A review of strategic decision-making in marketing through big data and analytics DOI Creative Commons

Kikelomo Fadilat Anjorin,

Mustafa Ayobami Raji,

Hameedat Bukola Olodo

и другие.

Computer Science & IT Research Journal, Год журнала: 2024, Номер 5(5), С. 1126 - 1144

Опубликована: Май 13, 2024

This review paper delves into the transformative impact of big data and analytics on strategic marketing decision-making. Examining integration vast datasets analytical tools in strategies highlights how these technological advancements enable a deeper understanding customer behavior, enhance product development, provide competitive edge. The underscores importance data-driven insights formulating personalized critical role predictive prescriptive It addresses challenges ethical considerations associated with usage, emphasizing need for robust governance practices. suggests future research directions, focusing emerging technologies methodologies that could further influence decisions. Keywords: Big Data, Analytics, Strategic Marketing, Data-Driven Decision-Making, Ethical Considerations, Emerging Technologies.

Язык: Английский

Cross-industry frameworks for business process reengineering: Conceptual models and practical executions DOI Creative Commons

Oladapo Adeboye Popoola,

Henry Ejiga Adama,

Chukwuekem David Okeke

и другие.

World Journal of Advanced Research and Reviews, Год журнала: 2024, Номер 22(1), С. 1198 - 1208

Опубликована: Апрель 26, 2024

Cross-industry frameworks for business process reengineering (BPR) have emerged as pivotal tools in enhancing organizational efficiency, agility, and competitiveness across diverse sectors. These amalgamate conceptual models with practical executions to streamline operations, optimize resource allocation, foster innovation. This review delves into the essence of cross-industry BPR, elucidating their underpinnings real-world applications. At core lies recognition that processes transcend sector boundaries, encompassing common elements such customer interactions, supply chain management, operational workflows. Conceptual form foundational framework by articulating key principles, methodologies, best practices BPR initiatives. One prominent model is Business Process Reengineering methodology, which advocates radical redesign rather than incremental improvement processes. approach emphasizes fundamental questioning existing practices, aiming achieve dramatic enhancements quality, satisfaction. Another influential Capability Maturity Model Integration (CMMI), provides a roadmap organizations systematically improve advancing through defined maturity levels. Practical entail translation actionable strategies tailored specific contexts. involves multifaceted analysis, stakeholder engagement, technology integration, change management. analysis entails mapping current workflows, identifying bottlenecks, pinpointing areas optimization. Stakeholder engagement crucial garnering buy-in fostering culture continuous improvement. Technology integration plays role modern initiatives, leveraging digital management (BPM) software, data analytics, robotic automation (RPA) operations enhance decision-making. Moreover, emerging technologies like artificial intelligence (AI) blockchain offer new avenues innovation Change constitutes critical component executions, initiatives often significant transformation. Effective communication, training, leadership support mitigate resistance facilitate smooth transition. Real-world applications exemplify effectiveness driving tangible outcomes. Case studies spanning sectors, including manufacturing, healthcare, finance, retail, demonstrate how leveraged breakthrough improvements cost reduction, In manufacturing sector, instance, companies adopted lean principles production processes, minimize waste, flexibility. led streamlined patient care pathways, reduced administrative burdens, improved clinical Financial institutions loan approval risk, regulatory compliance. Similarly, retailers utilized omnichannel capabilities, personalize experiences. represent potent paradigm transformation today's dynamic landscape. By integrating these empower drive innovation, maintain competitive advantage

Язык: Английский

Процитировано

52

THE STRATEGIC VALUE OF BUSINESS ANALYSTS IN ENHANCING ORGANIZATIONAL EFFICIENCY AND OPERATIONS DOI Creative Commons

Oladapo Adeboye Popoola,

Henry Ejiga Adama,

Chukwuekem David Okeke

и другие.

International Journal of Management & Entrepreneurship Research, Год журнала: 2024, Номер 6(4), С. 1288 - 1303

Опубликована: Апрель 25, 2024

Business analysts play a crucial role in enhancing organizational efficiency and operations by bridging the gap between business needs technological solutions. This review explores strategic value of driving success through effective analysis, communication, stakeholder engagement. act as key facilitators organizations, translating objectives into actionable requirements for technology By conducting thorough analysis processes, systems, data, identify opportunities improvement recommend solutions to enhance operational efficiency. Their extends beyond mere problem-solving; they also pivotal aligning goals with initiatives, ensuring that projects deliver tangible organization. Furthermore, excel communication engagement, acting liaisons units, IT teams, external vendors. ability translate complex technical concepts clear, understandable language enables them facilitate collaboration consensus among diverse stakeholders. skill is particularly valuable Agile environments, where are principles. Moreover, instrumental change transformation. impact assessments, developing management strategies, providing training support, ensure implementations successful sustainable. holistic approach problem-solving their focus on delivering make invaluable assets organizations seeking improve operations. In conclusion, cannot be overstated. unique blend analytical skills, prowess, engagement abilities indispensable success. leveraging expertise analysts, can streamline decision-making, achieve greater effectiveness. Keywords: Strategic Value, Analysts, Enhancing, Organizational Efficiency, Operations.

Язык: Английский

Процитировано

50

CONCEPTUALIZING AGILE DEVELOPMENT IN DIGITAL TRANSFORMATIONS: THEORETICAL FOUNDATIONS AND PRACTICAL APPLICATIONS DOI Creative Commons

Oladapo Adeboye Popoola,

Henry Ejiga Adama,

Chukwuekem David Okeke

и другие.

Engineering Science & Technology Journal, Год журнала: 2024, Номер 5(4), С. 1524 - 1541

Опубликована: Апрель 26, 2024

Agile development has emerged as a prominent approach in digital transformations due to its flexibility and adaptability changing requirements. This review explores the theoretical foundations practical applications of agile context transformations. Theoretical stem from iterative incremental methodologies that prioritize customer collaboration, adaptive planning, continuous improvement. principles, outlined Manifesto, emphasize individuals interactions over processes tools, working software comprehensive documentation, collaboration contract negotiation, responding change following plan. These principles are supported by various frameworks methodologies, such Scrum, Kanban, Extreme Programming (XP), which provide specific practices guidelines for implementing Practical diverse impactful. enable organizations respond quickly market demands needs, allowing faster delivery value-added products services. practices, daily stand-up meetings, sprint retrospective reviews, promote among cross-functional teams foster culture also enhances project transparency stakeholder engagement through regular demonstrations feedback loops, ensuring final product meets expectations. Overall, conceptualization is characterized enabling adapt change, deliver value, collaboration. Understanding underpinnings implications crucial seeking leverage their transformation efforts. Keywords: Conceptualizing, Development, Digital Transformation, Foundations, Applications.

Язык: Английский

Процитировано

38

Security paradigms for IoT in telecom networks: Conceptual challenges and solution pathways DOI Creative Commons

Godwin Nzeako,

Chukwuekem David Okeke,

Michael Oladipo Akinsanya

и другие.

Engineering Science & Technology Journal, Год журнала: 2024, Номер 5(5), С. 1606 - 1626

Опубликована: Май 5, 2024

The concept paper explores the critical security challenges posed by Internet of Things (IoT) in telecom networks and proposes solution pathways to address them. As IoT devices proliferate networks, they introduce new vulnerabilities threats that must be mitigated ensure integrity, confidentiality, availability network resources data. begins highlighting unique devices, including their large attack surface, resource constraints, diverse communication protocols. These are further exacerbated due scale complexity infrastructure. To these challenges, a multi-faceted approach combines technical, organizational, regulatory measures. Technical solutions include use secure protocols, device authentication mechanisms, encryption techniques protect data transit at rest. Organizational measures focus on improving awareness training among operators ensuring development deployment devices. Regulatory advocate for implementation standards regulations promote privacy deployments. also discusses importance collaboration stakeholders, operators, manufacturers, bodies, effectively. By working together, stakeholders can develop implement best practices enhance networks. In conclusion, highlights urgent need robust paradigms deployments within implementing proposed fostering mitigate risks safe Keywords: IoT, Telecom, Networks, Security.

Язык: Английский

Процитировано

34

Advanced risk management solutions for mitigating credit risk in financial operations DOI Creative Commons

Anwulika Ogechukwu Scott,

Prisca Amajuoyi,

Kudirat Bukola Adeusi

и другие.

Magna Scientia Advanced Research and Reviews, Год журнала: 2024, Номер 12(1), С. 212 - 223

Опубликована: Май 29, 2024

Advanced risk management solutions are essential for mitigating credit in financial operations, particularly today's volatile economic environment. This Review explores the innovative approaches and technologies being utilized to enhance safeguard institutions against potential losses. Credit risk, possibility that a borrower will default on their obligations, poses significant threat stability. Traditional methods of assessing managing such as scoring historical data analysis, no longer sufficient address complexities modern markets. offer more robust dynamic tools identifying, assessing, risk. One key advancements this field is integration big machine learning algorithms. By analyzing vast amounts from diverse sources, can gain deeper insights into behavior, market trends, indicators. Machine models predict probabilities with greater accuracy, allowing proactive mitigation strategies. Additionally, real-time monitoring systems have become increasingly prevalent. These provide continuous oversight portfolios, enabling detect early warning signs defaults take timely action. analytics visualization facilitate identification emerging risks implementation targeted interventions. Another crucial component advanced use stress testing scenario analysis. techniques simulate various conditions assess impact helping prepare adverse scenarios develop contingency plans. Furthermore, blockchain technology promising tool enhancing transparency reducing fraud transactions. providing secure immutable record histories transactions, improve trust reliability assessments. In conclusion, transforming way mitigate leveraging data, learning, monitoring, testing, technology, achieve accurate assessments implement effective innovations not only stability resilience operations but also contribute trustworthy system.

Язык: Английский

Процитировано

25

The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions DOI Creative Commons

Darlington Eze Ekechukwu,

Peter Simpa

Computer Science & IT Research Journal, Год журнала: 2024, Номер 5(6), С. 1265 - 1299

Опубликована: Июнь 7, 2024

This study provides a comprehensive examination of cybersecurity within renewable energy systems, highlighting the critical role measures in ensuring sustainability and reliability these systems. With increasing reliance on sources, need for robust frameworks to protect against evolving cyber threats has never been more pressing. Through systematic literature review content analysis, this research identifies prevalent vulnerabilities specific infrastructures, evaluates effectiveness current measures, explores cutting-edge technologies practices field. The methodology encompasses detailed analysis peer-reviewed academic journals, conference proceedings, industry reports, white papers published from 2010 2024. approach facilitates identification gaps proposal strategic solutions address challenges. Key insights reveal significance adopting advanced technologies, such as artificial intelligence machine learning algorithms, enhance threat detection mitigation efforts. concludes with recommendations practitioners policymakers, emphasizing importance proactive posture, collaboration information sharing, investment training, development standards regulations sector. Future directions are suggested further explore innovative assess their implications underscores necessity integrating safeguard future sustainable energy. Keywords: Cybersecurity, Renewable Energy, Cyber Threats, Vulnerabilities, Advanced Cybersecurity Technologies.

Язык: Английский

Процитировано

22

Effective credit risk mitigation strategies: Solutions for reducing exposure in financial institutions DOI Creative Commons

Anwulika Ogechukwu Scott,

Prisca Amajuoyi,

Kudirat Bukola Adeusi

и другие.

Magna Scientia Advanced Research and Reviews, Год журнала: 2024, Номер 12(1), С. 198 - 211

Опубликована: Май 29, 2024

Credit risk remains a critical concern for financial institutions, especially in the context of economic uncertainties and volatile market conditions. This paper examines importance credit mitigation strategies presents solutions reducing exposure institutions. The research focuses on various employed by banks other institutions to manage effectively. begins with an overview its significance banking industry. It discusses types faced including default risk, concentration systemic risk. then highlights impact these risks institutions' balance sheets profitability. Next, explores different used These include diversification portfolios, collateralization loans, derivatives, insurance. advantages disadvantages each strategy provides examples how have been implemented successfully Furthermore, role regulatory authorities overseeing management practices framework compliance requirements mitigating Finally, concludes discussion future emphasizes need continuous innovation adaptation new conditions requirements. also stresses integrating into overall frameworks ensure comprehensive effective approach managing Overall, this valuable insights offers practical serves as useful resource professionals, regulators, policymakers seeking enhance their understanding

Язык: Английский

Процитировано

21

PREDICTIVE ANALYTICS FOR PROACTIVE SUPPORT IN TRAFFICKING PREVENTION AND VICTIM REINTEGRATION DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

и другие.

Engineering Science & Technology Journal, Год журнала: 2024, Номер 5(4), С. 1502 - 1523

Опубликована: Апрель 26, 2024

Human trafficking is a pervasive and complex crime that affects millions of people worldwide. In recent years, there has been growing recognition the need for proactive approaches to prevention victim reintegration. Predictive analytics, data-driven technology uses algorithms analyze patterns predict future outcomes, holds great promise in this regard. This review explores application predictive analytics reintegration, highlighting its potential enhance support victims improve overall outcomes. can play crucial role by identifying trends may indicate activities. By analyzing data from various sources, such as social media, financial transactions, law enforcement records, help identify high-risk areas individuals, enabling agencies NGOs take measures prevent trafficking. For example, vulnerable populations, runaway youth or migrants, target efforts accordingly. context outcomes factors influence victim's likelihood successful reintegration into society. on education, employment, support, interventions are most likely rebuild their lives. types services, housing assistance job training, effective helping reintegrate Overall, revolutionize tailored specific needs victims. However, it important recognize not without challenges, including concerns about privacy ethical implications. Therefore, essential ensure used responsibly accordance with guidelines maximize benefits Keywords: Analytics, Trafficking, Prevention, Victim Reintegration, Systematic Review.

Язык: Английский

Процитировано

20

Trends, insights, and future prospects of renewable energy integration within the oil and gas sector operations DOI Creative Commons

Darlington Eze Ekechukwu,

Peter Simpa

World Journal of Advanced Engineering Technology and Sciences, Год журнала: 2024, Номер 12(1), С. 152 - 167

Опубликована: Май 29, 2024

The integration of renewable energy within the operations oil and gas sector has emerged as a pivotal trend driven by environmental concerns, regulatory pressures, technological advancements. This review explores current trends, key insights, future prospects associated with adoption in sector. Trends indicate notable shift towards incorporating sources such solar, wind, hydrogen into traditional companies. transition is motivated need to reduce carbon emissions, enhance operational efficiency, diversify portfolios alignment sustainability goals. Companies are increasingly investing projects, leveraging their expertise infrastructure capitalize on emerging opportunities Insights gleaned from ongoing initiatives underscore multifaceted benefits integrating operations. By deploying technologies, companies can mitigate impacts, optimize resource utilization, security. Moreover, renewables offers potential cost savings through reduced reliance fossil fuels access government incentives aimed at promoting clean deployment. Looking ahead, appear promising yet challenging. Advancements coupled declining costs, expected accelerate rates drive widespread implementation across industry. However, challenges intermittency, grid integration, limitations pose significant hurdles that must be addressed innovation strategic planning. Furthermore, evolving landscape geopolitical dynamics may influence pace scope Policy frameworks deployment, pricing mechanisms, international agreements climate action likely shape trajectory industry coming years. represents transformative far-reaching implications for corporate strategies. embracing renewables, not only risks but also position themselves long-term competitiveness rapidly landscape.

Язык: Английский

Процитировано

20

VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS DOI Creative Commons

Michael Oladipo Akinsanya,

Cynthia Chizoba Ekechi,

Chukwuekem David Okeke

и другие.

Engineering Science & Technology Journal, Год журнала: 2024, Номер 5(4), С. 1452 - 1472

Опубликована: Апрель 26, 2024

Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. This concept paper provides comprehensive review of security protocols used VPNs and their application modern The begins by defining explaining importance securing data transmission untrusted It then discusses the evolution VPN technology, highlighting transition from traditional IPSec SSL/TLS to more approaches such as WireGuard QUIC. also examines VPNs, including IPSec, SSL/TLS, newer like Each protocol is analyzed terms its features, performance, suitability for different use cases. Furthermore, explores networks, remote access, site-to-site connectivity, cloud-based services. challenges considerations involved deploying managing today's complex network environments. In conclusion, emphasizes highlights need organizations carefully evaluate requirements choose appropriate technologies protect Keywords: VPN, Security, Applications, Network.

Язык: Английский

Процитировано

19