Wednesday, May 6, 2020

Methodology For Sport And Exercise Science -Myassignmenthelp.Com

Questions: What Is The Meaning And Concept Of Cloud Computing In The Business Process? What Are The Advantages Of Cloud Computing In The Business? What Are The Disadvantages Of Cloud Computing In The Business Process? Answers: Introduction The application of cloud computing in the business process has increased as compared to the last years. There are different kinds of activities that are included in the cloud computing like storing data, managing, and evaluating them as it could be effective to get the feasible outcome. A large number of organizations are using cloud computing in transferring the data through storage to end consumers. The digitalization is increased as it could enhance the use of internet. At the same time, it can also be said that through internet, organization will be capable to use the cloud computing in their business (Hugos Hulitzky, 2010). In addition, this report discusses the summary of literature that is based on the advantages and disadvantages of cloud computing. It also depicts the research methodology that helps to determine many methods of data collection and data analysis as it could be imperative to get the feasible outcome. Project objective The main aim of this research is to understand the advantages and disadvantages of cloud computing technology in the business process. To analyze the meaning and concept of cloud computing in the business process To discover the advantages of cloud computing in the business To evaluate the disadvantages of cloud computing in the business process Project Scope The outsourcing plays an imperative role in the business process as it would support to gain the productivity of the company. This report will discuss the rewards and disadvantages of cloud computing in the business. In the current scenario, organization is needed to develop their understanding about outsourcing to enhance their profitability in less time and cost (Schaaf, 2012). Literature review Buyya, Yeo, Venugopal, Broberg Brandic (2009) explained that a large number of companies have provided cloud computing services to their consumers such as Microsoft Azure, Amazon Web Services, Google Cloud Platform, and IBM Cloud. These are known as Cloud Service Providers. Moreover, it is also analyzed that the cloud computing in the business process permits the organizations to save their time and cost regarding the maintenance of data. The cloud computing technique decline the house storage expenses as it declines the expenses regarding managing the data. In contrast to this, Parker, Evans, Haller Le Mire (2008) stated that the service legal agreement is signed by the firm as it is supportive for the timely services and supervision of IT infrastructure. In addition, it is also analyzed that the cloud computing is supportive for the organization because it supports to improve the whole process of business. In addition, it is also analyzed that cloud computing is effective for the small and medium sized enterprises because it facilitate them to store their data on the online cloud. Consequently, it also protects the organization from much natural disaster. In support to this Rimal, Jukan, Katsaros, Goeleven (2011), illustrated that the organization is capable to recover their data in less time and cost. The cloud computing service provides the capability to recover the data where an organization is not required any heavy investment. It is also found that the cloud computing create the issue at the time of cyber attract and data breaches. The modern cloud computing technique offers high quality standard to secure the data of firm. Consequently, it could be effective for attain the specified goal of organization. As per the view of Subashini Kavitha (2011), there are many organizations that offer the cloud computing services to the potential consumers like Amazon Web Services, Google Cloud Platform, IBM Cloud, and Microsoft Azure. The cloud computing could facilitate the organization to get many services like save time and cost, maintaining computer infrastructure, and maintaining the whole process of business. As a result, company can be capable to improve their efficiency in less time. It is also addressed that Amazon Web Services offer cloud computing services at the world level as it could be imperative for individuals, government, and companies. It is also addressed that the international public cloud spending will reach up to $129 billion by the end of 2018. Research Design and Methodology The research design is effective to obtain appropriate instruction in context of collecting the beliefs and examine the collected data (Flick, 2015). There are many research design tools as it could be effective in collecting the suitable data regarding research issue. Qualitative research The researcher will use the general research question to collect the suitable data through qualitative research design. The investigator will select appropriate research subject by evaluating the different sites of current research matter. Afterward, the research scholar will develop conceptual knowledge of research concern to measure the findings and accomplish the research aim (Daniel Sam, 2011). The procedure is applied to develop the theories about the advantages and disadvantages of cloud computing in business process. Approaches to Reliability and Validity The research scholar will practice the inductive approach because research is subjective in nature. This research method permits the researcher to develop the theoretical framework regarding the research concern. It will also help research scholar to gain the soundness and reliability of research outcome. Sampling and Sample Size Sampling is a best way to select the research candidates from the specified participants. The researcher will practice the non-probability sampling method for conducting the research since research problem is qualitative in nature. But, it is also analyzed that non-probability sampling method takes more time and cost as compared to the probability sampling method. Since, this method considers the open-ended questionnaire (Ketchen, Bergh, 2005). For conducting the survey through questionnaire, a researcher will select 40 employees of Woolworths limited to conduct the research and meet the objectives of research matter. Data Collection Method Primary data collection method tool will be practiced by research scholar to conduct the research and obtain feasible outcome. The data will be collected by using survey through questionnaire. Hence, it is also analyzed that the primary data collection method supports to get the factual data about research concern (Haag, 2010). It will also assist to collect the factual information about current research matter. Variables Specifications The investigator will practice two kinds of variables such as independent and dependent variables. The independent variable is cloud computing and depend variable is business performance of Woolworths limited. Quantitative research From the above chart, it is analysed that the researcher will develop a hypothesis and conceptual data on the initial stage. The researcher will collect the data in context of cloud computing in the business. Through this method, research scholar will select suitable methods and research concern. As a result, the researcher will obtain the data to attain the research aim and objectives. Research Instrument An investigator will use the secondary data collection method to carry out the research study. It will be collected be many sources such as books, government publications, academic journal, and magazines. This method is used by the research scholar to support the primary data, which will also be effective to improve the reliability of research. The above table depicted that the research scholar will discover the information at the initial phase. As a result, the research scholar will select suitable information from the whole sample size. This method enables the researcher to gain their knowledge about mean, frequency, and recoding of the collected data (Haag, 2010). The research scholar will used the Ms-excel software to examine the collected through graphs, tables, and charts. This method supports the researcher to evaluate the data and obtain the feasible result. Sampling and Sample Size The research scholar will select the probability sampling method for selecting the research participants and get feasible outcome. This method can also be imperative for collecting the beliefs and views to conduct the research and get feasible outcome. Consequently, it could also be supportive to eliminate the biases from the research. The research scholar will select the 40 employees for conducting the survey through questionnaire (Haag, 2010). Moreover, it could also be imperative for the research scholar to get the reliable outcome in less time an d cost. Reliability and Validity of Data Validity shows the degree of research outcome as it could be evaluated by quantitative figures and facts. For illustration, the research scholar can also be practice the survey through questionnaire to evalaute the cahllenges and advatages of cloud computing. In addtion, it is also analyzed that the another aqpproch is relaibility as it could be efefctive to identify the research trustworthiness. The qualitative facts and figures are evaluated by literature review to improve the validity and reliability of the research scholar. Research Limitations There are many factors that could be confronted by the research scholar at the time of conducting the research such as time, resources, and cost. In addition, it is also analyzed that the sample size could influence the research outcome. The research scholar could be accountability for making the privacy of research candidates (Daniel Sam, 2011). The lacking of time could also mandate the research scholar to complete their task in specified time and get reliable result. Time Schedule (Research plan) Research activities Research time 1 2 3 4 5 6 7 8 9 10 Selection of research problem Develop research aim and objectives Data collection method Research questionnaire design Sampling technique method Data analysis method Report writing, proof writing Final submission Conclusion From the above analysis, it can also be summarized that the cloud computing play an imperative role in securing the data of firm. It is also stated that there is positive relationship between the cloud computing and business performance because the cloud computing facilitate the company to transfer their data from storage to end of the consumers. As a result, company could be capable to gain their efficiency in less time and cost. Moreover, it is also found that the research methodology plays an imperative role to select appropriate technique for attaining the specified goal and objectives of research. These research methods are research approach, research strategy, research philosophy, data collection method, and data analysis method. References Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility.Future Generation computer systems,25(6), 599-616. Daniel, P.S., Sam, A.G. (2011). Research Methodology. Gyan Publishing House. Flick, U. (2015). Introducing Research Methodology: A Beginner's Guide to Doing a Research Project. SAGE. Haag, H. (2010). Research Methodology for Sport and Exercise Science. Logos Verlag Berlin GmbH. Hugos, M.H., Hulitzky, D. (2010). Business in the Cloud: What Every Business Needs to Know About Cloud Computing. John Wiley Sons. Ketchen, D.J., Bergh, D.D. (2005). Research Methodology in Strategy and Management. Emerald Group Publishing. Parker, C., Evans, A., Haller, L., Le Mire, S. (2008). The ethical infrastructure of legal practice in larger law firms: values, policy and behaviour.UNSWLJ,31, 158. Rimal, B. P., Jukan, A., Katsaros, D., Goeleven, Y. (2011). Architectural requirements for cloud computing systems: an enterprise cloud approach.Journal of Grid Computing,9(1), 3-26. Schaaf, A. (2012). IT-Outsourcing mit Cloud Computing. GRIN Verlag. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.