University Business Development: AAHS Case Study Report
VerifiedAdded on  2021/04/21
|8
|2859
|161
Case Study
AI Summary
This case study examines Animal After Hour Services (AAHS), a veterinary hospital, and its need for an effective information system to manage business expansion. The report identifies the types of information systems required, including transaction processing, management information, decision support, and expert systems. It prioritizes the challenges faced by AAHS, such as data security and logistical issues, and outlines key information requirements like interface, business, and security needs. The study proposes a centralized database management system to address these needs and strategically utilizes the internet, intranet, and extranet for communication and collaboration. The case study also details change management processes within AAHS and addresses potential security and ethical issues, recommending solutions like proper data backups, security software, and authentication protocols. The conclusion emphasizes the benefits of information system implementation and the importance of addressing potential challenges through strong security measures.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
Case Study: Animal after Hour Services (AAHS)
Name of the Student
Name of the University
Author’s Note
Student ID and your Last name Course code/term/year
Case Study: Animal after Hour Services (AAHS)
Name of the Student
Name of the University
Author’s Note
Student ID and your Last name Course code/term/year
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
1. Introduction
The paper mainly focuses on the “Animal after Hours Services” (AAHS), which is
one of the veterinary hospitals that is mainly running in Gold coast as well as Brisbane
Southside. It is identified that the main purpose of the report is to focus on the
implementation of information system for the organization AAHS so that the growth in the
business expansion can be effectively managed. It is identified that with the help of the
information system, the owners of the hospital can be able to get online updates about their
animals.
The report elaborates the kinds of information systems that are required for the small
business. The report identifies the issues faced by AAHS and explains the key information
requirement by the organization. In addition to this, the paper elaborates how strategically
internet, extranet as well as intranet is utilized for fulfilling communication as well as
collaboration need. Furthermore the processes with the help of which AAHS manages
organizational changes are elaborated.
2. Discussion
2.1 Definition of the information system and explanation about their importance in
future operations
An information system is one of the organized systems that help in collecting,
organizing, storing as well as communicating information (Kadam and Onkar, 2015). It is
identified that with the help of the information system, the organization AAHS can be able to
manage their business operations quite effectively and can be able to provide proper facility
of interface accessibility so that data and information can be easily accessed. In addition to
this, the organization can be able to provide the opportunity of online access to the clients for
printing as well as for downloading consolidated statement as well as treatment notes for
lodging pet insurance claims (Turel 2015).
It is identified that there are number of types of information system that can be
utilized by the small business for managing the operations effectively. The information
systems include:
Transaction processing system: Transaction processing system generally helps in
providing proper way for collecting, processing as well as storing transactions (Bajdor and
Grabara 2014). It is identified that most of the system generally helps in allowing number of
transactions for taking place simultaneously.
Management information system: It is identified that management information
system is one of the information system that utilizes the data, which is collected, by the
transaction processing system for using this data in order to create proper reports.
Decision support system: Decision support system generally helps in making proper
decisions by working as well as analyzing data, which can be able to generate proper
statistical projections as well as data models (Ahmadi, Nilashim and Ibrahim, 2015).
1. Introduction
The paper mainly focuses on the “Animal after Hours Services” (AAHS), which is
one of the veterinary hospitals that is mainly running in Gold coast as well as Brisbane
Southside. It is identified that the main purpose of the report is to focus on the
implementation of information system for the organization AAHS so that the growth in the
business expansion can be effectively managed. It is identified that with the help of the
information system, the owners of the hospital can be able to get online updates about their
animals.
The report elaborates the kinds of information systems that are required for the small
business. The report identifies the issues faced by AAHS and explains the key information
requirement by the organization. In addition to this, the paper elaborates how strategically
internet, extranet as well as intranet is utilized for fulfilling communication as well as
collaboration need. Furthermore the processes with the help of which AAHS manages
organizational changes are elaborated.
2. Discussion
2.1 Definition of the information system and explanation about their importance in
future operations
An information system is one of the organized systems that help in collecting,
organizing, storing as well as communicating information (Kadam and Onkar, 2015). It is
identified that with the help of the information system, the organization AAHS can be able to
manage their business operations quite effectively and can be able to provide proper facility
of interface accessibility so that data and information can be easily accessed. In addition to
this, the organization can be able to provide the opportunity of online access to the clients for
printing as well as for downloading consolidated statement as well as treatment notes for
lodging pet insurance claims (Turel 2015).
It is identified that there are number of types of information system that can be
utilized by the small business for managing the operations effectively. The information
systems include:
Transaction processing system: Transaction processing system generally helps in
providing proper way for collecting, processing as well as storing transactions (Bajdor and
Grabara 2014). It is identified that most of the system generally helps in allowing number of
transactions for taking place simultaneously.
Management information system: It is identified that management information
system is one of the information system that utilizes the data, which is collected, by the
transaction processing system for using this data in order to create proper reports.
Decision support system: Decision support system generally helps in making proper
decisions by working as well as analyzing data, which can be able to generate proper
statistical projections as well as data models (Ahmadi, Nilashim and Ibrahim, 2015).

2CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
Neutral networks: An expert system is defined as one of the computer system that is
generally designed for analyzing as well as producing recommendations as well as decisions
that are needed to be controlled.
2.2 Listing problems faced by AAHS in the order of priority
The problems that are generally faced by the organization AAHS are listed below in
order of priority:
1st: Safety as well as security of data across different sites
2nd: Logistical issue such as staff files, staff timesheets as well as patient treatment
notes.
3rd: Making shareable across sites without making unnecessary duplication
2.3 Key information requirements
The key information requirements that are generally needed by AAHS are listed in
the table below:
Interface requirements: The organizations requires interface so that the veterinaries
can be able to access the animal treatment records quite easily (Fountas et al. 2015). It is
identified that this requirement will generally help in enhancing as well as improving the
AAHS competitive position because if also the client visits different branches at different
point of time then they can easily access the records without facing any type of difficulty.
Business requirements: With the help of business requirements, AAHS can be able
to provide online updates to the clients about their pets, which would further avoid constant
phone calls to practice. This is one of the updated facilities that will be provided by the
AAHS to the clients and as a result, the clients can be able get information at any time. Thus,
this facility generally assists in improving competitive position of AAHS.
Security requirements: Proper security requirements must be needed in order to
secure the details as well as information of the clients properly (Dai, Chen and Zhang 2017).
This feature is considered as one of the essential feature that ensures the clients that their data
and information will not be misused and as a result, this feature assists in improving
competitive position.
2.4 Information system that helps in managing the problems of AAHS
Centralized database management system would help AAHS in managing their
business problems by making proper business decisions in order to fulfil the information
requirements that are needed for their business of the organization. The information
requirements that are mainly fulfilled by the centralized database management system are
listed below:
Interface requirements: The centralized database management system assists in
providing interface so that veterinaries can be able to access animal treatment records quite
easily from any of the branch of the organization (Li et al. 2017).
Business requirements: The centralized database management system assists in
fulfilling the business requirements by providing online update to the clients about the well-
being of the pets so that constant phone call can be avoided.
Neutral networks: An expert system is defined as one of the computer system that is
generally designed for analyzing as well as producing recommendations as well as decisions
that are needed to be controlled.
2.2 Listing problems faced by AAHS in the order of priority
The problems that are generally faced by the organization AAHS are listed below in
order of priority:
1st: Safety as well as security of data across different sites
2nd: Logistical issue such as staff files, staff timesheets as well as patient treatment
notes.
3rd: Making shareable across sites without making unnecessary duplication
2.3 Key information requirements
The key information requirements that are generally needed by AAHS are listed in
the table below:
Interface requirements: The organizations requires interface so that the veterinaries
can be able to access the animal treatment records quite easily (Fountas et al. 2015). It is
identified that this requirement will generally help in enhancing as well as improving the
AAHS competitive position because if also the client visits different branches at different
point of time then they can easily access the records without facing any type of difficulty.
Business requirements: With the help of business requirements, AAHS can be able
to provide online updates to the clients about their pets, which would further avoid constant
phone calls to practice. This is one of the updated facilities that will be provided by the
AAHS to the clients and as a result, the clients can be able get information at any time. Thus,
this facility generally assists in improving competitive position of AAHS.
Security requirements: Proper security requirements must be needed in order to
secure the details as well as information of the clients properly (Dai, Chen and Zhang 2017).
This feature is considered as one of the essential feature that ensures the clients that their data
and information will not be misused and as a result, this feature assists in improving
competitive position.
2.4 Information system that helps in managing the problems of AAHS
Centralized database management system would help AAHS in managing their
business problems by making proper business decisions in order to fulfil the information
requirements that are needed for their business of the organization. The information
requirements that are mainly fulfilled by the centralized database management system are
listed below:
Interface requirements: The centralized database management system assists in
providing interface so that veterinaries can be able to access animal treatment records quite
easily from any of the branch of the organization (Li et al. 2017).
Business requirements: The centralized database management system assists in
fulfilling the business requirements by providing online update to the clients about the well-
being of the pets so that constant phone call can be avoided.

3CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
Security requirements: The data as well as information related with the clients or
any other details can be stored successfully within the centralized database system so that the
chances of security issues can be avoided (Theorin et al. 2017).
2.5 Strategically utilization of Internet, Intranet and Extranet
The organization AAHS will utilize internet by creating proper opportunities of
information retrieval, networking, communication as well as collaboration. It is identified that
AAHS will generally utilize internet for selling products to various customers. It can be also
be utilized for gathering information and for interacting with clients, customers as well as
governments for creating awareness (Cats and Loutos 2016). Additionally, the utilization of
internet is quite helpful for internal communications as well as other types of electronic
activities within the organizations.
The intranet will be utilized by AAHS in order to fulfil the digital communication
needs of the organization. It is found that they generally assist in providing proper secure
space for accessing, storing as well as developing number of electronic materials (Srivastava
et al. 2015). The utilization of intranets helps in replacing older business solutions for
producing efficiency in order to speed of different workflows in order to reduce the errors. In
addition to this, some of the applications of intranet that is helpful for AAHS generally
include network folders where number of employees can be capable of accessing files, offline
website as well as testing the functionality.
It is found that Extranet generally helps in connecting number of intranets and thus it
is utilized by AAHS for facilitating proper co-operation between various companies in joints
projects, information sharing as well as other initiatives (Soppera et al. 2014). It is found that
they also helps in allowing AAHS to connect with number of customers in a much more
controlled setting. In addition to this, extranet helps in allowing the AAHS to access proper
network services that is provided to another company.
2.6 Management of changes within AAHS
Change management is considered as one of the significant concept for the business
organization “AAHS”. It is identified that the changes within the organization can be
managed by following steps that are elaborated below:
Understanding the present state of AAHS: It is very much necessary to understand
the present state of AAHS by determining the issues that the combination faces in order to
assign proper level of significance to each one by assessing different types of changes that is
required for solving the business issues (Al-Sakran 2015).
Envisioning as well as laying proper desired state of AAHS: This generally
includes picturing the entire solution of the organization after the change is properly
implemented in order to convey the visions who are generally involved in the change effort
and for reflecting the transition of the new state.
Implementing changes in proper manner: This generally involves proper
management of transition quite effectively. It is quite helpful in proper planning, allocating
resources as well as for appointing key person that charge of the entire change process (Cats
and Loutos 2016). The leader of the company must be able to generate proper enthusiasm for
the entire change in order to share the vision as well as goals.
Security requirements: The data as well as information related with the clients or
any other details can be stored successfully within the centralized database system so that the
chances of security issues can be avoided (Theorin et al. 2017).
2.5 Strategically utilization of Internet, Intranet and Extranet
The organization AAHS will utilize internet by creating proper opportunities of
information retrieval, networking, communication as well as collaboration. It is identified that
AAHS will generally utilize internet for selling products to various customers. It can be also
be utilized for gathering information and for interacting with clients, customers as well as
governments for creating awareness (Cats and Loutos 2016). Additionally, the utilization of
internet is quite helpful for internal communications as well as other types of electronic
activities within the organizations.
The intranet will be utilized by AAHS in order to fulfil the digital communication
needs of the organization. It is found that they generally assist in providing proper secure
space for accessing, storing as well as developing number of electronic materials (Srivastava
et al. 2015). The utilization of intranets helps in replacing older business solutions for
producing efficiency in order to speed of different workflows in order to reduce the errors. In
addition to this, some of the applications of intranet that is helpful for AAHS generally
include network folders where number of employees can be capable of accessing files, offline
website as well as testing the functionality.
It is found that Extranet generally helps in connecting number of intranets and thus it
is utilized by AAHS for facilitating proper co-operation between various companies in joints
projects, information sharing as well as other initiatives (Soppera et al. 2014). It is found that
they also helps in allowing AAHS to connect with number of customers in a much more
controlled setting. In addition to this, extranet helps in allowing the AAHS to access proper
network services that is provided to another company.
2.6 Management of changes within AAHS
Change management is considered as one of the significant concept for the business
organization “AAHS”. It is identified that the changes within the organization can be
managed by following steps that are elaborated below:
Understanding the present state of AAHS: It is very much necessary to understand
the present state of AAHS by determining the issues that the combination faces in order to
assign proper level of significance to each one by assessing different types of changes that is
required for solving the business issues (Al-Sakran 2015).
Envisioning as well as laying proper desired state of AAHS: This generally
includes picturing the entire solution of the organization after the change is properly
implemented in order to convey the visions who are generally involved in the change effort
and for reflecting the transition of the new state.
Implementing changes in proper manner: This generally involves proper
management of transition quite effectively. It is quite helpful in proper planning, allocating
resources as well as for appointing key person that charge of the entire change process (Cats
and Loutos 2016). The leader of the company must be able to generate proper enthusiasm for
the entire change in order to share the vision as well as goals.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
2.7 Possible security and ethical issues that may rise and steps for resolving them
The security and ethical issue that can rise within the organization AAHS are listed
below:
Unauthorized access: It is identified that utilization of password as well as username
is considered as one of the standard convention (Terzi, Terzi and Sagiroglu 2015). However,
the hackers generally know how to circumvent this type of controls if appropriate security
best practices are not utilized. Thus due to unauthorized access, confidential as well as
sensitive data of the organization can get lost.
Computer viruses: It is identified that there are number of malicious programs,
which generally pose threat if proper anti-virus software are not installed within the
organization. It is identified that in order to avoid ethical as well as security it is quite
important to utilize proper anti-viruses within the computers of the organization.
Data loss: If the data centre where all the data as well as information of the
organization is stored is flooded then all the data of the organization can be damaged (De
Bel-Air 2016). Therefore, in order to avoid this type of situations it is always necessary to
have proper backup system within the organization.
The security as well as ethical issues can be resolved by utilizing steps that are
elaborated below:
Proper backup facility: It is identified that appropriate facility of backup is very
much needed in order to keep the confidential as well as sensitive information of the
organization secure as well as safe (Gupta and Gore 2016). It is identified that is due to any
type of issue, if the data can get lost then if proper recovery system is present than the entire
data can be recovered without facing any type of challenges ad issues.
Installation of proper security software: It is identified that proper software like
anti-virus software must be installed in all the computers of the organization so that the data
as well as information that are stored with each of the system will remain secure (Bhabad and
Bagade 2015)
Proper authentication: Proper authentication facility must be provided so that the
chances of security as well as ethical issue that arise due to unauthorized access can be
minimized.
Conclusion
It can be concluded from the entire assignment that the implementation of information
system for the organization AAHS will be quite beneficial as the organization will be able to
provide proper opportunity of data access to its workers as well as provides the opportunity
of knowing the well-being of the pets online. In spite of the advantages, it is identified that
there are number of issues and challenges that can occur due to the implementation of the
information system. It is identified in order to resolve those challenges and issues, it is quite
important to following some of the significant steps that are as follows:
Utilization of strong passwords: Utilization of strong password is one of the
significant step that generally assists in minimizing the chances of hacking data as well as
information by authorized users.
2.7 Possible security and ethical issues that may rise and steps for resolving them
The security and ethical issue that can rise within the organization AAHS are listed
below:
Unauthorized access: It is identified that utilization of password as well as username
is considered as one of the standard convention (Terzi, Terzi and Sagiroglu 2015). However,
the hackers generally know how to circumvent this type of controls if appropriate security
best practices are not utilized. Thus due to unauthorized access, confidential as well as
sensitive data of the organization can get lost.
Computer viruses: It is identified that there are number of malicious programs,
which generally pose threat if proper anti-virus software are not installed within the
organization. It is identified that in order to avoid ethical as well as security it is quite
important to utilize proper anti-viruses within the computers of the organization.
Data loss: If the data centre where all the data as well as information of the
organization is stored is flooded then all the data of the organization can be damaged (De
Bel-Air 2016). Therefore, in order to avoid this type of situations it is always necessary to
have proper backup system within the organization.
The security as well as ethical issues can be resolved by utilizing steps that are
elaborated below:
Proper backup facility: It is identified that appropriate facility of backup is very
much needed in order to keep the confidential as well as sensitive information of the
organization secure as well as safe (Gupta and Gore 2016). It is identified that is due to any
type of issue, if the data can get lost then if proper recovery system is present than the entire
data can be recovered without facing any type of challenges ad issues.
Installation of proper security software: It is identified that proper software like
anti-virus software must be installed in all the computers of the organization so that the data
as well as information that are stored with each of the system will remain secure (Bhabad and
Bagade 2015)
Proper authentication: Proper authentication facility must be provided so that the
chances of security as well as ethical issue that arise due to unauthorized access can be
minimized.
Conclusion
It can be concluded from the entire assignment that the implementation of information
system for the organization AAHS will be quite beneficial as the organization will be able to
provide proper opportunity of data access to its workers as well as provides the opportunity
of knowing the well-being of the pets online. In spite of the advantages, it is identified that
there are number of issues and challenges that can occur due to the implementation of the
information system. It is identified in order to resolve those challenges and issues, it is quite
important to following some of the significant steps that are as follows:
Utilization of strong passwords: Utilization of strong password is one of the
significant step that generally assists in minimizing the chances of hacking data as well as
information by authorized users.

5CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
Use of proper security system: Appropriate security system like firewall as well as
authentication must be present in order to avoid any type of security as well as ethical
challenges.
Use of proper security system: Appropriate security system like firewall as well as
authentication must be present in order to avoid any type of security as well as ethical
challenges.

6CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
References
Ahmadi, H., Nilashi, M., and Ibrahim, O., 2015. Organizational decision to adopt hospital
information system: An empirical investigation in the case of Malaysian public
hospitals. International journal of medical informatics, 84(3), 166-188.
Al-Sakran, H. O., 2015. Intelligent traffic information system based on integration of Internet
of Things and Agent technology. International Journal of Advanced Computer Science and
Applications (IJACSA), 6(2), 37-43.
Bajdor, P., and Grabara, I., 2014. The Role of Information System Flows in Fulfilling
Customers’ Individual Orders. Journal of Studies in Social Sciences, 7(2).
Bhabad, M. A., and Bagade, S. T., 2015. Internet of things: architecture, security issues and
countermeasures. International Journal of Computer Applications, 125(14).
Cats, O., and Loutos, G., 2016. Real-time bus arrival information system: an empirical
evaluation. Journal of Intelligent Transportation Systems, 20(2), 138-151.
Dai, L., Chen, L., and Zhang, H., 2017. China academic library and information system: an
academic library consortium in China. Information technology and libraries, 19(2), 66-70.
De Bel-Air, F., 2016. Gulf and EU Migration Policies after the Arab Uprisings: Arab and
Turkish Youth as a Security Issue. Istituto Affari Internazionali.
Fountas, S., Sorensen, C. G., Tsiropoulos, Z., Cavalaris, C., Liakos, V., and Gemtos, T.,
2015. Farm machinery management information system. Computers and Electronics in
Agriculture, 110, 131-138.
Gupta, A. M., and Gore, Y. R., 2016. Concurrency Control and Security Issue in Distributed
Database System. International Journal of Engineering Development and Research, 4, 177-
181.
Kadam, K. S., and Onkar, V. C., 2015. A review paper on student information supervision
system. International Journal of Research In Science & Engineering, 1, 66-72.
Li, X., Lv, Z., Zheng, Z., Zhong, C., Hijazi, I. H., and Cheng, S., 2017. Assessment of lively
street network based on geographic information system and space syntax. Multimedia Tools
and Applications, 76(17), 17801-17819.
Soppera, N., Bossant, M., and Dupont, E., 2014. JANIS 4: An improved version of the NEA
java-based nuclear data information system. Nuclear Data Sheets, 120, 294-296.
Srivastava, K., Awasthi, A. K., Kaul, S. D., and Mittal, R. C., 2015. A hash based mutual
RFID tag authentication protocol in telecare medicine information system. Journal of medical
systems, 39(1), 153.
Terzi, D. S., Terzi, R., and Sagiroglu, S., 2015, December. A survey on security and privacy
issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th
International Conference for (pp. 202-207). IEEE.
Theorin, A., Bengtsson, K., Provost, J., Lieder, M., Johnsson, C., Lundholm, T., and
Lennartson, B., 2017. An event-driven manufacturing information system architecture for
Industry 4.0. International Journal of Production Research, 55(5), 1297-1311.
References
Ahmadi, H., Nilashi, M., and Ibrahim, O., 2015. Organizational decision to adopt hospital
information system: An empirical investigation in the case of Malaysian public
hospitals. International journal of medical informatics, 84(3), 166-188.
Al-Sakran, H. O., 2015. Intelligent traffic information system based on integration of Internet
of Things and Agent technology. International Journal of Advanced Computer Science and
Applications (IJACSA), 6(2), 37-43.
Bajdor, P., and Grabara, I., 2014. The Role of Information System Flows in Fulfilling
Customers’ Individual Orders. Journal of Studies in Social Sciences, 7(2).
Bhabad, M. A., and Bagade, S. T., 2015. Internet of things: architecture, security issues and
countermeasures. International Journal of Computer Applications, 125(14).
Cats, O., and Loutos, G., 2016. Real-time bus arrival information system: an empirical
evaluation. Journal of Intelligent Transportation Systems, 20(2), 138-151.
Dai, L., Chen, L., and Zhang, H., 2017. China academic library and information system: an
academic library consortium in China. Information technology and libraries, 19(2), 66-70.
De Bel-Air, F., 2016. Gulf and EU Migration Policies after the Arab Uprisings: Arab and
Turkish Youth as a Security Issue. Istituto Affari Internazionali.
Fountas, S., Sorensen, C. G., Tsiropoulos, Z., Cavalaris, C., Liakos, V., and Gemtos, T.,
2015. Farm machinery management information system. Computers and Electronics in
Agriculture, 110, 131-138.
Gupta, A. M., and Gore, Y. R., 2016. Concurrency Control and Security Issue in Distributed
Database System. International Journal of Engineering Development and Research, 4, 177-
181.
Kadam, K. S., and Onkar, V. C., 2015. A review paper on student information supervision
system. International Journal of Research In Science & Engineering, 1, 66-72.
Li, X., Lv, Z., Zheng, Z., Zhong, C., Hijazi, I. H., and Cheng, S., 2017. Assessment of lively
street network based on geographic information system and space syntax. Multimedia Tools
and Applications, 76(17), 17801-17819.
Soppera, N., Bossant, M., and Dupont, E., 2014. JANIS 4: An improved version of the NEA
java-based nuclear data information system. Nuclear Data Sheets, 120, 294-296.
Srivastava, K., Awasthi, A. K., Kaul, S. D., and Mittal, R. C., 2015. A hash based mutual
RFID tag authentication protocol in telecare medicine information system. Journal of medical
systems, 39(1), 153.
Terzi, D. S., Terzi, R., and Sagiroglu, S., 2015, December. A survey on security and privacy
issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th
International Conference for (pp. 202-207). IEEE.
Theorin, A., Bengtsson, K., Provost, J., Lieder, M., Johnsson, C., Lundholm, T., and
Lennartson, B., 2017. An event-driven manufacturing information system architecture for
Industry 4.0. International Journal of Production Research, 55(5), 1297-1311.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CASE STUDY: ANIMAL AFTER HOUR SERVICES (AAHS)
Turel, O., 2015. Quitting the use of a habituated hedonic information system: a theoretical
model and empirical examination of Facebook users. European Journal of Information
Systems, 24(4), 431-446.
Turel, O., 2015. Quitting the use of a habituated hedonic information system: a theoretical
model and empirical examination of Facebook users. European Journal of Information
Systems, 24(4), 431-446.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.