Verified Document

Survey For Cloud Computing And Insider Threats Essay

¶ … Cloud Computing and Insider Threats) A survey will be conducted of 40 businesses that have successfully dealt with insider threats. These 40 businesses will be compared with another online survey that arbitrarily and randomly samples other businesses.

My objectives will be to assess how 40 large companies successfully deal with insider threats and how these practices contrast with practices from other companies.

My methodology will be the following: I will randomly select 40 companies from the top Fortune 500 companies and, approaching their manager, will ask the manager whether I can conduct a survey on computer security on their company and whether I can distribute this survey to officials form their IT division. The survey will have certain key items, some of which will be graded on a Likert scale from 0 to 5. One of the questions may, for instance, be "How secure do you think your company's computer is from the following:

the spread of computer viruses infiltration and theft of data from external hackers engineered network overloads triggered by malicious mass e-mailing electronic surveillance of corporate computer data by outside parties damage from malfunction, fire, or natural disasters (Computer Security)

The questions will be a combination of short, quantitative questions (yes or no, rate this from 1 to 5, etc.) as well as qualitative questions...

I will have a group of assistants who will review the questions beforehand to ensure that questions are open-ended and not directive and that they preclude bias and are sensitive. This will prevent response bias. In order to deter fatigue and improve clarity, I will also place easier questions first, avoid words that provoke bias or emotional responses, use a logical order and place similar questions together (The Community Tool Box). I will use the questions produced by Power (1999) in his survey as my base modifying them to suit my particular population.
The survey will be accompanied by a SAE and recipients will be asked to complete and mail the survey within the month. Researcher and/or assistants will contact a tardy recipient to query reason for lateness.

The survey results of these 40 companies will then be analyzed to see whether they possess any common themes. The respondents too will be consulted if the researcher has any difficulty in understanding (or may possibly misinterpret) one of the responses.

As comparison to these 40 companies, an alternate survey will be held online of arbitrary companies who choose to enter. The questions will be the same as those drafted…

Sources used in this document:
How Online Surveys Work

http://money.howstuffworks.com/business-communications/how-online-surveys-work8.htm

Power, Richard. (1999) CSI/FBI Computer Crime and Security Survey." Computer Security Issues & Trends..20
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now