Verified Document

Big Data Annotated Bibliography Annotated Bibliography

Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes.

Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/

The article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. The article shows the significant effects the data breach has to the organizations involved and their consumers. As such, it recommends on the need for the adoption of effective strategies aimed at protecting the organizations from breach of data, hence, the relevance of the big data.

Author Notes: Siakali writes on issues related to data security and data privacy.

Thompson,...

(2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
Thompson takes an in-depth analysis of the escalating data breaches across the world and their associated legal implications. She takes a specific focus on the legal implications of data breaches alongside the encryption technology, information security, and methods of preventing data breaches. The fact that the author uses information from different organizations hit by data breaches in the past forms the strength of the author's work. The book is important for the study because it provides insights into different issues related to data breach such as methods the hackers use to access the information and ways of preventing data breach in an organization.

Authors Note: Thomson is a senior engineer and private advocate at the CSC. She has published on topics related to data breach prevention and is the vice chair of the American Bar Association (ABA).

Sources used in this document:
Thompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.

Thompson takes an in-depth analysis of the escalating data breaches across the world and their associated legal implications. She takes a specific focus on the legal implications of data breaches alongside the encryption technology, information security, and methods of preventing data breaches. The fact that the author uses information from different organizations hit by data breaches in the past forms the strength of the author's work. The book is important for the study because it provides insights into different issues related to data breach such as methods the hackers use to access the information and ways of preventing data breach in an organization.

Authors Note: Thomson is a senior engineer and private advocate at the CSC. She has published on topics related to data breach prevention and is the vice chair of the American Bar Association (ABA).
Cite this Document:
Copy Bibliography Citation

Related Documents

Big Data Annotated Bibliography
Words: 1473 Length: 4 Document Type: Annotated Bibliography

Zaslavsky is the leader of the Semantic Data Management Science Area (SMSA). He has published more than 300 publications on science and technology. Perera has vast experience in computing and technology as he is a member of the Commonwealth Scientific and Industrial Research Organization alongside publishing numerous journals. Georgakopoulos is the Director of Information Engineering Laboratory. He has published over 100 journals on issues related to science and technology

Bigger Data
Words: 1215 Length: 4 Document Type: Annotated Bibliography

component graded. The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a

Annotated Bibliography Academic Honesty in Nursing Profession
Words: 2041 Length: 4 Document Type: Essay

Academic Honesty in Nursing Profession: Annotated Bibliography Kececi, A., Bulduk, S., Oruc, D. & Celik, S. (2011). Academic Dishonesty among Nursing Students: A Descriptive Study. Nursing Ethics 18(5) 725-733 This cross-sectional, descriptive research's objective is assessment of academic dishonesty in Turkish university-level nursing students. The sample size for this research was 196 students. Data collection employed two instruments, which, on an average, could be completed in about 10 to 15 minutes: 1)

Information Technology -- Annotated Bibliography Information Technology...
Words: 1128 Length: 4 Document Type: Annotated Bibliography

Information Technology -- Annotated Bibliography Information Technology Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33. This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article. Durkee, D.

Annotated Bibliography on Corruption
Words: 1003 Length: 4 Document Type: Essay

Barker, T. (2011). Police ethics: Crisis in law enforcement. Springfield, IL: Thomas. This book deals with problems experienced in law enforcement that demonstrate the inability of police officers to make lawful decisions. Chapter 8 deals specifically with police corruption and identifies three elements that exist in police corruption. The first is, the behave must be forbidden, the second is misuse of officer's position, and third, the reward. Although this chapter offers

Annotated Bibliography for Prisons Conditions
Words: 1321 Length: 3 Document Type: Annotated Bibliography

Aleinikoff, T. (2014). Between National and Postnational: Membership in the United States. Palgrave Macmillan UK, 110-129. http://dx.doi.org/10.1057/9780230554795 This paper focuses on the 'postnational viewpoint' to the American notion of sovereignty and membership. The author defines what postnational viewpoint is and explains it means the view that a universal model of membership is replacing national citizenship and is doing so because it is anchored within deterritorialized concepts of persons' rights. Essentially this

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now