7 Reasons Why You Should Learn How to Use Excel (no date). Available at: https://www.activia.co.uk/blog/seven-reasons-why-you-should-learn-how-to-use-excel.
10 Simple Design Rules to Make Word Documents Look Professional and Beautiful (no date). Available at: https://www.makeuseof.com/tag/design-rules-word-documents/.
‘2015 Cost of Cyber Crime Study: United Kingdom’ (no date). Available at: https://web.archive.org/web/20160207182639/http://cybersecuritysummit.co.uk/wp-content/uploads/2015/06/2015-UK-CCC-FINAL-3.pdf.
‘2017 Cost of Cyber Crime Study | Accenture - Accenture-2017-CostCyberCrimeStudy.pdf’ (no date). Available at: https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf.
Appan, R. and Browne, G. J. (2012) ‘The Impact of Analyst-Induced Misinformation on the Requirements Elicitation Process’, MIS Quarterly, 36(1), pp. 85–106. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=71143099&site=ehost-live.
Apple Inc. Five Forces Analysis (Porter’s Model) - Panmore Institute (no date). Available at: http://panmore.com/apple-inc-five-forces-analysis-porters-model-case-study.
Apple Value Chain Analysis - Research-Methodology (no date). Available at: https://research-methodology.net/apple-value-chain-analysis/.
Aral, S. (2007) ‘Productivity Effects of Information Diffusion in Networks.’ MIT Center for Digital Business. Available at: http://ebusiness.mit.edu/research/papers/2007.07_Aral_Brynjolfsson_Van%20Alstyne_Productivity%20Effects%20of%20Information_234.pdf.
Aron, R. (2005) ‘Just Right Outsourcing: Understanding and Managing Risk’, Journal of Management Information Systems, 22(2), pp. 37–55. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=18908193&site=ehost-live.
Association for Project Management | the Professional Body for Project Management (no date). Available at: https://www.apm.org.uk/.
Avison, D. E. and Shah, H. U. (1997) The Information Systems Development Life Cycle: A First Course in Information Systems. London: McGraw-Hill.
Avison, D. and Fitzgerald, G. (2006a) Information Systems Development: Methodologies, Techniques and Tools. 4th Edition. London: McGraw-Hill Education.
Avison, D. and Fitzgerald, G. (2006b) Information Systems Development: Methodologies, Techniques and Tools. 4th Edition. London: McGraw-Hill Education.
Banker, R. D. (2011) ‘Cio Reporting Structure, Strategic Positioning, and Firm Performance’, MIS Quarterly, 35(2), pp. 487–504. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60461880&site=ehost-live.
Barton, D. and Court, D. (2012) ‘Making Advanced Analytics Work For You’, Harvard Business Review, 90(10), pp. 78–83. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996092&site=ehost-live.
Bocij, P. (2008a) ‘An Introduction To Acquiring and Developing BIS’, in Business Information Systems: Technology, Development and Management. 4th Edition. Harlow: Financial Times Prentice Hall, pp. 279–318.
Bocij, P. (2008b) ‘Systems Analysis’, in Business Information Systems: Technology, Development and Management. 4th Edition. Harlow: Financial Times Prentice Hall, pp. 373–416.
Boehm, B. W. (1988) ‘A Spiral Model of Software Development and Enhancement’, Computer, 21(5), pp. 61–72. doi: 10.1109/2.59.
Bo, X. and Benbasat, I. (2007) ‘E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact’, MIS Quarterly, 31(1), pp. 137–209. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=23963841&site=ehost-live.
Browne, G. J. and Rogich, M. B. (2001) ‘An Empirical Investigation of User Requirements Elicitation: Comparing the Effectiveness of Prompting Techniques’, Journal of Management Information Systems, 17(4), pp. 223–249. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4326066&site=ehost-live.
Brynjolfsson, E. (2005) ‘VII Pillars Of Productivity’, Optimize. Available at: http://www.georgeschussel.com/wp-content/uploads/articles/NY6420050502_erik.pdf.
Brynjolfsson, E. (2011) ‘Strength in Numbers: How Does Data-Driven Decisionmaking Affect Firm Performance?’, SSRN Electronic Journal. doi: 10.2139/ssrn.1819486.
Bughin, J. (2011) ‘How Social Technologies Are Extending the Organization.’ McKinsey & Company. Available at: http://www.mckinsey.com/insights/high_tech_telecoms_internet/how_social_technologies_are_extending_the_organization.
Business Continuity and Disaster Recovery Planning: The Basics | CSO Online (no date). Available at: http://www.csoonline.com/article/2118605/disaster-recovery/pandemic-preparedness-business-continuity-and-disaster-recovery-planning-the-basics.html.
Carr, N. G. (2003) ‘IT Doesn’t Matter’, Harvard Business Review, 81(5), pp. 41–49. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9720881&site=ehost-live.
Chaffey, D. (2015) Digital Business and E-Commerce Management: Strategy, Implementation and Practice. Sixth edition. Harlow, England: Pearson.
Chaffey, D. (no date) Digital Business and E-Commerce Management: Strategy, Implementation and Practice. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780273786573.
Chatterjee, S. (2015) ‘The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use’, Journal of Management Information Systems, 31(4), pp. 49–87. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=102702506&site=ehost-live.
Chen, I. J. and Popovich, K. (2003) ‘Understanding Customer Relationship Management (CRM)’, Business Process Management Journal, 9(5), pp. 672–688. doi: 10.1108/14637150310496758.
Christensen, C. M., Raynor, M. E. and McDonald, R. (2015) ‘What Is Disruptive Innovation?’, Harvard Business Review, (December). Available at: https://hbr.org/2015/12/what-is-disruptive-innovation.
Chui, M. (2010) ‘The Internet of Things’, McKinsey Quarterly, (2), pp. 70–79. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=49469625&site=ehost-live.
Cloud Computing News - IaaS, SaaS, PaaS, Data Security, CIO, Analysis - Cloud Tech News (no date). Available at: http://www.cloudcomputing-news.net/.
Computer Glossary, Computer Terms - Technology Definitions and Cheat Sheets from WhatIs.com - The Tech Dictionary and IT Encyclopedia (no date). Available at: http://whatis.techtarget.com/.
Creasey, S. (2016) ‘Data Analytics Paved Way for Leicester Win’, Computer Weekly, pp. 4–7. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=115641005&site=ehost-live.
Cukier, K. N. and Mayer-Schoenberger, V. (2013) Why Big Data Is on the Rise | Foreign Affairs. Available at: https://www.foreignaffairs.com/articles/2013-04-03/rise-big-data.
Date, C. J. (2004) An Introduction to Database Systems. 8th Edition. Boston: Pearson/Addison Wesley.
Davenport, T. H. (1998) ‘Putting the Enterprise into the Enterprise System.’, Harvard Business Review, 76(4), pp. 121–131. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=780261&site=ehost-live.
Davenport, T. H. (2011) ‘Know What Your Customers Want Before They Do’, Harvard Business Review, 89(12), pp. 84–92. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=67484704&site=ehost-live.
Davenport, T. H. (2012) ‘How “Big Data” Is Different’, MIT Sloan Management Review, (Fall 2012). Available at: http://sloanreview.mit.edu.ezproxy01.rhul.ac.uk/article/how-big-data-is-different/.
Davenport, T. H. (2013) ‘Analytics 3.0’, Harvard Business Review, 91(12), pp. 64–72. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=92545710&site=ehost-live.
Davenport, T. H. and Patil, D. J. (2012) ‘Data Scientist: The Sexiest Job Of the 21st Century’, Harvard Business Review, 90(10), pp. 70–76. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996214&site=ehost-live.
‘DCMSDigitalSkillsReportJan2016.pdf’ (no date). Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/492889/DCMSDigitalSkillsReportJan2016.pdf.
Deiser, R. and Newton, S. (2013) ‘Six Social-Media Skills Every Leader Needs’, McKinsey Quarterly, (1), pp. 62–75. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85277123&site=ehost-live.
Dhillon, G. (2007) Principles of Information Systems Security: Text and Cases. Hoboken, N.J.: Wiley.
DSDM Consortium (no date). Available at: https://www.dsdm.org/.
Easterby-Smith, M. and Lyles, M. A. (2011a) Handbook of Organizational Learning and Knowledge Management. 2nd ed. Chichester: John Wiley.
Easterby-Smith, M. and Lyles, M. A. (2011b) Handbook of Organizational Learning and Knowledge Management. Chichester: John Wiley. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781119977902.
Eckerson, W. (no date) ‘Big Data Analytics: Profiling the Use of Analytical Platforms in User Organizations.’ Available at: http://tdwi.org/%7E/media/8E51AC2BE2664D83BF1F503BED557105.pdf.
Elmasri, R. and Navathe, S. (2014) Fundamentals of Database Systems. Sixth edition, Pearson new international edition. Harlow, Essex: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292038032.
Fisher, L. (no date) Data Management Platforms - Using Big Data to Power Marketing Performance - eMarketer. Available at: http://www.emarketer.com/Webinar/Data-Management-PlatformsUsing-Big-Data-Power-Marketing-Performance/4000073.
FOLDOC - Computing Dictionary (no date). Available at: http://foldoc.org/.
Gold, A. H. (2010) ‘Strategies for Improving Systems Development Project Success’, Issues in Information Systems, XI(1). Available at: http://dare.ubvu.vu.nl/handle/1871/49064.
Gorry, G. A. and Morton, M. S. S. (1989) ‘A Framework for Management Information Systems’, Sloan Management Review, 30(3), pp. 49–62. Available at: http://search.proquest.com.ezproxy01.rhul.ac.uk/docview/1302988972?accountid=11455.
GRAPHIC: America’s digital divide, in 2 maps (no date). Available at: https://www.politico.com/agenda/story/2018/02/07/digital-divide-in-america-graphic-000639.
Guillemette, M. G. and Paré, G. (2012) ‘Toward a New Theory of the Contribution of the It Function in Organizations.’, MIS Quarterly, 36(2), pp. 529–551. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=74717006&site=ehost-live.
Hackbarth, G. and Kettinger, W. J. (2000) ‘Building an E-Business Strategy’, Information Systems Management, 17(3), pp. 78–94. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3185578&site=ehost-live.
Hau, Y. S. (2013) ‘The Effects of Individual Motivations and Social Capital on Employees’ Tacit and Explicit Knowledge Sharing Intentions’, International Journal of Information Management, 33(2), pp. 356–366. doi: 10.1016/j.ijinfomgt.2012.10.009.
Hoffer, J. A., Ramesh, V. and Topi, H. (2016a) Modern Database Management. Twelfth edition. Upper Saddle River: Pearson.
Hoffer, J. A., Ramesh, V. and Topi, H. (2016b) Modern Database Management. Twelfth, global edition. Boston, [Massachusetts]: Pearson. Available at: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5185641.
Information Management | IT Business News (no date). Available at: http://www.information-management.com/.
Inmon, W. H. (2005) Building the Data Warehouse. Indianapolis: Wiley. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780471774235.
Insights & Publications | McKinsey & Company (no date). Available at: http://www.mckinsey.com/insights.
Iriana, I. and Buttle, F. (2008) ‘Strategic, Operational, and Analytical Customer Relationship Management’, Journal of Relationship Marketing. Taylor & Francis Group, 5(4), pp. 23–42. Available at: http://www.tandfonline.com.ezproxy01.rhul.ac.uk/doi/abs/10.1300/J366v05n04_03.
Jashapara, A. (2004) Knowledge Management: An Integrated Approach. Harlow, England: Pearson Education Limited. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781408212561.
Jashapara, A. (2011) Knowledge Management: An Integrated Approach. 2nd ed. Harlow: Financial Times Prentice Hall.
Kanaracus, C. (2012) ‘Survey Finds ERP Software Project Overruns “Distressingly Common”’, ITWorld. Available at: http://www.itworld.com/article/2723501/enterprise-software/survey-finds-erp-software-project-overruns--distressingly-common-.html.
Kern, J. (2013) How to Determine Cloud TCO | Information Management Online. Available at: http://www.information-management.com/news/news/how-to-determine-cloud-tco-10024048-1.html.
Killen, C. P. and Hunt, R. A. (2013) ‘Robust Project Portfolio Management: Capability Evolution and Maturity’, International Journal of Managing Projects in Business, 6(1), pp. 131–151. doi: 10.1108/17538371311291062.
Klein, R. and Rai, A. (2009) ‘Interfirm Strategic Information Flows in Logistics Supply Chain Relationships’, MIS Quarterly, 33(4), pp. 735–762. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=44988648&site=ehost-live.
Kling, R. (2000) ‘Learning About Information Technologies and Social Change: The Contribution of Social Informatics.’, Information Society, 16(3), pp. 217–232. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3533085&site=ehost-live.
Knowledge Workers - Who They Are and What They Do (no date). Available at: https://corporatefinanceinstitute.com/resources/knowledge/other/knowledge-workers/.
Kroenke, D. M. and Auer, D. J. (2016) Database Processing: Fundamentals, Design, and Implementation. Fourteenth edition., Global edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292107646.
Kumar, K. and Van Hillegersberg, J. (2000) ‘ERP Experiences and Evolution’, Communications of the ACM, 43(4), pp. 22–26. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=12070056&site=ehost-live.
Laudon, K. C. and Laudon, J. P. (2014a) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2014) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2014b) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2014c) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2014d) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2014e) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2014f) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. C. and Laudon, J. P. (2015a) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015b) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015c) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015d) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015e) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015f) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015g) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015h) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (2015i) Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. C. and Laudon, J. P. (no date) Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. and Laudon, J. (2015a) ‘Building Information Systems and Managing Projects’, in Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. and Laudon, J. (2015b) ‘Building Information Systems and Managing Projects’, in Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. and Laudon, J. (2015c) ‘Building Information Systems and Managing Projects’, in Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. and Laudon, J. (2015d) ‘Ethical and Social Issues in Information Systems’, in Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. and Laudon, J. (2015e) ‘Ethical and Social Issues in Information Systems’, in Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. and Laudon, J. (2015f) ‘Foundations of Business Intelligence: Databases and Information Management’, in Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. and Laudon, J. (2015g) ‘Foundations of Business Intelligence: Databases and Information Management’, in Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. and Laudon, J. (2015h) ‘Improving Decision Making and Managing Knowledge’, in Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Laudon, K. and Laudon, J. (2015i) ‘Securing Information Systems’, in Essentials of Management Information Systems. 11th ed./Global edition. Harlow, England: Pearson Education Ltd.
Laudon, K. and Laudon, J. (2015j) ‘Securing Information Systems’, in Essentials of Management Information Systems. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013.
Lee, D.-J. (2011) ‘Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection’, MIS Quarterly, 35(2), pp. 423–A8. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60461925&site=ehost-live.
Lindstrom, L. and Jeffries, R. (2004) ‘Extreme Programming and Agile Software Development Methodologies’, Information Systems Management, 21(3), pp. 41–52. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=13352756&site=ehost-live.
Lorin, M. (2002) ‘Investment in Enterprise Resource Planning: Business Impact and Productivity Measures.’, Journal of Management Information Systems, 19(1), pp. 71–98. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6976829&site=ehost-live.
Luzak, J. (2014) ‘Privacy Notice for Dummies? Towards European Guidelines on How to Give “Clear and Comprehensive Information” on the Cookies’ Use in Order to Protect the Internet Users' Right to Online Privacy’, Journal of Consumer Policy, 37(4), pp. 547–559. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=99108901&site=ehost-live.
Majchrazk, A. (2013) ‘The Impact of Shaping on Knowledge Reuse for Organizational Improvement With Wikis’, MIS Quarterly, 37(Issue 2, p455-A12. 27p. 2 Color Photographs, 1 Diagram, 10 Charts). Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87370679&site=ehost-live.
Maklan, S. (2011) ‘Why CRM Fails -- and How to Fix It.’, MIT Sloan Management Review, 52(4), pp. 77–85. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=63008085&site=ehost-live.
Marchand, D. A. and Peppard, J. (2013) ‘Why IT Fumbles Analytics’, Harvard Business Review, 91(1), pp. 104–112. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=84424084&site=ehost-live.
McAfee, A. (2004) ‘Do You Have Too Much IT?’, MIT Sloan Management Review, 45(3), pp. 18–22. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=12856174&site=ehost-live.
McAfee, A. (2011) ‘What Every CEO Needs to Know About The Cloud’, Harvard Business Review, 89(11), pp. 124–132. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=67003261&site=ehost-live.
McAfee, A. and Brynjolfsson, E. (2012) ‘Big Data: The Management Revolution’, Harvard Business Review, 90(10), pp. 60–68. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996279&site=ehost-live.
McFarlan, F. W. (1984) ‘Information Technology Changes the Way You Compete’, Harvard Business Review, 62(3), pp. 98–103. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4120899&site=ehost-live.
News, Tips, and Advice for Technology Professionals - TechRepublic (no date). Available at: https://www.techrepublic.com/blog/10-things/10-plus-reasons-to-use-access-and-a-few-reasons-not-to/.
Olson, D. L. (2014) Supply Chain Information Technology. 2nd Edition. New York, NY: Business Expert Press.
Olson, D. L. (no date) Supply Chain Information Technology. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781631570568.
Oz, E. (1992) ‘Ethical Standards for Information Systems Professionals: A Case for a Unified Code’, MIS Quarterly, 16(4), pp. 423–433. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9604010642&site=ehost-live.
PMI | Project Management Institute (no date). Available at: http://www.pmi.org/.
Porter, M. E. (1979) ‘How Competitive Forces Shape Strategy’, Harvard Business Review, 57(2), pp. 137–145. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3867673&site=ehost-live.
Porter, M. E. (1980) Competitive Strategy: Techniques for Analyzing Industries and Competitors. New York: Free Press.
Porter, M. E. (2001) ‘Strategy and the Internet’, Harvard Business Review, 79(3), pp. 62–78. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4147416&site=ehost-live.
Porter, M. E. and Millar, V. E. (1985) ‘How Information Gives You Competitive Advantage’, Harvard Business Review, 63(4), pp. 149–160. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=8500002422&site=ehost-live.
Radadia, J. (2010) ‘Breaking the Bad Data Bottlenecks’, Information Management Magazine. Available at: http://www.information-management.com/issues/20_3/breaking_the_bad_data_bottlenecks-10017895-1.html.
Rai, A. (2006) ‘Firm Performance Impacts of Digitally Enabled Supply Chain Integration Capabilities’, MIS Quarterly, 30(2), pp. 225–246. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=21145595&site=ehost-live.
Sahay, B. S. and Gupta, A. K. (2003) ‘Development of Software Selection Criteria for Supply Chain Solutions’, Industrial Management & Data Systems, 103(2), pp. 97–110. doi: 10.1108/02635570310463429.
‘SAP Digital Business Services: How do you become an intelligent enterprise? - YouTube’ (no date). Available at: https://www.youtube.com/watch?v=okM4ym_Tmfc.
Seddon, P. B. (2010) ‘A Multi-Project Model of Key Factors Affecting Organizational Benefits From Enterprise Systems’, MIS Quarterly, 34(2), pp. 305–A11. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=50036083&site=ehost-live.
Semantic Web - W3C (no date). Available at: https://www.w3.org/standards/semanticweb/.
Shacklett, M. E. (2016) 10 IT Basics That Business Managers Need to Know - TechRepublic. Available at: https://www.techrepublic.com/blog/10-things/10-it-basics-that-business-managers-need-to-know/.
Shaw, T. (2011) Web 3.0 Gives Business Smarter Infrastructure. Available at: http://www.baselinemag.com/c/a/Intelligence/Web-30-Gives-Business-Smarter-Infrastructure-576336.
Shein, E. (2015) ‘Companies Proactively Seek Out Internal Threats’, Communications of the ACM, 58(11), pp. 15–17. doi: 10.1145/2820423.
Shi, Y. (1996) ‘A Consensus Ranking for Information System Requirements’, Information Management & Computer Security, 4(1), pp. 10–18. doi: 10.1108/09685229610114169.
Silberschatz, A., Korth, H. F. and Sudarshan, S. (2011) Database System Concepts. 6th Edition. New York: McGraw-Hill.
Sircar, S. (2001) ‘Revolution or Evolution? a Comparison of Object-Oriented and Structured Systems Development Methods.’, MIS Quarterly, 25(4), pp. 457–471. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6406420&site=ehost-live.
Smith, J. (2002) ‘Managing Your IT Total Cost of Ownership.’, Communications of the ACM, 45(1), pp. 101–106. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11934594&site=ehost-live.
Smith, M. S. (2015) ‘Protecting Privacy in an IoT-Connected World.’, Information Management Journal, 49(6), pp. 36–39. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=110923673&site=ehost-live.
Soliman, K. (2003) ‘ASPs: Do They Work?’, Information Systems Management, 20(4), pp. 50–57. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11015720&site=ehost-live.
Solitander, M. and Solitander, N. (2010) ‘The Sharing, Protection and Thievery of Intellectual Assets’, Management Decision, 48(1), pp. 37–57. doi: 10.1108/00251741011014445.
Stahl, B. C. (2011) ‘Teaching Ethical Reflexivity in Information Systems: How to Equip Students to Deal With Moral and Ethical Issues of Emerging Information and Communication Technologies’, Journal of Information Systems Education, 22(3), pp. 253–260. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=69713592&site=ehost-live.
‘State of Cybersecurity: Implications for 2015’ (no date). Available at: http://www.isaca.org/cyber/Documents/State-of-Cybersecurity_Res_Eng_0415.pdf.
Subramanian, G. H. (2009) ‘Balancing Four Factors in System Development Projects’, Communications of the ACM, 52(10), pp. 118–121. doi: 10.1145/1562764.1562794.
Susarla, A. (2003) ‘Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction With Asp Services’, MIS Quarterly, 27(1), pp. 91–123. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9284305&site=ehost-live.
The 10 Vs of Big Data | Transforming Data with Intelligence (no date). Available at: https://tdwi.org/articles/2017/02/08/10-vs-of-big-data.aspx.
The Digital Divide (no date). Available at: https://www.politico.com/agenda/issue/the-digital-divide.
The Digital Enterprise | McKinsey (no date). Available at: https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/the-digital-enterprise.
‘The Nature of Tech: Digital Business Automation - YouTube’ (no date). Available at: https://www.youtube.com/watch?v=_UtVvdetCVQ.
‘The US Open is powered by the IBM Cloud - YouTubeIBM’ (no date). Available at: https://www.youtube.com/watch?v=izTQwUpLXSU.
‘Top 5 Reasons ERP Implementations Fail and What You Can Do About It’ (2013). Ziff-Davis. Available at: http://www.mygpcloud.com/wp-content/uploads/top-5-reasons-erp-implementations-fail-and-what-you-can-do-about-it.pdf.
Top 10 reasons for ERP failure (and how to avoid it) (no date). Available at: https://www.erpfocus.com/erp-failure-10-reasons-why-your-erp-project-could-crash-article-540.html.
‘Understanding Distributed Denial of Service Attacks - YouTube’ (no date). Available at: https://www.youtube.com/watch?v=NogCN78XN2w#action=share.
Utterback, J. M. and Acee, H. J. (2005) ‘Disruptive Technologies: An Expanded View’, International Journal of Innovation Management, 09(01), pp. 1–17. doi: 10.1142/S1363919605001162.
Wallace, P. M. (2015a) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015b) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015c) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015d) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015e) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015f) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015g) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015h) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015i) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015j) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015k) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015l) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015m) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015n) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015o) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015p) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015q) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015r) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015s) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015t) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015u) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015v) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015w) Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015x) Introduction to Information Systems. Second edition. Boston: Pearson.
Wallace, P. M. (2015y) ‘Knowledge Management and E-Learning’, in Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wallace, P. M. (2015z) ‘Project Management and Strategic Planning’, in Introduction to Information Systems. Second edition. Boston: Pearson. Available at: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292071114.
Wall, T. (2019) ‘“I”m 57 and My Parents Have to Feed Me’: The Universal Credit Digital Obstacle Course’, Guardian. Available at: https://www.theguardian.com/society/2019/mar/18/57-parents-feed-me-universal-credit-digital-obstacle-course.
Wang, Y. (2013a) ‘Social Influence and Knowledge Management Systems Use: Evidence From Panel Data’, MIS Quarterly, 37(1), pp. 299–313. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85634571&site=ehost-live.
Wang, Y. (2013b) ‘Social Influence and Knowledge Management Systems Use: Evidence From Panel Data.’, MIS Quarterly, 37(Issue 1, p299-313. 16p. 1 Diagram), pp. 299–313. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85634571&site=ehost-live.
Watson, H. J. (2006) ‘Real-Time Business Intelligence: Best Practices at Continental Airlines’, Information Systems Management, 23(1), pp. 7–18. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=19141701&site=ehost-live.
‘WDR2016MainMessages-ENGLISH-WebRes.pdf’ (no date). Available at: http://pubdocs.worldbank.org/en/155841452690992989/WDR2016MainMessages-ENGLISH-WebRes.pdf.
What is RFID Used for in the Real World? | RFIDinsider (no date). Available at: http://blog.atlasrfidstore.com/what-is-rfid-used-for-in-applications.
Woodcock, N. (2011) ‘Social CRM as a Business Strategy’, Journal of Database Marketing & Customer Strategy Management, 18(1), pp. 50–64. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60097258&site=ehost-live.
‘World Investment Report 2017 - INVESTMENT AND DIGITAL ECONOMY - wir2017ch4_en.pdf’ (no date). Available at: https://unctad.org/en/PublicationChapters/wir2017ch4_en.pdf.
Wulf, V. and Jarke, M. (2004) ‘The Economics of End-User Development’, Communications of the ACM, 47(9), pp. 41–42. Available at: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=14376975&site=ehost-live.