JUsampleinformedconsentform1_sameer’ ?file has commented section which are not filled. Please fill highlighted section with
1) "JUsampleinformedconsentform1_sameer" file has commented section which are not filled. Please fill highlighted section with more content
2) Based on feeback on two files "Sameer final proposal-needtobeupdated" file and "Sameer Rubric-needtobeupdated" file, we need to update entire dissertation paper
3) "JUIRBApplicationForm_sameer" file has answers which are very less. Please fill out answers with more content
4) "JU IRB Risk Assessment form_sameer" file needs to be filled
Informed Consent Form
I am conducting a study about (insert general statement about the study). I invite you to participate in this research. You were selected as a participant because (explain how subject identified). Please read this form and ask any questions you may have before consenting to be in the study.
This study is being conducted by:___________________________________________
Background Information:
The primary purpose of this study is to conduct a significant and practical analysis of cybersecurity issues, attacks, and threats. This research is the higher insight to know the protection factors from network security, operating systems, data manipulations, and cyber attacks. It will ensure the monitoring cause of the system specifications in mitigating the relevant aspects, information access threats.
Procedures:
Thus, the most valuable information is provided by selecting the practical conceptual framework to make the research successful by fulfilling all the research objectives and goals. The data collection process includes six steps. These steps includes
1. Identifying issues or opportunities for data collection,
2. Selecting the issues or opportunities and set specific goals and objectives. In goal setting, the specific goals are to define the issues and opportunities and at the same time separate them for each issue or opportunity.
3. Planning an approach or a method is the third step for making effective decisions about who will be surveyed and how the data is collected.
4. Collecting the data is the fourth step essential for understanding practical considerations and essential practices for identifying the issues.
5. The fifth step is about analyzing and interpreting the data. This involves analyzing the data collected based on the amount and data collection method.
6. The sixth step in the data collection procedure is to act on the results of the data collected.
Risks and Benefits of Being in the Study:
The study has two risks. The first risk is the social/economic risks which include the alteration of relationships with others. As such the subject may feel disadvantaged or embarrassed to share cybersecurity information for their organization. However, labeling the subjects in a way that will positively impact them or their powers they have by virtue will help them feel comfortable when sharing information on cybersecurity. The second type risks involve psychological risks which may make the subject anxious or uncomfortable during their encounter with the researcher. The production of positive affective state would improve their self esteem so that they can share whatever the information is required for the survey.
There are not immediate benefits of the subjects participating in this study.
Confidentiality:
In any publications of the results, pseudonyms will be used in place of names of participants or locations.The records of this study will be kept private. In any sort of report I publish, I will not include information that will make it possible to identify you in any way. Research records will be kept secured; my Judson University research advisor and I are the only people who will have access to the records. (If video or audio recordings are made, explain who will have access, if they will be used for educational purposes, and when they will be erased. Include how any other research records such as paper copies or photographs will be secured and stored for five years).
· Video Recordings
Classroom observations may be video recorded for data analysis, and portions of recordings may be presented in a professional context. Although real names will not be used in presentations of the research, and responses will be treated with confidentiality to anyone outside of the project research staff, participants might be identifiable to people who recognize them in video recorded artifacts. Recordings will be kept until completion of degree and destroyed immediately thereafter. Please sign below if you are willing to have your image recorded. You may still participate in this study if you are not willing to have your image recorded. If you are not willing to be video recorded, the camera will be situated in the classroom at an angle that will avoid capturing your image. Any unintentional video recording(s) of you will be edited to blur their image, causing them to be unrecognizable to viewers.
_______________________________ ______________
Signature Date
· Audio Recordings
Interviews may be audio recorded for data analysis, and portions of recordings may be presented in a professional context. Although real names will not be used in presentations of the research, and responses will be treated with confidentiality to anyone outside of the project research staff, participants might be identifiable to people who recognize them in audio recorded artifacts. Recordings will be kept until completion of degree and destroyed immediately thereafter. Please sign below if you are willing to have the interview(s) audio recorded. You may still participate in this study if you are not willing to have the interview(s) audio recorded.
_______________________________ ______________
Signature Date
Voluntary Nature of the Study:
Your participation in this study is entirely voluntary. Your decision whether or not to participate will not affect your current or future relations withyour employer or Judson University. If you decide to participate, you are free to withdraw from the study at any time without penalty. Should you decide to withdraw from the study, data collected about you, or your students will only be used up to the point of yourwithdrawal.
Contacts and Questions
My name is (Insert researcher name here). You may ask any questions you have now and at any point through the research process. If you have questions, you may contact me at (Insert email address. If researcher is a student, include Judson University advisor’s name, email, and telephone number here.)
You will be given a copy of this form to keep for your records.
Statement of Consent:
I have read the above information. My questions have been answered to my satisfaction. I give consent to participate in the study.
___________________________ ________________
Printed Name of Participant Date
___________________________ ________________ Signature of Study Participant Date
___________________________ ________________ Signature of Researcher Date
,
Skill/Criteria |
Meets/Exceeds Criteria |
Minimally Proficient |
Not Passable |
Feedback |
Introduction/Problem Statement/Purpose Claims are clear and explicitly stated. The organization is complete and logical with a progression of ideas leading to an understanding of why the research is needed and/or why the intervention/design/experiment is likely to work. Illustrates creative thinking and insight gained from past research.to build background knowledge for the reader. |
The introduction appropriately presents the background to the study. |
|||
Research Questions/Thesis The question or thesis is original and significant in its potential contribution; it calls forth new knowledge; is fully developed by the work of the proposal and has obvious potential to address critical issues within the respective field. |
Adequate and succinctly stated. |
|||
Conceptual/Theoretical Framework Current theories are connected to and provide a clear framework for the research; well-versed in theory; gaps in the research identified in existing theories; discusses the impact on existing theories their research implies. |
Adequately discussed. |
|||
Literature Review Critical engagement with current relevant literature in the field. Demonstrates the gap in the literature relevant to their study and makes a compelling argument as to why the candidate’s research/project will address the gap, significantly contributing to the body of research in their field. Synthesizes research literature findings; identifies larger themes, inconsistencies and/or relevant patterns; themes evident in headings. |
Well organized. However, (1) the initial impression given was that you will focus the review from a certain perspective, which is great…but that was not done, see comments in the paper. My suggestion si that you use these criteria as sub-heading like you said you would, then focus the discussions of the lit. reviewed from these sub-headings. (2) More resources are needed. |
|||
Proposed Research/Project Design Project is described in sufficient Detail so that the reader could replicate the study. Subjects (number, type), Materials & Measures, and Procedure are all described well. Statistical Approach is thoughtful and accurate. |
The assertion is made in this section that the research will use sequential data analysis and thematic analysis of literary sources. I guess my question then is that how does this reflect your verbal statement earlier that you were going o focus on “project-based” work? I just want to be sure we are catering to what you really want to do in this work… |
|||
Data/Analysis Procedures Identifies participants in the study and provides rationale for their selection; describes sampling methods. Describes the procedures used to conduct the study for sample recruitment, informed consent, maintaining data. Describes the steps taken during data collection Describes the data collection instruments. Includes rationale for these instruments. Includes copies of actual instruments to be used. |
A fairly detailed explanation is given. |
|||
Skill/Criteria |
Meets/Exceeds Criteria |
Minimally Proficient |
Not Passable |
Feedback |
Reliability/Validity/Limitations Study biases and/or limitations within the study clearly understood and discussed; ethical issues are considered appropriately; discussion of connection between methodology and data analysis clear and concise. |
Adequate enough |
|||
APA Style & References APA style is used correctly (note esp. headings, citations, reference list, tables and figures). All sources are properly cited in both. |
Adequate. More resources needed. |
|||
Style & Grammar Writing is fluid, precise, and clear; lexicon of the field is clearly explained and defined; the tone is professional; vocabulary and syntax are mature; scholarly style and format are accurately used; the candidate’s ‘voice’ is heard and yields a definitive presence, authority, and understanding of the issues being discussed. |
Adequate. |
Additional Comments:
· Please fix the front page
· Find an APA sample paper to help with layout issues: see https://apastyle.apa.org/style-grammar-guidelines/paper-format/sample-papers
,
1
Data Security in Cloud Services
Submitted by
Sameer Kumar Prajapat
Judson University
Elgin, Illinois
Abstract
The main goal of this research paper is to explore the current state of data security systems in the cloud service industry. The research proposal will also analyze the ability of the current systems to combat the ever-evolving threats in the industry. The dissertation will collect data from literary sources that focus on cloud security systems to learn more. The primary research methodology for the dissertation will be a thematic analysis. The proposal will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. This knowledge will be used to understand the current state of data security, the expected future threats, and the avenues of evolution necessary to combat the same. The research team will use purposive sampling to ensure that the research is conducted on relevant literary sources. The data sourcing, extraction, and indexing processes will be handled professionally to eliminate bias and preferences. The proposal wishes to arrive at a valid and reliable result that provides a complete overview of the current cloud data security domain. In addition to the thematic analysis, the research study also provides a brief overview of the current literature about the topic through an insightful literature review. The research proposal also provides a brief overview of the limitations and ethical considerations that might affect the dissertation process.
Table of Contents Abstract 2 Chapter 1: Introduction 4 Background 4 Problem Statement and Significance 5 Theoretical Framework 6 Researcher’s Positionality 9 Purpose 10 Research Question(s) 10 Significance 11 Definitions 11 Summary 11 Chapter 2: Literature Review 13 Theoretical Foundation 14 Review of Literature 15 Data Security 15 Growth of Cloud Services 17 Security Evolution 17 Gaps in Literature 19 Conclusion 20 Chapter 3: Methodology 22 Introduction 22 Statement of the Problem 22 Research Question(s) 22 Research Methodology 23 Research Design 23 Study Population and Sample Selection 24 Data Collection Methods 25 Data Analysis and Procedures 26 Validity & Reliability 27 Ethical Considerations 27 Limitations 28 Summary 28 References 30
Chapter 1: Introduction
Background
Cloud services have gained a lot of popularity in the current technological era. With the rapid increase in digital adoption, even small and medium organizations are looking to improve their efficiency and revenue through cloud-based services. Rather than a physical on-site server, cloud services are made available via a remote cloud computing system (Zhe et al., 2017). In today's business environment, cloud service providers can be seen as third-party suppliers who help organizations run critical services through their remote cloud servers. This makes cloud services less costly to operate and maintain in the longer run. It is also one of the main reasons organizations are moving towards cloud-based organizational frameworks. Cloud services also provide several other benefits to both the organizations and the consumers. Therefore, cloud services have gained wide recognition among organizations as a desirable addition to the present IT infrastructure (Zhe et al., 2017).
It is essential to understand that cloud services also have several disadvantages, and these disadvantages limit the widespread use of cloud services and the growth of cloud services within organizations. One of the major problems with cloud services is that it is not secure. As mentioned earlier, cloud services are not run from a cloud computing service that is on-site. Therefore, there are several data security risks associated with cloud services. A typical cloud provider does not hold the necessary access keys (Zhe et al., 2017). If an organization does not have a strong user identity, an attacker will compromise the entire organization. Moreover, there is a very high risk that employees and non-technical workers may be left behind when a cloud service is shut down. Therefore, if a cloud service is being disrupted, security is compromised for many organizations (Zhe et al., 2017).
With the increasing demand for digitization, we can see that cloud services will play a significant part in organizations (Shaikh&Modak, 2017). Therefore, it is critical to ensure that the data security risks associated with cloud services need to be addressed and mitigated efficiently. We can see several cloud service providers work towards improving their security practices through user audits and peer reviews and by addressing data breach mitigation techniques and strategies (Shaikh&Modak, 2017). However, most of them could be considered stop-gap measures and not permanent solutions. Since technology is constantly evolving, the nature of threats for the field is also constantly changing. Therefore, it is crucial to thoroughly understand the security risks and look for ways to enable a sustainable data security solution for cloud services (Shaikh&Modak, 2017).
Problem Statement and Significance
The rapid increase in digitization and the popularity of cloud computing systems have led to most organizations looking at creating a cloud-based operational framework. This combination makes the organizations more susceptible to data security risks (Kumar et al., 2018). The responsibility of mitigating these risks and keeping the organizations' safe falls on the hands of the third-party cloud suppliers. Therefore, these data security risks impact the end organizations and the third-party cloud suppliers. With the increase in cloud service users, they will find it hard to manage cloud systems and mitigate risks immediately. It is also important to note that the data security risks that threaten cloud services vary. This creates a significant problem for cloud service providers (Kumar et al., 2018).
An evaluation of current and future threats against cloud services is a challenge for cloud providers and companies within the industry. This research proposal will explore the current data security risks and analyze the security systems that third-party cloud suppliers have in place to understand the current cloud service environment comprehensively. This will help create sustainable solutions to combat the data security risks and issues (Kumar et al., 2018). With this understanding, cloud service providers will be able to reduce the financial risks and help with data security issues, protect their customers and help solve the data security issues of their cloud-based data services. Another important goal of the dissertation is to learn about the new data security threats emerging in the cloud service sector. The challenge highlighted will be experienced as more organization moves their data to the cloud, demanding a better management model to counter it. Therefore, the research proposal will be focused on understanding and evaluating both the current and emerging threats that threaten the data security of cloud services (Kumar et al., 2018). To ensure that the dissertation is focused, the same will be centered upon answering three essential research questions mentioned below.
R1: What are the current data security issues and risks that threaten an organization’s cloud services?
R2: What are the predicted future trends for the data security issues in organizations?
R3: How can current cloud data security be made more efficient to facilitate tighter data security in organizations?
Theoretical Framework
Cloud services refer to services provided through remote cloud servers that third-party service providers set up. Cloud services have started to gain prominence because of their ability to increase organizational efficiency at minimal costs. Many cloud services are designed around remote storage, which reduces infrastructure and administration costs (Udendhran, 2017). The cloud market provides several potential cloud services, including file sharing and data management/analysis. These cloud services are highly beneficial for organizations from all sectors because they can scale without the burden of enormous costs. Cloud services also enable organizations to study, manage and analyze large data sets without having their servers or data centers. Data centers are expensive as they have higher operational and service costs when compared to cloud computing systems (Udendhran, 2017).
With the help of cloud services, organizations can manage complex business operations, including business logic, risk management, data recovery, and transaction management. We can also clearly see that some new technological advancements and innovations are helping the cloud computing field proliferate (Udendhran, 2017). While this is beneficial for organizations, this rapid growth also increases data security risks. Data security is an integral part of both enterprise and corporate security. Data security at an organizational level can be mitigated and eliminated with the help of solid encryption technologies or security protocols. However, these systems have little effect on cloud data security as the threats are highly varied (Udendhran, 2017).
Cloud data security has been a cause for concern for many years, and there have been several developments in this regard. Cloud service providers have created various measures to ensure the security of the data. Data protection systems are also deployed and maintained within the cloud and the organizational end by several technologies (Udendhran, 2017).For instance, companies have made it mandatory for IT staff to download and use encryption software before passing on crucial data to users.It is also essential to understand what role machine learning can play in incorporating cloud storage platforms. Since the data security threats are constantly evolving, many cloud service providers have incorporated AI-based systems like machine learning to help manage the security risks through threat analysis. These strategies have helped cloud service systems operate efficiently and mitigate data security threats to a level. This is further evidenced by several research papers on the topic (Udendhran, 2017).
However, many literary papers that have explored the concept have shown that the service providers are reacting to the threats rather than proactively creating security systems. While this has worked till now, the reactive data security systems might not keep data secure in the current business environment where most of the companies have started to use digital and cloud-based systems (Giri&Shakya, 2019). With the increase in customers, cloud service providers might find it challenging to efficiently manage their data privacy policies and security measures. Therefore, it is crucial to thoroughly analyze the current data security threats to create standardized systems that provide sustainable security results. It is also essential to use the analysis to predict future data security threats that might increase data protection and monitoring solutions (Giri&Shakya, 2019).
This research proposal will analyze the cloud data security threats to know what data security threats are growing the most and propose solutions for the service providers to help them address these threats and protect the data better. The proposal will also show how cloud service providers could develop the needed technologies to deal with the security issues that they might face in the future (Giri&Shakya, 2019). The proposal will also propose data security risk models that could help cloud service providers understand emerging threats in the cloud service sector. This will help them better protect against new data security threats and render faster resolutions to mitigate new data security threats. The dissertation will primarily collect literary papers on data security risks/threats and cloud-based systems (Giri&Shakya, 2019).
The research proposal will collect data from academic libraries to understand the cloud data security framework better. The proposal will use document analysis on the literary reviews to gain new insights into the cloud data security framework. The data collected through the document analysis will be further explored through thematic analysis. This thematic analysis will be focused on three main categories: the current data security threats, the current security framework & the future data security threats. Future threats are predicted using shreds of evidence present in the literary papers. In addition to exploring the current cloud data security frameworks, the thematic analysis will help predict new threats. The same can be used as a guideline for creating new data security systems. The researchers will also use textual analysis to help determine where new and emerging threats could come from and the best security strategy for dealing with these issues/risks (Akhil et al., 2017).
Therefore, the focus is to help improve the current data security systems present in the cloud service sector. This thematic analysis will also help researchers and professionals in cloud data security. To ensure that the research is up to date, this thematic analysis will look at the most recent literary works in the field of data protection (Akhil et al., 2017).It will then predict and analyze which elements of these works hold up the current cloud data security framework.This will include, for example, the current security frameworks and the current data protection solutions within that framework. The latter two features will help us understand how the current cloud data security framework is failing compared to the current threats.
Researcher’s Positionality
Cloud computing systems have become a significant part of the society we live in. Hence, it is essential to understand the benefits and challenges present in the same. While researching the topic of cloud computing and its related services, it was clear that data security has become a significant concern for most service providers (Akhil et al., 2017). Even with the development of various technologies and systems to combat security risks and issues, there are still concerns regarding cloud data security. This prompted the researcher to explore the topic in detail. The researcher was also fascinated by the fact that most organizations are moving to digital and cloud-based systems due to the pandemic. Therefore, the impact of a data security breach has become higher in the current society. Thus, the researcher felt that there needs to be an exploration of the future security risks and issues that could threaten cloud service providers (Akhil et al., 2017).
Purpose
The main goal of the proposal is to explore the efficiency of the current cloud data security systems and understand whether they will handle issues that could arise in the future. The proposal will also provide suggestions and alternatives to improve cloud data security (Kumar et al., 2018).
Research Question(s)
Cloud data security is not an isolated issue that will affect only select organizations. Since most organizations in society are moving towards a digital-only operation, any data security risk will affect a wide range of companies. This is detrimental for the whole society. Therefore, there needs to be extensive research on the data security systems of service providers rendering cloud computing services (Kumar et al., 2018). In this dissertation, the main focus is understanding the current cloud data security scenario and improving the same with the help of extensive research into the field. To ensure that the dissertation is focused, the same will be centered upon answering three essential research questions mentioned below.
R1: What are the current data security issues and risks that threaten an organization’s cloud services?
R2: What are the predicted future trends for the data security issues in organizations?
R3: How can current cloud data security be made more efficient to facilitate tighter data security in organizations?
Significance
As mentioned earlier, a data hack in cloud services would cause significant disruptions in the current society. Data needs to be secured efficiently to ensure that organizations can operate efficiently because of the rapid increase of digitization. Most companies are moving towards a cloud-based infrastructure. With the increasing data flow, security and privacy are of utmost importance. It is considered essential to ensure the security of data and users' privacy from any attack (Zhe et al., 2017).Therefore, it is crucial to create a data security system capable of handling both current and future data security issues. This dissertation aims to contribute significantly to the field by analyzing the data security issues to find emerging data hacking and security-related trends. The research into the domain is significant to improve the data security frameworks of cloud service providers and enhance them to efficiently mitigate future risks in the domain (Zhe et al., 2017).
Definitions
i. Machine Learning – Machine Learning is a type of Artificial Intelligence that uses systems to learn from data, identify patterns, and make decisions with limited human intervention (Zhe et al., 2017).
ii. Cloud Computing – Cloud computing is a computer system resource that uses on-demand data storage and computing power (Zhe et al., 2017).
Summary
Cloud computing systems have started to gain extensive recognition because of the various benefits it provides organizations from several sectors. Cloud services have become a critical tool for organizational growth and significantly
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.