scholarly journals Topics for Your Undergraduate Accounting Information Systems (AIS) Course-An Exploratory Study of Information Technology (IT) Skills and Firm Size

2020 ◽  
Vol 15 (1) ◽  
pp. 58-89
Author(s):  
Leslie Weisenfeld ◽  
Sathasivam Mathiyalakan ◽  
George Heilman

ABSTRACT Given the wide range of technologies that businesses employ, and the rapid changes in technology, it is important to assess periodically the critical IT skills students need to prepare them for the work environment. This study presents results from over 100 practicing accountants regarding the IT skills they feel are most important for an undergraduate AIS course. The top ten IT skills for small firm (SF) respondents, respectively, are: spreadsheets, Microsoft Word, Internet research, Internet, QuickBooks, ensuring privacy, Cloud Computing, preventing and responding to cybercrime, software security, and managing and retaining data. The top ten IT skills for medium-large firm (MLF) respondents, respectively, are: spreadsheets, Internet, Internet research, ensuring privacy, Microsoft Word, preventing and responding to cybercrime, managing and retaining data, file systems, Cloud Computing, and Business Intelligence Tools. While SF respondents perceive QuickBooks and software security are more important, respondents from MLF think file systems and Business Intelligence Tools are more important. When determining AIS course content it is important to include the most relevant IT skills, based on what practice thinks students need, and this study indicates firm size is a factor for some IT skills. Designers of undergraduate AIS courses, therefore, need to consider the importance of the IT skills in conjunction with the size of the firms that will employ their students when selecting topics for inclusion.

Author(s):  
Ramandeep Kaur ◽  
Navpreet Kaur

The cloud computing can be essentially expressed as aconveyance of computing condition where distinctive assets are conveyed as a support of the client or different occupants over the web. The task scheduling basically concentrates on improving the productive use of assets and henceforth decrease in task fruition time. Task scheduling is utilized to allot certain tasks to specific assets at a specific time occurrence. A wide range of systems has been exhibited to take care of the issues of scheduling of various tasks. Task scheduling enhances the productive use of asset and yields less reaction time with the goal that the execution of submitted tasks happens inside a conceivable least time. This paper talks about the investigation of need, length and due date based task scheduling calculations utilized as a part of cloud computing.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
K. A. Fedosiva ◽  
◽  
I. M. Sribna

The article is devoted to the analysis of the Ukrainian market for the spread of cloud technologies, an overview of growth dynamics, application segments and identifies leading companies that offer services using cloud computing. According to the unanimous forecasts of the world’s leading consulting companies, the rapid improvement and spread of cloud computing is now one of the key trends that in the next 5-8 years will significantly affect the global development of not only the IT industry but also business, finance, public administration, medicine, education and many other areas of human life. Prospects for the rapid development of cloud services in Ukraine encourage more careful consideration of the experience of their application in more «mature» markets and identify the main benefits and risks of these technologies in local conditions. People perceive the cloud as a platform only for storage and computing. However, there are many other opportunities that cloud technologies offer with cloud computing. Currently, cloud computing technologies are becoming increasingly popular. The advantages of this technology are obvious: economy, speed, elasticity, versatility of access. In the future, their use will create a powerful information and telecommunications system, which will be a technological solution for the construction and development of new infrastructure in the country. The world’s largest IT vendors (Microsoft, Amazon, Google and others) somehow implement cloud computing services, providing a wide range of opportunities for users. Thus, cloud computing is software and hardware that is available to the user via the Internet (or local network) in the form of a service that allows you to use a user-friendly web interface for remote access to dedicated resources (computing resources, programs and data). Thus, cloud computing is the next stage of information development of mankind.


2019 ◽  
Vol 68 (1) ◽  
pp. 01-07
Author(s):  
Tyler Taylor, Justin Rogers

Video Steganography is a strategy wherein we can conceal a wide range of documents with any extension into a carrying Video document. Right now, are utilizing two fundamental wording that is have host file and carrier file where host file is a hidden file (any sort of record like content document, picture document, and sound/video document) and carrier file must be a video record. The primary inspiration of this paper is to make sure about moving of information by utilizing steganography and cryptography system. It is worried about implanting data in a harmless spread media in a safe and hearty way. Right now expositions we are utilizing Forbidden Zone Data Hiding strategy where no modification is required in have signal range during information hidden procedure. To safely moving the information record, we use video information covering up and utilizing revision limit of rehash gather code with predominance of taboo zone information stowing away. Utilizing this methodology we can likewise stow away and move the enormous video record whose size is bigger than spread record in secure way. The principle favorable position of utilizing video record sequestered from everything data is the additional protection from of the outsider or unintended beneficiary because of the overall multifaceted nature of video contrasted with picture and sound document. I have effectively actualized the proposed system of video information hiding utilizing forbidden zone datahiding strategy (FZDH) on content document, picture record, sound record and video document. The exceptional element is that we can hide the bigger size video record behind the smaller size cover record.


Author(s):  
Anjani Tiwari ◽  
Prof. Jatin Patel ◽  
Dr. Priyanka Sharma

Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.


Author(s):  
Mohammed Radi ◽  
Ali Alwan ◽  
Abedallah Abualkishik ◽  
Adam Marks ◽  
Yonis Gulzar

Cloud computing has become a practical solution for processing big data. Cloud service providers have heterogeneous resources and offer a wide range of services with various processing capabilities. Typically, cloud users set preferences when working on a cloud platform. Some users tend to prefer the cheapest services for the given tasks, whereas other users prefer solutions that ensure the shortest response time or seek solutions that produce services ensuring an acceptable response time at a reasonable cost. The main responsibility of the cloud service broker is identifying the best data centre to be used for processing user requests. Therefore, to maintain a high level of quality of service, it is necessity to develop a service broker policy that is capable of selecting the best data centre, taking into consideration user preferences (e.g. cost, response time). This paper proposes an efficient and cost-effective plan for a service broker policy in a cloud environment based on the concept of VIKOR. The proposed solution relies on a multi-criteria decision-making technique aimed at generating an optimized solution that incorporates user preferences. The simulation results show that the proposed policy outperforms most recent policies designed for the cloud environment in many aspects, including processing time, response time, and processing cost. KEYWORDS Cloud computing, data centre selection, service broker, VIKOR, user priorities


2021 ◽  
Author(s):  
Olena Ponomaryova ◽  
◽  
Sergy Ponomaryiov ◽  

The current problem of transition to the use of "Cloud Computing" in the process of assessing possible use has been reflected in this study. Assessments of the capabilities of cloud services have been conducted, which are part of a group study of cloud computing as a platform for creating a communication environment in the scientific activities of the Free Economic Zone. The essence of the concept of cloud computing is to provide end users with remote dynamic access to services, computing resources and applications via the Internet. The main possibilities and functions of the information space of scientific communications have been considered. In the process of evaluating the possible use of cloud solutions, the main properties, capabilities and characteristics have also been considered. Web-services based on cloud computing technology in terms of meeting the goals of the scientific community have been analyzed. The most widely used and widely used cloud storage services today that can be used to build a research communication platform are cloud infrastructure providers Google, Amazon and Microsoft. When using the capabilities of these services, favorable conditions are created for the translation of all necessary functions into cyberspace. Today, no more than 37% of domestic organizations actually use cloud technologies to optimize their IT infrastructures, although the COVID-19 pandemic has significantly accelerated this process. Experts claim that Cloud Computing opens access to powerful resources, as well as provides a real opportunity to overcome the technological gap that separates Ukraine from more developed countries. With the successful implementation of such a transition, it is possible to organize a platform of communication environment with new features that meet modern requirements for safety and ease of use in scientific activities. Thus, "cloud computing" is a new approach that reduces the complexity of IT systems, through the use of a wide range of efficient technologies, self-managed and available on demand within the virtual infrastructure, as well as consumed as services.


Author(s):  
Asa Romeo Asa ◽  
Harold Campbell ◽  
Johanna Pangeiko Nautwima

This study critically reviews the literature that demonstrates the relevance of knowledge management process and business intelligence, as well as the challenges arising when it comes to organising for innovation in today’s business organisations. Hence, the to attain desired innovation it is important to integrate business intelligence (BI) and knowledge management (KM) for the diffusion of innovation. Hence, importance of integrating business intelligence (BI) and knowledge management (KM) for the diffusion of innovation. Organisations’ innovation dynamics and knowledge processes that lead competitive advantage of organisations are examined. Literature points that many organisations rely on individual employees’ knowledge and skills. As a result, information systems that enable knowledge management (KM) as a critical tool for gaining a competitive advantage (Campbell, 2012). The seminal argument in this study is that knowledge diffusion and knowledge externalities are the main drive of increase in economy. As a result, this is expected to be a win-win value proposition for such organisations integrating business intelligence and knowledge management. However, owing to changing business conditions and the rapidity of technological development, as well as the rising expenses involved with carrying out R&D operations in many of these organisations, maintaining competitive advantage through internal R&D alone is becoming increasingly challenging. The importance of innovation processes and network dynamics in the context of Integrated Knowledge Networks is explored, which provide feasible possibilities for utilising innovation as an interactive process as well as knowledge processes for creating business intelligence in organisations. Due to the challenges of organising for innovation, the organisations figured to rely on “Open innovation” approach to intentionally seek out unique knowledge and information outside of their organisational bounds. This study also discusses the challenges that organisations hurdle on in managing inter-organizational cooperation because of external knowledge sourcing techniques (Campbell, 2009). This is due, in part, to the fact that they span a wide range of organisations, people, and resources, as well as the interactions that exist between them. The creative processes and network dynamics are facilitated by an architecture that blends organisational and technical aspects in Integrated Knowledge Networks. Hence, the study focuses on twofold to sourcing external knowledge in particular: learning from international business environments and corporate venturing strategy for corporate incubators.


Author(s):  
Atta ur Rehman Khan ◽  
Abdul Nasir Khan

Mobile devices are gaining high popularity due to support for a wide range of applications. However, the mobile devices are resource constrained and many applications require high resources. To cater to this issue, the researchers envision usage of mobile cloud computing technology which offers high performance computing, execution of resource intensive applications, and energy efficiency. This chapter highlights importance of mobile devices, high performance applications, and the computing challenges of mobile devices. It also provides a brief introduction to mobile cloud computing technology, its architecture, types of mobile applications, computation offloading process, effective offloading challenges, and high performance computing application on mobile devises that are enabled by mobile cloud computing technology.


2013 ◽  
Vol 4 (4) ◽  
pp. 61-92 ◽  
Author(s):  
Rajendra M. Sonar

Business Intelligence (BI) includes many tools, techniques and technologies. BI processes often involve team of human decision makers and end-users to extract, explore and analyse the data. The results, decisions or models after analysis need to be implemented into operational systems. There can be considerable time delay between business events happening and action taken thus loosing opportunities. Intelligent techniques such as rule-based reasoning and case-based reasoning have been used extensively to address wide range of intelligent tasks including personalisation and recommendation. Some BI tasks can be modelled, automated and delivered through services rather than done on ad-hoc basis. The authors represent a service based approach to BI where a service corresponds to a well defined analytical functionality implemented using intelligent technique(s), filtering techniques or hybrids of them accessing only relevant data from database specifically modelled and designed for such tasks. The authors discuss an application of the approach for a value-added service in mobile domain.


Sign in / Sign up

Export Citation Format

Share Document