7 Reasons Why You Should Learn How to Use Excel. (n.d.). https://www.activia.co.uk/blog/seven-reasons-why-you-should-learn-how-to-use-excel
2015 Cost of Cyber Crime Study: United Kingdom. (n.d.). https://web.archive.org/web/20160207182639/http://cybersecuritysummit.co.uk/wp-content/uploads/2015/06/2015-UK-CCC-FINAL-3.pdf
2017 Cost of Cyber Crime Study | Accenture - Accenture-2017-CostCyberCrimeStudy.pdf. (n.d.). https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
Appan, R., & Browne, G. J. (2012). The Impact of Analyst-Induced Misinformation on the Requirements Elicitation Process. MIS Quarterly, 36(1), 85–106. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=71143099&site=ehost-live
Aral, S. (2007). Productivity Effects of Information Diffusion in Networks. MIT Center for Digital Business. http://ebusiness.mit.edu/research/papers/2007.07_Aral_Brynjolfsson_Van%20Alstyne_Productivity%20Effects%20of%20Information_234.pdf
Aron, R. (2005). Just Right Outsourcing: Understanding and Managing Risk. Journal of Management Information Systems, 22(2), 37–55. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=18908193&site=ehost-live
Association for Project Management | The Professional Body for Project Management. (n.d.). https://www.apm.org.uk/
Avison, D. E., & Shah, H. U. (1997). The Information Systems Development Life Cycle: A First Course in Information Systems: Vol. Information systems series. McGraw-Hill.
Avison, D., & Fitzgerald, G. (2006a). Information Systems Development: Methodologies, Techniques and Tools (4th Edition). McGraw-Hill Education.
Avison, D., & Fitzgerald, G. (2006b). Information Systems Development: Methodologies, Techniques and Tools (4th Edition). McGraw-Hill Education.
Banker, R. D. (2011). Cio Reporting Structure, Strategic Positioning, and Firm Performance. MIS Quarterly, 35(2), 487–504. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60461880&site=ehost-live
Barton, D., & Court, D. (2012). Making Advanced Analytics Work For You. Harvard Business Review, 90(10), 78–83. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996092&site=ehost-live
Bo, X., & Benbasat, I. (2007). E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact. MIS Quarterly, 31(1), 137–209. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=23963841&site=ehost-live
Bocij, P. (2008a). An Introduction To Acquiring and Developing BIS. In Business Information Systems: Technology, Development and Management (4th Edition, pp. 279–318). Financial Times Prentice Hall.
Bocij, P. (2008b). Systems Analysis. In Business Information Systems: Technology, Development and Management (4th Edition, pp. 373–416). Financial Times Prentice Hall.
Boehm, B. W. (1988). A Spiral Model of Software Development and Enhancement. Computer, 21(5), 61–72. https://doi.org/10.1109/2.59
Browne, G. J., & Rogich, M. B. (2001). An Empirical Investigation of User Requirements Elicitation: Comparing the Effectiveness of Prompting Techniques. Journal of Management Information Systems, 17(4), 223–249. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4326066&site=ehost-live
Brynjolfsson, E. (2005). VII Pillars Of Productivity [open access]. Optimize, 22. http://www.georgeschussel.com/wp-content/uploads/articles/NY6420050502_erik.pdf
Brynjolfsson, E. (2011). Strength in Numbers: How Does Data-Driven Decisionmaking Affect Firm Performance? SSRN Electronic Journal. https://doi.org/10.2139/ssrn.1819486
Bughin, J., Byers, A. H., & Chui, M. (2011). How Social Technologies Are Extending the Organization. Survey, November. https://web.archive.org/web/20170317102159/http://www.mckinsey.com/industries/high-tech/our-insights/how-social-technologies-are-extending-the-organization
Carr, N. G. (2003). IT Doesn’t Matter. Harvard Business Review, 81(5), 41–49. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9720881&site=ehost-live
Chaffey, D. (2014). Digital Business and E-Commerce Management: Strategy, Implementation and Practice (6th Edition). https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5174231
Chaffey, D. (2015). Digital Business and E-Commerce Management: Strategy, Implementation and Practice (6th Edition). Pearson.
Chatterjee, S. (2015). The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems, 31(4), 49–87. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=102702506&site=ehost-live
Chen, I. J., & Popovich, K. (2003). Understanding Customer Relationship Management (CRM). Business Process Management Journal, 9(5), 672–688. https://doi.org/10.1108/14637150310496758
Christensen, C. M., Raynor, M. E., & McDonald, R. (2015). What Is Disruptive Innovation? Harvard Business Review, December. https://hbr.org/2015/12/what-is-disruptive-innovation
Chui, M. (2010). The Internet of Things. McKinsey Quarterly, 2, 70–79. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=49469625&site=ehost-live
Cloud Computing News - IaaS, SaaS, PaaS, Data Security, CIO, Analysis - Cloud Tech News. (n.d.). http://www.cloudcomputing-news.net/
Computer Glossary, Computer Terms - Technology Definitions and Cheat Sheets from WhatIs.com - The Tech Dictionary and IT Encyclopedia. (n.d.). http://whatis.techtarget.com/
Creasey, S. (2016). Data Analytics Paved Way for Leicester Win. Computer Weekly, 4–7. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=115641005&site=ehost-live
Cukier, K. N., & Mayer-Schoenberger, V. (2013). Why Big Data Is on the Rise | Foreign Affairs. https://www.foreignaffairs.com/articles/2013-04-03/rise-big-data
Date, C. J. (2004). An Introduction to Database Systems (8th Edition). Pearson/Addison Wesley.
Davenport, T. H. (1998). Putting the Enterprise into the Enterprise System. Harvard Business Review, 76(4), 121–131. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=780261&site=ehost-live
Davenport, T. H. (2011). Know What Your Customers Want Before They Do. Harvard Business Review, 89(12), 84–92. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=67484704&site=ehost-live
Davenport, T. H. (2013). Analytics 3.0. Harvard Business Review, 91(12), 64–72. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=92545710&site=ehost-live
Davenport, T. H., Barth, P., & Bean, R. (2012). How ‘Big Data’ Is Different. MIT Sloan Management Review, Fall. http://sloanreview.mit.edu/article/how-big-data-is-different/
Davenport, T. H., & Patil, D. J. (2012). Data Scientist: The Sexiest Job Of the 21st Century. Harvard Business Review, 90(10), 70–76. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996214&site=ehost-live
Deiser, R., & Newton, S. (2013). Six Social-Media Skills Every Leader Needs. McKinsey Quarterly, 1, 62–75. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85277123&site=ehost-live
Dhillon, G. (2007). Principles of Information Systems Security: Text and Cases. Wiley.
DIGITAL SKILLS for the UK ECONOMY: A Report by ECORYS UK. (n.d.). Department for Business & Skills, Department for Culture Media & Sport. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/492889/DCMSDigitalSkillsReportJan2016.pdf
DSDM Consortium. (n.d.). https://web.archive.org/web/20160304231401/https://www.dsdm.org/
Dudovskiy, J. (2021, February 23). Apple Value Chain Analysis | Business Research Methodology. https://research-methodology.net/apple-value-chain-analysis/
Easterby-Smith, M., & Lyles, M. A. (2011a). Handbook of Organizational Learning and Knowledge Management (2nd Edition). John Wiley.
Easterby-Smith, M., & Lyles, M. A. (2011b). Handbook of Organizational Learning and Knowledge Management (2nd Edition). John Wiley. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=693559
Eckerson, W. (n.d.). Big Data Analytics: Profiling the Use of Analytical Platforms in User Organizations. http://tdwi.org/%7E/media/8E51AC2BE2664D83BF1F503BED557105.pdf
Elmasri, R., & Navathe, S. (2014). Fundamentals of Database Systems (6th Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5248269
Ferguson, E. (2019, February 22). Apple Inc. Five Forces Analysis (Porter’s Model) | Panmore Institute. http://panmore.com/apple-inc-five-forces-analysis-porters-model-case-study
Firican, G. (2017, February 8). The 10 Vs of Big Data | TWDI - Upside. https://tdwi.org/articles/2017/02/08/10-vs-of-big-data.aspx
Fisher, L. (2013, October 24). Data Management Platforms - Using Big Data to Power Marketing Performance - eMarketer. https://web.archive.org/web/20150509153317/http://www.emarketer.com/Webinar/Data-Management-PlatformsUsing-Big-Data-Power-Marketing-Performance/4000073
FOLDOC - Computing Dictionary. (n.d.). http://foldoc.org/
Gold, A. H., Gray, G. L., Jones, C. G., & Miller, D. W. (2010). Strategies for Improving Systems Development Project Success [open access]. Issues in Information Systems, XI(1), 164–173. http://dare.ubvu.vu.nl/handle/1871/49064
Gorry, G. A., & Morton, M. S. S. (1989). A Framework for Management Information Systems. Sloan Management Review, 30(3), 49–62. http://search.proquest.com.ezproxy01.rhul.ac.uk/docview/1302988972?accountid=11455
Guillemette, M. G., & Paré, G. (2012). Toward a New Theory of the Contribution of the It Function in Organizations. MIS Quarterly, 36(2), 529–551. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=74717006&site=ehost-live
Hackbarth, G., & Kettinger, W. J. (2000). Building an E-Business Strategy. Information Systems Management, 17(3), 78–94. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3185578&site=ehost-live
Harkins, S. (2008, August 15). 10+ Reasons to Use Access (And a Few Reasons Not To) | TechRepublic. https://www.techrepublic.com/blog/10-things/10-plus-reasons-to-use-access-and-a-few-reasons-not-to/
Hau, Y. S. (2013). The Effects of Individual Motivations and Social Capital on Employees’ Tacit and Explicit Knowledge Sharing Intentions. International Journal of Information Management, 33(2), 356–366. https://doi.org/10.1016/j.ijinfomgt.2012.10.009
Hendel, J., & Doherty, T. (2018, July 2). GRAPHIC: America’s Digital Divide, in 2 Maps | Politico. https://www.politico.com/agenda/story/2018/02/07/digital-divide-in-america-graphic-000639
Hitt, L. M., Wu, D. J., & Zhou, X. (2002). Investment in Enterprise Resource Planning: Business Impact and Productivity Measures. Journal of Management Information Systems, 19(1), 71–98. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6976829&site=ehost-live
Hoffer, J. A., Ramesh, V., & Topi, H. (2016a). Modern Database Management (12th Edition). Pearson.
Hoffer, J. A., Ramesh, V., & Topi, H. (2016b). Modern Database Management (12th Global Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5185641
Information Management | IT Business News. (n.d.). https://web.archive.org/web/20210602202347/https://www.information-management.com/
Inmon, W. H. (2005). Building the Data Warehouse (4th Edition). Wiley. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=239420
Insights & Publications | McKinsey & Company. (n.d.). http://www.mckinsey.com/insights
Iriana, I., & Buttle, F. (2008). Strategic, Operational, and Analytical Customer Relationship Management. Journal of Relationship Marketing, 5(4), 23–42. https://librarysearch.royalholloway.ac.uk/permalink/f/1cm8pdv/TN_cdi_scopus_primary_46629238
Jashapara, A. (2004). Knowledge Management: An Integrated Approach. Pearson Education Limited. https://ezproxy01.rhul.ac.uk/login?url=http://www.vlebooks.com/vleweb/product/openreader?id=Holloway&isbn=9781408212561&uid=^u
Jashapara, A. (2011). Knowledge Management: An Integrated Approach (2nd Edition). Financial Times Prentice Hall.
Kanaracus, C. (2012, July 12). Survey Finds ERP Software Project Overruns ‘Distressingly Common’ | Computerworld. http://www.itworld.com/article/2723501/enterprise-software/survey-finds-erp-software-project-overruns--distressingly-common-.html
Kern, J. (2013, March 7). How to Determine Cloud TCO | Information Management Online. https://web.archive.org/web/20210126185934/https://www.information-management.com/news/how-to-determine-cloud-tco
Killen, C. P., & Hunt, R. A. (2013). Robust Project Portfolio Management: Capability Evolution and Maturity. International Journal of Managing Projects in Business, 6(1), 131–151. https://doi.org/10.1108/17538371311291062
Klein, R., & Rai, A. (2009). Interfirm Strategic Information Flows in Logistics Supply Chain Relationships. MIS Quarterly, 33(4), 735–762. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=44988648&site=ehost-live
Kling, R. (2000). Learning About Information Technologies and Social Change: The Contribution of Social Informatics. Information Society, 16(3), 217–232. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3533085&site=ehost-live
Knowledge Workers - Who They Are and What They Do | CFI. (2022, December 6). https://corporatefinanceinstitute.com/resources/knowledge/other/knowledge-workers/
Kroenke, D. M., & Auer, D. J. (2016). Database Processing: Fundamentals, Design, and Implementation (14th Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5185586
Kumar, K., & Van Hillegersberg, J. (2000). ERP Experiences and Evolution. Communications of the ACM, 43(4), 22–26. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=12070056&site=ehost-live
Laudon, K. C., & Laudon, J. P. (n.d.). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2014a). Essentials of Management Information Systems. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013
Laudon, K. C., & Laudon, J. P. (2014b). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2014c). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2014d). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2014e). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2014f). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2014g). Essentials of Management Information Systems. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246
Laudon, K. C., & Laudon, J. P. (2015a). Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015b). Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015c). Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015d). Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015e). Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015f). Opening Case: Rugby Football Union Tries Big Data. In Essentials of Management Information Systems (11th Global Edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015g). Opening Case: Rugby Football Union Tries Big Data. In Essentials of Management Information Systems (11th Global Edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015h). Opening Case: Rugby Football Union Tries Big Data. In Essentials of Management Information Systems (11th Global Edition). Pearson Education Ltd.
Laudon, K. C., & Laudon, J. P. (2015i). Opening Case: Rugby Football Union Tries Big Data. In Essentials of Management Information Systems (11th Global Edition). Pearson Education Ltd.
Laudon, K., & Laudon, J. (2015a). Building Information Systems and Managing Projects. In Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K., & Laudon, J. (2015b). Building Information Systems and Managing Projects. In Essentials of Management Information Systems. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5138246
Laudon, K., & Laudon, J. (2015c). Building Information Systems and Managing Projects. In Essentials of Management Information Systems. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684
Laudon, K., & Laudon, J. (2015d). Ethical and Social Issues in Information Systems. In Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K., & Laudon, J. (2015e). Ethical and Social Issues in Information Systems. In Essentials of Management Information Systems. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684
Laudon, K., & Laudon, J. (2015f). Foundations of Business Intelligence: Databases and Information Management. In Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K., & Laudon, J. (2015g). Foundations of Business Intelligence: Databases and Information Management. In Essentials of Management Information Systems. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5138246
Laudon, K., & Laudon, J. (2015h). Improving Decision Making and Managing Knowledge. In Essentials of Management Information Systems. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684
Laudon, K., & Laudon, J. (2015i). Securing Information Systems. In Essentials of Management Information Systems (11th ed./Global edition). Pearson Education Ltd.
Laudon, K., & Laudon, J. (2015j). Securing Information Systems. In Essentials of Management Information Systems. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684
Lee, D.-J. (2011). Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection. MIS Quarterly, 35(2), 423-A8. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60461925&site=ehost-live
Lindstrom, L., & Jeffries, R. (2004). Extreme Programming and Agile Software Development Methodologies. Information Systems Management, 21(3), 41–52. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=13352756&site=ehost-live
Luzak, J. (2014). Privacy Notice for Dummies? Towards European Guidelines on How to Give ‘Clear and Comprehensive Information’ on the Cookies’ Use in Order to Protect the Internet Users’ Right to Online Privacy. Journal of Consumer Policy, 37(4), 547–559. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=99108901&site=ehost-live
Majchrazk, A. (2013). The Impact of Shaping on Knowledge Reuse for Organizational Improvement With Wikis. MIS Quarterly, 37(2), 455-A12. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87370679&site=ehost-live
Maklan, S. (2011). Why CRM Fails -- and How to Fix It. MIT Sloan Management Review, 52(4), 77–85. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=63008085&site=ehost-live
Marchand, D. A., & Peppard, J. (2013). Why IT Fumbles Analytics. Harvard Business Review, 91(1), 104–112. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=84424084&site=ehost-live
McAfee, A. (2004). Do You Have Too Much IT? MIT Sloan Management Review, 45(3), 18–22. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=12856174&site=ehost-live
McAfee, A. (2011). What Every CEO Needs to Know About The Cloud. Harvard Business Review, 89(11), 124–132. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=67003261&site=ehost-live
McAfee, A., & Brynjolfsson, E. (2012). Big Data: The Management Revolution. Harvard Business Review, 90(10), 60–68. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996279&site=ehost-live
McFarlan, F. W. (1984). Information Technology Changes the Way You Compete. Harvard Business Review, 62(3), 98–103. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4120899&site=ehost-live
Miller, T. (2023, February 26). Top 10 Reasons for ERP Failure (And How to Avoid It) | ERP Focus. https://www.erpfocus.com/erp-failure-10-reasons-why-your-erp-project-could-crash-article-540.html
Olson, D. L. (n.d.). Supply Chain Information Technology: Vol. Supply and Operations Management Collection. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1778603
Olson, D. L. (2014). Supply Chain Information Technology: Vol. The Supply and Operations Management Collection (2nd Edition). Business Expert Press.
Oz, E. (1992). Ethical Standards for Information Systems Professionals: A Case for a Unified Code. MIS Quarterly, 16(4), 423–433. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9604010642&site=ehost-live
PMI | Project Management Institute. (n.d.). http://www.pmi.org/
Porter, M. E. (1979). How Competitive Forces Shape Strategy. Harvard Business Review, 57(2), 137–145. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3867673&site=ehost-live
Porter, M. E. (1980). Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press.
Porter, M. E. (2001). Strategy and the Internet. Harvard Business Review, 79(3), 62–78. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4147416&site=ehost-live
Porter, M. E., & Millar, V. E. (1985). How Information Gives You Competitive Advantage. Harvard Business Review, 63(4), 149–160. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=8500002422&site=ehost-live
Radadia, J. (2010). Breaking the Bad Data Bottlenecks. Information Management Magazine. http://www.information-management.com/issues/20_3/breaking_the_bad_data_bottlenecks-10017895-1.html
Rai, A., Patnayakuni, R., & Seth, N. (2006). Firm Performance Impacts of Digitally Enabled Supply Chain Integration Capabilities. MIS Quarterly, 30(2), 225–246. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=21145595&site=ehost-live
Roth, E. (2022, May 9). 10 Simple Design Rules to Make Word Documents Look Professional and Beautiful | Make Use Of. https://www.makeuseof.com/tag/design-rules-word-documents/
Sahay, B. S., & Gupta, A. K. (2003). Development of Software Selection Criteria for Supply Chain Solutions. Industrial Management & Data Systems, 103(2), 97–110. https://doi.org/10.1108/02635570310463429
SAP Digital Business Services: How do you become an intelligent enterprise? | YouTube. (n.d.). https://www.youtube.com/watch?v=okM4ym_Tmfc
Seddon, P. B. (2010). A Multi-Project Model of Key Factors Affecting Organizational Benefits From Enterprise Systems. MIS Quarterly, 34(2), 305-A11. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=50036083&site=ehost-live
Semantic Web | W3C. (n.d.). https://www.w3.org/standards/semanticweb/
Shacklett, M. E. (2016, April 4). 10 IT Basics That Business Managers Need to Know | TechRepublic. https://www.techrepublic.com/blog/10-things/10-it-basics-that-business-managers-need-to-know/
Shaw, T. (2011, April 6). Web 3.0 Gives Business Smarter Infrastructure | Baseline. http://www.baselinemag.com/c/a/Intelligence/Web-30-Gives-Business-Smarter-Infrastructure-576336
Shein, E. (2015). Companies Proactively Seek Out Internal Threats. Communications of the ACM, 58(11), 15–17. https://doi.org/10.1145/2820423
Shi, Y. (1996). A Consensus Ranking for Information System Requirements. Information Management & Computer Security, 4(1), 10–18. https://doi.org/10.1108/09685229610114169
Silberschatz, A., Korth, H. F., & Sudarshan, S. (2011). Database System Concepts (6th Edition). McGraw-Hill.
Sircar, S. (2001). Revolution or Evolution? a Comparison of Object-Oriented and Structured Systems Development Methods. MIS Quarterly, 25(4), 457–471. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6406420&site=ehost-live
Smith, J. (2002). Managing Your IT Total Cost of Ownership. Communications of the ACM, 45(1), 101–106. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11934594&site=ehost-live
Smith, M. S. (2015). Protecting Privacy in an IoT-Connected World. Information Management Journal, 49(6), 36–39. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=110923673&site=ehost-live
Soliman, K. (2003). ASPs: Do They Work? Information Systems Management, 20(4), 50–57. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11015720&site=ehost-live
Solitander, M., & Solitander, N. (2010). The Sharing, Protection and Thievery of Intellectual Assets. Management Decision, 48(1), 37–57. https://doi.org/10.1108/00251741011014445
Stahl, B. C. (2011). Teaching Ethical Reflexivity in Information Systems: How to Equip Students to Deal With Moral and Ethical Issues of Emerging Information and Communication Technologies. Journal of Information Systems Education, 22(3), 253–260. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=69713592&site=ehost-live
State of Cybersecurity: Implications for 2015. (n.d.). http://www.isaca.org/cyber/Documents/State-of-Cybersecurity_Res_Eng_0415.pdf
Subramanian, G. H. (2009). Balancing Four Factors in System Development Projects. Communications of the ACM, 52(10), 118–121. https://doi.org/10.1145/1562764.1562794
Susarla, A. (2003). Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction With Asp Services. MIS Quarterly, 27(1), 91–123. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9284305&site=ehost-live
The Digital Divide | Politico. (n.d.). https://www.politico.com/agenda/issue/the-digital-divide
The Digital Enterprise | McKinsey. (2013, November 1). https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/the-digital-enterprise
The Nature of Tech: Digital Business Automation | YouTube. (n.d.). https://www.youtube.com/watch?v=_UtVvdetCVQ
The US Open is powered by the IBM Cloud | YouTube. (n.d.). https://www.youtube.com/watch?v=izTQwUpLXSU
Thrasher, J. (2013, August 22). What is RFID Used for in the Real World? | RFIDinsider. http://blog.atlasrfidstore.com/what-is-rfid-used-for-in-applications
Top 5 Reasons ERP Implementations Fail and What You Can Do About It. (2013). Ziff Davis. https://cdn2.hubspot.net/hub/52892/file-345156864-pdf/docs/Top_5_Reasons_ERP_Implementations_Fail.pdf
Understanding Distributed Denial of Service Attacks | YouTube. (n.d.). https://www.youtube.com/watch?v=NogCN78XN2w#action=share
Utterback, J. M., & Acee, H. J. (2005). Disruptive Technologies: An Expanded View. International Journal of Innovation Management, 9(1), 1–17. https://doi.org/10.1142/S1363919605001162
Wall, T. (2019). ‘I’m 57 and My Parents Have to Feed Me’: The Universal Credit Digital Obstacle Course. Guardian. https://www.theguardian.com/society/2019/mar/18/57-parents-feed-me-universal-credit-digital-obstacle-course
Wallace, P. M. (2015a). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015b). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015c). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015d). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015e). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015f). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015g). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015h). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015i). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015j). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015k). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015l). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015m). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015n). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015o). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015p). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015q). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015r). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015s). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015t). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015u). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015v). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015w). Introduction to Information Systems (2nd Edition). Pearson. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015x). Introduction to Information Systems (2nd Edition). Pearson.
Wallace, P. M. (2015y). Knowledge Management and E-Learning. In Introduction to Information Systems (Second edition). Pearson. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5176483
Wallace, P. M. (2015z). Project Management and Strategic Planning. In Introduction to Information Systems (Second edition). Pearson. https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5176483
Wang, Y. (2013). Social Influence and Knowledge Management Systems Use: Evidence From Panel Data. MIS Quarterly, 37(1), 299–313. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85634571&site=ehost-live
Wang, Y., Meister, D. B., & Gray, P. H. (2013). Social Influence and Knowledge Management Systems Use: Evidence From Panel Data. MIS Quarterly, 37(1), 299–313. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85634571&site=ehost-live
Watson, H. J. (2006). Real-Time Business Intelligence: Best Practices at Continental Airlines. Information Systems Management, 23(1), 7–18. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=19141701&site=ehost-live
Weinberg, N. (2021, March 25). Business Continuity and Disaster Recovery Planning: The Basics | CSO Online. http://www.csoonline.com/article/2118605/disaster-recovery/pandemic-preparedness-business-continuity-and-disaster-recovery-planning-the-basics.html
Woodcock, N. (2011). Social CRM as a Business Strategy. Journal of Database Marketing & Customer Strategy Management, 18(1), 50–64. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60097258&site=ehost-live
World Development Report 2016 - Main Message: Digital Dividends. (2016). http://pubdocs.worldbank.org/en/155841452690992989/WDR2016MainMessages-ENGLISH-WebRes.pdf
World Investment Report 2017 - Chapter IV: Investment and Digital Economy (pp. 156–220). (2017). https://unctad.org/en/PublicationChapters/wir2017ch4_en.pdf
Wulf, V., & Jarke, M. (2004). The Economics of End-User Development. Communications of the ACM, 47(9), 41–42. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=14376975&site=ehost-live