¶ … Cloud Computing and Insider Threats)
A survey will be conducted of 40 businesses that have successfully dealt with insider threats. These 40 businesses will be compared with another online survey that arbitrarily and randomly samples other businesses.
My objectives will be to assess how 40 large companies successfully deal with insider threats and how these practices contrast with practices from other companies.
My methodology will be the following: I will randomly select 40 companies from the top Fortune 500 companies and, approaching their manager, will ask the manager whether I can conduct a survey on computer security on their company and whether I can distribute this survey to officials form their IT division. The survey will have certain key items, some of which will be graded on a Likert scale from 0 to 5. One of the questions may, for instance, be "How secure do you think your company's computer is from the following:
the spread of computer viruses infiltration and theft of data from external hackers engineered network overloads triggered by malicious mass e-mailing electronic surveillance of corporate computer data by outside parties damage from malfunction, fire, or natural disasters (Computer Security)
The questions will be a combination of short, quantitative questions (yes or no, rate this from 1 to 5, etc.) as well as qualitative questions...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now