Great Day Fitness Tracking Final Plan
Assignment Content
- During your last week working with Great Day Fitness Tracking, you will create a 9- to 12-page final plan in Microsoft® Word.
Your final plan should:
Explain the relationship between processes and information systems, including a flowchart and a discussion of security ethical concerns. (Week 1)
Describe the plan to select the appropriate hardware and software and the different approaches for managing data. (Week 2)
Explain the benefits of using transaction processing systems, customer relationship systems, and supply chain management. (Week 2)
Describe the potential benefits of using business intelligence. (Week 3)
Describe the information systems plan and potential methodologies. (Week 4)
Describe the used utility and cloud computing services and how these services might replace or augment the initial system design. (Week 6)
Describe a high-level, 3-year strategic plan for your information solution. (Week 6)
Note: You may include graphs, tables, and diagrams in addition to your summaries for each week’s content.
Flowchart for Handling an Online Order
Customer Website
Go to Website
Select Wearable
Tracking Device Style
Is the style
Available?
Customize and Add to
Cart
Finished
Shopping?
Proceed to Checkout
New
Customer?
Create Account
Yes
Yes
Yes
No
No
Login No
Proceed to checkout
Order received
Is payment
OK?
Place Order
Payment information
entered
Verify billing
Information
Payment charged to
customer
Inform customer
No
Originate receipt
Receive receipt
Yes
Percentage of
payment
donated to
charity
No
Running head: HARDWARE, SOFTWARE AND NETWORK REQUIREMENTS
1
HARDWARE, SOFTWARE AND NETWORK REQUIREMENTS 2
Hardware, Software and Network Requirements
Michael Murdock
CIS/568: Information Systems Concepts
Ezam Mohammed
07/20/20
Hardware, Software, and Network Requirements
In technology, some tools are used known as hardware; these are technological tools used to make raw data to be processed data; for instance, mouse, keyboard, monitor, and much more. On the other hand, the software is like programs that are inserted in some of the hardware to turn raw data into processed data. Examples of software are like management information systems and much more (Henneke et al, 2016). Lastly, on the network requirements, these are technological tools that make hardware and software communicate. It is essential for a business or an organization to incorporate the technological tools in all of its daily routines to fasten and ease work. As in this paper, we will focus on the proposal for an excellent day fitness tracking business found by Karen Adams. Karen needs to expand her business in the college’s business incubator through an online platform. Because she believes in technology, she has hired an IT consultant company to help her come up with a good website for her business.
An overview of the top information systems used in business today and how they relate to Karen’s business needs
In the current world of activity that we are in, many organizations or just companies have one primary goal to achieve: reaching through as many customers as possible and becoming the leading business in the market. However, this can only be possible when the firms apply technological tools to aid in the daily business. The use of technological tools in these businesses also lead to the delivery of quality services which are free from errors and even coming up with the best good s that the customers need. These services also make the business very current and are sure of what the customer needs. For instance, there is a need for introduction of the information system in market to help in the communication between the sellers and suppliers, suppliers, and owners and much more in the chain. The information systems can also be used to track the records of product sales, inventory keeping, and much more. Examples of these information systems include the management information system (MIS), transaction processing system (TPS), and executive support systems (ESS), and more.
Description of the relationship between business processes and information systems
In business, business processes are like the activities that take place in a market that are executed by the employees of the company to ensure customer satisfaction. On the other hand, information systems in a company are like the components used in the industry to aid in the communication process among the business process units. Research shows that in an organization, different business processes are found in almost all the departments (Pesé et al, 2017). Due to these numerous business processes, there is a need for the information system to aid in the information passing among the business processes and different departments in the business. As per Karen’s business in concern, the information system’s introduction in the market will bring so much change and increase customer satisfaction. On the other hand, it will really give the employees easy time of communication. This is because the IS will help in providing the relationship between the information of the product and that of the customer’s personal information, type of order placed, when the order is needed, the destination of the law, and much more.
Flowchart for Handling an Online registration
Customer Website
Order acknowledged
Go to Webpage
No
Yes
Yes
No
No
Yes
Done Shopping?
Yes
No
No
Notify client
Part of payment contributed to charity
New Customer?
Select Tracking Device Style needed
Modify and Add to Cart
Originate receipt
Obtain receipt
Payment charged to customer
Is payment OK?
Confirm billing Info
Payment info
Place an Order
Continue to counter
Login
Create Account
Continue to Checkout
Is style Existing?
Areas for information systems (IS) use and security concerns
In Karen’s business the proposed information system will ensure that all he customers’ information are gained and store in the database just right from registration. This will help in the remembering of the customer the next time they visit the website. All the sensitive information about the contacting details and much more will really be kept safe in the database. This will be because it will only be accesses by the authorized persons in the system. On the other hand, to enhance more security, customers will be required to provide their login details like the user name and password to ensure that the accounts details are theirs.
A list of areas of concern for ethical handling of customers’ private information
However, much people consider the use of technological devices a s the best in doing business, it also has its own side effects. These side effects might include inadequate security issues which are considered unethical. As far as Karen’s business is concerned, the main area of ethical concern is the giving out of the customers’ information without their knowledge for personal gain (Gao et al, 2016). This one is considered unethical in all the business and the organizations. However, there are some of the ethical practices that can be employed in a business to guard them against this act. Example of such practices is; coming up with the organization’s ethical standards and making them to be part of the business culture. There can also be other helping practices like always practicing the positive behaviors and making it a culture. All the leaders can also lead in making things happen in the right way without any unethical issue or any misconduct.
References
Gao, P. X., Narayan, A., Karandikar, S., Carreira, J., Han, S., Agarwal, R., … & Shenker, S. (2016). Network requirements for resource disaggregation. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16) (pp. 249-264).
Henneke, D., Wisniewski, L., & Jasperneite, J. (2016, May). Analysis of realizing a future industrial network by means of Software-Defined Networking (SDN). In 2016 IEEE World Conference on Factory Communication Systems (WFCS) (pp. 1-4). IEEE.
Pesé, M. D., Schmidt, K., & Zweck, H. (2017). Hardware/software co-design of an automotive embedded firewall (No. 2017-01-1659). SAE Technical Paper.
2
Running Head:
CRM, SCM, AND TPS
1
CRM, SCM, AND TPS 6
CRM, SCM, AND TPS
Michael Murdock
CIS/568: Information Systems Concepts
Ezam Mohammed
07/27/20
Introduction
Information technology has played a crucial role in today’s business activities. Many businesses today usually have a lot of data that are needed to be stored most securely and confidentially and can easily be accessed since it is readily available. When data are effectively managed then that can always be considered as key organization drivers, the option which a business has of ensuring data security without having unnecessary duplication of data, data redundancy, enabling data backups and consistency with ease of replication has allowed the workflow of many organization to run smoothly on their day to day process of work.
Information systems have allowed many businesses to find a way of handling the internal and external processes that an organization can count daily. By doing so, it can assist the management in making the most appropriate decision that will positively affect the future of the organization. Employees, as well as employers, are also in a position to communicate effectively with the developed information systems that the business is using, the systems put in place in the working process are efficient since the documents which have been stored in different folders are accessed and shared by the employees without them moving physically to get them (Heinrich et al., 2017).
In this paper, we will discuss how Karen, who has minimal experience in information technology systems, can benefit from using the following Informational technology systems in her business. They include; Customer Relationship Management System, Transaction Processing Systems, and Supply Chain Management System, and any other information systems functional areas which can be able to assist her business as a whole which is a Great Day Fitness Tracking.
Customer Relationship Management System (CRM)
For Karen to develop a fitness tracking which very useful, especially in terms of customer relations, a Customer Relationship Management System must always be prepared and incorporated in the work setting. The system will be able to bring a different kind of strategies where the data of customers will be managed and analyzed, so that Karen may be able to find the most appropriate way to practice customer retention, ensure the sales growth are driven forward, and also come up with the best implementation strategy where a system will be personally designed to specifically fit the needs of the client especially in terms of her fitness tracking.
The CRM system will be able to retrieve all forms of data across all platforms so that Karen can keep track of the performance and productivity of the user, after that the information obtained can be used in the problems which affect the client on a personal level. This will her develop a fitness program whose aim will be to ensure the client gets maximum benefit from the program which she would have put in place to assist her client. There normally two types of Customer Relationship Management Systems they include; on the premise CRM system where servers are physically stored inside the premises and the other one is a cloud-based CRM system where the storing of all information are done in the clouds (Sigala, 2018).
If Karen decides to use the on the premise CRM system, then she will be required to purchase the licenses from a business or person who offers cloud services but will also be required to pay an annual cost. Her Great Day Fitness will be in charge of any upgrade that will be needed during that working process. On the other hand, if she opts to use the CRM of a cloud-based, she will be expected to know that the data she will accessing or using will be stored in the virtual server of another company that is off the premise and that she will not have to worry herself of things like maintenance, installation, and service cost. Data security may come up to be a significant concern since the Great Day Fitness will not be in control of the maintenance and data storage. Since the owner of the business does not have more extensive knowledge of information systems, I would recommend that she uses the cloud-based CRM system, which will be more cost-effective, especially to her business.
Supply Chain Management System (SCM)
The SCM has always been in existence for a long time and most used by the retail businesses during their supply chain processes. It usually involves an extensive network of companies, individuals, and technology that are simultaneously connected to ensure advancement in the sales of services and products. An efficient SCM can oversee the company’s product lifecycle from where it’s purchased from the suppliers, then delivered so that it can be sold and until it reaches the consumer’s hands.
An active Supply Chain Management System will be able to decrease the overall cost used by the business hence enabling it to have an increment in the amount of revenue the company acquires. SCM system can benefit Great Day Fitness by ensuring there are analysis and collection of data that will, in turn, be used in estimating and calculating the progress of the customer especially when it comes to their purchase behaviors in things like health product and any other services which the SCM can be able to provide in the future (Giannaki et al., 2019). Karen will be able to practice a just-in-time kind of inventory system where products that are needed will be the once that will be available, therefore reduction of cost, waste, or unnecessary space that would have otherwise been taken by surplus inventory supply.
Transactional Processing System (TPS)
To enable Karen to put up a proper Great Day Fitness Tracking as a consultant I would develop and assist her in implementing a business processing system that will retrieve, modify, and collect the data transactions of the Great Day Fitness Tracking which is a Transactional Processing System. Its aspects include execution, performance measure, reliability, and consistency. Since most of the time, the business will be gathering information from devices of fitness tracking, mobile, and computer devices, it will be crucial for the TPS to implement a processing system that is batch or real-time (Bertaqwa et al., 2020).
In batch processing, the requests are executed at one time without the involvement of the users. This type of information is usually got overtime and then processed at a later date. When the data is obtained on a real-time basis, the results are generally readily and immediately available but not as cost-effective as when using batch processing. Therefore I would recommend Great Day Fitness should use the batch system of processing since it is economical. Backup systems should be implemented most accurately, and if there is a system failure, a recovery process should have been put in place in advance.
Conclusion
Through the implementation of proper technology, Great Day Fitness will benefit immensely, especially if it incorporates the three systems I have highlighted in their working process. The business will be able to have a competitive edge over its competitors since it has adopted the use of modern technology in its working process, the data that Karen will be able to collect from the systems will assist her in developing the most appropriate plans for her clients in terms of fitness program development hence resulting to better services as well as outcomes.
References
Bertaqwa, A. G., Saptawati, G. P., & Widagdo, T. E. (2020). Development of a Generic Transaction Processing System Based on Business Process Metadata. Jurnal Sistem Informasi, 16(1), 1-15.
Giannakis, M., Spanaki, K., & Dubey, R. (2019). A cloud-based supply chain management system: effects on supply chain responsiveness. Journal of Enterprise Information Management.
Heinrich, R., Merkle, P., Henss, J., & Paech, B. (2017). Integrating business process simulation and information system simulation for performance prediction. Software & System Modelling, 16(1), 257-277.
Sigala, M. (2018). Implementing social customer relationship management. International Journal of Contemporary Hospitality Management
INFORMATION SYSTEM 1
INFORMATION SYSTEM 4
Information System
s
Michael Murdock
CIS/568: Information Systems Concepts
Ezam Mohammed
08/03/20
Information System
Technology is changing and advancing each day. The notion of having a robust system that handles all the clients and marketing information has become the top most aspect in the world today. Companies are now venturing into business intelligence systems that enhance their overall performance. The current essay highlights the key requirements that Karen will use in her track fitting business.
The business that Karen is pushing has to be versatile with all technological advancement tools in order to be vibrant in the market. Karen should consider installing business intelligence features in her business for various reasons. First, business intelligence enables any business to effectively analyze and monitor key performance indicators (Ranjan, 2009). This analysis is accomplished using the data analytics feature, Karen could square it out easily with the stakeholders about the performance of her company. In doing so, her business will get a new look and a very sharp analysis that will enhance its position in the market. as a result, this feature will successfully turn the insights into a well-structured action.
Business Intelligence software has the capacity to help companies understand the possible competitors in the market and their trends in business. Karen could easily use this technique to learn more about the moves that the competitors in the market are doing. Besides, new opportunities that are available in the market will be developed in a smooth manner that will enable the business to be vibrant and more decisive. The business will also have another advantage of developing new strategies that help it to grow. These strategies increase the competitiveness of the company across the region. When implementing this software, Karen will experience a new wave in terms of domination in the industry due to the involvement and incorporation of this software.
The business intelligence software will play an important role in establishing employee productivity. It will be easier for Karen to recognize the efforts put across by each employee when doing their schedules. The company will also benefit from optimization of all services. The company will be able to understand the clients and customer needs. Therefore, it will become easier to establish relationship that exists between business to consumer and business to business. Moreover, the business intelligent software will help Karen make informed decisions about her company (Gibson et al. 2004). The decisions made could reflect the prowess of the tracking company in the industry and also indicate the services that need to be added in order to increase the revenue earned.
Another big impact of the business intelligent software is its capacity of helping employees in their specific departments. For instance, in the tracking company Karen could specify the goals and expectations of each department and use the software to check and determine which employee was resourceful in the assigned tasks. The software could also be integrated in different stages while performing different roles. The software is useful to the business when applying data integration. Karen and her business will fully understand the value of moving data with ease. The software could first optimize customer data then followed by employee information before integrating financial data. All these processes will be squared synchronically in order to enhance the capacity of the firm in the industry. Moreover, the decisions made after using this tool will be essential for the growth of the company.
References
Gibson, M., Arnott, D., Jagielska, I., & Melbourne, A. (2004). Evaluating the intangible benefits of business intelligence: Review & research agenda. In Proceedings of the 2004 IFIP International Conference on Decision Support Systems (DSS2004): Decision Support in an Uncertain and Complex World (pp. 295-305). Prato, Italy.
Ranjan, J. (2009). Business intelligence: Concepts, components, techniques and benefits. Journal of Theoretical and Applied Information Technology, 9(1), 60-70.
Information Systems Planning
Michael Murdock
CIS/568: Information Systems Concepts
Ezam Mohammed
08/10/20
Information Systems Planning
Information systems planning is essential in helping the company plan for both long and short term goals.
Information systems will be used by the tracking company to easily collect and share data.
Information systems planning will also help the firm link IT and business aspects.
All IT infrastructure will be a vital force in the business option of the company.
Explain the concept of information systems planning.
Information Systems Planning
The integration of IT and business involves the following;
Identifying challenges and objectives
Planning about the devices to be used during integration
Identifying alternatives of the infrastructure that will be used during the process.
Determining all the priorities.
Drawing operational plan.
Explain the concept of information systems planning.
Development Planning Method
Waterfall
This system requires all the requirements of the system to be defined before the project begins.
Design and development all focus on the requirements tabled before the beginning of the project.
After development, testing is done to ascertain if the requirements were all fulfilled
Agile
All the requirements are treated as a continuous process where all developers are connected in making the whole project a success.
Design, testing and all the project requirements fall into one big ongoing process.
All the tasks are broken into segments commonly referred to as sprints.
Compare at least two development planning methods.
Development Planning Method
Waterfall
Essential in big companies that deal with government projects
Flexibility is paramount.
During the testing process any deficiency ensures that the project returns to the first phase.
After verification, the system undergoes maintenance.
Agile
Suitable for small businesses .
Flexibility and speed in this system is robust.
Responsible teams usually tackle the requirements of each client
Testing is performed periodically while the project is still on.
Compare at least two development planning methods.
Advantages of Waterfall Methodology
It’s the only methodology with a clear structure from beginning to the end.
The end goal is usually determined before the project begins.
Information is transferred successfully
Testing is usually delayed after the project is completed in order to make the system robust.
Making changes to the finished product is usually a hard task thus ensuring the project is successful
Clarify why each planning method is appropriate for new system implementation.
Design
Implementation
Maintenance
Planning
Analysis
Advantages of Agile Methodology
Improved quality
Business value forms the main focus
Transparency is guaranteed
Predictable delivery of the final project
Stakeholder engagement
Focus is made on all users
Clarify why each planning method is appropriate for new system implementation.
Enhanced quality
Transparency
Customer Experience
Predictable
Structured Methodology
Structured methodology will be used by the tracking company to fully accomplish all the projects requirements.
The methodology is selected because of its unique approach.
Structured methodology involves the project being broken down into small phases.
The small phases define the decision tables, data structure diagrams, data flows as well as decision trees.
Select a methodology for designing the information system.
Structured Methodology
Structured methodology involves a single structure that surrounds the system.
The process runs sequentially from the top to the last process in the organizational tree.
The methodology can be used at any time during the project development cycle.
Select a methodology for designing the information system.
Structured Methodology
Structured methodology is usually easier to understand and read.
It uses less effort while developing
It depends on the machine for development
The methodology is user friendly at all times
It is also easier to debug when an issue arises.
Explain the reason for the selected methodology
Structured Methodology
Structured methodology provides planning to the design process.
It is very applicable at any stage of the system development.
The system is usually moderate and consumes less time.
Explain the reason for the selected methodology
Design
Implementation
Maintenance
Planning
Analysis
Outsourcing
Outsourcing is the method to be used to acquire new information systems.
Outsourcing is an essential aspect that will be used to achieve the goals of the company.
New systems acquired via outsourcing are usually robust and efficient.
Address the option to acquire (instead of build in-house) information systems.
Outsourcing
Outsourcing method is efficient due to its low cost.
Outsourcing helps bring new ideas to the firm (Sako 2006).
Outsourcing is a methodology for saving overall time used in the project.
Experts find way to the firm and help build a robust system for the organization.
Address the option to acquire (instead of build in-house) information systems.
Acquisition Tools
Prototyping: A system is build based on the specifications of the users.
Helps users visualize how operational the new system will be (Jarzabek & Huang 1998).
Emphasis is placed on the beginning phases of the project
The model is used to test all the systems and ascertain if they are working successfully.
Identify and discuss the tools that might be used in the acquisition
of a new information system..
Acquisition Tools
CASE Tools: an automated system that will be used to specifically enhance the acquisition process.
It focuses more on long term prospects of the company.
This tool helps in automation of all the products in the system.
It also contains analysis tools that could be efficient in the development stage.
Identify and discuss the tools that might be used in the acquisition
of a new information system..
References
Jarzabek, S., & Huang, R. (1998). The case for user-centered CASE tools. Communications of the ACM, 41(8), 93-99.
Sako, M. (2006). Outsourcing and offshoring: Implications for productivity of business services. Oxford Review of Economic Policy, 22(4), 499-512.
Running Head: SMALL OFFICE AREA NETWORK
1
SMALL OFFICE AREA NETWORK
2
Small Office Area Network
Name
Institution
Factors to consider when choosing appropriate network hardware and software
There are several things to take into consideration before choosing appropriate network hardware and software. First, there will be needed to analyze the network infrastructure to get a rough idea of how many devices, interfaces, or measurement points needed to monitor (Raj & Tolety, 2012). With most network hardware and software, license costs are calculated in accordance with the number of measurement points or the number of network devices to be monitored. The PRTG Network Monitor goes a step further: its license costs are determined solely by the number of measurement points (each measured and monitored value requires one “sensor”). Every PRTG license comes with the software’s full range of features and below are a few more things to consider:
· Will the software run on your operating system?
· Does the software support all the major protocols (SNMP, NetFlow, packet sniffing, etc.)?
· Will the software monitor the vital elements in your network?
· Are you happy with the software’s graphics and charts?
· Do you want a tool with an intuitive user interface or a tool you can configure yourself? For the latter, make sure you or someone at your company has the technical know-how to configure the software.
· Do you need detailed, long-term analyses and statistics?
· Does the manufacturer offer adequate technical support?
Finally, I will make sure the solution I am looking at is compatible with what I want to do and that it has future growth to it; not just a pinpoint solution but a solution that is part of a bigger vision. I do not want to buy a product that does just this one thing and then must buy another product to do something else. Moreover, I will make sure it has interoperability and integration points with some of my bigger infrastructures.
Possible approaches to managing the data for easy access and security
Data security is described as the protection of information from unauthorized access. Therefore, data security is in a focus of attention in recent years, mostly because of the Internet, which opens doors of opportunities for criminals to make use of it (Takabi, Joshi & Ahn, 2010). However, to ensure the security of information one needs to apply a complex set of techniques and solutions to prevent the potential threats that can arise. Even following basic security hygiene significantly reduces the risk (Takabi, Joshi & Ahn, 2010). For me, the preventive measures that I would recommend to take for data protection and management include:
· Back up the data or devices will help to restore the information in case of loss.
– Create long and complex passwords or use password managers that will do it for you.
– Regular software update helps to close the loopholes in outdated software which hackers exploit
– Two-factor authentication is an additional layer for account protection, which is hard to tamper For companies, which are more desirable targets for hackers, there are additional factors to consider, especially if they deal with customer data.
– Network security software protects the workstations from spyware and ensures the company’s data is shared and kept secure.
– Data encryption became a standard tool for storing data safely. It’s one of the cheapest and efficient ways to protect information
– Role-based access technologies limit access to sensitive data. Employees that do not require this data to fulfill duties don’t need to have access to it. Considering the effectiveness of phishing, it could be a great solution
– Hardware-based password management is a new word in the cybersecurity space.
Possible networks that might be used to support business needs
The possible networks that might be used to support business needs include
1. Local Area Network:
Local Area Network is a network that is spread inside a similar area or building. Inside an office, when various devices are associated with data exchange and asset sharing, this may frame a Local Area Network (Shih & Aaboen, 2019). Most of the businesses use LAN for record sharing and the exchange of different business files. When various LANs should be connected, a switch is utilized. The part which gives the real correspondence between devices in LAN is a layer 2 Ethernet switch.
2. Personal Area Network:
This sort of network centers around an individual’s workspace. It comprises of devices, for example, smartphones, tablets, and computers. Single user actualizes this sort of computer network for their simplicity. This network can be established by a computer repair Dallas expert also (Shih & Aaboen, 2019). Numerous users additionally use PAN during their work. Fundamentally, a remote modem is utilized to build up this network. This network has been around for a long while, however, not applied too generally.
3. Wide Area Network:
WAN associates different LANs connected to various networks, within a country or around the globe. You may require a specialist to build up a WAN. WANs have ISP which helps in correspondence in more extensive regions. This is a sort of computer network services that are utilized for giving internet access (Shih & Aaboen, 2019). Devices like, modems and switch are required by the specialists to build up a WAN. WAN uses layer 2 Ethernet, fiber optics, and others for the connection.
4. Wireless Local Area Network:
The network of computers provided within a short area wirelessly is known as WLAN. Through WLAN, portable clients can get to the web easily. No cable is expected to make the connection. The WLAN utilizes passages that go about as network focuses for the customers.
5. Virtual Private Network:
VPN gives secure connectivity to your network. In the VPN, an encrypted passage is set up for an end to end connectivity. Information encryption methods are utilized to make sure about your documents and sensitive information. Numerous organizations that have sensitive information use VPN for information sharing.
6. Metropolitan Area Network:
A huge network utilized in a large land zone is known as the Metropolitan Area Network. This system incorporates various LANs and connections. It is another class of network presented. It can give the network connectivity to an entire city. It comprises of various equipment, devices, and transmission media (Shih & Aaboen, 2019). At the point when various LANs are connected to form a MAN, different assets can be shared through LAN to LAN.
A system diagram with software of my choice showing possible internal connections as well as those between the site and the potential customers
I will try to revamp the business’ networking setup and dedicate a fiber internet 20/20 going into our business building to a simple 5-port switch, which will then be split into 2 Routers. The routers connect to each room via a 24-port switch and patch panel as shown below. Each room will have 2 Ethernet ports and there are roughly 30+ rooms and each client will then have their own router. Furthermore, each room will basically be a separate client, they do not require any networking or printer sharing within the office just a reliable internet connection as shown below.
Source: Shih & Aaboen, 2019
References
Raj, C. R., & Tolety, S. B. (2012, December). A study on approaches to build cross-platform mobile applications and criteria to select appropriate approach. In 2012 Annual IEEE India Conference (INDICON) (pp. 625-629). IEEE.
Shih, T., & Aaboen, L. (2019). The network mediation of an incubator: How does it enable or constrain the development of incubator firms’ business networks?. Industrial Marketing Management, 80, 126-138.
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.