Verified Document

Cloud Computing And Insider Threats Discussion Chapter

Related Topics:

Many people know that they are not educated enough in the complicated technologies that are seen in cloud computing and insider threats. As such, it is often a general consensus of the people to not trust such technologies they cannot clearly define. Using a systems-oriented approach will allow the current research to dive into these opinions and help uncover what societal structures are leading to this general sense of mistrust and disapproval. A system-oriented approach will allow the research to understand what factors influence people to fear the topics so much, while others tend to see cloud computing as a new wave of the future. These can lead into assumptions regarding divisions in society that can account for very different viewpoints from a holistic approach. This can be combined with the use of thick description as a way to get underneath some of the more shallow responses participants might provide. According to the research, "seemingly simple and innocent terms often served as cod or shorthand for complex social and cultural settings and activities" (Shank 79). This is the primary foundation for the notion of using thick descriptions. Under this framework, "there must be some anchor to the rest of...

It can be used as a way to clarify the seemingly simple terms and concepts that individuals think of when discussing cloud computing. Relating these to larger social constructions and frameworks that might shed a greater light on what those signals may mean in a deeper sense. Coding these simple first layer observations as a way to be able to categorize them and thus show how they are related to other major categories to make assumptions regarding the perceptions of cloud computing and insider threats. Thus, the interpretive framework of the research will be using thick descriptions as a way to try to code and connect what individuals report regarding their perceptions towards underlying meanings. Cloud computing and insider threats are not a realm that most are familiar with, and many may be simply glossing over their feelings for them without revealing the true meaningful influences that make them feel as such. Using thick descriptions can help the researchers pull out the larger underlying assumptions that lead some people to mistrust cloud computing and fear insider threats so much.
References

Schram. (2006).…

Sources used in this document:
References

Schram. (2006). Clarifying your perspective.

Shank. (2006). Interpreting.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computer and Insider Threats Cloud Computing
Words: 1924 Length: 6 Document Type: Term Paper

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly

Cloud Lit Rev Insider Threats
Words: 1418 Length: 5 Document Type: Literature Review

By implementing some fairly basic security protocols and trusting cloud computing service providers to utilize available resources to ensure proper encryption and access control on their end, companies can greatly minimize their exposure to insider risks (Durkee, 2010). This trust is in and of itself a risk, however, and the lack of direct control presents an unavoidable risk in cloud computing. A recent case that is both highly unique and

Cloud Computing and the Insider
Words: 1595 Length: 5 Document Type: Literature Review

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

Justifying Research Methods and Design Insider Threats
Words: 2243 Length: 7 Document Type: Research Paper

Justifying Research Methods and Design Insider threats are one of the primary sources of risk to an enterprise network and to intellectual property. For decades, the internet security realm has been rather narrowly focused on pre-empting insider threats by mean of sophisticated architecture and conventional login identification barriers. More recently, internet communications and technology (ICT) experts have taken an active position by using technological capacity to identify risk patterns, and

Cloud Computing
Words: 3424 Length: 10 Document Type: Essay

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now