Survey for Cloud Computing and Insider Threats Essay

Total Length: 877 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

Cloud Computing and Insider Threats)

A survey will be conducted of 40 businesses that have successfully dealt with insider threats. These 40 businesses will be compared with another online survey that arbitrarily and randomly samples other businesses.

My objectives will be to assess how 40 large companies successfully deal with insider threats and how these practices contrast with practices from other companies.

My methodology will be the following: I will randomly select 40 companies from the top Fortune 500 companies and, approaching their manager, will ask the manager whether I can conduct a survey on computer security on their company and whether I can distribute this survey to officials form their IT division. The survey will have certain key items, some of which will be graded on a Likert scale from 0 to 5. One of the questions may, for instance, be "How secure do you think your company's computer is from the following:

the spread of computer viruses infiltration and theft of data from external hackers engineered network overloads triggered by malicious mass e-mailing electronic surveillance of corporate computer data by outside parties damage from malfunction, fire, or natural disasters (Computer Security)

The questions will be a combination of short, quantitative questions (yes or no, rate this from 1 to 5, etc.) as well as qualitative questions (where respondent will be asked to elaborate on response), and multi-choice questions as in the example above.

Stuck Writing Your "Survey for Cloud Computing and Insider Threats" Essay?



I will ensure that questions will be clear, succinct, and easily understood. I will have a group of assistants who will review the questions beforehand to ensure that questions are open-ended and not directive and that they preclude bias and are sensitive. This will prevent response bias. In order to deter fatigue and improve clarity, I will also place easier questions first, avoid words that provoke bias or emotional responses, use a logical order and place similar questions together (The Community Tool Box). I will use the questions produced by Power (1999) in his survey as my base modifying them to suit my particular population.

The survey will be accompanied by a SAE and recipients will be asked to complete and mail the survey within the month. Researcher and/or assistants will contact a tardy recipient to query reason for lateness.

The survey results of these 40 companies will then be analyzed to see whether they possess any common themes. The respondents too will be consulted if the researcher has any difficulty in understanding (or may possibly misinterpret) one of the responses.

As comparison to these 40 companies, an alternate survey will be held online of arbitrary companies who choose to enter.….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Survey For Cloud Computing And Insider Threats" (2012, October 25) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/survey-cloud-computing-insider-threats-107936

Latest MLA Format (8th edition)

Copy Reference
"Survey For Cloud Computing And Insider Threats" 25 October 2012. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/survey-cloud-computing-insider-threats-107936>

Latest Chicago Format (16th edition)

Copy Reference
"Survey For Cloud Computing And Insider Threats", 25 October 2012, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/survey-cloud-computing-insider-threats-107936