Enterprise Resource Planning (ERP) systems are necessary to improve an enterprise's management performance. However, the perception of information technology (IT) professionals about the integration of artificial intelligence (AI) and machine learning with ERP cloud service platforms is unknown. Few studies have examined how leaders can implement AI for strategic management, but no study has qualitatively explored AIs integration in the cloud ERP system. This qualitative phenomenological study explored IT professionals’ perceptions regarding the integration of AI and Supervised-machine (S-machine) learning into cloud service platforms in the enhancement of the cloud ERP system. Two research questions were developed for this study: 1) What are the perceptions of IT professionals regarding the use of an AI model to integrate SaaS and ERP? and 2) What are the perceptions of IT professionals regarding how AI can be integrated in order to enhance the security of using an ERP cloud-based system? Through a hermeneutical lens and a focus on integrating the Application Programming Interface (API), purposive sampling was used to interview five AI experts, three Machine Learning (ML) experts, five Cybersecurity experts, and two Cloud Service Providers provided their lived experiences with AI and S-machine learning. Five main themes emerged, including 1) use of an AI model to integrate SaaS and ERP helped perform work efficiently, 2) challenges for integrating AI into cloud service ERP and SaaS, 3) resources needed to fully implement an AI into cloud-service ERP or SaaS, 4) the best practices for developing and implementing an AI model for ERP and SaaS, and 5) how security of an ERP clouds-based system is optimized by integrating AI. The culmination of these findings has positive implications for individuals and organizations to improve management performance. While this study does not proposal a new theory, this study extends current literature on the application of theories related to technology integration.
Cybersecurity refers to the organizational practices followed by the different multinational companies to defend their computers, servers, mobile devices, and networks from malicious attacks. This data exploitation is usually done by accessing, changing, or destroying sensitive information or hacking the data for money extortion. It applies to systems and mechanisms aimed at stopping unauthorized entry, bugs, and cybercriminal threats to devices, networks, and records. It does not matter how many technologies are emerging to make our life easy; humans are the main vulnerability in every sector. In this chapter, the authors discussed social engineering techniques: how we are being attacked by unknown threats with simple manipulative actions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.