Information Technology Annotated Bibliography
Annotated Bibliography
Cloud Computing and Insider Threats
Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011) A Survey on Security Issues in Cloud Computing. CoRR, abs/1109.5388, 1 -- 15.
This article is very explanatory in nature. This article would serve best in the opening sections of a research paper, such as in the introduction or the historical review. This article has a formal and academic tone; the intention to be informative. Readers who have little to no knowledge in this area would be served well by this article. Furthermore, more advanced readers and more knowledgeable readers would benefit from this article as it is comprehensive and would be favorable for review purposes or purposes of additional research. The article explains with texts and with graphic representations the nature of cloud computing, provides a brief history, and lists implications for use and research. The article is both a conceptual and technical overview of cloud computing.
2. Brown, W., & Nasuti, F. (2005) What ERP systems can tell us about Sarbanes-Oxley. Information Management & Computer Security, 13(4), 311 -- 327.
This article very explicitly falls under the heading of methodology and could also perhaps work in a section of literature review or history of the subject. The paper is a literature review of the policy response to scandals caused by CEOs and CFOs of various organizations....
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now