Back to Research Methods
Unit 3 - Research Proposal Review

Methodological Considerations for Cloud Security Research

Key Questions

  • Which research methods suit the cloud security risk study?
  • Which data collection methods should be used?
  • Which skills require development?

Research Method Selection

A mixed methods approach combining qualitative and quantitative strategies best suits investigating cloud security risks (Creswell, 2022; Saunders, Lewis and Thornhill, 2012). Cloud security is complex, covering technical vulnerabilities, organizational practices, regulatory compliance, and human factors. This demands methodological diversity to capture different aspects of security risks.

The primary method will be a systematic literature review following established protocols for identifying, evaluating, and synthesizing existing research (Dawson, 2015). This provides comprehensive understanding of current cloud security research and identifies gaps for investigation. The systematic approach also helps reduce bias through explicit, replicable procedures. Since cloud technology evolves rapidly, this method lets me track how security challenges and solutions have developed over time.

I'm also considering case study analysis to examine how organizations address cloud security in practice (Dawson, 2015). While literature review provides theoretical foundations, case studies would offer real world context. Accessing detailed security information might be tricky since companies protect sensitive data, so I may need to focus on publicly available incident reports.

Data Collection Methods

For the systematic review, data collection involves searching academic databases like IEEE Xplore, ACM Digital Library, and ScienceDirect using defined inclusion and exclusion criteria (Saunders, Lewis and Thornhill, 2012). I'll use extraction templates to capture research context, methodologies, findings, and limitations from each study.

If I pursue primary research, semi-structured interviews with cloud security professionals could reveal practical insights not fully captured in literature. I'd target security architects, compliance officers, and IT directors. Surveys could provide quantitative data on risk prevalence and severity across different organization sizes, industries, and cloud deployment models (Saunders, Lewis and Thornhill, 2012).

I might also analyze security incident databases like Cloud Security Alliance repositories and breach reports. These secondary sources would provide empirical evidence of actual security failures to complement interview and survey data.

Skills Requiring Development

Systematic review methodology: I need to develop skills in formulating precise search strategies, applying quality assessment criteria, and conducting meta synthesis. While I have basic literature searching experience, systematic reviews demand more rigorous protocols (Dawson, 2015).

Qualitative analysis: Thematic analysis techniques for coding interviews and identifying patterns are new to me. I'll likely need to learn NVivo or ATLAS.ti software to support this work.

Quantitative analysis: Survey design, scale development, and statistical analysis need strengthening. I'll need to work with tools like SPSS, R, or Python for descriptive and inferential statistics (Saunders, Lewis and Thornhill, 2012).

Research ethics: Understanding ethical approval processes, informed consent, data anonymization, and secure storage is essential when handling sensitive security information (Dawson, 2015).

References

  • Creswell, J. (2022) What is Mixed Methods Research? Ann Arbor: University of Michigan.
  • Dawson, C. (2015) Projects in computing and information systems: A student's guide. Harlow: Pearson.
  • Saunders, M., Lewis, P. and Thornhill, A. (2012) Research methods for business students. 6th edn. Harlow: Pearson Education Limited.
Source Artifacts | 📝 Reflection Document
Email
GitHub
LinkedIn