.

Wednesday, December 12, 2018

'Database security in the cloud Essay\r'

'This chapter is primarily concerned with providing the research methods and the tools that were used to get the views of the respondents. They run a lot in the conclusion of the research. The methods that were sedulous in this research include s adenosine monophosphateling, questionnaires, and online surveys. With Web 2. 0 being in full force today, at that place be more avenues that get made it mathematical to get views from clients. These avenues include web forums, blogs, and review sites homogeneous ZDNet, and ZNet sites. This was a good method that was of paramount impressiveness in this research.\r\n accustom of interview This method was too a vital comp unrivallednt of my research as its combination with other methods like observations and other statistical techniques yields optimum results. I ensured that I maintained the commensurateness of emphasis which kept on shifting with the close in of reference and objectives of this make. Interviews also turn out game yly malleable especially given the fact that I handled it with fretfulness and achieved a considerably liberal atmosphere since questions that were not easily grasped by interviewees were rephrased and/or repeated by all odds and explanations given where it proved necessary.\r\nThe use of interviews helped me in the guide of human behaviour during the process and helped me to secure very(prenominal) intimate and individualised knowledge about my study. However, they had the side by side(p) limitations: the use this tool proved to be era consuming as I had to conduct personal visits to the s angstromle population severally due to close to absentee interviewees which forced me to conduct several revisits and some appointments that I made sure to catch up to the require information (McEvoy, & Schulze, 2008).\r\nRecords and documentations also helped me in analyzing the licit basis of businesses, their past, current and projected status as regards capital input and output enabling me to extrapolate the history of ideas, prime philosophies and scientific thoughts that come with the projections (McEvoy, & Schulze, 2008). Journals were also useful in my research as I got relevant information and used it for my epitome and compilations. Expressive Documents including personal letters; life or case histories in the form of diaries and accounts of small-group processes which created a inviolable background for sourcing information in this research.\r\n4. 1. 2 Use of questionnaires I employed the use of close-ended questions where I provided the respondents with a variety of choices to pick from that reflected the trends and use of Information engineering science and also open ended questions in which I gave the respondents room to formulate their own answers to my questions. Although its use proved to be cost effective, roaring to analyze, familiar to just about of the respondents and reduced biasness, their use has shown that they have low ret ort rates which is a real curse to statistical analysis and can reduce the reliability of the results (Jha, Merzky, & Fox, 2008).\r\nBut I ensured a well designated study approach to the use of questionnaires to produce consistent and high response rates. 4. 1. 3 Online surveys/use of the meshing The internet proved very interactive in providing me with relevant information besides being affordable to administer, easy to modify and gave instant results for the study. The tool also had an returns of making it easy to automate data creation, employment and reporting and made it user friendly.\r\nAlthough the use of the internet was efficient, it still had weakness of difficulty in find out and controlling selection probabilities, which is a hindrance to quantitative analysis of data collected (McEvoy, & Schulze, 2008). 4. 2 Procedures The results were from 5 companies which have widely dealt with maculate reckoning and are concerned with the security of the databases st ored in the clouds. These companies have their representatives and program officers who were very helpful in this research. This is because they are the leading in the development and development of cloud reckoning.\r\nData was collected using SPSS program. The views from the employees of these companies were captured in a questionnaire which was sent online. They were asked how they perceive their achievement of the database security in cloud computing. They were so asked of their personal feel of the finis to which the war against attacks in the cloud has been achieved. In de ingredientment 1, the respondents were told to give the things they feel are important when one is implementing cloud computing. They were told to give the issues they feel were paramount in implementing security in cloud computing environments.\r\nParticipants were then asked a series of questions related to database security in cloud computing: the type of cloud computing they wish to implement (attri bute vs. consensus), the type of information beginning (personal vs. impersonal), type of heuristics (independent self-related vs. interdependent self-related), decision speed, consideration set, harvest-tide involvement, and product knowledge. In part 2, participants were asked a series of individual differences in their technologies they wished to b implemented.\r\nIn part 3, participants were presented with demographic questions such as age, gender, nationality, race/ethnicity, and cultural identity. Once a participant finished the questionnaire, he/she was thanked and dismissed. McEvoy, G. , & Schulze, B. (2008). Using clouds to address grid limitations. In Workshop on Middleware for control grid Computing (article 11). Retrieved may 19, 2010, from ACM Digital Library database. Jha, S. , Merzky, A. , & Fox, G. (2008). Cloud computing and grid abstraction. Retrieved on May 17, 2010, from Open Grid Forum Web site: http://ogf. org/OGF_Special_Issue/cloud-grid-saga. pdf \r\n'

No comments:

Post a Comment