BMP4005 Information Systems and Big Data Analysis Report: Feb 2020
VerifiedAdded on 2023/06/10
|9
|3401
|374
Report
AI Summary
This report, submitted by a student, analyzes Information Systems and Big Data Analysis within the context of a BSc (Hons) Business Management course. It explores the design and development theories, methods, and techniques for IT solutions like McAfee and Moodle, examining their functionalities and applications. The report further explains various information systems such as DSS, ESS, TPS, MIS, and KSM, providing relevant examples for each. It delves into the effects of IT on globalization, discussing the impact of digital infrastructure, its advantages, and disadvantages. Moreover, the report addresses the risks associated with information systems outsourcing and emphasizes the critical role of IT infrastructure in digital transformation. Overall, the report offers a comprehensive overview of key concepts and their practical implications in the field of information systems and big data analysis.

BSc (Hons) Business Management
Cohort 2
BMP4005
Information Systems and Big Data
Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Submitted by:
Name:
ID:
1
Cohort 2
BMP4005
Information Systems and Big Data
Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Submitted by:
Name:
ID:
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction p
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office p
Task 2: Explanation of the systems below with relevant
examples p
Task 3: Globalisation and the effects of IT on globalisation
p
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure p
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation! P
Conclusion p
References p
2
Introduction p
Task 1: Theories, methods and techniques which relate to
the design and development for TWO of the IT solutions
listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office p
Task 2: Explanation of the systems below with relevant
examples p
Task 3: Globalisation and the effects of IT on globalisation
p
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure p
Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation! P
Conclusion p
References p
2

Introduction
An information system is a formal, socio-technical organization system
designed in order to collect, process, store and distribute information to people in
need or who want to acquire it through access. The combination of hardware,
software, human power and processes of an information system shows a network
used in the process of collection, storing, processing, analyzing and distributing
data. Information systems are incorporated with computers in order to manage data
and achieve business objectives. Big data analysis is a term or a process used for
advanced analytic methods for very large, dispersed data sets that include
structured or non-structured data gathered from various sources at different sizes in
an information system (Aljumah, Nuseir, and Alam, 2021). In this report there will be
discussion of many techniques, methods and theories which relate to the design
and development of Mcafee and Moodle. Explanation of the information system
with examples. Further globalization and the effects of IT globalization is discussed.
In this report, digital infrastructure and risks associated have been elaborated.
Task 1:
Theories, methods and techniques which relate to the
design and development for TWO of the IT solutions listed
here:440
Theories:
Theory for web-based systems:
The technology acceptance model is adopted from theory of reasoned action,
which is a theory of action on the premise that one reaction and perspective of
something. The technology acceptance model developed from psychological theory,
this explains the behavior of personal computer users, this hows trust, attitudes,
intensity, and the the relationship of user behavior. The objective of this model is to
describe main factor of information technology user behavior towards IT user
acceptance in an detail by elaborating IT acceptance with some dimensions that
user can easily influence. Mcafee is an IT solutions providing company which
provide generally anti theft and anti virus solutions for personal computers and
mobile devices, it is efficient as it analyzes customer behavior of using websites and
awareness towards device security. Moodle is an company which gives an platform
for online learning that helps students to get online courses, assignments and
checking their progress (Fiore, and et.al., 2019). The theory is effective in this solutions
too as it have large engagement with people and students.
Mcafee:
This is an basically an computerized software that is founded in 1987 by john
Mcafee. This software is very known among people as for its antivirus applications
and software. This software also provide theft protection. The software is widely
popular for detection of malware and viruses (Dai, and et.al., 2020). The software is
installed in the personal computer, laptops, mobile and conducts a follow through
scan in whole system. Many collaboration is done in order to make the software
more agile and reach wider audience. The develops have designed software of
Mcafee based to give more user experience. The brand addressed the need of
security in the era and fulfilled people demand. It uses many techniques to reach
popularity is by adding an high quality process and ensuring the safety. Giving 1 year
guarantee for the package cost and assurance to keep peoples data completely
safe.
3
An information system is a formal, socio-technical organization system
designed in order to collect, process, store and distribute information to people in
need or who want to acquire it through access. The combination of hardware,
software, human power and processes of an information system shows a network
used in the process of collection, storing, processing, analyzing and distributing
data. Information systems are incorporated with computers in order to manage data
and achieve business objectives. Big data analysis is a term or a process used for
advanced analytic methods for very large, dispersed data sets that include
structured or non-structured data gathered from various sources at different sizes in
an information system (Aljumah, Nuseir, and Alam, 2021). In this report there will be
discussion of many techniques, methods and theories which relate to the design
and development of Mcafee and Moodle. Explanation of the information system
with examples. Further globalization and the effects of IT globalization is discussed.
In this report, digital infrastructure and risks associated have been elaborated.
Task 1:
Theories, methods and techniques which relate to the
design and development for TWO of the IT solutions listed
here:440
Theories:
Theory for web-based systems:
The technology acceptance model is adopted from theory of reasoned action,
which is a theory of action on the premise that one reaction and perspective of
something. The technology acceptance model developed from psychological theory,
this explains the behavior of personal computer users, this hows trust, attitudes,
intensity, and the the relationship of user behavior. The objective of this model is to
describe main factor of information technology user behavior towards IT user
acceptance in an detail by elaborating IT acceptance with some dimensions that
user can easily influence. Mcafee is an IT solutions providing company which
provide generally anti theft and anti virus solutions for personal computers and
mobile devices, it is efficient as it analyzes customer behavior of using websites and
awareness towards device security. Moodle is an company which gives an platform
for online learning that helps students to get online courses, assignments and
checking their progress (Fiore, and et.al., 2019). The theory is effective in this solutions
too as it have large engagement with people and students.
Mcafee:
This is an basically an computerized software that is founded in 1987 by john
Mcafee. This software is very known among people as for its antivirus applications
and software. This software also provide theft protection. The software is widely
popular for detection of malware and viruses (Dai, and et.al., 2020). The software is
installed in the personal computer, laptops, mobile and conducts a follow through
scan in whole system. Many collaboration is done in order to make the software
more agile and reach wider audience. The develops have designed software of
Mcafee based to give more user experience. The brand addressed the need of
security in the era and fulfilled people demand. It uses many techniques to reach
popularity is by adding an high quality process and ensuring the safety. Giving 1 year
guarantee for the package cost and assurance to keep peoples data completely
safe.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Moodle:
Moodle is an web based learning platform that enables a wider range of
students to get access of learning of courses from their digital devices through
making accounts and buying packages as by the offering of prices for different
courses. Moodle is developed by martin dougiamas to help teachers in creating
online courses with focusing interaction and collaboration. The first version if the
application was launched on 20 august 2002 (Rahul, Banyal, and Goswami, 2020). Moodle
addressed the need of digital platform of education and fulfilled by creating an
platform. People accepted the idea as it was an new evolution and many other
companies took inspiration from it. The IT solution uses various techniques to attract
audience toward the application like it give accessibility from any digital device, it
does not have location boundaries, it offers large amount of courses for people in
every field.
Task 2: Explanation of the systems below with relevant
examples
DSS (Decision Support System)
A decisions support system or DSS is basically an application process for
computer devices that completely enables to make good and effective decisions by
the firm. The focus of this work is to process in analyzing of big amount of data of an
business (Huang, Wang, and Huang, 2020). It helps business in choice making of effective
information for an organization. It helps in combining the collection of data together
from several areas to offer an effective message for the users. The user decision
making is effected by the use of DSS. Example of this support system is google
location services that offer assistance for users in order to navigate and find routes
by considering factors like time taken, kilometers etc.
ESS (Executive Support System)
An executive support system also called as ESS allow the users to simplify
the data and use it easily while accessing reports and data that are used by bigger
firms. It provide help to several companies for growth and increase the efficiency of
decision making for employees and managers (Rahmanto, Pribadi, and Priyanto 2021) . The
significance of this type of system is as followed:
It provides an detailed understanding of several online analysis such as
trend analysis, situation analysis etc.
it helps in offering a direct and quick access to reports of an business
management.
It allows the employee and personals to get data and solve the
complex problems which are related to computerized solutions.
It has the benefit to gather the access of different data that are external
as well as internal.
Example of this system are the time series charts, scatter diagrams, maps, motion
graphics and many more.
4
Moodle is an web based learning platform that enables a wider range of
students to get access of learning of courses from their digital devices through
making accounts and buying packages as by the offering of prices for different
courses. Moodle is developed by martin dougiamas to help teachers in creating
online courses with focusing interaction and collaboration. The first version if the
application was launched on 20 august 2002 (Rahul, Banyal, and Goswami, 2020). Moodle
addressed the need of digital platform of education and fulfilled by creating an
platform. People accepted the idea as it was an new evolution and many other
companies took inspiration from it. The IT solution uses various techniques to attract
audience toward the application like it give accessibility from any digital device, it
does not have location boundaries, it offers large amount of courses for people in
every field.
Task 2: Explanation of the systems below with relevant
examples
DSS (Decision Support System)
A decisions support system or DSS is basically an application process for
computer devices that completely enables to make good and effective decisions by
the firm. The focus of this work is to process in analyzing of big amount of data of an
business (Huang, Wang, and Huang, 2020). It helps business in choice making of effective
information for an organization. It helps in combining the collection of data together
from several areas to offer an effective message for the users. The user decision
making is effected by the use of DSS. Example of this support system is google
location services that offer assistance for users in order to navigate and find routes
by considering factors like time taken, kilometers etc.
ESS (Executive Support System)
An executive support system also called as ESS allow the users to simplify
the data and use it easily while accessing reports and data that are used by bigger
firms. It provide help to several companies for growth and increase the efficiency of
decision making for employees and managers (Rahmanto, Pribadi, and Priyanto 2021) . The
significance of this type of system is as followed:
It provides an detailed understanding of several online analysis such as
trend analysis, situation analysis etc.
it helps in offering a direct and quick access to reports of an business
management.
It allows the employee and personals to get data and solve the
complex problems which are related to computerized solutions.
It has the benefit to gather the access of different data that are external
as well as internal.
Example of this system are the time series charts, scatter diagrams, maps, motion
graphics and many more.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TPS (Transaction Processing System)
A transaction process system(TPS) is an information processing system for
an business organization which involves the collection, modification and recovering
of transacted data. The basic characteristic of transaction processing system is
performance, reliability and consistency (Pappas, and et.al., 2018). The TPS process
system are called an batch process system and batch processing, where many
problems and demands are executed at one time. It is generally called real time
processing which shows that all transaction and events that are taking place in the
organization are causing no amount of extra time delay in executing the procedures.
The transaction processing system is considered consistent in nature and much
reliable than other system. It used mainly in online transactions like pay pal, go card
less and many more. The system is often used in reserving products or services for
clients.
MIS (Management Information System)
Management information system is represented as study of people,
technology, organizations and the relationships with them (Xiaorong, Shizhun, and
Songtao, 2018). The management information system professionals helps the
organizations in making aware of maximum benefits from the invested amount in
equipment's, human resource and business projects. MIS is people oriented field
with focusing on service through the use of technology. For organization who are
interested in technology and have the desire to use the technology in order to
improve functioning, the role of MIS is best for it. Example: the system of
management can be used for formulating and designing next annual year budget
and plans.
KSM (Knowledge Management System)
A knowledge management system is an IT tool used by companies and firms
to help companies in organizing documents, questions that are asked by clients and
several other information converted in easily assessed formats for internal as well as
external customers. Using an efficient knowledge management software can provide
help in keeping documentation update, assist consumers in finding solutions
and ,managing knowledge assessment. This tool create value for both kind of
enterprise small businesses and global enterprises that have wide range of
audiences. For example: the online community forums which is an website where
users with interest ask questions and share feedback's or recommendation. The
companies that use online forums are Penguin random house's, Air BnB.
Task 3: Globalization and the effects of IT on globalisation
Globalization is an term given for describing trade and technology to have the
global business more connected and independent place. Globalization includes the
economic and social changes that have to come as a result. The process of
globalization consider the rise of global business in spreading of product, technology,
information and job across nations. To gain competition it is a efficient method for an
business organization. Developing countries get benefited by globalization as they
create large amount of jobs and have tendency to be more cost effective. The rise in
5
A transaction process system(TPS) is an information processing system for
an business organization which involves the collection, modification and recovering
of transacted data. The basic characteristic of transaction processing system is
performance, reliability and consistency (Pappas, and et.al., 2018). The TPS process
system are called an batch process system and batch processing, where many
problems and demands are executed at one time. It is generally called real time
processing which shows that all transaction and events that are taking place in the
organization are causing no amount of extra time delay in executing the procedures.
The transaction processing system is considered consistent in nature and much
reliable than other system. It used mainly in online transactions like pay pal, go card
less and many more. The system is often used in reserving products or services for
clients.
MIS (Management Information System)
Management information system is represented as study of people,
technology, organizations and the relationships with them (Xiaorong, Shizhun, and
Songtao, 2018). The management information system professionals helps the
organizations in making aware of maximum benefits from the invested amount in
equipment's, human resource and business projects. MIS is people oriented field
with focusing on service through the use of technology. For organization who are
interested in technology and have the desire to use the technology in order to
improve functioning, the role of MIS is best for it. Example: the system of
management can be used for formulating and designing next annual year budget
and plans.
KSM (Knowledge Management System)
A knowledge management system is an IT tool used by companies and firms
to help companies in organizing documents, questions that are asked by clients and
several other information converted in easily assessed formats for internal as well as
external customers. Using an efficient knowledge management software can provide
help in keeping documentation update, assist consumers in finding solutions
and ,managing knowledge assessment. This tool create value for both kind of
enterprise small businesses and global enterprises that have wide range of
audiences. For example: the online community forums which is an website where
users with interest ask questions and share feedback's or recommendation. The
companies that use online forums are Penguin random house's, Air BnB.
Task 3: Globalization and the effects of IT on globalisation
Globalization is an term given for describing trade and technology to have the
global business more connected and independent place. Globalization includes the
economic and social changes that have to come as a result. The process of
globalization consider the rise of global business in spreading of product, technology,
information and job across nations. To gain competition it is a efficient method for an
business organization. Developing countries get benefited by globalization as they
create large amount of jobs and have tendency to be more cost effective. The rise in
5

engagement with lowering barriers with world trade is done by globalization. As for IT
industry it had many effects in the time being which are as follows:
Rise in technology of small and compatible computers: The personal
computers enabled users in many locations to make their own idea and digitization
of content all over the world. The globalization have a significance on rise of smart
personal computer which helped in tracking data, managing large files, tracking
company records which provided some support towards globalization.
Creation of work flow structure: The large impact of information technology
in business is to create an work flow data base software and technology, it helps
employees too design and integrated data of business in some different location of
company also known as remote working. It removed barriers like transferring data
and information through traditional methods like fax and letters which is not time
efficient.
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure
Digital infrastructure is generally defined as the advanced technologies which
is offered to a organization for management of crucial information regarding
operations. It provide support to the organization to become more advanced in
technology aspect as well as smarter which enables them to give an quality
experience while fulfilling customers with their demand (Lin and Yang 2019). This is
helpful in increasing efficiency and productivity of employees. The main objective of
digital infrastructure is to achieve high technological advancement in order to get an
reliable work force and get goals completed effectively. It reduces work load and
break the restrictions of boundaries such as demo graphical, geographical. There
are many examples like internet service techs like broadband, router, others
communication satellites and data service centers.
Advantages:
adapting new technologies: With the use of rising technology in every
sector of business companies get new technological advancement regularly (Xu and
Duan, 2019). With updation and innovation the work culture and efficiency
continuously evolves, this helps in development for the organization.
boosting economic growth: the rising technology sector is not limited to an
company growth or an individual but it effect the whole humanity. From development
new sectors gets discovered, rise in employment peoples lives get easier. This
overall result in economic growth of an country as well the global business.
Disadvantages:
concerns regarding privacy: Digitization has a very big effect in rising
privacy issues in between exchange of information's through online and digital
services. Due to advancement in the field of technology it is very tough for an person
to get security from attackers.
security of data: due to large enhancement of digitization it is hard for an one
person to keep the data safe. The leaks of data for an organization ca result in
demolition of reputation and can be used negatively and against the organization. It
have large storage is crucial data for an company.
6
industry it had many effects in the time being which are as follows:
Rise in technology of small and compatible computers: The personal
computers enabled users in many locations to make their own idea and digitization
of content all over the world. The globalization have a significance on rise of smart
personal computer which helped in tracking data, managing large files, tracking
company records which provided some support towards globalization.
Creation of work flow structure: The large impact of information technology
in business is to create an work flow data base software and technology, it helps
employees too design and integrated data of business in some different location of
company also known as remote working. It removed barriers like transferring data
and information through traditional methods like fax and letters which is not time
efficient.
Task 4: Definition, example, advantages and
disadvantages of digital infrastructure
Digital infrastructure is generally defined as the advanced technologies which
is offered to a organization for management of crucial information regarding
operations. It provide support to the organization to become more advanced in
technology aspect as well as smarter which enables them to give an quality
experience while fulfilling customers with their demand (Lin and Yang 2019). This is
helpful in increasing efficiency and productivity of employees. The main objective of
digital infrastructure is to achieve high technological advancement in order to get an
reliable work force and get goals completed effectively. It reduces work load and
break the restrictions of boundaries such as demo graphical, geographical. There
are many examples like internet service techs like broadband, router, others
communication satellites and data service centers.
Advantages:
adapting new technologies: With the use of rising technology in every
sector of business companies get new technological advancement regularly (Xu and
Duan, 2019). With updation and innovation the work culture and efficiency
continuously evolves, this helps in development for the organization.
boosting economic growth: the rising technology sector is not limited to an
company growth or an individual but it effect the whole humanity. From development
new sectors gets discovered, rise in employment peoples lives get easier. This
overall result in economic growth of an country as well the global business.
Disadvantages:
concerns regarding privacy: Digitization has a very big effect in rising
privacy issues in between exchange of information's through online and digital
services. Due to advancement in the field of technology it is very tough for an person
to get security from attackers.
security of data: due to large enhancement of digitization it is hard for an one
person to keep the data safe. The leaks of data for an organization ca result in
demolition of reputation and can be used negatively and against the organization. It
have large storage is crucial data for an company.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Task 5: Risks associated with information systems
outsourcing and why is IT infrastructure so critical to
digital transformation!
Risks associated with information systems outsourcing
There are various risks associated with information systems outsourcing,
which are followed as:
Unresponsive Support team:
This is a major risk in IT services as outsourcing an IT service takes time to
receive support and find problems. Many companies offer remote assistance from
desktops which helps in problem solving, but unresponsive behavior decreases the
rate of assistance. Some companies are limited to some time duration only to
provide support which complicates problems and increases time consumption.
Decreased Security:
Security risk is also high in the field of information systems as a large amount
of data is present on company servers which are critical for organization (Kang, and
Ampornstira, 2020). Any kind of breach in security can affect heavy losses for companies
as well as leaking essential data such as financial, employee identity and many
more.
Inexperienced staff:
This is one of the great risks that are present while outsourcing IT services.
When the work force is hired in a team of IT services, it is essential to look all over's
qualifications and experience, but some times it get ineffective. One must have
knowledge to be able to verify new hires' experience.
Hidden costs:
This is also a risk present while outsourcing IT services. As some IT
companies charge monthly fees for IT services but can raise charges for support,
they may charge additional software fees, add fees for hardware maintenance and
many more. It is very important to read terms and conditions to avoid these types of
charges.
Why is IT infrastructure so critical to digital transformation!
It infrastructure is continuously changing and reshaping as per the
development is growing. In this competitive economy the demand for IT is changing
rapidly. The growth and success of an business organization is determined by
various new factors which are User experience, new business models and
increasing rapid value of time (Nozari, and et.al., 2021). The ever-changing environment
increases expectations of IT industry.
The IT infrastructure is necessary as follows:
To ensure the company is continuously and effectively keeping up with the
demands in digital transformation, the organization must ensure that it have
good and secure digital infrastructure.
To ensure business agility which related directly to ones ability to respond to
the changing needs of business. Draw out and goals are need to be
restructured with awareness of competition in the global business.
Infrastructure helps in focusing toward rapid creation, building and
deployment of new products and services.
7
outsourcing and why is IT infrastructure so critical to
digital transformation!
Risks associated with information systems outsourcing
There are various risks associated with information systems outsourcing,
which are followed as:
Unresponsive Support team:
This is a major risk in IT services as outsourcing an IT service takes time to
receive support and find problems. Many companies offer remote assistance from
desktops which helps in problem solving, but unresponsive behavior decreases the
rate of assistance. Some companies are limited to some time duration only to
provide support which complicates problems and increases time consumption.
Decreased Security:
Security risk is also high in the field of information systems as a large amount
of data is present on company servers which are critical for organization (Kang, and
Ampornstira, 2020). Any kind of breach in security can affect heavy losses for companies
as well as leaking essential data such as financial, employee identity and many
more.
Inexperienced staff:
This is one of the great risks that are present while outsourcing IT services.
When the work force is hired in a team of IT services, it is essential to look all over's
qualifications and experience, but some times it get ineffective. One must have
knowledge to be able to verify new hires' experience.
Hidden costs:
This is also a risk present while outsourcing IT services. As some IT
companies charge monthly fees for IT services but can raise charges for support,
they may charge additional software fees, add fees for hardware maintenance and
many more. It is very important to read terms and conditions to avoid these types of
charges.
Why is IT infrastructure so critical to digital transformation!
It infrastructure is continuously changing and reshaping as per the
development is growing. In this competitive economy the demand for IT is changing
rapidly. The growth and success of an business organization is determined by
various new factors which are User experience, new business models and
increasing rapid value of time (Nozari, and et.al., 2021). The ever-changing environment
increases expectations of IT industry.
The IT infrastructure is necessary as follows:
To ensure the company is continuously and effectively keeping up with the
demands in digital transformation, the organization must ensure that it have
good and secure digital infrastructure.
To ensure business agility which related directly to ones ability to respond to
the changing needs of business. Draw out and goals are need to be
restructured with awareness of competition in the global business.
Infrastructure helps in focusing toward rapid creation, building and
deployment of new products and services.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Conclusion
From the above report it has been concluded that information systems are a
necessary part of data storage and research. Its presence has a huge effect on
solutions by providing for information technology research and development. As per
the big data analysis is also discussed in this report and how it is important in making
information technology data stored. Proper theories regarding the data analysis were
included in this report, which are beneficial for an organization. In this report, two
software brands are taken in order to relate with the theories and methods as well as
techniques to get IT solutions. Further in this report, explanations of different
management systems are discussed, like DSS, ESS, TPS and many more. The
globalization of information technology is discussed in this report. Digital
infrastructure is described with its effect by today's generation and the benefits that
people get from it. The negative effects are also discussed in this report. At the end
of this report, the conclusions about the various risks like outdated technology,
business uncertainty and many more risks were elaborated.
8
From the above report it has been concluded that information systems are a
necessary part of data storage and research. Its presence has a huge effect on
solutions by providing for information technology research and development. As per
the big data analysis is also discussed in this report and how it is important in making
information technology data stored. Proper theories regarding the data analysis were
included in this report, which are beneficial for an organization. In this report, two
software brands are taken in order to relate with the theories and methods as well as
techniques to get IT solutions. Further in this report, explanations of different
management systems are discussed, like DSS, ESS, TPS and many more. The
globalization of information technology is discussed in this report. Digital
infrastructure is described with its effect by today's generation and the benefits that
people get from it. The negative effects are also discussed in this report. At the end
of this report, the conclusions about the various risks like outdated technology,
business uncertainty and many more risks were elaborated.
8

References
Fiore, and et.al., 2019. An integrated big and fast data analytics platform for smart urban
transportation management. IEEE Access, 7, pp.117652-117677.
Dai, and et.al., 2020. Big data analytics for manufacturing internet of things: opportunities, challenges
and enabling technologies. Enterprise Information Systems, 14(9-10), pp.1279-1303.
Aljumah, A.I., Nuseir, M.T. and Alam, M.M., 2021. Organizational performance and capabilities to
analyze big data: do the ambidexterity and business value of big data analytics
matter?. Business Process Management Journal.
Rahul, K., Banyal, R.K. and Goswami, P., 2020. Analysis and processing aspects of data in big data
applications. Journal of Discrete Mathematical Sciences and Cryptography, 23(2), pp.385-
393.
Huang, C.K., Wang, T. and Huang, T.Y., 2020. Initial evidence on the impact of big data
implementation on firm performance. Information Systems Frontiers, 22(2), pp.475-487.
Rahmanto, F., Pribadi, U. and Priyanto, A., 2021, March. Big Data: What are the Implications for
Public Sector Policy in Society 5.0 Era?. In IOP Conference Series: Earth and
Environmental Science (Vol. 717, No. 1, p. 012009). IOP Publishing.
Pappas, and et.al., 2018. Big data and business analytics ecosystems: paving the way towards digital
transformation and sustainable societies. Information Systems and e-Business
Management, 16(3), pp.479-491.
Xiaorong, F., Shizhun, J. and Songtao, M., 2018, March. The research on industrial big data
information security risks. In 2018 IEEE 3rd International Conference on Big Data Analysis
(ICBDA) (pp. 19-23). IEEE.
Nozari, and et.al., 2021. Big data analysis of IoT-based supply chain management considering FMCG
industries. Бизнес-информатика, 15(1 (eng)).
Kang, M. and Ampornstira, F., 2020. Research on data analysis of Chinese public accounting firms in
the big data era. Open Journal of Accounting, 10(1), pp.1-8.
Lin, H.Y. and Yang, S.Y., 2019. A cloud-based energy data mining information agent system based
on big data analysis technology. Microelectronics Reliability, 97, pp.66-78.
Xu, L.D. and Duan, L., 2019. Big data for cyber physical systems in industry 4.0: a survey. Enterprise
Information Systems, 13(2), pp.148-169.
9
Fiore, and et.al., 2019. An integrated big and fast data analytics platform for smart urban
transportation management. IEEE Access, 7, pp.117652-117677.
Dai, and et.al., 2020. Big data analytics for manufacturing internet of things: opportunities, challenges
and enabling technologies. Enterprise Information Systems, 14(9-10), pp.1279-1303.
Aljumah, A.I., Nuseir, M.T. and Alam, M.M., 2021. Organizational performance and capabilities to
analyze big data: do the ambidexterity and business value of big data analytics
matter?. Business Process Management Journal.
Rahul, K., Banyal, R.K. and Goswami, P., 2020. Analysis and processing aspects of data in big data
applications. Journal of Discrete Mathematical Sciences and Cryptography, 23(2), pp.385-
393.
Huang, C.K., Wang, T. and Huang, T.Y., 2020. Initial evidence on the impact of big data
implementation on firm performance. Information Systems Frontiers, 22(2), pp.475-487.
Rahmanto, F., Pribadi, U. and Priyanto, A., 2021, March. Big Data: What are the Implications for
Public Sector Policy in Society 5.0 Era?. In IOP Conference Series: Earth and
Environmental Science (Vol. 717, No. 1, p. 012009). IOP Publishing.
Pappas, and et.al., 2018. Big data and business analytics ecosystems: paving the way towards digital
transformation and sustainable societies. Information Systems and e-Business
Management, 16(3), pp.479-491.
Xiaorong, F., Shizhun, J. and Songtao, M., 2018, March. The research on industrial big data
information security risks. In 2018 IEEE 3rd International Conference on Big Data Analysis
(ICBDA) (pp. 19-23). IEEE.
Nozari, and et.al., 2021. Big data analysis of IoT-based supply chain management considering FMCG
industries. Бизнес-информатика, 15(1 (eng)).
Kang, M. and Ampornstira, F., 2020. Research on data analysis of Chinese public accounting firms in
the big data era. Open Journal of Accounting, 10(1), pp.1-8.
Lin, H.Y. and Yang, S.Y., 2019. A cloud-based energy data mining information agent system based
on big data analysis technology. Microelectronics Reliability, 97, pp.66-78.
Xu, L.D. and Duan, L., 2019. Big data for cyber physical systems in industry 4.0: a survey. Enterprise
Information Systems, 13(2), pp.148-169.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



