Without the ability to test the cloud computing insider threat risk assessment framework through the development of best practice recommendations for controlling these risks, this framework would be all but useless, and thus the concrete and practical nature of the second research purpose is important internally to the research as well as to the real-world business and technology communities. Research that is immediately and practically useful tends to find greater support and also leads to more extensive and meaningful discussions while also promoting more related research, and this purpose is considered valuable for this element, as well. Through the practical recommendations made in the fulfillment of this second research purpose, the academic and the practical knowledge gained in this area will both be greatly enhanced.
These research purposes will directly address the problems identified as central to this research. Through the creation of a risk assessment framework for insider threats to cloud computing and the making of recommendations to address identified threats, the problem of a lack of appropriate understanding and knowledge will be directly tackled. As it is the purpose of all research to address problems identified by knowledge gaps, and ideally to provide recommendations of a practical nature, it is believed these research purposes will make this research endeavor highly successful.
Research Questions
What specific risks do companies face from insider threats in cloud computing situations?
This basic question was selected because it is a fundamental piece of knowledge that must be obtained before the research problem can be more adequately and specifically addressed. Identifying risks is necessary for developing a reliable framework and for making recommendations for combating those risks. This will add to current literature...
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
Marketing Plan for a KW Service Designed to Generate New Clients Product Idea The product idea for this marketing plan is a service that Keller Williams could provide to potential home buyers/investors that no other competitor is currently offering: that is, free educational classes for the public about the process of buying, investing, owning, keeping up or rehabbing houses. The purpose of this service would be that it draws potential clients into
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now