Cloud Computing and Insider Threats Discussion Chapter

Total Length: 797 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

Many people know that they are not educated enough in the complicated technologies that are seen in cloud computing and insider threats. As such, it is often a general consensus of the people to not trust such technologies they cannot clearly define. Using a systems-oriented approach will allow the current research to dive into these opinions and help uncover what societal structures are leading to this general sense of mistrust and disapproval. A system-oriented approach will allow the research to understand what factors influence people to fear the topics so much, while others tend to see cloud computing as a new wave of the future. These can lead into assumptions regarding divisions in society that can account for very different viewpoints from a holistic approach.

This can be combined with the use of thick description as a way to get underneath some of the more shallow responses participants might provide. According to the research, "seemingly simple and innocent terms often served as cod or shorthand for complex social and cultural settings and activities" (Shank 79). This is the primary foundation for the notion of using thick descriptions. Under this framework, "there must be some anchor to the rest of humanity as a whole in order for the description to make sense" (Shank 80). It can be used as a way to clarify the seemingly simple terms and concepts that individuals think of when discussing cloud computing.

Stuck Writing Your "Cloud Computing and Insider Threats" Discussion Chapter?

Relating these to larger social constructions and frameworks that might shed a greater light on what those signals may mean in a deeper sense. Coding these simple first layer observations as a way to be able to categorize them and thus show how they are related to other major categories to make assumptions regarding the perceptions of cloud computing and insider threats. Thus, the interpretive framework of the research will be using thick descriptions as a way to try to code and connect what individuals report regarding their perceptions towards underlying meanings. Cloud computing and insider threats are not a realm that most are familiar with, and many may be simply glossing over their feelings for them without revealing the true meaningful influences that make them feel as such. Using thick descriptions can help the researchers pull out the larger underlying assumptions that lead some people to mistrust cloud computing and fear insider threats….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Cloud Computing And Insider Threats" (2012, December 18) Retrieved June 30, 2025, from
https://www.aceyourpaper.com/essays/cloud-computing-insider-threats-77174

Latest MLA Format (8th edition)

Copy Reference
"Cloud Computing And Insider Threats" 18 December 2012. Web.30 June. 2025. <
https://www.aceyourpaper.com/essays/cloud-computing-insider-threats-77174>

Latest Chicago Format (16th edition)

Copy Reference
"Cloud Computing And Insider Threats", 18 December 2012, Accessed.30 June. 2025,
https://www.aceyourpaper.com/essays/cloud-computing-insider-threats-77174