Wednesday, December 4, 2019
Business Organizations Professional Research and Communication
Question: Discuss about the Business Organizations for Professional Research and Communication. Answer: Introduction Outline of the thesis: In this present market circumstances, the researcher has found that the competition intensity has drastically increased among the retail organizations of Australia. The success of the business organization is solely dependent on the service level with the, which organizations delivers to the targeted customers in the market (Agyei-Mensah, 2016). All the department and the employees of the business organization needs to work coordinately in order meet the needs and enhance the market position of the company in the competitive market (Belleflamme Lambert, 2016). Basically, it is the responsibility of the business organizations to protect all the organizational data as well as the important information about the targeted customers of the organization. Every business organizations incorporate specific policies and procedure in order to run the business in an authentic way (Besson Rowe, 2012). Information system securities are an effective process, by which the business organizations mainly keep all the important information, confidential data and documents of the business organization (Beynon-Davies, 2013). Brocke et al., (2013) commented that by restricting access of the information and important data of the business organization, the management mainly tries to protect the unethical use of the information by the individuals. It has been found that none of the business organization ever discloses the information system securities with others. Presently all the renowned retail organizations has given much emphasis on the information system security management and operations (Bruno et al., 2016). Through this effective initiative, the organization mainly tries to protect the organizational system from hacking. Presently, the governmental bodies has incorporated few policies for operating and maintaining the information system securities within the business organizations (Chan et al., 2014). Different business organization uses and implements different kinds of policies and procedures in order to maintain and operate the information system securities in the business organization (Chang et al., 2013). By giving much emphasis on the information security system the business organization mainly, try to operate the system and the business in a unique way. In order to conduct this study, the researcher has mainly chosen Woolworths as the company. Additionally it has also focused on the information system securities is creating an impact on the overall operational system and the performance level of the business organization in the global market. Background of the organization: Woolworths is considered as one of the largest supermarket. It mainly maintains a big store chain in the Australian market. Additionally it has been found that the company mainly sells the grocery products in the market. The researcher also has found that the company has got almost its stores in 961 locations. As per the report of 2015, the total revenue of the company is around $42.132 billion. On the other hand, around 11,000 employees work in the company. The main competitors of the company Metcash limited and Wesfarmers limited. Presently the market share of the company has reduced due to disclosing of companies information to the other parties in the market. Problem statement: In the recent market situation the competition is facing a tough situation in order to build up the business in the market. Presently, the researcher has found that the company is unable to effectively maintain and operate the information system securities within the organization. On the other hand, it has been found that the employees who are operating the system do not have much knowledge about the system and its operations. Due to this reason, most of the informations and data are being disclosed to the third parties. Chuang Lin (2013) commented that this is directly creating an adverse impact in the overall operations and management of the business organization. Apart from this it has been also found that the technologies and the software are, which the company is using is not much effective to protect the system from hacking and password disclosing. Research objectives: The main objectives of the study are as follows: To understand the importance of information system securities in an business organization To evaluate the information system security operates by Woolworths in the organization To Identify the challenges and barriers that the Woolworths is facing to manage the entire information system security To analyze the effective strategies implemented by Woolworths in order to manage and operate the system To provide suitable recommendation for Woolworth for future development of the organization Research questions: What is the importance of information system security in a business organization? What way Woolworths operates its information system securities in the business organization? What are the barriers and the challenges Woolworths is facing in managing the information system security? What are the unique strategies Woolworths is incorporating for managing the system? What are the effective recommendations suggested to Woolworths for the future development of the organization? Structure of the dissertation: Figure: Structure of the dissertation (Source: Created by the Author) Literature Review IntrodUction: In this chapter, the researcher has mainly focused on the previous thesis done by the other researchers and scholar sin this particular topic. The previous study helps the researcher to comprehend the research topic in an effective way. On the other hand, here the researcher also has discussed several models and theories related to the topic. Concept of information system securities: In the current scenario, the information system security has become much common in every business organizations. In order to maintain the privacy of the organizational policies, the business organization has implemented effective softwares and technologies for keeping the confidential documents, data, and information of the business organization (Chung Kim, 2016). Additionally, this particular system helps the company to protect their entire system from hacking. On the other hand, it restricts the unethical usage of the organizational data. On the other hand, the information system securities also help the company to protect the telephonic conversation data also (Deman Klun, 2015). Sometimes, it becomes very much risky for the business organization to protect the authentic data of the business organization. Effectiveness of information system securities: In the present competitive situation, it has become much significant for the big business organization to maintain the data of the business organization (Sousa Oz 2014). By implementing effective system, the business organization can maintain the secrecy within the business organization (Feng et al., 2014). Additionally, it helps the business organization to overcome any sort of risk related to the information system. Presently, the retail business organization like Tesco, Sainsbury and Morrison are framing effective plans for managing and operating the information system security effectively within the business organization. Fichman et al,. (2014) commented that Leakage of the important information and data can destroy the business organization image as well as also can destroy the whole operational system of the organization. There is some important information, which needs to be protected from unauthorized access (Galliers Leidner, 2014). It has been also found that poor and ine ffective system can harm the entire operation of the business organization. On the other hand, it has been found that the customers are now much concerned Components of information system securities: Gibson, (2014) put forward that the information system securities play an important role in the business organization. As per the organizational policies and the nature of the business, the business organization mainly implements the effective plan in order to maintain system in an accurate way within the organization (Zhang et al. 2013). Here the researcher has found that there are mainly three components of information system securities, namely confidentiality, integrity and availability. Integrity: Here the researcher has found that through integrity of information the business organization mainly tries to protect the information of the organization from any sort of modification or manipulation by any unauthorized parties. Any kind of manipulated information or modified information can easily create an adverse impact on the operations as well as the image of the company (Gozman Currie, 2015). Additionally, it has been also found that Cryptography plays an important role ensuring the data integrity. There are many business organizations, were the employees of the business organization modifies the information and the data of the business organization (Li et al. 2013). This creates a huge barrier in the whole operational system of the business organization. Confidentiality: By maintaining the confidentiality, the business organization mainly tries to protect the information from any sort of misuse. Kim and Solomon, (2013) commented that the key element of the information confidentiality is encryption. Through encryption, the right people can easily access the important information and data of the business organization (Kong et al., 2015). It has been found that there are many business organizations, which does not maintain the policies incorporated by the governmental bodies for maintaining the confidentiality of the data and information of the business organization (Lauffer, 2015). Availability: The availability of information means that the business organization gives the power only to the authorized parties to access the information and the data of the business organization (Kuhn et al. 2014). The authorized people can access the information at the right time. Additionally, it has been found that different softwares and techniques are being used to protect the important information of the organization (Lnsiluoto et al,. 2016). Gap of the literature: While conducting the study, the researcher has faced several problems in the research. As the topic is a bit different, it was quite difficult for the researcher to find out authentic information and data for the study. On the other hand, the researcher was unable to find and use effective theories and models in the study. Due to this reason, the researcher solely has to depend on different available websites. Research Methodology Introduction: In this particular chapter, the researcher has used dissimilar kinds of tools and methods in order to collect the authentic information and data from different available sources. Here the researcher has collected information from both the primary sources and the secondary sources. Additionally, here the researcher also has used effective data collection method and research design in order to conduct the research study in the right way. Data collection method: In case of any research study, the data collection plays an important role. The collection of inaccurate data and information can hamper the quality of the research study. In order to collect the authentic information for the study, the research has used equally the primary sources as well as the secondary sources (Taylor et al., 2015). Through the interview and survey process, the researcher has composed the authentic statistics and information from the employees 50 employees of the company. Additionally, by using the interview process, the researcher has collected the viewpoints of the managers of the company. Research design: There are several kinds of research design, namely explanatory, exploratory and descriptive research design. In order to conduct this particular study, the researcher has mainly chosen the descriptive research design. Through using this effective research design, the researcher can conduct the study in much more detail. In depth research, study will help the researcher to analyze the topic in the right way (Flick, 2015). Additionally, it will also help the researcher to fulfill the research aims as well as objectives. Research hypothesis: Here the researcher has mentioned the researcher hypothesis: The information system securities does not create any impact on the operation of the business organization The information system securities creates an adverse impact on the operations of the business organization Result and findings Quantitative data collection process: Questionnaire 1: Relationship with the organization For how long you are working for Woolworths? Options No of response Percentage of response Total no of respondent More than 5 years 7 14 50 1-4 years 7 14 50 1-3 years 15 30 50 1-2 years 12 24 50 6 months 1 year 9 18 50 Mean Median Mode SD 3.18 3 3 1.288727 Table 1: Relationship with the organization (Source: Created by the Author) Figure 2: Relationship with the organization (Source: Created by the Author) Findings: From the above table and figure, the researcher has found that around 14% of the employees are working in the company for more than 5 months in the company. More than 4 years 14% of the employees are working in the company. On the other hand, it has been also found that more than 30% of the employees in the organization are working for 3 years in the company. Additionally, it has been found that 24% of the employees are working in the company for 2 years in the company. On the other hand, 18% of the employees are attached with the company for more than 6 months. Here the researcher has found that the mean is 3.18. On the other hand, the median is 3 and mode is also 3. Additionally, it has been found that the SD is 1.288727. Questionnaire 2: Operating services of the company Are you satisfied with the information system security program of Woolworths? Options No of response Percentage of response Total no of respondent Highly satisfied 9 18 50 Satisfied 12 24 50 Neutral 15 30 50 Dissatisfied 10 20 50 Highly Dissatisfied 4 8 50 Mean Median Mode SD 2.76 3 3 1.204752 Table 2: Operating services of the company (Source: Created by the Author) Figure 3: Operating services of the company (Source: Created by the Author) Findings: From the above table it has been found that among 50 employees, 18% employees are highly satisfied with the information system securities of the company. On the other hand, it has been found that 24% of the employees are satisfied with the services of the company. 30% of the employees are neutral. On the other hand, 20% of the employees are dissatisfied with the information system securities program of the company. 4% employees are highly dissatisfied. The value of the mean is 2.76 and the median is 3. Additionally, it has been found that the mode is 3 and the value of the SD is 1.2044752. Questionnaire 3: System securities of the organization Do you agree that an ineffective information system securities program creates an adverse impact on the business operations? Options No of response Percentage of response Total no of respondent Strongly agree 15 30 50 Agree 13 26 50 Neutral 10 20 50 Disagree 9 18 50 Strongly Disagree 3 6 50 Mean Median Mode SD 2.44 2 1 1.264266 Table 3: System securities of the organization (Source: Created by the author) Figure 4: System securities of the organization (Source: Created by the author) Findings: From the above table and paragraph, it has been found that the 30% of the employees of the organization strongly agree that ineffective information system securities programs can easily create an adverse impact on the business operations of the business organization. On the other hand, 20% of the employees are neutral. Additionally, 26% of the employees agree that the ineffective information system management can easily create an adverse impact on the overall business operations. The mean is 2.44, median 2 and the mode is 1. On the other hand it has been found that the value of the SD is 1.264266. Questionnaire 4: Service Improvement of the organization According to you, how the company can improve its information system securities? Options No of response Percentage of response Total no of respondent Implementing advance technologies 15 30 50 Upgrade software system 13 26 50 Train the employees 10 20 50 Time management 8 16 50 Others 4 8 50 Mean Median Mode SD 2.46 2 1 1.296935 Table 4: Service Improvement of the organization (Source: Created by the author) Figure 5: Service Improvement of the organization (Source: Created by the Author) Findings: The above table portrays that around 30% of the employees thinks that the company needs to implement advance technologies for improving the service system. On the other hand 26% of the employees think that the company should upgrade the softwares to upgrade the system. Around 20% of the employees think that the company should train the employees for practice the operation in an better way. Moreover, 16% of the employees think that the company should give much emphasis on the time management and 4% of the employees think that the company should focus on other. The mean is 2.46, median is 2 and the mode is 1. Additionally the SD value is 1.296935. Questionnaire 5: Implementation of strategies for better operation According to you what are the strategies that Woolworths should incorporate for developing the information system securities operations? Options No of response Percentage of response Total no of respondent Frame accurate planning 10 20 50 More effective softwares 12 24 50 Implementation of new technologies for more protection 15 30 50 Usage of effective password 9 18 50 Others 4 8 50 Mean Median Mode SD 2.7 3 3 1.216385 Table 5: Implementation of strategies for better operation (Source: Created by the author) Figure 6: Implementation of strategies for better operation (Source: Created by the author) Findings: Around 20% of the employees think that the company needs to frame accurate planning for operation the system in a better way. On the other hand, 30% of the employees think that the company needs to implement new strategies for protecting the information and the data of the organization. Additionally, 18% of the employees thinks that the company must use unique passwords for improve the information system securities. The mean is 2.7. Median is 3, mode is 3 and the SD is 1.21638. Qualitative data collection process: Why the company is unable to operate and manage the information system securities effectively within the organization? As per the first manager, due to the lack of knowledge of the employees the business organization is unable to maintain the information system securities of the organization. On the other hand, the second manager, put forwarded that the company is unable to incorporate the effective technologies and softwares within the organization. Sometimes, due to the mishandling of the security codes, the important information are being leaked to the unauthorized parties. Interview question 2: What are the major barriers does the company is facing to manage the whole operating system? As per the first manager, it has been found that the employees of the business organization are not much trained and knowledgeable. Due to this reason, the employees are facing barriers to adopt and practice the new advance system within the operating system. On the other hand, the second manager put forward that due to lack of communication the employees and the management does not work coordinately with the other operating teams in the organization. Discussion and Analysis 1. For how long you are working for Woolworths? As the mean value is 3.18, it means that 15% of the employees are functioning in the corporation for more than 3 years in the company. On the other hand, the median is 3, it can be said out of 50 employees 15% of the workforce are working in the corporation for more than 3 years. This indicates that Woolworths has the scope to engage the employees more than 3 years in the company. The mode is 3, it indicates that the employees are working in the company for more than 3 years in the company. Thus, it can be said in the future there is a huge chance of increasing tenure of the employees in the organization. As the SD value is more than 1, there is a high risk for the company in future. Are you satisfied with the information system security program of Woolworths? The value of the mean is 2.76 which means that 30% of the employees neutral about the information system securities of the company. On the other hand, it can be also found that 20% of the employees are dissatisfied with the information system securities. The media is 3, out of 50 employees 30% of the employees are neutral about the security program of the Woolworths. In order to improve the services, the organization needs to focus on their security systems. The mode is 3, 30% of the employees are neutral and they also thinks that the company has got a huge opportunity to improve their information system security. Do you agree that an ineffective information system securities program creates an adverse impact on the business operations? The mean value is 2.44, this indicates that 26% of the employees agree that the ineffective information system securities can hamper the overall security system. On the other hand the median is 2, which means that 30% of the employees agrees and thinks that the business organization needs to give much emphasis on the information security system of the business organization. On the other hand, it has been found that the mode is 1, 30% of the employees strongly agrees that by giving much more importance to the information security system,, the business organization can manage the operation in a better way . The value of the SD is 1.264266, as the SD is 1 there is high risk for the company in the future. According to you, how the company can improve its information system securities? The mean value is 2.46, it indicates that 26% of the employees think that the company should implement new softwares to improve the level of protection. On the other hand it has been found that the median 2, which indicates that the employees needs to give much emphasis on the software development. The value of the mode is 1, which determines 30% of the employees think that by implementing new technologies that company can easily grab the new opportunities to development the service level. Additionally, the value of the SD is 1.296935, as the SD value is more than 1, this indicates that there are some risk factors for the company in the near future. According to you what are the strategies that Woolworths should incorporate for developing the information system securities operations? The mean value is 2.7, this indicates that think the company needs to incorporate new technologies for more protection. The median value is 3, this means that 30% of the employees feels that the company should adopt new technologies to improve the management function. Additionally, the mode is 3, 30% of the employees think that the company needs to adopt new technologies, and this helps the company to grab the new opportunities. The value of the SD is 1.216385. As the value of the SD is more than 1, this indicates that there are some risks for the corporation in the near outlook. In order to overcome the risks the business association needs to incorporate effective strategies techniques within the organization, in order to maintain the flow of the operation in the organization. Conclusion After the completion of the study, this can be said that presently information security system plays the most important role for protecting the important information and the data of the business organization. In the present scenario, the main responsibility of the business organization to protect every kind of data and information from unauthorized access. The protection of the data helps the business organization to run the business in the competitive market in a different way. On the other hand, it has been found that due to the lack of technological advancement the business organization is unable to upgrade the protection level within the organization. Due to this mismanagement the business organization is unable to retain the loyal customers of the company. This is directly creating an adverse impact on the sales as well as the market share of the company. Moreover, it has been also found that the competition level has also drastically increased within the retail organizations. Almost all the business organizations are using different kinds of strategies and techniques in order to manage and operate the information system securities within the business organization. Reflective study: In the recent times, I have found that the business organizations are giving much emphasis on the information system securities programs. The operations are mainly maintained to track all the important information of the organization and the customers. Additionally, it has been found that the different business organizations run the business in their unique way and process. In the very first chapter, introduction the researcher has mainly introduced the topic. I think that it is the first and the foremost responsibility of the business organization is to manage and operate the system of the business organization in an effective way. Additionally, I have also found that the business organization uses different kinds of strategies, techniques and policies in order to operate the system to gain additional advantage in the market. I have found that the researcher has found that Woolworths is unable to implement the new advance technologies and softwares within the company due to the inefficiency of the employees. The whole scenario is somehow affecting both the sales as well as marketing share of the business organization. The unauthorized access of the third parties is creating a barrier in the whole system in the business organization. Woolworths is considered as one of the famous retail organization in Australia. I have found that there are several competitors of the company in the market. I have found that in the first chapter, the researcher has mainly discussed the research questions as well as the objectives of the study. The main objective of the research study is to analyze that how the information system securities are directly creating an adverse impact on the business operations of the company. Additionally, I have also found that the business organization does not maintain or incorporated any sort of policies and strategies to run the information system effectively in the organization. Due to this reason the company is unable to protect the authentic data and information of the organization as well as of the customers. I have found that due to the mismanagement and inefficiency of the employees, the business organization is unable to protect the information security system of the business organization. After discussing the research question s and the objectives, I found that the researcher has also mentioned the structure of the dissertation, which mainly sho wcase in which chapter the researcher has discussed. I found that the second chapter is the Literature review chapter; this chapter is considered as one of the important chapter of the dissertations. In this section, I have found that the researcher has mainly focused on the previous studies done by the other scholars in this particular topic. In this section, I have found that the companies like Tesco, Sainsbury, and Morrison has given their much emphasis on the information system securities of the business organization. Through this effective approach the business organization has gained several additional advantages in the company. The previous studies have helped the researcher to understand the topic and conduct the present study in a better way. In this section I have found that the researcher has mainly discussed the concept related to information system securities. On the other hand, the researcher also has discussed the components related to the information system securities. However, in the literature review section I have found several gaps in the study. I have found it was difficult to find out the relevant information and data for the study. Moreover, there was no such models and theories related to the study. It becomes quite difficult for the researcher to access the topic in a detailed way. In the next chapter, research methodology chapter, I have found that the researcher has mainly used different kinds of tools and techniques in order to collect authentic information and data for the study. I have found that in this chapter the researcher has used both the primary as well as the secondary sources for the study. From the primary sources the researcher has collected the information from the 50 employees of Woolworths and also has taken the interview of the two managers of the company. Additionally, for the secondary sources, the researcher has mainly collected the information from different websites, authentic journals as well as articles. As the research design, the researcher has mainly chosen, I have found that the researcher preferred to use descriptive design. This has helped the researcher to conduct the study in much more details. The next chapter is result and findings. In this section, I have found that the researcher has mainly analyzed the authentic data and the information, which the researcher has collected from the different sources. Here the researcher has mainly represent the collected data through graphical representation and tables. Additionally, I have found that the finding of the result has given a clear picture of the assessment. Moreover, here the researcher has interpreted the data in general way. However, in the next chapter, discussion and analysis, I have found that the researcher has mainly analyzed the data through mean median mode and standard deviation for better analysis. It has been found the the different graphical representation has showcased different kind of outcomes. In the very last chapter, conclusion, I have found that the researcher has mainly concluded the chapter. It has been found that presents almost all the retail business organizations of Australia, has given much emphasis on the information system security programs in order to maintain the operation and the system in a better way. Moreover, I have found that due to lack of implementation of technology and effective strategies, Woolworths is unable to protect the access of the important information and data from the third parties. It has been also found that due to this specific reason the business organization is unable to retain the large amount of customers in the market. Overall it has created a huge impact on the revue as well as the market share of the company. In order to improve the information system security management the business organization needs to incorporate proper strategies, technologies and softwares to upgrade the whole system within the organization. Reference list: Agyei-Mensah, B. K. (2016). Internal Control Information Disclosure and Corporate Governance: Evidence From an Emerging Market.Corporate Governance: The International Journal of Business in Society,16(1). Belleflamme, P., Lambert, T. (2016). An Industrial Organization Framework to Understand the Strategies of Crowdfunding Platforms$.International Perspectives on Crowdfunding: Positive, Normative and Critical Theory, 1. Besson, P., Rowe, F. (2012). Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions.The Journal of Strategic Information Systems,21(2), 103-124. Beynon-Davies, P. (2013).Business information systems. Palgrave Macmillan. Brocke, J. V., Riedl, R., Lger, P. M. (2013). Application strategies for neuroscience in information systems design science research.Journal of Computer Information Systems,53(3), 1-13. Bruno, E., Iacoviello, G., Lazzini, A. (2016). The Adequacy of Information Systems for Supporting the Asset Quality Review Process in Banks. Evidence from an Italian Case Study. InStrengthening Information and Control Systems(pp. 59-75). Springer International Publishing. Chan, T., Sclafani, J., Dobrick, J. M., Yadlapalli, R. T., Bax, M., Fezza, D. X. (2014).U.S. Patent No. 8,738,514. Washington, DC: U.S. Patent and Trademark Office. Chang, M. K., Cheung, W., Tang, M. (2013). Building trust online: Interactions among trust building mechanisms.Information Management,50(7), 439-445. Chuang, S. H., Lin, H. N. (2013). The roles of infrastructure capability and customer orientation in enhancing customer-information quality in CRM systems: Empirical evidence from Taiwan.International Journal of Information Management,33(2), 271-281. Chung, C. S., Kim, D. (2016). Analysis on Personal Information Protection Issue of E-Government1. Deman, M., Klun, M. (2015, June). Efficiency and Usability of Information Systems: E-Recovery System in Slovenia. InProceedings of the 15th European Conference on eGovernment 2015: ECEG 2015(p. 79). Academic Conferences Limited. Wang, H. J., Li, M. (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis.Information sciences,256, 57-73. Fichman, R. G., Dos Santos, B. L., Zhiqiang (Eric) Zheng. (2014). Digital Innovation as a Fundamental and Powerful Concept in the Information Systems Curriculum.Mis Quarterly,38(2), 329-343. Galliers, R. D., Leidner, D. E. (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Gibson, D. (2014).Managing risk in information systems. Jones Bartlett Publishers. Gozman, D., Currie, W. (2015, January). Managing Governance, Risk, and Compliance for Post-crisis Regulatory Change: A Model of IS Capabilities for Financial Organizations. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 4661-4670). IEEE. Kim, D., Solomon, M. G. (2013).Fundamentals of information systems security. Jones Bartlett Publishers. Kong, H., Jung, S., Lee, I., Yeon, S. J. (2015). Information Security and Organizational Performance: Empirical Study of Korean Securities Industry.ETRI Journal,37(2), 428-437. Kuhn, J. R., Courtney, J. F., Morris, B. (2015). A theory of complex adaptive inquiring organizations: application to continuous assurance of corporate financial information.The Knowledge Engineering Review,30(03), 265-296. Lnsiluoto, A., Jokipii, A., Eklund, T. (2016). Internal control effectivenessa clustering approach.Managerial Auditing Journal,31(1), 5-34. Lauffer, R. B. (2015).U.S. Patent No. 9,060,063. Washington, DC: U.S. Patent and Trademark Office. Li, J., Huo, M., Chao, S. (2015, September). A Study of Information Security Evaluation and Risk Assessment. In2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)(pp. 1909-1912). IEEE. Lugmayr, A. (2013, July). Brief introduction into information systems management research in media industries. In2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)(pp. 1-6). IEEE. ORiain, S., Harth, A., Curry, E. (2012). Linked data driven information systems as an enabler for integrating financial data.Information Systems for Global Financial Markets: Emerging Developments and Effects, 239-270. Peffers, K., Dos Santos, B. L. (2013). Research opportunities in information technology funding and system justification.European Journal of Information Systems,22(2), 131-138. Pulwarty, R. S., Sivakumar, M. V. (2014). Information systems in a changing climate: Early warnings and drought risk management.Weather and Climate Extremes,3, 14-21. Schroeder, J. H., Shepardson, M. L. (2016). Do SOX 404 Control Audits and Management Assessments Improve Overall Internal Control System Quality?.The Accounting Review. Shin, S., Lee, Y. (2013). Business Performance Impact Caused by Display Restriction of Customer Information Identifier: Focusing on Domestic Securities Business.The Journal of Information Systems,22(4), 49-69. Sousa, K., Oz, E. (2014).Management information systems. Nelson Education. Zhang, L., Mol, A. P., He, G. (2016). Transparency and information disclosure in China's environmental governance.Current Opinion in Environmental Sustainability,18, 17-24. Taylor, S. J., Bogdan, R., DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Flick, U. (2015).Introducing research methodology: A beginner's guide to doing a research project. Sage
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.