Business Security Threat Overview Using IT and Business Intelligence
DOI:
https://doi.org/10.18034/gdeb.v6i2.703Keywords:
Information Systems, Management Strategy, Business Intelligence, Database Infrastructure, Security ThreatsAbstract
Through a critical reflection on how information systems (IS) are currently defined in the IS literature, this study aims to contribute to a more profound knowledge of information systems (IS). The research identifies a number of definitions of IS that may be found in the literature by employing the hermeneutic method for literature reviews. The examination of these definitions allows for the differentiation of four distinct perspectives on information systems (IS): a technology view, which emphasizes the technological aspects of IS; a social theory, which highlights the sociocultural factors of IS; a socio-technical view, which emphasizes the interconnection of technology and social elements; and a process view, which emphasizes the activity orientation of IS. This study critically examines the many methods of understanding and conceptualizing information systems and explores their contributions and limits. Based on this examination, the paper argues for developing an alternative socio-material understanding of IS based on a non-dualist, relational ontology.
Downloads
References
Abdisalam, M-S. (2011). Setting up a Secure Information System Using Information Security Management. International Journal of Research and Reviews in Computer Science. 2(1), 138-143.
Ballamudi, V. K. R. (2016). Utilization of Machine Learning in a Responsible Manner in the Healthcare Sector. Malaysian Journal of Medical and Biological Research, 3(2), 117-122. https://mjmbr.my/index.php/mjmbr/article/view/677
Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78
Dekkati, S., Thaduri, U. R., & Lal, K. (2016). Business Value of Digitization: Curse or Blessing?. Global Disclosure of Economics and Business, 5(2), 133-138. https://doi.org/10.18034/gdeb.v5i2.702 DOI: https://doi.org/10.18034/gdeb.v5i2.702
Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.
Desamsetti, H. (2016b). Issues with the Cloud Computing Technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321-323.
Gutlapalli, S. S. (2016a). An Examination of Nanotechnology’s Role as an Integral Part of Electronics. ABC Research Alert, 4(3), 21–27. https://doi.org/10.18034/ra.v4i3.651 DOI: https://doi.org/10.18034/ra.v4i3.651
Gutlapalli, S. S. (2016b). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. https://doi.org/10.18034/ei.v4i2.653 DOI: https://doi.org/10.18034/ei.v4i2.653
Kristian, B., Isabelle C., Stephan, F., Maritta, H., Stefan, H. (2013). A Pattern-Based Method for Establishing a Cloud-Specific Information Security Management System. Requirements Engineering, 18(4), 343-395. https://doi.org/10.1007/s00766-013-0174-7 DOI: https://doi.org/10.1007/s00766-013-0174-7
Lal, K. (2015). How Does Cloud Infrastructure Work?. Asia Pacific Journal of Energy and Environment, 2(2), 61-64. https://doi.org/10.18034/apjee.v2i2.697 DOI: https://doi.org/10.18034/apjee.v2i2.697
Lal, K. (2016). Impact of Multi-Cloud Infrastructure on Business Organizations to Use Cloud Platforms to Fulfill Their Cloud Needs. American Journal of Trade and Policy, 3(3), 121–126. https://doi.org/10.18034/ajtp.v3i3.663 DOI: https://doi.org/10.18034/ajtp.v3i3.663
Lal, K., & Ballamudi, V. K. R. (2017). Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach. Technology & Management Review, 2(1), 6–12. https://upright.pub/index.php/tmr/article/view/80
Laurie, B.A.E. & Roberts, S.A. (2008). The Convergence of Information Systems and Information Management: Environmental Changes and Pedagogical Challenges. Aslib Proceedings, 60(6), 661–671. https://doi.org/10.1108/00012530810924320 DOI: https://doi.org/10.1108/00012530810924320
Li, Y., Yi, X. J., & Geng, Y. D. (2011). Social-Security-System-Based Two-Way Referral Management Information System. Applied Mechanics and Materials, 121–126, 2248–2252. https://doi.org/10.4028/www.scientific.net/AMM.121-126.2248 DOI: https://doi.org/10.4028/www.scientific.net/AMM.121-126.2248
Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. https://4ajournal.com/article/view/76
Petrevska, N. R., Geert, P., Gjorgji, M. (2015). Bridging Operational, Strategic, and Project Management Information Systems for Tactical Management Information Provision. Electronic Journal of Information Systems Evaluation, Reading 18(2), 146-158. https://www.proquest.com/docview/1712319739/BB73FEC6F19492DPQ/9
Qin, W. F., Yu, L., Xia, Z. Z. (2014). Research on Information Management System of Equipment Based on Information Theory. Applied Mechanics and Materials, 644–650, 2424–2427. https://doi.org/10.4028/www.scientific.net/AMM.644-650.2424 DOI: https://doi.org/10.4028/www.scientific.net/AMM.644-650.2424
Shi, Q. Y. (2011). Relation Research of Management Information Systems and Business Management Development. Applied Mechanics and Materials, 71–78, 4349–4352. https://doi.org/10.4028/www.scientific.net/amm.71-78.4349 DOI: https://doi.org/10.4028/www.scientific.net/AMM.71-78.4349
Thaduri, U. R., Ballamudi, V. K. R., Dekkati, S., & Mandapuram, M. (2016). Making the Cloud Adoption Decisions: Gaining Advantages from Taking an Integrated Approach. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 11–16. https://upright.pub/index.php/ijrstp/article/view/77
Traian, S., Cristian, A. (2011). A Progressive Improvement of the Integrated System for Academic Management through Information Security Management System Audit and Metrics. Academy of Economic Studies. Economy Informatics, 11(1), 132-141.
Walker, D., Pitt, M. & Thakur, U. J. (2007). Environmental Management Systems: Information Management and Corporate Responsibility. Journal of Facilities Management, 5(1), 49-61. https://doi.org/10.1108/14725960710726346 DOI: https://doi.org/10.1108/14725960710726346
Wu, L.-C., Wu, L.-H., Wen, Y.-F. (2010). Interdisciplinary Research of Options Theory and Management Information Systems: Review, Research Issues, and Suggestions for Future Research. Industrial Management & Data Systems, 110(3), 433-452. https://doi.org/10.1108/02635571011030060 DOI: https://doi.org/10.1108/02635571011030060
Downloads
Published
Issue
Section
License
Copyright (c) 2017 Upendar Rao Thaduri
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.