Annotated Bibliography: IT Privacy - University Assignment

Verified

Added on  2021/06/15

|13
|3299
|24
Annotated Bibliography
AI Summary
This annotated bibliography delves into the multifaceted realm of IT privacy, examining crucial aspects such as cybersecurity, vulnerabilities, and threats within information technology. The compilation encompasses a range of scholarly articles and publications, including works by Abomhara, Eason, Bloom, Schwalbe, Wang, Lloyd, Jouini, Holtshouse, Von Solms, Sommestad, Razzaq, and Luiijf. These sources collectively address key topics like the security of the Internet of Things, organizational changes driven by IT, the impact of information and communication technologies, IT project management, cyber security in smart grids, legal regulations, classification of security threats, knowledge management, and cyber security modeling. The bibliography highlights the importance of maintaining IT security and privacy through various cyber security measures, addressing hardware and software vulnerabilities, and understanding the legal and organizational implications of IT implementation. The analysis underscores the significance of protecting data, ensuring the reliability of systems, and mitigating risks in an increasingly interconnected digital landscape. This assignment, contributed by a student, is available on Desklib, a platform offering valuable study resources.
Document Page
Running head: IT PRIVACY
Annotated Bibliography: IT Privacy
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
IT PRIVACY
Table of Contents
Task 1.........................................................................................................................................2
References..................................................................................................................................9
Task 2.......................................................................................................................................12
Document Page
2
IT PRIVACY
Task 1
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
According to Abomhara, 2015, the security to the information technology or IT and
inter of things or IoT is somewhat similar in terms of cyber world. The security attacks,
threats or vulnerabilities are extremely common for any business or organization. This is
eventually because these are weaknesses that every equipment of information technology
possesses. There are two types of systems in information technology. They are the system
software and system hardware. Both of these components have in built flaws in them and thus
should be mitigated at every aspect. The hardware vulnerabilities are mainly because of the
problem in identification and fixing them in timely manner. The software vulnerabilities are
found within the application software, control software and operating systems. The control
software mainly includes communication protocols or device drives. Moreover, the design
flaws are also present within the software and hence it becomes explicitly difficult for the
software designer to implement the software in their business properly. The technical
vulnerabilities are another form of this software flaw that happens for the weakness of the
human beings. The privacy or security of the information technology thus should be
maintained without any type of failure.
Eason, K. D. (2014). Information technology and organisational change. CRC Press.
As per Eason, 2014, information technology is the proper utilization of systems and
computers for various data operations like storing, retrieving, transmitting and manipulation.
Any specific organization or company implements this information technology within their
business for successfully executing the business operations and processes. The information
technology is the subset of ICT or information and communication technology. The process
Document Page
3
IT PRIVACY
of decision making is absolutely easier with the help of this information technology as the
services and products of the technology like hardware, e commerce, telecom equipments,
software and many more. This information technology is substantially utilized within the
context of all types of enterprise operations, which do not cross the effectiveness of other
technologies. The IT is responsible for the overall changes or alterations within the
organization that has incorporated it and hence is extremely important for the business.
Moreover, this information technology is maintained with high security and privacy for
keeping all the data or information absolutely safe and secured. The IT security is maintained
with the help of several cyber security forms and technologies.
Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects of
information technology and communication technology on firm
organization. Management Science, 60(12), 2859-2885.
Bloom et al., 2014, in their article stated that information and communication
technologies or ICT usually differentiate the components of information as well as
communication together. The information technology has various types of effects on the
various decisions that are being taken for the betterment of the business in each and every
management level. The most effective access of information pushes these decisions to
upwards and hence the organization or company is benefitted. The privacy of the information
technology is solely maintained by the help of various cyber securities like antivirus, malware
protection, firewall and many more. All these cyber securities help the organization in
securing and protecting their IT equipments, IT assets, confidential and sensitive information
or data. The organizational members are responsible for securing the data or information
properly and they should protect their own sphere and own assets or equipments. Various
cases have been registered that demonstrate the uncertainty of the security of personal
information. The advancement in the information technology has lead to the threatening
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
IT PRIVACY
situations for any organization. The probability of the negative consequences is extremely
high in this type of technologies.
Schwalbe, K. (2015). Information technology project management. Cengage Learning.
Schwalbe, 2015, in his book has stated about the entire concept of information
technology within any typical project or project management of the company. All the
organizations require implementing the information technology within their businesses and
project for obtaining all the advantages from it. The most significant advantages that the
business obtains from project management mainly include easy management of the projects
without any type of problem and easy collaboration of all the processes of the business. This
particular technology even integrates the business processes and the process of execution
extremely easy. The success of the project solely depends on the factors of the information
technology and thus should be maintained and protected properly. There are some of the tools
and techniques that help the project in improving the implementation of the project within the
business. The security is the most significant factor for the information technology.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and
challenges. Computer Networks, 57(5), 1344-1371.
Wang and Lu, 2013, in their journal has stated about the cyber security in the next
generation information technology. This eventually refers to the Smart Grid or next
generation power system. The complete integration of communication technologies and
advanced computing is supposed to enhance the reliability as well as efficiency of systems
with the demand responses and distributed intelligence. This cyber security substantially
emerges to the most critical issue as millions of information technology devices are
connected through communication networks. There is a strong impact of reliability on the
cyber security. The requirements of security, attack counter measures, protocols for secured
Document Page
5
IT PRIVACY
communication, various network threats and vulnerabilities are checked and mitigated with
the help of this type of security.
Lloyd, I. (2017). Information technology law. Oxford University Press.
According to Lloyd, 2017, there are various rules and regulations for the
implementation of information technology within any specific organization or company.
These rules or regulations help to understand the basic requirement or importance of
information technology in the business. This information technology has various restrictions
or limitations within their business and thus all the limitations should be properly checked. If
any type of discrepancy is noticed within the technology, the organization can take legal
actions for this. Hence, all the laws should be followed for implementing the information
technology. Furthermore, this new version of information technology is utilized for
governing the digital dissemination of the information as well as software. There are various
issues or problems in the intellectual property for computing or online, privacy, jurisdiction
and freedom for expression. This law of information technology is often violated by various
organizations and thus legal steps are taken for them. The privacy and security of information
technology is solely observed by the organization and the moment any problem is noticed,
necessary actions are taken by them.
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in
information systems. Procedia Computer Science, 32, 489-496.
According to Jouini, Rabai & Aissa, 2014, there is a basic classification of the
security threats or risks within the information systems. This type of system is often exposed
to the various kinds of risks, which are vulnerable and can cause damages to the information
technology equipments. The impact of this destruction can even lead to financial losses and
thus this should be checked. There are different criteria for threats and vulnerabilities in any
Document Page
6
IT PRIVACY
information system this classification is done on the basis of a classification model. The
privacy of IT is often maintained with the help of this classification model.
Holtshouse, D. K. (2013). Information technology for knowledge management. Springer
Science & Business Media.
As per Holtshouse, 2013, information technology is important or vital for the
management of knowledge. This knowledge management has become effective for the
survival of the business for the incrementing reliance on knowledge work. IT or information
technology plays the significant role for enabling knowledge management. The most
significant objective of this information technology is to control or manage the organizational
changes or alterations. Information technology helps to do this phenomenon perfectly and
efficiently. The hierarchy for data, information as well as knowledge in any business should
comprise of the perfect infrastructure of information technology. Moreover, the information
technology is utilized for streamlining the communication within the business. Efficient
communication and strategic thinking are enhanced with the help of information technology.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
As per Von Solms and Van Niekerk, 2013, cyber security can be defined as the type
of information security that provides protection beyond the boundary of traditional or usual
security to information. The cyber security is the security to the computer systems from any
kind of damage or destruction to the software, hardware and information. Moreover, the
disruption to the services or rather the misdirection to the services that information
technology is providing to the users is eventually checked and reduced with the help of cyber
security. The overall control of the physical access to hardware is done with the help of cyber
security. Hence, the privacy of the IT equipments is maintained with this. The security or
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
IT PRIVACY
privacy of this information technology is also effective for the malpractices or intentional and
accidental threats to the equipments. Various computer systems like laptops, computers,
smart phones and devices for Internet of Things are secured with the help of cyber security.
These computer systems are collectively known as information technology. The data or the
information that is stored within these devices is protected with the help of information
security.
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language:
A tool for assessing the vulnerability of enterprise system architectures. IEEE
Systems Journal, 7(3), 363-373.
As per Sommestad, Ekstedt and Holm, 2013, there is a specific model that helps in the
privacy and security of the information technology or equipments and software of
information technology. This particular tool is known as Cyber Security Modeling Language
or CySeMoL. It is a typical modelling language, which helps the enterprise level system
architectures to be absolutely safe and secured. If any specific computer system of the
company is modelled with the tool of Cyber Security Modeling Language, the inference
engine eventually assesses the possibility of the attacks on the system. There are several
issues or problems that are related to IT or information technology. All the computer systems
in any enterprise have the vulnerabilities within them. Security thus is the most complex
problem for these systems. With the help of this tool for security, Cyber Security Modeling
Language, the chances of such vulnerabilities are reduced significantly. The utility of this
tool of CySeMoL is examined in various case studies.
Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013, March). Cyber security:
Threats, reasons, challenges, methodologies and state of the art solutions for
Document Page
8
IT PRIVACY
industrial applications. In Autonomous Decentralized Systems (ISADS), 2013
IEEE Eleventh International Symposium on (pp. 1-6). IEEE.
Razzaq et al., 2013, stated that cyber security is the most significant requirement in
any organization. The information sharing as well as the professional activities such as
advertisements, services, banking transactions and many more are tracked with the help of
the cyber security. The exponential increment of the usability of the cyber space and cyber
criminal activities is simply because of the high level advancement of information
technology. In today’s world, the high technology should be maintained eventually and thus
the industrial applications are getting more and more complicated. The various cyber threats
or risks could be reduced with this cyber security.
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security
strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31.
As per Luiijf, Besseling and De Graaf, 2013, there are various strategies for cyber
security for any information technology. A collection of several nations or countries have
eventually published their NCSS or national cyber security strategies for addressing all the
threats and risks related to information system. Appropriate or suitable organizational
strategies are required for executing the business processes and hence it is important to
implement such a technology that is useful for them in making the organizational strategies.
The strategy for knowledge management should be explicitly congruent with all the
competitive strategies of that business.
Document Page
9
IT PRIVACY
References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88. Retrieved
from http://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4
Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects of
information technology and communication technology on firm
organization. Management Science, 60(12), 2859-2885. Retrieved from
https://dash.harvard.edu/bitstream/handle/1/17417216/bloom%2Cgaricano%2Csadun
%2Cet-al_the-distinct-effects-of-it%20and%20communication.pdf?sequence=1
Eason, K. D. (2014). Information technology and organisational change. CRC Press.
Retrieved from https://content.taylorfrancis.com/books/download?dac=C2004-0-
19011-5&isbn=9781482275469&format=googlePreviewPdf
Holtshouse, D. K. (2013). Information technology for knowledge management. Springer
Science & Business Media. Retrieved from https://books.google.co.in/books?
hl=en&lr=&id=xpm-
BwAAQBAJ&oi=fnd&pg=PR5&dq=information+technology&ots=s8agSUVI1R&si
g=TZzDfHio1m16-iKB2Gwo9fuoiDM#v=onepage&q=information
%20technology&f=false
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in
information systems. Procedia Computer Science, 32, 489-496. Retrieved from
https://ac.els-cdn.com/S1877050914006528/1-s2.0-S1877050914006528-main.pdf?
_tid=3c2753ac-2d30-4cac-ab69-
6aaf99dc8c51&acdnat=1524825982_a69f84aad22aa67bcf7967c47f556783
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
IT PRIVACY
Lloyd, I. (2017). Information technology law. Oxford University Press. Retrieved from
https://books.google.co.in/books?
hl=en&lr=&id=Bt1KDgAAQBAJ&oi=fnd&pg=PP1&dq=information+technology&o
ts=CqrkdM0DpG&sig=eogxeLMWCqbEB1j7Lk2z27ldxQM#v=onepage&q=informa
tion%20technology&f=false
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security
strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31. Retrieved
from
https://s3.amazonaws.com/academia.edu.documents/45513910/Nineteen_National_C
yber_Security_Strateg20160510-9073-1x5azcb.pdf?
AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524829780&Signatu
re=e7AwkhMNgE7WcZVKfVTz3xLDOf4%3D&response-content-disposition=inline
%3B%20filename%3DNineteen_national_cyber_security_strateg.pdf
Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013, March). Cyber security: Threats,
reasons, challenges, methodologies and state of the art solutions for industrial
applications. In Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh
International Symposium on (pp. 1-6). IEEE. Retrieved from
https://s3.amazonaws.com/academia.edu.documents/40768110/Cyber_security_Threa
ts__reasons__challenges__methodologies_and_state_of_the_art_solutions_for_indust
rial_applicat.pdf?
AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524828408&Signatu
re=OMvv997QaYVao1H6znrZ6ldmaKY%3D&response-content-disposition=inline
%3B%20filename%3DCyber_Security_Threats_Reasons_Challenge.pdf
Document Page
11
IT PRIVACY
Schwalbe, K. (2015). Information technology project management. Cengage Learning.
Retrieved from https://s3.amazonaws.com/academia.edu.documents/46169145/5e-ch-
1.pdf?
AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524818403&Signatu
re=T3YNbT0CaYeNJROMT8ks5%2FqJsBo%3D&response-content-
disposition=inline%3B%20filename
%3DAn_Introduction_to_Project_Management_Fi.pdf
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language: A
tool for assessing the vulnerability of enterprise system architectures. IEEE Systems
Journal, 7(3), 363-373. Retrieved from
http://www.diva-portal.org/smash/get/diva2:561243/FULLTEXT02
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102. Retrieved from
https://ldc.usb.ve/~torrealba/sti-242/4ta_Clase/solms-2013.pdf
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and
challenges. Computer Networks, 57(5), 1344-1371. Retrieved from
https://s3.amazonaws.com/academia.edu.documents/36811314/13wl-comnet.pdf?
AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524825676&Signatu
re=wi3n11rbEEs9VDWIZ1MIvoWEKn0%3D&response-content-disposition=inline
%3B%20filename%3D13wl-comnet.pdf
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]