Computing Engineering and Media Assignment 2022
VerifiedAdded on 2022/08/26
|12
|3521
|13
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RUNNING HEAD: COMPUTING, ENGINEERING AND MEDIA 0
CLOUD COMPUTING
CLOUD COMPUTING
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COMPUTING, ENGINEERING AND MEDIA
1
Table of Contents
Introduction......................................................................................................................................2
Research objectives.........................................................................................................................2
Literature Review............................................................................................................................3
Research gap....................................................................................................................................6
Methodology....................................................................................................................................6
Research design...........................................................................................................................6
Research philosophies.................................................................................................................7
Research approach.......................................................................................................................7
Research strategy.........................................................................................................................7
Data collection.............................................................................................................................7
Data analysis................................................................................................................................8
Ethical issues...................................................................................................................................8
Other related risks............................................................................................................................8
Work Plan........................................................................................................................................9
References......................................................................................................................................10
1
Table of Contents
Introduction......................................................................................................................................2
Research objectives.........................................................................................................................2
Literature Review............................................................................................................................3
Research gap....................................................................................................................................6
Methodology....................................................................................................................................6
Research design...........................................................................................................................6
Research philosophies.................................................................................................................7
Research approach.......................................................................................................................7
Research strategy.........................................................................................................................7
Data collection.............................................................................................................................7
Data analysis................................................................................................................................8
Ethical issues...................................................................................................................................8
Other related risks............................................................................................................................8
Work Plan........................................................................................................................................9
References......................................................................................................................................10
COMPUTING, ENGINEERING AND MEDIA
2
Introduction
Cloud computing is the on-demand availability of computer system resources, especially data
storage and computing power, without direct active management by the user (Langmead &
Nellore, 2018). The term is generally used to describe data centres available to many users over
the Internet. This helps organizations to maintain efficiency and effectiveness because it reduces
their costs and improves their security (Chang et al., 2016). However, the estimation describes
that the majority of organizations in the UK faced security issues because of cloud computing.
The topic selected in this report is “Security issues in cloud computing and their impact on
organizational productivity: A Case study of Vodafone Group, UK”. It is because Vodafone
faces several security issues because of applying cloud computing in its operations. These
challenges reduce the functioning and operations of the organization but some initiatives are also
taken by the company to overcome this issue (Ahmad & Andras, 2018). In this research
proposal, research questions will be prepared on this topic and literature review will be
conducted while analysing different authors’ views. A methodology will also discuss in this
research proposal along with consideration of any risks and ethical challenges which might be
present in the chosen methodology.
Research objectives
The study aims to understand the influence of applying cloud computing in Vodafone in the UK.
This research could be concluded because not much of the studies are performed to get
information about this subject matter. Therefore, to achieve the major aim of the objectives, the
set of objectives are developed-
To understand "the appliance of cloud computing in Vodafone’s operations"
To analyze "the security issues which is faced by Vodafone as a result of using cloud
computing"
To examine "the strategies which Vodafone could adopt to overcome the problems and
challenges"
2
Introduction
Cloud computing is the on-demand availability of computer system resources, especially data
storage and computing power, without direct active management by the user (Langmead &
Nellore, 2018). The term is generally used to describe data centres available to many users over
the Internet. This helps organizations to maintain efficiency and effectiveness because it reduces
their costs and improves their security (Chang et al., 2016). However, the estimation describes
that the majority of organizations in the UK faced security issues because of cloud computing.
The topic selected in this report is “Security issues in cloud computing and their impact on
organizational productivity: A Case study of Vodafone Group, UK”. It is because Vodafone
faces several security issues because of applying cloud computing in its operations. These
challenges reduce the functioning and operations of the organization but some initiatives are also
taken by the company to overcome this issue (Ahmad & Andras, 2018). In this research
proposal, research questions will be prepared on this topic and literature review will be
conducted while analysing different authors’ views. A methodology will also discuss in this
research proposal along with consideration of any risks and ethical challenges which might be
present in the chosen methodology.
Research objectives
The study aims to understand the influence of applying cloud computing in Vodafone in the UK.
This research could be concluded because not much of the studies are performed to get
information about this subject matter. Therefore, to achieve the major aim of the objectives, the
set of objectives are developed-
To understand "the appliance of cloud computing in Vodafone’s operations"
To analyze "the security issues which is faced by Vodafone as a result of using cloud
computing"
To examine "the strategies which Vodafone could adopt to overcome the problems and
challenges"
COMPUTING, ENGINEERING AND MEDIA
3
To invest the influence of cloud computing on the productivity and outcomes in
Vodafone.
The research will be important because this describes the security challenges that
Vodafone faces so that effective policies can be developed to overcome these issues.
Therefore identifying the strategies reveal the appropriate effectiveness of the strategy in
the organization, through this organization can reduce wastage and adopt an appropriate
strategy in the workplace. The research is important because Vodafone can investigate
the relationship between cloud computing and it can reduce the negative impact of this in
their operations. The research will provide the opportunity to increase the profitability of
Vodafone and it can also increase the capability of the company to invest more in
efficient resources and equipment.
Literature Review
Opara-Martins et al. (2016) demonstrated that cloud computing is used by organizations in the
UK for sharing the resources and documents to one person to another (Opara-Martins et al.,
2016). This is done to accomplish the economies of scale, therefore cloud computing helps
companies to reduce and avoid the wastage as well as to minimize the infrastructure cost and
expenditure. The key themes of the research are cloud computing application and acceptance in
enterprises. Cloud computing is applied in the enterprises of UK due to several benefits by which
profitability and productivity of companies are achieved (Polański et al., 2017). The objective of
the research was to understand the application and adoption of cloud computing in organizations
of the UK. However, the challenge of vendor lock-in was also analysed in this study which
highlights key issues that companies face while using cloud computing. The data collection is
done by taking the survey from the different respondents so that their responses will be recorded.
The findings of the study revealed that cloud computing is applied in organizations because of
higher cost network and low-cost expenditure. The gap of the study is that researchers only
focuses on vendor lock-in issues and does not consider other issues which companies face by
adopting cloud computing.
Amoore revealed that it is also considered as the storage device in which companies store
important data and information so that it can be used when need arises (Amoore, 2018). Cloud
3
To invest the influence of cloud computing on the productivity and outcomes in
Vodafone.
The research will be important because this describes the security challenges that
Vodafone faces so that effective policies can be developed to overcome these issues.
Therefore identifying the strategies reveal the appropriate effectiveness of the strategy in
the organization, through this organization can reduce wastage and adopt an appropriate
strategy in the workplace. The research is important because Vodafone can investigate
the relationship between cloud computing and it can reduce the negative impact of this in
their operations. The research will provide the opportunity to increase the profitability of
Vodafone and it can also increase the capability of the company to invest more in
efficient resources and equipment.
Literature Review
Opara-Martins et al. (2016) demonstrated that cloud computing is used by organizations in the
UK for sharing the resources and documents to one person to another (Opara-Martins et al.,
2016). This is done to accomplish the economies of scale, therefore cloud computing helps
companies to reduce and avoid the wastage as well as to minimize the infrastructure cost and
expenditure. The key themes of the research are cloud computing application and acceptance in
enterprises. Cloud computing is applied in the enterprises of UK due to several benefits by which
profitability and productivity of companies are achieved (Polański et al., 2017). The objective of
the research was to understand the application and adoption of cloud computing in organizations
of the UK. However, the challenge of vendor lock-in was also analysed in this study which
highlights key issues that companies face while using cloud computing. The data collection is
done by taking the survey from the different respondents so that their responses will be recorded.
The findings of the study revealed that cloud computing is applied in organizations because of
higher cost network and low-cost expenditure. The gap of the study is that researchers only
focuses on vendor lock-in issues and does not consider other issues which companies face by
adopting cloud computing.
Amoore revealed that it is also considered as the storage device in which companies store
important data and information so that it can be used when need arises (Amoore, 2018). Cloud
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COMPUTING, ENGINEERING AND MEDIA
4
computing also supports organizations to improve the manageability as well as reduce the
maintenance expenditure. The major themes of the research are the role of cloud computing and
effective management in the organization. Jain and Pandey conducted the study which revealed
that not enough studies are conducted to understand the security issues and challenges while
using cloud computing in organizations of UK (Jain & Pandey, 2018). From the analysis, it is
found that employee negligence is the biggest issue because an employee of the companies can
access the cloud computing from anywhere and also from any mobile phones, tablets through
which threats can occur in organizations. Eberbach describe that it becomes difficult for
comapny to overcome the problem and challenges (Eberbach, 2017). The research gap of the
study is that researchers does not focuses on degree of impact cloud computing have on
productivity of companies. Vodafone should also adopt various strategies to maintain the
confidentiality of employees' credentials.
Companies find various challenges and problem through which the efficiency of the data will be
reduced and it also finds difficulty in gathering important documents and data when required
(Khan & Al-Yasiri, 2018). The objective of the study is to understand the safety challenges faced
by companies through cloud computing. The secondary approach is used for gathering the
information about organizations. The findings of the study revealed that data loss, as well as
inadequate data and information backups, is the major problem. It is because the threat of data
loss becomes difficult for the organization to access and apply cloud computing for gaining
competitive advantage (Akinrolabu et al., 2019). The key themes of the research are the security
problem in cloud computing and organizational efficiency. The research gap of the study is that
it does not focus on particular company; therefore in future research can be conducted by
limiting the scope to specific industry or company.
Atlam et al. describe that hijacked credentials is the issue it is due to the reason of reused
password through this attackers can easily get the information and other credentials for stealing
the data of the organization (Atlam et al., 2018). In UK majority of the organizations are suffered
from this challenge and problem. The estimation describes that in the year 2017 several cases
were involved regarding the misuse of the information in the UK. It is because through hijacking
of the account attackers manipulate and change the important information of organizations. The
purpose of the study is to investigate the security issue and problem which organizations in the
4
computing also supports organizations to improve the manageability as well as reduce the
maintenance expenditure. The major themes of the research are the role of cloud computing and
effective management in the organization. Jain and Pandey conducted the study which revealed
that not enough studies are conducted to understand the security issues and challenges while
using cloud computing in organizations of UK (Jain & Pandey, 2018). From the analysis, it is
found that employee negligence is the biggest issue because an employee of the companies can
access the cloud computing from anywhere and also from any mobile phones, tablets through
which threats can occur in organizations. Eberbach describe that it becomes difficult for
comapny to overcome the problem and challenges (Eberbach, 2017). The research gap of the
study is that researchers does not focuses on degree of impact cloud computing have on
productivity of companies. Vodafone should also adopt various strategies to maintain the
confidentiality of employees' credentials.
Companies find various challenges and problem through which the efficiency of the data will be
reduced and it also finds difficulty in gathering important documents and data when required
(Khan & Al-Yasiri, 2018). The objective of the study is to understand the safety challenges faced
by companies through cloud computing. The secondary approach is used for gathering the
information about organizations. The findings of the study revealed that data loss, as well as
inadequate data and information backups, is the major problem. It is because the threat of data
loss becomes difficult for the organization to access and apply cloud computing for gaining
competitive advantage (Akinrolabu et al., 2019). The key themes of the research are the security
problem in cloud computing and organizational efficiency. The research gap of the study is that
it does not focus on particular company; therefore in future research can be conducted by
limiting the scope to specific industry or company.
Atlam et al. describe that hijacked credentials is the issue it is due to the reason of reused
password through this attackers can easily get the information and other credentials for stealing
the data of the organization (Atlam et al., 2018). In UK majority of the organizations are suffered
from this challenge and problem. The estimation describes that in the year 2017 several cases
were involved regarding the misuse of the information in the UK. It is because through hijacking
of the account attackers manipulate and change the important information of organizations. The
purpose of the study is to investigate the security issue and problem which organizations in the
COMPUTING, ENGINEERING AND MEDIA
5
UK (Cormode & Hickey, 2018). The finding of the organization describes that insider threat is
the main problem through which employees and other people misuse the information.
Researchers demonstrate that in the UK employees make misuse of the customer's accounts,
other significant data as well as financial forms and norms of the organization. Researchers also
reveal that in UK organization focuses on developing the strategies for controlling the access and
efficiently implementing the technology. The research gap of the study is that in this research
only collect information by secondary method, therefore further future researchers can conduct
study by taking responses from target respondents.
The investigation of the study revealed that UK organizations also face the issue of abusing
cloud services (Fazio et al., 2018). It is because through cloud computing it becomes easy for
organizations to get the data and information easily. Researchers describe that cloud computing
has the unprecedented capacity of storing the data this allows the attackers to get and find the
information easily. However, Eberbach believe that in the UK the services of cloud computing
are also abused through illegal software and other digital medium properties (Eberbach, 2017).
The investigation demonstrates that it made and increases the risk of data in both direct as well
as indirect manner, therefore this reduces the safety and security threats with cloud computing.
The research gap of the study is that the researchers on focus on the state of Act computing
models but does not focus complete on understanding the computing models which UK
organisations adopt.
The findings of Varghese & Buyya revealed that organizations adopt various strategies to reduce
the security issues and problems in cloud computing and to gain a competitive advantage
(Varghese & Buyya, 2018). From the analysis, it is revealed that organizations improves the
security and safety by developing the team for maintaining cloud providers safety and
compliance the certifications regarding the security issues in cloud computing. The major themes
are strategies of cloud computing as well as proper functioning in the organization. This results
in increasing the safety, time and support the organization to reduce the cost that is in the year
2018 the cost reduces up to 20% (Varghese & Buyya, 2018). The research gap of the article is
that it does not focus on the organisations of UK and only describe some of the issues which
organisations face.
5
UK (Cormode & Hickey, 2018). The finding of the organization describes that insider threat is
the main problem through which employees and other people misuse the information.
Researchers demonstrate that in the UK employees make misuse of the customer's accounts,
other significant data as well as financial forms and norms of the organization. Researchers also
reveal that in UK organization focuses on developing the strategies for controlling the access and
efficiently implementing the technology. The research gap of the study is that in this research
only collect information by secondary method, therefore further future researchers can conduct
study by taking responses from target respondents.
The investigation of the study revealed that UK organizations also face the issue of abusing
cloud services (Fazio et al., 2018). It is because through cloud computing it becomes easy for
organizations to get the data and information easily. Researchers describe that cloud computing
has the unprecedented capacity of storing the data this allows the attackers to get and find the
information easily. However, Eberbach believe that in the UK the services of cloud computing
are also abused through illegal software and other digital medium properties (Eberbach, 2017).
The investigation demonstrates that it made and increases the risk of data in both direct as well
as indirect manner, therefore this reduces the safety and security threats with cloud computing.
The research gap of the study is that the researchers on focus on the state of Act computing
models but does not focus complete on understanding the computing models which UK
organisations adopt.
The findings of Varghese & Buyya revealed that organizations adopt various strategies to reduce
the security issues and problems in cloud computing and to gain a competitive advantage
(Varghese & Buyya, 2018). From the analysis, it is revealed that organizations improves the
security and safety by developing the team for maintaining cloud providers safety and
compliance the certifications regarding the security issues in cloud computing. The major themes
are strategies of cloud computing as well as proper functioning in the organization. This results
in increasing the safety, time and support the organization to reduce the cost that is in the year
2018 the cost reduces up to 20% (Varghese & Buyya, 2018). The research gap of the article is
that it does not focus on the organisations of UK and only describe some of the issues which
organisations face.
COMPUTING, ENGINEERING AND MEDIA
6
Organisations in the UK use various strategies and framework for effective management; this is
because it can help companies to maintain better functioning (Mustafa & Shabani, 2018). The
study aims to understand the policies developed in UK organizations for efficiently managing
cloud computing. The data collection is done through a secondary method that is literature
review approach is used to collect the information. The findings of the research revealed that
Vodafone Group Public Limited Company in the UK establish and introduced various safety
networks it is because through this organization manage and control the overall flowing of data
and information (de Bruin & Floridi, 2017). Researchers also describe that this strategy affects
the overall operations of the organization efficiently and it also leads to reducing the threats in
the organization. The research gap of the study is that it only focus on collecting the data through
secondary method.
Research gap
The above literature and authors only provide information about the importance of cloud
computing in the organization (Chen & Leung, 2018). Therefore, it does not provide data about
the degree of profit organizations accomplished by adopting cloud computing. The above
literature also does not give information about the degree of impact cloud computing has on the
productivity of the organization. It is demonstrated that not understanding about the level of
influence is provided that is does not give complete information about the relationship between
cloud computing and organizational efficiency.
Methodology
Research design
It is the approach that supports the organization to select an adequate method for gathering and
analyzing the information (Yoo & Kim, 2019). In the present study “descriptive research design”
will be used. This is due to the reason that this helps me in understanding the benefits of cloud
computing in the organization. The risk involved for this selected design is that through this it
become difficult for me to understand the importance of cloud computing in different
organizations of UK.
6
Organisations in the UK use various strategies and framework for effective management; this is
because it can help companies to maintain better functioning (Mustafa & Shabani, 2018). The
study aims to understand the policies developed in UK organizations for efficiently managing
cloud computing. The data collection is done through a secondary method that is literature
review approach is used to collect the information. The findings of the research revealed that
Vodafone Group Public Limited Company in the UK establish and introduced various safety
networks it is because through this organization manage and control the overall flowing of data
and information (de Bruin & Floridi, 2017). Researchers also describe that this strategy affects
the overall operations of the organization efficiently and it also leads to reducing the threats in
the organization. The research gap of the study is that it only focus on collecting the data through
secondary method.
Research gap
The above literature and authors only provide information about the importance of cloud
computing in the organization (Chen & Leung, 2018). Therefore, it does not provide data about
the degree of profit organizations accomplished by adopting cloud computing. The above
literature also does not give information about the degree of impact cloud computing has on the
productivity of the organization. It is demonstrated that not understanding about the level of
influence is provided that is does not give complete information about the relationship between
cloud computing and organizational efficiency.
Methodology
Research design
It is the approach that supports the organization to select an adequate method for gathering and
analyzing the information (Yoo & Kim, 2019). In the present study “descriptive research design”
will be used. This is due to the reason that this helps me in understanding the benefits of cloud
computing in the organization. The risk involved for this selected design is that through this it
become difficult for me to understand the importance of cloud computing in different
organizations of UK.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COMPUTING, ENGINEERING AND MEDIA
7
Research philosophies
This approach helps the researchers to develop the facts and philosophies about the subject
matter, through this researcher can focus on other sets of an objective to accomplish the overall
aim of the research (Mustafa & Shabani, 2018). The research proposal demonstrates that
conducting the research “interpretivism philosophy” will also be adopted by the researchers so
that other relevant factors such as security issues of cloud computing data is gathered. This
philosophy also has one problem that is it become difficult to find the set of objectives which
could be appropriate for achieving main and purpose.
Research approach
It is considered the approach through which the overall strategy will be adopted to accomplish
the research in an efficient manner (Akinrolabu et al., 2019). The proposal describes that in the
present study “deductive approach" will be used by the researchers so that analysis is done
critical by defining all the arguments and facts related to the influence of cloud computing. The
ethical issue involved through chosen approach is that this will become difficult to select proper
article and ethical information.
Research strategy
The strategy helps the researchers to describe the overall route for the researcher so that they can
understand the methodologies to be used and adopted for getting efficient results (Amoore,
2018). The proposal demonstrates that the study will be conducted by adopting exploratory
design as well as the qualitative approach is used to identify the themes and arguments related to
cloud computing. Therefore through this, the overall application of cloud computing in the UK is
revealed.
Data collection
This is the approach in which the information is gathered through adopting different methods and
techniques (Cormode & Hickey, 2018). In the research proposal, it is demonstrated that
information is gathering will be done through adopting a secondary method that is through
critical review analysis. In this, the findings of the authors regarding the influence of cloud
computing on the organization's efficiency are reviewed. The ethical issue in selected method is
that through this method it is difficult to select ethical and legal article for review.
7
Research philosophies
This approach helps the researchers to develop the facts and philosophies about the subject
matter, through this researcher can focus on other sets of an objective to accomplish the overall
aim of the research (Mustafa & Shabani, 2018). The research proposal demonstrates that
conducting the research “interpretivism philosophy” will also be adopted by the researchers so
that other relevant factors such as security issues of cloud computing data is gathered. This
philosophy also has one problem that is it become difficult to find the set of objectives which
could be appropriate for achieving main and purpose.
Research approach
It is considered the approach through which the overall strategy will be adopted to accomplish
the research in an efficient manner (Akinrolabu et al., 2019). The proposal describes that in the
present study “deductive approach" will be used by the researchers so that analysis is done
critical by defining all the arguments and facts related to the influence of cloud computing. The
ethical issue involved through chosen approach is that this will become difficult to select proper
article and ethical information.
Research strategy
The strategy helps the researchers to describe the overall route for the researcher so that they can
understand the methodologies to be used and adopted for getting efficient results (Amoore,
2018). The proposal demonstrates that the study will be conducted by adopting exploratory
design as well as the qualitative approach is used to identify the themes and arguments related to
cloud computing. Therefore through this, the overall application of cloud computing in the UK is
revealed.
Data collection
This is the approach in which the information is gathered through adopting different methods and
techniques (Cormode & Hickey, 2018). In the research proposal, it is demonstrated that
information is gathering will be done through adopting a secondary method that is through
critical review analysis. In this, the findings of the authors regarding the influence of cloud
computing on the organization's efficiency are reviewed. The ethical issue in selected method is
that through this method it is difficult to select ethical and legal article for review.
COMPUTING, ENGINEERING AND MEDIA
8
Data analysis
The research proposal demonstrates that analyzing the complete information qualitative approach
is used that is critical review method is used for analyzing the data. It is because this will help in
providing different opinions of different authors. The efficiency in critical review is also the risk
because of various overlapping of information.
Ethical issues
Various ethical issues affect the accuracy and reliability of the research, lack of carefulness is the
issue which can be occurred while conducting the research as a result of misinterpretation of
data. However, to overcome this I can review the work in more careful and critical manner to get
credible results. Therefore, ethical information is selected by providing the reference of each data
so that the problem is solved regarding legality and carefulness. Some other ethical issues
include lack of objectivity in the selection of data; this issue will be overcome by emphasis more
on the peer review journal articles. Therefore, further for dealing the issue of interpretation and
wrong information, I will give the reference to provide complete information about the collection
of data and to manage information about the article which is selected so that no information will
be damaged.
Other related risks
A key risk involved while conducting the research includes selecting the properly related
objective through which the main objective will be achieved; this is considered major challenge
in the research. The risk can also occur in identifying the methodologies which can be used to
make study efficient. To overcome this I could gather the background information. So that
adequate related objectives are developed and for adopting the appropriate methodologies each
approach and philosophies is studied with detail to find the accurate method. This can also help
the researchers to maintain reliability and appropriateness while performing the research. The
selection of data collection and analysis is also the major risk therefore for this I can review
various articles to understand the method which would be more appropriate in the secondary
method. The management of the time in designing the research is also the problem through this I
will make work plan by dividing each activity with the time limit.
8
Data analysis
The research proposal demonstrates that analyzing the complete information qualitative approach
is used that is critical review method is used for analyzing the data. It is because this will help in
providing different opinions of different authors. The efficiency in critical review is also the risk
because of various overlapping of information.
Ethical issues
Various ethical issues affect the accuracy and reliability of the research, lack of carefulness is the
issue which can be occurred while conducting the research as a result of misinterpretation of
data. However, to overcome this I can review the work in more careful and critical manner to get
credible results. Therefore, ethical information is selected by providing the reference of each data
so that the problem is solved regarding legality and carefulness. Some other ethical issues
include lack of objectivity in the selection of data; this issue will be overcome by emphasis more
on the peer review journal articles. Therefore, further for dealing the issue of interpretation and
wrong information, I will give the reference to provide complete information about the collection
of data and to manage information about the article which is selected so that no information will
be damaged.
Other related risks
A key risk involved while conducting the research includes selecting the properly related
objective through which the main objective will be achieved; this is considered major challenge
in the research. The risk can also occur in identifying the methodologies which can be used to
make study efficient. To overcome this I could gather the background information. So that
adequate related objectives are developed and for adopting the appropriate methodologies each
approach and philosophies is studied with detail to find the accurate method. This can also help
the researchers to maintain reliability and appropriateness while performing the research. The
selection of data collection and analysis is also the major risk therefore for this I can review
various articles to understand the method which would be more appropriate in the secondary
method. The management of the time in designing the research is also the problem through this I
will make work plan by dividing each activity with the time limit.
COMPUTING, ENGINEERING AND MEDIA
9
Work Plan
The overall work and time which will be taken for performing the research are described above,
in this; the first step will be focusing on designing the research that is selecting the appropriate
topic for conducting research. The second step is describing the methodologies through which
the appropriate knowledge is received in describing the method which is used in collecting
information. After that, the proposal is written in which the overall outline and guidelines are
developed for conducting the study. Further, the information will be gathered through the
literature review method and analysis is done as well as the final report is developed through
appropriate findings and conclusion.
References
9
Work Plan
The overall work and time which will be taken for performing the research are described above,
in this; the first step will be focusing on designing the research that is selecting the appropriate
topic for conducting research. The second step is describing the methodologies through which
the appropriate knowledge is received in describing the method which is used in collecting
information. After that, the proposal is written in which the overall outline and guidelines are
developed for conducting the study. Further, the information will be gathered through the
literature review method and analysis is done as well as the final report is developed through
appropriate findings and conclusion.
References
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COMPUTING, ENGINEERING AND MEDIA
10
Ahmad, A.A.-S. & Andras, P., 2018. Measuring the Scalability of Cloud-based Software
Services. In 2018 IEEE World Congress on Services, pp.5-6.
Akinrolabu, O., New, S. & Martin, A., 2019. SCCRA: A Novel Quantitative Risk Assessment
Model for SaaS Cloud Service Providers. Computers, 8(3), p.66.
Amoore, L., 2018. Cloud geographies: Computing, data, sovereignty. Progress in Human
Geography, 42(1), pp.4-24.
Atlam, H., Walters, R. & Wills, G., 2018. Fog computing and the internet of things: a review. big
data and cognitive computing , 2(2), p.10.
Chang, V., Kuo, Y.-H. & Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Chen, M. & Leung, V.C., 2018. Reprint of: From cloud-based communications to cognition-
based communications: A computing perspective. Computer Communications , 131, pp.77-82.
Cormode, G. & Hickey, C., 2018. Cheap Checking for Cloud Computing: Statistical Analysis via
Annotated Data Streams. In in International Conference on Artificial Intelligence and Statistics.
de Bruin, B. & Floridi, L., 2017. The ethics of cloud computing. Science and engineering ethics,
23(1), pp.21-39.
Eberbach, E., 2017. State of the Art of Information Technology Computing Models for
Autonomic Cloud Computing. In Multidisciplinary Digital Publishing Institute Proceedings,
1(3), p.190.
Fazio, M. et al., 2018. A note on the convergence of IoT, edge, and cloud computing. IEEE
Cloud Computing, 5(5), pp.22-24.
Jain, P. & Pandey, U.K., 2018. Trending Security Mechanism in Cloud Computing. Technology,
9(3), pp.250-58.
Khan, N. & Al-Yasiri, A., 2018. Cloud security threats and techniques to strengthen cloud
computing adoption framework. In Cyber Security and Threats: Concepts, Methodologies, Tools,
and Applications, pp.268-85.
10
Ahmad, A.A.-S. & Andras, P., 2018. Measuring the Scalability of Cloud-based Software
Services. In 2018 IEEE World Congress on Services, pp.5-6.
Akinrolabu, O., New, S. & Martin, A., 2019. SCCRA: A Novel Quantitative Risk Assessment
Model for SaaS Cloud Service Providers. Computers, 8(3), p.66.
Amoore, L., 2018. Cloud geographies: Computing, data, sovereignty. Progress in Human
Geography, 42(1), pp.4-24.
Atlam, H., Walters, R. & Wills, G., 2018. Fog computing and the internet of things: a review. big
data and cognitive computing , 2(2), p.10.
Chang, V., Kuo, Y.-H. & Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Chen, M. & Leung, V.C., 2018. Reprint of: From cloud-based communications to cognition-
based communications: A computing perspective. Computer Communications , 131, pp.77-82.
Cormode, G. & Hickey, C., 2018. Cheap Checking for Cloud Computing: Statistical Analysis via
Annotated Data Streams. In in International Conference on Artificial Intelligence and Statistics.
de Bruin, B. & Floridi, L., 2017. The ethics of cloud computing. Science and engineering ethics,
23(1), pp.21-39.
Eberbach, E., 2017. State of the Art of Information Technology Computing Models for
Autonomic Cloud Computing. In Multidisciplinary Digital Publishing Institute Proceedings,
1(3), p.190.
Fazio, M. et al., 2018. A note on the convergence of IoT, edge, and cloud computing. IEEE
Cloud Computing, 5(5), pp.22-24.
Jain, P. & Pandey, U.K., 2018. Trending Security Mechanism in Cloud Computing. Technology,
9(3), pp.250-58.
Khan, N. & Al-Yasiri, A., 2018. Cloud security threats and techniques to strengthen cloud
computing adoption framework. In Cyber Security and Threats: Concepts, Methodologies, Tools,
and Applications, pp.268-85.
COMPUTING, ENGINEERING AND MEDIA
11
Langmead, B. & Nellore, A., 2018. Cloud computing for genomic data analysis and
collaboration. Nature Reviews Genetics , 19(4), p.208.
Mustafa, K. & Shabani, I., 2018. Mobile e-Governance in Cloud. International Journal of Recent
Contributions from Engineering, Science, 6(2), pp.46-60.
Opara-Martins, J., Sahandi, R. & Tian, F., 2016. Critical analysis of vendor lock-in and its
impact on cloud computing migration: a business perspective. Journal of Cloud Computing ,
5(1), p.4.
Polański, K. et al., 2017. Bringing numerous methods for expression and promoter analysis to a
public cloud computing service. Bioinformatics, 34(5), pp.884-86.
Varghese, B. & Buyya, R., 2018. Next generation cloud computing: New trends and research
directions. Future Generation Computer Systems, 79, pp.849-61.
Yoo, S.-K. & Kim, B.-Y., 2019. The Effective Factors of Cloud Computing Adoption Success in
Organization. The Journal of Finance, Economics and Business , 6(1), pp.217-29.
11
Langmead, B. & Nellore, A., 2018. Cloud computing for genomic data analysis and
collaboration. Nature Reviews Genetics , 19(4), p.208.
Mustafa, K. & Shabani, I., 2018. Mobile e-Governance in Cloud. International Journal of Recent
Contributions from Engineering, Science, 6(2), pp.46-60.
Opara-Martins, J., Sahandi, R. & Tian, F., 2016. Critical analysis of vendor lock-in and its
impact on cloud computing migration: a business perspective. Journal of Cloud Computing ,
5(1), p.4.
Polański, K. et al., 2017. Bringing numerous methods for expression and promoter analysis to a
public cloud computing service. Bioinformatics, 34(5), pp.884-86.
Varghese, B. & Buyya, R., 2018. Next generation cloud computing: New trends and research
directions. Future Generation Computer Systems, 79, pp.849-61.
Yoo, S.-K. & Kim, B.-Y., 2019. The Effective Factors of Cloud Computing Adoption Success in
Organization. The Journal of Finance, Economics and Business , 6(1), pp.217-29.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.