Study Document
Pages:4 (1128 words)
Subject:Technology
Topic:Information Technology
Document Type:Annotated Bibliography
Document:#81460176
Information Technology -- Annotated Bibliography
Information Technology
Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33.
This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article.
Durkee, D. (2010). Why Cloud Computing Will Never Be Free. Communication of the ACM, 53(5), 62 -- 70.
This author intends to prepare readers about the revolutionary changing in the market because of cloud computing. The article could be intended for both beginners and experts in cloud computing. The author describes the fundamental characteristics of clouds and cloud computing. The author describes models and strategies regarding marketing and pricing of cloud computing. The author does a thorough job of providing context and background of cloud computing in order to make his major points regarding his thesis of why cloud computing will never be free. The author also attempts to make predictions for future trends or patterns in the market for clouds and the cloud technology.
Gold, J. (2012). Protection in the Cloud: Risk Management and Insurance for Cloud Computing. Journal of Internet Law, 15(12), 23 -- 29.
This author writes about how cloud computing and other kinds of technological innovation need legal provisions. The law must keep pace with the technology and the risks the technology brings. This yet another author that concerns himself with security issues and risk management with regard to cloud use. This author, like other authors mentioned here, are very concerned with safeguarding data and safeguarding private information. This author provides insight regarding specific forms of legal safeguarding including forms of insurance to protect cloud computing users.
Jamil, D., & Zaki, H. (2011). Cloud Computing Security. International Journal of Engineering Science and Technology, 3(4), 3478 -- 3484.
This article provides a structural and functional overview of cloud computing. The authors discuss security threats, security measures, and a well-rounded argument describing the advantages and disadvantages of using a cloud. The article in a way makes cloud use seem inevitable, but tries to prepare user and really administrators, for the potential risks and philosophy for strategies of protection.
Leonard, J. (2011). Changes in Governance. Network World, October, 28 -- 29.
The article is about the relationship between operational security and an organization's cloud model. The author stresses the importance of security & risk assessment, as well as strategic staffing to hire people with the technical skills to assess and resolve present and potential security threats to the organization's cloud. The author concludes by urging organizational leaders to take into consideration their organizational culture and to conditionally consider forging professional relationships with businesses who can effectively assist in the minimization of security threats.
McAfee, A. (2011). What Every CEO Needs to Know about the Cloud. Harvard Business Review, November, 125 -- 134.
This article is intended for high ranking professionals who are not yet familiar with cloud computing and the ways in which its use could benefit an organization. This is an article that provides several well-argued reasons as to why the adoption and use of a cloud for an organization is beneficial and may provide a competitive advantage in that organization's particular market. The author additionally provides the perspective from…
The article describes a different sort of flood that is occurring in Thailand. The flooding is of data. The article describes the data floods in Thailand as well as the strategies handling data floods. This article is intended for CIOs as well as those who work closely with CIOs and even those who hire CIOs. The tone of this article is that of prevention and to learn from the examples of what is happening in Thailand.
Shankar, R. (2011). Securing the Cloud. Silicon India, January, 34 -- 36.
This author proclaims that no cloud can ever be fully secure, yet there are measures that can be taken to secure clouds. He puts the responsibility of securing clouds to the SMB owners. This author, like other authors, prescribes some actions, but mainly recommends a change in mind-set or perspective when considering security threats as well as their solutions.