Delivery in day(s): 4
CIS5100 Database Management System Editing Services
Letter of transmittal
Name of professor
Name of university
Address of university
Subject: transmittal letter
I am very happy to work on this project. For completing this report, I have done our level best. All the details that have been written in the report are taken from the book. The result of this report is gaining the knowledge about the resource management.
I assure you that while reading this report you will find worth knowledge from the report. Thank you for your cooperation.
Name of student
Name of the student.
This is the report which provides the information about to change the business form mail system to the online market. For the development of the online system, this report provides the information about the database system to store all the details of the system. Other than this, different hardware and software components are used to develop this system. This system provides the security to data using the cloud-based system to store the data. This report provides the required architecture for the company to get the advantages and benefits of the new business. Some of the issues that occur while developing the project also cover in this report.
Using the technology for the development of the business has become the most important part of the architecture. This report provides information about the change in business from mailing system to the online market. Along with that, use of the cloud-based system to store the data and provides the security to the database system. With the use of the cloud-based system to the business, it will provide the security to the database system. Other benefits of the cloud-based system the data can be access from anywhere, anytime.
For developing the E-based system some of the hardware and software components are also used and explained in the report. Some of the modification is also performed over the hardware and software components. With the use of these modifications, it will provide the benefits to the organization. Some of the issues occur while implementing the cloud-based system to the organization, these issues are also resolved in this report. All the information and details that are mention in the report are taken from the book.
Report Section 1
What are the benefits and challenges that the business should be aware of before becoming an e-business?
Ifconsider the e-business system, then there are a lot of advantages provides to the company, advantages in terms of productivity or profitability. With the use of the e-business the productivity, customer and company interaction increase. In today's time, all the organization wants to comes online to attract the user and provides the large information to all the user on the single platform. It looks like easy to use the e-business for the company, but there are a lot of challenges faced by the company for implementing this in an organization.
Benefits should be known before becoming E-business:
Figure 1: Advantages of E-Business
There are various of benefits of the E-business, some of them are listed below:
1.Cost reduction:With the use of this, it will reduce the human efforts, other than this it will reduce some of the external expenses of the company.
2.Improve the global reach:With the use of this, it will provide the early access to the data and information.
3.Improve effectiveness:With the use of this the new customer will come and attracted towards the organization. E-business helps the company to fulfil the customer need in the limited time.
4.Some of the issues with the use of E-business.
5.Customer management: Managing the customer over the E-business is the most difficult task.
6.Taxation:There are need to follow all the rules and regulation that are defined by the government, in that the tax comes over the number one. There are a lot of tax that has been added by the government.
7.Limited services:In some cases, there are very few services provides the E-business to the companies. Some type of services like online food is not successful in E-business.
What are the four types of e-business models, which type(s) of e-business model(s) should the business be considering implementing? Why?
E-business type models:
1.Customer to customer:In this system, the seller and buyer both are the customers. The communication is done between the two customers, and they have to sell and buy the product.
2.Customer to business:with the use of this customer can sell their product to the customer over the online market. This is used for the import and export purpose.
3.Business to the customer:In this system, all the goods and services are sold to the customer directly, as there is no relation between the buyer and supplier.
4.Business to business:In this, all the import and export of the services and good are done within the two business companies. This system providing the central market for the companies.
Figure 2: Business models
Business to the customer:For this system, this is the most suitable model because this project is based over the cloud-based system and have to store all the details of the customer, other than this there is a direct relation of the customer to the company, there is no intermediate.
What type of e-commerce tools should the business consider utilizing to connect and communicate with their customers? Why?
E-commerce tools used to communicate with the customer:
1.Content management:This is the tool which is used to manage all the details of the company. With the use of this, customer will able to update the running and new products.
2.Email system:This is the system which is used to send the details to each other. In this user can send the feedback to the company for the product and also company will provide the details of the customer with the use of this system.
3.Video conference:With the use of this, the company will able to communicate with the customer directly.
Figure 3: E-commerce Tools
What tools should the business use to measure their e-business success?
There are some tools that are used to major the success of the project. The metrics are one of the tools. With the use of this, it is evaluating the outcomes of the business. Two types of the matrices.
1.Key performance indicator
2.Critical success factor
With the use of this, it is easy to measure the success of the project and find out the relationship between the customer and company.
Should the business also consider implementing m-business? What are the benefits and challenges Dr. Dan Tooine will need to be aware of?
In this system, the business has to implement both E-business and M-Business. With the use of this, the customer can able to use the services of the company in the mobile system. with the use of this, it helps the company to growth in the multi-direction and in less time. Below show some of the advantages and disadvantages of the M-Business.
Instant access to the customer
Report Section 2
Develop a computer hardware proposal
For the development of the business and change the business from one direction to the other direction to the other direction, the implementation of the new hardware system is to the company provides the benefits to the company. With the use of the hardware system, it is easy to implement the new system in an organization. In this part of the reports provide the information about the new hardware system that has been used to develop the e-system in the company. In a business, the network system plays the major role in the development of the effective business. For the development of the network system, there are various hardware and software components are required. All the hardware components are to be described in this section. Some of the hardware components are required to developed the cloud-based system in a company all of them are described below:
For the development of the system there are a lot of components are required so, while using the components at the single room, there are a lot of heat is generated and there are chances of any spark or network failure occur. To resolves these condition, there will be the use of some cooling pads to the devices and at the server room use of the air condition become necessary.
The centralprocessing unit and memory:
For development, a system for an organization the CPU and memory are the most important part of the system. all the logical and arithmetical process is done by the CPU. With the use of the memory, the information of the data can be stored easily. Performance of the system also depends upon the memory. With the use of these components, the user can use the information from anywhere.
This is the device which is used to store the useful data of an organization. for this system there is the use of the cloud-based system, it is more secure and most reliable as compare to the other backup devices. With the use of this, it is easy to access data from any time and anywhere. Another benefit of this system is that it provides access to multiple users at a single time. Any damage occurs, in that condition, the data will be restored with the use of the cloud-based system.
It is also an important device, which is used to provides the information to the user, if the user wants to print any information then it is very useful. Sometimes the system failure occurs and important information has to share then it is the tool with the use of this the hardcopy of the information will provide the required person.
Develop a computer software proposal
Software components - Networking:
Figure 4: Technology
It is the device which is used to provide the services from one end to the other end, with the use of the cables. With the use of the modem, the data transferee speed is high as compared to the other system. In the simple words, the modem is the device which provides the data transferred from one device to the other device.
Wireless access point:
This is also called as WAP. The main work of this device to provides the connectivity between the devices. It will provide the connectivity between the wired and wireless devices. There is different technology is used in this system. technology means the mode of connection between devices.
Refers to the server into this system, then it is the most important part of the development of the cloud-based system. Without the use of the server, it is not possible to add the cloud-based system in an organization. For the development of the cloud-based system, the most needed software is a server. There are a lot of server present and all of them have a different advantage. The working of the server is depending upon the system recruitment. All servers have a common advantage is that with the use of the server-based system the user can access data from anywhere and data will be secure.
Other software- computer device:
Above shows, all the component that has been used in the system to provides the connection between the devices of an organization. after the connection, there are a lot of software that is used in the computer system to run all the hardware device in a proper manner without any failure. So, some of the most important computer components are mention and listed below:
It is the device in the computer system, which is used to secure the environment of an organization. with the use of the firewall system in the device, it monitors all the activity that is running in the system. This system has protected the system from unwanted users and threats that will appear in the system. it also protects the system from the hacker and protects all the file sharing within the system.
This is the system, which is used to provide the virtual system into a single system. With the use of the virtual machine, the user can able to create the virtual system in an original device. One of the main advantages of this virtual machine is the user can see the programs and code in the virtual system. another advantage of this is that the user can distribute pre-configured OS.
This is the software that provides the connection between the hardware and software of a system. It is the user-friendly system, by which the user can interact with the computer system and understand the computer responses. Other than this there is a different type of the operating system are present some of them are Linux, Windows, Mac etc. Windows are used to provide the good user- friendly. The Linux system is used to provide the good security to the customer and company. So, at the end of the company section of the Windows system is suitable.
Other services for the company:
There are a lot of services that are given by the cloud computing system, some of them are Software as Service, Platform as Service, Infrastructure as Service, Storage as a Service. To improve the quality of the business and cloud computing system these services are very much important to apply in the company structure. All of the services are listed below:
Figure 5: Services
Platform as a Service:
This service is also identified as PaaS. This provides the services to the user. with the use of PaaS, there are a lot of platforms provides to the user like MAC, Linux etc. with the lot of options the user will select and use the service as per requirement.
Infrastructure as Service:
This is also identified as IaaS. This is the service the which provides the infrastructure for an organization. it provides the structure to the user to use the system according to requirement.
Software as a Service:
This is identified as a SaaS. This is part of the cloud-based services. With the use of this, the user can use the virtual software so that the user can use the different services, at the same time at different places.
Storage as a Service:
This is the service which provides the user to store the data in different format and places. This service can be used only to store the data.
From the above services, I have selected Infrastructure as a Service.
Include a diagram of the proposed hardware, software and network infrastructure; or the proposed cloud solution architecture; to help Dr. Tooine visualize what you are recommending.
The cloud computing is the system which provides the storage space to the customer, to save his data in the more secure way. There are different services provide by the cloud computing, by the use of that the user can use the system in a more efficient way. Below show some of the images, that will provide the example of the cloud computing and structure of the cloud computing. The figure one shows the example of cloud computing, figure two shows the some of the benefits of the cloud computing, in the end, figure three shows the architecture of cloud computing. With the use of the cloud computing architecture, it is easy to understand the working of the cloud computing system.
Figure 6: Cloud computing example
Figure 7: Benefits of cloud computing
Figure 8: Cloud computing
Figure 9: Cloud computing advantages
The cloud-basedsystem is the system which is used to provide front-end services to the user. In the system, the customer is in the front end and they will ask the cloud to provides some of the services, after getting the required the cloud will respond according to the request. There is one mode that is used by the user and cloud is the internet.
Report Section 3
How should the business maintain and secure its information architecture to support its business operations? Propose the steps that the business should follow.
Various protocols are used in the system to maintain the important information and data. Any data or information that are available in an organization is most important for the organization and user both. So, it is important to protect the data, that will be present in an organization. For the security, there is a different type of services that have to be used to implement the security in the company. Below show some of the points that have explained below, with the help of this it is easy to apply the security to database and system.
Figure 10: Security tools
This is the services which provide the secure environment in the system. This system is used to check the user authentication. While entering the online server it will ask the user to input the id and password. Other than this there are a lot of another method to authenticate the user identity. Scanning the figure and eye is also one of the best methods to authenticate the user. With the use of authenticated, the identity of the user can be verified.
This is the technique which comes under the use when there is a file or data transfer between the two users on the server. This provides the encrypted form to the files while transferring from source to destination. the system will encrypt the data before the transmitting the information. in the encryption of the data, there is no other person can read the data, so the data become secure from the other user. after reach to the destination, the data is decrypted by the system and the required user can read the data easily. This is the one end process.
This is the process that is done after the completion of the Encryption. The file that is sent by the sender will be encrypted by the system after that the file reach to the receiver than it will be Decrypted by the system so that the user can able to read the file and got the important information. this process can be done by only the valid user of the system.
In this part of the report provides the information about the various types of the characteristic of the infrastructure, with the use of this the system become more efficient and there are good outcomes for the company. Below describes some of the characteristics:
Figure 11: Characteristic of cloud
This is the characteristic of the system, which is used to solves the various problems that are present in the system. It is easy to remove some of the failures in the lower level of an organization. If it is present in an organization, then the company will able to face all the problems that are coming over the market.
This the characteristic which is used to identifies the working structure of an organization. with the use of this, it is easy to identify the growth of the company. The performance of the company comes in both the direction, in good or in a bad direction. The performance of the company will affect the stakeholder trust in an organization.
It is measured in terms that how much services are available to the customer. With the use of this, the customer will measure the performance of the company. If there is an error occur and company will able to resolve this then it is ok, but at that time the company will not available or service is not providing by the company then it takes the company to the failure.
This is the defined as the competition of the company to the business without any failure in the company.
This is the services that provide the company to the customer. If the services provided by the company will be full fill the customer needs, then it is good. And if the company is not able to complete then it leads to failure of the company.
The cost of the services depends upon the use of the services, if there are some unwanted cost attached in the services then the user will not have attracted to the company and if the company provide the good services at minimum cost then it will lead to adding more customer to the company.
How could cloud computing be utilized to reduce the acquisition costs for the hardware, software and networking infrastructure to the business?
There are a lot of option to reduce the cost of the system. by reducing the cost of the hardware and software will be one of the options. But in this case, the company have to decide that only required hardware and software system is used in the company. One other option is that the company will select the cheaper hardware and software. But this will lead to the system failure. so, in this case, the company can use the less the system but all the system is to be capable to take the load upon them. In some case, the company can select the system which is in very high configuration and that is not required by the company in that case the company can comprise the quality of the system and select the low-level systems.
What would be the benefits and challenges of these emerging cloud services to the Dr. Dan Tooine’s business?
Some of the advantages and disadvantages of the cloud computing are listed and describes below:
Figure 12: Cloud computing environment
1.Provides the good security to the customer.
2.It will increase the performance of the system.
3.With the use of the cloud computing, it will provide the services anytime anywhere.
4.This will be available at lower cost.
5.There are various services provides the cloud computing, with the help of this the system will working properly.
1.It has very low features.
2.It required a high-speed internet connection.
Report Section 4
What Australian laws should Dr. Dan Tooine be aware of regarding privacy? How do these laws affect how the business collects and uses information collected from its customers?
Figure 13: Australian Laws
There are a lot of laws made by the government and that has to be followed by all the companies and the members of the company. There is a various limitation of an organization, like the company cannot use the customer data for the personal use. In this case, the company uses the data management system so there will be a lot of user data will be stored in the system of the company. There are different laws that made by the Australian government. Some of the laws are described below:
Privacy amendment act 2000:
In this law, all the principles of the national privacy will be added in this law. This law contains the rule that none of the company will disclose any information of the customer to the other person or organization. In the information details like address, phone number, bank details etc. In case any company will fail to follow this rule then there will be legal case filed against that company and legal action taken against that company.
Senate Committee Inquiry into e-privacy act 2000:
This act is related to the technology that is used by the companies to store the database of the customer. In the company there are a lot of users will give details to the company to take the services from the company, so it is company responsibility to secure all the data of the customer.
Territory and state privacy act:
In a country, there are some laws that have made by the state government. All the states have some different rules, so if the company have more than one branch have located in different states then the company have to follow rules as per states government rules.
How should the business communicate its commitment to the privacy of customers? Provide two (2) examples of how similar businesses achieve this communication of commitment to customer privacy.
Alike companies can talk to their commitments for the privacy of the user database and the information of the user. This can be done with the use of the authentication of the security into the database system. One of the simple examples is that if two different companies have different user data, then, in that case, the data of the customer will not same in any case, there will be always some changes in the data.
Personal privacy and security of data:
Protected the customer data from the external thread and hacker the company has to follow the security rules and provides the private security to the database system. in the case when the user gets any threat from the hacker in that situation company will provide the assurance to the customer that all the details of that person are secured in their database system.
With the use of all the laws, the company has to communicate with their team and protect the data that have to be present in the database of an organization. All the organization that has the data of the customer will follow all the rules of the government.
As the business’s potential client base is international, what other global information privacy issues should Dr. Dan Tooine be aware of?
When we consider the company as the global customer then, the company have to follow all the rules and regulation that have given by the government. Global customer covers all the customer throughout the world. So there are a lot of data occur in the database system. In that situation, Dr. Dan Tooine has to follow all the rules at any cost as the rules come first for any company. All the security tools are to be added to the system of an organization. With the use of the security tools, there will be the protection of the data that was stored in the database system of an organization.
Conclusion and Recommendations
In this report provides the information about the implementation of the database system as per requirement of the Dr. Dan Toonie. All the software and hardware components are added in the report and details of the hardware and software are also explained in this report. All the components are important for the E-business system. Some of the network components are also explained, they are used for the connection of the internet services to the system.
The cloud-basedsystem is implemented in the company. For the use of the cloud-based system some of the network-based system like server and router also present in this report. Other than this explains about the different laws that should be followed by an organization, for the security purpose of the customer details. some of the advantages and disadvantages of the cloud-based system is also explained in this report.
There are some of the recommendations for this system. in this section of the report provide the some of the recommendations for the E-business, with the use of this the company will improve their business. With the use of the cloud-based system, the company has to follow all the rules and regulation made by the government. All the maintainer work is done for the low peak duration. There will be always checked for the server of the cloud, so the unwanted threats will not come from the database of the customer. There will be 24 x 7 services are present for the customer for any query. Always maintain the workflow of the company in the proper manner so that, all the data of the customer and all the quires of the customer will recover on minimum time.
SlideNote:This project is about the implementation of database management system for the company. This system is going to be implemented to replace the current manual work that is being done by the employees of the company. Database management system provides data consistency. Users can store, retrieve and manage a large amount of information that is being accessed by the company on a regular basis.
SlideNote:This project will be going to implement reliable and effective software applications that can be used by the staff members. Most probably, company will be able to adopt technology like internet of things (IoT). Currently, company is facing issues in managing the regular business operations that can be managed by implementing database management system. It will be easier to import information from the database.
SlideNote:The issues of the company have to be stated clearly before initializing decision-making process. Questions about how, what, when, where, who and why has to be included while collecting information for the process of decision making. Another important part of decision-making process is found detailed information about the business-related issues that can be done by generating an effective solution. The proposed solution must be tested according to the specified requirements of consumers. Out the proposed solution for e-business, managers have to select the solution that could meet the consumer requirements. Managers have to ensure that their selected processes will be beneficial for the implementation of e-business. If not, then the decision-making process has to be repeated again.
SlideNote:Due to the globalization, it is essential for the managers to analyze the source of information and its flow that could impact business processes. Managers have to think about a solution to make an effective decision. Secondly, time management is the most important task. This is one of the main challenges that managers face with the ever-increasing demand of consumers. Manual records cannot be managed that is time-consuming. Therefore, it is important for the managers to make quick decisions. This can be done by analyzing the current market trend and using specific marketing strategy.
Slide Note:E-businessor known as electronic business is the most convenient way to trade products using online as a medium. E-businesses allow manufacturers and related stakeholders to sell products. Online presence provides association with more number of customers. This can be done by using social networking sites. Consumers can choose various products from the categories available. The economic value can be increased as more number of consumers will be attracted to the e-store.
Slide Note:E-business or known as electronic business is the most convenient way to trade products using online as a medium. E-businesses allow manufacturers and related stakeholders to sell products. Online presence provides association with more number of customers. This can be done by using social networking sites. Consumers can choose various products from the categories available. The economic value can be increased as more number of consumers will be attracted to the e-store.
Slide Note:Formula for calculating key performance indicators by dividing firm sales to the total market sales.
Slide Note:Business processes varies from the operations that are performed in an organization.
Slide Note:Accounting and Finance- these processes include maintaining records of consumers. The amount that has been paid by the consumers and the collection, all is recorded by the accounts department.
Marketing and sales- this is generally related to the activities that are done for promoting the products that are being sold out to companies
Operations Management- inventory management and sales/ordering system processes are involved
Human Resources- this process is the part of hiring personnel for business. The record of employees is also tracked.
Slide Note:Business improvement plan is implemented by the organizations to have business growth. This model provides a brief overview of the business activities and their impact on the business success.
Slide Note:Consumers need a large amount of information before buying and selling of products. Availability of services using internet as a medium provides an opportunity for consumers to analyse product quality. Consumers can also make an effective communication with the service provider using online services. Customization of products is beneficial for the consumers to examine the detailed specifications. This also helps in company to know more about consumer demands. The overall cost of maintaining online site is less as compared with the maintenance of manual records. Manual records create complexity in the information of consumers and the related business activities. Business operations are improved by frequently modifying the content of the website. Specific content and communication options such as email help consumers in purchasing better quality products at affordable prices. Effectiveness of current business can be achieved by interacting with more number of consumers using online media and print media. E-business provides an opportunity for the organizations to improve business to consumer processes.
Slide Note:Business to business: this type of model refers to the business that is being done between two different enterprises on an online service. Mostly, the business to business processes is done within non-profit organizations.
Business to consumer: the organizations who provide services to the end-consumers. For example, e-bay that provides services to the consumers worldwide.
Consumer to business: Amazon offers this opportunity to its consumers who want to sell their products online
Consumer to consumer: two individuals can interact or communicate with each other to promote their services using internet as a medium.
Slide Note:Consumers can exchange information using email services. The digital messages can be transferred easily only if the internet connectivity is present at both ends. Instant messaging (IMing) services enable customers to interact with the service provider for resolving their queries. Podcasting is a way by which service providers can market their products to reach out to a number of customers. Video conferencing is more fast and reliable service that can be utilized by service provider to interact with external stakeholders like suppliers or consumers.
Slide Note:Challenges to most of the business organizations is the service limitations they have for their consumers. These do not allow consumers to interact with the service provider, thus, lowers the scope of business success. Consumer trust can be acquired by providing an assurance that their important data will be not accessed by the third party users. Consumer protection in terms of providing the complete information regarding the services offered to them. Business organizations must ensure that consumer’s data is secured from any unauthorized access. It is important for the business organizations to adhere to the taxation rules in order to manage sales work.
Slide Note:Feedback from consumers is one of the most important aspects for a business organization. Any negative feedback from consumer directly affects the organizational value. It decreases the productivity and sales. Using copyright as a medium for security can be helpful for the organization to secure their data from intruders. Intellectual property rules can be used to provide security to the IT assets of the company. The company owners are assured by implementing an intellectual property that the consumers will be secured from any unauthorized access.
SlideNote:In using e-business for adopting global reach out to consumers, various security issues are faced by the company. Malware attacks are most commonly used by the hackers to gain network access. These attacks can be performed by the attackers by sending spam messages or any attachment on an email. Personal details of consumers can be accessed by the attackers using phishing technique.
Slide Note:Information security is referred to providing security against threats to a network. Business organizations are concerned in taking security measures to protect the information. The areas that are affected by the hackers are people and data. Hackers find it easier to access the information of network users by using hacking tricks. To prevent this, companies implement authentication and authorization technique. In this technique, network is secured by a strong password.
Slide Note:Firewalls protect the information of an organization by filtering the data from any intrusion. Firewalls can easily detect any kind of malicious activity that occurs in a network. The connection of firewall is established in between server and an internet. The information is first transmitted to the firewall before reaching to the network users. Passwords and other security codes are used for the implementation of firewall connection in a network. For a backup, company must use antiviruses also.
SlideNote:To protect the IT infrastructure, disaster recovery plan is implemented by the network managers. This disrupts the e-business services provided to the consumers. To secure the network connection, different sites are used as shown in the figure. Hot sites are used to provide business continuity options after the disaster. Cold sites are implemented for the remote users of a network. Lastly, warm sites are used to provide facilities for users that require installation and configuration for a network.
Slide Note:Business continuity helps the organizations to prepare some remedial actions in case of an emergent disaster. Under normal conditions, e-business is fast and easy to access. The business continuity plan is required by the business organizations in case of sudden failure. Disaster recovery plan is required to create a backup for the information accessed over a network.
Slide Note:Accessibility- this can be achieved by providing better usability options for the users.
Availability-it refers to providing benefits to the consumers in terms of operating network
Maintainability- it describes how well the information system can be maintained and secured within limited time frame
Portability- the information system has to be responsive so that consumers can access the services even on their smartphones or other mobile devices
Reliability-it is used to represent that the performance of an information system is effective and accurate to be accessed by the users
Scalability- the information system has to flexible enough to adopt ever-increasing demands of consumers
Usability- it has already been discussed that the interface design has to be effective. Applications programs have to be installed and maintained according to the requirements of user.
Slide Note:Components of MIS infrastructure allows fast access to the network services for the users. In terms of security and ease of access to the information, these components are effective to use.
Slide Note:Hardware networking services are provided by the infrastructure as a service model of cloud services. This is cost effective and provides a wide range of network security solutions. Software as a service model can be to customize application programs that are accessed by the users. Platform as a service model is responsible for providing security to the information for an e-business.
SlideNote:It has been found out from this detailed presentation that e-business can be the best suitable option to promote the services for consumers worldwide. Although there are some security issues in the network, e-businesses are fast and reliable to use.
SlideNote:Theabove points can be useful for the organization to use e-business solutions for their business.
1.Bara?, D., Ratkovi?-Živanovi?, V., Despotovi?-Zraki?, M., Labus, A. and Bogdanovi?, Z., 2017. E-business technologies for xRM: Exploring the readiness of public broadcasters. Telematics and informatics, 34(1), pp.20-29.
2.Cloud, 2016, Cloud, Networking & Data Analytics. Cloud, Computer Networking & Data Analytics., viewed 22 January 2018, <http://cloudcomputingnet.com/cloud-computing-architecture/>
3.García-Valls, M., Cucinotta, T. and Lu, C., 2014. Challenges in real-time virtualization and predictable cloud computing. Journal of Systems Architecture, 60(9), pp.726-740.
4.Gerow, J.E., Thatcher, J.B. and Grover, V., 2015. Six Types of IT-Business Strategic Alignment: An investigation of the constructs and their measurement. European Journal of Information Systems, 24(5), pp.465-491.
5.González-Martínez, J.A., Bote-Lorenzo, M.L., Gómez-Sánchez, E. and Cano-Parra, R., 2015. Cloud computing and education: A state-of-the-art survey. Computers & Education, 80, pp.132-151.
6.Jula, A., Sundararajan, E. and Othman, Z., 2014. Cloud computing service composition: A systematic literature review. Expert Systems with Applications, 41(8), pp.3809-3824.
7.Mezgár, I. and Rauschecker, U., 2014. The challenge of networked enterprises for cloud computing interoperability. Computers in Industry, 65(4), pp.657-674.
8.Picoto, W.N., Bélanger, F. and Palma-dos-Reis, A., 2014. An organizational perspective on m-business: usage factors and value determination. European Journal of Information Systems, 23(5), pp.571-592.
9.Rezaei, R., Chiew, T.K. and Lee, S.P., 2014. A review on E-business Interoperability Frameworks. Journal of Systems and Software, 93, pp.199-216.
10.Sadiku, M.N., Musa, S.M. and Momoh, O.D., 2014. Cloud computing: opportunities and challenges. IEEE potentials, 33(1), pp.34-36.
11.Soto-Acosta, P., Popa, S. and Palacios-Marqués, D., 2016. E-business, organizational innovation and firm performance in manufacturing SMEs: an empirical study in Spain. Technological and Economic Development of Economy, 22(6), pp.885-904.
12.Trainor, K.J., Andzulis, J.M., Rapp, A. and Agnihotri, R., 2014. Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM. Journal of Business Research, 67(6), pp.1201-1208.
13.Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
14.Zheng, K., Meng, H., Chatzimisios, P., Lei, L. and Shen, X., 2015. An SMDP-based resource allocation in vehicular cloud computing systems. IEEE Transactions on Industrial Electronics, 62(12), pp.7920-7928.