update paper chapters 1 2 and 3 based on feedback. Add index for chapter 2 .Please review two other sample papers for your reference, 

1

Osterberg

Ryan Osterberg

Professor Mathai

English 102

6 November 2018

Very careful work, Ryan. Good data and effective writing. The essay does have an APA – Psch slant, thus slightly different from the typical research paper this course models.

Score: 95

Why Violent Video Gaming is a Serious Issue

Video gaming is a popular entertainment choice for children, adolescents, and young adults. Video games are unique in their style and genre, which makes them appealing to a variety of audiences. A particular genre that has grasped the attention of many people in the world today is shooting games. Sarah M. Coyne et al. states, “According to a Children Now (2001) content analysis, as much as 89% of video games have some form of, with almost half including potentially lethal violence against other characters” (1869). Games like Call of Duty, Grand Theft Auto, and Halo are supposed to be played by individuals that are at least seventeen years old, yet young children play these games. However, our society is unaware of the daunting behavioral and psychological effects of playing violent games. Violent games involve the use of weapons such as guns and knives to harm other characters, resulting in bloody outcomes. Violent video gaming has become a dangerous epidemic that should be considered a worldwide issue.

Violent video gaming has been attributed to negative behavioral tendencies. The American Psychological Association Task Force was asked to review previous research on the effects of playing violent video games. Sandra L. Calvert et al. reported of the specific findings of the Task Force: “As predicted by cognitive, learning, and arousing theories, violent video game use was associated with increased aggressive behavior in 12 of 14 studies published after the earlier meta-analyses” (133). Violent video games are contributing to a negative behavior that is aggression. Aggression is built up in users of violent video games, which should raise concern in people across the globe. Users are more inclined to purchase weapons, which could result in more conflicts. The Task Force also discovered that “7 of the 9 studies revealed decreased prosocial behavior, empathy to the distress of others, and/or sensitivity to aggression after violent video game use” (134-135). Violent gaming often involves physically harming other characters. Therefore, people that play violent games are less likely to care for others. Many people fail to realize that the impersonation of killing in video games can become a reality because of the disregard for others. Coyne et al. affirmed that “this relationship between violent video game play and delinquent behavior has also been found in clinical populations of institutionalized juvenile departments” (1869). Exposure to violence in video games puts gamers at a higher risk of committing crime. This poses a safety threat to nations across the world that needs to be addressed.

The frequency of violent gaming has been linked to decreased benevolence and prosocial behavior. A study was conducted to examine these effects based on the General Aggression Model. The subjects of the particular study were analyzed over a timespan of five years. After significant research, the experimenters discovered that “violent video game play negatively impacts benevolence, ultimately leading to a reduction in prosocial behavior” (Coyne et al. 1875). Benevolence and prosocial behavior are important characteristics of human behavior. According to Coyne et al., “prosocial behavior is associated with many positive outcomes, including life satisfaction, self-acceptance, personal growth, autonomy, positive relationships with others, social coherence, and psychological functioning” (1870). Benevolence is also a crucial value of many cultures (Coyne et al. 1871). When prosocial behavior and benevolence are absent in individuals, societies are in trouble. If negativity lingers in a society, happiness will be hard to come by for its members.
Neurological functioning is significantly affected by these violent games. Young adult males were asked to participate in an experiment that would provide valuable data in this matter. They were separated into different groups, with each group having a different degree of exposure to violent video games. After viewing the content, the researchers took an fMRI of each participant. The researchers established “that young adult males with low prior video game experience have reduced lateral prefrontal and cerebellum activity during cognitive inhibition after playing a violent video game extensively over a period of one week” (Hummer et al. 9). The cerebellum is an essential part of the brain that is involved in balance and coordination, which can decrease in individuals that play violent video games. Even more alarming is the effect on prefrontal activity. Hummer et al. stated, “Lower PFC activity or frontolimbic connectivity is present in clinical samples with inhibitory deficits, such as ADHD or problematic video game play” (10). In other words, violent video gamers are subject to experiencing decreased self-control. Therefore, their actions could be taken out on those around them.

Additionally, a higher risk of depression has been linked to violent gaming. Fifth grade students were interviewed about their experience with violent video games and perceived depression according to the Major Depressive Disorder Scale. After concluding their study, the analysts detected that “playing high-violence video games for more than 2 hours is significantly associated with having a higher number of depressive symptoms” (Tortolero et al. 612). This data was significant because “it was observed after controlling for aggression and several violence-related variables” (Tortolero et al. 612). Depression is concerning, as it contributes to a number of unwanted thoughts and behaviors. Societies need to be conscious of this reality in the gaming world or depression will become more common.

Moral disengagement is a suggested consequence of playing violent video games. Moral disengagement is the tendency for people to betray implied societal rules. A longitudinal study was administered on a group of Chinese adolescents to enhance this belief. This is one of the few studies that was completed on Chinese individuals. The foundation conducting the study was Bandura’s Social Learning Theory, which states, “Children learn aggressive behaviors the same way they learn other social behavior–by direct experience and by observing others and imitating or modeling their behavior” (Teng et al. 2). By observing violent behavior in video games, people learn to imitate these actions. The data collected from the study showed that “moral disengagement is a possible route through which exposure to video game violence predicts subsequent aggression” (Teng et al. 9). Users of of violent video games may think it is acceptable to murder or steal because the video games promote such acts. They are more likely to violate moral standards established in a society. When people don’t follow these standards, vicious acts are likely to proceed.

The video game crisis is a serious issue. People tend to overlook the consequences of partaking in violent gaming, but we can no longer ignore the tangible, negative impacts of this trend. Playing violent video games has a multitude of negative effects, including aggression, decreased empathy, decreased brain function, depression, and moral disengagement. Societies will be headed towards disaster if they aren’t cautious about the devastating effects of playing violent games.

Why Violent Video Games Are Detrimental to Society

Annotated Bibliography

Calvert, Sandra L., et al. “The American Psychological Association Task Force Assessment of Violent Video Games: Science in the Service of Public Interest.” American Psychologist, vol. 72, no. 2, Feb. 2017, pp. 126–143. EBSCOhost, doi:10.1037/a0040413.

This article discussed how an American Psychological Association Task Force

critically reviewed previous research done by the APA in 2005 regarding the

effects of violent video games. Then, the Task Force was asked to conduct new

research from 2009 through 2013. From the research, the Task Force found multiple effects of playing violent video games, including increased physiological arousal, decreased empathy, and increased aggression. This source supports my argument that violent video games can have a negative impact on society.

Coyne, Sarah M., et al. “Violent Video Games, Externalizing Behavior, and Prosocial Behavior: A Five-Year Longitudinal Study during Adolescence.” Developmental Psychology, vol. 54, no. 10, Oct. 2018, pp. 1868–1880. EBSCOhost, doi:10.1037/dev0000574.supp (Supplemental).

This article provides information about a particular study that was conducted to examine the effects of violent video games on adolescents. Multiple participants were tested in the study over a five-year timespan. This study found that playing negative video games negatively impacts benevolence. The source backs the findings of my other sources, as it found that playing violent video games was linked to decreased empathy.

Hummer, Tom A., William G. Kronenberger, Yang Wang, and Vincent P. Mathews. 2017. “Decreased Prefrontal Activity during a Cognitive Inhibition Task Following Violent Video Game Play: A Multi-Week Randomized Trial.” Psychology of Popular Media Culture, May. doi:10.1037/ppm0000141.supp (Supplemental).

This article focuses on an experiment that was performed to assess the effects of

violent video games on brain activity. The experimental group was exposed to

violent video games for specific amounts of time, where the control group wasn’t

exposed to them at all. Researchers took an fMRI of all participants to examine

brain functioning. The data drawn from the study found that playing violent

video games can decrease prefrontal activity in the brain and inhibitory control.

This source adds a new dimension to my research because it focuses on the biological impacts of playing such games.

Teng, Zhaojun, et al. “A Longitudinal Study of Link between Exposure to Violent Video Games and Aggression in Chinese Adolescents: The Mediating Role of Moral Disengagement.” Developmental Psychology, Oct. 2018. EBSCOhost, doi:10.1037/dev0000624.supp (Supplemental).

This article contains information regarding a study that was conducted on Chinese

adolescents to discover the relationship between aggression and the engagement

in violent gaming. The study was most concerned with how violent gaming can

lead to moral disengagement. By using data from the study and Bandura’s theory

on moral disengagement, the researchers are able to draw strong conclusions. This

source will have an impact on my research because the participants involved were

of a different ethnicity than the participants in my other sources. Therefore, it will

make my argument stronger.

Tortolero, Susan R., et al. “Daily Violent Video Game Playing and Depression in Preadolescent Youth.” CyberPsychology, Behavior & Social Networking, vol. 17, no. 9, Sept. 2014, pp. 609–615. EBSCOhost, doi:10.1089/cyber.2014.0091.

This article reports of a cross-sectional study that aimed to discover whether or

not there was a relationship between violent gaming and depression. Fifth-grade

students were asked questions about the time they spent playing violent video

games. Then, they were asked to answer questions pertaining to depression. After

gathering the results, the researchers concluded that playing violent video games

likelihood of experiencing symptoms of depression. This source will be very

useful, as it provides information about the mental effects of violent gaming.

Peer Memo

Ryan–

Great paper! I think you’ve chosen a topic that is incredibly relevant and important in today’s society. You have a good deal of research and secondary sources to back up your claim, and I especially appreciated the diversity in the studies you chose to cite. As a writer, you’ve got a lot of credibility. There were a few moments throughout where I thought you could include more detail for your audience, particularly in the introduction, as well as the paragraph on moral disengagement. When writing an academic paper like this one, it is important to assume that your reader has a very limited knowledge of the topic. You must make them rely on your argument and the information you’ve presented when it comes time for them to craft their opinion. So, even if you feel moral disengagement is a common subject, use your own words to define it for you reader. Same goes for the topic of violence and why it is affecting our world. You’ve chosen a very broad topic to tackle, so be specific when you talk about the violence you see in video games. Does the aggressive behavior come from combat, weapons, specifically guns, or the act of murder and death? Which causes the most harm? And what, exactly, will be the impact on society if this problem is not remedied? Will aggression lead to more war? Will limited brain functioning take away from our ability to resolve conflict? And so on. If you can elaborate on this in some of your analysis, it will give your argument a lot more weight. Again, convince your reader to take action and make sure you’ve conveyed the significance of what you’re writing about. Overall, I think you have a great essay on your hands and I loved getting to hear your ideas! Let me know if I can help with anything else.

-Alex

1

Osterberg

Ryan Osterberg

Professor Mathai

English 102

6 November 2018

Very careful work, Ryan. Good data and effective writing. The essay does have an APA – Psch slant, thus slightly different from the typical research paper this course models.

Score: 95

Why Violent Video Gaming is a Serious Issue

Video gaming is a popular entertainment choice for children, adolescents, and young adults. Video games are unique in their style and genre, which makes them appealing to a variety of audiences. A particular genre that has grasped the attention of many people in the world today is shooting games. Sarah M. Coyne et al. states, “According to a Children Now (2001) content analysis, as much as 89% of video games have some form of, with almost half including potentially lethal violence against other characters” (1869). Games like Call of Duty, Grand Theft Auto, and Halo are supposed to be played by individuals that are at least seventeen years old, yet young children play these games. However, our society is unaware of the daunting behavioral and psychological effects of playing violent games. Violent games involve the use of weapons such as guns and knives to harm other characters, resulting in bloody outcomes. Violent video gaming has become a dangerous epidemic that should be considered a worldwide issue.

Violent video gaming has been attributed to negative behavioral tendencies. The American Psychological Association Task Force was asked to review previous research on the effects of playing violent video games. Sandra L. Calvert et al. reported of the specific findings of the Task Force: “As predicted by cognitive, learning, and arousing theories, violent video game use was associated with increased aggressive behavior in 12 of 14 studies published after the earlier meta-analyses” (133). Violent video games are contributing to a negative behavior that is aggression. Aggression is built up in users of violent video games, which should raise concern in people across the globe. Users are more inclined to purchase weapons, which could result in more conflicts. The Task Force also discovered that “7 of the 9 studies revealed decreased prosocial behavior, empathy to the distress of others, and/or sensitivity to aggression after violent video game use” (134-135). Violent gaming often involves physically harming other characters. Therefore, people that play violent games are less likely to care for others. Many people fail to realize that the impersonation of killing in video games can become a reality because of the disregard for others. Coyne et al. affirmed that “this relationship between violent video game play and delinquent behavior has also been found in clinical populations of institutionalized juvenile departments” (1869). Exposure to violence in video games puts gamers at a higher risk of committing crime. This poses a safety threat to nations across the world that needs to be addressed.

The frequency of violent gaming has been linked to decreased benevolence and prosocial behavior. A study was conducted to examine these effects based on the General Aggression Model. The subjects of the particular study were analyzed over a timespan of five years. After significant research, the experimenters discovered that “violent video game play negatively impacts benevolence, ultimately leading to a reduction in prosocial behavior” (Coyne et al. 1875). Benevolence and prosocial behavior are important characteristics of human behavior. According to Coyne et al., “prosocial behavior is associated with many positive outcomes, including life satisfaction, self-acceptance, personal growth, autonomy, positive relationships with others, social coherence, and psychological functioning” (1870). Benevolence is also a crucial value of many cultures (Coyne et al. 1871). When prosocial behavior and benevolence are absent in individuals, societies are in trouble. If negativity lingers in a society, happiness will be hard to come by for its members.
Neurological functioning is significantly affected by these violent games. Young adult males were asked to participate in an experiment that would provide valuable data in this matter. They were separated into different groups, with each group having a different degree of exposure to violent video games. After viewing the content, the researchers took an fMRI of each participant. The researchers established “that young adult males with low prior video game experience have reduced lateral prefrontal and cerebellum activity during cognitive inhibition after playing a violent video game extensively over a period of one week” (Hummer et al. 9). The cerebellum is an essential part of the brain that is involved in balance and coordination, which can decrease in individuals that play violent video games. Even more alarming is the effect on prefrontal activity. Hummer et al. stated, “Lower PFC activity or frontolimbic connectivity is present in clinical samples with inhibitory deficits, such as ADHD or problematic video game play” (10). In other words, violent video gamers are subject to experiencing decreased self-control. Therefore, their actions could be taken out on those around them.

Additionally, a higher risk of depression has been linked to violent gaming. Fifth grade students were interviewed about their experience with violent video games and perceived depression according to the Major Depressive Disorder Scale. After concluding their study, the analysts detected that “playing high-violence video games for more than 2 hours is significantly associated with having a higher number of depressive symptoms” (Tortolero et al. 612). This data was significant because “it was observed after controlling for aggression and several violence-related variables” (Tortolero et al. 612). Depression is concerning, as it contributes to a number of unwanted thoughts and behaviors. Societies need to be conscious of this reality in the gaming world or depression will become more common.

Moral disengagement is a suggested consequence of playing violent video games. Moral disengagement is the tendency for people to betray implied societal rules. A longitudinal study was administered on a group of Chinese adolescents to enhance this belief. This is one of the few studies that was completed on Chinese individuals. The foundation conducting the study was Bandura’s Social Learning Theory, which states, “Children learn aggressive behaviors the same way they learn other social behavior–by direct experience and by observing others and imitating or modeling their behavior” (Teng et al. 2). By observing violent behavior in video games, people learn to imitate these actions. The data collected from the study showed that “moral disengagement is a possible route through which exposure to video game violence predicts subsequent aggression” (Teng et al. 9). Users of of violent video games may think it is acceptable to murder or steal because the video games promote such acts. They are more likely to violate moral standards established in a society. When people don’t follow these standards, vicious acts are likely to proceed.

The video game crisis is a serious issue. People tend to overlook the consequences of partaking in violent gaming, but we can no longer ignore the tangible, negative impacts of this trend. Playing violent video games has a multitude of negative effects, including aggression, decreased empathy, decreased brain function, depression, and moral disengagement. Societies will be headed towards disaster if they aren’t cautious about the devastating effects of playing violent games.

Why Violent Video Games Are Detrimental to Society

Annotated Bibliography

Calvert, Sandra L., et al. “The American Psychological Association Task Force Assessment of Violent Video Games: Science in the Service of Public Interest.” American Psychologist, vol. 72, no. 2, Feb. 2017, pp. 126–143. EBSCOhost, doi:10.1037/a0040413.

This article discussed how an American Psychological Association Task Force

critically reviewed previous research done by the APA in 2005 regarding the

effects of violent video games. Then, the Task Force was asked to conduct new

research from 2009 through 2013. From the research, the Task Force found multiple effects of playing violent video games, including increased physiological arousal, decreased empathy, and increased aggression. This source supports my argument that violent video games can have a negative impact on society.

Coyne, Sarah M., et al. “Violent Video Games, Externalizing Behavior, and Prosocial Behavior: A Five-Year Longitudinal Study during Adolescence.” Developmental Psychology, vol. 54, no. 10, Oct. 2018, pp. 1868–1880. EBSCOhost, doi:10.1037/dev0000574.supp (Supplemental).

This article provides information about a particular study that was conducted to examine the effects of violent video games on adolescents. Multiple participants were tested in the study over a five-year timespan. This study found that playing negative video games negatively impacts benevolence. The source backs the findings of my other sources, as it found that playing violent video games was linked to decreased empathy.

Hummer, Tom A., William G. Kronenberger, Yang Wang, and Vincent P. Mathews. 2017. “Decreased Prefrontal Activity during a Cognitive Inhibition Task Following Violent Video Game Play: A Multi-Week Randomized Trial.” Psychology of Popular Media Culture, May. doi:10.1037/ppm0000141.supp (Supplemental).

This article focuses on an experiment that was performed to assess the effects of

violent video games on brain activity. The experimental group was exposed to

violent video games for specific amounts of time, where the control group wasn’t

exposed to them at all. Researchers took an fMRI of all participants to examine

brain functioning. The data drawn from the study found that playing violent

video games can decrease prefrontal activity in the brain and inhibitory control.

This source adds a new dimension to my research because it focuses on the biological impacts of playing such games.

Teng, Zhaojun, et al. “A Longitudinal Study of Link between Exposure to Violent Video Games and Aggression in Chinese Adolescents: The Mediating Role of Moral Disengagement.” Developmental Psychology, Oct. 2018. EBSCOhost, doi:10.1037/dev0000624.supp (Supplemental).

This article contains information regarding a study that was conducted on Chinese

adolescents to discover the relationship between aggression and the engagement

in violent gaming. The study was most concerned with how violent gaming can

lead to moral disengagement. By using data from the study and Bandura’s theory

on moral disengagement, the researchers are able to draw strong conclusions. This

source will have an impact on my research because the participants involved were

of a different ethnicity than the participants in my other sources. Therefore, it will

make my argument stronger.

Tortolero, Susan R., et al. “Daily Violent Video Game Playing and Depression in Preadolescent Youth.” CyberPsychology, Behavior & Social Networking, vol. 17, no. 9, Sept. 2014, pp. 609–615. EBSCOhost, doi:10.1089/cyber.2014.0091.

This article reports of a cross-sectional study that aimed to discover whether or

not there was a relationship between violent gaming and depression. Fifth-grade

students were asked questions about the time they spent playing violent video

games. Then, they were asked to answer questions pertaining to depression. After

gathering the results, the researchers concluded that playing violent video games

likelihood of experiencing symptoms of depression. This source will be very

useful, as it provides information about the mental effects of violent gaming.

Peer Memo

Ryan–

Great paper! I think you’ve chosen a topic that is incredibly relevant and important in today’s society. You have a good deal of research and secondary sources to back up your claim, and I especially appreciated the diversity in the studies you chose to cite. As a writer, you’ve got a lot of credibility. There were a few moments throughout where I thought you could include more detail for your audience, particularly in the introduction, as well as the paragraph on moral disengagement. When writing an academic paper like this one, it is important to assume that your reader has a very limited knowledge of the topic. You must make them rely on your argument and the information you’ve presented when it comes time for them to craft their opinion. So, even if you feel moral disengagement is a common subject, use your own words to define it for you reader. Same goes for the topic of violence and why it is affecting our world. You’ve chosen a very broad topic to tackle, so be specific when you talk about the violence you see in video games. Does the aggressive behavior come from combat, weapons, specifically guns, or the act of murder and death? Which causes the most harm? And what, exactly, will be the impact on society if this problem is not remedied? Will aggression lead to more war? Will limited brain functioning take away from our ability to resolve conflict? And so on. If you can elaborate on this in some of your analysis, it will give your argument a lot more weight. Again, convince your reader to take action and make sure you’ve conveyed the significance of what you’re writing about. Overall, I think you have a great essay on your hands and I loved getting to hear your ideas! Let me know if I can help with anything else.

-Alex

1

Sameer:

Here is the return of your submission. Your note says this is your ch 1 and ch 3. Is that correct? My work is to see than use of language in your dissertation. From the markings I have made in color you will be able to see the places that require revision. Please read carefully and make the revisions.

Please do not allow any hasty work with writing. It is a skill we have to practice and to gain confidence in. Read your draft and revise it at least 5 times before submitting it.

I shall also send you some samples of undergraduate research papers so that you will know what the general expectation of writing on an American campus is. I also urge you to review 10 dissertations at a good university library near you. That will show you how the writing requirements are satisfied in them.

Data Security in Cloud Services

Submitted by

Sameerkumar Prajapat

A Dissertation Presented in Partial Fulfillment

of the Requirements for the Degree

Doctor of Education/Philosophy in Leadership

with a specialization in _____________

Judson University

Elgin, Illinois

Date (of the committee or Dean’s signature)

Abstract

The main goal of this research paper is exploring the current state of data security system in the cloud service industry. The research proposal wdissertation will also analyze the ability of the current systems to combat the ever-evolving threats in the industry. To understand the same, the dissertation will collect data from literary sources that focus on cloud security systems. The main research methodology for the dissertation will be a thematic analysis. The proposaldissertation will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. This knowledge will be used to understand the current state of data security, the future threats that are expected and the avenues of evolution that are necessary to combat the same. The research team will use purposive sampling to ensure that the research is conducted on relevant literary sources. The data sourcing, extraction and indexing processes will be handled in a professional manner to eliminate bias and preferences. The proposaldissertation wishes to arrive at a valid and reliable result that provides a complete overview of the current cloud data security domain. In addition to the thematic analysis, the research study also provides a brief overview of the current literature about the topic through an insightful literature review. The research proposalstudy also provides a brief overview of the limitations and ethical considerations that might affect the dissertation process. Comment by Author: Proposal. It’s not a dissertation until you do your study

Table of Contents

Chapter 1: Introduction
3

Background
3

Problem Statement and Significance
4

Theoretical Framework 5

Researcher’s Positionality
8

Purpose
9

Research Question(s)
9

Significance
10

Definition of Terms
10

Summary

11

Chapter 3: Introduction
11

Statement of the Problem
12

Research Question(s)
12

Research Methodology
13

Research Design
13

Study Population & Sample Selection
14

Data Collection Methods
15

Data Collection Procedures
16

Data Analysis & Procedures
16

Validity & Reliability
17

Ethical Consideration
18

Limitations
1 8

Summary
19

Chapter 1: Introduction

Background

Cloud services have gained a lot of popularity in the current technological era. With the rapid increase in digital adoption, even small and medium organizations are looking to improve their organizational efficiency and increase their revenue through cloud-based services. Rather than a physical on-site server, cloud services are services that are made available via a remote cloud computing system (Zhe et al., 2017). In today’s business environment cloud service providers can be seen as third-party suppliers who help organizations run critical services through their remote cloud servers. This makes cloud services less costly to operate and maintain in the longer run, and it is also one of the main reasons that organizations are moving towards cloud-based organizational frameworks. Cloud services also provide several other benefits to both the organizations and the consumers. Therefore, cloud services has it has gained wide recognition among organizations as a desirable addition to the present current IT infrastructure (Zhe et al., 2017). Comment by Author: Nice!

It is important to understand that cloud services also have several disadvantages, and these disadvantages limit the widespread use of cloud services and the growth of cloud services within organizations. One of the major problems with cloud services is that it is not secure. As mentioned earlier, cloud services are not run from a cloud computing server that is not on-site. Therefore, there are several data security risks associated with cloud services. A typical cloud provider does not hold the necessary access keys (Zhe et al., 2017). If an organization does not have a strong user identity, an attacker would be able to compromise the entire organization. Moreover, there is a very high risk that employees and non-technical workers may be left behind when a cloud service is shut down. Therefore, if a cloud service is being disrupted during time of business, security is compromised for many organizations (Zhe et al., 2017). Comment by Author: It is or is not on site? You mentioned that it is not run from a cloud computing server, then said that it is not on-site…I am confused.

With the increasing demand for digitization, we can clearly see that cloud services will play a major part in organizations (Shaikh & Modak, 2017)society. Therefore, it is critical to ensure that the data security risks associated with cloud services need to be addressed and mitigated efficiently. We can see several cloud service providers work towards improving their security practices through user audits and peer reviews as well as by addressing data breach mitigation techniques and strategies (Shaikh & Modak, 2017). However, most of them could be considered as stop-gap measures and not permanent solutions. Since technology is constantly evolving, the nature of threats for the field is also constantly changing. Therefore, it is important to completely understand the security risks and look for ways to enable a sustainable data security solution for cloud services (Shaikh & Modak, 2017). Comment by Author: cite

Problem Statement and Significance

The COVID-19 pandemic in 2019 has accelerated the digital transformation of organizations in several sectors. The is rapid increase in digitization and the popularity of the cloud computing systems have led to a situation where most organizations are looking at creating a cloud-based operational framework. This combination makes the organizations more susceptible to data security risks (Kumar et al., 2018). The responsibility of mitigating these risks and keeping the organizations safe falls on the hands of the third-party cloud suppliers. Therefore, these data security risks do not just impact the end organizations but also the third-party cloud suppliers. With the increase in the number of cloud service users, they will find it hard to manage cloud systems and mitigate risks immediately. It is also important to note that the data security risks that threaten cloud services are of a varied nature. This creates a major problem for cloud service providers (Kumar et al., 2018). Comment by Author: good way to make it relevant

An evaluation of current and future threats against cloud services is not only a challenge for cloud providers but for companies within the industry as well. This research proposaldissertation will look to explore the current data security risks and analyze the security systems that third-party cloud suppliers have in place to comprehensively understand the current cloud service environment. This will help create sustainable solutions to combat the data security risks and issues (Kumar et al., 2018). With this understanding, cloud service providers will be able to reduce the financial risks and help with data security issues, protect their customers and help solve the data security issues of their cloud-based data services. Another important goal of the dissertation is to gain knowledge about the new data security threats that are emerging in the cloud service sector. The challenge highlighted will be experienced as more organization moves their data to the cloud demanding for a better management model to counter it. is will be a significant problem in the coming years as the cloud services industry continues to evolve with the increased complexity of the data management business model. Therefore, the research proposal wdissertation will be focused on understanding and evaluating both the current and emerging threats that threaten the data security of cloud services (Kumar et al., 2018). To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below. Comment by Author: proposal Comment by Author: proposal

R1: What are the current data security issues and risks that threaten cloud service in organizationsproviders? Comment by Author: good…but be more specific…in which context?

R2: What are the predicted future trends for the data security issues in organizations?

R3: How can current cloud data security be made more efficient to facilitate tighter data security in organizations? Comment by Author: Again, in which context?

How can current cloud data security be made more efficient to facilitate tighter data security?

Theoretical Framework

The term cloud services refer to services that are provided through remote cloud servers that are set up by third-party service providers. Cloud services have started to gain prominence because of their ability to increase organizational efficiency at minimal costs. Many cloud services are designed around remote storage, which reduces infrastructure and administration costs (Udendhran, 2017). The cloud market provides a number of potential cloud services including file sharing and data management/analysis. These cloud services are highly beneficial for organizations from all sectors because they can scale without the burden of huge costs. Cloud services also enables organizations to study, manage and analyze large sets of data without having their own servers or data centers. Data centers are expensive as they have higher operational and service costs when compared to cloud computing systems (Udendhran, 2017).

With the help of cloud services, organizations can manage complex business operations including business logic, risk management, data recovery, and transaction management. We can also clearly see that there are new technological advancements and innovations that are helping the cloud computing field grow at a rapid pace (Udendhran, 2017). While this is beneficial for organizations, this rapid growth also increases data security risks. Data security is an important part of both enterprise and corporate security. Data security at an organizational level can be mitigated and eliminated with the help of strong encryption technologies or secure protocols. However, these systems have little effect when it comes to cloud data security as the threats are highly varied in nature (Udendhran, 2017).

Cloud data security has been a cause for concern for many years and there have been several developments in this regard. Cloud service providers have created various measures to ensure the security of the data. Data protection systems are also deployed and maintained within the cloud and the organizational end by a number of technologies (Udendhran, 2017). For instance, companies have made it mandatory for IT staff to download and use encryption software before passing on key data to users. It is also important to understand what role machine learning can play in corporate cloud storage platforms. Since the data security threats are constantly evolving, many cloud service providers have incorporated AI-based systems like machine learning to help manage the security risks through threat analysis. These strategies have helped cloud service systems operate efficiently and mitigate data security threats to a level. This is further evidenced by several research papers on the topic (Udendhran, 2017).

However, many literary papers that have explored the concept have shown that the service providers are reacting to the threats rather than proactively creating security systems. While this has worked till now, the reactive data security systems might not be able to keep data secure in the current business environment where most of the companies have started to use digital and cloud-based systems (Giri & Shakya, 2019). With the increase in the number of customers, cloud service providers might find it difficult to manage their data privacy policies and security measures efficiently. Therefore, it is important to thoroughly analyze the current data security threats to create standardized systems that can provide sustainable security results. It is also important to use the analysis to predict future data security threats that might increase the cost and complexity of data protection and monitoring solutions (Giri & Shakya, 2019).

This research proposal dissertation will analyze the cloud data security threats to know what data security threats are growing the most and propose solutions for the service providers to help them address these threats and protect the data better. The studydissertation will also show how cloud service providers could develop the needed technologies to deal with the security issues that they might face in the future (Giri & Shakya, 2019). The research paper will also look to propose data security risk models that could help cloud service providers understand emerging threats in the cloud service sector. This will help them provide better protection against new data security threats and render faster resolutions to mitigate new data security threats. The dissertation will primarily collect data from literary papers on data security risks/threats and cloud-based systems (Giri & Shakya, 2019). Comment by Author: proposal Comment by Author: proposal Comment by Author: proposal

The research studydissertation will look to collect data from academic libraries to better understand the cloud data security framework. The studydissertation will use document analysis on the literary reviews to gain new insights into the cloud data security framework. The data collected through the document analysis will be further explored through thematic analysis. This thematic analysis will be focused on three main categories: the current data security threats, the current security framework & the future data security threats. Future threats are predicted using evidences present in the literary papers. In addition to exploring the current cloud data security frameworks, the thematic analysis will help predict new threats and the same can be used as a guideline for creating new data security systems. The researchers will also use textual analysis to help determine where new and emerging threats could come from, and the best security strategy for dealing with these issues/risks (Akhil et al., 2017). Comment by Author: proposal Comment by Author: proposal

Therefore, tThe focus here is to help improve the current data security systems present in the cloud service sector. This thematic analysis will also help researchers and professionals in the field of cloud data security. To ensure that the research is up to date, this thematic analysis will look at the most recent literary works in the field of data protection (Akhil et al., 2017). It will then focus on predicting and analyzing which elements of these works hold up the current cloud data security framework. This will include, for example, the current security frameworks and the current data protection solutions within that framework. The latter two features will help us to understand how the current cloud data security framework is failing as compared to the current threats. (Akhil et al., 2017). Comment by Author: nice

Researcher’s Positionality

Cloud computing systems have become a major part of the society that we live in, and hence it is important to understand the benefits and challenges that are present in the same. While researching the topic of cloud computing and its related services, it was clear that data security has become a major concern for most of the service providers (Akhil et al., 2017). Even with the development of various technologies and systems to combat security risks and issues, there are still concerns regarding the security of the cloud data. This prompted the researcher to explore the topic in detail. The researcher was also fascinated by the fact that most of the organizations are moving to digital and cloud-based systems due to the pandemic. Therefore, the impact of a data security breach has become higher in the current society. Thus, the researcher felt that there needs to be an exploration on the future security risks and issues that could threaten cloud service providers (Akhil et al., 2017).

Purpose

The main goal of the proposaldissertation is to explore the efficiency of the current cloud data security systems and understanding whether they will be able to handle issues that could arise in the future. Based on the analysis, the studydissertation will also provide suggestions and alternatives to improve cloud data security (Kumar et al., 2018). Comment by Author: proposal

Research Question(s)

Cloud data security is not an isolated issue that will affect only select organizations. Since most of the organizations in the society is moving towards a digital-only operation, any data security risk will affect a wide range of companies. This is detrimental for the whole society. Therefore, there needs to be extensive research on the data security systems of service providers rendering cloud computing services (Kumar et al., 2018). In this dissertation, the main focus is understanding the current cloud data security scenario and improving the same with the help of extensive research into the field. To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below.

R1: What are the current data security issues and risks that threaten cloud service in organizations?

R2: What are the predicted future trends for the data security issues in organizations?

R1: What are the current data security issues and risks that threaten cloud service providers? Comment by Author: look back at the suggestions I made

R2: What are the predicted future trends for the data security issues?R3: How can current cloud data security be made more efficient to facilitate tighter data security in organizations?

R3: How can current cloud data security be made more efficient to facilitate tighter data security?

Significance

As mentioned earlier, a data hack in cloud services would cause major disruptions in the current society. Data needs to be secured efficiently to ensure that organizations can operate efficiently because of the rapid increase of digitization where most of the companies are moving towards a cloud-based infrastructure. With the increasing data flow, the security and privacy are of utmost importance. It is considered important to ensure the security of data and the privacy of users from any attack (Zhe et al., 2017). Therefore, it is important to create a data security system that is capable of handling both current and future data security issues. This dissertation aims to render significant contribution to the field by analyzing the data security issues to find emerging data hacking and security related trends. The research into the domain is significant to improve the data security frameworks of cloud service providers and enhance them to mitigate future risks in the domain efficiently (Zhe et al., 2017).

DefinitionsDefinition of Terms

i. Machine Learning – Machine Learning is a type of Artificial Intelligence that uses systems to learn from data, identify patterns and learn to make decisions with limited human intervention (Zhe et al., 2017).

ii. Cloud Computing – Cloud computing is a type of computer system resource that uses on-demand data storage and computing power (Zhe et al., 2017).


Summary

Cloud computing system have started to gain extensive recognition because of the various benefits that it provides organizations from several sectors. Cloud services have become a critical tool for organizational growth and have helped several organizations improve their digital frameworks significantly. However, there are still several issues that hinder the implementation and development of cloud services. One of the main issues that cloud service providers face is data security. Data security is a major concern for cloud service providers and organizations using cloud-based frameworks because the cloud data is located in third-party servers. Even though several cloud service providers are using security systems to enhance data security, the efficiency of the current systems in stopping any future security issues and risks is debatable. This proposal adissertation aims to explore the current data security threats faced by cloud service providers, and analyze the efficiency of the current data security systems. The proposal dissertation will also predict future data security trends with the help of literary sources and propose changes that can be made to the current digital security frameworks based on the same. Comment by Author: proposal Comment by Author: proposal


Chapter 3: Methodology

Introduction

In this methodology section, the researcher will provide an overview of the research methodology and framework used in the study.dissertation. Therefore, the focus on the study is directed on dissertation is focused on understanding the data security standards of current cloud networks and check their ability to handle the ever-evolving threats faced by cloud service providers. The dissertation will also render alternative suggestions for deficiencies in the current cloud security strategies (Kritikos et al., 2017). To study the efficiency of cloud data security, the research proposal wdissertation will identify peer-reviewed literary sources for thematic document analysis. In addition to the research methodology, the section will also explore the data collection methodologies and the validity and ethical consideration for the research. Comment by Author: proposal Comment by Author: proposal Comment by Author: proposal Comment by Author: nice

Statement of the Problem

This proposaldissertation will focus on exploring both the current data security risks and the future data risks/issues that threaten the current cloud security frameworks. The main goal is to provide a comprehensive understanding of the current cloud service environment and create sustainable solutions to combat data security risks that threaten the field and help reduce the financial and operational risks of companies in the field. The research focus will also include the exploration of future cloud data security frameworks to keep up with the increased complexity of the data management business model. Comment by Author: proposal

Research Question(s)

The cloud data security dissertation will focus on answering four core research questions that pertain to the field. They are

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

How can current cloud data security be made more efficient to facilitate tighter data security?

Research Methodology

The proposaldissertation uses qualitative research methodology and the design is the , especially qualitative research designthematic analysis, to, to dissect the cloud data security environment and analyze the risks that are probablesurrounding the same. The thematic analysis is a research methodology that is focused on analyzing qualitative data that is collated from a set of texts, especially literary documents and interview transcripts (Kritikos et al., 2017). The review of literaturethematic analysis will be conducted on a set of peer-reviewed literary sources that are focused on the title. The methodology involves the identification and analysis of informative sections from the selected sources. With the aid of thematic analysis, researchers are able to identify common topics, ideologies, and patterns that highlight the data security efficiency of current cloud computing and service systems. Thematic analysis also helps researchers identify the major data/information security risks that will affect the cloud environment. The research study will use thematic analysis as a method to identify the current data security issues and learn the efficacy of current cloud data security systems. The focus of the thematic analysis is identifying and analyzing textual samples based on three major themes, namely current data security threats; cloud security frameworks; and future threats and capabilities. Through this methodology, this research study will be able to provide fact-based inferences that can lead to better results. (Kritikos et al., 2017). Comment by Author: proposal Comment by Author: ok that’s the approach…but what is the research design? Case study? Phenomenology? Narrative inquiry? Comment by Author: Are you saying that this study is basically a secondary data analysis?

Research Design

The approach to cloud data security research will be conducted where the data collected from the literary sources are subjected to a qualitative research design. focused on thematic analysis of literary documents. The core research framework will be a thematic analysis of peer-reviewed literary sources sourced from authentic public websites. Through identification and synthesis of these sources, it will be easier to identify a significant subset of the topics and ideologies that have impacted the cloud computing security landscape and how these themes will impact cloud security systems (Vaismoradi & Snelgrove, 2019). These core topics will then be analyzed in relation to data security requirements, how they relate to the cloud and service infrastructure, and which data security tools will be helpful. To select the most relevant literary sources, various research instrumentation such as social networking applications, website crawling tools, document-tracking tools, and mobile data analysis tools will be used. The analysis of the literary sources will help analyze this relevant information and identify specific security trends. The design of the research methodology will include multiple steps, and each step requires careful selection and validation of the data sources that will be utilized for the document analysis (Vaismoradi & Snelgrove, 2019).

Study Population & Sample Selection

This studydissertation will analyze the proposal dissertation will analyze the efficacy of data security measures in the current cloud computing environment.t. Therefore, the dissertation concerns all the sectors that are dependent on cloud computing and cloud service systems. The proposaldissertation mainly concerns cloud service providers, who are the most vulnerable to cyber security concerns in the current cloud computing environment (Vaismoradi & Snelgrove, 2019). In addition, this study will be beneficial: Comment by Author: proposal Comment by Author: How? Through the analysis of text only? If so, why? Why not interview or survey people? Comment by Author: proposal

1) Business and Government organizations

2) Data Scientists, Data Analysts, Data Entry Managers, IT Directors, Engineers, System Scroving Managers, CXOs and Designers (the “Public”)

3) Enterprise Service Providers, Contractors and Other IT (Technical) Support Service Providers

4) IT Contractors

5) Big Data Analytics/Analytics Tools / Analysis Services

6) Data Storage Service Providers

7) Data Mining Service Providers

8) Digital Content Management Systems

The research methodology and sample selection will be developed based on research requirements from all aspects andof research, and they will be executed with utmost sincerity. All the research material (including original source files) was acquired through research institutes and/or commercial libraries. The literary documents for the study will be acquired from relevant and reliable sources. Purposive sampling, a sampling method where researchers can select sources based on their judgement, will be used for selecting literary documents. With purposive sampling, documents with the most relevant subject matter, information sources and/or platforms will be sought. In addition, various categories of sources will be included. The document selection will be then performed over a three-week period, during which several samples were collected from various sites. Comment by Author: What does this mean? Comment by Author: The study has not occurred yet…..

Data Collection Methods

The research proposal willdissertation primarily uses purposive document selection for selecting the relevant literary sources. The sequential document selection will be used in connection with purposive sampling to determine which topics will be the most relevant to the research question at hand. Comment by Author: proposal Comment by Author: nice! …