International Journal of Retail And Distribution Management

Verified

Added on  2022/09/18

|22
|5656
|15
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: MANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEM
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MANAGEMENT INFORMATION SYSTEM
Table of Contents
Answer 1:-.......................................................................................................................................2
Industry 4.0:-................................................................................................................................2
Technologies:-.............................................................................................................................3
Answer 2:-.......................................................................................................................................5
Ethical dilemma:-.........................................................................................................................5
Ethics and Artificial Intelligence.................................................................................................6
Answer 3:-.......................................................................................................................................8
Bob case study:-...........................................................................................................................8
Advantages:-..............................................................................................................................10
Answer 4:-.....................................................................................................................................11
Reports:-........................................................................................................................................11
Link 1:-..........................................................................................................................................11
Human factors:-.........................................................................................................................11
Views:-.......................................................................................................................................12
Link 2:-..........................................................................................................................................13
Human role:-..............................................................................................................................13
Views:-.......................................................................................................................................13
Answer 5:-.....................................................................................................................................14
Impact of mobile applications in the retail sector:-...................................................................14
Advantages:-..............................................................................................................................16
References:-...................................................................................................................................18
Document Page
2MANAGEMENT INFORMATION SYSTEM
Answer 1:-
Industry 4.0:-
It is the subsection of the fourth industrialized insurrection that concerns business. The
fourth industrial revolt includes areas which are not usually categorized as an industry, like smart
cities. Industry 4.0 residues a word familiar in German talking areas. Accordingly, this controller
will aim at trying to describe the term, discovering the design moralities, the benefits and the
challenges facing such a method, and try to measure the possible lying underneath.
The Industry 4.0 revolution receipts the mechanization of manufacturing procedures to a
different level by familiarizing modified and flexible mass production skills. These denote that
machines will function autonomously, or collaborate with humans in making a client-oriented
construction field that continuously works on preserving itself (Lasi et al., 2014). The machine
somewhat becomes an autonomous object that is capable of gathering information, examining it,
and directing upon it. These become conceivable by announcing self-cognition, self-
optimization, and customization into the business. The constructors will be able to interconnect
with processors rather than functioning them.
The quick variations in the ICT have broken the limitations between the real world and
the virtual world. The knowledge behind Industry 4.0 is to generate a social system where
apparatuses can interconnect with each other, named the IoT and with persons, termed the IoP.
This way, apparatuses can interconnect with each other and with the constructors to make what
people now call a CPP system. All of this supports industries to participate in the real domain
into a computer-generated one and permit technologies to gather vital documents, examine them,
and even make verdicts built upon them.
Document Page
3MANAGEMENT INFORMATION SYSTEM
Technologies:-
Industry 4.0 has prepared the proper workshop reality, thanks in portion to the extensive
application of digital technologies in earlier manual procedures (Lee, Bagheri & Kao, 2015).
Connectivity, mechanization, and optimization are lashing the Industry 4.0 digital revolution.
However, several types of machinery are functioning together to understand the full perspective
of the modern 4.0 movement.
IIoT
Industrial IoT is when interconnectivity and association of documents, apparatuses, and
persons in the globe of engineering. It receipts IoT –machines, sensors, and documents all linked
and interfacing effortlessly and relates it to industrialize. Each characteristic of the
manufacturing process can be associated in the IIoT, and the documents it makes can be
leveraged into augmenting effectiveness across the industrial operation.
Automation
The definitive objective of an associated factory is to exploit efficiency, consequently
maximizing revenues. The automation must be accepted into certain or all of the automated
procedures. Automation, through robotics or artificial intelligence, is made probable by the
communication and interconnectivity that happens across an Industry 4.0 enhanced facility.
AI
AI and its subdivision machine learning are virtually a necessity for an Industry 4.0
permitted smart workshop (Stock & Seliger, 2016). The entire foundation around this innovative
industrial revolution is to take out manual dispensation, and intelligence is the prime tool to
apply in its place. It can use the documents produced from a related factory to improve
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MANAGEMENT INFORMATION SYSTEM
apparatus, reprogram workflows, and classify overall developments that can be completed to
drive efficacies and eventually, revenue.
Big Data & Analytics
Because each function of the engineering action is being examined and generating
documents. Conversely, these analytics structures can apply AI technologies and machine
learning to rapidly develop information and give choice makers the evidence they want to make
developments across a whole manufacturing act.
The Cloud
Constructors do not take or want to apply the immense quantity of space essential to
physically store vast capacities of information formed in an Industry 4.0 operation (Lee, Kao &
Yang, 2014). These are what creates cloud computing and storage an unquestionable requirement
and key component in an associated factory. Cloud convention also permits for a single resource
of fact and information sharing across the business. Finally, cloud storage also permits for
inaccessible access and observing of all information and machine working systems, providing
huge perceptibility into processes and effectiveness.
Cyber-security
Because each touch point in the industrial operation is linked and digitized in Industry
4.0, there is an additional necessity for forceful cyber-security. Manufacturing equipment,
computer structures, information analytics, the cloud, and any other method linked through IoT
should be sheltered.
Simulations
Document Page
5MANAGEMENT INFORMATION SYSTEM
Having the capability to estimate consequences is one of the major game-changers in the
phase of Industry 4.0 and business (Zhou, Liu & Zhou, 2015). Beforehand the factory
digitization, altering over a product line and adjusting its production and speed was rather a
presumption and always defective. With today’s progressive simulation prototypes driven by the
AI and IoT, manufacturing processes can enhance technology for their subsequent product run,
thus saving money and time.
Augmented Reality
Augmented-reality built structures upkeep a diversity of facilities, like choosing measures
in a warehouse and sending restoration directions over electronic devices. These methods are
presented in their beginning, but in the upcoming, businesses will create much bigger use of
increased authenticity to deliver workforces with real-time evidence to progress choice-making
and work measures.
Answer 2:-
Ethical dilemma:-
An ethical inconsistency is a decision-making difficulty between two probable moral
necessities, neither of which is unmistakably satisfactory or desirable. As automated information
systems start to have an excessive impression on persons, administrations, and civilization as a
whole, there is much discussion about IT about communal privacy and control, safety and
reliability, and ethics and proficient accountabilities (Laudon & Laudon, 2015). While IT
continues to progress, so do the choices business proprietors and IT executives must face. In the
previous time, software piracy was a matter for various businesses. Conversely, that is much
fewer the situation today. In the previous times, innovative, ethical disputes in IT have
Document Page
6MANAGEMENT INFORMATION SYSTEM
developed, like how client data must be sheltered, and how AI should be applied in a technique
that fulfils, not just the regulation, but consumer’s expectations.
Ethics and Artificial Intelligence
Every year, as improvements are prepared in AI, industries that apply this knowledge will
be facing different ethical problems. For instance, if the business operator decides to apply
chatbots on their website to support clients, not only do they have to choose what evidence they
will be gathering from those clients and how it will be applied. The authority will also take to
choose whether or not to disclose their clients that they are interrelating with a program quite
than a person.
In other circumstances, the problems surrounding intelligence rotate around how it is
encoded. Human predilections and even biases can disturb how the software performs. Possibly
the definitive in ethical problems can be originated in how to encode self-driving cars (Stair &
Reynolds, 2015). In the occasion of a possible impact, the computer operator who projects the
software must resolve whom to protect. Mercedes-Benz prepared captions in 2016 when it
elected to always defend the driver first in its intelligence archetypes – even if that intended
plugging over a group of walkers, instead of direction-finding toward an onrushing truck.
Ethics is necessary for information Systems to overwhelm the following ethical
problems.
Confidentiality: What evidence about one’s self or one’s associations must a being disclose to
others, under what circumstances and with what protections? What possessions can persons save
to themselves and not be enforced to disclose to others?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7MANAGEMENT INFORMATION SYSTEM
Exactness: Who is answerable for the validity, loyalty and precision of information?
Correspondingly, who is to be detained accountable for mistakes in evidence and how is the
damaged party to be completed whole?
Possessions: Who owns evidence? What are the equal and fair values for its conversation? Who
possesses the networks, particularly the airlines, over which evidence is conducted? How should
contact to this rare resource be distributed?
Availability: What evidence does an individual or a business have a right or an opportunity to
find? Under what circumstances and with what protections?
In this part, the writer is describing different type of ethical principles which are
connecting to the information system. The instruction says that arrangements must be engaged so
that they lead to extremely good for the highest number.
The technology of a particular type is applied to control the content and information flow,
but the knowledge itself is appropriately neutral (Noothigattu et al., 2018). It is acute for
information structures experts to realize this idea and recognize that it is the operators of the
technology who create honest judgments. The concept of the information system in the
backroom, hidden and unpretentious by substitute actions in the firm, is now obsolete. When
information systems workforce takes part in immoral conduct, the whole business suffers.
Growing inspection of the functions by both outside and management the house parties will
create it problematic to cover up last observation such as their work is to guarantee the honesty
of the information. Ethical concerns in IS have been given different insistence by the increase of
the e-commerce and internet.
Document Page
8MANAGEMENT INFORMATION SYSTEM
The digital firm and internet technologies create it quicker than ever to collect,
participate, and allocate evidence, unleashing new distresses about the suitable application of
customer evidence, the defense of personal confidentiality, and the security of an intellectual
property (Laudon & Laudon, 2015). Other persistent ethical problems elevated by information
systems contain establishing answerability for the significances of information systems. It set
standards to protection system class that defends the security of the specific and society, and
protective standards and institutions measured indispensable to the life quality in an information
culture.
These straightforward thoughts form the supporting of an ethical investigation of
information systems and those who accomplish them. First, IT is clarified over social
institutions, administrations, and persons. Structures do not have influences by themselves.
Whatever IS impacts happen are products of official, structural, and individual activities and
performances. Second, accountability for the significances of technology drops clearly on the
organizations, administrations, and individual executives who select to apply the technology
(Abbasi, Sarker & Chiang, 2016). Applying IT in a socially responsible manner denotes that
people can and will be believed answerable for the significances of their actions. Third, in moral,
political culture, persons and others can improve harms done to them over a set of regulations
considered by the due procedure.
Answer 3:-
Bob case study:-
Bob is the proprietor of his auto mechanics business. He is employing some full-time
mechanics, has approached this report writer for instruction on the tracking process of his clients,
Document Page
9MANAGEMENT INFORMATION SYSTEM
the works he finalizes on their vehicles, who has accepted the work and the supplies he uses. He
must also like to send notices to clients when their car repairing is due. Bob is presently applying
paper-based filing structure to stock this evidence.
Client tracking is the method of gathering and establishing a customer's communication
evidence. Most usually, business possessors collect addresses, names, and phone contact details.
Conversely, there is more to client tracing than just knowing somebody's name (Monti et al.,
2016). Applying a client database, Bob can apply superficial evidence to rise trades, improve
client relations, make targeted advertising campaigns, and estimate the efficiency of existing
marketing activities.
It might come as an astonishment, but Bob still tracks their clients by spreadsheet. It
sounds problematic or disturbing, but each business wants to be keeping track of their clients
accurately. Bob does not take necessary to apply a big, excessive tool for customer tracking, and
he can use Google. Google Suite is a text facility obtainable by Google for mail customers (Han
et al., 2015). That means Bob will never have to concern about their client database threatened
when the processor is suffering from any disaster. If an association is applying software with a
tracking purpose, hard documents will happen to display how many times an executive spent
with a customer. With this evidence, the customer will be pleased knowing that they were billed
impartially, and their business will save money because workers’ hours were verified correctly.
Meanwhile, Bob has collected all their business tools in “Ever note” Business, he can
distribute white papers, FAQs, and other security with potential clients openly from his mobile
device without taking to follow-up after a conference. This simple effort can create a reflective
impression on sales by leveraging the moment and highlighting his team's attentiveness. As Bob
build their database, make fields and columns, he can easily classify and apply for dissimilar
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10MANAGEMENT INFORMATION SYSTEM
searches. The more Bob break out every piece of information, the more explorations he can
make. For instance, entering locations applying dissimilar fields for city, address, state and code
let he creates lists or perform explorations with one or more of those norms along with other
fields (Paolanti et al., 2018). Keep the client name and surname isolated to classify duplicate
schedules because of a different first name. Create job designations and enterprise names in
dissimilar fields.
Once Bob makes a client list, he is answerable for its safety. Be careful concerning who
has uses to his list, where Bob collects it and how he back it up. Bob should update this backup
list and original data daily. These help him backtrack to the previous working client list if the
present file becomes damaged. If Bob is hacked or big shot gains access to their customer dataset
without his authorization, select if he should let his clients know. If Bob client list does not cover
sensitive evidence, like banking details or passwords, then he might not need to anxious. If his
idea to arrange email arrangements with his customer lists, contact his Internet service provider
to regulate what its strategies are for directing bulk mail and if he must contain an opt-out facility
for clients.
Advantages:-
Inactive clients are a mostly appreciated group because they at present have a specified
category of linking with their business. So this collection can arrive greater speculation than, say
non-qualified leads and cold leads. With an active client tracking structure in place, Bob can find
where the business cycle fell separately and target sluggish clients with their innovative,
upgraded marketing resources (Sturari et al., 2016). Effective customer relations are frequently
constructed on more than just reasonable pricing, which is the part where most industries place
their concentration. Conversely, most client relationships hesitate because of overall
Document Page
11MANAGEMENT INFORMATION SYSTEM
disappointment with an industry. A client tracking structure can assist Bob to recognize where to
rise his marketing determinations. The client relationships will profit most from boosting their
brand acknowledgement, increasing their service struggles and notifying clients about their
product and service assistances.
Customer tracking process confirms effective co-ordination of advertising campaigns. It
is probable to filter the information and confirm the elevations do not mark those who have
previously purchased specific products. Bob can also apply the information to familiarize loyalty
programs that simplify a higher client retention percentage. Businesses get more influenced to
turn their investigations into acquisitions once they are replied to punctually. Bob’s business that
has effectively implemented a client tracking software system has witnessed a drastic reduction
in reversal time.
Answer 4:-
Reports:-
Link 1:-
In these reports are publishing in the Australian Cybersafety centre. According to this
report (), the ACSC authority is discussing the significant steps which can be essential for
business. Mischievous or criminal outbreaks are intentionally crafted to exploit identified
susceptibilities for monetary or other improvements. The report describes that many cyber
occurrences exploit susceptibilities connecting a human factor, like as unsuspectingly clicking on
a malicious link and revealing passwords. In this assignment are describing some human factors
which are the reason of this occurrences.
Document Page
12MANAGEMENT INFORMATION SYSTEM
Human factors:-
The ACSC accepts a large portion of reports. This report declares that the Workforce
scam emails that sendup the emails are sent to employee areas looking to ask for a modification
in bank account facts for the present or upcoming pay – sometimes effectively, passing salaries
into the incorrect hands. The Scammers were demanding to be from communication service
counters seeking to persuade staff to disclose their multifactor verification authorizations.
The report also says that smash with a ransomware outbreak, a company’s OS were
encoded and they had no other backup. A private firm assisted with data recovery and, observing
to Australian Government guidance, and no payment was paid ("Follow our essential steps to
protect your business | Cyber.gov.au", 2020). A worker may send evidence to the incorrect
person or click on a hyperlink connection that results in cooperated user identifications –
generally a password and user name. It is user information, cash, and, occasionally, their
employment, that is at stake. So it is significant to defend it.
Malevolent intent is the essential inspiration behind most data breaks testified under the
Notifiable Information Breaches arrangement. However, human mistake is a crucial factor,
according to the modern statistics from the OAIC. The OAIC has described trimestral on the
NDB arrangement throughout its first year of the process, complementing mathematical
understandings with an examination and comprehensive trend information ("Follow our essential
steps to protect your business | Cyber.gov.au", 2020). They also consider that by understanding
reasons and sectorial tendencies, objects can drive real developments to persons, procedure and
technology actions which avoid information breaches.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13MANAGEMENT INFORMATION SYSTEM
Views:-
If the user is very much aware of these types of attack, then they quickly mitigate
effectively. It is essential to interconnect user distresses and enquire about their investigation
process and watching software (Abawajy, 2014). If the user is insecure about the quality of their
safety, ask to observe their IT substructure audits to protect that appropriate defends are in place.
Finally, the user can powerfully inspire them to apply a change discovery software to recognize
when any of their structures have been reformed, for enhanced or for worse.
Link 2:-
In the second link are describing the detail reports about threats and cybercrime. Mr
Alastair MacGibbon, the ACSC head declares that false texts and emails that try to get a user to
deliver their evidence, false shopping websites, and false statements. These are sent to Australian
industries are just sure of the techniques that cybercriminals are pointing Australians ("One in
four Australians hit by cybercrime - reversing the threat | Cyber.gov.au", 2020). Research states
that Australians are getting vast numbers of emails each day from hackers who want to trick
them into delivering their banking details, logins accounts, passwords and individual info to theft
money.
Human role:-
The human being should follow some mentioning points to mitigate this risk. Well
framed Passwords are the measure for any online dealings. Make assured user have robust
passwords and apply a second authentication layer, like fingerprint scanning or SMS code. The
people all need to carefully check emails requesting for individual details, confirmation of their
bank details or password. False emails are receiving progressively sophisticated ("One in four
Document Page
14MANAGEMENT INFORMATION SYSTEM
Australians hit by cybercrime - reversing the threat | Cyber.gov.au", 2020). The person should
interact with the organization individually to discover cyber authenticity. In the time when the
user gets a notice to software up-gradation on a user computer or applications, they should do it
quickly. It will support them to protect their evidence and uniqueness. If it is probable for others
to observe what people are doing over open Wi-Fi networks, so do not do online shopping or
banking and do not send profound information.
Views:-
Now, there are several techniques someone can hack into the user system over social
engineering. It is the application of media to operate persons into giving up intimate evidence.
ACSC is launching stay smart online program, which is helpful for all business authority to gain
cyber hacking knowledge. On-time threat discovery is essential to the successful examination,
and forensic scrutiny, of a directed attack (Gutzwiller et al., 2015). Trusting exclusively on
workers’ vigilance and their capability to report occurrences when they occur is not sufficient, as
the threats regarding both human aspects and attack complexity are doubling. It is consequently
suggesting that businesses application dedicated resolutions and types of machinery that
mechanize system observing and decrease the probabilities of irresponsibility and error.
Answer 5:-
Impact of mobile applications in the retail sector:-
While the developing technology has carried many dares for the industries, at a similar
time, it has also presented several brilliant openings. It can’t be opposed that the mobile
insurgency has accompanied the shopping in a current period that has renovated the knowledge
into a reckless and convenient conversation over mobile devices (Pantano, 2014). Today, the
Document Page
15MANAGEMENT INFORMATION SYSTEM
mobile machinery has remarkably developed into a productive standard that not only permits
operators to link products, and shops anywhere and anytime securely through their accessible
devices, but it has disappeared an excessive way. For example, Google Wallet is an
overwhelming online payment structure that works as a beautiful income-generating device for
the retail industry.
Whether the retail industry claims an Internet existence, a physical supply, a mobile
existence, or a call center, clients expect that the trader will distinguish the connection history
irrespective of the selected channel. Consequently, they imagine a unified and perfect stream of
the evidence from a network to another. Furthermore, since clients hook up to facilities that bring
instant resolutions, proximity and satisfaction have become vital in retail industries
(Hüseyinoğlu, Galipoğlu & Kotzab, 2017). No hesitation incorporating the mobile-based
progressive skills in the supply chain can propose an excess of paybacks. It will deliver
continuous access to information, improved real-time receptiveness, and horizontal data flow
across external and internal organizations.
Consequently, vendors must adjust to the mobile-first method to create transformation
determinations actively. Their professional policy must address the features of knowledge, end-
users, and procedure. By detecting how mobile knowledge can control the prospect of trading, it
can be assumed that boasting only a mobile incidence is not satisfactory. Retailers want to
integrate high-end mobile facilities in their commercial plans to certify their dependable
achievement in the industry, which is now in a cut-throat rivalry that will only intensify with
time. Consumers are currently carrying mobile universally they go, and they can apply mobile
applications to recover their shopping involvement (Taylor, 2016). They can simply relate
several product expenses, give response or register. These contribute customers the opening to be
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16MANAGEMENT INFORMATION SYSTEM
better learned and create smarter shopping judgments. But if vendors don’t court the mobile user
and disregard the wish for a more modified involvement, they will likely go somewhere else to
shop. Marketing mobile applications can similarly deliver the dealer a prospect to platform their
goods through virtual shopping frames that can be observed on the mobile phones. So for the
dealer, it must be in importance that the clients get supreme evidence on his or her handset
through their mobile application.
Mobile applications for marketing have opened up an innovative opportunity for dealers
and vendors. These applications that are explicitly customized or developed for the local region
can demonstrate to be compelling means of marketing products and facilities that a merchant is
proposing (Palos-Sanchez, Saura & Debasa, 2018). The applications can be applied for
showcasing the entire product variety with supplementary, useful evidence over the standard of
videos and photos. The applications of mobile shopping will support operators to bookmark or
protect the goods that they like and even purchase them in upcoming. These mobile applications
can also assist the operators in sharing evidence suitably, which eventually will affect viral
publicizing.
Advantages:-
Active Commercial Marketing
With the growing application of Smartphones, these have become an essential part of
industry marketing. Applications are active business advertising apparatus itself. Thus vendors
can market their services and product routinely with mobile applications. Clients can improve
complete evidence as well as stake them on social media stands. Thus, linking with extensive
clientele-base is merely probable within an inadequate budget as well.
Document Page
17MANAGEMENT INFORMATION SYSTEM
Personalized Facilities
Customer devotion is one of the most significant aspects to boom their business. They are
making offers over applications as like early bird concession, contracts and vouchers attract the
client base, and this support to create uninterrupted sales pitch. When the business offer adapted
facilities to a client, it supports consumers.
Built-in Smartphone Features
Several built-in features deliver exclusive customer knowledge. For example; GPS has
access to navigate the address and allow dealers to offer address-based concessions and offers,
which draws the user’s attention (Seth, 2014). Additional, camera function permits customers to
take images of products and distribute with family and friends, which incidentally encourage
their business without substantial effort.
Addictive Retail Apps
A current survey discloses that with the massive addiction on smartphone client trust on
retail applications which has enlarged the inevitability for e-commerce application development.
Shopping Experience
The user will confidently check the extensive evidence about the facilities or products.
Thus, with collaborating and user-friendly commercial applications, retail business possessors
are capable of delivering the full evidence to their target clients which will eventually support
them to create a hasty judgment.
Document Page
18MANAGEMENT INFORMATION SYSTEM
References:-
Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour &
Information Technology, 33(3), 237-248.
Abbasi, A., Sarker, S., & Chiang, R. H. (2016). Big data research in information systems:
Toward an inclusive research agenda. Journal of the Association for Information Systems,
17(2), 3.
Follow our essential steps to protect your business | Cyber.gov.au. Cyber.gov.au. (2020).
Retrieved 17 April 2020, from https://www.cyber.gov.au/news/essential-steps-to-protect-
your-business.
Gutzwiller, R. S., Fugate, S., Sawyer, B. D., & Hancock, P. A. (2015, September). The human
factors of cyber network defense. In Proceedings of the Human Factors and Ergonomics
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19MANAGEMENT INFORMATION SYSTEM
Society Annual Meeting (Vol. 59, No. 1, pp. 322-326). Sage CA: Los Angeles, CA:
SAGE publications.
Han, J., Ding, H., Qian, C., Xi, W., Wang, Z., Jiang, Z., ... & Zhao, J. (2015). Cbid: A customer
behavior identification system using passive tags. IEEE/ACM Transactions on
Networking, 24(5), 2885-2898.
Hüseyinoğlu, I. Ö. Y., Galipoğlu, E., & Kotzab, H. (2017). Social, local and mobile commerce
practices in omni-channel retailing. International Journal of Retail & Distribution
Management.
Lasi, H., Fettke, P., Kemper, H. G., Feld, T., & Hoffmann, M. (2014). Industry 4.0. Business &
information systems engineering, 6(4), 239-242.
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (p. 143). Upper Saddle
River: Pearson.
Lee, J., Bagheri, B., & Kao, H. A. (2015). A cyber-physical systems architecture for industry
4.0-based manufacturing systems. Manufacturing letters, 3, 18-23.
Lee, J., Kao, H. A., & Yang, S. (2014). Service innovation and smart analytics for industry 4.0
and big data environment. Procedia Cirp, 16(1), 3-8.
Monti, G., Corchia, L., De Benedetto, E., & Tarricone, L. (2016). Wearable logo-antenna for
GPS–GSM-based tracking systems. IET Microwaves, Antennas & Propagation, 10(12),
1332-1338.
Document Page
20MANAGEMENT INFORMATION SYSTEM
Noothigattu, R., Gaikwad, S. S., Awad, E., Dsouza, S., Rahwan, I., Ravikumar, P., & Procaccia,
A. D. (2018, April). A voting-based system for ethical decision making. In Thirty-Second
AAAI Conference on Artificial Intelligence.
One in four Australians hit by cybercrime - reversing the threat | Cyber.gov.au. Cyber.gov.au.
(2020). Retrieved 17 April 2020, from https://www.cyber.gov.au/news/sso-launch.
Palos-Sanchez, P. R., Saura, J. R., & Debasa, F. (2018). The influence of social networks on the
development of recruitment actions that favor user interface design and conversions in
mobile applications powered by linked data. Mobile Information Systems, 2018.
Pantano, E. (2014). Innovation drivers in retail industry. International Journal of Information
Management, 34(3), 344-350.
Paolanti, M., Liciotti, D., Pietrini, R., Mancini, A., & Frontoni, E. (2018). Modelling and
forecasting customer navigation in intelligent retail environments. Journal of Intelligent
& Robotic Systems, 91(2), 165-180.
Seth, E. (2014). Mobile commerce: A broader perspective. IT Professional, 16(3), 61-65.
Stair, R., & Reynolds, G. (2015). Principles of information systems. Cengage Learning.
Stock, T., & Seliger, G. (2016). Opportunities of sustainable manufacturing in industry 4.0.
Procedia Cirp, 40, 536-541.
Sturari, M., Liciotti, D., Pierdicca, R., Frontoni, E., Mancini, A., Contigiani, M., & Zingaretti, P.
(2016). Robust and affordable retail customer profiling by vision and radio beacon sensor
fusion. Pattern Recognition Letters, 81, 30-40.
Document Page
21MANAGEMENT INFORMATION SYSTEM
Taylor, E. (2016). Mobile payment technologies in retail: a review of potential benefits and risks.
International Journal of Retail & Distribution Management.
Zhou, K., Liu, T., & Zhou, L. (2015, August). Industry 4.0: Towards future industrial
opportunities and challenges. In 2015 12th International conference on fuzzy systems and
knowledge discovery (FSKD) (pp. 2147-2152). IEEE.
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]