Literature Review icloud SLP 3 - Business Finance
The case study attached is what we are using, however I did not get a grade as of yet for the last paper. Module 3 - SLPProduct InnovationDuring Module 3, you will proceed to implement your source-gathering strategy by collecting or at least examining and recording the key sources that you will be citing in your literature review. It is expected that you may need to modify your strategy in some ways, if you are having difficulty obtaining the kind of information you seek. During this module, you want to assemble the bulk of the material you put into your literature review. You will also begin to develop paragraphs for the review as you read and review your sources and fit them into the proposed structure of your review.As your SLP submission for this module, you are to prepare a short paper describing your success or lack thereof in obtaining materials that you need and your success or lack thereof in finding within the sources the support material you need for your draft (quotations, etc.) You need to include at least one sample paragraph from your literature review draft that you are assembling, in which you use sources for the purpose of reviewing literature. The aim of this part of the submission is to show that you can in fact construct a suitable literature review paragraph based around your sources.You should also include any additional information about the progress of your project overall, including difficulties that you might be facing, changes that might need to be made in your draft, and any help that you might need from your instructor as you move toward a complete draft of the literature review.SLP Assignment ExpectationsLength: The written component of this assignment should be 3-4 pages long (double-spaced) without counting the cover page and reference page.Organization: Subheadings should be used to organize your paper according to the questions.Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standard guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity. We encourage you to use tools such as grammarly.com and proofread your paper before submission.As you complete your assignment, make sure you do the following: Answer the assignment questions directly. Stay focused on the precise assignment questions. Do not go off on tangents or devote a lot of space to summarizing general background materials. Use evidence from your readings to justify your conclusions. Cite at least five credible resources. Reference your sources of information with both a bibliography and in-text citations. See the Student Guide to Writing a High-Quality Academic Paper, including pages 11-14 on in-text citations. Another resource is the “Writing Style Guide,” which is found under “My Resources” in the TLC Portal. Your assignment will be graded using the following criteria: Assignment-driven Criteria: Student demonstrates mastery covering all key elements of the assignment. Critical Thinking/Application to Professional Practice: Student demonstrates mastery conceptualizing the problem, and analyzing information. Conclusions are logically presented and applied to professional practice in an exceptional manner. Business Writing and Quality of References: Student demonstrates mastery and proficiency in written communication and use of appropriate and relevant literature at the doctoral level. Citing Sources: Student demonstrates mastery applying APA formatting standards to both in text citations and the reference list. Professionalism and Timeliness: Assignments are submitted on time. a_case_study_exploration_of_st.pdf Unformatted Attachment Preview A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches Submitted by Michael Osei-Amanfi A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctorate of Business Administration Grand Canyon University Phoenix, Arizona December 11, 2018      ProQuest Number: 13423232    All rights reserved   INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion.        ProQuest 13423232 Published by ProQuest LLC (2018 ). Copyright of the Dissertation is held by the Author.  All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC.   ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 © by Michael Osei-Amanfi, 2018 All rights reserved. GRAND CANYON UNIVERSITY A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches I verify that my dissertation represents original research, is not falsified or plagiarized, and that I accurately reported, cited, and referenced all sources within this manuscript in strict compliance with APA and Grand Canyon University (GCU) guidelines. I also verify my dissertation complies with the approval(s) granted for this research investigation by GCU Institutional Review Board (IRB). _____________________________________________ Michael Osei-Amanfi November 5, 2018 ______________________ Date Abstract The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues. Keywords: cloud computing, data breaches, effective strategies, IT leaders vi Dedication I dedicate this Dissertation to all my children, upon whom I wish to impress upon the following: Grow up, then get a doctorate! vii Acknowledgments A heartfelt thank you to my Dissertation Committee, Alen Badal, Ph.D., Heather Miller, Ph.D., and Zeeshan (Shawn) Khan, DBA, for providing the assistance I needed to complete this once in a lifetime project. You mentored, coached, and guided me every step of the way, I am exceedingly grateful to every one of you. I also want to thank Stephanie Zywicki, Ph.D., my first Academic Quality Reviewer, and Luis Zayas, Ph.D., my second Academic Quality Reviewer, for their extensive feedback and guidance. A special thank you to the individuals who willingly participated in this study and the senior management of ABC; I cannot identify you or your company, but you know yourselves! This project could not have been possible without your participation – thank you so much! A big shout-out to my fellow doctoral learner and friend, Patsy Wilson! I remain truly inspired by the beauty of your character. Kellie Rice, you were my support team all by yourself, thank you! Vanessa Gattis, Ph.D., Antoinette James, Ed.D., Isaac Nortey Darko, Ph.D., and Rae Elvis Daniel, Ed.D., thank you for going out of your way to provide guidance, feedback, and inspiration. Former professors, Milan Frankl, Ph.D., and Michele Vincenti, Ph.D., of the University Canada West, thank you for encouraging me to pursue higher education. Finally, a much deserved thank you to Patrick H. Parker of Dublin, Ohio, the man who truly inspired my journey. He said to me “you explain things like someone with a doctorate!” And he said it with such complete belief, I had to prove him right! viii Table of Contents List of Tables ................................................................................................................... xiii List of Figures .................................................................................................................. xiv Chapter 1: Introduction to the Study....................................................................................1 Introduction ....................................................................................................................1 Background of the Study ...............................................................................................2 Problem Statement .........................................................................................................4 Purpose of the Study ......................................................................................................5 Research Questions ........................................................................................................6 Advancing Scientific Knowledge and Significance of the Study ..................................8 Rationale for Methodology ..........................................................................................10 Nature of the Research Design for the Study...............................................................11 Definition of Terms......................................................................................................14 Assumptions, Limitations, Delimitations ....................................................................16 Assumptions........................................................................................................16 Limitations and delimitations. ............................................................................17 Summary and Organization of the Remainder of the Study ........................................20 Chapter 2: Literature Review .............................................................................................25 Introduction to the Chapter and Background to the Problem ......................................25 Historical background. ........................................................................................27 Identification of the Gap ..............................................................................................31 Conceptual Framework ................................................................................................33 Review of the Literature ..............................................................................................37 IT outsourcing. ....................................................................................................37 ix Cloud computing technology. .............................................................................42 Threats to data security in the cloud. ..................................................................56 Methodology and instrumentation. .....................................................................65 Summary ......................................................................................................................68 Chapter 3: Methodology ....................................................................................................73 Introduction ..................................................................................................................73 Statement of the Problem .............................................................................................74 Research Questions ......................................................................................................75 Research Methodology ................................................................................................78 Research Design...........................................................................................................81 Population and Sample Selection.................................................................................86 Sources of Data ............................................................................................................89 Trustworthiness ............................................................................................................95 Credibility. ..........................................................................................................95 Transferability. ....................................................................................................96 Dependability. .....................................................................................................97 Confirmability. ....................................................................................................97 Data Collection and Management ................................................................................99 Permissions and informed consent. ....................................................................99 Subject selection. ..............................................................................................100 Data collection. .................................................................................................100 Data protection. .................................................................................................104 Ethical consideration.........................................................................................105 Data Analysis Procedures ..........................................................................................107 x Data saturation. .................................................................................................110 Ethical Considerations ...............................................................................................111 Limitations and Delimitations....................................................................................113 Summary ....................................................................................................................116 Chapter 4: Data Analysis and Results ..............................................................................120 Introduction ................................................................................................................120 Descriptive Findings ..................................................................................................122 Setting. ..............................................................................................................123 Participant profiles. ...........................................................................................124 Data sources. .....................................................................................................125 Data Analysis Procedures ..........................................................................................133 Preparing the data. ............................................................................................133 Analyzing the data. ...........................................................................................134 Data triangulation. ............................................................................................145 Trustworthiness. ................................................................................................147 Possible sources of errors. ................................................................................150 Results ........................................................................................................................151 Research question 1. .........................................................................................153 Research question 2. .........................................................................................163 Research question 3. .........................................................................................175 Summary ....................................................................................................................184 Chapter 5: Summary, Conclusions, and Recommendations ............................................188 Introduction ................................................................................................................188 Summary of the Study ...............................................................................................191 xi Summary of Findings and Conclusion.......................................................................195 Research question 1. .........................................................................................196 Research question 2. .........................................................................................200 Research question 3. .........................................................................................205 Summary. ..........................................................................................................210 Implications................................................................................................................214 Theoretical implications. ..................................................................................214 Practical implications. .......................................................................................217 Future implications. ..........................................................................................219 Strengths and weaknesses of the study. ............................................................220 Recommendations ......................................................................................................223 Recommendations for future research. .............................................................223 Recommendations for future practice. ..............................................................224 References........................................................................................................................227 Appendix A. Site Authorization Letter(s) ........................................................................274 Appendix B. IRB Approval Letter ...................................................................................275 Appendix C. Informed Consent .......................................................................................276 Appendix D. Copy of Instruments and Permissions Letters to Use the Instruments .......280 Appendix E. Face-to-Face Interview Protocol.................................................................285 Appendix F. E-mail Interview Protocol ...........................................................................288 Appendix G. Participant Recruitment E-mail Letter .......................................................291 Appendix H. Expert Panel Review ..................................................................................293 Appendix I. List of Codes ................................................................................................295 Appendix J. Categories and Related Codes .....................................................................301 Appendix K. Emerged Themes ........................................................................................305 xii Appendix L. Matrix Display of Themes ..........................................................................309 Appendix M. Sample Interview Transcripts ....................................................................315 xiii List of Tables Table 1. Research Questions With Related Interview and Asynchronous Discussion Questions ........................................................................................................... 93 Table 2. Research Questions With Related Data Sources ............................................. 108 Table 3. Job Profile and Gender of Participants ............................................................ 125 Table 4. Face-to-Face Interviews of Study Participants ................................................ 127 Table 5. Documents Reviewed ...................................................................................... 132 Table 6. Step 3: Themes With Related High-level Categories ...................................... 144 Table 7. Step 4: Research Questions With Related Themes .......................................... 145 Table 8. Research Questions With Related Themes and High-Level Categories.......... 153 Table 9. Participants’ Comments on Managing the Network Environment .................. 162 Table 10. Participants’ Comments on Types of Data Security Threats ......................... 169 Table 11. Participants’ Comments on Addressing Password Issues.............................. 182 Table I12. Step 1: List of Codes .................................................................................... 295 Table J13. Step 2: Categories With Related Codes ....................................................... 301 Table K14. Generating Themes Through Analytic Memoing ....................................... 305 Table L15. Relating Themes to the Research Questions ............................................... 309 xiv List of Figures Figure 1: An illustration of the three critical areas of cloud computing security. ............ 36 Figure 2: A simplified illustration of Saldañas thematic analysis approach for recognizing themes in qualitative data (adapted from Saldaña, 2015, Figure 1.1). ...................................................................................................... 136 Figure 3: An illustration of the four-step process followed in the thematic analysis of the data used in the study. ........................................................................... 140 1 Chapter 1: Introduction to the Study Introduction Cloud computing is a term for doing business over the Internet with on-demand and shared access to computing resources on a pay-per-use basis (Oredo & Njihia, 2015). This profound shift in the way companies consume computing resources allows for the allocation of information technology (IT) resources and capacity based on actual needs (Yeboah-Boateng & Essandoh, 2014). Gupta, Seetharaman, and Raj (2013) argued that the cloud offers small and medium enterprises (SMEs) high-performance computing and that the current pay-as-you-go pricing model is particularly beneficial for such companies. Cloud computing holds considerable promise for SMEs through the expectation of radically reduced IT costs (Carcary, Doherty, & Conway, 2014). However, uncertainty around data security complicates firms’ adoption of cloud computing (Nicho & Hendy, 2013). Business executives and IT leaders continue to struggle with the decision to adopt cloud computing, and thus outsource sensitive corporate data and IT resources to third-party cloud vendors (Dutta, Peng, & Choudhary, 2013). Nicho and Hendy stated that data breaches in the cloud environment po ... Purchase answer to see full attachment
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident