DescriptionSummarize, compare, and contrast your annotated bibliography into a 1-2 page literature reiew.Write your literature review as a stand alone document in APA style.Submit your assignment to Grammarly. Revise your assignment based upon the results from Grammarly. Submit evidence that you submitted and used the Grammarly results.DeliverableLiterature review, Grammarly evidence, and Certification of Authorship (sample attached) Certificate of Authorship.docx
Description Summarize, compare, and contrast your annotated bibliography into a 1-2 page literature reiew.Write your literature review as a stand alone document in APA style. Submit your assignment to
Running head: ANNOTATED BIBLIOGRAPHY 0 Information Governance Week 4: Annotated Bibliography Instructor: Dr. Mary Cecil Submitted By: Praveen Kumar Bodduna May 31st, 2020 Annotated Bibliography Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 102063. Summary The authors of this source have addressed the role that privacy play on the prediction of security perceptions. This journal thus highlights some of the perceptions that come with the issues related to the loss of data via mobile applications. Therefore, as a result of the use of these mobile applications there various security perceptions that have been brought up on management of insecurity issues that arise with the digital devices in conducting the businesses. Evaluation This is an essential source on the matters of privacy invasion on mobile applications. The authors have shown that there are always perceptions that come with the use of certain mobile applications and this has resulted in low business performance and businesses not attaining their goals due to the perceptions that have been formed. Therefore, this is an essential source when it comes to dealing with digital devices in conducting businesses and the perceptions that have been formed about such mobile applications. Reflection This source has provided some of the common perceptions that the internet users have formed on the usage of mobile applications and the insecurity that comes with such applications. Therefore, based on the perceptions that have been made on such application and as highlighted in this source, it makes this source an essential tool in the identification and management of the privacy insecurity issues on e-commerce. Castiglione, J., Pavlovic, D., & Seidel, P. M. (2019). Privacy protocols. In Foundations of Security, Protocols, and Equational Reasoning (pp. 167-191). Springer, Cham. Summary These authors have highlighted the most appropriate ways in which the management of the insecurity issues that come with data privacy in social e-commerce can be done. The world is evolving and there has been an increase in the use of social media platforms to ensure that there is effective discharging of duties. The authors have provided the use of protocols in privacy as one of the key ways in which insecurities and negative perceptions can be managed. Evaluation The world is gradually evolving into a technological hub and there is a need to ensure that there is the effective management of these threats that come with social eCommerce. Therefore, with the authors providing a suggestion of the use of privacy in protocols makes this an essential source that can be used in the management of such threats and risks faced by the millennials as they engage in online businesses. Reflection I think that this source has captured some of the critical issues that involve privacy on social eCommerce. Most of the people have resorted to the use of the internet to transact and conduct businesses but some insecurity have come with this decision. Therefore, to ensure that these challenges are managed there must be a protocol that’s followed. Ermakova, T., Hohensee, A., Orlamünde, I., & Fabian, B. (2019). Privacy-invading mechanisms in e-commerce-a case study on German tourism websites. IJNVO, 20(2), 105-126. Summary This source analyzes some of the data that a client has to give out in this digital era. Management of the data has become so essential in society today. Digital devices have made it easy to encrypt into clients` data hence breaking the privacy required to manage such challenges the authors have illustrated the need to only provide the data required. Evaluation This is an essential source as far as matters of privacy are concerned. This is because of the role that lack of privacy plays in discharging the duties. The source has highlighted some of the common ways in which Millenial’s privacy has been invaded in social commerce. Therefore, this is an essential tool in the management of these threats. Reflection I think that this is an essential tool in the identification and management of the threats that millennials face in the use of social media platforms, social commerce interactions as they trade. In the process, there are vital data that they give out which helps in the invasion of their privacy. I, therefore, think that this source has handled some of the prominent issues in society. Johnson, D. (2019). A multiphase mixed-methods analysis of UK e-commerce privacy policies (Doctoral dissertation, Loughborough University). Summary The author of this source has highlighted the tensions that exist in the management of the UK database that involves personal data and the commercial organizations that have to benefit from such data. Individuals feel that their rights to privacy will be violated with the action taken by such organizations. Therefore, this results in tension as organizations aim to use such data for personal gain in reaching out to the clients while clients feel that their rights are being infringed. Evaluation This source has highlighted some of the dilemmas that come with the use of social commerce privacy policies in the business. The clients have their rights while the businesses also seek to ensure that they get the best from the data they possess. I think that this is an essential tool in which there is a need to effectively manage these challenges that come with privacy issues in the management of the database. Reflection I think that the author has highlighted the impacts that come with the direct use of data collected from the databases without the knowledge of the owners of the data. It’s essential that the data collected is effectively managed most appropriately; however, this has to be done by the knowledge of both parties to avoid wrangles. Therefore, this makes the source an essential tool in this study. Korunovska, J., Kamleitner, B., & Spiekermann, S. (2019). The Power and Pitfalls of Transparent Privacy Policies in Social Networking Service Platforms. arXiv preprint arXiv:1911.09386. Summary This source has highlighted social networking platforms as some of the key areas in which businesses are being transacted in the world. However, the authors go ahead to highlight that some powers and pitfalls come with the use of these transparencies in the business. It’s therefore, essential that both parties understand the most appropriate way in which business can be conducted without being affected. Evaluation The authors have acknowledged that indeed there are both negatives and positives that come with the use of transparency in the privacy policies. This means that businesses are at liberty to make the right decisions that would result in achieving the set goals. Therefore, this is an essential tool in my study. Reflection I think that this is an essential tool in the research about social eCommerce in society. Technology has taken a big role in the running of businesses. However, there is a need to ensure that there is effective management of the insecurity challenges that come with digital devices. Therefore, to manage these challenges the most appropriate ways in which the information can be managed is through the understanding of both sides hence making this an essential source in the study. Wang, E. S. T. (2019). Effects of Brand Awareness and Social Norms on User-Perceived Cyber Privacy Risk. International Journal of Electronic Commerce, 23(2), 272-293. Summary The author of this source addressed the effects that come with external sources of information on the end user’s information. The study shows that there are negative effects that come with external sources on the privacy of cyber users. The author thus highlights some of the common ways in which users` privacy gets affected with the external information, it’s the dependency on this external information that affects the privacy of the cyber users and how they conduct their businesses. Evaluation This source has handled some of the key issues in the management of the effects that come with external information on the internet business. Various challenges have been highlighted with the negative impression easily making the business not to perform well whenever this external business privacy information is shared out to the public. The author has shown that there is a lot that comes with brand awareness, with positive effects coming with good brand awareness while external information only creates a negative impression of the business hence affecting the business negatively. Reflection The author has highlighted some of the critical issues that take place in social e-commerce. In a business world where technology has become an essential tool in the dissemination of information, it has also been used to create a negative impression about businesses thus making it so difficult to conduct businesses in a negatively polarized area. Therefore, I think this is an essential source of research on this matter whenever there is a need to ensure that there is effective service delivery. Wang, Y., & Herrando, C. (2019). Does privacy assurance on social commerce sites matter to millennials?. International Journal of Information Management, 44, 164-177. Summary This source illustrates the impacts of privacy on social commerce to the Millenials. This is an area of concern in society today with the fact that information technology has become an essential sector in millennials’ life. The authors explain that there are impacts that come with privacy in social commerce which requires effective management to ensure that there is convenient social networking in the e-commerce sector. This is an essential source on matters of social e-commerce due to the way the author highlights the impacts of social interactions and e-commerce. Evaluation This is an essential tool when it comes to dealing with social interactions and e-commerce among Millenials. Numerous effects have come with these advances and the millenials must understand these impacts for them to be able to manage these challenges and solve the issues that they face. Reflection Technology advances have come with huge impacts on the way millennials interact in the world. This source thus highlights some of the effects that millennials face as they interact online to conduct businesses and make ends meet. Therefore, I feel that this is an essential tool that can be used in the study to ensure that everything flows effectively.
Why Choose Us
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How it Works
- Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the "PAPER DETAILS" section.
- Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.