Annotated Bibliography Value: 25% Due date: 26-Apr-2018 Return date: 17-May-2018 Length: 2000 words XXXXXXXXXXpages) Submission method options Alternative submission method Task WHAT TO DO: Tasks 1...

1 answer below »
Emerging technologies copy 3


Annotated Bibliography Value: 25% Due date: 26-Apr-2018 Return date: 17-May-2018 Length: 2000 words (10-12 pages) Submission method options Alternative submission method Task WHAT TO DO: Tasks 1 and 2 below TASK 1 Annotated Bibliography 20% 1. Write an Annotated Bibliography for your Capstone Topic with a collection of 12 articles following a set structure. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5. 2. Use the latest online search tools (CSU PRIMO, Google Scholar, Online databases) and efficient bibliographic organisers - CSU supports the use of EndNote. (available on iPad). EndNote is a  bibliographic citation program, allowing references and footnotes to be translated into a variety of standard formats. 3. As a CSU student you can download and install EndNote X7 for Windows or Mac OS platforms from https://online.csu.edu.au/division/dit/software/core.html 4. For Group Work OPTION teams only: Assessment Item 3 Annotated Bibliography is done INDIVIDUALLY by ALL students. 5. Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements for academic integrity. 6. You can get help in Building and Writing an Annotated Bibliography from Topic 3 Tutorial Topic in the ITC571 Interact2 site sidebar menu and other study advices and tips from: 1. Study Resources (PDF files to download): http://student.csu.edu.au/study/resources 2. APA style Referencing from http://student.csu.edu.au/study/referencing-at-csu. 3. The CSU Library website for LibGuides in Information Technology, Computing and Mathematics at http://libguides.csu.edu.au/cat.php?cid=66969 4. EndNote Bibliographic software and tutorials LibGuide at http://libguides.csu.edu.au/endnote 7. Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a 12-article Annotated Bibliography on your topic. 8. A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on the CSU Library website at http://www.csu.edu.au/division/library As an example, the Capstone Topic PRIMO search on a topic like "near field communication applications" returned the following list of very recent journals, books, conference proceedings and eBooks related to the Topic: Library Resources Information Technology Journal Databases: http://www.csu.edu.au/division/library/find-info/databases/subject/infotech Information Technology & Computing LibGuides : http://libguides.csu.edu.au/itc  The following questions may be useful while reviewing the topic: 1. What is the new technology? 2. What does it do and what are the special features it has? 3. When is it coming out in the market and how much will it cost? 4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc….). 5. In your opinion, will the new technology be beneficial to society? Why or why not. 6. What did you learn from a critical analysis of your sources of information on this new technology? TASK 2 Originality Report and Questions 5%   1. Generate an originality report and submit this report via EASTS 2. CSU recommends Turnitin at turnitin.com for checking originality of content is assessment tasks as described in the Subject Outline and in the Assessment Task where it is required. 3. For this subject if you or your organisation use another similar tool then that is fine to use, but let me approve it first. 4. One approved alternative to Turnitin is the SEO Tools Plagiarism Checker at http://smallseotools.com/plagiarism-checker/. This is used by several institutions, academics and research students as an alternative to Turnitin.com. 5. Answer the following questions to interpret the originality report. The questions can be found through the following link: http://www.academicinternational.org/teaching/turnitin.pdf 6. Submit your question answers via EASTS.
Answered Same DayApr 20, 2020ITC571Charles Sturt University

Answer To: Annotated Bibliography Value: 25% Due date: 26-Apr-2018 Return date: 17-May-2018 Length: 2000 words...

Perla answered on Apr 26 2020
142 Votes
Security of IOT and Big Data – Annotated Bibliography
Running Header: Security of IOT and Big Data – Annotated Bibliography
Title: Security of IOT and Big Data – Annotated Bibliography
Presented By:
Presented To:
Date: 25/04/2018
1) Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
The security aspects of the
big data are discussed in the current article. The emphasis is on the big data from healthcare domain. The key concern of the security functions are about keeping up the privacy matters secured in the big data information. The article worked on to emphasize the security aspects in health care industry big data. It is indicated in the article that there is scope to leverage collective intelligence by leveraging the distribution across different sources. It is expected that such distributive information will render better security of the information.
2) Ahmed, E. S. A., & Saeed, R. A. (2014). A survey of big data cloud computing security. International Journal of Computer Science and Software Engineering (IJCSSE), 3(1), 78-85.
The article discusses the security profile of the operations where in the big data is integrated with the cloud computing operations. The discussion emphasizes the fact that the Information technology services will offer very high efficient and effective solutions to variety of problems. The articles emphasizes on the matters how the security problems of the big data can be overcome, further there is also specific focus on the security for the big data in cloud computing operations. Survey of big data with cloud computing security and the mechanisms that can be employed to protect and secure the big data are discussed here in this report that can work for the betterment of the privacy of big data on the available clouds at present. It is indicated that the volume, variety and velocity are new axioms of the big data being used in cloud computing and the new security measures need to overcome the new challenges of security barriers and they should work on to enhance the efficiency of the security aspects of the big data.
3) AlMutairi, A. M., AlBukhary, R. A. T., & Kar, J. (2015). Security and privacy of big data in various applications. Int J Big Data Secur Intell, 2(1), 19-24.
The article works on to present an overview of the evolution of the big data. More specifically how the big data has evolved from the changing paradigms of the technology applications and also there is very detailed focus on the way the big data is becoming critical. It is indicated that as the massive information quantity is getting collected on diverse application areas like health care, social networks, e-commerce, government and telecommunication applications the criticality of the sensitive information is also growing. In this connection an opinion is expressed to take up additional measures of security in line with the changing criticality and the changing paradigm of application landscape of big data.
4) Khan, I. U., & ur Rehman, S. (2017). A review on big data security and privacy in healthcare applications. In Big Data Management (pp. 71-89). Springer, Cham.
The challenges of big data security and more specifically in the health care applications are discussed in the article. Diverse aspects of big data in connection with the health care industry are discussed in the current article. There is focussed discussion on the aspects like data security, data privacy, user access protocols and user access technologies, further there is also discussion on the aspects of user authorization protocols. While appreciating the need for the security connected with the big data, the article proposes variety of means and procedures to counter the security lapses in the big data applications and different types of security mechanisms are proposed to take care of security requirements in the big data applications.
5) Ma, L., & Jiang, M. (2014, August). Chances and challenges confronting securities industry and the countermeasures in big data and cloud computing era. In Computer Science & Education (ICCSE), 2014 9th International Conference on (pp. 177-182). IEEE.
It is indicated in the article that the big data is both a challenge as well as an opportunity for securities industry. The key focus on the article is on the ways of the data mining and the possible security measures which can be integrated with the data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here