Developments in Information & Knowledge Management for Business Applications: Volume 2

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book provides practical knowledge on different aspects of information and knowledge management in businesses. For enterprises/businesses those intend to remain prosperous and prolific, it is critically important to share best practices, ensure efficient information flow across company, capturing shared knowledge centrally, and communicate compliance rules, i.e. managing competently information in general. It enables faster and better decisions by helping employees’ to build a strong expertise and by avoiding duplicated projects. Thus, the second volume of this series subline continues to explore different aspects of information and knowledge handling as well as doing business with information. We survey further the key aspects of managerial implications of the informational business. The novel methodologies and practices for the business information processing as well as application of mathematical models to the business analytics and efficient management are examined.

Author(s): Natalia Kryvinska, Aneta Poniszewska-Marańda
Series: Studies in Systems, Decision and Control, 376
Publisher: Springer
Year: 2021

Language: English
Pages: 715
City: Cham

Preface
Contents
Study on Wide-Ranging Ethical Implications of Big Data Technology in a Digital Society: How Likely Are Data Accidents in the COVID-19 Reality?
1 Introduction
2 Views on Big Data Technology
2.1 The Use of Big Data Technology on a Large Scale and Associated Commercial Opportunities
2.2 The Use of Big Data Technology for Managing COVID-19 Pandemic in a Digital Society
3 Views on Big Data Technology
3.1 The Normal Accident Theory and Normal Accidents
3.2 Normal Accidents Associated with Big Data Technology
4 Views on Data Accidents Associated with Big Data Technology
4.1 Systemic Data Accidents
4.2 Noncommercial Data Accidents
4.3 Commercial Data Accidents
4.4 Application of Normal Accident Theory to Real Data Accident Scenarios
4.5 Successful Risk Mitigation Strategies
5 Discussion and Contributions
6 Conclusion
References
Application of Business Rules Mechanism in IT System Projects
1 Introduction
1.1 Objectives and Scope of Work
1.2 Composition of Work
1.3 Review of the Literature
2 The Concept of Business Rules in the Context of Software Development
2.1 Outline of Problems in Creating IT Systems
2.2 Arguments for Finding New Solutions in Software Development
2.3 The Concept of Business Rules
2.4 Business Rules
2.5 Implementation of Business Rules
3 Technological Aspect of Business Concepts
3.1 Business Rules Management Systems
3.2 Repetition of the Algorithm
3.3 Review of Business Rule Management Technologies
4 Design and Operation of a Business Rules Engine on the Example of the JBoss Drools System
4.1 Basic Information About the Drools System
4.2 Managing Business Rules Using the Drools Platform
4.3 Key Operating Mechanisms of Drools Expert
4.4 BRMS Drools—Summary
5 Application of the Corporate Rules Engine in the Design of an IT System
5.1 Problem Presentation
5.2 Requirements for the Proposed System
5.3 Description of the System Architecture
5.4 Identification of Key Processes
5.5 Technologies and Tools Used in the Project
5.6 System Design—Summary
6 Analysis of the Application of the Business Regulatory Force in the IT System
6.1 Description of the User Interface
6.2 Description of the Module for Adding Business Rules
6.3 Analysis of Selected Use Scenarios: Defining Business Rules
6.4 Advantages of Using the Rules Motor in the Created System
6.5 Problems Encountered in Designing System and Application Errors
6.6 Analysis of the Use of the Commercial Rules Engine
7 Summary
References
Data-as-a-Service versus Information-as-a-Service: Critical Differences in Theory, Implementation, and Applicability of Two Growing Cloud Services
1 Introduction
1.1 Relevance
1.2 Goals and Objectives
2 Theoretical and Conceptual Background
2.1 Cloud Computing in General
3 Data Versus Information
4 Data-as-a-Service (DaaS)
4.1 Definition of DaaS
4.2 Distinction
4.3 Characteristics of DaaS
4.4 Suitability of DaaS
4.5 Benefits of DaaS
4.6 Downside/Challenges of DaaS
4.7 Pricing Models
4.8 Examples of Real-World Applications
4.9 Drivers
5 Information-as-a-Service
5.1 Definition
5.2 Distinction
5.3 Characteristics of Information-as-a-Service
5.4 Suitability
5.5 Benefits
5.6 Downsides
5.7 Pricing Models
5.8 Examples of Real-World Applications
5.9 Drivers
6 Comparison of DaaS and IaaS Along Discussed Dimensions
6.1 Criteria for Suitability of the Respective Format
6.2 Summary of the Key Findings
7 Conclusion
7.1 Synopsis
7.2 Further Research
References
Management and Measuring Customer Loyalty in Digital Marketplace—Analysis of KPIs and Influence Factors in CLTV
1 Introduction
1.1 Relevance
2 Theoretical and Conceptual Background
2.1 Customer Relation Management
2.2 Customer Loyalty Program
2.3 Bonus Schemes
2.4 Requirements for the Conception of a Bonus Program
3 Bonus Programs in Austrian, German and Swiss Retail
4 Results Evaluation and Conclusions
References
Cost-Effective Solutions in Cloud Computing Security
1 Introduction
1.1 Relevance
1.2 Goals and Objectives
2 Theoretical and Conceptual Background
2.1 Cloud Computing as a Cost-Effective Solution
2.2 Cloud Computing Services
2.3 Deployment Models in the Cloud
3 Concerns Regarding Cloud Computing and Security
3.1 Challenges in Cloud Computing Security
3.2 Some Major Challenges
3.3 Security Issues in Cloud Services
4 Perspective on Available Solutions
4.1 Security Solutions Available
4.2 Solutions to Privacy and Security Using Cryptography
4.3 Security and Privacy Issues Tackled with Cryptography
5 Models and Methods of Cost Calculations of Security in Cloud
5.1 Encryption Method of Cost Calculation
5.2 The Economic Model of Security Threats
6 Conclusion
6.1 Synopsis
6.2 Further Research
References
Marketing Communication and Its Role in the Process of Creating Rational Awareness of Generation Z Representatives
1 Introduction
2 Materials and Methods
3 Results
3.1 Perception of Contemporary Marketing
3.2 Attitudes Toward Sustainable Product Strategies
3.3 Opinion on Marketing Communication as a Basis for Creating Customer Awareness
4 Discussion and Conclusions
References
How is Data Visualization Shaping Our Life? The Application of Analytics from Google Trends During the Epidemic of COVID-19
1 Introduction
2 Data Visualization and the COVID-19 Epidemic
2.1 What Can Big Data Do for Epidemic Control?
2.2 Big Data of Search Volume Could Guide the Economy and People’s Livelihood
2.3 Case Study:Multiple Applications of Epidemic Control Supported by Big Data in China
3 Methods and Hypothesis
4 Results of Evaluation
5 Conclusion
References
Analysis of the Practices of Financial Intelligence Units (FIUs) and Other Anti-money Laundering Agencies Within EU
1 Introduction
2 Defining the Phenomenon of Money Laundering and Explanation on its Characteristics
2.1 Phases of the Money Laundering Process
2.2 Multicriteria Decision Making Model Within Banks as a Successful Criterion for Risk Elimination of Money Laundering Within the Financial Sector
2.3 Decision Support Systems
2.4 Principles of Banking and Financial Operations, Including Anti Money Laundering Principles as a Part of Modern Private Banking
2.5 Liquidity and Solvency Principles
2.6 Principle of Efficiency
2.7 Profitability Principle
2.8 Anti-money Laundering Principles (I.E. Prevention of Criminal Use of the Banking Institution)
2.9 Harmonization of Banking Principles
3 Multicriteria Decision Making
3.1 Defining Terms in the Problem of Decision Making
3.2 Methods of Multicriteria Analysis
3.3 Combining AHP and TOPSIS Methods in Multi-criteria Evaluation Optimization Investment Benefits of Banks
4 Conclusion
References
Modern Approaches to Leadership Development—An Overview
1 Introduction
2 Modern Approaches to Leadership Development
2.1 Personnel and Leadership Development
2.2 Systematic Approach to Development Programs
2.3 Evaluation of Development Programs
3 Conclusion
3.1 Synopsis
3.2 Further Research
References
Crowdfunding and Uncertain Decision Problems—Applying Shannon Entropy to Support Entrepreneurs
1 Introduction
1.1 Relevance
1.2 Development and Future Expectations in Crowdfunding
2 Theoretical and Conceptual Background
2.1 Triadic Relationship in Crowdfunding
3 Research Method
3.1 Answers of Participants
3.2 First Results
4 Mathematical Decision Function to Analyse the Complex Structures of the Decision Process in Crowdfunding
4.1 Decision Drivers and Decision Aims
4.2 Example of Two Decision Drivers (Determinants for Actors): Time of Realization and Costs of Realization and Mathematical Approach of Their Intensity
4.3 Example to Explain the Intensity and Ranking of Two Decision Drivers in One Decision Aim Based on Probability Theory and Shannon Entropy
5 Conclusion and Further Research
References
The Impact of Electronic Services on Traditional Services
1 Introduction
2 Traditional Services
2.1 Shift in the Economy: The Importance of Services
2.2 Internal Communication Tools
2.3 Service Quality
3 Electronic Services
3.1 Definition of Electronic Services
3.2 Service Quality
3.3 The Long Tail
4 Examples in the Industries
4.1 Traditional Banking Service Versus E-Banking
4.2 Traditional Shopping Service Versus Online Shopping
4.3 Netflix
4.4 Uber
5 Conclusion
References
Use of Digital Technologies in Business in Slovakia
1 Introduction
2 Goal and Methodology
3 Use of Digital Technologies in Doing Business
3.1 Digitization in the Area of Taxes
3.2 Use of Digital Technologies in Financial Services
3.3 Electronic Payment System
3.4 Transactions with Virtual Cryptocurrency
3.5 Crowdfunding
3.6 Insurance Services InsurTech
4 Personal Data Protection
5 Conclusion
References
Business Information Through Choice-Based Conjoint Analysis: The Case of Electric Vehicle Home Charging
1 Introduction
2 Background
2.1 Choice-Based Conjoint Analysis
2.2 Previous Studies
3 Study Design
3.1 Attributes and Levels
3.2 Non-considered Attributes and Prohibited Combinations
3.3 Implementation of the Study
4 Analysis
4.1 Part-Worth Utilities
4.2 Importance of Attributes
4.3 Interaction Effects
5 Market Simulations
6 Conclusion
References
The Combination of “Loft” and “High-Tech” Styles in the Formation of Interior Spaces for IT Companies
1 Historiography of Loft Design and High-Tech Development
1.1 Sources and Historical Aspects of the Emergence of Loft and High-Tech Styles in Design
1.2 Examples of Loft Design with the Implementation of Stylistic Features of High-Tech
1.3 Modern Trends in the Design of Functional Areas of IT Companies
2 Theoretical Provisions of the Combination of Stylish and Constructive Features of the Loft and High-Tech
2.1 Compositional and Constructive Characteristics of the Design in the Loft Style
2.2 Stages of Formation of High-Tech Style and Integration into Other Styles
2.3 Ways of Symbiosis of High-Tech Compositions in Loft Design
3 Provisions of Implementation of Loft and High-Tech Symbiosis in Design of Functional Zones of It Company
3.1 General Requirements for the Design of Interior Spaces for IT Companies
3.2 Types of Integration Zones of Functional Spaces of IT Companies
3.3 Implementation of Concepts Combining Stylistic and Compositional Features of Loft and High-Tech in the Design of IT Companies
4 Conclusion
4.1 Synopsis
References
Is Pillar 3 a Good Tool for Stakeholders in CEE Commercial Banks?
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusion
References
Factors Behind the Long-Term Success in Innovation—In Focus Multinational IT Companies
1 Introduction
1.1 Problem Area
1.2 Research Questions
2 Research Methods
2.1 Analysis of the Number of Patents
2.2 Analysis of Investments into Research and Development
2.3 Analysis of Factors of Corporate Culture in a Chosen Multinational IT Company
2.4 Review of Business Models
2.5 Interview in the IBM Innovation Centre
3 Theory Behind Innovation
3.1 Innovation Explained
3.2 Innovation Process and Innovation Management
4 Number of Patents and Its Connection to Innovation
4.1 Selection of Representative IT Companies for Our Research
5 Analysis of Investments into Research and Its Influence on Innovation
5.1 The Absolute Value of Investments in Research and Development
5.2 R&D of Total Revenue Ratio
6 Business Model and Strategy of Innovative Companies
6.1 Use Case: IBM
6.2 Approach to the Business Model of the Four Selected IT Companies
6.3 Deduction Based on the Analysis of the Business Models
6.4 Connection Between Innovation Management Model and Innovativeness
7 Analysis of the Internal Environment of an Innovative Multinational IT Company
7.1 Corporate Culture
7.2 Survey at IBM
7.3 Innovation Centre
7.4 Deduction from the Interview in the Innovation Centre
7.5 Innovation Hubs
8 Discussion and Conclusion
References
eServices and Gaming Industry—Value-Creating Ecologies as Main Factor for Customer Acceptance of Digital Servitization
1 Introduction
2 Servitization and Gaming Industry
2.1 E-Service Definition
2.2 Classification of eServices
2.3 Servitization of the Game Industry
2.4 eService Systems
2.5 Product-to-Service Transition
3 Servitization and Value Co-creation
3.1 From Supply Chain to Value Ecology
3.2 Value Creation and Co-creation in Value-creating Ecologies
3.3 Value and Value Co-creation in the Game Industry
3.4 Customer-to-Customer Value Co-Creation in the Game Industry
3.5 Development of Ecosystem and Acceptance of Servitization
4 Conclusions
References
Sharing Economy Business Models: Informational Services Innovation and Disruption in Uber and Airbnb
1 Introduction
1.1 Relevance
1.2 Goals and Objectives
2 Theoretical and Conceptual Background
2.1 Sharing Economy and Theoretical Definitions
3 Business Models of the Sharing Economy
4 Uber and Ride Sharing
4.1 Business Model of Uber
4.2 SWOT Analysis of Uber
5 Airbnb and Room Sharing
5.1 Business Model of Airbnb
5.2 SWOT Analysis of Airbnb
6 Conclusion
6.1 Synopsis
References
Safe and Secure Communication between Two Cyber-Physical Systems: A Framework for Security
1 Introduction
1.1 Proposed Framework for Safety and Security of CPS
2 Related Work
3 Proposed Methodology
3.1 Source CPS
3.2 Liveness
3.3 Message Queue Telemetry Transport (MQTT Protocol)
3.4 Controls
3.5 Security
3.6 Targeted CPS
4 Results and Discussion
4.1 LOIC
4.2 Immunity Check
5 Conclusion
References
Investigation the Scope of Social Inequality by Accessing Telecommuting from Home Under Corona Pandemic
1 Introduction
2 Material and Methods
3 Results
3.1 Scope of Home Office with the Start of the COVID-19 Pandemic
3.2 Scope of Social Inequality to Access of Home Office with the Start of the COVID-19 Pandemic
3.3 Inequality Accessing Home Office Prior Time of COVID-19 Pandemic
3.4 Inequality Accessing Home Office Within the Time Frame of COVID-19 Pandemic
4 Discussion
5 Conclusions
References
Building Online Stores Using PHP
1 Introduction
2 Rules for Creating Online Stores
2.1 Advanced Forms
2.2 Responsive Web Design
2.3 Page Structure
2.4 Positioning
2.5 GDPR
2.6 ISO Norms
2.7 Load Balancing
2.8 VAT
2.9 Learn More About Creating Online Stores
3 Analysis of Selected Online Stores
3.1 Characteristics of Selected Industry
3.2 Analysis of the Oponeo.Pl
3.3 Analysis of the Opony.Pl
3.4 Analysis of the 24opony.pl
4 Design and Implementation of the Created Online Store
4.1 Characteristics of the Online Bakery Industry
4.2 Description of the Technologies Used to Design the Online Store
4.3 Construction and Functionality of the Created Website
4.4 Page Characteristics
5 Limitations
6 Summary
References
Information Exchange Platform Based on a Q&A Model
1 Introduction
2 Information Exchange Systems
2.1 Systems Based on a Question-and-Answer Model
2.2 Discussion Forums
2.3 Wiki
2.4 Portals Promoting Popular Posts
2.5 Instant Messaging
2.6 Use of Q&A Systems by Organizations
2.7 Summary
3 Software and Technologies Used for the Implementation of the Practical Part
3.1 Software for the Implementation of the QASystems Platform
3.2 Programming Technologies and Methodologies
3.3 Summary
4 Architecture of the QASystems Platform
4.1 Analysis of the Requirements of the Created Application
4.2 Data Layer Design
4.3 Design of the Logic Layer
4.4 Design of the User Interface Layer
5 Description of the QASystems Application
5.1 Logging in and Registering to the System
5.2 Viewing Questions and Answers
5.3 Adding and Editing Content
5.4 Searching for a Question
5.5 User Data
5.6 Admin Panel
5.7 Summary
6 Conclusions
References