Tasks related to advance in research project
In this week, data collection and analysis section is conducted to collect information from various sources in order to find answers to the research issues and then evaluate the research outcomes. Businesses are used of IT to effectively process the information, while due to system failure; there are possibilities of loss of data. Therefore, most of the organization should adopt of backup and disaster recovery plan to prevent the data from being lost and store it into the database system of organization. This week, there is selection of best data collection and analysis methods which would best suit with the research topic.
In this research project, there is used of secondary data collection method approach. The data are collected from the published newspaper, journals as well as online portals. The application of proper set of factors to select this data is used to increase levels of research validity along with reliability. Wallace and Webber (2017) stated that secondary data are collected from other sources and those are reliable. Those data are expensive and those are attainable from different types of published sources. The data are collected from the journal articles which summarizes the selected research questions. The data are collected regarding challenges which are raised into the plan (Alhazmi, 2015). Protection of critical data of the company is not required to continue into daily operations. Development of data backup as well as recovery system is required to successfully store the business information for future reference. The secondary data are available from the sources which are no specific to the collection of methods (Chang, 2015). The advantage of secondary data is that it is easier to available and therefore there are requirement of less time. Authenticity of the secondary data is at highest priority.
Secondary data are of two types such as qualitative as well as quantitative data analysis. The qualitative data are obtained from the newspaper, interview and others. The quantitative data are to be obtained from the survey and statistics. In this research project, qualitative data analysis is used to associate the collected data into words, analyze it critically those are quantifiable (Poulson et al., 2017). This data analysis method ensures to provide greater level of in-depth understanding of the selected research topic. There is development of IT disaster recovery plan into the organization to analyze the challenges faced into the IT organizations. Ghannam (2017) stated that there are challenges regarding development of cloud strategy. There are also issues regarding modernization of legacy applications. Implementation of data backup as well as recovery system makes sure about data protection. The companies prepare for worst by development of disaster recovery plan. Khoshkholghi et al., (2014) discussed that risk assessment is conducted to determine how much of data are acceptable. If it is not a disaster for a company, then it is not required to backup offsite. When the daily data are critical, then plans are made to get data offsite on regular basis. Documentation of the disaster recovery plan is created. Location of data backups is identified (Valiyaparambil et al., 2015). The step to create disaster recovery plan is to test the plan. After the plan is prepared, regular audits are conducted to test the disaster recovery plan.
Collection of data
Sahebjamnia, Torabi and Mansouri (2015) mentioned that there are analyzing of simulation of the disaster. Disaster recovery plan is created with the business continuity planning. Technology recovery methods are created to restore applications, hardware as well as data to meet with the requirements of the business recovery. The IT recovery strategies are developed for information technology system, applications as well as data (Wallace, M., & Webber, 2017). Recovery strategies are developed for anticipation of loss of some system components such as: computer room, hardware, connectivity to the service provider, software applications as well as data restoration. The IT recovery methods are created to restore applications, hardware as well as data to meet with the business recovery (Khoshkholghi et al., 2014). Creation of It recovery plan ensures for survival of the business by reduction of impact of the disaster and failures. Risk analysis enables to reduce the risk, prevent the loss of confidence by both users as well as customers. Into the process to create a plan, there are six steps that are followed to create a disaster recovery plan such as:
- Defining software as well as data of the organization.
- Evaluations of how much time are needed to recover from the disaster.
- Setting of the budget for the disaster recovery (Valiyaparambil et al., 2015).
- Defining acceptance levels and linking productivity to implement the strategies of backup.
- Determining of upstream data which are accounted for failure.
Sahebjamnia, Torabi and Mansouri (2015) concluded that the businesses are generated of larger amounts of data along with data files to change the success criteria of the business organization. The data are lost, compromised as well as stolen throughout the failure of hardware, error from the human side along with hacking in addition to malware. Loss and corruption of the data are resulted into key significant disruption of business. Wallace and Webber (2017) discussed that data backup as well as recovery are considered an integral part of business continuity plan. It is taken also defined as information technology disaster recovery plan. It develops data backup strategies which identify what data are required to backup, select and implement hardware along with software backup processes.
Backup recovery plan is required to identify the data on the network servers, laptop computer in addition to wireless devices which are required to back up with the records of hard copy. This plan required to schedule the backup from the wireless devices to the network server (Sahebjamnia, Torabi & Mansouri, 2015). The data which are on server are required to backup. Back up of the hard copies into digital forms allow keeping the data safe for future.
In the research project, include and exclude are based on research questions. When there is specific research questions for some particular population, then include criteria requires being more specific. Include criteria is used to set predefined characteristics which are used for identification of the subjects those are included into the study (Ghannam, 2017). Include in addition to exclude makes selection used to rule out the target population of the research study. Include consists of specific objective of this study. Proper selection of include of data optimizes both external as well as internal validity of this study along with improvement of feasibility and minimization of ethical concerns.
This research project provides a qualitative analysis of the peer review as emerging research by means of revealing patterns between the authors in addition to fields. Before start to work on the research project, the researcher attends classes, experiences training, reads the textbooks and solves of research set in the research areas. Valiyaparambil et al., (2015) found that applying of formulaic approaches tend to work well in the study for identifying the problems. Design pattern is a solution for the problems.
In the literature review part, there are improvements into the sentences which are lack of clarity. The articles are taken from the Wilmington University Library. The literature review is required to support the research questions. Various articles are reviewed and an outline is made. The part does not include of any tables and figures to locate the article which shows process of recovery plan.
In the methodology paper, the methodology section is improved by using a specific methodology to the research project either quantitative or qualitative. Data collection method is improved to collect data to provide answers to research questions by use of either primary and secondary data. The data are then analyzed by use of particular data analysis methods. Research limitations are missing in the paper, therefore it is added. Some of the parts are provided with in-depth details as well as logical details on the research topic.
References
Alhazmi, O. H. (2015). Computer-aided disaster recovery planning tools (CADRP). International Journal of Computer Science & Security (IJCSS), 9(3), 132-139.
Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc Networks, 35, 65-82.
Ghannam, M. Z. (2017). Challenges and Opportunities of Having an IT Disaster Recovery Plan.
Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., & Othman, M. (2014). Disaster recovery in cloud computing: A survey. Computer and Information Science, 7(4), 39.
Poulson, C. S., Gledhill, J. R., & Ruff, T. A. (2017). U.S. Patent No. 9,787,530. Washington, DC: U.S. Patent and Trademark Office.
Sahebjamnia, N., Torabi, S. A., & Mansouri, S. A. (2015). Integrated business continuity and disaster recovery planning: Towards organizational resilience. European Journal of Operational Research, 242(1), 261-273.
Valiyaparambil, M. K., Singla, A., Sen, V., & Ali, A. (2015). U.S. Patent No. 9,063,822. Washington, DC: U.S. Patent and Trademark Office.
Wallace, M., & Webber, L. (2017). The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. AMACOM Div American Mgmt Assn.