Verified Document

Networking, System Support, And Virtualization Research Proposal

One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The research would also focus on promotion of objectivity and minimization of subjectivity. This is crucial to the development of effective and efficient hypothesis to offer valid testing to the theories and concepts of network security. It is also critical to uphold honesty in the execution and presentation of research findings and analysis. This research would focus on presenting data in accordance with the response of the population sample with the aim of promoting objectivity and openness in evaluation of the findings. The research would also follow the credible steps and procedures in relation to development of quality research design and processes. This is through adhering to the processes and design of qualitative research thus addressing of ethical aspect of research. The research would understand and adhere to legal requirements of the execution of a research. Critical Approaches vital for the improvement of the Research

In order to improve the quality and validity of the research, it would be ideal to define the research questions precisely in order to offer critical direction to the development of the study. This involves elimination of ambiguity that would arise during the adoption and implementation of the research question. It is also vital to apply quality and effective research instruments to enhance the process of collecting data in relation to the research question. It is also essential to eliminate limitations that would hinder the achievement of valid and reliable information such as a reduction of biasness. It is also significant to adopt sufficient number of research agents or population sample in order to enhance the validity and reliability of the data. The research process would follow critical procedures for the development of the study. This is an indication of building the research on an effective literature review on relevant resources that would provide accurate information on the research question. It is also vital to maintain objectivity and openness in the execution and presentation of the...

This would provide the opportunity for other researchers to enhance or confirm the theories and concepts of the research. Adhering to the ethical guidelines would ensure that research is powerful and valid towards addressing the needs of the research question.
References

Sharma, P, & Bhadana, P 2010, 'An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures', International Journal on Computer Science & Engineering, 1, 5, pp. 1830-1835, Academic Search Complete.

Manangi, S, Chaurasia, P, & Singh, M 2010, 'Analysis of Security Features in 5 Layer Internet Model', International Journal on Computer Science & Engineering, 1, 3, pp. 777-781, Academic Search Complete.

Bhaya, W, & Alasadi, S 2011, 'Security against Spoofing Attack in Mobile Ad Hoc Networks', European Journal of Scientific Research, 64, 4, pp. 634-643, Academic Search Complete.

Singh, S, & Verma, H 2011, 'Security for Wireless Sensor Network', International Journal on Computer Science & Engineering, 3, 6, pp. 2393-2399, Academic Search Complete.

Ambhore, P, Meshram, B, & Wankhade, K 2010, 'Protection of Public Network Communication by using Internet Protocol Security', International Journal on Computer Science & Engineering, 1, 3, pp. 493-499, Academic Search Complete.

Pandey, S 2011, 'Modern Network Security: Issues and Challenges', International Journal of Engineering Science & Technology, 3, 5, pp. 4351-357, Academic Search Complete.

Papaj, J, Dobos, L, & izmar, a 2012, 'Opportunistic Networks and Security', Journal of Electrical & Electronics Engineering, 5, 1, pp. 163-166, Academic Search Complete.

Alshboul, a 2010, 'Information Systems Security Measures and Countermeasures: Protecting Organizational Assets from Malicious Attacks', Communications of the IBIMA, pp. 1-9, Academic Search Complete.

Ristov, S, Gusev, M, & Kostoska, M 2012, 'CLOUD COMPUTING SECURITY in Business INFORMATION SYSTEMS', International Journal of Network Security & Its Applications, 4, 2, pp. 75-93, International Security & Counter Terrorism Reference Center.

Lihua, H 2010, 'Network Security Policy', Modern Applied Science, 4, 7, pp. 201-203, Academic…

Sources used in this document:
References

Sharma, P, & Bhadana, P 2010, 'An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures', International Journal on Computer Science & Engineering, 1, 5, pp. 1830-1835, Academic Search Complete.

Manangi, S, Chaurasia, P, & Singh, M 2010, 'Analysis of Security Features in 5 Layer Internet Model', International Journal on Computer Science & Engineering, 1, 3, pp. 777-781, Academic Search Complete.

Bhaya, W, & Alasadi, S 2011, 'Security against Spoofing Attack in Mobile Ad Hoc Networks', European Journal of Scientific Research, 64, 4, pp. 634-643, Academic Search Complete.

Singh, S, & Verma, H 2011, 'Security for Wireless Sensor Network', International Journal on Computer Science & Engineering, 3, 6, pp. 2393-2399, Academic Search Complete.
Cite this Document:
Copy Bibliography Citation

Related Documents

Virtualization Virtual Networks the Creation
Words: 1138 Length: 4 Document Type: Term Paper

Three different types of basic switches can be built and utilized in a Hyper-V virtual network: internal, external and private switches (Virtuatopia, 2012). An external switch at the top layer of a Hyper-V virtual network and controls access to/routes transmissions in and out of the virtual network, maintaining communication between the virtual network and the external physical network (Virtuatopia, 2012). Once inside the network, an internal switch works much

Chef Delivery System: On-Premises and the Cloud
Words: 2991 Length: 8 Document Type: Chapter

Chef Delivery is a continuous and unified delivery service that provides enterprise DevOps teams with a new workflow framework in which they can better manage the continuous delivery of their infrastructure. In sum, Chef Delivery automates changes to infrastructure, runtime environments and applications, but it provides a useful framework in which automated testing and continuous integration and delivery can be achieved. In addition, Chef Delivery provides software developers with relevant

Enterprise Saas ERP System for
Words: 2948 Length: 11 Document Type: Business Proposal

This is because it can provide and de-provide its resources dynamically, lead to a reduction of the unused capacity as well as maximize the available resources for improved efficiency. Efficient: The SaaS ERP system makes businesses to benefit from the shared hardware, familiar technologies as well as automated processes. This means that that system is able to effectively increase its peak-load capacity, provide access to organizational resources from almost everywhere

Operating Systems Comparing the MS-DOS,
Words: 981 Length: 3 Document Type: Essay

Configuration of Microsoft Windows in more complex networking environments required an extensive amount of add-in software and programming to ensure all systems could work. Finally the levels of security inherent in the Microsoft Windows operating system continue to be problematic (Bradley, 2009). The Linux and UNIX operating systems are comparable in terms of kernel and memory architectures (MacKinnon, 1999)(Predd, Cass, 2005). There are variations in the pricing models used for

Delphi Study Influence of Environmental Sustainability Initiatives...
Words: 17687 Length: 60 Document Type: Literature Review

Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

Cloud Computing Changes Systems Analysis and Design
Words: 5643 Length: 18 Document Type: Research Paper

Cloud Computing Changes Systems Analysis and Design Instiution/University affiliation Both information systems and information technology infrastructure have been incorporated into business procedures for at least two decades. In the initial development of information technology, organizations which greatly invested in information technology infrastructure achieved strong growth in market shares and returns. Given that IT is now the core of businesses, nearly all organizations own their own IT infrastructures to manage their daily

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now