Name: | Ben Parkinson | ||
Project Title: | Centralising Australian Government Cybersecurity | ||
Week No: | 8 | Date: | 6/09/2020 |
Planning | |||
Milestone: | Planned: | Actual: | Comment: |
Assessment 3 | 13/09/2020 | TBC | All articles identified |
Issues | |||
Description: | Date: | Action/Results | Finished (Y/N) |
Finding Articles | 06/09/2020 | Begin review | Y |
Work impact | 06/09/2020 | Nil taken | Y |
Week 8
Week 8 – Another few identified
I’ve now identified all articles, and reviewed another one. The list of articles I’m going to look at are below. Including them here because I’ve had a few issues with synching my Endnote, which blew away my last library.
References
- Baur-Ahrens, A. (2017). The power of cyberspace centralisation: analysing the example of data territorialisation. In M. Leese & S. Wittendorp (Eds.), Security/Mobility: Politics of Movement (pp. 37-56). Manchester University Press.
- Better Cloud. (2019). State of Insider Threats in the Digital Workplace. https://www.bettercloud.com/monitor/wp-content/uploads/sites/3/2019/03/BetterCloud-State-of-Insider-Threats-2019-FINAL.pdf
- FireEye. (2017). Security Orchestration: Best practices for any organization. https://www2.fireeye.com/rs/848-DID-242/images/wp-accessible-security-orchestration.pdf
- Griffith, M. K. (2018). A comprehensive security approach: bolstering Finnish cybersecurity capacity. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 407-429. https://doi.org/10.1080/23738871.2018.1561919
- Islam, C., Babar, M., & Nepal, S. (2019). A Multi-Vocal Review of Security Orchestration. ACM Computing Surveys (CSUR), 52(2), 1-45. https://doi.org/10.1145/3305268
- MacDonald, N., Orans, L., & Skorupa, J. (2019). The Future of Network Security is in the Cloud. https://www.gartner.com/doc/reprints?id=1-1OG9EZYB&ct=190903&st=sb
- Mallinder, J., & Drabwell, P. (2013). Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack. Journal of business continuity & emergency planning, 7(2), 103-111.
- Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189. https://doi.org/10.1016/j.dss.2010.12.006
- Miskon, S., Bandara, W., Gable, G., & Fielt, E. (2011). Success and failure factors of Shared Services: An Information Systems literature analysis. Proceedings of the International Conference on Research and Innovation in Information Systems, 1-6. https://doi.org/10.1109/ICRIIS.2011.6125726
- Poppensieker, T., & Riemenschnitter, R. (2018). A new posture for cybersecurity in a networked world (McKinsey on Risk, Issue 5). https://www.mckinsey.com/~/media/McKinsey/Business Functions/Risk/Our Insights/A new posture for cybersecurity in a networked world/A-new-posture-for-cybersecurity-in-a-networked-world.pdf
- Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154-176. https://doi.org/10.1016/j.cose.2016.04.003
- Tourani, R., Bos, A., Misra, S., & Esposito, F. (2019). Towards security-as-a-service in multi-access edge. The Fourth ACM/IEEE Symposium on Edge Computing (pp. 358-363). https://doi.org/10.1145/3318216.3363335
Week 8 – Assessment 2 results back
I received my assessment 2 feedback today. Well technically received it yesterday, but only got around to looking at it today. The words used in the feedback were quite positive; however, the actual numbers associated with the feedback for my scores were pretty disappointing. I have considered going back to Ken to ask for further feedback, but at this point I just want to get through the subject, which is proving to be a struggle. In the interest of self-improvement I’ll be sure to get more comprehensive feedback for assessment 3, but I’m hoping the numbers aren’t so poor so won’t need the additional feedback.