Current Practice Analysis for Cloud Computing in an Organization: Annotated Bibliography
VerifiedAdded on  2023/06/07
|7
|1759
|375
AI Summary
This annotated bibliography explores the concept of cloud computing in an organization, including its challenges, issues, and benefits. It includes four journal articles that discuss the role of cloud computing in the public sector, the importance of this technology in securing personal information, and the threats and risks associated with cloud computing. The articles use both qualitative and quantitative research methods to evaluate the concept of cloud computing and its impact on network performance and security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Management of Information Technology (BCO6653)- Assignment 1
Current Practice Analysis for
Cloud computing in an organization
Annotated Bibliography #1
publishing company (Routledge):
Journal Ranking (A):
Date accessed: 31/08/2018
Title of article: Organisational culture and cloud computing: coping with a disruptive
innovation
Authors: Nabil Sultan, and Sylvia van de Bunt-Kokhuis.
Journal Title: Technology Analysis & Strategic Management
Volume: 24
Issue: 2
Year of publication: 2012
Page Numbers: 167-179
URL (if available): https://doi.org/10.1080/09537325.2012.647644
Abstract:
Cloud computing is an advanced technology which is used by many organization to
secure their personal information’s. According to the author, it is a computing
paradigm which is used by many business industries and it changes the way of
security. The main aim of this paper is to understand the concept of cloud computing
and evaluate problems occur in cloud computing.
Methods and Data Used:
In this journal paper author used qualitative or secondary research method through
which they describe the fundamental concept of cloud computing. According to this
paper, it is a process that produces on-demand services for an organization network.
The author used qualitative data process and people can use this method to avoid
1
Current Practice Analysis for
Cloud computing in an organization
Annotated Bibliography #1
publishing company (Routledge):
Journal Ranking (A):
Date accessed: 31/08/2018
Title of article: Organisational culture and cloud computing: coping with a disruptive
innovation
Authors: Nabil Sultan, and Sylvia van de Bunt-Kokhuis.
Journal Title: Technology Analysis & Strategic Management
Volume: 24
Issue: 2
Year of publication: 2012
Page Numbers: 167-179
URL (if available): https://doi.org/10.1080/09537325.2012.647644
Abstract:
Cloud computing is an advanced technology which is used by many organization to
secure their personal information’s. According to the author, it is a computing
paradigm which is used by many business industries and it changes the way of
security. The main aim of this paper is to understand the concept of cloud computing
and evaluate problems occur in cloud computing.
Methods and Data Used:
In this journal paper author used qualitative or secondary research method through
which they describe the fundamental concept of cloud computing. According to this
paper, it is a process that produces on-demand services for an organization network.
The author used qualitative data process and people can use this method to avoid
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
cyber-attacks.
Results and Conclusion:
This paper evaluated problems and issue of cloud computing in the field of
Christensen study and also explained the fundamental concept of this technology. The
author showed sustaining innovation to improve the overall performance of an
organizational communication network. Current research indicates that this
technology is increasing and many organizations are using this process to increase
the security of their personal data files.
Strengths and weakness:
This paper is completely based on the innovation of cloud computing and the author
used many research data. There are many advantages of this article such as author
explained conceptual principle and theory of cloud computing, people can understand
the role of this technology in the organization, how users can secure their personal
data by using this innovation, and it explained many examples of cloud computing.
The main drawback of this article it that it does not explain any threats and risk of
this technology. This paper is not to use quantitative analysis through which people
cannot compare this innovation with other technologies.
Reasons for use:
The main objective of this paper is to understand the role of cloud computing in any
organization and this paper compete based on cloud computing by which we can
learn the concept of cloud computing g and theory of disruptive innovation.
Annotated Bibliography #2
publishing company (IEEE):
Journal Ranking (A*):
Date accessed: 03/09/2018
Title of article: The Case for Cloud Computing
Authors: Robert L. GrossmanGhalsasi.
Journal Title: IT Professional
Volume: 11
2
Results and Conclusion:
This paper evaluated problems and issue of cloud computing in the field of
Christensen study and also explained the fundamental concept of this technology. The
author showed sustaining innovation to improve the overall performance of an
organizational communication network. Current research indicates that this
technology is increasing and many organizations are using this process to increase
the security of their personal data files.
Strengths and weakness:
This paper is completely based on the innovation of cloud computing and the author
used many research data. There are many advantages of this article such as author
explained conceptual principle and theory of cloud computing, people can understand
the role of this technology in the organization, how users can secure their personal
data by using this innovation, and it explained many examples of cloud computing.
The main drawback of this article it that it does not explain any threats and risk of
this technology. This paper is not to use quantitative analysis through which people
cannot compare this innovation with other technologies.
Reasons for use:
The main objective of this paper is to understand the role of cloud computing in any
organization and this paper compete based on cloud computing by which we can
learn the concept of cloud computing g and theory of disruptive innovation.
Annotated Bibliography #2
publishing company (IEEE):
Journal Ranking (A*):
Date accessed: 03/09/2018
Title of article: The Case for Cloud Computing
Authors: Robert L. GrossmanGhalsasi.
Journal Title: IT Professional
Volume: 11
2
Issue: 2
Year of publication: 2009
Page Numbers: 23-27
URL (if available):
https://ieeexplore.ieee.org/abstract/document/4804045/
Abstract
As per this article, the assessment of distributed computing is one of the propelled
advancements in the field of processing systems. It is evaluated that this innovation
can diminish the issue of security and digital violations. The primary target of this
paper is to assess the preferences and impediments of this development and different
sorts of dangers happen in an association arrange.
Methods and Data Used
This article used secondary research method and qualitative data analysis to
understand cloud computing technology. There are many people they do not use any
backup system for their personal information. Through which they can lose their data
for which people can use cloud computing system to avoid this type of problems.
Cloud that give on-request registering occurrences can utilize these examples to
supply programming as administrations SaaS, for example, Salesforce.com.
Results and Conclusion:
Cloud-based service is one of modern innovation and many online communities use
this program to restore their personal information. It is researched that this
innovation can avoid the problem of ransom ware attacks and can reduce security
problems. This paper depicted different qualities and shortcoming of distributed
computing and it likewise clarified different sorts of dangers or dangers of this
development.
Strengths and weakness:
There are numerous geniuses of this article, for instance, it assesses focal points and
burdens of distributed computing, diverse sorts of dangers and assaults of this
innovation, and how this innovation can be sued as a security framework. Every one
of these things can be comprehended by this examination paper and creator clarified
in the correct example. There are couple of downsides of this paper, for example, it
3
Year of publication: 2009
Page Numbers: 23-27
URL (if available):
https://ieeexplore.ieee.org/abstract/document/4804045/
Abstract
As per this article, the assessment of distributed computing is one of the propelled
advancements in the field of processing systems. It is evaluated that this innovation
can diminish the issue of security and digital violations. The primary target of this
paper is to assess the preferences and impediments of this development and different
sorts of dangers happen in an association arrange.
Methods and Data Used
This article used secondary research method and qualitative data analysis to
understand cloud computing technology. There are many people they do not use any
backup system for their personal information. Through which they can lose their data
for which people can use cloud computing system to avoid this type of problems.
Cloud that give on-request registering occurrences can utilize these examples to
supply programming as administrations SaaS, for example, Salesforce.com.
Results and Conclusion:
Cloud-based service is one of modern innovation and many online communities use
this program to restore their personal information. It is researched that this
innovation can avoid the problem of ransom ware attacks and can reduce security
problems. This paper depicted different qualities and shortcoming of distributed
computing and it likewise clarified different sorts of dangers or dangers of this
development.
Strengths and weakness:
There are numerous geniuses of this article, for instance, it assesses focal points and
burdens of distributed computing, diverse sorts of dangers and assaults of this
innovation, and how this innovation can be sued as a security framework. Every one
of these things can be comprehended by this examination paper and creator clarified
in the correct example. There are couple of downsides of this paper, for example, it
3
doesn't clarify how this innovation is utilized for an association, how individuals
utilize this procedure as a reinforcement plan, the creator did not assess different
predominance strategies for dangers of this development, and this paper isn't
contrasting this innovation and other propelled security frameworks.
Reasons for use:
Individuals can utilize this article to comprehend the utilization of distributed
computing for the security of their data and they can expand their insight in the field
of systems and security. This paper is totally in view of distributed computing and
their benefits and bad mark by which any individual can comprehend the part of their
protection and security.
Annotated Bibliography #3
publishing company (IEEE):
Journal Ranking (A*):
Date accessed: 31/08/2018
Title of article: Cloud Computing: Issues and Challenges
Authors: Tharam Dillon, Chen Wu, and Elizabeth Chang
Journal Title: IEEE International Conference on Advanced Information Networking
and Applications
Volume: 28
Issue: 4
Year of publication: 2010
Page Numbers: 128-133
URL (if available): https://ieeexplore.ieee.org/abstract/document/5474674/
Abstract:
There are many people that use networks device by which they can lose security and
personal information and reduce this type of problem cloud computing can be used.
This paper divided into two parts such as service-oriented computing and grid
computing. The main purpose of this paper is to evaluate the issues and challenges
faced in cloud computing technology.
Methods and Data Used
This paper used a primary research method and quantitative data by which people
4
utilize this procedure as a reinforcement plan, the creator did not assess different
predominance strategies for dangers of this development, and this paper isn't
contrasting this innovation and other propelled security frameworks.
Reasons for use:
Individuals can utilize this article to comprehend the utilization of distributed
computing for the security of their data and they can expand their insight in the field
of systems and security. This paper is totally in view of distributed computing and
their benefits and bad mark by which any individual can comprehend the part of their
protection and security.
Annotated Bibliography #3
publishing company (IEEE):
Journal Ranking (A*):
Date accessed: 31/08/2018
Title of article: Cloud Computing: Issues and Challenges
Authors: Tharam Dillon, Chen Wu, and Elizabeth Chang
Journal Title: IEEE International Conference on Advanced Information Networking
and Applications
Volume: 28
Issue: 4
Year of publication: 2010
Page Numbers: 128-133
URL (if available): https://ieeexplore.ieee.org/abstract/document/5474674/
Abstract:
There are many people that use networks device by which they can lose security and
personal information and reduce this type of problem cloud computing can be used.
This paper divided into two parts such as service-oriented computing and grid
computing. The main purpose of this paper is to evaluate the issues and challenges
faced in cloud computing technology.
Methods and Data Used
This paper used a primary research method and quantitative data by which people
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
can understand the concept of this technology. It is estimated that around 60% of
people worldwide use this innovation to secure their personal information.
Results and Conclusion:
This article explained the threats and challenges faced in cloud computing and the
author also discussed an overview of this latest technology. This paper produces a
relationship between service-oriented computing and grid computing. In this paper,
we analyzed various kind of threats and attacks in cloud computing.
Strengths and weakness:
In this paper, the author explained the challenges and issues of this technology in the
field of network and security. This type of process is used to reduce the problem of
cyber- crimes and many business industries use this as a backup plan. There are a few
advantages of this paper such as it described service oriented and grid computing,
people can gain knowledge in the field of security, and it also evaluated attacks and
risks of network devices. The main weakness of this article is that it did not explain
how this innovation can be used for any organization or industry, and it did not
provide any method by which people can reduce threats of cloud computing.
Reasons for use:
This paper can be used to evaluate various types of challenges and risks of cloud
computing and we can enhance our knowledge in the field of communication. This
article produces a platform where people can secure their personal information’s.
Annotated Bibliography #4
publishing company (IEEE):
Journal Ranking (A):
Date accessed: 31/08/2018
Title of article: FRAMEWORK ON LARGE PUBLIC SECTOR IMPLEMENTATION OF
CLOUD COMPUTING
Authors: Mohamad Reza
Journal Title: 2012 International Conference on Cloud Computing and Social
5
people worldwide use this innovation to secure their personal information.
Results and Conclusion:
This article explained the threats and challenges faced in cloud computing and the
author also discussed an overview of this latest technology. This paper produces a
relationship between service-oriented computing and grid computing. In this paper,
we analyzed various kind of threats and attacks in cloud computing.
Strengths and weakness:
In this paper, the author explained the challenges and issues of this technology in the
field of network and security. This type of process is used to reduce the problem of
cyber- crimes and many business industries use this as a backup plan. There are a few
advantages of this paper such as it described service oriented and grid computing,
people can gain knowledge in the field of security, and it also evaluated attacks and
risks of network devices. The main weakness of this article is that it did not explain
how this innovation can be used for any organization or industry, and it did not
provide any method by which people can reduce threats of cloud computing.
Reasons for use:
This paper can be used to evaluate various types of challenges and risks of cloud
computing and we can enhance our knowledge in the field of communication. This
article produces a platform where people can secure their personal information’s.
Annotated Bibliography #4
publishing company (IEEE):
Journal Ranking (A):
Date accessed: 31/08/2018
Title of article: FRAMEWORK ON LARGE PUBLIC SECTOR IMPLEMENTATION OF
CLOUD COMPUTING
Authors: Mohamad Reza
Journal Title: 2012 International Conference on Cloud Computing and Social
5
Networking
Volume: 28
Issue: 2
Year of publication: 2012
Page Numbers: 28-30
URL (if available):
https://sci-hub.tw/https://ieeexplore.ieee.org/document/6215749/
Abstract
Cloud computing changes the way of security and it increases the efficiency and
productivity of IT systems. The main advantage of this technology is that it reduces
human efforts and people can access their accounts from any peripheral device. This
paper is explained framework of cloud computing for public sectors and also
evaluates the role of this technology in the field of security.
Methods and Data Used:
Authors used qualitative data and secondary method to describe cloud computing
technology. There are many other security plans by which people can secure their
data files but it is one of the best innovations in the field of the computer by which
many organizations can increase the security of information.
Results and Conclusion:
A large number of sectors and business organizations change their security systems
and adopted cloud computing. This technology increased the overall performance of
their network devices and also reduce the problem of ransomware or cyber-attacks.
This paper described the role of cloud computing in the field of the public sector and
the use of this technology in an organization.
Strengths and weakness:
There are many strengths of this journal paper-like, it described the working
principle of cloud computing, the importance of this technology in public sectors, and
how this innovation is different from other technologies. This paper did not evaluate
various types of challenges and threats faced by cloud computing, and it is not
6
Volume: 28
Issue: 2
Year of publication: 2012
Page Numbers: 28-30
URL (if available):
https://sci-hub.tw/https://ieeexplore.ieee.org/document/6215749/
Abstract
Cloud computing changes the way of security and it increases the efficiency and
productivity of IT systems. The main advantage of this technology is that it reduces
human efforts and people can access their accounts from any peripheral device. This
paper is explained framework of cloud computing for public sectors and also
evaluates the role of this technology in the field of security.
Methods and Data Used:
Authors used qualitative data and secondary method to describe cloud computing
technology. There are many other security plans by which people can secure their
data files but it is one of the best innovations in the field of the computer by which
many organizations can increase the security of information.
Results and Conclusion:
A large number of sectors and business organizations change their security systems
and adopted cloud computing. This technology increased the overall performance of
their network devices and also reduce the problem of ransomware or cyber-attacks.
This paper described the role of cloud computing in the field of the public sector and
the use of this technology in an organization.
Strengths and weakness:
There are many strengths of this journal paper-like, it described the working
principle of cloud computing, the importance of this technology in public sectors, and
how this innovation is different from other technologies. This paper did not evaluate
various types of challenges and threats faced by cloud computing, and it is not
6
explaining the advantages and disadvantages of the cloud system. Therefore in future
author can add challenges and issue faced in cloud computing and methods to avid
threats of this technology.
Reasons for use:
There are many reasons to use this article, for example, we can understand the
importance of cloud computing in this modern generation, and how this technology is
useful for an organization to secure their data files.
7
author can add challenges and issue faced in cloud computing and methods to avid
threats of this technology.
Reasons for use:
There are many reasons to use this article, for example, we can understand the
importance of cloud computing in this modern generation, and how this technology is
useful for an organization to secure their data files.
7
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.