<p><span>This book provides a standpoint on how to effectively use technology innovation for business intelligence and analytics. It presents an approach that combines cutting-edge technological advancements with practical applications in the business world. The book covers a range of innovative tec
Technology Innovation for Business Intelligence and Analytics (TIBIA): Techniques and Practices for Business Intelligence Innovation (Studies in Big Data, 147)
â Scribed by Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Srinidhi Vasudevan (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 503
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book provides a standpoint on how to effectively use technology innovation for business intelligence and analytics. It presents an approach that combines cutting-edge technological advancements with practical applications in the business world. The book covers a range of innovative technologies and how they can be applied to enhance business intelligence and analytics. It is primarily aimed at professionals in the business field data analysts and students studying subjects. This book is especially beneficial for those who want to grasp and apply the technological trends in making strategic business decisions. Its comprehensive coverage makes it an indispensable resource for anyone, in the intersection of technology and business analytics.
⌠Table of Contents
Contents
Social Media and Digital Transformation in Business
Impact of Social Media Usage on the Effectiveness of Higher Education Institutions: Evidence from India
1 Introduction
1.1 Problem Statement
1.2 Significance of the Study
1.3 Objectives of the Study
2 Literature Review
2.1 Hypothesis Development
3 Methodology
3.1 Research Design and Technique
4 Data Analysis
4.1 Personal Details
4.2 Social Media Usage Details
4.3 Impact of Social Media on Academic Performance
4.4 Relationship Between Age and Impact of Social Media
4.5 Relationship Between Gender and Impact of Social Media
4.6 Relationship Between Educational Status and Impact of Social Media
4.7 Relationship Between Stream of the Study and Impact of Social Media
4.8 Relationship Between Place of Education and Impact of Social Media
4.9 Relationship Between Location of the College/University and Impact of Social Media
4.10 Relationship Between Type of Social Media Using More and Impact of Social Media
4.11 Relationship Between Period of Using and Impact of Social Media
4.12 Relationship Between Frequency of Using and Impact of Social Media
4.13 Relationship Between Type of e-Gadget Using and Impact of Social Media
4.14 Degree of Relationship Between Selected Variables and Impact of Social Media (Correlation Analysis)
4.15 Impact of Social Media (Multiple Regression Analysis)
5 Discussion
5.1 From the Personal Details
5.2 From the Social Media Usage Details
5.3 From the Impact of Social Media on Academic Performance,
6 Conclusion
7 Implications/Future Recommendations
References
Using Machine Learning to Protect Users Accounts in Twitter
1 Introduction
1.1 Problem Statement
1.2 Proposed Solution
2 Literature Review
2.1 Semantic Modeling
3 Methodology
4 Discussion
5 Conclusion
References
Digital Transformation and Disruptive Technologies: Effect of Cloud Computing and Devops on Managing Projects
1 Introduction
2 Literature Review
2.1 Business
2.2 Technology
2.3 Industry
2.4 Society
3 Research Methododology
4 Discussion
5 Conclusion and Recommendation
References
Digital Transformation and Digital Disruption Technologies: The Effect of AI and Machine Learning on Managing Projects
1 Introduction
2 Literature Review
3 Methodology
3.1 SWOT Analysis:
4 Empirical Analysis
5 Disscusion
6 Conclusion
7 Summary
8 Recommendations
References
Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities
1 Introduction
1.1 Available Research and Findings
1.2 Research Objectives
1.3 Design and Contributions
2 Related Work
3 Research Techniques
3.1 Selection of Elementary Studies
3.2 Criteria for Article (Inclusion and Exclusion) Analysis
3.3 Outcome Identification
3.4 Qualitative Assessment
3.5 Data Extraction Process
3.6 Data Analysis
4 Outcomes
5 Analysis and Discussion
6 TNA Cybercrime Future Scope
7 Concluding Remark and Future Work
References
Digitalization in Accounting and Auditing
Business Digitalization in Accounting and Auditing Fields
1 Introduction
2 Literature Review
2.1 eXtensible Business Reporting Language (XBRL)
2.2 Big Data and Enterprise Resource Planning (ERP)
2.3 Blockchain Technology, XBRL, and Audit Confirmations
3 Methodology
4 Empirical Discussion
4.1 Big Data and Enterprise Resource Planning (ERP) Implementation
4.2 Blockchain Technology, XBRL, and Audit Confirmations
5 Discussion
6 Conclusions
7 Recommendations
References
Accountantsâ Perception and Essential Skills on Blockchain Technology
1 Introduction
2 Literature Review
2.1 Types of Blockchain
2.2 Problem Statement and Research Contribution
3 Methodology
4 Empirical Analysis
4.1 Demographic and Descriptive Analysis
4.2 Reliability and Validity
4.3 Discriminant Validity
4.4 Correlation Analysis
4.5 Test of Hypotheses: The Regression Analysis
5 Discussion
6 Conclusion
7 Future Implications and Recommendations
References
Management Accounting Systems and Data Analytics in the United States: Evidence from Apple
1 Introduction
1.1 Job Costing System
1.2 Process Costing Systems
1.3 Hybrid Costing System
1.4 Traditional Costing System
1.5 Activity-Based Accounting System
1.6 Budgeting System
2 Literature Review
2.1 Management Accounting in the USA
2.2 Management Accounting and Data Analytics in the USA
2.3 Challenges in Data Analytics
3 Methodology
4 Research Description
4.1 History of Apple
4.2 Management Accounting in Apple Incorporation
5 Empirical Analysis
6 Discussion
7 Conclusions
References
Accounting Information Systemsâ Control and Security: Do External Auditors Need to Set a Paragraph Within Their Report?
1 Introduction
2 Literature Review
2.1 Introductory Paragraph
2.2 Managementâs Responsibility
2.3 Auditorâs Responsibility
2.4 Auditorâs Opinion
2.5 Signature of the Auditor
2.6 Date of the Audit Report
2.7 Auditorâs Address
2.8 Audit Expectation Gap
2.9 Accounting Information Systems
3 Methodology
4 Empirical Analysis
5 Discussion
6 Conclusions
7 Recommendations
References
Advanced Technologies in Data Analysis and Management
Genetic Algorithm-Based Feature Selection and Self-Organizing Auto-Encoder (Soae) for Snp Genomics Data Classifications
1 Introduction
2 Literature Review
3 Methodology
3.1 SNP Dataset
3.2 Pre-Processing
3.3 Encoding Method
3.4 Feature Selection (FS) by Genetic Algorithm (GA)
3.5 Deep Self-Organizing Auto-Encoder (SOAE)
4 Data Analysis
5 Results and Discussion
6 Conclusion and Future Recomendations
References
An Effect of Big Data Analytics on Pandemic Prevention
1 Introduction
1.1 Applications of Data Analytics in COVID-19
2 Literature Review
2.1 Big Data Analytics Tools
3 Methodology
4 Data Analysis
5 Discussion
5.1 Findings
5.2 Issues
5.3 Sharing Data
5.4 Information Correctness
5.5 Collaboration with Patients
6 Conclusion
References
Data Warehousing for Assisting the Decision Makers
1 Introduction
1.1 Problem Definition
1.2 Proposed Solutions
2 Literature Review
3 Methodology
4 Discussion
5 Conclusion
References
Implementing Machine Learning for the Analysis of Data
1 Introduction
1.1 Problem Definition
2 Literature Review
3 Research Methodology
3.1 Systemic Experimentation
3.2 Controlling for Variance
3.3 Experiments in Machine Learning
4 Conclusions
References
Review of Artificial Intelligence and Machine Learning Recent Advancements
1 Introduction
1.1 Problem Definition
1.2 Proposed Solution
2 Literature Review
3 Research Methodology (Experimental Evaluation)
4 Discussion
5 Conclusions
References
Digital Wallets, E-commerce, and Consumer Perspectives
Evaluation of Purchasers Mentalities When Buying IoT Home Security Devices
1 Introduction
2 Literature Review
3 Research Methodology
4 Data Analysis
4.1 Demographics Analysis
4.2 Descriptive Statistics
4.3 Measurement Model Fit Statistics
4.4 Measurement Model Convergent Validity
5 Discussion
6 Conclusions
References
Digital Wallet System Development and Evaluation
1 Introduction
1.1 Problem Definition
1.2 Research Objective
2 Literature Review
3 Methodology
3.1 Questionnaire Creation
3.2 Pre-test Using a Questionnaire
4 Data Analysis
4.1 State the Design Space
4.2 Interface Evaluation
4.3 Solution Suggested
4.4 Understand the Interaction Design Principles in UX
4.5 Undesirable Aspects Boring: The Website Was not Boring Because It Met All of the Standards in Terms of Operations
5 Results and Discussion
6 Conclusion
7 Future Recommendations
References
Entrepreneurship and Technology Diversification: A Strategy or Desperation? FAM Case Study
1 Introduction
2 Theoretical Framework and Corporate History
2.1 The Promoterâs Profile
3 Literature Review and FAM Case
4 Discussion
4.1 The Case in Hand
4.2 DiversificationâWhat Drives It?
4.3 Current ScenarioâThe GCC
4.4 The Shift Towards Mid-Market Segment
4.5 Asian and Global Developments
4.6 Dubai Realty Trends
4.7 Value Driven Market
4.8 Supply-Led Pricing
4.9 Rentals
Appendix
Entrepreneurship Survey
Diversification
References
Internet of Things (IoT) and the Medical Field
Security Flaws in Medical Wearables Devices Used in Health Care Systems
1 Introduction
1.1 Problem Definition
1.2 Proposed Solution
2 Literature Review
3 Research Methodology
4 Conclusions
References
Evaluation of Ethics and Security Challenges in Internet of Medical Things (IoMT)
1 Introduction
1.1 Problem Statement
2 Literature Review
2.1 Confidentiality
2.2 2Attacks Types in IoMT
3 Methodology
4 Discussion
5 Conclusions
References
Data Protection and Privacy Management for Healthcare Wearable Devices
1 Introduction
1.1 Problem Statement
2 Literature Review
3 Methodology
4 Conclusions
References
Privacy Violation and Information Misuse in the Internet of Medical Things (IoMT)
1 Introduction
1.1 Problem Statement
1.2 Proposed Solutions to Overcome the Issues
2 Literature Review
3 Research Methodology
3.1 Experimental and Theoretical Evaluation
3.2 Data Collection
3.3 Design
4 Analysis
5 Discussion
6 Conclusion
References
IoMT Monitoring Devices: Challenges and Opportunities
1 Introduction
1.1 Problem Definition
1.2 Proposed Solution
2 Literature Review
3 Research Methodology
3.1 Planning the Review
3.2 Defining Research Questions
3.3 Database Search
4 Data Analysis
4.1 Applying Inclusion and Exclusion Criteria
4.2 Synthesizing and Reporting the Results of the Survey
5 Discussion
6 Conclusion
References
Analyzing the Approaches for Discovering Privacy and Security Breaches in Iomt
1 Introduction
1.1 Problem Definition
1.2 Proposed Solution
2 Literature Review
2.1 Initiatives for Improving Technologically Backwardness
2.2 Features in Wearables for Protection of Data Privacy
3 Research Methodology
4 Discussion
5 Conclusion
References
Investigating E-Supply Chain Challenges in The Internet of Medical Things (IoMT)
1 Introduction
1.1 Problem Statement
1.2 Proposed Solution
2 Research Methodology
2.1 Architecture Design of IoMT
3 Discussion
4 Conclusion
References
Investigating Benefits of Using IoT and Its Effect on Our Daily Life
1 Introduction
1.1 Problem Definition
2 Literature Review
3 Research Methodology
4 Conclusion
References
Invistigating Benefits of Digitalized in Home Systems
1 Introduction
1.1 Problem Definition
1.2 Proposed Solution
2 Literature Review
3 Research Methodology
4 Conclusion
References
Investigating Impact of Ethical Considerations on IoMT Medical Devices of UAE Healthcare System
1 Introduction
1.1 Problem Definition
2 Proposed Solution
3 Literature Review
4 Research Methodology
5 Discussion
6 Conclusion and Future Recomendations
References
Analyzing Effect of Cloud Computing on IoMT Applications
1 Introduction
1.1 Problem Statement
1.2 Proposed Solution
2 Literature Review
3 Research Methodology
4 Conclusion and Future Work
References
Data Sharing with a Third-Party Within IoMT Environment: Challenges and Opportunities
1 Introduction
1.1 Problem Statement
1.2 Proposed Solution
2 Literature Review
3 Discussion
4 Conclusion and Future Recommendations
References
Contemporary Security Concerns in IoT-Based Devices with Healthcare System
1 Introduction
2 Literature Review
2.1 Safety Challenges and Solutions
2.2 Safety Challenges and Solutions (Part 2)
3 Methodology
3.1 IBE Scheme
3.2 System and Device Initialization
3.3 Authentication Mechanism with Key Agreement
4 Discussion
5 Conclusion
References
Investigating Contemporary Ethical Issues of Using Blockchain in E-Supply Chain in Internet of Medical Things (IOMT)
1 Introduction
1.1 Problem Definition
1.2 Proposed Solution
2 Literature Review
3 Research MethodologyâAÂ Theoretical Evaluation
4 Discussions
4.1 Q.1 What are the Principal Concerns Involving Healthcare Stakeholders?
4.2 Q.2 What Aspects of the Blockchain are Employed to Address the Problems Found?
5 Conclusions and Future Recommendations
References
Advances of Medical Internet of Things Based Patient Health Monitoring Systems
1 Introduction
1.1 Problem Statement
1.2 Existing System
1.3 Proposed System
1.4 Patient Health Monitoring System
2 Literature Review
3 Research Methodology
4 Discussions
5 Conclusions
References
Investigating the Impact of Ethical Concerns on the Security and Privacy of Medical Devices in the UAE
1 Introduction
1.1 Problems
1.2 Solution
2 Data Analysis
2.1 Cyber Security Threat
2.2 Preparedness of the Middle East
2.3 Cybercrime Threat Analysis
2.4 UAE and U.S.
2.5 Issues in Addressing Cybersecurity
2.6 New UAE Cyber Crime Law
3 Conclusion
References
Employee Empowerment and Organizational Behavior
The Impact of Employee Empowerment and Organizational Citizenship Behavior with Mediating Role of Job Satisfaction at Amman Private Hospitals
1 Introduction
2 Theoretical Framework
2.1 Employee Empowerment
2.2 Organizational Citizenship Behavior
2.3 Job Satisfaction
2.4 Operational Definitions
2.5 Industry Description
3 Literature Review
3.1 Relationship and Impact of Employee Empowerment on Job Satisfaction
3.2 Relationship and Impact of Employee Empowerment on Organizational Citizenship Behavior
3.3 Relationship and Impact of Job Satisfaction on Organizational Citizenship Behavior
3.4 Relationship and Impact of Employee Empowerment on Organizational Citizenship Behavior with Mediating Role of Job Satisfaction
3.5 Problem Statement and Research Gap
3.6 General Research Model
3.7 Research Methodology and Design
3.8 Population, Sample and Unit of Analysis
4 Data Analysis
4.1 Demographic Analysis
4.2 Reliability Analysis
4.3 Exploratory Factor Analysis
4.4 Descriptive Analysis of Research Constructs
4.5 Measurement Model
4.6 Pooled CFA for All Measurement Models of Constructs
4.7 Hypothesis Testing
5 Discussion of the Results
6 Conclusion
7 Recommendations/Limitations
References
Developing Rescue Mobile Application
1 Introduction
1.1 Problem Definition
1.2 Solution Overview
2 Literature Review
2.1 Technological Overview
2.2 Background
3 Research Methodology
4 Discussion
5 Conclusion
References
đ SIMILAR VOLUMES
Content: <br>Chapter 1 What Is Big Data and Why Is It Important? (pages 1â18): <br>Chapter 2 Industry Examples of Big Data (pages 19â59): <br>Chapter 3 Big Data Technology (pages 61â88): <br>Chapter 4 Information Management (pages 89â98): <br>Chapter 5 Business Analytics (pages 99â125): <br>Chapter
<p><b>Unique prospective on the big data analytics phenomenon for both business and IT professionals</b></p><p>The availability of Big Data, low-cost commodity hardware and new information management and analytics software has produced a unique moment in the history of business. The convergence of t
<P>There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms. This book sets its focus on CI based architectures, modeling, case studies and appli
<p>Focusing on the cutting-edge applications of AI cognitive computing from neuromorphic to quantum cognition as applied to AI business analytics, this new volume explores AIâs importance in managing cognitive processes along with ontological modeling concepts for venturing into new business frontie