Annotated Bibliography: Security of Information Systems

Verified

Added on  2020/02/19

|5
|1048
|35
Annotated Bibliography
AI Summary
This annotated bibliography provides a comprehensive overview of several key research papers in the field of information security. The bibliography includes summaries and critical analyses of five different sources. The first source, by Ab Rahman and Choo (2015), discusses incident handling in cloud environments. Jing et al. (2014) evaluates the security challenges of the Internet of Things (IoT). Dumais et al. (2016) focuses on information retrieval systems and data privacy. Li et al. (2015) provides a survey of IoT technologies, and Shameli-Sendi et al. (2016) analyzes information security risk assessment. Each entry summarizes the article's key findings, the authors' affiliations, the research methodology, and any limitations. The bibliography highlights the importance of information security in modern organizations, especially with the rise of cloud computing and IoT, and underscores the need for ongoing research and development in this rapidly evolving field.
Document Page
Running head: ANNOTATED BIBLIOGRAPHY
Annotated Bibliography
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
ANNOTATED BIBLIOGRAPHY
Reference 1 (Ref. 1)
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling
in the cloud. Computers & Security, 49, 45-69.
In this article Rahman and Choo (2015) discusses about the ways of handling incidence
arising from lack of security for the availability of the assets in the organization. The writer of
the article are from information security department of University f South Australia and
University of Tun Hussein Onn Malaysia. The survey was done by analyzing the literature of
existing reports about the incidence handling with the help of cloud computing. They further
proposed the writers conducted a cloud incident handling model and an open research. Cloud
computing is one of the most recent technologies used to secure the information within the
organization. Thus, it is reliable to depend on the research conducted and it is also relevant as it
is one of the most demanding topics. The main limitation of the research was that it did not
considered any experimentation about the real world usage of cloud computing.
Reference 2 (Ref. 2)
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Jing et. al. (2014) has evaluated in their article about the increasing use of Internet in all
the activities of the world from household task to professional task. The writers of the article are
professors in different university of China and Kuwait. The paper used literature to analyze the
problem of security arising from the internet usage and offered a descriptive framework about
the security issues. Internet is highly used by everybody in today’s world and it is essential for
any organization to analyze the threat arising from the usage of this technology. Thus, carrying
Document Page
2
ANNOTATED BIBLIOGRAPHY
out a research in this field is advantageous and demanding in the fast expanding environment.
The main limitation put forward in this article is that it failed to carry out a primary survey to
analyze the thinking about the security of Internet of Things (IoT).
Reference 3 (Ref. 3)
Dumais, S., Cutrell, E., Cadiz, J. J., Jancke, G., Sarin, R., & Robbins, D. C. (2016, January).
Stuff I've seen: a system for personal information retrieval and re-use. In ACM SIGIR
Forum (Vol. 49, No. 2, pp. 28-35). ACM
Dumais et al (2016) in his article has discussed about the importance of information
technology system used in the organizations and the privacy it gives to the data stored through
this system. The writers of the article are professors of various Universities. The emergence of
the technology of data collection has been discussed in this book with a focus on the agencies
and methods that offer such protection. It has discussed about the use of E-commerce and
Electronic money in the business environment that has facilitated their mode of work. E-
commerce is growing its coverage at a faster rate and thus it requires a good information security
system.The major limitation seen in this book that it did not focus on the usage of internet
method in various household activities. Only the usage of internet in the commercial world is
discussed both national and international.
Document Page
3
ANNOTATED BIBLIOGRAPHY
Reference 4 (Ref. 4)
Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems
Frontiers, 17(2), 243-259
http://www.istp.ethz.ch/content/dam/ethz/special-interest/gess/cis/international-relations-dam/
Teaching/bridging/Shancang%202014.pdf
Li et. al. (2015) has also discussed about Internet of Things (IoT) as it is has been
considered as a internet that will be used in future and includes a lot of communication things.
The writers of the article are faculty of engineering and information technology in different
Universities. The survey was conducted by focusing on the various emerging techniques in
which IoT can be implemented. The IoT technology will be very helpful in future as it offers a
lot of potential in the future. Thus, carrying out research in this segment s beneficial and the
paper is reliable for further research. Te major limitation of the research is that it has just
presented literature review about the topic and there is no primary survey conducted for the
research to know the believe of professional about this new growing technology.
Reference 5 (Ref. 5 )
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information
security risk assessment (ISRA). Computers & Security, 57, 14-30
Shameli-Sendi et. al. (2016) has analyzed the risk offered by information security system
on the data of the organization. It has viewed that the security of such system should be increased
in order to offer a much-secured environment to valuable assets. The researchers of this article
are faculty of information security department and technology department of various universities.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
ANNOTATED BIBLIOGRAPHY
The research was conducted through secondary research by analyzing the papers offered on the
topic from 1995 to 2014. The research conducted is important as organizations in today’s world
are expanding considerably and it is necessary that they have a secured information security
system. Thus, it proves that this system is reputable and it will be of high value if researched
further. However, the research paper can be used to carry out further research on this ground
after 2014 in business environment.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]