Case Studies Of Successful And Failed IT Projects And Their Assessment: An Annotated Bibliography

Annotated Bibliography 1

Title of article: Enterprise Information Systems Security: A Case Study in the Banking Sector

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Industrial system have been preferring reducing their operational expenses. Therefore, they need proper systems for providing stability, fault tolerance and flexibility. BANK systems have been helping in providing such facilities to organizations. However, there has been challenges in the cloud based BANK system, has been discussed in the paper.  

Methods and Data Used:

The paper has used qualitative approach in order to collect data and information related to the BANK systems. Data has been collected from secondary data sources including online articles and journals. The secondary approach has helped in maintaining a keen approach to various data from different journals related to the bank systems.

Results and Conclusion:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

After analysing the data, various information about the mitigation strategies have been addressed in the report. The advent if the IoT cloud computing has been discussed in the report. The use of the cloud computing in the devices has been described for the beneficial use of cloud computing.

The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:

This paper has been helping in analysing a system for helping organization. BANK systems has been helping providing health care solutions and enabling doctors to work more efficiently. Standard protocols related to bank systems have been analysed in this paper. The paper has not able to provide proper solutions to the bank security over cloud (Sajid, Abbas and Saleem 2016). The future research work might focus on file integrity monitoring process to secure data over BANK in cloud environment. The use of security policies has been maintained in order to secure network security.

This paper discussed the enterprise information security within the selected case study (Banking sector). It discusses the ongoing security threats and the strategies those could be adopted for enhancing the security in much more efficient and effective way. The paper was selected because proper data collection has been done in this paper and the analysis of data has been done properly.

Title of article: Disaster at a University: A Case Study in Information Security

Information technology has been increasing in the online business market. This has been creating several opportunities for businesses. However, with several opportunities, various risks and threats have been combined with it. Information security has been the most growing security issues in the IT field. This paper has done significant researches in various data security issues in the IT field. This paper has discussed abut several managerial actives for ensuring IT data management issues in the business.

This paper has done secondary approach towards review of existing literature on management role in IT industry. Data has been collected from several online journals and databases. Recent journals after 2012 have been taken for collecting data and information related to IT security issues. Non-academic papers have been rejected for reliability and validity purposes.

Results and Conclusion:

After analysing data, various organization activates have been identified for ensuring security of data and Information. Installation of firewalls and VPN have been common approach for the companies for ensuring security of data. An effective information security governance policy have been implemented in several organization for ensuring security f data and information.

Annotated Bibliography 2

The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:

The paper has been able to research about various aspects of security issues in the IT management of data. Proper review of existing literature has been done. The secondary approach of the data collection has been able to find sensible data and information regarding IT data management issues. However, there have been some weaknesses including some keyword are used that may lead to some literature untouched (Soomro, Shah and Ahmed 2016). No alternative search protocol have been used. The paper has been published in English language only that might limits the knowledge of readers of other lingual activities. The future work of the researchers might get easy with the study of this paper as illustration of each security points have been provided.

This paper has been used as there has been an illustrated details about all the security concerns in IT data management issues.  This paper has been able to identify al security concerns in the IT data management issues and so it is relevant to the selected topic. This paper has been also able to properly analyse data and provide proper solutions to data security issues those could be utilized for enhancing the securities.

Title of article: Managing Security Requirements in Practice: A Case Study

Smart grid has been a technological innovation that help in improving reliability, efficiency, economics and sustainability of electricity services. However, there have been several challenges in the smart grid including managing smart meters, power assets and managing huge amount of data. This paper has helped in building a hierarchical framework for securing data and information over the cloud.

The research has used secondary methods for data collection process. Data has been collected from secondary sources including online journals, articles and government database.  . Recent journals after 2012 have been taken for collecting data and information related to smart grid security issues. Non-academic papers have been rejected for reliability and validity purposes.

Results and Conclusion:

This paper has described about critical issues in the smart grid cloud computing.  The use of the cloud computing in the smart grid has been described.  The researcher has not able to mention the security solutions in the paper in a practical way.  The use of cryptography in the context has not been properly described in the report.

The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:

This paper has described about the benefits of the smart grid. The IT management in the smart grid has been analysed properly. The logical component of the smart grid process has been described in the paper ( Baek et al. 2015). The information flow in the smart grid systems has been explained. The paper has not able to minimize the security issues identified in the paper. The encryption policy in the smart grid concept in cloud environment has been discussed in the paper that might help in minimizing security challenges in the smart grid.

Annotated Bibliography 3

This paper has been able to discuss about the security challenges in the smart grid system in cloud computing. This paper has able to properly analyse data and provide proper solutions to data security issues. The security solution for the smart grid concept has been properly mentioned in the paper. A proper data analysis has been provided in the paper.

Title of article: Information Security Curriculum Creation: A Case Study

The Internet of Things (IoT) devices have been becoming popular in various domains including e-health, e-commerce and e-Home. The deployment if IoT devices have been increased in practical with several security issues and attacks on it. Various security changes have been found in the IoT devices. This paper has discussed about IoT challenges and provided strategies and solution to mitigate these security issues.

The paper has used secondary approach for analysing and collecting data and information. Data has been collected from various online resources including online journals, articles and books related to IoT devices security challenges. Research journals have been taken from 2012 to 2018 published year that help in collecting current data.  

Results and Conclusion:

This paper has addressed various security changes in the IoT devices and emphasized on what can be done to mitigate these challenges. A security architecture has been proposed for mitigating security challenges in the IoT devices. Handing of IoT Big data has been discussed in the paper.

The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:

This paper has able to identify different types of attacks in the IoT devices including device property attacks, Adversary location attacks, Access level attacks, Host based attacks and protocol based attacks.  These attacks have been properly analysed. This work has focused on overall security architecture as a solution to these issues in the IoT security (Hossain, Fotouhi and Hasan 2015). This paper lacked in the implementation of solutions of these attacks. The IoT security analysis has been provided in the research paper. The future research can be done for enhancing these solution provided in this research.

This paper has focused on the core competency of the security issues in the IoT devices.  The security issues have been properly analysed.  The researcher has been able to convey the solution required for management of security issues in the IoT devices. 

References

Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), pp.215-225.

Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted IoT-based BANK systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.

Baek, J., Vu, Q.H., Liu, J.K., Huang, X. and Xiang, Y., 2015. A secure cloud computing based framework for big data information management of smart grid. IEEE transactions on cloud computing, 3(2), pp.233-244.

Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.