Tag: research

Cloud Computing research

In third year networking we do a lot of work that involves cloud providers such as Amazon Web Services (AWS). Seeing the amount of money businesses have saved by moving to more managed options in the cloud has prompted me to research this more. To do this i analyzed a case study where a New Zealand business made big savings by shifting over to the cloud.

https://aws.amazon.com/solutions/case-studies/yellow_new_zealand/
Faster service delivery, easy scaling, and a consistent high quality of delivery is what Yellow based their decision on when moving to AWS in 2015. Only through a cloud solution could the company automate its IT, introduce self-service features, and take advantage of pay-as-you-go pricing models. Yellow New Zealand wanted to leverage public cloud offerings from organizations such as Amazon Web Services (AWS) to deliver the benefits and capabilities of cloud technologies with minimal technical, financial, and commercial risk.
Before choosing AWS, the planners at yellow already knew they wanted to move to the cloud to reduce costs and increase efficiency of its IT staff and systems. AWS was chosen over other considerations because of the technical, financial benefits and low commercial risk due to them being the main industry player (2015). Yellow differs from other case studies in that they worked extensively with an AWS solution architecht, Cloud specialist, and other parties to plan and undertake their switch to the cloud.
One thing Yellow was looking for in a cloud provider was the possibility for automation of tasks. Yellow currently takes advantage of AWS Cloudformation in conjunction with AWS Lambda to deploy and scale-up its applications and uses Amazon EC2 Container Service (ECS) to automate new code pushes and maintain versioning.

Amazon EC2 Container Service (Amazon ECS) is a highly scalable, fast, container management service that makes it easy to run, stop, and manage Docker containers on a cluster of Amazon Elastic Compute Cloud (Amazon EC2) instances. Amazon ECS lets you launch and stop container-based applications with simple API calls, allows you to get the state of your cluster from a centralized service, and gives you access to many familiar Amazon EC2 features. Cite http://docs.aws.amazon.com/AmazonECS/latest/developerguide/Welcome.html

Elasticache is another AWS offering which Yellow utilizes in its applications and it allows access/storage of frequently used data by users. The Elasticache instance in use runs Redis which is used as a data store, cache and message broker. “Combining code optimizations with Amazon Elasticsearch Service has made response times twice as fast for business searches carried out on its core website, Yellow online. ElastiCache is a web service that makes it easy to set up, manage, and scale a distributed in-memory cache environment in the cloud. It provides a high-performance, scalable, and cost-effective caching solution, while removing the complexity associated with deploying and managing a distributed cache environment. More information can be found at: http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/WhatIs.html
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker. It supports data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperloglogs and geospatial indexes with radius queries. More information can be found at:
https://redis.io/

Availability – latency
Due to the multi-region support offered for many of Amazon’s services, Yellow was able to deploy their systems appropriate region (Sydney) to decrease latency times for their userbase in New Zealand. Yellow’s own datacentre in Auckland is directly connected to AWS using AWS direct connect using MegaPort which significantly decreases latency and increases throughput.

Advertisements

Potential research topic – Blockchain

As somebody who has used Bitcoin and researched some of the different types of coins, i am interested in researching Blockchain technology to see if it is appropriate for a research project.

Knowing very little about Blockchain, i found wikipedia as well as these videos quite good to get the basic ideas about Blockchain. This will help me interpret the technical content of academic papers on Blockchain.

https://en.wikipedia.org/wiki/Blockchain

Blockchain was invented along with Bitcoin by an unknown person (or group), Satoshi Nakamoto. It is a distributed database used to maintain an expanding set of records (blocks). The most widely used implementations function within a peer-to-peer network made on the same protocol to validate new blocks. Blockchain technology allows transactions to be recorded between two parties securely and in a verifiable way which is why Blockchain is considered superior than previous technologies for digital transactions.

Understanding Bitcoin: Cryptography, engineering and economics

https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf

http://bit.ly/2sVEu2n

http://bit.ly/2sViowL

 

Doing a paper on Blockchain would require a lot more research than can be fit in before my RES701 proposal is due. There are a lot of good papers on Blockchain which i’ve glossed over but it is a subject which i’m not comfortable enough to pursue with my starting knowledge. Topics like Virtualization, Cloud computing, would be better for a research project due to my current level knowledge on those topics.

Potential research topic – Negative effects of computer gaming on adolescent students learning

This research topic popped up as an idea for my research proposal because i have an interest in the topic. I’m not looking at it for a research report but rather just for the research proposal, i think there’d be too many ethical considerations to bother looking in this area.

One of the problems i’ve found with the research in this area is that many of the papers/presenters differ in their idea of what video-games are. For example, the Ted talks presenter seems to speak generally about video games and their benefits then shows evidence of purely educational ones being good for the brain.

Another study links higher usage of gaming consoles to lower GCSE grades but one of the survey questions was based around the number of times per day the student had used the device rather than amount of hours per day.

There seems to be a number of ways the studies measure the effect on adolescent learning but i’ve found from reading the papers that correlation of video game usage with grades seems to be the most consistent measure which is easiest to survey. Most of the research shows that students who spent more time on non-educational video games received lower grades.

There is definitely room for primary research here as long as the type of gaming is clearly defined i.e. Educational video games, Violent video games. The kinds of primary research i could see being useful for this would require ethical consent because participants would most likely be classed as ‘vulnerable participants’ due to age.

VULNERABLE PARTICIPANTS

Informed consent processes may need to take account of vulnerable participants.  Those considered to be vulnerable include children, prisoners, and people with a mental illness, altered state of consciousness or intellectual disability.  Where the vulnerable participant is not competent to give consent, proxy consent must be sought from a person legally representing the person’s interests.  In the case of children, consent must come from both the child’s legal guardian and the child where appropriate.  The vulnerable person’s decision not to participate has priority over any other valid proxy consent.

 

Links examined relating to the topic:

https://www.ncb.org.uk/northern-ireland/projects-and-programmes/ict-and-me

http://www.acsd.org/article/the-effect-of-videogames-on-student-achievement/

https://www.ncbi.nlm.nih.gov/pubmed/17606832

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3974676/#pone.0087943-Swing1

http://dh101.humanities.ucla.edu/DH101Fall12Lab4/archive/files/c1f5d81cba85404ac2a2919f5cb8d58b.pdf

http://www.heri.ucla.edu/PDFs/pubs/Reports/YFCY2009Final_January.pdf

https://www.psychologicalscience.org/media/releases/2010/weis.cfm

 

 

2nd publication exmained

Note: This is not a full review but rather a quicker analysis to see if this publication is suitable enough for the assignment

Publication title:

User acceptance of information technology: system characteristics, user perceptions and behavioral impacts

https://deepblue.lib.umich.edu/bitstream/handle/2027.42/30954/0000626.pdf?sequence=1&isAllowed=y

Authors 

Fred D. Davis

Fred D. Davis published this paper at University of Michigan which is a fairly high ranking university for this field of study. Research on him shows he has done further work in his field.

From the abstract i got the following information very easily:

What is the research topic?

Factors affecting user acceptance of information systems (IS)

What did the authors do?

Examined previous literature and studies about the subject, formed a theory and produced models which were then tested against a real group of people in an organization to form conclusions.

 

What they discovered

Perceived usefulness was almost 50% more influential than ease of use in determining user acceptance of new IS

IE people adopted an IS if they thought it would lead to some sort of gain or benefit

Designers who focus on ease of use should potentially focus more on usefulness of a system.

 

Read the introduction to get the big picture of the area of research, note any words that you don’t understand and look them up. Try to identify from the introduction what ‘research question(s)’ was that the authors were hoping to answer.

There wasn’t any words in the introduction that most people would have to research.

It’s very clear what they’re going to be looking at at in the intro and these are the questions i’ve gathered:

 

Read the conclusion. If this is well written it will be another summary of the paper (a bit like the abstract) but it will focus more on the results and what they seem to mean.

the conclusion is well written and draws from the findings of the research and survey results.

 

Potential publication to analyze for assignment

Note: This is not a full review but rather a quicker analysis to see if this publication is suitable enough for the assignment

Publication title:

INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS

http://aisel.aisnet.org/cgi/viewcontent.cgi?article=2919&context=misq

Authors 

Burcu Bulgurcu  – Sauder School of Business University of British Columbia Vancouver, BC V6T 1Z2 CANADA – burcu.bulgurcu@sauder.ubc.ca

Hasan Cavusoglu – Sauder School of Business University of British Columbia Vancouver, BC V6T 1Z2 CANADA – hasan.cavusoglu@sauder.ubc.ca

Izak Benbasat Sauder – School of Business University of British Columbia Vancouver, BC V6T 1Z2 CANADA – izak.benbasat@sauder.ubc.ca

 

Researching UBC tells me that it’s a high ranking university and checking the emails shows me that they were in fact all registered there at some point. Further research of other field-related publications by each of the authors, and LinkedIn profiles of the authors lead me to believe they are credible to publish information relating to their field of knowledge.

From the abstract i got the following information very easily:

What is the research topic?

Employees in relation to information security and how policies, staff tendencies have an effect on information security.

What did the authors do?

They examined previous literature, research, then generated models & theories which they tested by doing their own research in the form of surveys.

What they discovered

Organizations should create appropriate training and security awareness programs that ensure employees’ information security awareness

Effects of attitude, normative beliefs, and self-efficacy to comply on a customer service employee’s intention to comply and possibly break policy are significant

ISA has a direct significant influence on attitude toward compliance and plays a major role in shaping outcome beliefs

Read the introduction to get the big picture of the area of research, note any words that you don’t understand and look them up. Try to identify from the introduction what ‘research question(s)’ was that the authors were hoping to answer.

There wasn’t any words in the introduction that most people would have to research.

It’s very clear what they’re going to be looking at at in the intro and these are the questions they specifically state:

(1) What are the broad classes of an employee’s beliefs about the overall assessment of consequences of compliance or noncompliance that influence attitude toward compliance and, in turn, intention to comply with the ISP?

(2) What are an employee’s beliefs about the outcomes of compliance and noncompliance that influence beliefs about the overall assessment of consequences?

(3) What is the role of information security awareness (ISA) in shaping an employee’s beliefs about outcomes and attitude toward compliance?

Read the conclusion. If this is well written it will be another summary of the paper (a bit like the abstract) but it will focus more on the results and what they seem to mean.

the conclusion is well written and draws from the findings of the research and survey results.

 

 

Assignment 2 – Finding a suitable paper

I went through a bunch of research papers related to studies containing IT and picked out two that would be most suited for the assignment. I found google scholar a useful tool but i was surprised just how many publications were inaccessible without paying a one off fee. Because of the costs i decided to take Claire’s advice and use the library since they subscribe to such publications.

I followed the criteria for finding papers:

  • 10 pages or less
  • Author has to have done at least some of their own research
  • Single author – don’t want a perfect piece of work to be critical of
  • Post-2008 if possible – must teach me something relevant

 

Finding a Topic to Critically Analyze for Assignment Two

I’ve taken a bit of a holiday from blogging for this class but now that i’ve got other projects out the way i can work on this.

Assignment two is 25 hours – time which will be spent critically analyzing a piece of academic literature using all of the knowledge accumulated up until this point. I’ll definitely do my analysis on an IT topic since that’s what interests me the most, but i think half of the challenge for me will be finding a good IT related paper to critically analyze. It will be a lot harder to critically analyze an IT paper than a history paper for example because IT concepts are set in stone whereas history has many interpretations/stories where any writer bias can be more easily be found.

Tomorrow i will search the internet for academic papers using some advanced search means. I will then find five papers i think will be best suited for the assignment, and narrow it down to one so i can make progress on the assignment and journal.