StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Integrating Software Applications in Cloud-Enabled Enterprises - Research Proposal Example

Cite this document
Summary
The paper "Integrating Software Applications in Cloud-Enabled Enterprises" states that a pilot study will be conducted on one of the identified organizations and with three consultants to ascertain the validity and reliability of data collection instruments and potential challenges to the study…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Integrating Software Applications in Cloud-Enabled Enterprises
Read Text Preview

Extract of sample "Integrating Software Applications in Cloud-Enabled Enterprises"

?Integrating software applications in cloud-enabled enterprises: Research methodology Application of BYOD in organizations offers advantages and disadvantages for an organization and this requires a critical approach to determining net benefits of implementing the strategy. Further measures also need to be taken upon implementation of BYOD in an organization in order to minimize the strategy’s adverse effects and to maximize on its potentials. This paper seeks to explore the following objectives. 1. To develop an integrated computing system that can co-exist with an Enterprise network. 2. To implement software applications that enabled BYOD in the Enterprise domain. 3. To implement security protocols for BYOD devices that meet the needs of Enterprise frame working This chapter develops a research methodology for pursuing the objectives. The chapter includes research methods section that identifies the proposed methods for implementing the study, research design, and role of the researchers, the study’s facilitators, research participants, and instrumentation for the study. The section also discusses validity and reliability of the selected data collection instruments, data collection procedure, proposed data analysis approach and pilot study for the research. Research method The descriptive study proposes a mixed research approach for investigating its objectives. The method will be explored through field study. It integrates qualitative and quantitative techniques and has the advantages of minimizing weaknesses of each of the techniques and optimizing the techniques’ strengths. Its advantages and its correspondence to the scope of the research justify its source. Data that is collected in quantitative techniques reflect on the actual value in an occurrence and not a researcher’s perception. The quantitative method also offers better ground for comparison and correlation of factors and is therefore accurate in ranking independent variables based on their significance on a study’s dependent variables while the qualitative scope offers a basis for in-depth understanding. The scope of the study that seeks to develop information for creating an integrated system that suits an organization’s network, implement software applications that support BYOD applications in an organization, and implementing security protocols identifies the need for quantitative and qualitative data. Such data will inform needs in organizations’ computing systems and consequences of such needs towards development of optimal integrated systems with suitable software applications and desirable security measures. Research design Experimental design is proposed for the study’s quantitative approach. Blocked design will be used. It involves observation of data from partitioned sample space and suits the scope of the study that seeks data on features of integrated computing systems that can co-exist with an enterprise’s network, information on software applications are compatible with BYOD in an organization’s network, and security protocols that are suitable for BYOD in an enterprise’s network. Qualitative data will be collected based on participants’ experiences. The research design is predetermined and is therefore fixed. Role of the group members The group members will assume active roles in the research process. The group’s roles began with identification of the research’s title and scope, investigations into the study’s background information, and development of the research problem and research objectives. The groupalso assume the role of developing and implementing the research methodology. After data collection, the group will analyze the data and document research findings and recommendations to stakeholders to the study. Facilitators The group will also be facilitators of the study, will facilitate data collection processes, and technical aspects of data analysis and documentation of the study’s findings. Participants The study will involve three categories of participants, employees of organizations that have established internal information technology systems, employees in the organizations’ information technology systems’ departments, and information technology systems’ consultants. Participants’ experience in the three respective positions for a two and a half months will form the inclusion criteria while previous participation in a study with similar variables within the past six months will form the study’s exclusion criterion. Data from general employees and employees in information technology departments will be collected using online questionnaires while the consultants will participate in an online focus group discussion. Instrumentation The study will use online questionnaires as the data collection instrument. The group, based on samples of questionnaires that have been used to investigate similar variables, will develop three questionnaire forms that shall be reproduced and administered to participants from each of the three categories of participants. The data collection instrument has been selected because of its advantages that include low cost of development and implementation, time efficiency, and convenience in data collection processes. One questionnaire form can for example be administered to a target group. Delivery of the instrument, over the internet, is also instant and cheap besides convenience in times at which the instruments can be sent to the participants. The current state of technology has also undermined disadvantages that were previously associated with online questionnaires (Hunter 2012). An online focus group will also aid data collection. The data collection strategy will include an online discussion in which a groups of professionals are asked their experience and opinion on the research interests. The approach has been proposed because of its advantages that include affordability, relative to face to face focus group discussion, convenience that facilitate accessibility of participants who would otherwise be inaccessible, and can accommodate more participants that ordinary interviews or focus group discussion. It is however limited to internet access but this is not a contemporary problem (Bryman and Bell 2007). Validity and reliability of the instruments Online questionnaires and online focus groups have significant levels of validity and reliability. They capture data with a high level of accuracy and consistency. In a study by Bouwmans et. at., though the researchers focused on a different field, the researchers established that questionnaires meet validity and reliability thresholds for empirical studies. Establishing validity and reliability of the instrument is fundamental to the study’s quantitative approach (Bryman and Bell 2007). Data collection procedure The group will seek approval from the institution’s review board before identifying organizations that will be used for the study. The organization’s managements will then be consulted for consent before recruitment of research participants. Direct contacts will be made with recruits, scope of the study explained to them, and their informed consent sought. Consultants will also be recruited, contacted, and their consent sought. A sample will then be drawn based on the inclusion and exclusion criteria. The group’s rationale will further determine the sample size. Online questionnaires will then be sent to the participants and a two weeks period allowed for completing the questionnaire and sending them back to the researchers. A convenient time will be organized for the consultants focus group discussion. Data analysis procedure Collected data will be analyzed using Statistical Package for Social Science (SPSS) software. Frequency tables and descriptive statistics will be generated to determine significant factors to adaptive integrated computing systems, implementation of software applications, and implementation of security protocols. Pilot study Pilot study will be conducted on one of the identified organizations and with three consultants to ascertain validity and reliability of data collection instruments and potential challenges to the study. Measurement of progress Completion and documentation of research findings will identify the study’s success. Implementing the research findings to develop and maintain a secure BYOD system that integrate necessary software will indicate success of the study. Appendix: Sample Sampling A multi-stage stratified random sampling approach will be implemented. Three organizations will be selected at random and 20 employees and 10 experts from information technology departments sampled from each organization. Consultants will form another stratum from which 15 participants will be selected. This will yield 45 participants. Sample questionnaire questions Which private devices are you likely to use while in your organization? Which of the devices are compatible with your organization’s enterprise network? Which of the devices do you feel should be integrated into the enterprise network to improve your output? Do employees’ devices require software for integration into the organization’s enterprise network? Which software is suitable for integrating employees’ devices into the organization’s enterprise network? What is the cost of the software? What are the advantages and disadvantages of the software? What security protocols are necessary for ensuring that BYOD devices meet needs of enterprise networking? Sample focus group questions Which BYOD devices should organizations allow into their enterprise systems? What is the necessary software for integrating the devices? What are the potential threats of the devices and the software to the organizations’ enterprise systems? references Bouwmans, C et. at. 2013, ‘Feasibility, reliability, and validity of a questionnaire on healthcare consumption and productivity loss in patients with a psychiatric disorder (TiC-p),’ BMC Health Services Research, Vol. 13, No. 1, pp. 1-9. Bryman, A and Bell, E 2007, Business research, Oxford University Press, New York. Hunter, L 2012, ‘Challenging the reported disadvantages of e-questionnaires and addressing methodological issues of online data collection,’ Nurse Research, Vol. 20, No. 1, pp. 11-20. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Integrating software applications in cloud-Enabled Enterprises Research Proposal”, n.d.)
Integrating software applications in cloud-Enabled Enterprises Research Proposal. Retrieved from https://studentshare.org/information-technology/1488960-integrating-software-applications-in-cloud-enabled
(Integrating Software Applications in Cloud-Enabled Enterprises Research Proposal)
Integrating Software Applications in Cloud-Enabled Enterprises Research Proposal. https://studentshare.org/information-technology/1488960-integrating-software-applications-in-cloud-enabled.
“Integrating Software Applications in Cloud-Enabled Enterprises Research Proposal”, n.d. https://studentshare.org/information-technology/1488960-integrating-software-applications-in-cloud-enabled.
  • Cited: 0 times

CHECK THESE SAMPLES OF Integrating Software Applications in Cloud-Enabled Enterprises

Improving Third Party Service Integration The Cloud, SAAS, BPO

SaaS is both an application delivery and a business model thus giving cloud service consumers the ability to access and use various applications on a pay-as-you-use basis without having to install it and run it on their own hardware.... SaaS applications are accessed over the internet through a thin client or via a web browser.... The paper tells that software-as-a-Service is both an application delivery model and a business model.... This renders the need for installation and running of the software on the client's machine or infrastructure redundant....
9 Pages (2250 words) Essay

The Ontology-based Software Co-Evolution of Cloud and Mobile Computing

This review ''The Ontology-based Software Co-Evolution of Cloud and Mobile Computing'' discusses that in order to develop enterprise level mobile cloud applications, cloud computing has to be made highly adaptable and presents a detailed cloud computing taxonomy which can be utilised in an ontological approach.... In order to support such a mobile workforce at the business model sub-taxonomical cohort of cloud computing techniques (please see Figure - 1), organisations are looking forward to mobile cloud applications....
6 Pages (1500 words) Literature review

Software Agent Technologies Integration With Web Services

There is also earlier literature that details the use of software agents and web services in the formation of virtual enterprises.... Literature exists that deals with the use of intelligent software agents to interface with web services in critical booking contexts, such as in the case of tourism applications involving the booking of tickets online (Sujatha 2010).... This literature review "software Agent Technologies Integration With Web Services" examines the literature on web services, software agent technologies, and their integration, focusing on new areas of research relating to their integration, and areas of further study....
7 Pages (1750 words) Literature review

Private Cloud Computing Service

Economically, private cloud-enabled solutions will reduce both operational costs and capital requirements.... Building a private cloud delivers the benefits of public clouds without experiencing the risks of hosting sensitive data and applications outside the firewall.... Capacity Management MegaCorp will have a centralized cloud infrastructure team responsible for managing the capacity of the entire cloud, checking a buffer of idle capacity that can be directed to individual applications as required....
8 Pages (2000 words) Coursework

Cloud computing the Choice of Platform for a Pilot Study

This essay "Cloud computing – the Choice of Platform for a Pilot Study" presents the recent trends in IT and the fast-growing internet facilities that have attracted business enterprises towards innovations.... It could be described as the platform for the future generation that provides availability of a large number of virtual resources, dynamic allocation of these available resources, data storage facilities, servers hosting web applications.... ( 2008 ) states that around 69% of internet users in America use online data storage facilities, services of webmail, and applications related to word processing whose functionality is under the control of web service providers....
9 Pages (2250 words) Essay

SalesForce,com and Force,com as Hits in Market Place

om are well known as applications in cloud computing and CRM usage.... Enterprise application software provides business-oriented tools for business enterprises such as online shopping and payments.... Enterprise application software provides business-oriented tools for business enterprises such as online shopping and payments.... Enterprise application software provides business-oriented tools for business enterprises such as online shopping and payments....
6 Pages (1500 words) Case Study

Cloud Storage Deployment

The advancement of technology has resulted in voluminous data in business enterprises, requiring the establishment of data centers to handle it.... Realtech provides SaaS cloud solutions to business enterprises allowing for a variety of workflow, data analytics, and third-party using the on-demand service payment policy scheme.... Business enterprises can focus on other core activities and delegate application management and deployment to Realtech....
7 Pages (1750 words) Report

Cloud Attribute Correlations in Driving Business Efficiency

The paper 'Cloud Attribute Correlations in Driving Business Efficiency' is a perfect example of a business case study.... Cloud services allow organizations to scale their investments with the view of achieving growth, competitiveness, and meeting customer needs.... At least five key cloud attributes are used interchangeably to innovate, optimize and disrupt their operations....
24 Pages (6000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us