NOLEGEIN- Journal of Management Information Systems <p><strong>NOLEGEIN- Journal of Management Information Systems </strong>is a peer-reviewed journal and provides a platform to discuss new issues in the area of Business globalization and information technology. The journal also seeks to advance the quality of research by publishing papers introducing or elaborating on Digital Markets and Informational support. It's a biannual journal, started in 2018. </p> MBA Journals (Consortium eLearning Network Pvt Ltd) en-US NOLEGEIN- Journal of Management Information Systems 2581-6810 Revamping Libraries: E-learning and E-resource Management <p>Today’s libraries are successfully focusing on solutions and challenges to redefine education. They embark on digital transformation, interconnection of resources and services, and patron experiences as resilient hubs of knowledge with a global shift in educational platforms. Libraries can improve quality, equity, and accessibility by creating a more effective, flexible, and agile kind of nexus for education. However, libraries must find means to manage access to items available in electronic format and to successfully share as and when necessary if they are to meet the user community's ever- growing needs in the digital environment. This paper focuses on how e- resources can provide e- learning anywhere, anytime, making learning a top priority and exploring more ways to build a robust culture of learning.</p> manjukant Copyright (c) 2023 NOLEGEIN- Journal of Management Information Systems 2023-05-20 2023-05-20 6 1 15 19 A Study on Discount Coupons with Expiry Notification System <p>We all of us are living in a digital world. Everything around us is digitalized and use of digital devices are very common. In this research paper we are going to focus on E-Coupons. As E- commerce business are booming day by day and capturing most of the market as they provide more facilities As compared to traditional market. These E-commerce Websites like Flipkart, Amazon also provides E-Coupons to attract people to make more and more purchases. Most of these Coupons get expired as owners is not interested to buy hence lead to wastage of E-coupons. Whereas many people want to buy but they don’t have E-coupons to get the discounted price. This lead to money and E- coupons wastage from both side seller and buyers. Cpay can solve this issue by providing a platform where a user can buy and sell the coupons anytime from anywhere</p> <p><br /> </p> Zohaib Ahmed Niraj Bhosle Copyright (c) 2023 NOLEGEIN- Journal of Management Information Systems 2023-04-27 2023-04-27 6 1 9 14 Cyber Security Instruments and Methods for Data Safeguard <p>Learning and understanding cyber security how to effectively use it are crucial in current environment, which is dominated by technology and network connections. Nevertheless, working system, crucial lines, if no security is present to protect it. No matter if the organization uses IT or not, it needs to be protected in the same way. With the advancement of modern cyber security technology, the bushwhackers are not behind. They are using more advanced hacking techniques and focusing on the vulnerabilities of many different businesses. Cyber security is essential because organizations in the service, political, fiscal, medical, and economic sectors gather, process, and store enormous amounts of data on PCs and other devices. Crucial information of any kind, including financial data, intellectual property data, specialized data, and other forms of data, may account for a sizeable chunk of that.</p> Pinal Jain Copyright (c) 2023 NOLEGEIN- Journal of Management Information Systems 2023-04-24 2023-04-24 6 1 20 27 Collection Development Policy for Electronic Resources with Special Reference to University Libraries <p>Collection development in university libraries is developed to achieve certain objectives. In which curriculum studies, academic objectives, cooperation in research, etc. are important aspects. In such a situation, the collection development policy has special importance in the collection of text material in university libraries. Currently, the library is working as an information and e-learning center. Today, the collection, storage, processing, and distribution of information in libraries are being done through digital formats. Traditional documents and text content in print and non-print formats are available at university libraries in the form of e-books, e-journals, e-reports, CDs/DVDs, and online databases. The increased use of e-resources in university libraries has given a new shape to the collection and collection development policies. The job of the librarian has altered in the modern era along with changes in collection growth. Providing the desired information to the users with the balance of electronic and print text material within the available budget poses a challenge to the librarians.</p> Ajay Kumar Akash Kumar Singh Copyright (c) 2023 NOLEGEIN- Journal of Management Information Systems 2023-04-24 2023-04-24 6 1 16 19 The Malware Attack equation in Research <p>A comprehensive depiction and significance of organization assurance, its work in neighborhood and computerized handle robbery, and an examination of the reasons behind the climb in cybercrime and their impact are similarly associated with the paper. Finally, the makers give explicit hindrance measures and practical answers for computerized insurance attacks, risks, and shortcomings. While mechanical expertise has an impact to play in decreasing the impact of computerized attacks, the shortcoming lies in human approach to acting and mental tendencies, according to the paper.The wide unbiased of this assessment is to get more to know advanced structure attacks, risks, and shortcomings, which consolidate gear and programming systems, associations, affiliation associations, intranets, and the use of computerized interferences. To accomplish this goal, the paper attempts to figure out the significance of digital stash in network assaults and advanced burglary. It similarly goes into extraordinary length on the reasons behind cybercrime's fast turn of events. While research centers to the risks of mental shortcomings in advanced attacks, interests in definitive tutoring programs give believe that computerized attacks can be directed.</p> SOUMEN CHAKRABORTY Copyright (c) 2023 NOLEGEIN- Journal of Management Information Systems 2023-04-24 2023-04-24 6 1 28 32 Procurement Routes, Supply Chain Management and Building Information Modelling:A Review of Trends and Impacts on the Construction Industry <p>It has been argued that the construction industry is distinct from other industries and must therefore find solutions that align with its peculiarities. Over the last three decades, several reports, primarily Latham (1994) and Egan (1998) have spotlighted systemic issues underlying the construction industry. The construction industry is highly fragmented evidenced by a high level of subcontracting and a lack of integration within supply chains. Poor information management has also been a common thread on most construction projects. The adversarial culture of project stakeholders and low productivity has been repeatedly discussed in the literature. Particularly, in the 1990’s discussions on poor information management, loosely coupled supply chains, and lack of collaboration took center stage. Addressing these issues, given the transformational changes in other industries, has resulted in the drive by the construction industry to proffer alternative methods of procurement and supply chain management centered on Building Information Modelling. This report compares the advantages and disadvantages of the different procurement methods available to construction projects, examines the impact of Building Information Modelling on procurement methods, and also outlines the trends in digitalisation within the built environment and its implications for procurement.</p> Amadi Alolote Copyright (c) 2023 NOLEGEIN- Journal of Management Information Systems 2023-04-07 2023-04-07 6 1 1 9