Information Technology -- Annotated Bibliography Information Technology Annotated Bibliography

Information Technology -- Annotated Bibliography Information Technology

Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33.

This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article.

Durkee, D. (2010). Why Cloud Computing Will Never Be Free. Communication of the ACM, 53(5), 62 -- 70.

This author intends to prepare readers about the revolutionary changing in the market because of cloud computing. The article could be intended for both beginners and experts in cloud computing. The author describes the fundamental characteristics of clouds and cloud computing. The author describes models and strategies regarding marketing and pricing of cloud computing. The author does a thorough job of providing context and background of cloud computing in order to make his major points regarding his thesis of why cloud computing will never be free. The author also attempts to make predictions for future trends or patterns in the market for clouds and the cloud technology.

Gold, J. (2012). Protection in the Cloud: Risk Management and Insurance for Cloud Computing. Journal of Internet Law, 15(12), 23 -- 29.

This author writes about how cloud computing and other kinds of technological innovation need legal provisions. The law must keep pace with the technology and the risks the technology brings. This yet another author that concerns himself with security issues and risk management with regard to cloud use. This author, like other authors mentioned here, are very concerned with safeguarding data and safeguarding private information. This author provides insight regarding specific forms of legal safeguarding...

...

(2011). Cloud Computing Security. International Journal of Engineering Science and Technology, 3(4), 3478 -- 3484.
This article provides a structural and functional overview of cloud computing. The authors discuss security threats, security measures, and a well-rounded argument describing the advantages and disadvantages of using a cloud. The article in a way makes cloud use seem inevitable, but tries to prepare user and really administrators, for the potential risks and philosophy for strategies of protection.

Leonard, J. (2011). Changes in Governance. Network World, October, 28 -- 29.

The article is about the relationship between operational security and an organization's cloud model. The author stresses the importance of security & risk assessment, as well as strategic staffing to hire people with the technical skills to assess and resolve present and potential security threats to the organization's cloud. The author concludes by urging organizational leaders to take into consideration their organizational culture and to conditionally consider forging professional relationships with businesses who can effectively assist in the minimization of security threats.

McAfee, A. (2011). What Every CEO Needs to Know about the Cloud. Harvard Business Review, November, 125 -- 134.

This article is intended for high ranking professionals who are not yet familiar with cloud computing and the ways in which its use could benefit an organization. This is an article that provides several well-argued reasons as to why the adoption and use of a cloud for an organization is beneficial and may provide a competitive advantage in that organization's particular market. The author additionally provides the perspective from a skeptic's point-of-view. Later in the article, the author provides simple and explicit…

Sources Used in Documents:

The article describes a different sort of flood that is occurring in Thailand. The flooding is of data. The article describes the data floods in Thailand as well as the strategies handling data floods. This article is intended for CIOs as well as those who work closely with CIOs and even those who hire CIOs. The tone of this article is that of prevention and to learn from the examples of what is happening in Thailand.

Shankar, R. (2011). Securing the Cloud. Silicon India, January, 34 -- 36.

This author proclaims that no cloud can ever be fully secure, yet there are measures that can be taken to secure clouds. He puts the responsibility of securing clouds to the SMB owners. This author, like other authors, prescribes some actions, but mainly recommends a change in mind-set or perspective when considering security threats as well as their solutions.


Cite this Document:

"Information Technology -- Annotated Bibliography Information Technology" (2012, August 12) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/information-technology-annotated-bibliography-109546

"Information Technology -- Annotated Bibliography Information Technology" 12 August 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/information-technology-annotated-bibliography-109546>

"Information Technology -- Annotated Bibliography Information Technology", 12 August 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/information-technology-annotated-bibliography-109546

Related Documents

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

Information Technology (IT) is a broad-based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new, appearing in a 1958 article in the Harvard Business Review in which the authors said, "this new technology does not yet have a single established name. We shall call it information technology (IT)" (Dunn,

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

In the nursing field, there is becoming a concept such as the digital divide among nurses. Even though many nurses are familiar with the Internet and access it on a daily basis, there are some nurses who are familiar with other emerging technologies as it pertains to nursing and there are some nurses who feel that navigating the Internet is the only technology they need to know (Lupianez-Villanueva et