Annotated Bibliography

Annotated Bibliography

 

Article 1:

Interpretation and evaluation

In the article conducted by Manikandasaran, Arockiam& Nagarajan, (2016), the new technology that is discussed is hybrid security service and cloud security associated with cloud storage technology. The trending hybrid security service algorithm integrates obfuscation and encryption techniques called EOcipher, due to which the technology values in the trillion dollars business in the IT sectors.

Evidence of literature

The study lacks involving sensitive information and data in its literature review portion which is determined as its weakness.

Critical reflection and synthesis

The absence of literature reviews along with simple research methods, it is little difficult to understand the theories and models discussed in the article.

Original opinion

Analyzing the core findings of the research, I think this hybrid security service and cloud security can be deemed to provide effective solutions to corporate associates in resolving their contemporary outsourcing management issues.

Reflective comments

As per my opinion, literature reviews along with a mixed method of data collection can be integrated to improve the credibility of the study, for future preferences.

 

 

Article 2:

Interpretation and evaluation

In the article by Davenport and Ronanki (2018), the significant role of Artificial Intelligence (AI) technology has been discussed that renders diverse benefits to corporate associates in managing their outsourcing along with other operation management processes. The market price of AI depends on its utilizing aspects. The tech solution can be embraced by different sectors.

Evidence of literature

Huge business benefits that are sustained by the corporate associates with the usage of AI has been evaluated. AI is renowned for its enhancement of operating function and features of available resources while ensuring improvement in overall productivity.

Critical reflection and synthesis

Primary data collection methods have been conducted along with observation. Usage of simple and understandable language makes this article influential.

Original opinion

Benefits of the AI in corporate units for managing outsourcing along with other activities are explained in a wider manner which can be utilised for further studies.

Reflective comments

As per my opinion, secondary research along with literature reviews could have been done as this would have improved the level of reliability for the future researcher.

 

 

Article 3:

Interpretation and evaluation

In the article conducted by Cearnău (2018), the significance impact of cloud computing, IoT and Big Data to overcome the contemporary business related issues like outsourcing has been discussed. Technologies discussed are majorly embraced by IT sectors and medical sectors to reduce its complexities related to outsourcing like cybersecurity crimes.

Evidence of literature

From the literature review portion it has been evaluated that huge industries like Amazon, Blumix and many more incorporate such technologies to mitigate any issues in the operation management process.

Critical reflection and synthesis

Information provided in the articles renders diverse benefits of using such technologies. However, less use of theories and systematic frameworks are found.

Original opinion

As per my view, using this advanced technological software would enable every business sector to construct efficient strategies that would ensure well-being and expansion.

Reflective comments

Qualitative analysis would have been done while surveying companies using such technologies.

 

 

Article 4:

Interpretation and evaluation

In the article of Wang, Wang, Taleb& Jiang, (2019), technologies like web services, IoT, block chain and cloud computing have been discussed. Technologies discussed can render efficient values to all sectors.

Evidence of literature

Information collected from different secondary sources emphasized on describing the benefits and limitations associated with these technologies.   

Critical reflection and synthesis

The study fails to explain its facts discussed in a theoretical manner. Besides, lacking theories deteriorates the quality of paper.

Original opinion

According to me, this paper can moderately be used for future preferences.

Reflective comments

Implementation of the primary method is essential for improving the standards of the study for future preferences.

 

 

Article 5:

Interpretation and evaluation

In the article of Ghilic-Micu, Mircea &Stoica, (2017), the latest technology QAaaS associated with the cloud IoT ecosystem that renders tech-solutions to crowdsourcing and cloud service clusters has been discussed.

Evidence of literature

Conceptual framework exhibiting the functioning of IoT and cloud computing which successfully increased the values and credibility of the study.

Critical reflection and synthesis

All the variables associated with technologies were widely discussed portraying simple and understandable study for the future preferences.

Original opinion

Wisely usage of diagrams is considered as the strength of the study which helped in understanding the concept in broader manner.

Reflective comments

Primary methods can be used for improving the reliability rather than just reling on the secondary methods.

 

 

Article 6:

Interpretation and evaluation

Article conducted by Hanifa (2016), disruptive technology in aspects to cloud computing has been explained. Technologies if successfully incorporated can financially and economically benefit corporations.

Evidence of literature

Usage of statistics and diagrams exhibited a significant outcome from disruptive technology in IT sectors. The effective usage of graphs, tables and statistics to explain the facts contributes valuable information that are easy to understand.

Critical reflection and synthesis

Only basic facts and significance of cloud computing have been discussed and other advanced features of CC system is avoided which resulted in poor rate of credibility of study for future preferences.

Original opinion

Analyzing the discussed facts it is observed that this technology can help any corporate associates to resolve its issues related to outsourcing and threats.

Reflective comments

More research using the latest published outsources articles and journals on disruptive technologies could have done.

 

 

Article 7:

Interpretation and evaluation

In the article by Solana-González, Alberto Vanti& Fontana, (2019), technologies like IoT security, cloud computing security along with data encryption are explained in improving cyber security while business outsourcing. Technologies like this are relatively expensive and are majorly affordable for big IT sectors.

Evidence of literature

Significance impact of such technologies in controlling and protecting outsourcing practices along with other operation management processes has been widely discussed in literature review portions.

Critical reflection and synthesis

Online survey on the huge number of participants has been conducted which determines the strength of study as it successfully raised the credibility of the research with relevant statistics.

Original opinion

I have observed that risk assessment is highly identified and has always been a concern for the industrialists, due to which diverse compliances and laws have been formulated with the usage of CC and IoT technologies.

Reflective comments

More explanation of control on management approaches and security standards associated with the usage of IoT security, cloud computing security along with data encryption can be discussed to expand the credibility level for future preferences.

 

 

 

Article 8:

Interpretation and evaluation

In the article of Durão, Carvalho, Takey, Cauchick-Miguel &Zancul, (2018), IoT technology as an analytic hierarchy process has been explained.

Evidence of literature

Systematic literature review has been conducted that expresses every fact in a concise manner that is more understandable. This is the reason for the increased list of preferences by the researchers for this article.

Critical reflection and synthesis

Cross-sectional analysis along with observation has been conducted for rendering relevant findings on the significance of IoT technology for managing operational units considering outsourcing processes and issues related. Based on the observation and secondary sources data analysis has been done which is therefore accentuating old statistics.

Original opinion

As per my views the usage of citation analysis along with selection criteria matrix are proven as an effective practice to improve the quality of findings. Besides, I liked the way of exhibiting every fact discussed in a tabular and statistical manner.

Reflective comments

According to me, primary methods would have provided more relevant facts and information encompassing trending statistics.

 

 

Article 9:

Interpretation and evaluation

As per the article by Lokshina, Lanting& Durkin, (2018), latest technologies of Big data and IoT, wireless sensor network (WSN) technology, its significance in sustaining business opportunities has been discussed. The technology of WSN is found to be best suitable for every medium and small industry.

Evidence of literature

Wide information related to the context of IoT and Big Data has been expressed. Explanation on the different variables of technologies are done with the help of diagrams and statistics.

Critical reflection and synthesis

Literature review of the study can be considered as strength, as all the variables of IoT and Big Data associated with WSN are broadly explained. Beside thematic analysis were done, explaining different case scenarios which can be beneficiary even for future preferences.

Original opinion

Analyzing the discussed information of WSN, it has been observed that the technology can be best suitable for knowledge-based management practices in reducing risk associated with outsourcing.

Reflective comments

According to me, primary research was necessary to sustain views and opinions of medium and small corporate units for rendering relevant information and data.

 

 

 

Article 10:

Interpretation and evaluation

In the article conducted by Park and Shin, (2017), the significance of IoT technology as a leading technical perspective for increasing the accessibility of the operation management process has been discussed.

Evidence of literature

Discussion in the article is brief and includes only necessary variables of IoT and its impact on business.Analyzing the information on IoT it can be evaluated that this technology can be effectively incorporated by all sectors of industries.

Critical reflection and synthesis

Very limited information making it difficult to get accurate knowledge on IoT and its significance in overcoming issues related to outsourcing.

Original opinion

Information provided in the article can limit which if used in the future study would deteriorate the credibility and reliability status of the study.

Reflective comments

It is highly necessary to include more information and data using either of research methods.

 

 

Article 11:

Interpretation and evaluation

As per the article by Souri and Norouzi, (2019), safety critical systems associated with IoT technology provide effective technological-solution to corporate associates to overcome outsourcing issues. Industries like retail, healthcare and IT can get benefits from the identified technology.

Evidence of literature

Literature review section provides a wide range of information on the identified technology.

Critical reflection and synthesis

Lack of current information and data makes the article ineffective for future preferences.

Original opinion

Can provide only basic knowledge and information making the study unsupportive for future study

Reflective comments

Need to include primary methods so that information level can be improved with current data.

 

 

Article 12:

Interpretation and evaluation

In the article conducted by Zeng, Wang, Deng, Cao, &Khundker, (2012), the significance of cloud computing in improving the organizational structure has been discussed. The main objective of the paper is to systematically analyze secure collaboration between technological aspects like cloud computing along with the corresponding solution as well as challenges that arises while integrating such technology.

Evidence of literature

Usage of statistics and diagrams to express the facts discussed renders strength of the article. Very limited range of information and data addressed. Analyzing LR portion it is evaluated that the technologies accomplished from cloud computing technology can be flexibility adapted and implemented by all small, medium and large sectors evolving all the industries.

Critical reflection and synthesis

Lack of accurate usage of data analysis that weakens the credibility and reliability of the study. Besides, basic information is provided which makes it difficult for in-depth analysis.

Original opinion

Vast range of information is covered on the supply chain management system and less facts on outsourcing issues. Despite information and data evolved in the study are very appropriate, but although very basic.

Reflective comments

Can be effective if required to emphasize more on SCM more. Besides, primary methods can be conducted for improving the credibility and reliability

References

Cearnău, D. C. (2018). Cloud Computing–Emerging Technology for Computational Services. Informatica Economica22(4), 61-69.

Davenport, T. H., &Ronanki, R. (2018). Artificial intelligence for the real world. Harvard business review96(1), 108-116.

Durão, L. F. C., Carvalho, M. M., Takey, S., Cauchick-Miguel, P. A., &Zancul, E. (2018). Internet of things process selection: AHP selection method. The International Journal of Advanced Manufacturing Technology99(9-12), 2623-2634.

Ghilic-Micu, B., Mircea, M., &Stoica, M. (2017). QAaaS in a Cloud IoT Ecosystem. Informatica Economica21(4), 5-14.

Hanifa, S. M. (2016). A Review on Disruptive Technology-” Cloud Computing”-Roadmap to Models and Security Threats and Causes. i-manager’s Journal on Cloud Computing3(3), 33.

Lokshina, I. V., Lanting, C. J., & Durkin, B. J. (2018). IoT-and Big Data-Driven Data Analysis Services for Third Parties, Strategic Implications and Business Opportunities. International Journal of Social Ecology and Sustainable Development (IJSESD)9(3), 34-52.

Manikandasaran, S. S., Arockiam, L., & Nagarajan, L. (2016). EOCIPHER: A Hybrid Approach to Enhance Security of Outsourced Data in Public Cloud Storage. In Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science,(AICS2016) (pp. 33-43).

Park, K. C., & Shin, D. H. (2017). Security assessment framework for IoT service. Telecommunication Systems64(1), 193-209.

Solana-González, P., Alberto Vanti, A., & Fontana, K. H. S. (2019). MULTICRITERIA ANALYSIS OF THE COMPLIANCE FOR THE IMPROVEMENT OF INFORMATION SECURITY. JISTEM-Journal of Information Systems and Technology Management16.

Souri, A., &Norouzi, M. (2019). A state-of-the-art survey on formal verification of the internet of things applications. Journal of Service Science Research11(1), 47-67.

Wang, H., Wang, Y., Taleb, T., & Jiang, X. (2019). Special issue on security and privacy in network computing. World Wide Web, 1-7.

Zeng, Y., Wang, L., Deng, X., Cao, X., &Khundker, N. (2012). Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Computers in Industry63(6), 545-556.

Step 1 of 2
Please sign in first
You are on your way to create a site.