Access over 35 million academic & study documents

Written Interview Revised

Content type
User Generated
Subject
Computer Science
School
University of the Cumberlands
Type
Homework
Rating
Showing Page:
1/4
Running head: WRITTEN INTERVIEW 1
Written Interview
Name:
Institution:
Course Code:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
WRITTEN INTERVIEW 2
Written Interview
1. Area of Research
My master’s in business administration at the Concordia University, St. Paul
included the following areas; marketing management, strategic management, strategic
operations management, marketing management, and data analytics. I also did a minor in IT,
which focused on software development, data security, corporate leadership, and business
intelligence. Further, I have a particular interest in cloud computing, explicitly concerning
information security. In the current world, users of technology are exceptionally vulnerable to
privacy issues, which become sophisticated by the day. Furthermore, the growing use of the
internet of things and artificial intelligence forecasts a prevalence of insecurity in the online
realm. Traditionally, businesses had the privileged of monitoring the flow of data, along with
the more straightforward protection of information. Today, the use of public cloud saves
costs for firms, but at the expense of data security due to the presence of third-party service
providers and hackers. Therefore, firms need to regularly review and streamline their security
systems to safeguard client data. Indeed, my research interest is learning how to integrate
functions like physical data security, firewalls, data encryption, and cloud backup to enhance
information security for businesses.
2. Current Vocation
Currently, I am working as a senior software developer in a technology
corporation. The job entails practices like designing, developing, and installing software,
system analysis, storing information, and problem identification, naming a few. Recent
developments in cloud computing have revealed significant privacy issues in the disclosure,
security, and accessibility of information. Indeed, cloud technology is subject to federal
protection, and providers must adhere to security policies on cloud storage. On the other

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: WRITTEN INTERVIEW 1 Written Interview Name: Institution: Course Code: WRITTEN INTERVIEW 2 Written Interview 1. Area of Research My master’s in business administration at the Concordia University, St. Paul included the following areas; marketing management, strategic management, strategic operations management, marketing management, and data analytics. I also did a minor in IT, which focused on software development, data security, corporate leadership, and business intelligence. Further, I have a particular interest in cloud computing, explicitly concerning information security. In the current world, users of technology are exceptionally vulnerable to privacy issues, which become sophisticated by the day. Furthermore, the growing use of the internet of things and artificial intelligence forecasts a prevalence of insecurity in the online realm. Traditionally, businesses had the privileged of monitoring the flow of data, along with the more straightforward protection of information. Today, the use of public cloud saves costs for firms, but at the expense of data security due to the presence of third-party service providers and hackers. Therefore, firms need to re ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents