Business Security Threat Overview Using IT and Business Intelligence

Authors

  • Upendar Rao Thaduri Web Developer, Amalgamated Bank, New York, USA

DOI:

https://doi.org/10.18034/gdeb.v6i2.703

Keywords:

Information Systems, Management Strategy, Business Intelligence, Database Infrastructure, Security Threats

Abstract

Through a critical reflection on how information systems (IS) are currently defined in the IS literature, this study aims to contribute to a more profound knowledge of information systems (IS). The research identifies a number of definitions of IS that may be found in the literature by employing the hermeneutic method for literature reviews. The examination of these definitions allows for the differentiation of four distinct perspectives on information systems (IS): a technology view, which emphasizes the technological aspects of IS; a social theory, which highlights the sociocultural factors of IS; a socio-technical view, which emphasizes the interconnection of technology and social elements; and a process view, which emphasizes the activity orientation of IS. This study critically examines the many methods of understanding and conceptualizing information systems and explores their contributions and limits. Based on this examination, the paper argues for developing an alternative socio-material understanding of IS based on a non-dualist, relational ontology.

Downloads

Download data is not yet available.

References

Abdisalam, M-S. (2011). Setting up a Secure Information System Using Information Security Management. International Journal of Research and Reviews in Computer Science. 2(1), 138-143.

Ballamudi, V. K. R. (2016). Utilization of Machine Learning in a Responsible Manner in the Healthcare Sector. Malaysian Journal of Medical and Biological Research, 3(2), 117-122. https://mjmbr.my/index.php/mjmbr/article/view/677

Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78

Dekkati, S., Thaduri, U. R., & Lal, K. (2016). Business Value of Digitization: Curse or Blessing?. Global Disclosure of Economics and Business, 5(2), 133-138. https://doi.org/10.18034/gdeb.v5i2.702 DOI: https://doi.org/10.18034/gdeb.v5i2.702

Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.

Desamsetti, H. (2016b). Issues with the Cloud Computing Technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321-323.

Gutlapalli, S. S. (2016a). An Examination of Nanotechnology’s Role as an Integral Part of Electronics. ABC Research Alert, 4(3), 21–27. https://doi.org/10.18034/ra.v4i3.651 DOI: https://doi.org/10.18034/ra.v4i3.651

Gutlapalli, S. S. (2016b). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. https://doi.org/10.18034/ei.v4i2.653 DOI: https://doi.org/10.18034/ei.v4i2.653

Kristian, B., Isabelle C., Stephan, F., Maritta, H., Stefan, H. (2013). A Pattern-Based Method for Establishing a Cloud-Specific Information Security Management System. Requirements Engineering, 18(4), 343-395. https://doi.org/10.1007/s00766-013-0174-7 DOI: https://doi.org/10.1007/s00766-013-0174-7

Lal, K. (2015). How Does Cloud Infrastructure Work?. Asia Pacific Journal of Energy and Environment, 2(2), 61-64. https://doi.org/10.18034/apjee.v2i2.697 DOI: https://doi.org/10.18034/apjee.v2i2.697

Lal, K. (2016). Impact of Multi-Cloud Infrastructure on Business Organizations to Use Cloud Platforms to Fulfill Their Cloud Needs. American Journal of Trade and Policy, 3(3), 121–126. https://doi.org/10.18034/ajtp.v3i3.663 DOI: https://doi.org/10.18034/ajtp.v3i3.663

Lal, K., & Ballamudi, V. K. R. (2017). Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach. Technology & Management Review, 2(1), 6–12. https://upright.pub/index.php/tmr/article/view/80

Laurie, B.A.E. & Roberts, S.A. (2008). The Convergence of Information Systems and Information Management: Environmental Changes and Pedagogical Challenges. Aslib Proceedings, 60(6), 661–671. https://doi.org/10.1108/00012530810924320 DOI: https://doi.org/10.1108/00012530810924320

Li, Y., Yi, X. J., & Geng, Y. D. (2011). Social-Security-System-Based Two-Way Referral Management Information System. Applied Mechanics and Materials, 121–126, 2248–2252. https://doi.org/10.4028/www.scientific.net/AMM.121-126.2248 DOI: https://doi.org/10.4028/www.scientific.net/AMM.121-126.2248

Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. https://4ajournal.com/article/view/76

Petrevska, N. R., Geert, P., Gjorgji, M. (2015). Bridging Operational, Strategic, and Project Management Information Systems for Tactical Management Information Provision. Electronic Journal of Information Systems Evaluation, Reading 18(2), 146-158. https://www.proquest.com/docview/1712319739/BB73FEC6F19492DPQ/9

Qin, W. F., Yu, L., Xia, Z. Z. (2014). Research on Information Management System of Equipment Based on Information Theory. Applied Mechanics and Materials, 644–650, 2424–2427. https://doi.org/10.4028/www.scientific.net/AMM.644-650.2424 DOI: https://doi.org/10.4028/www.scientific.net/AMM.644-650.2424

Shi, Q. Y. (2011). Relation Research of Management Information Systems and Business Management Development. Applied Mechanics and Materials, 71–78, 4349–4352. https://doi.org/10.4028/www.scientific.net/amm.71-78.4349 DOI: https://doi.org/10.4028/www.scientific.net/AMM.71-78.4349

Thaduri, U. R., Ballamudi, V. K. R., Dekkati, S., & Mandapuram, M. (2016). Making the Cloud Adoption Decisions: Gaining Advantages from Taking an Integrated Approach. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 11–16. https://upright.pub/index.php/ijrstp/article/view/77

Traian, S., Cristian, A. (2011). A Progressive Improvement of the Integrated System for Academic Management through Information Security Management System Audit and Metrics. Academy of Economic Studies. Economy Informatics, 11(1), 132-141.

Walker, D., Pitt, M. & Thakur, U. J. (2007). Environmental Management Systems: Information Management and Corporate Responsibility. Journal of Facilities Management, 5(1), 49-61. https://doi.org/10.1108/14725960710726346 DOI: https://doi.org/10.1108/14725960710726346

Wu, L.-C., Wu, L.-H., Wen, Y.-F. (2010). Interdisciplinary Research of Options Theory and Management Information Systems: Review, Research Issues, and Suggestions for Future Research. Industrial Management & Data Systems, 110(3), 433-452. https://doi.org/10.1108/02635571011030060 DOI: https://doi.org/10.1108/02635571011030060

Downloads

Published

2017-12-31

How to Cite

Thaduri, U. R. (2017). Business Security Threat Overview Using IT and Business Intelligence. Global Disclosure of Economics and Business, 6(2), 123-132. https://doi.org/10.18034/gdeb.v6i2.703

Similar Articles

71-80 of 130

You may also start an advanced similarity search for this article.