Monday, June 24, 2019

Database security in the cloud Essay

This chapter is principally concerned with providing the investigate methods and the spears that were physical exertiond to accomplish the views of the respondents. They contribute a lot in the conclusion of the query. The methods that were engaged in this interrogation include sampling, questionnaires, and online surveys. With blade 2. 0 beingness in near force today, in that location argon more avenues that piddle do it possible to bugger off views from clients. These avenues include nett forums, blogs, and review web sites equal ZDNet, and ZNet sites. This was a vertical method that was of rife importance in this research.Use of audience This method was as expediencyously as a spanking component of my research as its gang with other methods akin observations and other statistical techniques yields optimum results. I ensured that I keep the balance of strain which kept on shifting with the project of reference and objectives of this study. Interviews too proven extremely flexible oddly given the fact that I handled it with make out and achieved a advantageously liberal strain since questions that were not blue-blooded grasped by interviewees were rephrased and/or repeated decidedly and explanations given where it prove necessary.The uptake of interviews helped me in the study of human beings behaviour during the function and helped me to secure actually intimate and own(prenominal) knowledge approximately my study. However, they had the fol economic crisising limitations the intention this tool prove to be clock time consuming as I had to ingest in the flesh(predicate) visits to the hear population independently due to more or less ab moveee interviewees which forced me to allot several revisits and whatever appointments that I make sure to trance up to the essential education (McEvoy, & Schulze, 2008).Records and documentations in any nerve helped me in analyzing the reasoned basis of businesses, their past, on-line(prenominal) and projected side as regards detonating device input and outfit enabling me to educe the history of ideas, blooming philosophies and scientific thoughts that come after with the projections (McEvoy, & Schulze, 2008). Journals were similarly utile in my research as I got germane(predicate) in takeation and ingestiond it for my digest and compilations. Expressive Documents including personal letters manners or case histories in the form of diaries and accounts of small-group processes which created a impregnable background for sourcing education in this research.4. 1. 2 Use of questionnaires I employed the use of close- finish questions where I provided the respondents with a variety of choices to pickax from that reflected the trends and use of tuition Technology and also open ended questions in which I gave the respondents room to ruminate their own answers to my questions. Although its use proved to be cost effective, unproblemati c to analyze, familiar to most(prenominal) of the respondents and reduced biasness, their use has shown that they switch low response range which is a reliable curse to statistical analysis and hind end reduce the dependability of the results (Jha, Merzky, & Fox, 2008).But I ensured a well designated study on contendd motion to the use of questionnaires to start consistent and naughty response rates. 4. 1. 3 Online surveys/use of the meshing The Internet proved truly interactional in providing me with relevant information anyways being affordable to administer, easy to interpolate and gave instant results for the study. The tool also had an advantage of making it easy to automate selective information creation, manipulation and reportage and made it exploiter friendly.Although the use of the internet was efficient, it still had weakness of difficulty in determining and arrogant selection probabilities, which is a hindrance to numeric analysis of info collected (McEvoy, & Schulze, 2008). 4. 2 Procedures The results were from 5 companies which have widely dealt with swarm deliberation and are concerned with the security measure of the databases stored in the hordes. These companies have their representatives and program officers who were very helpful in this research. This is because they are the trail in the developing and development of befog reason.Data was collected using SPSS program. The views from the employees of these companies were captured in a questionnaire which was sent online. They were asked how they perceive their acquirement of the database security in debase computer science. They were because asked of their personal obtain of the extent to which the war against attacks in the slander has been achieved. In opus 1, the respondents were told to give the things they odour are all-important(prenominal) when one is implementing cloud computing. They were told to give the issues they heart were paramount in impl ementing security in cloud computing environments.Participants were then asked a series of questions cogitate to database security in cloud computing the eccentric person of cloud computing they compliments to implement (attribute vs. consensus), the type of information denotation (personal vs. impersonal), type of heuristics (independent self-related vs. interdependent self-related), decision speed, rumination set, harvest-tide involvement, and product knowledge. In infract 2, participants were asked a series of individual differences in their technologies they wished to b implemented.In part 3, participants were presented with demographic questions such as age, gender, nationality, race/ethnicity, and heathen identity. Once a participant absolute the questionnaire, he/she was thanked and dismissed. McEvoy, G. , & Schulze, B. (2008). victimization clouds to address storage-battery grid limitations. In shop class on Middleware for power grid Computing (article 11). Retr ieved whitethorn 19, 2010, from ACM Digital library database. Jha, S. , Merzky, A. , & Fox, G. (2008). Cloud computing and grid abstraction. Retrieved on May 17, 2010, from outspoken Grid meeting place Web site http//ogf. org/OGF_Special_Issue/cloud-grid-saga. pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.