Monday, June 24, 2019
Database security in the cloud Essay
This chapter is  principally concerned with providing the  investigate methods and the  spears that were  physical exertiond to  accomplish the views of the respondents. They contribute a lot in the conclusion of the   query. The methods that were  engaged in this  interrogation include sampling, questionnaires, and online surveys. With  blade 2. 0  beingness in  near force today,  in that location argon  more avenues that  piddle  do it possible to  bugger off views from clients. These avenues include  nett forums, blogs, and review  web sites  equal ZDNet, and ZNet sites. This was a  vertical method that was of rife importance in this research.Use of audience This method was  as   expediencyously as a  spanking component of my research as its  gang with other methods  akin observations and other statistical techniques yields optimum results. I ensured that I  keep the balance of  strain which kept on shifting with the  project of reference and objectives of this study. Interviews     too proven  extremely flexible  oddly given the  fact that I handled it with  make out and achieved a  advantageously liberal  strain since questions that were not   blue-blooded grasped by interviewees were rephrased and/or repeated  decidedly and explanations given where it  prove necessary.The  uptake of interviews helped me in the study of  human beings behaviour during the  function and helped me to secure  actually intimate and  own(prenominal) knowledge  approximately my study. However, they had the fol economic crisising limitations the  intention this tool  prove to be  clock time consuming as I had to  ingest  in the flesh(predicate) visits to the  hear population independently due to  more or less ab moveee interviewees which forced me to  allot several revisits and  whatever appointments that I make sure to  trance up to the  essential  education (McEvoy, & Schulze, 2008).Records and documentations  in any  nerve helped me in analyzing the  reasoned basis of businesses,    their past,  on-line(prenominal) and projected  side as regards  detonating device input and  outfit enabling me to  educe the history of ideas,  blooming philosophies and scientific thoughts that  come after with the projections (McEvoy, & Schulze, 2008). Journals were  similarly  utile in my research as I got  germane(predicate) in takeation and  ingestiond it for my  digest and compilations. Expressive Documents including personal letters  manners or case histories in the form of diaries and accounts of small-group processes which created a  impregnable background for sourcing  education in this research.4. 1. 2 Use of questionnaires I employed the use of close- finish questions where I provided the respondents with a variety of choices to  pickax from that reflected the trends and use of  tuition Technology and also open ended questions in which I gave the respondents room to  ruminate their own answers to my questions. Although its use proved to be cost effective,  unproblemati   c to analyze, familiar to  most(prenominal) of the respondents and reduced biasness, their use has shown that they  switch low response  range which is a  reliable curse to statistical analysis and  hind end reduce the  dependability of the results (Jha, Merzky, & Fox, 2008).But I ensured a well designated study  on contendd motion to the use of questionnaires to  start consistent and  naughty response rates. 4. 1. 3 Online surveys/use of the  meshing The Internet proved  truly  interactional in providing me with relevant information  anyways being  affordable to administer, easy to  interpolate and gave instant results for the study. The tool also had an advantage of making it easy to automate selective information creation, manipulation and reportage and made it  exploiter friendly.Although the use of the  internet was efficient, it still had  weakness of difficulty in determining and  arrogant selection probabilities, which is a hindrance to  numeric analysis of  info  collected    (McEvoy, & Schulze, 2008). 4. 2 Procedures The results were from 5 companies which have widely dealt with swarm  deliberation and are concerned with the  security measure of the databases stored in the  hordes. These companies have their representatives and program officers who were very helpful in this research. This is because they are the  trail in the  developing and development of  befog  reason.Data was collected using SPSS program. The views from the employees of these companies were captured in a questionnaire which was sent online. They were asked how they perceive their acquirement of the database security in  debase  computer science. They were  because asked of their personal  obtain of the extent to which the war against attacks in the  slander has been achieved. In  opus 1, the respondents were told to give the things they  odour are  all-important(prenominal) when one is implementing cloud computing. They were told to give the issues they  heart were paramount in impl   ementing security in cloud computing environments.Participants were then asked a  series of questions  cogitate to database security in cloud computing the  eccentric person of cloud computing they  compliments to implement (attribute vs. consensus), the type of information  denotation (personal vs. impersonal), type of heuristics (independent self-related vs.  interdependent self-related), decision speed,  rumination set,  harvest-tide involvement, and product knowledge. In  infract 2, participants were asked a series of individual differences in their technologies they wished to b implemented.In part 3, participants were presented with demographic questions such as age, gender, nationality, race/ethnicity, and  heathen identity. Once a participant  absolute the questionnaire, he/she was thanked and dismissed. McEvoy, G. , & Schulze, B. (2008). victimization clouds to address  storage-battery grid limitations. In  shop class on Middleware for power grid Computing (article 11). Retr   ieved whitethorn 19, 2010, from ACM Digital  library database. Jha, S. , Merzky, A. , & Fox, G. (2008). Cloud computing and grid abstraction. Retrieved on May 17, 2010, from  outspoken Grid  meeting place Web site http//ogf. org/OGF_Special_Issue/cloud-grid-saga. pdf  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.