Statistics and Business Research Methods - Cloud Computing Assessment Answer

February 26, 2018
Author : Syd Howell

Solution Code :1AABJ

Question:Statistics and Business Research Methods - Cloud Computing

This assignment falls underStatistics and Business Research Methods - Cloud Computing which was successfully solved by the assignment writing experts atMy Assignment Services AUunder assignment help service.

Statistics and Business Research Methods-Cloud Computing Assignment

Task

Security issues in cloud computing

  • How long has your organization been offering cloud related services?
  • What benefits have your customers gained on availing the cloud computing based services offered by your organizations?
  • What do you think are the general issues and challenges faced by your customers in using cloud computing based services?
  • What do you think are the risks involved in using cloud computing based services?
  • Do you feel that off late security related issues have increased in cloud computing based services? Justify:
  • What are the security-related issues encountered by your customers in using cloud computing based services?

  • What actions do you take in order to address security related issues encountered by your clients?

  • What specific solutions do you offer your clients in order to help them prevent security related issues in using cloud computing based services?

  • How do you think that overall security of cloud computing based services be improved?

The assignment file was solved by professional Cloud Computing experts and academic professionals at My Assignment Services AU. The solution file, as per the marking rubric, is of high quality and 100% original (as reported by Plagiarism). The assignment help was delivered to the student within the 2-3 days to submission.

Looking for a new solution for this exact same question? Our assignment help professionals can help you with that. With a clientele based in top Australian universities, My Assignment Services AU’s assignment writing service is aiding thousands of students to achieve good scores in their academics. OurStatistics and Business Research Methods-Cloud Computingassignment experts are proficient with following the marking rubric and adhering to the referencing style guidelines.

Solution:

IntroductionCloud computing, also known as Internet computing is normally used to provide combined services such as software, information and shared resources services by using the network. It might be of any one of the type, namely public, community, hybrid or private. Brynjolfsson, Hofmann and Jordan (2010) clearly stated that, cloud computing works mainly through internet resources which has the capability to provide virtualization, reliable source information, Application programming interface and security performance related details to the client or customers. In earlier stages, the application used for these services are reliably slow in their process and are very expensive and too complex to understand and fix the issues which suits to the competitive business world. This leads to lots of problems to the institutions to perform their business applications, particularly, the SME’s are highly affected by these old traditional method. In 2012, IBM introduced a new model, named, ‘Cloud Computing’ which provides better solutions and services to all varieties of business peoples and it provides wider services to individuals too.

Since the cloud computing mainly deals with network, it can handle both hardware and software systems in the databank which in turn provides both applications and services through the internet sources. The service provides will charge for their services as pay per usage. Cloud computing offers three main services, namely,

Remote Hosting,

Remote Infrastructure Provision, and

Remote Data Storage

Cloud computing was classified into three segments, namely, connectivity, storage and application oriented segments. The services of cloud computing is classified as Software as a service (SaaS), Infrastructure as a service (IaaS) and the third and most important service is Platform as a service (PaaS). Durkee (2010) clearly states that, by the invention of new technologies, the cost incurred for business development is considerably reduced along with delivery time and content storage

Literature view

According to Rajani Sharma (2014), Cloud computing seems to be have rapid growth in the IT sector and tends to increase rapidly and it become population within a short period of time. Now days, all business sectors tend to use cloud computing as their basic step for their organization growth and also determine the exact area of threat related to cloud computing.

Just like other new inventions, cloud computing is also affected by security threats and data privacy threats which needs to be addressed at the earliest on real-time. The most common security issues found in cloud computing is loss of data, data theft, privacy concern, and frequent interruption of data in the transmission process. Therefore, more security systems should be implemented to address these threats. These threats should be addressed at the earliest by implementing appropriate security techniques which lead to prevent any kind of security threats and thus prevents the data and devices affected permanently in cloud.

This research helps to gain more information about the security issues that impact the growth of cloud computing and various steps that needs to be taken to address these issues.

Research question/ research hypothesis

This research intends to answer the following questions

  • Challenges faced by companies while implanting cloud computing, particularly security issues?
  • Reliability of the data in cloud was handled by cloud computing service providers?
  • What are the points that customer should think before choosing a vender for cloud computing?

Object of research

  • To find the data security issues in cloud computing
  • To identify the security challenges and to overcome from it in future cloud computing.
  • To address the risk associated with cloud computing, both confidentiality and security threat.

Research design

According to Baskerville and Wood-Harper (1996) a research design is normally used to describe the work flow or work structure of the study, such as, data collection strategy, methods and procedures of analyzing the data. It is just like a blue price of the researcher work structure

Data collection method

In research design, the two most common research approach used is qualitative research and quantitative research. Qualitative research is defined as a multi method research in which both it takes into account of both interpretive and naturalistic approach (Burman, 1997). On the hand, Quantitative research is a kind of descriptive statistics form in which the researcher gather the information related to behavior of consumer over the market condition (Bryman, 1984).

This study is a qualitative study, as the researcher is keen interested in gathering of information either through interview, respondents personal experience, and detailed information about the objective of the study. The target population is 120 respondents by providing open ended questionnaires at the place of their work

Data analysis

Age structure of the respondent:

 

Statistics and Business Research

Statistics and Business Research

Respondents age vary from 16 years to 50 years. About 68.4% respondents are in the age group of 18 to 34 years

Gender:

Respondents age vary from 16 years to 50 years. About 68.4% respondents are in the age group of 18 to 34 years Gender:

Nearly four – fifth of the respondent participated in this study are male respondents. That is, 83.3% of the respondents are male respondents and 16.7% of them were females

Respondents Work Experience

Statistics and Business Research

Statistics and Business Research

Nearly 32.5% of the respondents participated in this study are Junior Employees and 39.2% of the respondents participated in this study are senior employees

Chi – Square test for Independence:

Test – 1

Statistics and Business Research

Statistics and Business Research

Test – 2

 

Statistics and Business Research

Statistics and Business Research

Statistics and Business Research

Nearly 34.4% of the respondents who said that their organization has been offering cloud related services for over 10 years feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats. 44.4% of the respondents who said that their organization has been offering cloud related services between 6 years to 10 years feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats (Chi – Square test statistic = 22.244, p – value = 0.035 < 0.05)

Test – 3

Statistics and Business Research

Statistics and Business Research

Statistics and Business Research

Nearly 88.7% of the respondents who are very satisfied with the overall security of cloud computing based services feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats. 82.1% of the respondents who said that the overall security of cloud computing based services has improved a lot feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats (Chi – Square test statistic = 323.272, p – value = 0.000 < 0.05)

 

Mann Whitney U test

Test – 4

Statistics and Business Research

The respondents who feel that off late security related issues have decreased in cloud computing based services think that overall security of cloud computing based services be improved to a good extent (Z test statistic = - 3.136, p – value = 0.002 < 0.05)

Results

  • 120 employee’s responses working in two different IT organizations are taken for the study
  • About 68.4% respondents are in the age group of 18 to 34 years
  • Four – fifth of the respondent participated in this study are male respondents
  • 41.7% of the respondents said that they are having 6 to 10 years of work experience in their relevant field
  • 26.7% of the respondents said that they are having more than 10 years of experience in their relevant field
  • 32.5% of the respondents participated in this study are Junior Employees
  • 39.2% of the respondents participated in this study are senior employees
  • 31.67% of the respondents feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats
  • 58.1% of the respondents who said that their organization has been offering cloud related services between 2 years to 5 years feel that their customers are panic over hackers
  • 35.6% of the respondents who said that their organization has been offering cloud related services between 6 years to 10 years feel that their customers are panic over their data security related issues
  • 34.4% of the respondents who said that their organization has been offering cloud related services for over 10 years feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats
  • 44.4% of the respondents who said that their organization has been offering cloud related services between 6 years to 10 years feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats
  • 88.7% of the respondents who are very satisfied with the overall security of cloud computing based services feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats
  • 82.1% of the respondents who said that the overall security of cloud computing based services has improved a lot feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats
  • 42.2% of the respondents who said that off late security related issues have decreased in cloud computing based services feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats
  • 32.1% of the respondents who said that off late security related issues have decreased in cloud computing based services feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats
  • Respondents who feel that off late security related issues have decreased in cloud computing based services think that overall security of cloud computing based services be improved to a good extent

This Statistics and Business Research Methods-Cloud Computing assignment sample was powered by the assignment writing experts of My Assignment Services AU. You can free download thisStatistics and Business Research Methods-Cloud Computing assessment answer for reference. This solved Computer Scienceassignmentis only for reference purpose and not to be submitted to your university. For a fresh solution to this question, fill the form here and get our professional assignment help.

RELATED SOLUTIONS

Order Now

Request Callback

Tap to ChatGet instant assignment help

Get 500 Words FREE