Cloud Computing & It Security - Why Kuwait Corporate Sector Is Not Adopting Cloud Computing For Their It Infrastructure Requirement by

Read Complete Research Material

Cloud Computing & IT Security - Why Kuwait Corporate Sector is not Adopting Cloud Computing for their IT Infrastructure Requirement

by

Introduction1

Critical Analysis of Peer-Reviewed Scholarly Articles1

Peer-Reviewed Research Paper No. 1 - “Cloud Computing - The business perspective”1

Introduction1

The Research Problem/questions/or hypothesis1

The Research Purpose2

Type of design & elements of design2

Threats to validity2

Findings & their implications3

Peer-Reviewed Research Paper No. 2 - “Identifying the security risks associated with governmental use of cloud computing”3

Introduction3

The Research Problem/questions/or hypothesis4

The Research Purpose4

Type of design & elements of design5

Threats to validity5

Findings & their implications5

Peer-Reviewed Research Paper No. 3 - “Addressing cloud computing security issues”6

Introduction6

The Research Problem/questions/or hypothesis6

The Research Purpose7

Type of design & elements of design7

Threats to validity7

Findings & their implications8

Peer-Reviewed Research Paper No. 4 - “ Cloud computing security in business information systems”8

Introduction8

The Research Problem/questions/or hypothesis8

The Research Purpose9

Type of design & elements of design9

Threats to validity9

Findings & their implications9

Peer-Reviewed Research Paper No. 5 - “Cloud Computing Security”10

Introduction10

The Research Problem/questions/or hypothesis10

The Research Purpose10

Type of design & elements of design11

Threats to validity11

Findings & their implications11

Part II: Literature Review12

Part III: Research Design13

Research Question13

Research Purpose13

Types of design & elements of the design14

Strengths & Weaknesses of the Envisioned Design and Methods14

Justification for choosing the design and methods15

Validity & Reliability of the Study15

Methods of Data Analysis15

Conclusion16

References17

Introduction

The exceptional rate at which the improvements have taken placed in the IT industry in the past few decades, has led to the development of an efficient computing resources (Lin & Chen, 2012). Following this rate of improvement, a new type of computing technology has been developed and named as cloud computing. In this section of the research the researcher has selected and critically analyzed five peer-reviewed scholarly articles that address the issue of security vulnerabilities present in the current cloud platform. The security issues include privacy, reliability, unauthorized access, malicious insiders, account control and so forth. These issues act as barriers for the implementation of cloud computing in organizations.

Critical Analysis of Peer-Reviewed Scholarly Articles

Peer-Reviewed Research Paper No. 1 - “Cloud Computing - The business perspective”

Introduction

In their article, Marston et.al has discussed the issue of the cloud computing environment from the perspective of business and governmental agencies. According to the researcher, the issues associated with cloud computing should be thoroughly understood. These issues require understanding from consumer as well as provider point of view.

The Research Problem/questions/or hypothesis

Over the past couple of decades, evolution of the technique of cloud computing has proved to be one of the main accomplishments in the discipline of computing. (Reddy & Reddy, 2011). The issues that are required to be considered are from the viewpoints of consumers as well as of its providers. The problem statement is that the business-related issues of cloud computing are required to be looked into on an urgent basis (Marston et.al, 2010).

The Research Purpose

The purpose of this research is to identify the weaknesses, strengths, threats and opportunities that are faced by the industry of cloud computing. This research aims to recognize the different issues that have an influence on various stakeholders of this technology.

Type of design & elements of design

This research ...
Related Ads
  • Cloud Computing
    www.researchomatic.com...

    Cloud computing is utility computing or grid ...

  • Cloud Computing
    www.researchomatic.com...

    Small businesses important cost-saving advantages ar ...

  • Cloud Computing Security:...
    www.researchomatic.com...

    Cloud computing is the area which has gained ...

  • Cloud Computing
    www.researchomatic.com...

    The cloud computing concept known also under ...

  • Cloud Computing
    www.researchomatic.com...

    This research paper showed the information about ...