Verified Document

Information Technology Annotated Bibliography Annotated Bibliography Cloud Annotated Bibliography

Information Technology Annotated Bibliography Annotated Bibliography

Cloud Computing and Insider Threats

Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011) A Survey on Security Issues in Cloud Computing. CoRR, abs/1109.5388, 1 -- 15.

This article is very explanatory in nature. This article would serve best in the opening sections of a research paper, such as in the introduction or the historical review. This article has a formal and academic tone; the intention to be informative. Readers who have little to no knowledge in this area would be served well by this article. Furthermore, more advanced readers and more knowledgeable readers would benefit from this article as it is comprehensive and would be favorable for review purposes or purposes of additional research. The article explains with texts and with graphic representations the nature of cloud computing, provides a brief history, and lists implications for use and research. The article is both a conceptual and technical overview of cloud computing.

2. Brown, W., & Nasuti, F. (2005) What ERP systems can tell us about Sarbanes-Oxley. Information Management & Computer Security, 13(4), 311 -- 327.

This article very explicitly falls under the heading of methodology and could also perhaps work in a section of literature review or history of the subject. The paper is a literature review of the policy response to scandals caused by CEOs and CFOs of various organizations....

The paper describes the reasons for and how companies may become SOX compliant (Sabranes-Oxley). The article explains the fairly new guidelines for management with regard to information and data sharing, storage, and management.
3. Chow, R., Golle, P., Jakobson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009) Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), 2009 November 13, 85-90.

The authors of this article are concerned with the fervor with which organizations are flocking to use cloud computing without future considerations. This article would fit well within a research paper in a section regarding hypotheses, research questions, and/or future implications. The authors contend that with many other forms of technology of the 21st century, cloud computing is a new and exciting tool for business, but there is not enough close examination as to how a great shift in business operations will affect several markets. Though full of technical specifications and an array of statistics, the tone of the article is somewhat philosophical, in that the authors intends for readers to consider and reflect upon the economic, technical, and organizational implications for massive use of cloud computing before or during this shift occurs.

4. Hentea, M. (2007) Intelligent System for Information Security Management: Architecture and…

Sources used in this document:
This article would fall best under such headings are implications for further research or as part of the section focusing upon the research question or problem itself. This is another article that provides a brief history and synopsis of cloud computing before delving into the particular issue at hand. This article specifically examines the use of cloud computing and the possibility of cloud hooks, a type of threat to the cloud. The tone of the paper is to be informative as well as preventative. The author's primary concern is for readers and those who manage & operate clouds to make the most informed decisions regarding security and privacy as possible. The author provides concise descriptions of some of the most dangerous and commons threats to security of the cloud and privacy of information in cloud computing. While the author supports the use and the benefits of cloud computing, ultimately this article is an admonition that with use should come awareness and preparation. This article could additionally work well within a research paper under the heading of methodology.

6. Kolkowska, E. (2011) Security Subcultures in an Organization -- Exploring Value Conflicts. Available from: is2.lse.ac.uk/asp/aspecis/20110241.pdf. 2012 July 23.

This article is quite interesting because it approaches the topic of cloud computing from a more cultural, human, organizational, and sociological perspective. The author wants readers to consider who information system policies are compromised due to personalities and subcultures within a particular organization utilizing cloud computing and other forms of information technology that require security protocols. The author researches how attitudes and perceptions ultimately influence behaviors directly related to information technology security at the workplace. One of her main arguments is that information security comes from technical aspects as well as cultural aspects within the organization.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now