annotated bibliography and literature review 1
Part A:
Annotated bibliography and literature review
Select 30 papers about Securing Cloud Data and Privacy. It must contain the following contents:
a. Citation
b. Introduction
c. Aim and research method
d. Scope
e. Usefulness
f. Limitations
g. Conclusions
Note:
since you will use these papers for Part B, you should select papers
which are suitable for your knowledge and discipline, i.e., it can be
related to topics in information systems, information technology, or
computer science.
Part B:
Critical literature review, qualitative
design and qualitative analysis Using the method of exploratory design,
design your research on a topic about Security Policies for Securing
Cloud Data and Privacy. Your design should consist of the following
phases:
a. Critical literature review
b. Identifying a research problem,
c. Survey, and
d. Qualitative analysis.
Critical literature review : review these papers you selected in Part A and write a report to summarise them including
a. Describe related work,
b. Describe the significance and contribution of each paper and compare them,
c. Describe the limitations, and
d. Identify a research problem you want to address.
Research proposal: Your proposal should cover the following aspects:
a. The background and research problem,
b. The review of literature or theoretical framework of the study,
c. Objectives or aims,
d. The methodology and procedure of the study,
e. Implications or significance of the problem,
f. Expected outcomes and