Vous êtes sur la page 1sur 2

Review of a Journal Article

Gemma F. Lamsen

R. Lakshmi Prabha, N. Revathi, A Migration of Virtual Machine to Remote System. International

Journal of Innovative Research in Science, Engineering and Technology, March 2014, Vol. 3, Special Issue

3.

The purpose of the experiment is to perform a live migration of virtual machines to a

heterogeneous environment hosts with almost no or zero downtime. Heterogeneous environment

means host computer having different running operating system.

For the research methodology, the study used the survey method in collecting the needed data.

The study has two types of data collected in line with the purpose of the study. The primary data was

collected from the bank officials working with the information systems in the state of Uttarakhand,

India. The secondary data was collected from various published reports of cyber-attacks available

nationally and internationally. In the research, sample size was randomly selected on the basis of the

number of banks operating in Uttarakhand constituting to a sample of fifty (50) bank officials dealing

with Information System issues.

Although the testing instrument was not presented in the journal, the researcher has presented

one of the objectives of the study through cross sectional tabulation highlighting the computed Chi-

square and Pearson coefficient of correlation. In the study, two tables were presented. One showed

the relationship of cyber-attacks and proper display of information from data warehouse. The other

showed the relationship between cyber-attacks and the ability of the data warehouse to defend itself

from such attacks.

The findings showed that the variables OIT (Online Identity Theft), CAT (Credit Card Frauds),

MCO (Malicious code attack), PVS (Phishing/Vishing/Spoofing) are positively correlated with proper

display of information from CDW (data warehouse) while the variables HCK (Hacking) and DOS (DOS
Attack) are negatively correlated with CDW. In the other table, the variables OIT (Online Identity Theft),

MCO (Malicious code attack), PVS (Phishing/Vishing/Spoofing) are positively correlated with the DWD or

role of data warehouse to defend systems from cyber threat, while the HCK (Hacking) and DOS (DOS

Attack) and CAT (Credit Card ATM Frauds) are negatively correlated with DWD. Therefore the

researchers have concluded that there is no significant association between database management of

banks and cyber-attacks except DOS attacks.

While the study has merit, methodology of the study needs to be re-evaluated. A larger sample

size could have been used to prove the researcher’s objectives. It could have also been better if the

study was conducted in one of the major cities of India where electronic banking is widely used

therefore the results will attain significant relationship between the Central data warehouse defense

system and cyber-attacks.

Vous aimerez peut-être aussi