This paper is an annotated bibliography on four peered reviewed journals which focused on the following areas: Big Data, Business Process Re-engineering, Information Systems in Education and Information Systems Security. As the technological landscape widens, and the requests get more aggressive for security of information, the demand becomes even greater for storage of the vast amount of information that is available. This study aims to look deeper into the areas required and provide a review for each accordingly.
.
Big data needn 't be a big headache: How to tackle mind-blowing amounts of information. (2012). Strategic Direction, 28(8), 22-24.
Had English philosopher Francis Bacon been alive today, he would have changed his famous quote, “knowledge is power” to “knowledge is something of a problem, a headache, certainly a challenge”. On the other hand, he may have stuck by his original quote, because based on the enormity and availability of information, businesses can now use knowledge to gain competitive advantage. The question that is examined by the writer relates to the fact that knowledge may be power, but how do we make sense of it all?
The problem, headache and challenges arise out of the multiple ways that businesses have to collect and store information. Customers are more willing to provide personal information which has become overwhelming. The article shows that the huge quantities of data have acquired the somewhat understated name “big data”. Many giant companies have been caught off guard by the boom in big data (“Big Data needn’t…,” 2012). In order to manage the mind boggling amount of data, businesses have found themselves with options for storage. Some companies have increased the size of their data centre in-house facilities, while others have turned to cloud service use. There are some companies that have decided to outsource their data, but are concerned with the risks that it
References: Big data needn 't be a big headache: How to tackle mind-blowing amounts of information. (2012). Strategic Direction, 28(8), 22-24. Coates, H. (2005). The value of student engagement for higher education quality assurance. Quality in Higher Education, 11(1), 25-36. Choi, C. F. (1997). Business process re-engineering: evocation, elucidation and exploration. Business Process Management Journal, 3(1), 39-63. Cobarsi, J., Bernardo, M., and Coenders, G. (2008). Campus information systems for students: classification in Spain. Campus Wide Information Systems, 25(1), 50-64. Du Preez, D. (2012a). Big data: hands on or hands off? 21 Feb 2012. Computing Feature, (n.d.). Retrieved from http://www.computing.co.uk/ctg/feature/2153789/-hands-hands/page/1 Du Preez, D. (2012b). Companies caught off guard by big data in 2011, says Oracle. 11 Jan 2012. Computing News. (n.d.). Retrieved from http://www.computing.co.uk/ctg/news/2136826/companies-caught-guard-2011-oracle# Grindley, K. (1995), Managing IT at Board Level, Pitman Publishing, London Hammer, M. and Champy, J. (1983). Re-engineering the Corporation-A Manifesto for Business Revolution, Nicholas Brealey. Michavila, F. (2001). La Salida del Laberinto: Crtica Urgente de la Universidad (The Way Out Of the Labyrinth: an Urgent Critique of the University). Editorial Complutense, Madrid. Tryfonas, T., Kiountouzis, E., and Poulymenakou, A. (2001). Embedding security practices in contemporary information systems development approaches. Information Management & Computer Security, 9(4), 183-197.