logo

Data Security and Privacy in Cloud Computing: A Comparative Study

   

Added on  2023-05-29

5 Pages814 Words333 Views
Running head: COMMUNICATION AND INFORMATION TECHNOLOGY
COMMUNICATION AND INFORMATION TECHNOLOGY
Name of the Student
Name of the University
Author Note:

COMMUNICATION AND INFORMATION TECHNOLOGY
Annotated 1
Title of the article: Data security and Privacy Author: Carey, Peter
URL:https://www.sciencedirect.com/science/article/pii/S2210832715000204
Date of access: 6/12/2018
Book: Anna, Z., 2016. The salient features of personal data protection laws with special
reference to cloud technologies. A comparative study between European countries and
Russia. Applied Computing and Informatics, 12(1), pp.1-15.
Page number: 240
Year of publication: 2014 Issue no: 1
Volume number: 12
Summary of the article:
The summary of the article can be related to the concept of the data security and the
privacy which can be related to the sector of the technology of cloud computing. The main sector
which is stated in the is related to the laws which can be enforced in the sector which would be
directly protecting the security of the data.
Evaluation:
The main sector of evaluation which can be stated in the article is related to the solving of
the problem which is related to the technological aspect. The 1998 data protection act was one of
the first step which focused on protection of data of the customers and the employee from
different intruder activity. One of the other factor which can be stated here is how the technology
can be used in the near future.
Reason for use:
The main reason for the selection of the article is done due to the factor that it majorly
takes into consideration future prospective of the technology and how it would be playing a role
in the life of the people.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Current Practice Analysis for Cloud Computing in an Organization: Annotated Bibliography
|7
|1759
|375

Standards, Ethics and Compliance: Article
|6
|1264
|64

Annotated Bibliography Assignment PDF
|6
|1045
|385

The Concept of Security in the IT Environment
|12
|5019
|71

Understanding Cryptographic Techniques in the Changing Scenario of Technology
|13
|3580
|427

Wireless Communication and Network - Desklib
|7
|1254
|351