Annotated Bibliography: Business Security, Ethics, and Data Management

Verified

Added on  2020/02/19

|4
|782
|255
Annotated Bibliography
AI Summary
This annotated bibliography presents a collection of articles exploring various facets of business security and ethics. The articles cover a range of topics, including ransomware attacks, business ethics in a globalized world, enhancing security in the software development life cycle, detecting and preventing information security breaches, security governance in cloud environments, and the relationship between ICT, innovation, and productivity in manufacturing companies. Each entry provides a brief summary of the article's content and highlights key concepts. The bibliography offers insights into the challenges and best practices related to cybersecurity, data management, ethical considerations, and the impact of technology on business operations. The selected articles emphasize the importance of security measures, ethical conduct, and strategic management in the contemporary business landscape, making it a valuable resource for understanding and addressing the evolving threats and opportunities in the digital age.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
1ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2ANNOTATED BIBLIOGRAPHY
Portfolio 1
Article 1: “Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.”
The author provides a detailed explanation of the attack of the ransom attack taking
into consideration that the attack had become one of the biggest scams over the cyber which
directly hits the business prospective. Its main attribute is that it denies the access with
regards to an individual to the organisations vital information and the affect is that it demands
for some type of payment to lift the restriction applied on the task. The methodology used in
this aspect is bringing into account the different scenarios which are related the ransom
attack.
Article 2: “Crane, A., & Matten, D. (2016). Business ethics: Managing corporate citizenship
and sustainability in the age of globalization. Oxford University Press.”
The author provides a detailed explanation of the business ethics concept that in
playing vital role in the real world. The concept that is followed by the author is directly on
emphasizing with the practical problem and the real life example and its different
illustrations. The concept of the ethics is seen in everyday in the media. The media plays a
vital role in such a concept of approach.
Article 3: “Sharma, A., & Misra, P. K. (2017). Aspects of Enhancing Security in Software
Development Life Cycle. Advances in Computational Sciences and Technology, 10(2), 203-
210.”
In the everyday life software’s are playing a very vital role. Software’s should be
integrated with the concept of security which would directly involve in the trust related aspect
Document Page
3ANNOTATED BIBLIOGRAPHY
involving people. The main concept discussed hereby is the application of the security
measures in the field of business and its direct occupancy in the mind of the people. The
main approach used here is bringing the concept of the security alive which would be
beleaved to play a very important role in the mind of the people.
Article 4: “Teymourlouei, H., & Jackson, L. (2016, January). Detecting and Preventing
Information Security Breaches. In Proceedings of the International Conference on Security
and Management (SAM) (p. 304). The Steering Committee of The World Congress in
Computer Science, Computer Engineering and Applied Computing (WorldComp).”
Data breaches are growing in the world of technology in different prospective. The
main approach in this report is the delivering the different standards of security when it
comes to security breaches. It can be taken into consideration that there are more than
thousand applications and network related aspects which contain many sensitive information
which may include bank account details and other vital information. The organisation are
hence forward forced to a sum of money which is much more than the actual amount in order
to safe guard the data and its access authorities.
Article 5: “Alassafi, M. O., Hussain, R. K., Ghashgari, G., Walters, R. J., & Wills, G. B.
(2017). Security in organisations: governance, risks and vulnerabilities in moving to the
cloud. In Enterprise Security(pp. 241-258). Springer, Cham.”
Many organisations in order to improve their business standard require the managing
of the online service. Focusing on the current situation with regards to the different
organization mainly relates to the different data and management security features. The main
approach in this field is accessing the concept of security and how the overall managing of
the concept of security is taken into consideration.
Document Page
4ANNOTATED BIBLIOGRAPHY
Article 6: “Skorupinska, A., & Torrent-Sellens, J. (2017). ICT, Innovation and Productivity:
Evidence Based on Eastern European Manufacturing Companies. Journal of the Knowledge
Economy, 1-21.”
The main approach in the report is the evaluation of the relationship among the ICT,
innovation, human capital and management practices. The author directly focuses on the
indicated terms and it approach in the field. Taking into account, the concepts direct
implementation on the organisations aspect and its behaviour.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]