Cloud Computing Risk Strategy and Complaints: Research Project Report
VerifiedAdded on 2023/06/15
|10
|3752
|157
Report
AI Summary
This research report delves into cloud computing risk strategies and complaints, examining various risks such as data security, regulatory concerns, technology, operations, vendors, and financial aspects. It explores mitigation strategies and associated complaints, focusing on the aims, objectives, literature review, and research methodology employed. The report reflects on the motivation and background of the research, resources and techniques used for the literature review, the research method and practical steps, feasibility, challenges, recommendations, and expertise gained. It also includes personal reflections on the research process and style, providing a comprehensive overview of the study undertaken.

Cloud computing risk
strategy and complains /
research project
strategy and complains /
research project
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
1. Introduction..................................................................................................................................1
2. Motivation and background.........................................................................................................1
3. Literature review- what resources and techniques did you use to write your literature review. .2
4. What is your research method and what are the practical steps you used to complete your
research?..........................................................................................................................................3
5. Comment on the feasibility of your chosen method including challenges and
recommendations?...........................................................................................................................4
6. Conclusion...................................................................................................................................4
7. Evidence of reflection..................................................................................................................5
8. What expertise have you gained as a researcher/ intern?............................................................6
9. What did you learn about your own research process and style?................................................6
References:.......................................................................................................................................8
1. Introduction..................................................................................................................................1
2. Motivation and background.........................................................................................................1
3. Literature review- what resources and techniques did you use to write your literature review. .2
4. What is your research method and what are the practical steps you used to complete your
research?..........................................................................................................................................3
5. Comment on the feasibility of your chosen method including challenges and
recommendations?...........................................................................................................................4
6. Conclusion...................................................................................................................................4
7. Evidence of reflection..................................................................................................................5
8. What expertise have you gained as a researcher/ intern?............................................................6
9. What did you learn about your own research process and style?................................................6
References:.......................................................................................................................................8

1. Introduction
Cloud computing refers to the process of delivery of different services with the help of
internet. Such resources contains the several tools and applications for example, data storage and
servers along with the databases and networking and also the software. It is basically the on
demand availability of the resources of computer system. It is done without any direct active
management by the user. There are clouds which are large and small both. Large clouds have
different functions distributed over more than one locations and each of the location is
considered as the data centre (Hiran, Doshi, Fagbola and Mahrishi, 2019). The research report is
based on the cloud computing risk strategies and complaints. Report is all about considering the
various risks such as data security and regulatory risks, technology risks, operational risks,
vendor risks and financial risks. Mitigation strategies are discussed in the research report along
with the its complaints and other associated areas. The following discussion is based on the ways
that the research report is prepared on the research topic aligning with its aims and objectives
while considering the literature review and other important aspects used such as research
methodology. This poster is all about the reflective study undertaken on the research conducted
previously on the topic of cloud computing risk strategy and complaints. Therefore, the
following discussion is based on the motivation and background, resources and techniques used
to write literature review, research method and practical steps used to complete the research,
feasibility of the chosen method including challenges and recommendations, conclusion,
evidence of reflection, expertise gained as a researcher and learning about the own research
process and style.
2. Motivation and background
There are several motivational factors which has encouraged in conducting this research
on cloud computing. Such as the intended outcomes and theoretical preferences along with the
methodological preferences. All these factors is based on the some desires such as to identify the
challenges in solving the unsolved issues which concerns over practical problems. Motivation to
get intellectual joy of performing some innovative and creative work. Research is based on the
cloud computing risk strategies and complaints. Specific motivation to conduct research on the
topic is such that to enable the organizations in order to access to the various data centers and
also can get support to manage tasks from remote locations (Soni, Barot and Gomathi, 2021).
1
Cloud computing refers to the process of delivery of different services with the help of
internet. Such resources contains the several tools and applications for example, data storage and
servers along with the databases and networking and also the software. It is basically the on
demand availability of the resources of computer system. It is done without any direct active
management by the user. There are clouds which are large and small both. Large clouds have
different functions distributed over more than one locations and each of the location is
considered as the data centre (Hiran, Doshi, Fagbola and Mahrishi, 2019). The research report is
based on the cloud computing risk strategies and complaints. Report is all about considering the
various risks such as data security and regulatory risks, technology risks, operational risks,
vendor risks and financial risks. Mitigation strategies are discussed in the research report along
with the its complaints and other associated areas. The following discussion is based on the ways
that the research report is prepared on the research topic aligning with its aims and objectives
while considering the literature review and other important aspects used such as research
methodology. This poster is all about the reflective study undertaken on the research conducted
previously on the topic of cloud computing risk strategy and complaints. Therefore, the
following discussion is based on the motivation and background, resources and techniques used
to write literature review, research method and practical steps used to complete the research,
feasibility of the chosen method including challenges and recommendations, conclusion,
evidence of reflection, expertise gained as a researcher and learning about the own research
process and style.
2. Motivation and background
There are several motivational factors which has encouraged in conducting this research
on cloud computing. Such as the intended outcomes and theoretical preferences along with the
methodological preferences. All these factors is based on the some desires such as to identify the
challenges in solving the unsolved issues which concerns over practical problems. Motivation to
get intellectual joy of performing some innovative and creative work. Research is based on the
cloud computing risk strategies and complaints. Specific motivation to conduct research on the
topic is such that to enable the organizations in order to access to the various data centers and
also can get support to manage tasks from remote locations (Soni, Barot and Gomathi, 2021).
1

Cloud computing has the working on the model of pay as you go pricing model which assist the
businesses in cutting their operating cost by lowering the extra expenses which further helps in
running the infrastructure in a more effective and efficient manner. Background of the cloud
computing states the new name for an old concept. It is considered as the tool which delivers the
computing resources over the network with the help of internet. It has various risks associated
with it but also mitigation strategies are also available for the same. It is important to adopt now
a days for the organization so that big data management and decision making can be performed
in a strategic manner. It has several benefits such as it reduces the information technology cost. It
provides the scalability and business continuity along with the collaborative efficiency and
flexibility of work practices and also the access to the automatic updates. Therefore, due to the
benefits of cloud computing to organizations, motivation has encouraged to conduct the entire
research report (Bell and Waters, 2018).
3. Literature review- what resources and techniques did you use to write your
literature review
A literature review is defined as the comprehensive study and the examination of the
literature which addresses the particular topic. It is considered as the preliminary review which is
conducted before the larger study so that critical evaluations can be done for the current literature
review along with the justification of the further study and required research. There are various
resources to accomplish the literature review in an effective and efficient manner. Such as peer
reviewed articles which provides the information in regards with the opinions of the peers on the
research topic so that identification of problems and solutions can be done in an accurate manner.
Books and conference papers are the essential resources which are used in the current research
report for the authentic content written by the well known authors in their published books and
journals along with conference papers and dissertations (Gao and Brink, 2019). At the time of
reviewing the literature, it has been made sure that it must include the major works along with
the studies which respond to the major works. Primary sources were focused and targeted for
better interpretations and secondary sources are for the theoretical knowledge of the research
topic. Moreover, most of the content were gathered from variety of sources which were
summarised in order to get the most relevant information in order to conduct the research more
accurately. Furthermore, multiple journal databases and sources outside the library were also
used along with the internet web content as well. There are basically four types of techniques in
2
businesses in cutting their operating cost by lowering the extra expenses which further helps in
running the infrastructure in a more effective and efficient manner. Background of the cloud
computing states the new name for an old concept. It is considered as the tool which delivers the
computing resources over the network with the help of internet. It has various risks associated
with it but also mitigation strategies are also available for the same. It is important to adopt now
a days for the organization so that big data management and decision making can be performed
in a strategic manner. It has several benefits such as it reduces the information technology cost. It
provides the scalability and business continuity along with the collaborative efficiency and
flexibility of work practices and also the access to the automatic updates. Therefore, due to the
benefits of cloud computing to organizations, motivation has encouraged to conduct the entire
research report (Bell and Waters, 2018).
3. Literature review- what resources and techniques did you use to write your
literature review
A literature review is defined as the comprehensive study and the examination of the
literature which addresses the particular topic. It is considered as the preliminary review which is
conducted before the larger study so that critical evaluations can be done for the current literature
review along with the justification of the further study and required research. There are various
resources to accomplish the literature review in an effective and efficient manner. Such as peer
reviewed articles which provides the information in regards with the opinions of the peers on the
research topic so that identification of problems and solutions can be done in an accurate manner.
Books and conference papers are the essential resources which are used in the current research
report for the authentic content written by the well known authors in their published books and
journals along with conference papers and dissertations (Gao and Brink, 2019). At the time of
reviewing the literature, it has been made sure that it must include the major works along with
the studies which respond to the major works. Primary sources were focused and targeted for
better interpretations and secondary sources are for the theoretical knowledge of the research
topic. Moreover, most of the content were gathered from variety of sources which were
summarised in order to get the most relevant information in order to conduct the research more
accurately. Furthermore, multiple journal databases and sources outside the library were also
used along with the internet web content as well. There are basically four types of techniques in
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

organizing the literature such as topical order, chronological order, problem cause solution order
and general to specific order. In the current study of cloud computing, technique used is the
problem cause solution order. This is the technique which first describes the entire issues on
which the research is conducted and then the causes reasons behind it and then the solutions at
the end with proper recommendations (Cardoso, Moreira and Escudero, 2018).
4. What is your research method and what are the practical steps you used to
complete your research?
Research methodology used in the current research report on the topic of cloud
computing risk strategies and compliants are in the form of research philosophy and research
approach along with the research methodological choice and research strategies which is
followed by the time horizon and techniques and procedures of the research. Research
philosophy used among positivism, realism and interpritivism is the positivism philosophy which
has the tendency to perform the practical and actual time experimentation approaches for the
current research. Research approach chosen from deduction, abduction and induction is the
deduction approach. Research methodological choice chosen from the mono method, multi
method and mixed method is the mixed method which means that both quantitative and
qualitative methods are used in order to conduct the current research (Hillway, 2021). Research
strategy used among from the experiment, survey, archival research, case study, ethnography,
action research, grounded theory and narrative inquiry is the survey which is conducted in order
to gather the different opinions from the targeted people. Time horizon chosen among cross
sectional and longitudinal is the cross sectional study which is the short term type of research
undertaken which is completed within a week. Techniques and procedures used while data
collection and data analysis are the surveys and questionnaires in which the different types of
questions are formulated and target people need to answer them in the form of sharing their
personal views on the research topic. There are several steps undertaken which are used to
complete the current research such as first is the identification and the development of the topic
along with the aims and objectives of the research. Second step is to conduct the preliminary
research for the information in order to generate the authentic report. Third step is to locating the
different materials in the research report in the form of better structure. Fourth step is to evaluate
the sources. Fifth step is to make the notes of the important points which are essential to consider
in the research report. Sixth step is to finally writing the paper by structurizing the entire content
3
and general to specific order. In the current study of cloud computing, technique used is the
problem cause solution order. This is the technique which first describes the entire issues on
which the research is conducted and then the causes reasons behind it and then the solutions at
the end with proper recommendations (Cardoso, Moreira and Escudero, 2018).
4. What is your research method and what are the practical steps you used to
complete your research?
Research methodology used in the current research report on the topic of cloud
computing risk strategies and compliants are in the form of research philosophy and research
approach along with the research methodological choice and research strategies which is
followed by the time horizon and techniques and procedures of the research. Research
philosophy used among positivism, realism and interpritivism is the positivism philosophy which
has the tendency to perform the practical and actual time experimentation approaches for the
current research. Research approach chosen from deduction, abduction and induction is the
deduction approach. Research methodological choice chosen from the mono method, multi
method and mixed method is the mixed method which means that both quantitative and
qualitative methods are used in order to conduct the current research (Hillway, 2021). Research
strategy used among from the experiment, survey, archival research, case study, ethnography,
action research, grounded theory and narrative inquiry is the survey which is conducted in order
to gather the different opinions from the targeted people. Time horizon chosen among cross
sectional and longitudinal is the cross sectional study which is the short term type of research
undertaken which is completed within a week. Techniques and procedures used while data
collection and data analysis are the surveys and questionnaires in which the different types of
questions are formulated and target people need to answer them in the form of sharing their
personal views on the research topic. There are several steps undertaken which are used to
complete the current research such as first is the identification and the development of the topic
along with the aims and objectives of the research. Second step is to conduct the preliminary
research for the information in order to generate the authentic report. Third step is to locating the
different materials in the research report in the form of better structure. Fourth step is to evaluate
the sources. Fifth step is to make the notes of the important points which are essential to consider
in the research report. Sixth step is to finally writing the paper by structurizing the entire content
3

in the research report. Seventh step is to citing the sources properly for evidence based results.
Eigth step is to proofread the whole research report in order to rectify any mistakes discovered
(Dempsey and Kelliher, 2018).
5. Comment on the feasibility of your chosen method including challenges and
recommendations?
Feasibility study refers to the determination of the intervention that it is an appropriate
domain for further research or not. It helps the researcher to identify and assess the resources
while conducting the study that they are relevant and sustainable or not. It basically represents
the definition of the problem and the opportunities to be studied. It also supports the investigator
to analyse the current mode of operations and the definition of requirements along with the
evaluation of alternatives and also the agreement on the courses of action (Won, Hensley and
Wolters, 2021). Questionnaire is chosen in the primary research method which are several
benefits and challenges faced by the researcher. Benefits are such that the questionnaires are
inexpensive to conduct in the form of survey which are cost efficient in nature and supports the
entire investigation in a sustainable manner. It is one of the practical approach which assist the
researcher to gather the real time actual opinions from the targeted people so that authentic
research can be conducted in a potential manner. It also provides the fast results and accurate
outcomes for the better data analysis and interpretations. It is scalable and comparable in nature
along with the easy and simple analysis without any complications for any further study. It also
contains the validity and reliability in a standarised manner with no pressure. Moreover, it is not
having any time contraints and also covers the every aspect of the topic. Its challenges includes
the disinterest of the people in filling up the survey form. It can result in the dishonest answers
and skipped questions along with the interpretations issues and lack of nuance which is followed
by the analysis issues and hidden agenda. Moreover, lack of personlaization and accessibility
issues along with the survey fatigue are also some of the challenges of the research method
chosen (Belfield, Britton, Buscha and Zhu, 2019).
6. Conclusion
It is concluded that cloud computing risk strategies and complaints are the important
concept to learn and study so that its applications can be applied in the real world organizations.
This is because now a days it is essential for the organizations to adopt the latest and advanced
4
Eigth step is to proofread the whole research report in order to rectify any mistakes discovered
(Dempsey and Kelliher, 2018).
5. Comment on the feasibility of your chosen method including challenges and
recommendations?
Feasibility study refers to the determination of the intervention that it is an appropriate
domain for further research or not. It helps the researcher to identify and assess the resources
while conducting the study that they are relevant and sustainable or not. It basically represents
the definition of the problem and the opportunities to be studied. It also supports the investigator
to analyse the current mode of operations and the definition of requirements along with the
evaluation of alternatives and also the agreement on the courses of action (Won, Hensley and
Wolters, 2021). Questionnaire is chosen in the primary research method which are several
benefits and challenges faced by the researcher. Benefits are such that the questionnaires are
inexpensive to conduct in the form of survey which are cost efficient in nature and supports the
entire investigation in a sustainable manner. It is one of the practical approach which assist the
researcher to gather the real time actual opinions from the targeted people so that authentic
research can be conducted in a potential manner. It also provides the fast results and accurate
outcomes for the better data analysis and interpretations. It is scalable and comparable in nature
along with the easy and simple analysis without any complications for any further study. It also
contains the validity and reliability in a standarised manner with no pressure. Moreover, it is not
having any time contraints and also covers the every aspect of the topic. Its challenges includes
the disinterest of the people in filling up the survey form. It can result in the dishonest answers
and skipped questions along with the interpretations issues and lack of nuance which is followed
by the analysis issues and hidden agenda. Moreover, lack of personlaization and accessibility
issues along with the survey fatigue are also some of the challenges of the research method
chosen (Belfield, Britton, Buscha and Zhu, 2019).
6. Conclusion
It is concluded that cloud computing risk strategies and complaints are the important
concept to learn and study so that its applications can be applied in the real world organizations.
This is because now a days it is essential for the organizations to adopt the latest and advanced
4

technology so that they can perform their functioning in a systematic manner with good
efficiency and to also gain the competitive advantage for the same in the marketplace. That is
why it is significant to conduct the research on the topic so that technological services can highly
benefit the organizations in their normal working to the strategic working of the company.
Research conducted contains several sub topics which is required to get answered so that all the
techniques and methodologies can be identified in order to make the research relevant in nature.
Such as aims and objectives along with the rationale and background which is followed by the
literature revenue and data collection and also the analysis ad interpretations of it. Moreover,
research methodology and conclusion and recommendations are also covered in the entire
research report. In the current reflective poster, systematic review is being done on the research
topic and how it is being conducted. It covers the motivation and background, resources and
techniques used to write literature review, research method and practical steps used to complete
the research, feasibility of the chosen method including challenges and recommendations,
conclusion, evidence of reflection, expertise gained as a researcher and learning about the own
research process and style. Hence, this poster covers all such areas in order to better understand
the conception of research report development.
7. Evidence of reflection
The entire reflection performed in the form of poster which uses the reflective model of
Gibbs reflective cycle. It basically has six steps with the help of which the reflection is done.
First step is the description which states that exactly what happened. In the current reflection,
research is being conducted on the topic of cloud computing risk strategies and complaints.
Second step is the feelings which states that an individual's thinking and feeling about the entire
things. In the current reflection, I am thinking that research topic is important and hence it is
essential to be accurate and authentic in nature so that the relevant information can be provided
through the research. Third step is the evaluation which states the good or bad about the
experience. I have evaluated that the good experience was the primary research because I have
interested many people and convinced them to fill up the form was an interesting part (Boroch,
2018). The bad experience was the data analysis as it was lacking some sort of the accuracy.
Fourth step is the analysis which states the alternative solutions for the issues discussed in the
research. I have analysed that the alternative solution for bringing the accuracy in data is to only
reach out to those people only who have knowledge about the research topic so that the accuracy
5
efficiency and to also gain the competitive advantage for the same in the marketplace. That is
why it is significant to conduct the research on the topic so that technological services can highly
benefit the organizations in their normal working to the strategic working of the company.
Research conducted contains several sub topics which is required to get answered so that all the
techniques and methodologies can be identified in order to make the research relevant in nature.
Such as aims and objectives along with the rationale and background which is followed by the
literature revenue and data collection and also the analysis ad interpretations of it. Moreover,
research methodology and conclusion and recommendations are also covered in the entire
research report. In the current reflective poster, systematic review is being done on the research
topic and how it is being conducted. It covers the motivation and background, resources and
techniques used to write literature review, research method and practical steps used to complete
the research, feasibility of the chosen method including challenges and recommendations,
conclusion, evidence of reflection, expertise gained as a researcher and learning about the own
research process and style. Hence, this poster covers all such areas in order to better understand
the conception of research report development.
7. Evidence of reflection
The entire reflection performed in the form of poster which uses the reflective model of
Gibbs reflective cycle. It basically has six steps with the help of which the reflection is done.
First step is the description which states that exactly what happened. In the current reflection,
research is being conducted on the topic of cloud computing risk strategies and complaints.
Second step is the feelings which states that an individual's thinking and feeling about the entire
things. In the current reflection, I am thinking that research topic is important and hence it is
essential to be accurate and authentic in nature so that the relevant information can be provided
through the research. Third step is the evaluation which states the good or bad about the
experience. I have evaluated that the good experience was the primary research because I have
interested many people and convinced them to fill up the form was an interesting part (Boroch,
2018). The bad experience was the data analysis as it was lacking some sort of the accuracy.
Fourth step is the analysis which states the alternative solutions for the issues discussed in the
research. I have analysed that the alternative solution for bringing the accuracy in data is to only
reach out to those people only who have knowledge about the research topic so that the accuracy
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

can be maintained by gathering their opinions. Fifth step is the conclusion which states that what
else could have been done for making the research more effective. Research can be more
effective if primary and secondary research would have been undertook in an accurate manner on
the research topic. Sixth step is the action plan which states the if there is a requirements to
conduct the research again then what will be the improvement areas. In the current research, I
have determined the improvement areas such as accuracy in the data collection techniques along
with the effective analysis and interpretations of it for better outcomes and results (Gordon, de la
Torre, Cowhy and Knight, 2018).
8. What expertise have you gained as a researcher/ intern?
I have gained the expertise in several skills as a researcher from the entire project
conducted on the research topic. Such as problem solving skills I have gained in order to identify
the issue and resolve the same in the research report. Research skills gained which is related to
the in depth investigation on the research topic (Alsmadi and Prybutok, 2018). Written
communication skills gained in the formulating the report with the qualitative content and an
appropriate structure of the report in order to look attractive. Moreover, cognitive and analytical
skills are gained because of the data analysis and interpretations done in the report of the results
gathered from the questionnaire. Furthermore, other skills includes the academic skills such as
academic integrity with no plagiarised content and information and communication technology
skills along with the qualitative skills and other which are highly used not only in the academic
career but also in the professionalism as well (Levitt, Bamberg, Creswell and Suárez-Orozco,
2018). I also have the gained the major research skills after performing the research on cloud
computing such as the capabilities to understand the typical terms related to the topic and also
learnt about the various integrated sources with the help of online sites and from the library as
well. I have gained expertise in the ability to survey and gaining the sufficient knowledge about
the research topic. Also the skills of collect and organise the important historical data. These are
some of the expertise areas where I have the gained as a researcher which will help me in my
personal as well as in my professional development.
9. What did you learn about your own research process and style?
I have learnt many things about my own research process and style. Such as I have learn
about the experiences gained on the research topic by gaining the deeper understanding of the
6
else could have been done for making the research more effective. Research can be more
effective if primary and secondary research would have been undertook in an accurate manner on
the research topic. Sixth step is the action plan which states the if there is a requirements to
conduct the research again then what will be the improvement areas. In the current research, I
have determined the improvement areas such as accuracy in the data collection techniques along
with the effective analysis and interpretations of it for better outcomes and results (Gordon, de la
Torre, Cowhy and Knight, 2018).
8. What expertise have you gained as a researcher/ intern?
I have gained the expertise in several skills as a researcher from the entire project
conducted on the research topic. Such as problem solving skills I have gained in order to identify
the issue and resolve the same in the research report. Research skills gained which is related to
the in depth investigation on the research topic (Alsmadi and Prybutok, 2018). Written
communication skills gained in the formulating the report with the qualitative content and an
appropriate structure of the report in order to look attractive. Moreover, cognitive and analytical
skills are gained because of the data analysis and interpretations done in the report of the results
gathered from the questionnaire. Furthermore, other skills includes the academic skills such as
academic integrity with no plagiarised content and information and communication technology
skills along with the qualitative skills and other which are highly used not only in the academic
career but also in the professionalism as well (Levitt, Bamberg, Creswell and Suárez-Orozco,
2018). I also have the gained the major research skills after performing the research on cloud
computing such as the capabilities to understand the typical terms related to the topic and also
learnt about the various integrated sources with the help of online sites and from the library as
well. I have gained expertise in the ability to survey and gaining the sufficient knowledge about
the research topic. Also the skills of collect and organise the important historical data. These are
some of the expertise areas where I have the gained as a researcher which will help me in my
personal as well as in my professional development.
9. What did you learn about your own research process and style?
I have learnt many things about my own research process and style. Such as I have learn
about the experiences gained on the research topic by gaining the deeper understanding of the
6

entire process of research. I have learnt that how the research aims and objectives along with the
questions are formulated. Testing of the hypotheses and planing of the experiments along with
the writing grants and report findings. Moreover, I have also learnt about the reading in an in
depth manner so that difficult journals can be understood along with the synthesizing and
writings (Nayyar, 2019). Furthermore, collecting and analysing the data by understanding the
entire process of the research by myself. Also I have learnt about the time management and
dealings with the unknown people and a greater interaction with large number people in order to
gather their opinions on the research topic. Additionally I also have learnt about the searching for
the relevant information and attention to detail methods and also the communication of the
results in an effective and efficient manner (Kaleeswari, Maheswari, Kuppusamy and Jeyabalu,
2018). Moreover, I have also learnt about that how the sources can be find out which must
relevant to the topic and provides specific content without any diversion. Being patient is the
skill which is important while conducting research and therefore from my own research process,
I have learnt how to be patient with fining the sources and data collection with several people.
Furthermore, I have also used many of my personal networks to make this research report more
effective so that so that connectivity and personalization can be maintained in an efficient and
potential manner. Therefore, these are the learnings which I have gained from my research
process and style.
7
questions are formulated. Testing of the hypotheses and planing of the experiments along with
the writing grants and report findings. Moreover, I have also learnt about the reading in an in
depth manner so that difficult journals can be understood along with the synthesizing and
writings (Nayyar, 2019). Furthermore, collecting and analysing the data by understanding the
entire process of the research by myself. Also I have learnt about the time management and
dealings with the unknown people and a greater interaction with large number people in order to
gather their opinions on the research topic. Additionally I also have learnt about the searching for
the relevant information and attention to detail methods and also the communication of the
results in an effective and efficient manner (Kaleeswari, Maheswari, Kuppusamy and Jeyabalu,
2018). Moreover, I have also learnt about that how the sources can be find out which must
relevant to the topic and provides specific content without any diversion. Being patient is the
skill which is important while conducting research and therefore from my own research process,
I have learnt how to be patient with fining the sources and data collection with several people.
Furthermore, I have also used many of my personal networks to make this research report more
effective so that so that connectivity and personalization can be maintained in an efficient and
potential manner. Therefore, these are the learnings which I have gained from my research
process and style.
7

References:
Books and Journals
Alsmadi, D. and Prybutok, V., 2018. Sharing and storage behavior via cloud computing: Security
and privacy in research and practice.
Computers in Human Behavior,
85, pp.218-226.
Belfield, C., Britton, J., Buscha, F. and Zhu, Y., 2019. The impact of undergraduate degrees on
early-career earnings: Research report: November 2018.
Bell, J. and Waters, S., 2018.
EBOOK: DOING YOUR RESEARCH PROJECT: A GUIDE FOR
FIRST-TIME RESEARCHERS. McGraw-Hill Education (UK).
Boroch, R., 2018. Antropological Theory of Culture—Research Report.
Tomsk Journal of
Linguistics and Anthropology, (2), p.18.
Cardoso, A., Moreira, F. and Escudero, D.F., 2018. Information Technology Infrastructure
Library and the migration to cloud computing.
Universal Access in the Information
Society,
17(3), pp.503-515.
Dempsey, D. and Kelliher, F., 2018. Business-to-business client relationships in the cloud
computing software as a service realm. In
Industry Trends in Cloud Computing (pp. 83-
109). Palgrave Macmillan, Cham.
Gao, L. and Brink, A.G., 2019. A content analysis of the privacy policies of cloud computing
services.
Journal of Information Systems,
33(3), pp.93-115.
Gordon, M.F., de la Torre, M., Cowhy, J.R. and Knight, D., 2018. School Closings in Chicago:
Staff and Student Experiences and Academic Outcomes. Research Report.
University of
Chicago Consortium on School Research.
Hillway, T., 2021.
Introduction to research.
Hiran, K.K., Doshi, R., Fagbola, T. and Mahrishi, M., 2019.
Cloud computing: Master the
concepts, architecture and applications with real-world examples and case studies. Bpb
Publications.
Kaleeswari, C., Maheswari, P., Kuppusamy, K. and Jeyabalu, M., 2018. A brief review on cloud
security scenarios.
International Journal of Scientific Research in Science and
Technology,
4(5), pp.46-50.
Levitt, H.M., Bamberg, M., Creswell, J.W. and Suárez-Orozco, C., 2018. Journal article
reporting standards for qualitative primary, qualitative meta-analytic, and mixed methods
research in psychology: The APA Publications and Communications Board task force
report.
American Psychologist,
73(1), p.26.
Nayyar, A., 2019.
Handbook of Cloud Computing: Basic to Advance research on the concepts
and design of Cloud Computing. BPB Publications.
Soni, M., Barot, Y. and Gomathi, S., 2021. A review on privacy-preserving data
preprocessing.
Journal of Cybersecurity and Information Management,
4(2: Special Issue-
RIDAPPH), pp.16-6.
Won, S., Hensley, L.C. and Wolters, C.A., 2021. Brief research report: Sense of belonging and
academic help-seeking as self-regulated learning.
The Journal of Experimental
Education,
89(1), pp.112-124.
8
Books and Journals
Alsmadi, D. and Prybutok, V., 2018. Sharing and storage behavior via cloud computing: Security
and privacy in research and practice.
Computers in Human Behavior,
85, pp.218-226.
Belfield, C., Britton, J., Buscha, F. and Zhu, Y., 2019. The impact of undergraduate degrees on
early-career earnings: Research report: November 2018.
Bell, J. and Waters, S., 2018.
EBOOK: DOING YOUR RESEARCH PROJECT: A GUIDE FOR
FIRST-TIME RESEARCHERS. McGraw-Hill Education (UK).
Boroch, R., 2018. Antropological Theory of Culture—Research Report.
Tomsk Journal of
Linguistics and Anthropology, (2), p.18.
Cardoso, A., Moreira, F. and Escudero, D.F., 2018. Information Technology Infrastructure
Library and the migration to cloud computing.
Universal Access in the Information
Society,
17(3), pp.503-515.
Dempsey, D. and Kelliher, F., 2018. Business-to-business client relationships in the cloud
computing software as a service realm. In
Industry Trends in Cloud Computing (pp. 83-
109). Palgrave Macmillan, Cham.
Gao, L. and Brink, A.G., 2019. A content analysis of the privacy policies of cloud computing
services.
Journal of Information Systems,
33(3), pp.93-115.
Gordon, M.F., de la Torre, M., Cowhy, J.R. and Knight, D., 2018. School Closings in Chicago:
Staff and Student Experiences and Academic Outcomes. Research Report.
University of
Chicago Consortium on School Research.
Hillway, T., 2021.
Introduction to research.
Hiran, K.K., Doshi, R., Fagbola, T. and Mahrishi, M., 2019.
Cloud computing: Master the
concepts, architecture and applications with real-world examples and case studies. Bpb
Publications.
Kaleeswari, C., Maheswari, P., Kuppusamy, K. and Jeyabalu, M., 2018. A brief review on cloud
security scenarios.
International Journal of Scientific Research in Science and
Technology,
4(5), pp.46-50.
Levitt, H.M., Bamberg, M., Creswell, J.W. and Suárez-Orozco, C., 2018. Journal article
reporting standards for qualitative primary, qualitative meta-analytic, and mixed methods
research in psychology: The APA Publications and Communications Board task force
report.
American Psychologist,
73(1), p.26.
Nayyar, A., 2019.
Handbook of Cloud Computing: Basic to Advance research on the concepts
and design of Cloud Computing. BPB Publications.
Soni, M., Barot, Y. and Gomathi, S., 2021. A review on privacy-preserving data
preprocessing.
Journal of Cybersecurity and Information Management,
4(2: Special Issue-
RIDAPPH), pp.16-6.
Won, S., Hensley, L.C. and Wolters, C.A., 2021. Brief research report: Sense of belonging and
academic help-seeking as self-regulated learning.
The Journal of Experimental
Education,
89(1), pp.112-124.
8
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.