@article{Appan_Browne_2012, title={The Impact of Analyst-Induced Misinformation on the Requirements Elicitation Process}, volume={36}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=71143099&site=ehost-live}, number={1}, journal={MIS Quarterly}, author={Appan, Radha and Browne, Glenn J.}, year={2012}, pages={85–106} }
@misc{Aral_2007, title={Productivity Effects of Information Diffusion in Networks}, url={http://ebusiness.mit.edu/research/papers/2007.07_Aral_Brynjolfsson_Van%20Alstyne_Productivity%20Effects%20of%20Information_234.pdf}, publisher={MIT Center for Digital Business}, author={Aral, Sinan}, year={2007} }
@article{Aron_2005, title={Just Right Outsourcing: Understanding and Managing Risk}, volume={22}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=18908193&site=ehost-live}, number={2}, journal={Journal of Management Information Systems}, author={Aron, Ravi}, year={2005}, pages={37–55} }
@book{Avison_Shah_1997, address={London}, title={The Information Systems Development Life Cycle: A First Course in Information Systems}, volume={Information systems series}, publisher={McGraw-Hill}, author={Avison, D. E. and Shah, H. U.}, year={1997} }
@book{Avison_Fitzgerald_2006a, address={London}, edition={4th Edition}, title={Information Systems Development: Methodologies, Techniques and Tools}, publisher={McGraw-Hill Education}, author={Avison, David and Fitzgerald, Guy}, year={2006} }
@book{Avison_Fitzgerald_2006b, address={London}, edition={4th Edition}, title={Information Systems Development: Methodologies, Techniques and Tools}, publisher={McGraw-Hill Education}, author={Avison, David and Fitzgerald, Guy}, year={2006} }
@article{Banker_2011, title={Cio Reporting Structure, Strategic Positioning, and Firm Performance}, volume={35}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60461880&site=ehost-live}, number={2}, journal={MIS Quarterly}, author={Banker, Rajiv  D.}, year={2011}, pages={487–504} }
@article{Barton_Court_2012, title={Making Advanced Analytics Work For You}, volume={90}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996092&site=ehost-live}, number={10}, journal={Harvard Business Review}, author={Barton, Dominic and Court, David}, year={2012}, pages={78–83} }
@article{Bo_Benbasat_2007, title={E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact}, volume={31}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=23963841&site=ehost-live}, number={1}, journal={MIS Quarterly}, author={Bo, Xiao and Benbasat, Izak}, year={2007}, pages={137–209} }
@inbook{Bocij_2008a, address={Harlow}, edition={4th Edition}, title={An Introduction To Acquiring and Developing BIS}, booktitle={Business Information Systems: Technology, Development and Management}, publisher={Financial Times Prentice Hall}, author={Bocij, Paul}, year={2008}, pages={279–318} }
@inbook{Bocij_2008b, address={Harlow}, edition={4th Edition}, title={Systems Analysis}, booktitle={Business Information Systems: Technology, Development and Management}, publisher={Financial Times Prentice Hall}, author={Bocij, Paul}, year={2008}, pages={373–416} }
@article{Boehm_1988, title={A Spiral Model of Software Development and Enhancement}, volume={21}, DOI={10.1109/2.59}, number={5}, journal={Computer}, author={Boehm, B. W.}, year={1988}, pages={61–72} }
@article{Brown_Hagel_Varian_Carr_2003, title={Does IT Matter?}, volume={81}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=96711753&site=ehost-live}, number={7}, journal={Harvard Business Review}, author={Brown, John Seely and Hagel, John and Varian, Hal and Carr, Nicholas}, year={2003}, pages={109–112} }
@article{Browne_Rogich_2001, title={An Empirical Investigation of User Requirements Elicitation: Comparing the Effectiveness of Prompting Techniques}, volume={17}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4326066&site=ehost-live}, number={4}, journal={Journal of Management Information Systems}, author={Browne, Glenn J. and Rogich, Michael B.}, year={2001}, pages={223–249} }
@article{Brynjolfsson_2005, title={VII Pillars Of Productivity [open access]}, url={http://www.georgeschussel.com/wp-content/uploads/articles/NY6420050502_erik.pdf}, number={22}, journal={Optimize}, author={Brynjolfsson, Erik}, year={2005} }
@article{Brynjolfsson_2011, title={Strength in Numbers: How Does Data-Driven Decisionmaking Affect Firm Performance?}, DOI={10.2139/ssrn.1819486}, journal={SSRN Electronic Journal}, author={Brynjolfsson, Erik}, year={2011} }
@article{Bughin_Byers_Chui_2011, title={How Social Technologies Are Extending the Organization}, url={https://web.archive.org/web/20170317102159/http://www.mckinsey.com/industries/high-tech/our-insights/how-social-technologies-are-extending-the-organization}, number={November}, journal={Survey}, publisher={McKinsey & Company}, author={Bughin, Jacques and Byers, Angela Hung and Chui, Michael}, year={2011} }
@article{Carr_2003, title={IT Doesn’t Matter}, volume={81}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9720881&site=ehost-live}, number={5}, journal={Harvard Business Review}, author={Carr, Nicholas G.}, year={2003}, pages={41–49} }
@book{Chaffey_2014, edition={6th Edition}, title={Digital Business and E-Commerce Management: Strategy, Implementation and Practice}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5174231}, author={Chaffey, Dave}, year={2014} }
@book{Chaffey_2015, address={Harlow, England}, edition={6th Edition}, title={Digital Business and E-Commerce Management: Strategy, Implementation and Practice}, publisher={Pearson}, author={Chaffey, Dave}, year={2015} }
@article{Chatterjee_2015, title={The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use}, volume={31}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=102702506&site=ehost-live}, number={4}, journal={Journal of Management Information Systems}, author={Chatterjee, Sutirtha}, year={2015}, pages={49–87} }
@article{Chen_Popovich_2003, title={Understanding Customer Relationship Management (CRM)}, volume={9}, DOI={10.1108/14637150310496758}, number={5}, journal={Business Process Management Journal}, author={Chen, Injazz J. and Popovich, Karen}, year={2003}, pages={672–688} }
@article{Christensen_Raynor_McDonald_2015, title={What Is Disruptive Innovation?}, url={https://hbr.org/2015/12/what-is-disruptive-innovation}, number={December}, journal={Harvard Business Review}, author={Christensen, Clayton M. and Raynor, Michael E. and McDonald, Rory}, year={2015} }
@article{Chui_2010, title={The Internet of Things}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=49469625&site=ehost-live}, number={2}, journal={McKinsey Quarterly}, author={Chui, Michael}, year={2010}, pages={70–79} }
@article{Creasey_2016, title={Data Analytics Paved Way for Leicester Win}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=115641005&site=ehost-live}, journal={Computer Weekly}, author={Creasey, Simon}, year={2016}, pages={4–7} }
@misc{Cukier_Mayer-Schoenberger_2013, title={Why Big Data Is on the Rise | Foreign Affairs}, url={https://www.foreignaffairs.com/articles/2013-04-03/rise-big-data}, number={May/June}, author={Cukier, Kenneth Neil and Mayer-Schoenberger, Viktor}, year={2013} }
@book{Date_2004, address={Boston}, edition={8th Edition}, title={An Introduction to Database Systems}, publisher={Pearson/Addison Wesley}, author={Date, C. J.}, year={2004} }
@article{Davenport_1998, title={Putting the Enterprise into the Enterprise System.}, volume={76}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=780261&site=ehost-live}, number={4}, journal={Harvard Business Review}, author={Davenport, Thomas H.}, year={1998}, pages={121–131} }
@article{Davenport_2011, title={Know What Your Customers Want Before They Do}, volume={89}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=67484704&site=ehost-live}, number={12}, journal={Harvard Business Review}, author={Davenport, Thomas H.}, year={2011}, pages={84–92} }
@article{Davenport_2013, title={Analytics 3.0}, volume={91}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=92545710&site=ehost-live}, number={12}, journal={Harvard Business Review}, author={Davenport, Thomas H.}, year={2013}, pages={64–72} }
@article{Davenport_Barth_Bean_2012, title={How ‘Big Data’ Is Different}, url={http://sloanreview.mit.edu/article/how-big-data-is-different/}, number={Fall}, journal={MIT Sloan Management Review}, author={Davenport, Thomas H. and Barth, Paul and Bean, Randy}, year={2012} }
@article{Davenport_Patil_2012, title={Data Scientist: The Sexiest Job Of the 21st Century}, volume={90}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996214&site=ehost-live}, number={10}, journal={Harvard Business Review}, author={Davenport, Thomas H. and Patil, D. J.}, year={2012}, pages={70–76} }
@article{Deiser_Newton_2013, title={Six Social-Media Skills Every Leader Needs}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85277123&site=ehost-live}, number={1}, journal={McKinsey Quarterly}, author={Deiser, Roland and Newton, Sylvain}, year={2013}, pages={62–75} }
@book{Dhillon_2007, address={Hoboken, N.J.}, title={Principles of Information Systems Security: Text and Cases}, publisher={Wiley}, author={Dhillon, Gurpreet}, year={2007} }
@misc{Dudovskiy_2021, title={Apple Value Chain Analysis | Business Research Methodology}, url={https://research-methodology.net/apple-value-chain-analysis/}, author={Dudovskiy, John}, year={2021}, month={Feb} }
@book{Easterby-Smith_Lyles_2011a, address={Chichester}, edition={2nd Edition}, title={Handbook of Organizational Learning and Knowledge Management}, publisher={John Wiley}, author={Easterby-Smith, Mark and Lyles, Marjorie A.}, year={2011} }
@book{Easterby-Smith_Lyles_2011b, address={Chichester}, edition={2nd Edition}, title={Handbook of Organizational Learning and Knowledge Management}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=693559}, publisher={John Wiley}, author={Easterby-Smith, Mark and Lyles, Marjorie A.}, year={2011} }
@misc{Eckerson, title={Big Data Analytics: Profiling the Use of Analytical Platforms in User Organizations}, url={http://tdwi.org/%7E/media/8E51AC2BE2664D83BF1F503BED557105.pdf}, author={Eckerson, Wayne} }
@book{Elmasri_Navathe_2014, address={Harlow, Essex}, edition={6th Edition}, title={Fundamentals of Database Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5248269}, publisher={Pearson}, author={Elmasri, Ramez and Navathe, Sham}, year={2014} }
@misc{Ferguson_2019, title={Apple Inc. Five Forces Analysis (Porter’s Model) | Panmore Institute}, url={http://panmore.com/apple-inc-five-forces-analysis-porters-model-case-study}, author={Ferguson, Edward}, year={2019}, month={Feb} }
@misc{Firican_2017, title={The 10 Vs of Big Data | TWDI - Upside}, url={https://tdwi.org/articles/2017/02/08/10-vs-of-big-data.aspx}, author={Firican, George}, year={2017}, month={Feb} }
@misc{Fisher_2013, title={Data Management Platforms - Using Big Data to Power Marketing Performance - eMarketer}, url={https://web.archive.org/web/20150509153317/http://www.emarketer.com/Webinar/Data-Management-PlatformsUsing-Big-Data-Power-Marketing-Performance/4000073}, author={Fisher, Lauren}, year={2013}, month={Oct} }
@article{Gold_Gray_Jones_Miller_2010, title={Strategies for Improving Systems Development Project Success [open access]}, volume={XI}, url={http://dare.ubvu.vu.nl/handle/1871/49064}, number={1}, journal={Issues in Information Systems}, author={Gold, Anna H. and Gray, Glen L. and Jones, Christopher G. and Miller, David W.}, year={2010}, pages={164–173} }
@article{Gorry_Morton_1989, title={A Framework for Management Information Systems}, volume={30}, url={http://search.proquest.com.ezproxy01.rhul.ac.uk/docview/1302988972?accountid=11455}, number={3}, journal={Sloan Management Review}, author={Gorry, G. Anthony and Morton, Michael S Scott}, year={1989}, pages={49–62} }
@article{Guillemette_Paré_2012, title={Toward a New Theory of the Contribution of the It Function in Organizations.}, volume={36}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=74717006&site=ehost-live}, number={2}, journal={MIS Quarterly}, author={Guillemette, Manon G and Paré, Guy}, year={2012}, pages={529–551} }
@article{Hackbarth_Kettinger_2000, title={Building an E-Business Strategy}, volume={17}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3185578&site=ehost-live}, number={3}, journal={Information Systems Management}, author={Hackbarth, Gary and Kettinger, William J.}, year={2000}, pages={78–94} }
@misc{Harkins_2008, title={10+ Reasons to Use Access (And a Few Reasons Not To) | TechRepublic}, url={https://www.techrepublic.com/blog/10-things/10-plus-reasons-to-use-access-and-a-few-reasons-not-to/}, author={Harkins, Susan}, year={2008}, month={Aug} }
@article{Hau_2013, title={The Effects of Individual Motivations and Social Capital on Employees’ Tacit and Explicit Knowledge Sharing Intentions}, volume={33}, DOI={10.1016/j.ijinfomgt.2012.10.009}, number={2}, journal={International Journal of Information Management}, author={Hau, Yong Sauk}, year={2013}, pages={356–366} }
@misc{Hendel_Doherty_2018, title={GRAPHIC: America’s Digital Divide, in 2 Maps | Politico}, url={https://www.politico.com/agenda/story/2018/02/07/digital-divide-in-america-graphic-000639}, author={Hendel, John and Doherty, Tucker}, year={2018}, month={Jul} }
@article{Hitt_Wu_Zhou_2002, title={Investment in Enterprise Resource Planning: Business Impact and Productivity Measures.}, volume={19}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6976829&site=ehost-live}, number={1}, journal={Journal of Management Information Systems}, author={Hitt, Lorin M. and Wu, D. J. and Zhou, Xiaoge}, year={2002}, pages={71–98} }
@book{Hoffer_Ramesh_Topi_2016a, address={Upper Saddle River}, edition={12th Edition}, title={Modern Database Management}, publisher={Pearson}, author={Hoffer, Jeffrey A. and Ramesh, V. and Topi, Heikki}, year={2016} }
@book{Hoffer_Ramesh_Topi_2016b, address={Boston, [Massachusetts]}, edition={12th Global Edition}, title={Modern Database Management}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5185641}, publisher={Pearson}, author={Hoffer, Jeffrey A. and Ramesh, V. and Topi, Heikki}, year={2016} }
@book{Inmon_2005, address={Indianapolis}, edition={4th Edition}, title={Building the Data Warehouse}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=239420}, publisher={Wiley}, author={Inmon, William H.}, year={2005} }
@article{Iriana_Buttle_2008, title={Strategic, Operational, and Analytical Customer Relationship Management}, volume={5}, url={https://librarysearch.royalholloway.ac.uk/permalink/f/1cm8pdv/TN_cdi_scopus_primary_46629238}, number={4}, journal={Journal of Relationship Marketing}, publisher={Taylor & Francis Group}, author={Iriana, Iriana and Buttle, Francis}, year={2008}, pages={23–42} }
@book{Jashapara_2004, address={Harlow, England}, title={Knowledge Management: An Integrated Approach}, url={https://ezproxy01.rhul.ac.uk/login?url=http://www.vlebooks.com/vleweb/product/openreader?id=Holloway&isbn=9781408212561&uid=^u}, publisher={Pearson Education Limited}, author={Jashapara, Ashok}, year={2004} }
@book{Jashapara_2011, address={Harlow}, edition={2nd Edition}, title={Knowledge Management: An Integrated Approach}, publisher={Financial Times Prentice Hall}, author={Jashapara, Ashok}, year={2011} }
@misc{Kanaracus_2012, title={Survey Finds ERP Software Project Overruns ‘Distressingly Common’ | Computerworld}, url={http://www.itworld.com/article/2723501/enterprise-software/survey-finds-erp-software-project-overruns--distressingly-common-.html}, author={Kanaracus, Chris}, year={2012}, month={Jul} }
@misc{Kern_2013, title={How to Determine Cloud TCO | Information Management Online}, url={https://web.archive.org/web/20210126185934/https://www.information-management.com/news/how-to-determine-cloud-tco}, author={Kern, Justin}, year={2013}, month={Mar} }
@article{Killen_Hunt_2013, title={Robust Project Portfolio Management: Capability Evolution and Maturity}, volume={6}, DOI={10.1108/17538371311291062}, number={1}, journal={International Journal of Managing Projects in Business}, author={Killen, Catherine P. and Hunt, Robert A.}, year={2013}, pages={131–151} }
@article{Klein_Rai_2009, title={Interfirm Strategic Information Flows in Logistics Supply Chain Relationships}, volume={33}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=44988648&site=ehost-live}, number={4}, journal={MIS Quarterly}, author={Klein, Richard and Rai, Arun}, year={2009}, pages={735–762} }
@article{Kling_2000, title={Learning About Information Technologies and Social Change: The Contribution of Social Informatics.}, volume={16}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3533085&site=ehost-live}, number={3}, journal={Information Society}, author={Kling, Rob}, year={2000}, pages={217–232} }
@book{Kroenke_Auer_2016, address={Boston}, edition={14th Edition}, title={Database Processing: Fundamentals, Design, and Implementation}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5185586}, publisher={Pearson}, author={Kroenke, David M. and Auer, David J.}, year={2016} }
@article{Kumar_Van Hillegersberg_2000, title={ERP Experiences and Evolution}, volume={43}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=12070056&site=ehost-live}, number={4}, journal={Communications of the ACM}, author={Kumar, Kuldeep and Van Hillegersberg, Jos}, year={2000}, pages={22–26} }
@book{Laudon, edition={11th/Global}, title={Essentials of MIS}, url={https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=18567913790002671&institutionId=2671&customerId=2670}, publisher={Pearson}, author={Laudon, J. P.} }
@inbook{Laudon_Laudon_2015a, address={Harlow, England}, edition={11th ed./Global edition}, title={Foundations of Business Intelligence: Databases and Information Management}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015b, title={Foundations of Business Intelligence: Databases and Information Management}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5138246}, booktitle={Essentials of Management Information Systems}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015c, address={Harlow, England}, edition={11th ed./Global edition}, title={Building Information Systems and Managing Projects}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015d, title={Building Information Systems and Managing Projects}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5138246}, booktitle={Essentials of Management Information Systems}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015e, title={Building Information Systems and Managing Projects}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684}, booktitle={Essentials of Management Information Systems}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015f, address={Harlow, England}, edition={11th ed./Global edition}, title={Securing Information Systems}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015g, title={Securing Information Systems}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684}, booktitle={Essentials of Management Information Systems}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015h, address={Harlow, England}, edition={11th ed./Global edition}, title={Ethical and Social Issues in Information Systems}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015i, title={Ethical and Social Issues in Information Systems}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684}, booktitle={Essentials of Management Information Systems}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@inbook{Laudon_Laudon_2015j, title={Improving Decision Making and Managing Knowledge}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5573684}, booktitle={Essentials of Management Information Systems}, author={Laudon, Kenneth and Laudon, Jane}, year={2015} }
@book{Laudon_Laudon_2014a, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2014} }
@book{Laudon_Laudon_2015k, address={Harlow, England}, edition={11th ed./Global edition}, title={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@inbook{Laudon_Laudon_2015l, address={Harlow, England}, edition={11th Global Edition}, title={Opening Case: Rugby Football Union Tries Big Data}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@book{Laudon_Laudon_2015m, address={Harlow, England}, edition={11th ed./Global edition}, title={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@inbook{Laudon_Laudon_2015n, address={Harlow, England}, edition={11th Global Edition}, title={Opening Case: Rugby Football Union Tries Big Data}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@book{Laudon_Laudon_2015o, address={Harlow, England}, edition={11th ed./Global edition}, title={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@book{Laudon_Laudon_2015p, address={Harlow, England}, edition={11th ed./Global edition}, title={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@inbook{Laudon_Laudon_2015q, address={Harlow, England}, edition={11th Global Edition}, title={Opening Case: Rugby Football Union Tries Big Data}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@inbook{Laudon_Laudon_2015r, address={Harlow, England}, edition={11th Global Edition}, title={Opening Case: Rugby Football Union Tries Big Data}, booktitle={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@book{Laudon_Laudon_2015s, address={Harlow, England}, edition={11th ed./Global edition}, title={Essentials of Management Information Systems}, publisher={Pearson Education Ltd}, author={Laudon, Kenneth C. and Laudon, Jane P.}, year={2015} }
@book{Laudon_Laudon, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane P.} }
@book{Laudon_Laudon_2014b, title={Essentials of Management Information Systems}, url={http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292075013}, author={Laudon, Kenneth C. and Laudon, Jane Price}, year={2014} }
@book{Laudon_Laudon_2014c, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane Price}, year={2014} }
@book{Laudon_Laudon_2014d, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane Price}, year={2014} }
@book{Laudon_Laudon_2014e, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane Price}, year={2014} }
@book{Laudon_Laudon_2014f, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane Price}, year={2014} }
@book{Laudon_Laudon_2014g, title={Essentials of Management Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138246}, author={Laudon, Kenneth C. and Laudon, Jane Price}, year={2014} }
@article{Lee_2011, title={Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection}, volume={35}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60461925&site=ehost-live}, number={2}, journal={MIS Quarterly}, author={Lee, Dong-Joo}, year={2011}, pages={423-A8} }
@article{Lindstrom_Jeffries_2004, title={Extreme Programming and Agile Software Development Methodologies}, volume={21}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=13352756&site=ehost-live}, number={3}, journal={Information Systems Management}, author={Lindstrom, Lowell and Jeffries, Ron}, year={2004}, pages={41–52} }
@article{Luzak_2014, title={Privacy Notice for Dummies? Towards European Guidelines on How to Give ‘Clear and Comprehensive Information’ on the Cookies’ Use in Order to Protect the Internet Users’ Right to Online Privacy}, volume={37}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=99108901&site=ehost-live}, number={4}, journal={Journal of Consumer Policy}, author={Luzak, J.}, year={2014}, pages={547–559} }
@article{Majchrazk_2013, title={The Impact of Shaping on Knowledge Reuse for Organizational Improvement With Wikis}, volume={37}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87370679&site=ehost-live}, number={2}, journal={MIS Quarterly}, author={Majchrazk, Ann}, year={2013}, pages={455-A12} }
@article{Maklan_2011, title={Why CRM Fails -- and How to Fix It.}, volume={52}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=63008085&site=ehost-live}, number={4}, journal={MIT Sloan Management Review}, author={Maklan, Stan}, year={2011}, pages={77–85} }
@article{Marchand_Peppard_2013, title={Why IT Fumbles Analytics}, volume={91}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=84424084&site=ehost-live}, number={1}, journal={Harvard Business Review}, author={Marchand, Donald A. and Peppard, Joe}, year={2013}, pages={104–112} }
@article{McAfee_2004, title={Do You Have Too Much IT?}, volume={45}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=12856174&site=ehost-live}, number={3}, journal={MIT Sloan Management Review}, author={McAfee, Andrew}, year={2004}, pages={18–22} }
@article{McAfee_2011, title={What Every CEO Needs to Know About The Cloud}, volume={89}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=67003261&site=ehost-live}, number={11}, journal={Harvard Business Review}, author={McAfee, Andrew}, year={2011}, pages={124–132} }
@article{McAfee_Brynjolfsson_2012, title={Big Data: The Management Revolution}, volume={90}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=79996279&site=ehost-live}, number={10}, journal={Harvard Business Review}, author={McAfee, Andrew and Brynjolfsson, Erik}, year={2012}, pages={60–68} }
@article{McFarlan_1984, title={Information Technology Changes the Way You Compete}, volume={62}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4120899&site=ehost-live}, number={3}, journal={Harvard Business Review}, author={McFarlan, F. Warren}, year={1984}, pages={98–103} }
@misc{Miller_2023, title={Top 10 Reasons for ERP Failure (And How to Avoid It) | ERP Focus}, url={https://www.erpfocus.com/erp-failure-10-reasons-why-your-erp-project-could-crash-article-540.html}, author={Miller, Tom}, year={2023}, month={Feb} }
@book{Olson, title={Supply Chain Information Technology}, volume={Supply and Operations Management Collection}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1778603}, author={Olson, David L.} }
@book{Olson_2014, address={New York, NY}, edition={2nd Edition}, title={Supply Chain Information Technology}, volume={The Supply and Operations Management Collection}, publisher={Business Expert Press}, author={Olson, David Louis}, year={2014} }
@article{Oz_1992, title={Ethical Standards for Information Systems Professionals: A Case for a Unified Code}, volume={16}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9604010642&site=ehost-live}, number={4}, journal={MIS Quarterly}, author={Oz, Effy}, year={1992}, pages={423–433} }
@article{Porter_1979, title={How Competitive Forces Shape Strategy}, volume={57}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=3867673&site=ehost-live}, number={2}, journal={Harvard Business Review}, author={Porter, Michael E.}, year={1979}, pages={137–145} }
@book{Porter_1980, address={New York}, title={Competitive Strategy: Techniques for Analyzing Industries and Competitors}, publisher={Free Press}, author={Porter, Michael E.}, year={1980} }
@article{Porter_2001, title={Strategy and the Internet}, volume={79}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4147416&site=ehost-live}, number={3}, journal={Harvard Business Review}, author={Porter, Michael E.}, year={2001}, pages={62–78} }
@article{Porter_Millar_1985, title={How Information Gives You Competitive Advantage}, volume={63}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=8500002422&site=ehost-live}, number={4}, journal={Harvard Business Review}, author={Porter, Michael E and Millar, Victor E.}, year={1985}, pages={149–160} }
@article{Radadia_2010, title={Breaking the Bad Data Bottlenecks}, url={http://www.information-management.com/issues/20_3/breaking_the_bad_data_bottlenecks-10017895-1.html}, journal={Information Management Magazine}, author={Radadia, Jinesh}, year={2010} }
@article{Rai_Patnayakuni_Seth_2006, title={Firm Performance Impacts of Digitally Enabled Supply Chain Integration Capabilities}, volume={30}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=21145595&site=ehost-live}, number={2}, journal={MIS Quarterly}, author={Rai, Arun and Patnayakuni, Ravi and Seth, Nainika}, year={2006}, pages={225–246} }
@misc{Roth_2022, title={10 Simple Design Rules to Make Word Documents Look Professional and Beautiful | Make Use Of}, url={https://www.makeuseof.com/tag/design-rules-word-documents/}, author={Roth, Emma}, year={2022}, month={May} }
@article{Sahay_Gupta_2003, title={Development of Software Selection Criteria for Supply Chain Solutions}, volume={103}, DOI={10.1108/02635570310463429}, number={2}, journal={Industrial Management & Data Systems}, author={Sahay, B. S. and Gupta, A. K.}, year={2003}, pages={97–110} }
@article{Seddon_2010, title={A Multi-Project Model of Key Factors Affecting Organizational Benefits From Enterprise Systems}, volume={34}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=50036083&site=ehost-live}, number={2}, journal={MIS Quarterly}, author={Seddon, Peter B.}, year={2010}, pages={305-A11} }
@misc{Shacklett_2016, title={10 IT Basics That Business Managers Need to Know | TechRepublic}, url={https://www.techrepublic.com/blog/10-things/10-it-basics-that-business-managers-need-to-know/}, author={Shacklett, Mary E}, year={2016}, month={Apr} }
@misc{Shaw_2011, title={Web 3.0 Gives Business Smarter Infrastructure | Baseline}, url={http://www.baselinemag.com/c/a/Intelligence/Web-30-Gives-Business-Smarter-Infrastructure-576336}, author={Shaw, Tony}, year={2011}, month={Apr} }
@article{Shein_2015, title={Companies Proactively Seek Out Internal Threats}, volume={58}, DOI={10.1145/2820423}, number={11}, journal={Communications of the ACM}, author={Shein, Esther}, year={2015}, pages={15–17} }
@article{Shi_1996, title={A Consensus Ranking for Information System Requirements}, volume={4}, DOI={10.1108/09685229610114169}, number={1}, journal={Information Management & Computer Security}, author={Shi, Yong}, year={1996}, pages={10–18} }
@book{Silberschatz_Korth_Sudarshan_2011, address={New York}, edition={6th Edition}, title={Database System Concepts}, publisher={McGraw-Hill}, author={Silberschatz, Abraham and Korth, Henry F. and Sudarshan, S.}, year={2011} }
@article{Sircar_2001, title={Revolution or Evolution? a Comparison of Object-Oriented and Structured Systems Development Methods.}, volume={25}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6406420&site=ehost-live}, number={4}, journal={MIS Quarterly}, author={Sircar, Sumit}, year={2001}, pages={457–471} }
@article{Smith_2002, title={Managing Your IT Total Cost of Ownership.}, volume={45}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11934594&site=ehost-live}, number={1}, journal={Communications of the ACM}, author={Smith, Julie}, year={2002}, pages={101–106} }
@article{Smith_2015, title={Protecting Privacy in an IoT-Connected World.}, volume={49}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=110923673&site=ehost-live}, number={6}, journal={Information Management Journal}, author={Smith, Michael S.}, year={2015}, pages={36–39} }
@article{Soliman_2003, title={ASPs: Do They Work?}, volume={20}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11015720&site=ehost-live}, number={4}, journal={Information Systems Management}, author={Soliman, Khalid}, year={2003}, pages={50–57} }
@article{Solitander_Solitander_2010, title={The Sharing, Protection and Thievery of Intellectual Assets}, volume={48}, DOI={10.1108/00251741011014445}, number={1}, journal={Management Decision}, author={Solitander, Maria and Solitander, Nikodemus}, year={2010}, pages={37–57} }
@article{Stahl_2011, title={Teaching Ethical Reflexivity in Information Systems: How to Equip Students to Deal With Moral and Ethical Issues of Emerging Information and Communication Technologies}, volume={22}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=69713592&site=ehost-live}, number={3}, journal={Journal of Information Systems Education}, author={Stahl, Bernd Carsten}, year={2011}, pages={253–260} }
@article{Subramanian_2009, title={Balancing Four Factors in System Development Projects}, volume={52}, DOI={10.1145/1562764.1562794}, number={10}, journal={Communications of the ACM}, author={Subramanian, Girish H.}, year={2009}, pages={118–121} }
@article{Susarla_2003, title={Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction With Asp Services}, volume={27}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9284305&site=ehost-live}, number={1}, journal={MIS Quarterly}, author={Susarla, Anjana}, year={2003}, pages={91–123} }
@misc{Thrasher_2013, title={What is RFID Used for in the Real World? | RFIDinsider}, url={http://blog.atlasrfidstore.com/what-is-rfid-used-for-in-applications}, author={Thrasher, James}, year={2013}, month={Aug} }
@article{Utterback_Acee_2005, title={Disruptive Technologies: An Expanded View}, volume={9}, DOI={10.1142/S1363919605001162}, number={1}, journal={International Journal of Innovation Management}, author={Utterback, James M. and Acee, Happy J.}, year={2005}, pages={1–17} }
@article{Wall_2019, title={‘I’m 57 and My Parents Have to Feed Me’: The Universal Credit Digital Obstacle Course}, url={https://www.theguardian.com/society/2019/mar/18/57-parents-feed-me-universal-credit-digital-obstacle-course}, journal={Guardian}, author={Wall, Tom}, year={2019}, month={Mar} }
@book{Wallace_2015a, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015b, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015c, address={Boston}, edition={Second edition}, title={Introduction to information systems}, url={https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=18567913870002671&institutionId=2671&customerId=2670}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015d, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015e, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015f, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015g, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015h, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015i, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015j, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015k, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015l, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015m, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015n, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015o, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015p, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015q, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015r, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015s, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015t, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015u, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@inbook{Wallace_2015v, address={Boston}, edition={Second edition}, title={Project Management and Strategic Planning}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5176483}, booktitle={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015w, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015x, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015y, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5176483}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@book{Wallace_2015z, address={Boston}, edition={2nd Edition}, title={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@inbook{Wallace_2015aa, address={Boston}, edition={Second edition}, title={Knowledge Management and E-Learning}, url={https://ebookcentral-proquest-com.ezproxy01.rhul.ac.uk/lib/rhul/detail.action?docID=5176483}, booktitle={Introduction to Information Systems}, publisher={Pearson}, author={Wallace, Patricia M.}, year={2015} }
@article{Wang_2013, title={Social Influence and Knowledge Management Systems Use: Evidence From Panel Data}, volume={37}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85634571&site=ehost-live}, number={1}, journal={MIS Quarterly}, author={Wang, Yinglei}, year={2013}, pages={299–313} }
@article{Wang_Meister_Gray_2013, title={Social Influence and Knowledge Management Systems Use: Evidence From Panel Data}, volume={37}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=85634571&site=ehost-live}, number={1}, journal={MIS Quarterly}, author={Wang, Yinglei and Meister, Darren B. and Gray, Peter H.}, year={2013}, pages={299–313} }
@article{Watson_2006, title={Real-Time Business Intelligence: Best Practices at Continental Airlines}, volume={23}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=19141701&site=ehost-live}, number={1}, journal={Information Systems Management}, author={Watson, Hugh J.}, year={2006}, pages={7–18} }
@misc{Weinberg_2021, title={Business Continuity and Disaster Recovery Planning: The Basics | CSO Online}, url={http://www.csoonline.com/article/2118605/disaster-recovery/pandemic-preparedness-business-continuity-and-disaster-recovery-planning-the-basics.html}, author={Weinberg, Neal}, year={2021}, month={Mar} }
@article{Woodcock_2011, title={Social CRM as a Business Strategy}, volume={18}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60097258&site=ehost-live}, number={1}, journal={Journal of Database Marketing & Customer Strategy Management}, author={Woodcock, Neil}, year={2011}, pages={50–64} }
@article{Wulf_Jarke_2004, title={The Economics of End-User Development}, volume={47}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=14376975&site=ehost-live}, number={9}, journal={Communications of the ACM}, author={Wulf, Volke and Jarke, Matthias}, year={2004}, pages={41–42} }
@misc{Top 5 Reasons ERP Implementations Fail and What You Can Do About It_2013, url={https://cdn2.hubspot.net/hub/52892/file-345156864-pdf/docs/Top_5_Reasons_ERP_Implementations_Fail.pdf}, publisher={Ziff Davis}, year={2013} }
@misc{The Digital Enterprise | McKinsey_2013, url={https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/the-digital-enterprise}, year={2013}, month={Nov} }
@misc{World Development Report 2016 - Main Message: Digital Dividends_2016, url={http://pubdocs.worldbank.org/en/155841452690992989/WDR2016MainMessages-ENGLISH-WebRes.pdf}, year={2016} }
@misc{World Investment Report 2017 - Chapter IV: Investment and Digital Economy_2017, url={https://unctad.org/en/PublicationChapters/wir2017ch4_en.pdf}, year={2017}, pages={156–220} }
@misc{Knowledge Workers - Who They Are and What They Do | CFI_2022, url={https://corporatefinanceinstitute.com/resources/knowledge/other/knowledge-workers/}, year={2022}, month={Dec} }
@misc{Insights & Publications | McKinsey & Company, url={http://www.mckinsey.com/insights} }
@misc{FOLDOC - Computing Dictionary, url={http://foldoc.org/} }
@misc{Computer Glossary, Computer Terms - Technology Definitions and Cheat Sheets from WhatIs.com - The Tech Dictionary and IT Encyclopedia, url={http://whatis.techtarget.com/} }
@misc{Information Management | IT Business News, url={https://web.archive.org/web/20210602202347/https://www.information-management.com/} }
@misc{The Nature of Tech: Digital Business Automation | YouTube, url={https://www.youtube.com/watch?v=_UtVvdetCVQ} }
@misc{SAP Digital Business Services: How do you become an intelligent enterprise? | YouTube, url={https://www.youtube.com/watch?v=okM4ym_Tmfc} }
@misc{The US Open is powered by the IBM Cloud | YouTube, url={https://www.youtube.com/watch?v=izTQwUpLXSU} }
@misc{DIGITAL SKILLS for the UK ECONOMY: A Report by ECORYS UK, url={https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/492889/DCMSDigitalSkillsReportJan2016.pdf}, publisher={Department for Business & Skills, Department for Culture Media & Sport} }
@misc{7 Reasons Why You Should Learn How to Use Excel, url={https://www.activia.co.uk/blog/seven-reasons-why-you-should-learn-how-to-use-excel} }
@misc{R0305B.qxd - ITDoesntMatter.pdf, url={https://www.classes.cs.uchicago.edu/archive/2014/fall/51210-1/required.reading/ITDoesntMatter.pdf} }
@misc{Semantic Web | W3C, url={https://www.w3.org/standards/semanticweb/} }
@misc{Cloud Computing News - IaaS, SaaS, PaaS, Data Security, CIO, Analysis - Cloud Tech News, url={http://www.cloudcomputing-news.net/} }
@misc{DSDM Consortium, url={https://web.archive.org/web/20160304231401/https://www.dsdm.org/} }
@misc{Association for Project Management | The Professional Body for Project Management, url={https://www.apm.org.uk/} }
@misc{PMI | Project Management Institute, url={http://www.pmi.org/} }
@misc{2015 Cost of Cyber Crime Study: United Kingdom, url={https://web.archive.org/web/20160207182639/http://cybersecuritysummit.co.uk/wp-content/uploads/2015/06/2015-UK-CCC-FINAL-3.pdf} }
@misc{2017 Cost of Cyber Crime Study | Accenture - Accenture-2017-CostCyberCrimeStudy.pdf, url={https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf} }
@misc{State of Cybersecurity: Implications for 2015, url={http://www.isaca.org/cyber/Documents/State-of-Cybersecurity_Res_Eng_0415.pdf} }
@misc{Understanding Distributed Denial of Service Attacks | YouTube, url={https://www.youtube.com/watch?v=NogCN78XN2w#action=share} }
@misc{The Digital Divide | Politico, url={https://www.politico.com/agenda/issue/the-digital-divide} }