This may occur when populations show wide variations in their responses to particular hypotheses, which are in violation of the expected response.
Construct validity may be compromised when alternative correspondences are achieved between a construct and an unexpected concept found within the actual environment being studied. In other words, when the construct does not correspond with the original hypothesis, its validity would be compromised.
In cloud computing and determining inside threats, various elements may need to be taken into account before taking action. One potential compromise to such an investigation might be the lack of validity when estimating potential threats. In other words, insider threats might be considered higher among employees who are knowledgeable in computer technology and spend more time at the company than other employees. However, such employees can be to the detriment of a full investigation, which might reveal a threat from another source, which might be unexpected.
Today's computing and cloud computing worlds are extremely complex. While it is useful to be aware of the most common external and construct validity threats, it is also useful to be able to identify those threats that are less traditional in order to provide full protection across the company.
References
Reliability and Validity (2012). Retrieved from: http://mailer.fsu.edu/~slosh/MethodsGuide3.html
Shackleford, D. (2012, Apr.). Countering cloud computing threats: Malicious insiders. Retreived from: http://searchcloudsecurity.techtarget.com/tip/Countering-cloud-computing-threats-Malicious-insiders
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now