Verified Document

Mixed Methods Research The Nature Term Paper

Variables that could increase the likelihood of insider threat can be certain personality traits or satisfaction levels revealed by employee questionnaires. If an employee, for example, believes that he or she is not receiving the full benefits merited by his or her service level or skill set within the company, it can be determined as more likely for this type of employee to act less ethically than those with a higher satisfaction level regarding their work and skill set match. These data can then be compared to historic quantitative data from companies that have suffered from cloud computing insider crimes. This comparison can then finally lead to a somewhat accurate determination of potential threat within the company being investigated, and appropriate steps for its mitigation recommended. A quantitative focus, on the...

This, in turn can be used with qualitative interview data that may reveal the belief among managers and employers that such a threat exists and that mitigating steps need to be taken. The computer skills among high-level employees who may pose a threat can also be analyzed in terms of the potential threat they could pose.
In conclusion, cloud computing has changed the face of business. It has also changed the level and amount of threats that could impact companies. Mixed-methods research can be used in a number of ways to both determine the level of threat within a specific company or the determine the historic effect of computer crimes on companies and their survival in general.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now