Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from essay:
Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd.
The book is written on risk analysis using quantitative methodologies. The book has two parts and chapters are divided into these two parts. The first part is intended to help managers realize the rationale for conducting risk analysiswhereas the second part explains the modeling techniques of risk analysis. First part describes in detail the rationale for risk analysis, how to assess quality of risk analysis, and how to understand and use risks analysis results. Part two is based on use of statistical and mathematical processes to build risk analysis models. Correlation, dependencies, optimization in risk analysis, and checking as well as validating risk analysis model are the main important themes discussed in part two. The book adequately describes the risk analysis models and how best to use them, both in perspective of managers and statistical analysts.
Gold, J. (2012).Protection in the cloud.Internet Law, 15(12), 23-8.
The article is aimed at describing the potential downsides of using 'cloud services' by large organizations having sensitive operations. The article starts by citing three examples from recent history in which large cloud service providers were responsible for compromising the confidentiality and integrity of customer data. The customers in these cases were not individuals or small-medium firms but corporations that included largest banks of the U.S. The author then observes that considerable losses, litigation, and lack of confidence by customers in an obvious outcome in these circumstances. After describing the data types kept in clouds, the author highlights risk assessment and insurance coverage packages for providers. The article concludes that advanced planning and analysis should be used to minimize litigation for data breach.
Perera, I. (2010). Are free cloud services productive? A performance study on end user computing.Journal of Applied Computer Science & Mathematics, 8(1), pp. 34-40.
The article is based on cloud computing and its impact on the system performance of individual users of cloud computing. Since the requirements of individual users are significantly different and limited as that from enterprise users, the study provides home and office-based users' perspective regarding performance of cloud services. Productivity bottlenecks have been observed in system performance of individual users. Cloud computing platforms are an enhanced version of High performance computing (HPC) and grid computing. Service consumption in case of small users is actually their own computing resources rather than cloud. Awareness regarding how clouds provide service to individual users shall be communicated and security of resources in more important for the users.
Beynon-Davies, P. (2009). The language of informatics: The nature of information systems. International Journal of Information Management, 29 (2), 92-103.
The article is about the explanation of fundamental informatics. Information systems based on informatics and Inca and use the case study of Second World War. The researcher indicates that informatics based information system was also used in the Second World War and it played a decisive role in providing leverage to the allied forces. In order to create collaboration and coordination within an organization, 'semi-formal' language as that of WWII information system is proposed. The article segregates formative, informative, and performative acts by presenting graphical representation of the three acts.
Glesne, C. (2006). Becoming qualitative researchers: An introduction (3rd ed.). Boston, MA: Pearson Education, Inc.
The book provides an introductory orientation to 'qualitative research' specifically designed for the beginners. The process involved in qualitative inquiry is discussed in detail and the researcher is oriented to basic techniques, pitfalls, and practical uses of qualitative method of study. Context focused research and that conducted in natural settings is more associated to qualitative aspect of investigation. The social phenomenon is to be seen holistically and use of complex, multilevel, and iterative reasoning. Basic errors that are faced by beginners are also identified.
Klenke, K. (2008). Qualitative Research in the Study of Leadership. Bingley, UK: Emerald Group Publishing Limited.
The book describes the use of qualitative inquiry in the field of leadership. The book is comprised of four parts divided in 13 chapters. Chapters one and two from part one elaborates the context and theory in which qualitative research is performed as paradigm and method. By presenting main theories of qualitative research, the author then explores deep and multi-faceted aspects. In part two the author describes qualitative traditions in leadership research. Four techniques i.e. case study analysis, content analysis, qualitative interviewing, and mixed method leadership research are explained. Three chapters of part III describes relatively underused qualitative methods in leadership research. Ethnography, grounded theory, and phenomenology are briefly explained along with other less used methods. Part four presents authors own assessments of leadership research by qualitative method.
Reddy, V. & Reddy, L. (2011). Security architecture of cloud computing. International Journal of Engineering Science and Technology, 3(9), 7149-55.
The article is related to the use of cloud computing as dynamically scalable resource used through internet along with an elaboration of security issues. After providing an overview of high level cloud architecture, the authors explain the security issues posed to the end user of cloud services. Information security vendors are important part of a cloud-based securitization of network. Browser security and authentication are also among main security issues for end users. From the perspective of service provides the identified issues are identity and access management and privacy of users. The third facet of cloud service security is the security related to data in transmission. Flooding attacks and issues of virtualization are also present.
Slabeva, K.S., Wozniak, T., Ristor, S. (Ed.). (2010). Grid and Cloud Computing. Heidelberg, Germany: Springer-Verlag Berlin Heidelberg.
The book provides a theoretical and applicable framework that differentiates the grid and Cloud computing. Relatively more scheduled and engineering computing is used in the grid computing model. Distributed network are used for the purpose. Main difference in cloud based IT and grid IT is that former is more encompassing. Major similarity is the aspect of both grid and cloud computing is that their operations are only carried out through the use of internet. It is also important to know that grid computing is base of cloud computing.
Mujinga, M. & Chipangura, B. (2011).Cloud computing concerns in the developing economies.Australian Information Security Management Conference. Edith Cowan University. 196-203.
The article is aimed at investigating the issues faced by cloud computing users of small and medium businesses in the developing countries. After acknowledging the significance of cloud computing for small businesses, since they do not have much capital to invest in ICT, the article investigates main issues faced by cloud service providers and customers in developing countries. For providers, broadband network access is identified as main issue. For customers, issues such as availability of cloud service, privacy, and SLA management are important concerns. The article has discussed both deployment models and service models of cloud computing. Deployment models are private cloud, public cloud, hybrid cloud, and community cloud. Service models are SaaS, PaaS, and IaaS. Major cloud issues in Africa are internet coverage, infrastructure, device availability, the article is concluded by recommending strategies for providers and users of cloud computing.
Qaisar, S. & Khawaja, K. (2012).Cloud Computing: Network/security threats and countermeasures.Interdisciplinary Journal of Contemporary Research in Business, 3(9), 1323-9.
The article is aimed at presenting the backup plan for ensuring cloud computing network, for providers as well as users, is securitized. After briefly explaining the deployment and delivery models of cloud computing, the authors discuss network issues in cloud computing. Major network issues being identified are denial of service, network sniffing, and man in the middle attack, port scanning, SQL injection attack, and close site scripting. Main security issues identified in cloud computing are XML signature element wrapping, browser security, cloud malware injection attack, flooding attacks, data protection, incomplete data deletions, and lock ins. To securitize the cloud computing service, security of web browsers and web service structures is recommended.
Sambandaraska, D. (2012). Thai CIOs deal with floods, cloud and big data. Enterprise Innovation, (Dec. 2011/Jan. 2012), 40-1.
The article is based on an interview discussion with Michael Conlin, HP Strategist and CTO of HP Enterprise Services Asia at CIO routable conference in Bangkok. Conlin discusses the issue of cloud computing and security issues related to it. The discussion was held in backdrop of impact of floods in Thailand in perspective of ICT infrastructure. Due to physical impact of floods on data centers of firms, the CIOs of many firms had to transfer their data on cloud. Issues such as security, data integrity, and costs were vital for CIOs. Data overload became a pressing issue for managers and soon large volumes of data were transferred to cloud computing servers. Another issues identified by CIOs was compliance with cybercrime law of Thailand. The maintenance of logs for one year was termed as 'draconian' law since any violating firm would be heavily penalized. The cost increases immensely once all requisite measures for security are applied in cloud computing.
Proctor, P. (2004). Sarbanes-Oxley security and risk controls: when is enough? Infusion: Security & Risk Strategies, META Group.…[continue]
"Vose D 2008 Risk Analysis A Quantitative" (2013, February 25) Retrieved November 29, 2016, from http://www.paperdue.com/essay/vose-d-2008-risk-analysis-a-quantitative-103744
"Vose D 2008 Risk Analysis A Quantitative" 25 February 2013. Web.29 November. 2016. <http://www.paperdue.com/essay/vose-d-2008-risk-analysis-a-quantitative-103744>
"Vose D 2008 Risk Analysis A Quantitative", 25 February 2013, Accessed.29 November. 2016, http://www.paperdue.com/essay/vose-d-2008-risk-analysis-a-quantitative-103744