Identifying Technical Requirements for a Mobile Business Analytics Application

This study identifies various technical requirements for business analytics applications designed and optimized for mobile devices. Such applications would enable the mobile workforce to gain business insights regardless of their physical locations. In order for the mobile workforce to be efficient and effective, they need to be able to use the browsers and applications designed specifically for the mobile devices to access data, similar to desktop computers. Based on the research, such factors as online and off-line data analysis capabilities, data visualization capabilities, and security issues appear to be important factors to be addressed carefully by developers.

[1]  Miklos A. Vasarhelyi,et al.  Impact of business analytics and enterprise systems on managerial accounting , 2017, Int. J. Account. Inf. Syst..

[2]  Jin-Young Choi,et al.  Detecting SQL injection attacks using query result size , 2014, Comput. Secur..

[3]  Kyong-Ho Lee,et al.  Extracting logical structures from HTML tables , 2008, Comput. Stand. Interfaces.

[4]  Debabrata Kar,et al.  SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM , 2016, Comput. Secur..

[5]  Kim Hua Tan,et al.  Harvesting big data to enhance supply chain innovation capabilities: An analytic infrastructure based on deduction graph , 2015 .

[6]  Dursun Delen,et al.  Research challenges and opportunities in business analytics , 2018 .

[7]  Gene Schultz ssh Protocol Warning: Using ssh: Do security risks outweigh the benefits? , 2004 .

[8]  Lwin Khin Shar,et al.  Automated removal of cross site scripting vulnerabilities in web applications , 2012, Inf. Softw. Technol..

[9]  M. Pushpalatha,et al.  A survey on various applications of prescriptive analytics , 2020 .

[10]  Daniel J. Power,et al.  Defining business analytics: an empirical approach , 2018 .

[11]  Manik Lal Das,et al.  On the security of SSL/TLS-enabled applications , 2014 .

[12]  Richard Braganza Cross-Site Scripting: Cross-site scripting - an alternative view , 2006 .

[13]  Pall Rikhardsson,et al.  Business intelligence & analytics in management accounting research: Status and future focus , 2018, Int. J. Account. Inf. Syst..

[14]  Tuncay Bayrak,et al.  A Review of Business Analytics: A Business Enabler or Another Passing Fad☆ , 2015 .

[15]  Hao Chen,et al.  Noncespaces: Using randomization to defeat cross-site scripting attacks , 2012, Comput. Secur..

[16]  M. Janssen,et al.  Factors influencing big data decision-making quality , 2017 .

[17]  Kyong-Ho Lee,et al.  Logical structure analysis: From HTML to XML , 2007, Comput. Stand. Interfaces.

[18]  Cui Tao,et al.  Automating the extraction of data from HTML tables with unknown structure , 2005, Data Knowl. Eng..

[19]  Veda C. Storey,et al.  Big data technologies and Management: What conceptual modeling can do , 2017, Data Knowl. Eng..

[20]  In Lee,et al.  Big data: Dimensions, evolution, impacts, and challenges , 2017 .

[21]  Murtaza Haider,et al.  Beyond the hype: Big data concepts, methods, and analytics , 2015, Int. J. Inf. Manag..

[22]  Dimitris Mitropoulos,et al.  SDriver: Location-specific signatures prevent SQL injection attacks , 2009, Comput. Secur..

[23]  Feng Li,et al.  Managing knowledge on the Web - Extracting ontology from HTML Web , 2009, Decis. Support Syst..

[24]  Rajeev Sharma,et al.  Transforming Decision-Making Processes Transforming decision-making processes : a research agenda for understanding the impact of business analytics on organizations , 2017 .