of Operations Research, 270(1), pp.459-
472.
Xiao, J., Wang, L., Deng, L. and Jin, Z., 2019. Characteristics, sources, water quality and health
risk assessment of trace elements in river water and well water in the Chinese Loess
Plateau. Science of the Total Environment, 650, pp.2004-2012.
Gerber, N., Gerber, P. and Volkamer, M., 2018. Explaining the privacy paradox: A systematic
review of literature investigating privacy attitude and behavior. Computers &
security, 77, pp.226-261.
Gandy Jr, O.H., 2021. The panoptic sort: A political economy of personal information. Oxford
University Press.
Hamidi, H. and Chavoshi, A., 2018. Analysis of the essential factors for the adoption of mobile
learning in higher education: A case study of students of the University of
Technology. Telematics and Informatics, 35(4), pp.1053-1070.
Lopes de Sousa Jabbour, A.B., Jabbour, C.J.C., Godinho Filho, M. and Roubaud, D., 2018.
Industry 4.0 and the circular economy: a proposed research agenda and original
roadmap for sustainable operations. Annals of Operations Research, 270(1), pp.273-
286.
Reis, J., Amorim, M., Melão, N. and Matos, P., 2018, March. Digital transformation: a literature
review and guidelines for future research. In World conference on information systems
and technologies (pp. 411-421). Springer, Cham.
Hassan, M.U., Rehmani, M.H. and Chen, J., 2019. Privacy preservation in blockchain based IoT
systems: Integration issues, prospects, challenges, and future research directions. Future
Generation Computer Systems, 97, pp.512-529.
Lu, Y., Papagiannidis, S. and Alamanos, E., 2018. Internet of Things: A systematic review of the
business literature from the user and organisational perspectives. Technological
Forecasting and Social Change, 136, pp.285-297.
Ghobakhloo, M. and Fathi, M., 2019. Corporate survival in Industry 4.0 era: the enabling role of
lean-digitized manufacturing. Journal of Manufacturing Technology Management.
Strange, R. and Humphrey, J., 2019. What lies between market and hierarchy? Insights from
internalization theory and global value chain theory. Journal of International Business
Studies, 50(8), pp.1401-1413.
Dzwigol, H., Dzwigol-Barosz, M. and Kwilinski, A., 2020. Formation of global competitive
enterprise environment based on industry 4.0 concept. International Journal of
Entrepreneurship, 24(1), pp.1-5.
Müller, J.M., Buliga, O. and Voigt, K.I., 2018. Fortune favors the prepared: How SMEs
approach business model innovations in Industry 4.0. Technological Forecasting and
Social Change, 132, pp.2-17.
Hernandez‐Aguilera, J.N., Gómez, M.I., Rodewald, A.D., Rueda, X., Anunu, C., Bennett, R. and
van Es, H.M., 2018. Quality as a driver of sustainable agricultural value chains: the case
of the relationship coffee model. Business Strategy and the Environment, 27(2), pp.179-
198.
11
Srinivasan, R. and Swink, M., 2018. An investigation of visibility and flexibility as complements
to supply chain analytics: An organizational information processing theory
perspective. Production and Operations Management, 27(10), pp.1849-1867.
12
to supply chain analytics: An organizational information processing theory
perspective. Production and Operations Management, 27(10), pp.1849-1867.
12
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.