Verified Document

Information Technology Annotated Bibliography Annotated Bibliography Cloud Annotated Bibliography

Information Technology Annotated Bibliography Annotated Bibliography

Cloud Computing and Insider Threats

Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011) A Survey on Security Issues in Cloud Computing. CoRR, abs/1109.5388, 1 -- 15.

This article is very explanatory in nature. This article would serve best in the opening sections of a research paper, such as in the introduction or the historical review. This article has a formal and academic tone; the intention to be informative. Readers who have little to no knowledge in this area would be served well by this article. Furthermore, more advanced readers and more knowledgeable readers would benefit from this article as it is comprehensive and would be favorable for review purposes or purposes of additional research. The article explains with texts and with graphic representations the nature of cloud computing, provides a brief history, and lists implications for use and research. The article is both a conceptual and technical overview of cloud computing.

2. Brown, W., & Nasuti, F. (2005) What ERP systems can tell us about Sarbanes-Oxley. Information Management & Computer Security, 13(4), 311 -- 327.

This article very explicitly falls under the heading of methodology and could also perhaps work in a section of literature review or history of the subject. The paper is a literature review of the policy response to scandals caused by CEOs and CFOs of various organizations....

The paper describes the reasons for and how companies may become SOX compliant (Sabranes-Oxley). The article explains the fairly new guidelines for management with regard to information and data sharing, storage, and management.
3. Chow, R., Golle, P., Jakobson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009) Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), 2009 November 13, 85-90.

The authors of this article are concerned with the fervor with which organizations are flocking to use cloud computing without future considerations. This article would fit well within a research paper in a section regarding hypotheses, research questions, and/or future implications. The authors contend that with many other forms of technology of the 21st century, cloud computing is a new and exciting tool for business, but there is not enough close examination as to how a great shift in business operations will affect several markets. Though full of technical specifications and an array of statistics, the tone of the article is somewhat philosophical, in that the authors intends for readers to consider and reflect upon the economic, technical, and organizational implications for massive use of cloud computing before or during this shift occurs.

4. Hentea, M. (2007) Intelligent System for Information Security Management: Architecture and…

Sources used in this document:
This article would fall best under such headings are implications for further research or as part of the section focusing upon the research question or problem itself. This is another article that provides a brief history and synopsis of cloud computing before delving into the particular issue at hand. This article specifically examines the use of cloud computing and the possibility of cloud hooks, a type of threat to the cloud. The tone of the paper is to be informative as well as preventative. The author's primary concern is for readers and those who manage & operate clouds to make the most informed decisions regarding security and privacy as possible. The author provides concise descriptions of some of the most dangerous and commons threats to security of the cloud and privacy of information in cloud computing. While the author supports the use and the benefits of cloud computing, ultimately this article is an admonition that with use should come awareness and preparation. This article could additionally work well within a research paper under the heading of methodology.

6. Kolkowska, E. (2011) Security Subcultures in an Organization -- Exploring Value Conflicts. Available from: is2.lse.ac.uk/asp/aspecis/20110241.pdf. 2012 July 23.

This article is quite interesting because it approaches the topic of cloud computing from a more cultural, human, organizational, and sociological perspective. The author wants readers to consider who information system policies are compromised due to personalities and subcultures within a particular organization utilizing cloud computing and other forms of information technology that require security protocols. The author researches how attitudes and perceptions ultimately influence behaviors directly related to information technology security at the workplace. One of her main arguments is that information security comes from technical aspects as well as cultural aspects within the organization.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology -- Annotated Bibliography Information Technology...
Words: 1128 Length: 4 Document Type: Annotated Bibliography

Information Technology -- Annotated Bibliography Information Technology Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33. This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article. Durkee, D.

Information Technology IT Support Technician
Words: 2181 Length: 7 Document Type: Essay

Software and Hardware Problems Introduction & Working Thesis Statement Software is a pool of information that directs the digital computers of what to do and how to proceed. Software consists of numerous computer programs or appropriate data performing the role of giving instructions to the computer on how to interpret the input into useful information. Software or computer programs forms the component of the storage section of the digital device (computer). In

Cloud Computing and Cost Effectiveness
Words: 1591 Length: 5 Document Type: Annotated Bibliography

A Study of how Cloud Computing related to Cost-Effectiveness Annotated Bibliography Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3. This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The study shows that cloud computing supports greater capacity levels and also protracted capabilities of the organization, devoid of incurring

Big Data Annotated Bibliography
Words: 1473 Length: 4 Document Type: Annotated Bibliography

Zaslavsky is the leader of the Semantic Data Management Science Area (SMSA). He has published more than 300 publications on science and technology. Perera has vast experience in computing and technology as he is a member of the Commonwealth Scientific and Industrial Research Organization alongside publishing numerous journals. Georgakopoulos is the Director of Information Engineering Laboratory. He has published over 100 journals on issues related to science and technology

Management Annotated Bibliography Ahronovitz, Miha, Amrhein, Dustin,...
Words: 864 Length: 2 Document Type: Case Study

Management Annotated Bibliography Ahronovitz, Miha, Amrhein, Dustin, Anderson, Patrick, & de Andrade, Andrew. (2010). Cloud computing use cases white paper. Cloud Computing Use Case Discussion Group. Web. Retrieved February 3, 2014 from http://opencloudmanifesto.org/Cloud_Computing_Use_Cases_Whitepaper-4_0.pdf This source is the ultimate guide to cloud computing. It breaks down the technology very thoroughly, with how it can be used in a wide number of scenarios, from giant enterprise systems to private use. It introduces elements of hybrid

Challenges in Management Facing Transformational Leaders Service...
Words: 1606 Length: 5 Document Type: Annotated Bibliography

Annotated bibliography: Management and Accounting Challenges facing Transformational Leaders: Service and Technology Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113. The authors of this article maintain that leadership forms one of the main factors for organizational adoption of successful innovation. But researchers have yet to delve into the subject of leadership elements impacting adoption stages

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now