Exploring the management of trust in data security in cloud computing

Exploring the management of trust in data security in cloud computing

As discuss with theory changes, so to may your methods changes. You may need to collect data to examine your problem in a different way. For example, a survey you wanted to use, the authors will not give you permission. A theory you would have liked to use has not been used in 10 years and has shown to be ineffective.

In this discussion, discuss your methods of gathering data, has it changed? Also, address the population, e.g., you need to align your research questions up with your population. Your population of choice has to be able to answer your research questions. For example, if you are investigating how mid-level manager implement blockchain, then you need to interview mid-level managers who work in the Block chain area and have responsibly for implementation decisions.