.

Tuesday, February 19, 2019

Database security in the cloud Essay

This chapter is mainly concerned with providing the look methods and the tools that were used to get the views of the respondents. They contribute a lot in the demonstration of the explore. The methods that were employed in this inquiry include sampling, questionnaires, and online surveys. With Web 2. 0 world in full force today, there are more avenues that wee made it possible to get views from clients. These avenues include web forums, blogs, and review sites like ZDNet, and ZNet sites. This was a good method that was of paramount importance in this research. lend oneself of interview This method was also a vital component of my research as its combination with other methods like observations and other statistical techniques yields optimal results. I ensured that I maintained the balance of emphasis which kept on shifting with the frame of reference and objectives of this study. Interviews also proved loftyly supple especially representn the fact that I handled it with c are and achieved a easily liberal atmosphere since questions that were not easily grasped by interviewees were rephrased and/or ingeminate emphatically and explanations given where it proved necessary.The use of interviews helped me in the study of piece behaviour during the process and helped me to secure really intimate and face-to-face fellowship about my study. However, they had the following limitations the use this tool proved to be clip consuming as I had to conduct personal visits to the sample world severally due to well-nigh absendee interviewees which forced me to conduct several revisits and some appointments that I made sure to catch up to the required teaching (McEvoy, & Schulze, 2008).Records and documentations also helped me in analyzing the legal basis of businesses, their past, current and projected perspective as regards capital input and output enabling me to deduce the memoir of ideas, prime philosophies and scientific thoughts that come with the pro jections (McEvoy, & Schulze, 2008). Journals were also useful in my research as I got relevant in spirtation and used it for my analysis and compilations. communicative Documents including personal letters life or case histories in the form of diaries and accounts of small-group processes which created a solid background for sourcing information in this research.4. 1. 2 custom of questionnaires I employed the use of close-ended questions where I provided the respondents with a variety of choices to fragment from that reflected the trends and use of Information Technology and also open ended questions in which I gave the respondents room to formulate their own answers to my questions. Although its use proved to be cost effective, easy to analyze, familiar to most of the respondents and reduced biasness, their use has shown that they deport low response rates which is a real curse to statistical analysis and can reduce the reliability of the results (Jha, Merzky, & Fox, 2008).But I ensured a well designated study approach to the use of questionnaires to produce consistent and high response rates. 4. 1. 3 Online surveys/use of the internet The Internet proved precise interactive in providing me with relevant information besides being affordable to administer, easy to modify and gave instant results for the study. The tool also had an advantage of do it easy to automate entropy creation, manipulation and reporting and made it user friendly.Although the use of the internet was efficient, it still had weakness of difficulty in find and controlling selection probabilities, which is a hindrance to quantitative analysis of data collected (McEvoy, & Schulze, 2008). 4. 2 Procedures The results were from 5 companies which have widely dealt with confuse figuring and are concerned with the security of the databases stored in the clouds. These companies have their representatives and program officers who were very helpful in this research. This is because they ar e the leading in the growth and development of cloud deliberation.Data was collected using SPSS program. The views from the employees of these companies were captured in a questionnaire which was sent online. They were asked how they perceive their achievement of the database security in cloud computing. They were then asked of their personal feel of the extent to which the war against attacks in the cloud has been achieved. In rive 1, the respondents were told to give the things they feel are important when one is implementing cloud computing. They were told to give the issues they feel were paramount in implementing security in cloud computing environments.Participants were then asked a series of questions related to database security in cloud computing the theatrical role of cloud computing they wish to implement (attribute vs. consensus), the type of information source (personal vs. impersonal), type of heuristics (independent self-related vs. interdependent self-related), d ecision speed, consideration set, convergence involvement, and product knowledge. In part 2, participants were asked a series of individual differences in their technologies they wished to b implemented.In part 3, participants were presented with demographic questions such as age, gender, nationality, pelt along/ethnicity, and cultural identity. Once a participant finished the questionnaire, he/she was thanked and dismissed. McEvoy, G. , & Schulze, B. (2008). utilize clouds to address grid limitations. In Workshop on Middleware for Grid calculation (article 11). Retrieved May 19, 2010, from ACM Digital Library database. Jha, S. , Merzky, A. , & Fox, G. (2008). Cloud computing and grid abstraction. Retrieved on May 17, 2010, from Open Grid Forum Web site http//ogf. org/OGF_Special_Issue/cloud-grid-saga. pdf

No comments:

Post a Comment