The Final Search – Saturation Achieved?

I chose a topic of impacts on financial sectors implementing cloud service providers. In this case, I want to compare what affects could be had on banking institutions who look to host private versus public clouds for their infrastructure, and if there should be a standard to follow. I find this topic important because I work in a financial institution, and I wanted to gain as much knowledge as I could about this topic for future models.

FelixMittermeier / Pixabay

First Search

  • Database: Business Source Premier
  • Search: Cloud “AND” security “AND” aws
  • Limiters: Full Text, Peer Reviewed
  • Results: 2

Piper, A. (2019). Security in the cloud: The growing use and increased complexity of cloud computing is creating new challenges for internal auditors. Internal Auditor, 76(4), 20–25.

Annotated Bibliography #1

This article talks about the importance of understanding cloud security through an audit perspective. There were case examples of why the auditors needed to understand cloud security and methods for fail-over cloud services. The author of this article specializes in corporate governance, risk management, and internal audits which are all key components to banking services. This peer-reviewed article covers industry standards for cloud services and the importance of strategic movements towards cloud environments.  The article covers different examples from reasons why we should understand how cloud service providers work, to when to get into the service, potential issues with the services, and working together to perform proper security audits on cloud service providers.

*****************************************************************************************

Second Search

  • Database: Computer Science
  • Search: Bank “AND” Cloud Security
  • Limiters: Full Text, Peer Reviewed
  • Results: 100

Kalaiprasath, R., Elankavi, R., & Udayakumar, R. (2017). Cloud security and compliance – A semantic approach in end to end security. International Journal on Smart Sensing and Intelligent Systems, 10, 482-494. https://doi.org/10.21307/ijssis-2017-265

Annotated Bibliography #2

This study defines why a uniform cloud security standard needs to be set to improve consumers thoughts around cloud systems. In this article over 100 cloud providers security controls were reviewed and the information was imported into a web-based application for consumers to review. This web-based application will help consumers know which cloud securities are being practiced by each servicer to guarantee they have the best solution possible. This article was written by individuals with knowledge in security and technology. They have various degrees in informatics to stand by their assessments of cloud security controls. This article covers the problems of not having a standard for cloud security, what consumers can use to ensure their choice of cloud provider is safe, and future advancements for cloud security rules.

*****************************************************************************************

Third Search

  • Database: Computer Source
  • Search: Cloud “AND” security “AND” risks
  • Limiters: Full Text, Peer Reviewed
  • Results: 16

Tang, J., Cui, Y., Li, Q., Ren, K., Liu, J., & Buyya, R. (2016). Ensuring security and privacy preservation for cloud data services. ACM Computing Surveys, 49(1), 13:1-13:39. https://doi.org/10.1145/2906153

Annotated Bibliography #3

The information provided in this study is very detailed for cloud service provider security risks. The information obtained in this article found current risks in cloud services and provided ways to fix the open issues. In the article there is also information that provides details on both external and internal security threats. The authors of this article have many combined years of experience in this field and applied existing knowledge to the subject text. The results of this article found the cloud security loop-holes, confidentiality issues, and the issues of performance verses security for cloud based hosted servers.

*****************************************************************************************

Forth Search

  • Database: Small Business Reference Center
  • Search: Bank “AND” Cloud
  • Limiters: Full Text, 2018-2022
  • Results: 55

Ritchie, D. (2019). Capital one breach brings cloud security into focus. Global Finance, 33(8), 63.

Annotated Bibliography #4

A brief article covering information regarding the breech that happened to Capital One by a previous Amazon Web Service (AWS) employee. This article informs the public about a breech that occurred with over 100 million subscriber’s personal information being shared out. This article from Global Finance highlights the importance of understanding that cloud services hosting banking information can be breeched and what could potentially happen to the data.

*****************************************************************************************

Fifth Search

  • Database: Computer Science
  • Search: Financial “AND” Blockchain “AND” Cloud
  • Limiters: Full Text, Peer Reviewed, narrowed to last two years
  • Results: 66

Arjun, R., & Suprabha, K. R. (2020). Innovation and challenges of blockchain in banking: A Scientometric view. International Journal of Interactive Multimedia and Artificial Intelligence, 6(3), 7-14. https://doi.org/10.9781/ijimai.2020.03.004

Annotated Bibliography #5

In this peer-reviewed article, the idea of blockchain is discussed and the dynamics for future uses in financial sectors. The idea of a potential impact to global economics is discussed in this article regarding the use of blockchain. The authors of this article are both very knowledgeable in this subject with several published articles already. They highlight the importance of understanding what blockchain is, how it can impact the financial sector, and the importance of a standardized framework for blockchain technologies.

*****************************************************************************************

Saturation Achieved?

During the last few weeks, I have been searching as much as I could, reading as much as possible, and changing key terms to find as much information as possible. I have found that Computer Source, Business Source Premier, and Computer Science have been the best databases for my searching. While I have used other sources like Small Business Reference Center, Applied Science & Technology Full-Text, and Faulkner’s Advisory for IT Studies, these databases did not return the best search results. I have struggled to find other articles I have not already cited in previous blog posts; therefore, I do believe that I have come close to reaching saturation. However, as I do my research project, I believe that I will continue to search more to validate my research information.

About Kaci Kirmer

I currently live in Hays, KS and I work full time as a System Administrator. I am married and we have 4 boys, ages 8, 3, almost 2, and an almost 3 week old. I enjoy being active and being outdoors, especially running with my two dogs.

Leave a Reply

Your email address will not be published. Required fields are marked *