[1] Aayog NITI. (2018). Technology leadership for inclusive growth. http://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf
[2] Abd Elmonem, M. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges ofcloud ERP systems – A systematic literature review. Future Computing and Informatics Journal, 1(1–2), 1–9.
[3] Acar, M. F., Zaim, S., Isik, M., & Calisir, F. (2017). Relationships among ERP, supplychain orientation and operational performance: An analysis of structural equation modeling. Benchmarking: An International Journal. https://www.emerald.com/insight/content/doi/10.1108/BIJ-11-2015-0116/full/html
[4] Albayati, H., Kim, S. K., & Rho, J. J. (2020). Accepting financial transactions usingblockchain technology and cryptocurrency: A customer perspective approach. Technology in Society, 62, 101320.
[5] Albert, E. T. (2019). AI in talent acquisition: A review of AI-applications used inrecruitment and selection. Strategic HR Review, 18(5), 215–221.
[6] Allen, D. G., Mahto, R. V., & Otondo, R. F. (2007). Web-based recruitment: Effects ofinformation, organizational brand, and attitudes toward a Web site on applicant attraction. Journal of Applied Psychology, 92(6), 1696–1708.
[7] Alonso-Monsalve, S., García-Carballeira, F., & Calderón, A. (2018). A heterogeneousmobile cloud computing model for hybrid clouds. Future Generation Computer Systems, 87, 651–666.
[8] Appelbaum, D., Kogan, A., Vasarhelyi, M., & Yan, Z. (2017). Impact of business analytics and enterprise systems on managerial accounting. International Journal of Accounting Information Systems, 25, 29–44.
[9] Banerjee, A. (2018). Blockchain technology: Supply chain insights from ERP.
[10] Battleson, D. A., West, B. C., Kim, J., Ramesh, B., & Robinson, P. S. (2016). Achieving dynamic capabilities with cloud computing: An empirical investigation. European Journal of Information Systems, 25(3), 209–230.
[11] Bendul, J. C., & Blunck, H. (2019). The design space of production planning and control for industry 4.0. Computers in Industry, 105, 260–272.
[12] Bersin. (2018). Talent trends technology disruptions.
[13] Birt, L., Scott, S., Cavers, D., Campbell, C., & Walter, F. (2016). Member checking: A tool to enhance trustworthiness or merely a nod to validation? Qualitative Health Research, 26(13), 1802-1811.
[14] Bleady, A., Ali, A. H., & Ibrahim, S. B. (2018). Dynamic capabilities theory: Pinning down a shifting concept. Academy of Accounting and Financial Studies Journal, 22(2), 1-16.
[15] Bogataj, D., & Bogataj, M. (2019). NPV approach to material requirements planning theory – A 50-year review of these research achievements. International Journal of Production Research, 57(15–16), 5137–5153.
[16] Borges, A. F., Laurindo, F. J., Spínola, M. M., Gonçalves, R. F., & Mattos, C. A. (2020). The strategic use of artificial intelligence in the digital era: Systematic literature review and future research directions. International Journal of Information Management, 102225.
[17] Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101.
[18] Brennan, L., Fry, M.-L., & Previte, J. (2015). Strengthening social marketing research: Harnessing “insight” through ethnography. Australasian Marketing Journal (AMJ), 23(4), 286–293.
[19] Brock, J. K. U., & Von Wangenheim, F. (2019). Demystifying AI: What digital transformation leaders can teach you about realistic artificial intelligence. California Management Review, 61(4), 110-134.
[20] Bugg, K. (2015). Best practices for talent acquisition in 21st-century academic libraries. https://academicworks.cuny.edu/ny_pubs/13/
[21] Cabrera, J. C. B., Sotomayor, G. R. M., & Vinueza, F. A. P. (2016). ERP and economic influence on the development of business. International Journal of Advanced Engineering Research and Science, 3(8), 236825. https://www.neliti.com/publications/236825/erp-and-economic-influence-on-the-development-of-business
[22] Cadden, T., Cao, G., Treacy, R., Yang, Y., & Onofrei, G. (2021, September). Dynamic Capability Theory as a Lens to Investigate Big Data Analytics and Supply Chain Agility. In Conference on e-Business, e-Services and e-Society (pp. 467-480). Springer, Cham.
[23] Caliskan, K. (2020). Data money: The socio-technical infrastructure of cryptocurrency blockchains. Economy and Society, 49(4), 540–561.
[24] Carlini, N., Liu, C., Erlingsson, Ú., Kos, J., & Song, D. (2018). The secret sharer: Evaluating and testing unintended memorization in neural networks. ArXiv:1802.08232.
[25] Carutasu, N., & Carutasu, G. (2016). Cloud ERP implementation. FAIMA Business & Management Journal, 4(1), 31. http://search.proquest.com/openview/1278ab18d21d23e7bed3ea0df676e7ea/1?pq-origsite=gscholar&cbl=2037693
[26] Chang, Y. W. (2020). What drives organizations to switch to cloud ERP systems? The impacts of enablers and inhibitors. Journal of Enterprise Information Management. https://www.emerald.com/insight/content/doi/10.1108/JEIM-06-2019-0148/full/html
[27] Chao, F. (2020). Coping strategies of financial work in the era of artificial intelligence. Journal of Physics, 1682, 1-6.
[28] Charlier, R., & Kloppenburg, S. (2017). Artificial Intelligence is not the future, it is already happening and widely available. https://www.pwc.nl/nl/assets/documents/artificial-intelligence-in-hr-a-no-brainer.pdf
[29] Charmaz, K., & Bryant, A. (2010). Grounded theory. In International encyclopedia of education (pp. 406–412). Elsevier.
[30] Cheng, Y. M. (2020). Understanding cloud ERP continuance intention and individual performance: a TTF-driven perspective. Benchmarking: An International Journal. https://www.emerald.com/insight/content/doi/10.1108/BIJ-05-2019-0208/full/html
[31] Chiu, C. Y., Chen, S., & Chen, C. L. (2017). An integrated perspective of TOE framework and innovation diffusion in broadband mobile applications adoption by enterprises. International Journal of Management, Economics and Social Sciences (IJMESS), 6(1), 14–39.
[32] Chofreh, A. G., Goni, F. A., Klemeš, J. J., Malik, M. N., & Khan, H. H. (2020). Development of guidelines for the implementation of sustainable enterprise resource planning systems. Journal of Cleaner Production, 244, 118655.
[33] Church, K. S., Schmidt, P. J., & Ajayi, K. (2020). Forecast cloudy fair or stormy weather: Cloud computing insights and issues. Journal of Information Systems, 34(2), 23–46. https://meridian.allenpress.com/jis/article-pdf/doi/10.2308/isys-18-037/2446971/10.2308_isys-18-037.pdf
[34] Condomines, J. P., Zhang, R., & Larrieu, N. (2019). Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks, 90, 101–759.
[35] Costache, S., Dib, D., Parlavantzas, N., & Morin, C. (2017). Resource management in cloud platform as a service systems: Analysis and opportunities. Journal of Systems and Software, 132, 98–118.
[36] Cybersecurity & Infrastructure Security Agency (CISA).(2019). Security tip (ST04-001) What is cybersecurity? Retrieved from https://us-cert.cisa.gov/ncas/tips/ST04-001
[37] Das, R., & Kodwani, A. D. (2018). Strategic human resource management: A power based critique. Benchmarking: An International Journal, 25(4), 1213–1231.
[38] Dastin, J. (2018). Amazon scraps secret AI recruiting tool that showed bias against women. https://www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G
[39] Delamore, B., & Ko, R. (2015). Security as a service (SecaaS)—An overview. In The Cloud Security Ecosystem (pp. 187–203). Elsevier.
[40] Deloitte. (2020). Industry 4.0 Is your ERP system ready for the digital era?
[41] Dhamija, P., & Bag, S. (2020). Role of artificial intelligence in operations environment: A review and bibliometric analysis. The TQM Journal, 32(4), 869–896.
[42] Dries, N. (2013). The psychology of talent management: A review and research agenda. Human Resource Management Review, 23(4), 272–285.
[43] Dutt, A., Jain, H., & Kumar, S. (2018). Providing software as a service: A design decision(s) model. Information Systems and E-Business Management, 16(2), 327–356.
[44] Dwork, C., & Pappas, G. J. (2017). Privacy in information-rich intelligent infrastructure. ArXiv:1706.01985.
[45] Egbon, O. K. (2020). Cloud ERP systems challenges and benefits.
[46] EOS Costa Rica. (2019). Why integrating ERP systems into blockchain is a great idea? Retrieved from https://eoscostarica.medium.com/why-integrating-erp-systems-into-blockchain-is-a-great-idea-e384b298a4a8
[47] Erro-Garcés, A. (2019). Industry 4.0: Defining the research agenda. Benchmarking: An International Journal, ahead-of-p(ahead-of-print).
[48] Francis, J. J., Johnston, M., Robertson, C., Glidewell, L., Entwistle, V., Eccles, M. P., & Grimshaw, J. M. (2010). What is an adequate sample size? Operationalising data saturation for theory-based interview studies. Psychology and Health, 25(10), 1229-1245.
[49] Fernando, J. (2021). Return on investment. Retrieved from https://www.investopedia.com/terms/r/returnoninvestment.asp
[50] Fosmark, T., & Arya, H. (2021). Fixed lifecycle policy. Retrieved from https://docs.microsoft.com/en-us/lifecycle/policies/fixed
[51] Frankenfield, J. (2021). Cryptocurrency. Retrieved from https://www.investopedia.com/terms/c/cryptocurrency.asp
[52] Fusch, P. I., & Ness, L. R. (2015). Are we there yet? Data saturation in qualitative research. The Qualitative Report, 20(9), 1408.
[53] Gadamer, H. G. (2008). Philosophical hermeneutics. Univ of California Press.
[54] Gartner Glossary. (2021). Internet of things (iot). Retrieved from https://www.gartner.com/en/information-technology/glossary/internet-of-things
[55] Gartner Glossary. (2021). Platform as a service (PaaS). Retrieved from https://www.gartner.com/en/information-technology/glossary/platform-as-a-service-paas
[56] Gaur, M. (2020a). ERP migration challenges and solution approach for digital transformation to SAP S/4HANA for SAP customers. SSRN Electronic Journal.
[57] Gaur, M. (2020b). Privacy preserving machine learning challenges and solution approach for training data in ERP systems. International Journal of Computer Engineering and Technology. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3679275
[58] Gaur, M., & Mathar, D. (2020). Business transformation challenges & solution approach in SAP ECC & SAP S4HANA system landscape optimization for divestiture driven carve out. International Journal of Computer Engineering and Technology, 11(3). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3639182
[59] Gautam, S. K., & Om, H. (2016). Computational neural network regression model for Host based Intrusion Detection System. Perspectives in Science, 8, 93–95.
[60] Terzo, G. (2017, November 21). Objectives of Corporate Restructuring. Your Business. https://yourbusiness.azcentral.com/objectives-corporate-restructuring-2826.html
[61] GrowthbusinesS. (2017). The rise of the AI recruiter: Is HR tech the next to challenge human intuition? https://www.growthbusiness.co.uk/rise-ai-recruiter-hr-tech-next-challenge-human-intuition-2550350/
[62] Gupta, S., Kumar, S., Singh, S. K., Foropon, C., & Chandra, C. (2018). Role of cloud ERP on the performance of an organization. The International Journal of Logistics Management, 29(2), 659–675.
[63] Gupta, S., Meissonier, R., Drave, V. A., &Roubaud, D. (2020). Examining the impact of Cloud ERP on sustainable performance: A dynamic capability view. International Journal of Information Management, 51, 102028. https://www.sciencedirect.com/science/article/pii/S0268401219308849
[64] Gupta, S., & Misra, S. C. (2016a). Compliance, network, security and the people related factors in cloud ERP implementation. International Journal of Communication Systems, 29(8), 1395–1419.
[65] Gupta, S., & Misra, S. C. (2016b). Moderating effect of compliance, network, and security on the critical success factors in the implementation of Cloud ERP. IEEE Transactions on Cloud Computing, 4(4), 440–451.
[66] Gupta, S., Misra, S. C., Kock, N., &Roubaud, D. (2018). Organizational, technological and extrinsic factors in the implementation of cloud ERP in SMEs. Journal of Organizational Change Management, 31(1), 83–102.
[67] Guy-Cedric, Suchithra R. (2016). A Survey in Top Security Threats in Cloud Computing. International Journal of Engineering Research & Technology (IJERT), 4, (21).
[68] Haig, B. D. (2010). Abductive research methods. In International encyclopedia of education (pp. 77–82). Elsevier.
[69] Heilig, L., Lalla-Ruiz, E., &Voß, S. (2017). Digital transformation in maritime ports: Analysis and a game theoretic framework. NETNOMICS: Economic Research and Electronic Networking, 18(2–3), 227–254.
[70] Helo, P., & Hao, Y. (2021). Artificial intelligence in operations management and supply chain management: An exploratory case study. Production Planning & Control, 1-18.
[71] Hosseini, S., Ivanov, D., &Dolgui, A. (2019). Review of quantitative methods for supply chain resilience analysis. Transportation Research Part E: Logistics and Transportation Review, 125, 285–307.
[72] Hou, C. L., Kuo, C. C., Liu, I. H., & Yang, C. S. (2019). Implementation of an IP management and risk assessment system based on PageRank. In Security with intelligent computing and big-data services (pp. 438–450).
[73] Ibrahim, F., & Hemayed, E. E. (2019). Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review. Computers & Security, 82, 196–226.
[74] Idhammad, M., Afdel, K., &Belouch, M. (2018). Distributed intrusion detection system for Cloud environments based on data mining techniques. Procedia Computer Science, 127, 35–41.
[75] Ijaz, A., Malik, R. K., Lodhi, R. N., Habiba, U., & Irfan, S. M. (2014). A qualitative study of the critical success factors of ERP system: A case study approach. Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management, 2556–2566.
[76] Insights, F. (2018). How AI builds a better manufacturing process.
[77] Iqbal, S., Mat Kiah, M. L., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Raymond Choo, K. K. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.
[78] Iqra Altaf Mattoo. (2017). Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. International Journal of Advanced Research in Computer Science, 8,(2),46-48.
[79] Jacksi, K., Dimililer, N., & Zeebaree, S. R. M. (2015). A survey of exploratory search systems based on LOD resources. http://repo.uum.edu.my/15605/
[80] Jacksi, K., Dimililer, N., & Zeebaree, S. R. M. (2016). State of the art exploration systems for linked data: A review. International Journal of Advanced Computer Science and Applications, 7(11).
[81] Jacksi, K., Zeebaree, S., &Dimililer, N. (2020). Design and implementation of LOD explorer: A LOD exploration and visualization model. Journal of Applied Science and Technology Trends, 1(2), 31–39.
[82] Jayawickrama, U., Liu, S., & Hudson Smith, M. (2016). Empirical evidence of an integrative knowledge competence framework for ERP systems implementation in UK industries. Computers in Industry, 82, 205–223.
[83] Jituri, S., Fleck, B., & Ahmad, R. (2018). Lean OR ERP – A decision support system to satisfy business objectives. Procedia CIRP, 70, 422–427.
[84] Johansson, B., Alajbegovic, A., Alexopoulo, V., &Desalermos, A. (2015). Cloud ERP adoption opportunities and concerns: The role of organizational size. 2015 48th Hawaii International Conference on System Sciences, 4211–4219. IEEE.
[85] Juma, M., & Shaalan, K. (2020). Cyberphysical systems in the smart city: Challenges and future trends for strategic research. In Swarm intelligence for resource management in Internet of things (pp. 65–85). Elsevier.
[86] Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., &Nerur, S. (2018). Advances in social media research: Past, present and future. Information Systems Frontiers, 20(3), 531–558. https://link.springer.com/article/10.1007/s10796-017-9810-y
[87] Katuu, S. (2020). Enterprise resource planning: Past, present, and future. New Review of Information Networking, 25(1), 37–46.
[88] Kenge, R., & Khan, Z. (2020). A research study on the ERP system implementation and current trends in ERP. Shanlax International Journal of Management, 8(2), 34–39.
[89] Kinsella, E. A. (2006). Hermeneutics and critical hermeneutics: Exploring possibilities within the art of interpretation. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 7, No. 3).
[90] Kress. (2018). SOA and Cloud computing.
[91] Kristensen, H. S., &Mosgaard, M. A. (2020). A review of micro level indicators for a circular economy – Moving away from the three dimensions of sustainability? Journal of Cleaner Production, 243, 118531.
[92] Kumar, S. (2019). Artificial intelligence divulges effective tactics of top management institutes of India. Benchmarking: An International Journal. https://www.emerald.com/insight/content/doi/10.1108/BIJ-08-2018-0251/full/html
[93] Kumar, V., & Vidhyalakshmi, R. (2018). Reliability aspect of Cloud computing environment. Springer Singapore.
[94] Lee, A. H., Chen, S. C., & Kang, H. Y. (2020). A decision-making framework for evaluating enterprise resource planning systems in a high-tech industry. Quality Technology & Quantitative Management, 17(3), 319-336.
[95] Lee, H. Y., & Wang, N. J. (2019). Cloud-based enterprise resource planning with elastic model–view–controller architecture for internet realization. Computer Standards & Interfaces, 64, 11–23.
[96] Li, W., Liao, K., He, Q., & Xia, Y. (2019). Performance-aware cost-effective resource provisioning for future grid IoT-Cloud system. Journal of Energy Engineering, 145(5), 04019016.
[97] Li, Z., Chaudhry, S. S., & Zhao, S. (2006). Designing ERP systems with knowledge management capacity. Systems Research and Behavioral Science, 23(2), 191–200.
[98] Lin, H., Yan, Z., & Fu, Y. (2019). Adaptive security-related data collection with context awareness. Journal of Network and Computer Applications, 126, 88–103.
[99] Loukis, E., Janssen, M., &Mintchev, I. (2019). Determinants of software-as-a-service benefits and impact on firm performance. Decision Support Systems, 117, 38–47.
[100] Lutkevich, B. (2021). Intrusion detection system (IDS). Retrieved from https://searchsecurity.techtarget.com/definition/intrusion-detection-system
[101] Madakam, S., M. Holmukhe, R., & Kumar Jaiswal, D. (2019). The future digital work force: Robotic Process Automation (RPA). Journal of Information Systems and Technology Management, 16.
[102] Mahmood, F., Khan, A. Z., & Bokhari, R. H. (2019). ERP issues and challenges: A research synthesis. Kybernetes, 49(3), 629–659.
[103] Mahmood, Z. (2021). Cloud computing technologies for connected digital government.
[104] Marshall, T. E., & Lambert, S. L. (2018). Cloud-based intelligent accounting applications: Accounting task automation using IBM Watson cognitive computing. Journal of Emerging Technologies in Accounting, 15(1), 199–215.
[105] Martinez-Gil, J., Paoletti, A. L., & Pichler, M. (2019). A novel approach for learning how to automatically match job offers and candidate profiles. Information Systems Frontiers, 1–10. https://link.springer.com/content/pdf/10.1007/s10796-019-09929-7.pdf
[106] Mayeh, M., Ramayah, T., & Mishra, A. (2016). The role of absorptive capacity, communication and trust in ERP adoption. Journal of Systems and Software, 119, 58–69. https://www.sciencedirect.com/science/article/pii/S0164121216300565
[107] Melanthiou, Y., Pavlou, F., & Constantinou, E. (2015). The use of social network sites as an e-recruitment tool. Journal of Transnational Management, 20(1), 31–49. https://www.tandfonline.com/doi/abs/10.1080/15475778.2015.998141
[108] Michael Cusumano, (2008 ) “The Changing Software Business: Moving from Products to Services,” IEEE Computer, 41(1), 20–27. 10.1145/1721654.1721667
[109] Michael Fauscette (2013). ERP in the Cloud and the Modern Business https://www.plumsoft.com/wp-content/uploads/2015/06/article10.pdf
[110] Miglani, A., Kumar, N., Chamola, V., &Zeadally, S. (2020). Blockchain for internet of Energy management: Review, solutions, and challenges. Computer Communications, 151, 395–418.
[111] Moll, J., & Yigitbasioglu, O. (2019). The role of internet-related technologies in shaping the work of accountants: New directions for accounting research. The British Accounting Review, 51(6), 100833.
[112] Morris, H. D., Rizza, M. N., Mahowald, R. P., Hayward, D., Jimenez, D. Z., Motai, Y., &Stratis, A. (2016). i-ERP (Intelligent ERP): The new backbone for digital transformation. Industry Development and Models.
[113] Moustakas, C. (1994). Phenomenological research methods. Sage.
[114] Muniswamaiah, M., Agerwala, T., &Tappert, C. (2019). Big data in Cloud computing review and opportunities.
[115] Myers, M. D. (2019). Qualitative research in business and management. Sage. https://books.google.co.in/books?id=hDiqDwAAQBAJ
[116] Narayanan, A., & Shmatikov, V. (2019). Robust de-anonymization of large sparse datasets: A decade later.
[117] Ng, J. K. C., & Ip, W. H. (2003). Web-ERP: The new generation of enterprise resources planning. Journal of Materials Processing Technology, 138(1–3), 590–593.
[118] Onik, M. H., Miraz, M. H., & Kim, C. S. (2018). A recruitment and human resource management technique using blockchain technology for industry 4.0. https://digital-library.theiet.org/content/conferences/10.1049/cp.2018.1371
[119] Opara-Martins, J. (2017). A decision framework to mitigate vendor lock-in risks in cloud (SaaS category) migration. Bournemouth University. http://eprints.bournemouth.ac.uk/29907/
[120] Orosz, I., & Orosz, T. (2017). Software as a service in cloud based ERP change management. 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 000181–000186. IEEE.
[121] Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., &Hoagwood, K. (2015). Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Administration and Policy in Mental Health and Mental Health Services Research, 42(5), 533-544.
[122] Panayiotou, N. A., Gayialis, S. P., Evangelopoulos, N. P., &Katimertzoglou, P. K. (2015). A business process modeling-enabled requirements engineering framework for ERP implementation. Business Process Management Journal. https://www.emerald.com/insight/content/doi/10.1108/BPMJ-06-2014-0051/full/www.omg.org/spec/BPMN/2.0
[123] Pandian, A. P., Palanisamy, R., &Ntalianis, K. (Eds.). (2020). Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing.
[124] Papathanasiou, A., Cole, R., & Murray, P. (2020). The (non-)application of blockchain technology in the Greek shipping industry. European Management Journal, 38(6), 927–938.
[125] Phillips-Wren, G., Doran, R., & Merrill, K. (2016). Creating a value proposition with a social media strategy for talent acquisition. Journal of Decision Systems, 25(sup1), 450–462.
[126] Pulparambil, S., & Baghdadi, Y. (2019). Service oriented architecture maturity models: A systematic literature review. Computer Standards & Interfaces, 61, 65–76.
[127] PWC. (2019). 22nd Annual Global CEO Survey CEOs’ curbed confidence spells caution.
[128] Raines, G. (2018). Cloud computing and SOA.
[129] Rashid, Z. N., Zebari, S. R. M., Sharif, K. H., & Jacksi, K. (2018). Distributed Cloud computing and distributed parallel computing: A review. 2018 International Conference on Advanced Science and Engineering (ICOASE), 167–172. IEEE.
[130] Rashid, Z. N., Zeebaree, S. R. M., &Shengul, A. (2019). Design and analysis of proposed remote controlling distributed parallel computing system over the Cloud. 2019 International Conference on Advanced Science and Engineering (ICOASE), 118–123. IEEE.
[131] Rodeck, D., & Schmidt, J. (2021). What is blockchain? Retrieved from https://www.forbes.com/advisor/investing/what-is-blockchain/
[132] Roger, K., Bone, T., Heinonen, T., Schwartz, K., Slater, J., & Thakrar, S. (2018). Exploring identity: What we do as qualitative researchers. Qualitative Report, 23(3).
[133] Sadeeq, M. A., Zeebaree, S. R. M., Qashi, R., Ahmed, S. H., & Jacksi, K. (2018). Internet of things security: A survey. 2018 International Conference on Advanced Science and Engineering (ICOASE), 162–166. IEEE.
[134] Salam, M. A. (2019). Analyzing manufacturing strategies and Industry 4.0 supplier performance relationships from a resource-based perspective. Benchmarking: An International Journal, ahead-of-p(ahead-of-print).
[135] Salih, A. A., & Abdulrazaq, M. B. (2019). Combining best features selection using three classifiers in intrusion detection system. 2019 International Conference on Advanced Science and Engineering (ICOASE), 94–99. IEEE.
[136] Samiei, E., & Habibi, J. (2020). The mutual relation between enterprise resource planning and knowledge management: A review. Global Journal of Flexible Systems Management, 21(1), 53-66.
[137] SAP. (2020). SAP HANA data anonymization. https://www.sap.com/cmp/dg/crm-xt17-ddm-data-anony/index.html
[138] Saxena, A. K., Sinha, S., & Shukla, P. (2017). General study of intrusion detection system and survey of agent based intrusion detection system. 2017 International Conference on Computing, Communication and Automation (ICCCA), 471–421. IEEE.
[139] Shekhar, S., Chhokra, A. D., Bhattacharjee, A., Aupy, G., & Gokhale, A. (2017). INDICES: Exploiting edge resources for performance-aware Cloud-hosted services. 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), 75–80. IEEE.
[140] Shih, K. H., Hung, H. F., & Lin, B. (2010). Assessing user experiences and usage intentions of m-banking service. International Journal of Mobile Communications, 8(3), 257.
[141] Silverman, D. (2020). Qualitative research. Sage.
[142] Stauffer, J. M., Megahed, A., &Sriskandarajah, C. (2021). Elasticity management for capacity planning in software as a service cloud computing. IISE Transactions, 53(4), 407–424. https://www.tandfonline.com/doi/abs/10.1080/24725854.2020.1810368
[143] Storage Networking Industry Association (SINA).(2021). What is data privacy? Retrieved from https://www.snia.org/education/what-is-data-privacy
[144] Tavana, M., Hajipour, V., &Oveisi, S. (2020). IoT-based enterprise resource planning: Challenges, open issues, applications, architecture, and future research directions. Internet of Things, 11, 100262.
[145] Techopedia. (2021). What does infrastructure as a service (IaaS) mean? Retrieved from https://www.techopedia.com/definition/141/infrastructure-as-a-service-iaas
[146] Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509-533.
[147] Tharam Dillon,; Wu, Chen; Chang, Elizabeth (2010). - Cloud Computing: Issues and Challenges. 24th IEEE International Conference on Advanced Information Networking and Applications. , (0), 27–33. 10.1109/aina.2010.187
[148] Theofanidis, D., &Fountouki, A. (2018). Limitations and delimitations in the research process. Perioperative Nursing, 7(3), 155-163.
[149] Van Esch, P., Black, J. S., &Ferolie, J. (2019). Marketing AI recruitment: The next phase in job application and selection. Computers in Human Behavior, 90, 215–222. https://www.sciencedirect.com/science/article/pii/S0747563218304497
[150] Venkatachalam, N., Fielt, E., Rosemann, M., & Mathews, S. (2012). Small and medium enterprise sources software as a service: A dynamic capabilities perspective. Proceedings of the 16th Pacific Asia Conference on Information Systems (PACIS).
[151] Wang, S., & Chang, J. M. (2002). Privacy-preserving boosting in the local setting. https://arxiv.org/abs/2002.02096
[152] Woollacott, E. (2019). Intelligent ERP: The foundation of digital transformation.
[153] Yi, Q., Xu, M., Yi, S., &Xiong, S. (2020). Identifying untrusted interactive behaviour in Enterprise Resource Planning systems based on a big data pattern recognition method using behavioural analytics. Behaviour & Information Technology, 1–16.
[154] Zadeh, A. H., Sengupta, A., & Schultz, T. (2020). Enhancing ERP learning outcomes through Microsoft dynamics. Journal of Information Systems Education, 31(2), 83–95.
[155] Zeebaree, S. R. M., Shukur, H. M., &Hussan, B. K. (2019). Human resource management systems for enterprise organizations: A review. Periodicals of Engineering and Natural Sciences (PEN), 7(2), 660.
[156] Zhang, Z., & Meddahi, A. (2017). Intrusion prevention and detection in NFV. In Security in network functions virtualization (pp. 157–172). Elsevier.
[157] Zoubeidi, M., Kazar, O., Benharzallah, S., Mesbahi, N., Merizig, A., &Rezki, D. (2020). A new approach agent-based for distributing association rules by business to improve decision process in ERP systems. International Journal of Information and Decision Sciences, 12(1), 1.