The term cloud computing effectively defines and explains the overall practice of using specific networks of specific remote servers that are hosted over the internet to serve the purpose of storing, managing or processing data and information, rather than using local servers and personal computers. In recent times with the advent of technology, the use and implementation of cloud computing have emerged to be among the key technical aspects for business organizations for storing and accessing valid data and information (Hofmann, 2010). With the use and implementation of cloud computing, it is much easier for organizations to manage their records, and other valuable information and data into a single database that can be effectively accessed from anywhere provided there is an internet connection. The use of cloud computing can be significantly used as a specific virtual domain, that can be utilized for attaining a specific collaborative data storing infrastructure that uses different servers in addition to unhindered access to shared computer networks. The use of cloud computing not only makes the storing and managing of company data and information more manageable but at the same time helps in reduction in the operating costs or expenses of the respective organization. However, there is also a number of limitations facing the use of cloud computing technology. The overall system is prone to cyber security issues that can lead to loss or damage or data in addition to technical failure of the system in general. The following report will focus upon conducting a detailed analysis and assessment of the key advantages as well as disadvantages and limitations of the use OF cloud computing with reference to the organization of Wesfarmers, Australia.
The undertaken research aims to make a comprehensive interpretation of the key disadvantages and advantages associated with the use of cloud computing with reference to the company of Wesfarmers, Australia.
The objectives of the research have been discussed as below;
In the modern-day age, cloud computing has emerged to be one of the key major technological platforms that have eased the management and storing of data for business organizations. Although the use of cloud computing has been widely popular across the globe, a number of organizations are significantly unaware of their implementation and use for strengthening the business processes and operations (Subashini, 2011). The research will analyze in-depth the overall use and implications of cloud computing in modern-day business organizations. In addition, the research results and outcomes will also explain in detail the advantages and disadvantages associated with the use of cloud computing such as in Wesfarmers, Australia. This will offer the necessary information to the business organizations in the context of correct use and utilization as well as management of the cloud computing systems.
Considering the competitiveness in the business environment across the globe, the use and implementation of cloud computing can offer business organizations a virtual interface and analytical framework for easy managing or store of valuable information and data. In addition, the use of cloud computing technology can also help organizations in respect to access seamless exchange of resources and information as needed through having proper access to the internet. This also reduces the overall operational costs and expenses resulting in greater or improved organizational productivity. There are a number of advantages as well as disadvantages associated with the use of cloud computing that has been discussed in detail in the following section of the literature review;
As per the works of, Baciu, (2015), the key major advantages associated with the use of cloud computing technology have been showcased in detail as below;
(Aljabre, 2012). This offers the users specific simple and manageable web-based user interfaces that can be used effectively for the purpose of accessing services, applications and software, which does not need any installation, just access to the web and valid authorization to use the interface.
On the other hand, as suggested by, Velte, (2010), the overall disadvantages associated with the use and implementation of cloud computing technology has been described in detail as below;
Primary Research Question
The primary question that will be addressed in the research has been identified below;
Secondary Research Questions
The secondary research questions can be explained as below;
The selected research on the analysis of the key disadvantages and advantages associated with the use of cloud computing will implement both qualitative as well as quantitative research strategies. The use of these strategies can be briefly described as below;
In regards to qualitative strategy, the use of qualitative techniques will be incorporated to evaluate and interpret the data and information collected from the secondary data sources. In this context, the overall information and data attained from the journals, articles and past research will be qualitatively analyzed and the results will be discussed and showcased in the form of journal and article analysis and discussions (Flick, 2015).
In regards to quantitative research, the incorporation of mathematical or statistical techniques will be done to analyze the information gathered from the primary sources. The information will be gathered through surveys among sampled respondent groups. This information will be mathematically analyzed and accurate outcomes will be achieved. To serve the purpose Microsoft Excel would be used. The research results will be effectively represented in graphical formats.
Data collection refers to the gathering of the research specific information or data that are collected from different sources. In the research on the identification of key disadvantages and advantages associated with the use of cloud computing, both secondary and primary data collection methods will be applied. This is justified for enabling the attainment of precise and accurate information and data from relevant and appropriate data sources. The application of the data collection processes have been described as below;
With respect to primary data gathering, the focus is expected to be on conducting a wide research survey between the sampled respondent groups. The overall sample size of the respondent group will be 50 and they will be employees and staff of Wesfarmers, Australia. The survey will be commenced through a specific questionnaire that will consist of sets of close-ended questions. Thus the generation of the questionnaire will be the major aspect of the data collection survey (Panneerselvam, 2014). A specific Likert scale will be used to evaluate and measure the overall feedback achieved from the completion of the survey and convert the feedback to numerical information. This information will then be interpreted by mathematical and statistical analysis and key research outcomes will be generated.
In regards to the collection of secondary data, interpretations will be made from different valid and authentic secondary data sources. Such data sources will include articles, journals or past research conducted in a similar research area or field. Prior to the collection of the information and the data, the overall authenticity of the data sources needs to be properly checked and monitored. The information and data thereby gathered will be analyzed qualitatively so that valid research outcomes can be obtained.
In respect to the sampling of the respondents’ for the research survey, the chosen research on the analysis of the key disadvantages and advantages associated with the use of cloud computing will implement a specific simple random sampling procedure. This sampling will help the researcher in the selection of a correct and accurate sample of respondents from a larger population or sample size for the commencement of the research survey. The use of this sampling procedure has a certain number of advantages or benefits. This sampling can be used for facilitating the selection of specifically random samples of participants and respondents which can improve the accuracy and precision of the research information and data the analysis of which will yield valid outcomes and results. In addition by using this sampling procedure, the researcher can also offer the individuals within the respective population equal chances to get selected for the survey. By using the technique of random sampling, the focus will be upon a sampling of near about 50 participants or respondents for the initiation and commencement of the research survey.
The overall research procedure will be made highly valid and reliable by the implementation of the necessary steps or approaches. In this context, the implementation of the research procedures and the steps will be repeatedly checked so as to minimize any errors in implementation. During primary data collection, the questionnaire developed for the survey will be tested or validated through a pilot study (Williams, 2011). In addition, the overall authenticity of the secondary data sources will also be validated before the collection of data and information so that higher accuracy can be obtained in the context of the research outcomes and the results. Both the qualitative as well as quantitative analysis will be done with higher precision and care so that appropriate and desired research results are obtained.
Research can have certain sets of limitations. The limitations faced in the selected research have been described as below;
The overall research timeline is explained as below;
|Schedule of Research Activities Implementation|
|Overall Duration of Research Activities|
|Undertaken Activities||1st Week||2ndWeek||3rd Week||4th Week||5th Week||6th Week||7th Week||8th Week|
|Reviewing of the Literature|
|Recommendation and Conclusion|
Fig: Research Timeline (source: self)
The research outcomes are expected to highlight and analyze the use of cloud computing in an organization. The results will analyze in detail the overall benefits as well as the limitations that are seen to be associated with the use of cloud computing within an organization.
Algebra, A., 2012. Cloud computing for increased business value. International Journal of Business and social Agrawal, D., Das, S. and El Abbadi, A., 2011science, 3(1).
Flick, U., 2015. Introducing research methodology: A beginner’s guide to doing a research project. Sage.
Hofmann, P. and Woods, D., 2010. Cloud computing: The limits of public clouds for business applications. IEEE Internet Computing, 14(6), pp.90-93.
Neuman, W.L. and Robson, K., 2014. Basics of social research. Pearson Canada.
Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd.
Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), pp.1-11.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Velte, A.T., Velte, T.J., Elsenpeter, R.C. and Elsenpeter, R.C., 2010. Cloud computing: a practical approach (pp. 1-55). New York: McGraw-Hill.
Williams, C., 2011. Research methods. Journal of Business & Economics Research (JBER), 5(3).
Agrawal, D., Das, S. and El Abbadi, A., 2011, March. Big data and cloud computing: current state and future opportunities. In Proceedings of the 14th International Conference on Extending Database Technology (pp. 530-533). ACM.Order Now