Thursday, December 5, 2019

Flow Foundations Of Positive Psychology - Myassignmenthelp.Com

Questions: What Are The Limitations Of Cloud Computing? What Are The Negative Impacts Of Cloud Computing In A Business Organization? Is Cloud Computing Secure Enough For An Organisation? What Are The Possible Threats Of Using Cloud Computing In A Business Organization? Is The Advantages And Disadvantages Of Using Cloud Computing Industry Specific? What Approaches Of Using Cloud Computing Are Incompetent For Generating Profit? How The Services Of Cloud Computing Can Be Improved? Answers: Introduction The business research is conducted for analyzing the strengths and weaknesses of the cloud computing that is being used by the business organization in Australia. The cloud computing has revolutionized the way business functions and even managed business applications, computer software and servers to deliver computing resources through use of internet. The internet is enabled for managing the cloud computing and has created better scopes and opportunities for providing computer processing resources and servers to other computer systems based on the needs and requirements (Baskerville and Wood-Harper 2016). One of the major advantages brought up with the implementation of cloud computing system is the accessibility to various kinds of computer applications and programs with the help of internet. The other advantages include reduction of operational costs, on-site hosting of price for deploying the computer applications in the cloud and management of physical resources properly as well . Project Objective To identify the probable ways by which data and information can be stored and processed on a private cloud. To evaluate the impact created by using the cloud computing by the retail organizations in Australia. To assess the various ways or approaches that are required to undermine the cloud computing system and prevent issues related to data security and accessibility To recommend necessary measures for improving the effectiveness of cloud computing system implemented by the retail organizations in Australia Project Scope The scope of the project is enough to find out the various ways by which cloud computing can be done along with the benefits obtained from it. It can be seen that cloud computing provides better services for managing the fluctuating bandwidths and manage the remote servers properly. Cloud computing helps in managing disaster recovery as well as manages automatic software updates to keep the computer system secure and free from any kinds of viruses and malwares (Bryman and Bell 2015). The files that are stored on databases can be accessed from anywhere with the use of internet connection. In spite of the benefits, cloud computing has several drawbacks too like additional charges for managing bandwidths, not being able to access data in case on no internet connection, sharing and exchange of private data may not be possible when required and lack of ability to manipulate files and data locally (Bykztrk 2017). Cloud computing The cloud computing enables storage for data and information that can be maintained, managed and backed up even, thereby allow the users of services to store files online in a secured manner as well as gain accessibility to those from anywhere over the world by using internet. With the advancement in technology and communication, business management organizations need to sustain properly and for that it is important to manage storage of data, maintain good system architecture, enable autonomic computing system and ensure that all information are properly stored and accessed (Collis and Hussey 2013). The servers of networks are used that are hosted on the internet for handling data storage, accessibility and processing rather than using a local server or personal computer system. Advantages of cloud computing The major benefits of using the cloud computing are improving the technological infrastructures to expand flexibility and reduce the costs of expenses incurred while managing the cloud computing system. The cloud computing system is location independent, because of which, the users can access data from anywhere just by utilizing the internet facility. The businesses can follow a centralized approach that can reduce the cost of operations and overhead as well as increase the effectiveness of systems with ease and effectiveness (Csikszentmihalyi and Larson 2014). There are better scopes for managing disaster recovery and the security measures have improved as well. Cloud computing system enables self-service provisioning that allows the end users to compute the resources and manage workload according to the demands. The businesses can easily scale up with the increase in needs of computing whereas the scaling down happens when the demands are decreased (Marshall et al. 2013). The users could pay for the resources and workloads used by them, which further could result in avoiding the necessity to make investments. Disadvantages of cloud computing Few disadvantages of using the cloud computing are that lack of usability and convenience, poor bandwidth, etc. If data and information are transferred from the local storage device to the cloud storage, then it would be permanently moved and it could not be retained in the original folder where it was found earlier. The cloud storage devices have certain limit for bandwidth and in case the organization moves beyond the limitation of bandwidth, then additional charges will be required (McDonald et al. 2013). Thus, business organizations need to look at the bandwidth prior to considering the cloud storage. If there is no internet connection, there is no benefit of cloud computing and data cannot be accessed even. The security of data and information is hampered because sharing and exchange of information and data to other organizations can create complexities for business. All the services must be downloaded on all devices to manage the changes of data and information (Saunders, Lewis and Thornhill 2012). The cloud computing has offered extensive services like encryption and decryption along with better management of security of data and information effectively. This could prevent identity thefts as well as loss of important data and information with ease and efficiency. Literature gaps The gaps found in the literature are related to the articles and documents that are not authenticated and validated, due to which the research has taken some additional time for completion. The articles and documents consisting of relevant data and information must be assessed again to determine the negative outcomes that might be generated as well as accomplish the research in much more details (Schaufeli, Maslach and Marek 2017). Research Hypothesis H0: The cloud computing used within the Australian retail sector has created some major issues while accessing data and information H1: The use of cloud computing system has improved the efficiency of business processes by managing servers, accessing and storing data with better flexibility. Research Question Research questions are the backbone of the research on which it is carried out. It is impossible to carry out research in any discipline without formulating proper research question. The questions are identified through the literature review, where the gap is identified to find out the scope where additional research is needed. The research questions are broadly divided into two categories that are primary and secondary. The primary research question focuses on the detail that needs to be answered, whereas the secondary questions are formed to obtain the answers for the primary question. Both the primary and secondary research questions helps the researcher to direct the research in a particular direction. Research Design and Methodology In this part of the research proposal, the discussion is based on different methodsa and designs that will work as a vessel to carry out the entire research. According to Baskerville and Wood-Harper (2016), research methodology and design is the framework of any research, which is associated with a set of paradigm assumption, and this assumption will conduct the research. Henceforth, it is necessary to identify the methods that are essential for the success of the research (Baskerville and Wood-Harper 2016;Bryman and Bell 2015). The research methods are broadly divided into two categories that are qualitative and quantitative research method. Qualitative methods are used to collect the qualitative data. This type of data can not be quantified or put in number. The analysis are done by its quality not quantity. On the other hand, quantitative methods are used to collect the measurable numeric data. There are various methods used in data collection. Some of them are specific to one cat egory and some of them are used in both the methods (Bryman and Bell 2015). This particular research will incorporate some specific data collection method that will be fruitful and provide significant data. They are as follows. Qualitative Research and Quantitative Research Both of these can be used in both the researches. The process of selecting the target population on which the study will be conducted is called sampling. The process marks out of segments a small portion of a larger population. It identifies the part of the larger mass that is potential to provide accurate data on the research. It is done in the initial part of the research (Collis and Hussey 2013). On the other hand, sample size is the number of the number of a sample on which the research is likely to be conducted. (Marshall et al. 2013) Data Collection Method The data collection method can be further divided into two types Primary data collection method and secondary data collection method. If the data is collected from the primary sources such as from the organization CEO, employee who are directly related to the organization, it is primary data collection method. Whenever the data are collected for secondary sources such as literature, it is referred as secondary data dollection method (Saunders, Lewisand Thornhill 2012). Reliability and Validity Csikszentmihalyi and Larson (2014) points out that when a particular instrument is used multiple times on the same topic in order to get similar topic, it is called reliability. It is for verifying the authenticity of the data. Validity of the other hand is the mandatory requirement for all types of research (McDonald et al. 2013). Research Instrument Research instruments are the tools used for collecting data. Various research instruments will be utilize in this research such as questionnaire, interview, observation, and reading (Schaufeli, Maslach and Marek 2017). Quantitative Data Analysis Process These are the numeric data collected using a range of methods and instruments. The management of cleaning and coding has been done to present the data in a detailed manner based on proper analysis and interpretation. All these are important concepts of the quantitative data analysis (Bykztrk 2017). Interview and Questionnaire Design One of the most important method used in this particular research is the interview and questionnaire method. When the researcher directly interacts with the informant and indulges in a question answer process for obtaining information, it is called interview. Both open ended or closed ended questions are asked in this particular process for accessing particular information. Questionnaire on the other hand is also a type of interview where the subject is provided with a set of questions. S/he has to reply to the questions in yes and no format. These two methods are important in organizational research where primary authentic data is necessary (Willis 2015). Research Limitation Every research has a limitation and it cannot address everything related to the topic. Too much data can sometimes spoil the research. The researcher himself sets some limitations whereas; some are imposed by the external factors. Time is an important external factor that sets limit for the research. Only a limited amount of data is possible to collect and analyzed in a particular timeframe. On the other hand, limitation set by the researcher is important to focus on a particular aspect of the study. Objectives of the research plays crucial role in setting limits as the research focuses in meeting the particular objectives(Veld-Merkoulova and Viteva 2016). Time Schedule (Research Plan) The research will be carried out over 2 year relying on both primary and secondary data. The secondary data includes the articles, journals, reviewed articles etc. On the other hand, the primary data are the data collected through interview method and questioner design. In both the cases, both qualitative researches and quantitative research will be carried out for collecting the data. The time schedule specifies particular timing and order to carry out the research successfully (Collis and Hussey 2013). It can also be refer as research plan, which specifies the topic, background, objective, methods, data, and analysis of the data and the timing and order it needs to be conducted. Main activities/ stages Month Jan 2016 Month Jun 2016 Month Dec 2016 Month Jan 2017 Month Jun 2017 Month Dec 2017 Selection of topic Collecting data from secondary sources Constructing the research layout Literature review Development of research Plan Selection of Appropriate Research Techniques Primary data collection Analysis Interpretation of Data which are collected Conclusion Development of Draft Final Work submission Conclusion Various researches conducted on the cloud computing demonstrates potential advantages and approaches of using the service in a business settings. The impacts of incorporating cloud computing in a business organization have been identified. However, there are only limited researches that focus on the disadvantages and limitations of cloud computing in business organizations in different industries. It is important to identify the limitations, disadvantages and negative impacts of the services to improve the service and extract the maximum profit out of it. Moreover, the possible threats of using cloud computing and the vulnerability of the system are the important area of research to make necessary innovation in the service. The confidential data of the business organizations needs absolute protection from the external threat. Therefore, understanding the negatives will throw lights in the areas that require development. The proposed questions mentioned in the proposal are capable of addressing these problems. The methodology and design of the research discussed in the report are essential to carry out the research in a favorable structure. However, there are some limitations of the research due to the limited time and access. Hence, the research will be carried out in the given boundaries. Reference List Baskerville, R.L. and Wood-Harper, A.T., 2016. A critical perspective on action research as a method for information systems research. InEnacting Research Methods in Information Systems: Volume 2(pp. 169-190). Springer International Publishing. Bryman, A. and Bell, E. 2015, Business Research Methods, (Fourth Edition), UK, Oxford University Press. Bykztrk, ?., 2017. Sosyalbilimleriinverianalizi el kitab?.PegemAt?f?ndeksi, pp.1-213. Collis, J. and Hussey, R., 2013.Business research: A practical guide for undergraduate and postgraduate students. Palgrave macmillan.Saks, M. and Allsop, J. eds., 2012. Researching health: Qualitative, quantitative and mixed methods. Sage. Csikszentmihalyi, M. and Larson, R., 2014. Validity and reliability of the experience-sampling method. InFlow and the foundations of positive psychology (pp. 35-54). Springer Netherlands. Marshall, B., Cardon, P., Poddar, A. and Fontenot, R., 2013. Does sample size matter in qualitative research?: A review of qualitative interviews in IS research.Journal of Computer Information Systems,54(1), pp.11-22. McDonald, C.M., Henricson, E.K., Abresch, R.T., Florence, J., Eagle, M., Gappmaier, E., Glanzman, A.M., Spiegel, R., Barth, J., Elfring, G. and Reha, A., 2013. The 6?minute walk test and other clinical endpoints in duchenne muscular dystrophy: Reliability, concurrent validity, and minimal clinically important differences from a multicenter study.Muscle nerve,48(3), pp.357-368. Saunders, M., Lewis, P. and Thornhill, A. 2012. Research Methods for Business Students 6thedition, Pearson Education Limitedf. Schaufeli, W.B., Maslach, C. and Marek, T. eds., 2017.Professional burnout: Recent developments in theory and research. Taylor Francis. Veld-Merkoulova, Y. and Viteva, S., 2016. Conclusions, Limitations and Future Research. InCarbon Finance (pp. 129-131). Springer International Publishing. Willis, G.B., 2015.Analysis of the cognitive interview in questionnaire design. Oxford University Pres

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.