logo

Data as a Service (DaaS) Cloud Offering

   

Added on  2023-01-05

13 Pages633 Words60 Views
DATA AS A SERVICE (DAAS) CLOUD OFFERING
Computing and Information technology with advanced practice

THE RESEARCH AIMS AND OBJECTIVES
The research main objective is:
To analyse vulnerabilities associated with Cloud offering of Data as a Service (DaaS)”
To obtain the primary aim of this study the following objectives should be achieved:
To analyse importance of cloud computing
To analyse different kinds of cloud computing services
To evaluate ways in which Data as a Service (DaaS) Cloud offering is used.
To analyse importance of DaaS in Higher education
To evaluate vulnerabilities associated with Data as a Service cloud offering and their impact on
organizations.
To identify ways in which vulnerabilities associated with Data as a Service (DaaS) Cloud
offering can be reduced.
1

RESEARCH
PHILOSOPHY AND
APPROACH
Interpretivism Philosophy
Deductive Approach
2

ETHICAL CONSIDERATION
3
in order to collect secondary data, it is important for researcher to adhere data
protection act, 2018. It further helps in collecting and using secondary data in
an ethical manner. None of the data of other researcher were used without
citing or it can also be said that data of any researcher used in this dissertation
have been cited and referenced properly. None of the secondary data from
unauthorised sources have been used within this research. Proper Harvard
referencing style was adopted for referencing and citing sources of data. It is
also been analysed that researcher has been engaged in making sure that ethical
code of conduct is being followed.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital transformation in higher education.
|28
|10647
|97

Data as a Service (DaaS) Cloud offering
|46
|18221
|26

Cloud Risk Assessment: Risks and Mitigation Strategies for AWS Edge
|12
|3545
|301

Assignment On Computer Security Breach At Verizon
|6
|1996
|172

Analyzing Security Options for JKL Company
|12
|841
|51

IT Risk Management: Assessing Security Risks and Recommendations
|8
|1806
|475