Securities of Enterprise Systems Analysis
VerifiedAdded on  2022/08/21
|10
|2833
|14
AI Summary
Contribute Materials
Your contribution can guide someoneâs learning journey. Share your
documents today.
Running head: - SECURITIES OF ENTERPRISE SYSTEMS
SECURITIES OF ENTERPRISE SYSTEMS
Name of the Student
Name of the University
Author Note
SECURITIES OF ENTERPRISE SYSTEMS
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITIES OF ENTERPRISE SYSTEMS
Table of Contents
Introduction................................................................................................................................2
Securities of Enterprise Systems................................................................................................2
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Table of Contents
Introduction................................................................................................................................2
Securities of Enterprise Systems................................................................................................2
Conclusion..................................................................................................................................7
References..................................................................................................................................8
2SECURITIES OF ENTERPRISE SYSTEMS
Introduction
Enterprise Resource Planning Systems refer to a set of applications in the form of
software that provision respective business organizations with the allowance to implement
various procedures as well as methods. All of the methods that are provided by the enterprise
systems to all of the business organizations can be used properly to be implemented within
their regular proceedings of the business for a better result that is expected from the same.
However, these Enterprise Systems carry potential vulnerabilities towards getting attacked
with a number of attacks that can hamper the normal working of the business organization.
Hence, this report discusses with a wide range of measures that has the primary aim to
provide the Enterprise systems with the required amount of protection against the illicit
access by ensuring the accessibility as well as the integrity of the data belonging to the
system (Dawson 2017). The enterprise systems refer to a system that is complex in regards to
the activities that is performed by the same. The rise in complexity in terms of the processes
that are carried out result in rise of potential errors that take place and lead to conflicts and in
the end, hampering of the normal working of this system. As a reason, this report has the
primary aim to put forward the cause of such vulnerabilities along with the security systems
to prevent them.
Securities of Enterprise Systems
According to She and Thuraisingham (2017), Enterprise Resource Planning refers to a
specific approach for business integration that has been widely in use within variable
organizations since the time Gartner Group in the year of 1990 had defined this system as a
next level managerial software for the manufacturing procedures of the organizations within
the field of business. The ERP system commonly refers to an integrated, tailorable and a
configurable information system that carries the primary plan as well as manages all of the
Introduction
Enterprise Resource Planning Systems refer to a set of applications in the form of
software that provision respective business organizations with the allowance to implement
various procedures as well as methods. All of the methods that are provided by the enterprise
systems to all of the business organizations can be used properly to be implemented within
their regular proceedings of the business for a better result that is expected from the same.
However, these Enterprise Systems carry potential vulnerabilities towards getting attacked
with a number of attacks that can hamper the normal working of the business organization.
Hence, this report discusses with a wide range of measures that has the primary aim to
provide the Enterprise systems with the required amount of protection against the illicit
access by ensuring the accessibility as well as the integrity of the data belonging to the
system (Dawson 2017). The enterprise systems refer to a system that is complex in regards to
the activities that is performed by the same. The rise in complexity in terms of the processes
that are carried out result in rise of potential errors that take place and lead to conflicts and in
the end, hampering of the normal working of this system. As a reason, this report has the
primary aim to put forward the cause of such vulnerabilities along with the security systems
to prevent them.
Securities of Enterprise Systems
According to She and Thuraisingham (2017), Enterprise Resource Planning refers to a
specific approach for business integration that has been widely in use within variable
organizations since the time Gartner Group in the year of 1990 had defined this system as a
next level managerial software for the manufacturing procedures of the organizations within
the field of business. The ERP system commonly refers to an integrated, tailorable and a
configurable information system that carries the primary plan as well as manages all of the
3SECURITIES OF ENTERPRISE SYSTEMS
resources belonging to a respective business organization. Having the provisioned helping
hand from this particular system, the organizations have been able to automate all of the
fundamental applications of business, cost collaboration as well as reducing the complexity
of the business activities. However, all of such activities attract the increase in complexity
leading to errors taking place or privacy issues from online activities (Swan 2018). Hence,
security has been considered critically important for the ERP systems because they are
utilized in multiple fields such as the like of defence, medical, intelligence as well as
financial. To obtain this, the primary activity is to develop a security policy for the cause
along with a model for the respective ERP systems. Many of the existing systems of ERP
have the prime focus upon the confidentiality aspects of the security. The security facets in
relation to ERP systems have been placed under three primary categories namely, network,
presentation and application layer that has the inclusion of business processes, database as
well as internal interfaces. In the process of communication between a customer and that of
an ERP system, the business components are placed at variable sights (Chorafas 2016). The
security reasons in this regard is placed at the network level. In this regard, the experts of
ERP will not deal with such matters but entrust the same upon the experts in the field of
network security. Presentation layer has the inclusion of user interface, PCs as well as
browsers. It is considered impossible to restrict the GUI packets, hence the ERP experts have
come forward with a solution to install a CITRIX server between the user and that of the ERP
system to prevent the threat that is posed in this scenario (Kurniawan and Hiererra 2016).
Lastly, the security measures present within the application layer has the ERP experts
forward with the offer to effectively secure all of the business processes and their relative
data to prevent the security threats that can prevail in this layer to be exact.
As stated by Almeida et al. (2019), entities of enterprises take the successful
advantage from the efficiency that exists within the Enterprise Information System. Some of
resources belonging to a respective business organization. Having the provisioned helping
hand from this particular system, the organizations have been able to automate all of the
fundamental applications of business, cost collaboration as well as reducing the complexity
of the business activities. However, all of such activities attract the increase in complexity
leading to errors taking place or privacy issues from online activities (Swan 2018). Hence,
security has been considered critically important for the ERP systems because they are
utilized in multiple fields such as the like of defence, medical, intelligence as well as
financial. To obtain this, the primary activity is to develop a security policy for the cause
along with a model for the respective ERP systems. Many of the existing systems of ERP
have the prime focus upon the confidentiality aspects of the security. The security facets in
relation to ERP systems have been placed under three primary categories namely, network,
presentation and application layer that has the inclusion of business processes, database as
well as internal interfaces. In the process of communication between a customer and that of
an ERP system, the business components are placed at variable sights (Chorafas 2016). The
security reasons in this regard is placed at the network level. In this regard, the experts of
ERP will not deal with such matters but entrust the same upon the experts in the field of
network security. Presentation layer has the inclusion of user interface, PCs as well as
browsers. It is considered impossible to restrict the GUI packets, hence the ERP experts have
come forward with a solution to install a CITRIX server between the user and that of the ERP
system to prevent the threat that is posed in this scenario (Kurniawan and Hiererra 2016).
Lastly, the security measures present within the application layer has the ERP experts
forward with the offer to effectively secure all of the business processes and their relative
data to prevent the security threats that can prevail in this layer to be exact.
As stated by Almeida et al. (2019), entities of enterprises take the successful
advantage from the efficiency that exists within the Enterprise Information System. Some of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4SECURITIES OF ENTERPRISE SYSTEMS
the variably existing enterprise systems are costly in relation to the method of their
implementation as well as are inflexible to customize as per the needs of the business
organization. The primarily considered drive for all such movements towards the gaining of
efficiency has been the particular usage of enterprise systems towards the streamlining of all
the internally operating functions along with the technologies that particularly facilitate the
tight linkages within the organizations that have an external presence. However, there is the
shared existence of a number of potential threats that might occur such as the like of losing or
missing of data, or might as well be the failure of a system during the procedure of processing
(Paredes and Wheatley 2018). All of such risks potentially arrive from the inconsistency in
relation to the systems that have a complete dependency upon the computers. For instance,
when the system architects have not properly planned the infrastructure of a system, the
developers will be led to possess unsatisfied reliability. Risk commonly refers to the negative
impact of the relative exercise in regards to vulnerability having the consideration of
probability as well as the selective impact of the particular occurrence. Risk management on
the other hand, refers to a framework that can classify risks, assesses the same and then after
mitigates them with a proper usage of such tools and techniques. In reference to this, the
procedure of risk management is essential for the enterprise systems that provisions with
useful information for all of the levels existing within the management of a respective
business organization (Phillips 2017). Risk management for the enterprise systems have the
primary inclusion of aligning the strategy relative to the risk, enhancing the response
decisions in terms of risk as well as to reduce the operational strategies by identifying as well
as managing the identified risks that is posed towards the enterprise system in particular. All
of such characteristics in reference to the risk management of the enterprise systems
provision with a helping hand towards the achievement of enterprise performance along with
the profitability of the targets as well as prevention of loss of all the resources that might be
the variably existing enterprise systems are costly in relation to the method of their
implementation as well as are inflexible to customize as per the needs of the business
organization. The primarily considered drive for all such movements towards the gaining of
efficiency has been the particular usage of enterprise systems towards the streamlining of all
the internally operating functions along with the technologies that particularly facilitate the
tight linkages within the organizations that have an external presence. However, there is the
shared existence of a number of potential threats that might occur such as the like of losing or
missing of data, or might as well be the failure of a system during the procedure of processing
(Paredes and Wheatley 2018). All of such risks potentially arrive from the inconsistency in
relation to the systems that have a complete dependency upon the computers. For instance,
when the system architects have not properly planned the infrastructure of a system, the
developers will be led to possess unsatisfied reliability. Risk commonly refers to the negative
impact of the relative exercise in regards to vulnerability having the consideration of
probability as well as the selective impact of the particular occurrence. Risk management on
the other hand, refers to a framework that can classify risks, assesses the same and then after
mitigates them with a proper usage of such tools and techniques. In reference to this, the
procedure of risk management is essential for the enterprise systems that provisions with
useful information for all of the levels existing within the management of a respective
business organization (Phillips 2017). Risk management for the enterprise systems have the
primary inclusion of aligning the strategy relative to the risk, enhancing the response
decisions in terms of risk as well as to reduce the operational strategies by identifying as well
as managing the identified risks that is posed towards the enterprise system in particular. All
of such characteristics in reference to the risk management of the enterprise systems
provision with a helping hand towards the achievement of enterprise performance along with
the profitability of the targets as well as prevention of loss of all the resources that might be
5SECURITIES OF ENTERPRISE SYSTEMS
important to the business organizations in regards to the daily business procedures of the
organization.
As argued by Sutton (2016), Enterprise systems have been visibly identified to have
undergone significant evolution in the present years. The systems that have a shared existence
in the modern times can be properly utilized to automate all of the daily business procedures
that are carried out within the business organizations. Such activities include the likes of
human resources, stock management, sales as well as other important activities that form a
primary component of the business s organizations on a regular basis. As a reason, usage of
enterprise systems have been seen to rise within majority of the organizations within the field
of business (Kholkar, Sunkle and Kulkarni 2016). The primary reason behind choosing the
enterprise systems within the business organizations is the fact that such systems make the
organizations get rid of multiple software that is needed for differently existing purpose and
lead to data consistency as well as with the assurance that all of the regular activities are
compatible and at the same time accessible. However, there is the shared existence of
potential problems that lie as an added value to the enterprise systems that have been on the
rise to be used within the majority of the business organizations (Schubert and Glitsch 2016).
The foremost problem that can lead to the attraction of such threats towards enterprise
systems is that of delayed or no updates in the software that primarily perform within the
system in particular. Following this, the second most primary threat is the ones that come
from the externally existing sources outside the organization. Hence, it has always been
advised or should be kept in mind by the administrators of the business organizations that full
access rights to the individuals within or outside the organization that have no such need
should not be granted. By this way, random and unnecessary changes within the data of the
organization and in particular, within the enterprise systems can be avoided leading to a
better performance of the system and entertaining no such hampering issues (Chibvongodze
important to the business organizations in regards to the daily business procedures of the
organization.
As argued by Sutton (2016), Enterprise systems have been visibly identified to have
undergone significant evolution in the present years. The systems that have a shared existence
in the modern times can be properly utilized to automate all of the daily business procedures
that are carried out within the business organizations. Such activities include the likes of
human resources, stock management, sales as well as other important activities that form a
primary component of the business s organizations on a regular basis. As a reason, usage of
enterprise systems have been seen to rise within majority of the organizations within the field
of business (Kholkar, Sunkle and Kulkarni 2016). The primary reason behind choosing the
enterprise systems within the business organizations is the fact that such systems make the
organizations get rid of multiple software that is needed for differently existing purpose and
lead to data consistency as well as with the assurance that all of the regular activities are
compatible and at the same time accessible. However, there is the shared existence of
potential problems that lie as an added value to the enterprise systems that have been on the
rise to be used within the majority of the business organizations (Schubert and Glitsch 2016).
The foremost problem that can lead to the attraction of such threats towards enterprise
systems is that of delayed or no updates in the software that primarily perform within the
system in particular. Following this, the second most primary threat is the ones that come
from the externally existing sources outside the organization. Hence, it has always been
advised or should be kept in mind by the administrators of the business organizations that full
access rights to the individuals within or outside the organization that have no such need
should not be granted. By this way, random and unnecessary changes within the data of the
organization and in particular, within the enterprise systems can be avoided leading to a
better performance of the system and entertaining no such hampering issues (Chibvongodze
6SECURITIES OF ENTERPRISE SYSTEMS
2018). Enterprise systems have only proved to enhance the business activities of the
organizations, keeping aside the fact that it has some potential threats having the potential
capability to hamper the activities at the same time. However, the author also suggests that
usage of illegal or local enterprise systems may lead to larger threats being posed and
hampering the enterprise systems in a larger way having a greater impact. As a reason, the
organizations are always advised to make use of trusted enterprise systems that have been
already in use in other existing organizations to ensure that lower levels of threats posed
towards them.
As placed forward by Gharaibeh et al. (2017), IBM is a company that has been
serving the specific needs and requirements of the customers individually in reference to their
individual needs as per the problems that they faced within the field of information and
technology. IBM has the primary inclusion of a number of information systems along with
enterprise systems that they take into consideration while carrying out their daily business
activities. One such business activity that belongs to their daily routine is to entertain the
customer and listen to their problems. Following this, the company provision each of the
individual customers with the required amount of solution that is required at that moment of
time (Lepak et al. 2017). While doing this, IBM has a separate component of the enterprise
system to store all of the personal data that belongs to the customers for solving the problem
as well as to increase their customer database for future references. However, such
information provisioned to the company is sensitive and shall be provided with high rate of
security. As a reason, IBM prioritizes data security of the customers as a primary activity. In
this regard, security provided to the facilities, data as well as the people have been grained
into the business of the organization to keep them running (Watson et al. 2016). As a reason,
IBM specifically has been following few principles in relation to data security such as the
like of compartmentalization, duty separation, deep defence, continuous improvement with
2018). Enterprise systems have only proved to enhance the business activities of the
organizations, keeping aside the fact that it has some potential threats having the potential
capability to hamper the activities at the same time. However, the author also suggests that
usage of illegal or local enterprise systems may lead to larger threats being posed and
hampering the enterprise systems in a larger way having a greater impact. As a reason, the
organizations are always advised to make use of trusted enterprise systems that have been
already in use in other existing organizations to ensure that lower levels of threats posed
towards them.
As placed forward by Gharaibeh et al. (2017), IBM is a company that has been
serving the specific needs and requirements of the customers individually in reference to their
individual needs as per the problems that they faced within the field of information and
technology. IBM has the primary inclusion of a number of information systems along with
enterprise systems that they take into consideration while carrying out their daily business
activities. One such business activity that belongs to their daily routine is to entertain the
customer and listen to their problems. Following this, the company provision each of the
individual customers with the required amount of solution that is required at that moment of
time (Lepak et al. 2017). While doing this, IBM has a separate component of the enterprise
system to store all of the personal data that belongs to the customers for solving the problem
as well as to increase their customer database for future references. However, such
information provisioned to the company is sensitive and shall be provided with high rate of
security. As a reason, IBM prioritizes data security of the customers as a primary activity. In
this regard, security provided to the facilities, data as well as the people have been grained
into the business of the organization to keep them running (Watson et al. 2016). As a reason,
IBM specifically has been following few principles in relation to data security such as the
like of compartmentalization, duty separation, deep defence, continuous improvement with
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7SECURITIES OF ENTERPRISE SYSTEMS
the help of design as well as risk management to the information and the technology. The
company follows all of the principles that it has stated forward as a part of the policies that
shall be maintained by the company at all times for the reason of securing the data that is
provided to the company with trust by all the individual customers (Khuen and Rehman
2017). In addition to this, IBM also carries the primary motive of keeping the customers loyal
to them by providing with services that entirely solves the relative problem and to provision
the customers with full satisfaction.
Conclusion
Researches have placed forward evidences explaining the fact that enterprise systems
have always acted as a helping hand to majority of the business organizations by providing
them with the required amount of enhancement that might be needed at times by the
respective business organizations to meet the business requirements of the clients. Enterprise
systems have been long seen within the field of business providing the companies with
enhancement along with data consistency by providing them with a single destination to
complete all of their work as a part of their regular business activity. However, such
enterprise systems have also been identified to have the containment of vulnerabilities from
various external as well as internal threats that might have a direct impact upon the proper
working of the business organization within which the system has been installed. Hence, this
report clearly identifies all of such threats that have the capability to pose greater threats to
the enterprise systems as well as the impacts of the same upon the daily activities of the
respective organization. The report also places the example of IBM, which as a company
within the field of information and technology has been serving the customers for a long time
and have implemented such security measures to protect the customer privacy.
the help of design as well as risk management to the information and the technology. The
company follows all of the principles that it has stated forward as a part of the policies that
shall be maintained by the company at all times for the reason of securing the data that is
provided to the company with trust by all the individual customers (Khuen and Rehman
2017). In addition to this, IBM also carries the primary motive of keeping the customers loyal
to them by providing with services that entirely solves the relative problem and to provision
the customers with full satisfaction.
Conclusion
Researches have placed forward evidences explaining the fact that enterprise systems
have always acted as a helping hand to majority of the business organizations by providing
them with the required amount of enhancement that might be needed at times by the
respective business organizations to meet the business requirements of the clients. Enterprise
systems have been long seen within the field of business providing the companies with
enhancement along with data consistency by providing them with a single destination to
complete all of their work as a part of their regular business activity. However, such
enterprise systems have also been identified to have the containment of vulnerabilities from
various external as well as internal threats that might have a direct impact upon the proper
working of the business organization within which the system has been installed. Hence, this
report clearly identifies all of such threats that have the capability to pose greater threats to
the enterprise systems as well as the impacts of the same upon the daily activities of the
respective organization. The report also places the example of IBM, which as a company
within the field of information and technology has been serving the customers for a long time
and have implemented such security measures to protect the customer privacy.
8SECURITIES OF ENTERPRISE SYSTEMS
References
Almeida, R., Teixeira, J., Mira da Silva, M. and Faroleiro, P., 2019. A conceptual model for
enterprise risk management. Journal of Enterprise Information Management, 32(5), pp.843-
868.
Chibvongodze, R., 2018. The impact of Enterprise Risk Management on firm value: evidence
from Johannesburg Securities Exchange (Doctoral dissertation).
Chorafas, D.N., 2016. Enterprise architecture and new generation information systems. CRC
Press.
Dawson, M., 2017. Hyper-connectivity: Intricacies of national and international cyber
securities (Doctoral dissertation, London Metropolitan University).
Gharaibeh, A., Salahuddin, M.A., Hussini, S.J., Khreishah, A., Khalil, I., Guizani, M. and Al-
Fuqaha, A., 2017. Smart cities: A survey on data management, security, and enabling
technologies. IEEE Communications Surveys & Tutorials, 19(4), pp.2456-2501.
Kholkar, D., Sunkle, S. and Kulkarni, V., 2016. From Natural-language Regulations to
Enterprise Data using Knowledge Representation and Model Transformations. In ICSOFT-
PT (pp. 60-71).
Khuen, C.W. and Rehman, M., 2017, June. A maturity model for implementation of
enterprise business intelligence systems. In International Conference on Mobile and Wireless
Technology (pp. 445-454). Springer, Singapore.
Kurniawan, Y. and Hiererra, S.E., 2016, May. Information systems design for sustainability
financial services company using enterprise architecture framework: A case study approach.
In 2016 4th International Conference on Information and Communication Technology
(ICoICT) (pp. 1-6). IEEE.
References
Almeida, R., Teixeira, J., Mira da Silva, M. and Faroleiro, P., 2019. A conceptual model for
enterprise risk management. Journal of Enterprise Information Management, 32(5), pp.843-
868.
Chibvongodze, R., 2018. The impact of Enterprise Risk Management on firm value: evidence
from Johannesburg Securities Exchange (Doctoral dissertation).
Chorafas, D.N., 2016. Enterprise architecture and new generation information systems. CRC
Press.
Dawson, M., 2017. Hyper-connectivity: Intricacies of national and international cyber
securities (Doctoral dissertation, London Metropolitan University).
Gharaibeh, A., Salahuddin, M.A., Hussini, S.J., Khreishah, A., Khalil, I., Guizani, M. and Al-
Fuqaha, A., 2017. Smart cities: A survey on data management, security, and enabling
technologies. IEEE Communications Surveys & Tutorials, 19(4), pp.2456-2501.
Kholkar, D., Sunkle, S. and Kulkarni, V., 2016. From Natural-language Regulations to
Enterprise Data using Knowledge Representation and Model Transformations. In ICSOFT-
PT (pp. 60-71).
Khuen, C.W. and Rehman, M., 2017, June. A maturity model for implementation of
enterprise business intelligence systems. In International Conference on Mobile and Wireless
Technology (pp. 445-454). Springer, Singapore.
Kurniawan, Y. and Hiererra, S.E., 2016, May. Information systems design for sustainability
financial services company using enterprise architecture framework: A case study approach.
In 2016 4th International Conference on Information and Communication Technology
(ICoICT) (pp. 1-6). IEEE.
9SECURITIES OF ENTERPRISE SYSTEMS
Lepak, K., Talbot, G., White, S., Beck, N., Naffziger, S. and FELLOW, S., 2017. The next
generation and enterprise server product architecture. IEEE hot chips, 29.
Paredes, A.A.P. and Wheatley, C.M., 2018. Do Enterprise Resource Planning Systems
(ERPs) Constrain Real Earnings Management?. Journal of information systems, 32(3), pp.65-
89.
Phillips, L.R., 2017. The microgrid as a system of systems. In Systems of Systems
Engineering (pp. 251-279). CRC Press.
Schubert, P. and Glitsch, J.H., 2016. Use cases and collaboration scenarios: How employees
use socially-enabled enterprise collaboration systems (ECS). International Journal of
Information Systems and Project Management, 4(2), pp.41-62.
She, W. and Thuraisingham, B., 2017. Security for Enterprise Resource Planning
Systems. Information Systems Security, 16(3), pp.152-163.
Sutton, S, 2016. Extendedâenterprise systems' impact on enterprise risk management. Journal
of Enterprise Information Management, 19(1), pp.97-114.
Swan, M., 2018. Blockchain for business: next-generation enterprise artificial intelligence
systems. In Advances in computers (Vol. 111, pp. 121-162). Elsevier.
Watson, M.W., Klamm, B.K., Segovia, J. and Lehman, M.W., 2016. Enterprise system case
using Microsoft Dynamics GP via DynamicsCloud. Journal of Accounting Education, 37,
pp.67-92.
Lepak, K., Talbot, G., White, S., Beck, N., Naffziger, S. and FELLOW, S., 2017. The next
generation and enterprise server product architecture. IEEE hot chips, 29.
Paredes, A.A.P. and Wheatley, C.M., 2018. Do Enterprise Resource Planning Systems
(ERPs) Constrain Real Earnings Management?. Journal of information systems, 32(3), pp.65-
89.
Phillips, L.R., 2017. The microgrid as a system of systems. In Systems of Systems
Engineering (pp. 251-279). CRC Press.
Schubert, P. and Glitsch, J.H., 2016. Use cases and collaboration scenarios: How employees
use socially-enabled enterprise collaboration systems (ECS). International Journal of
Information Systems and Project Management, 4(2), pp.41-62.
She, W. and Thuraisingham, B., 2017. Security for Enterprise Resource Planning
Systems. Information Systems Security, 16(3), pp.152-163.
Sutton, S, 2016. Extendedâenterprise systems' impact on enterprise risk management. Journal
of Enterprise Information Management, 19(1), pp.97-114.
Swan, M., 2018. Blockchain for business: next-generation enterprise artificial intelligence
systems. In Advances in computers (Vol. 111, pp. 121-162). Elsevier.
Watson, M.W., Klamm, B.K., Segovia, J. and Lehman, M.W., 2016. Enterprise system case
using Microsoft Dynamics GP via DynamicsCloud. Journal of Accounting Education, 37,
pp.67-92.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Š 2024  |  Zucol Services PVT LTD  |  All rights reserved.