Need an 18 page custom master’s level term paper with at least 15 sources that meets the following requirements. READ CAREFULLY –
Paper must be based on and include the Introduction/Thesis has already been written (Below after —). It may be edited SLIGHTLY, however.
The research paper will be a literature review-based research paper of at least 18 pages comprised of an Introduction, Literature Review, Research Approach, Conclusion and Reference list
The paper is not a work of original research, but it is does propose research based on existing work and the fulfillment of a need in the topic area. This should provide a point of focus for the student who uses the Literature Review to demonstrate a need for research in the topic area. The Research Approach (qualitative, quantitative, or mixed) should be supported by the literature review and appropriate to the topic area.
The paper will utilize the Turabian parenthetical citations-reference-list (author year) style of documentation. THIS MEANS IN-TEXT CITATIONS FOR ARTICLES, BOOKS, AND JOURNALS MUST INCLUDE PAGE NUMBERS.
Introduction (2-3 pages): The Introduction introduces the topic and thesis statement. It provides a brief background and provides the basis for the thesis statement.
Literature Review (8-10 pages): The Literature Review presents existing work in the topic area. History, theories, previous studies, and related work are analyzed and synthesized to back up the thesis statement as well as to justify the Research Approach. MUST INCLUDE AT LEAST 5 IN TEXT DIRECT QUOTES AND/OR BLOCK QUOTES.
Research Approach (2-3 pages): The Research Approach describes your proposed primary research methodology. It should focus on the gathering of data and the analysis of that data. Drawing on your Literature Review, the approach must be justified as appropriate to the content area and the goals of the research project. This proposed research will not be conducted; it is simply an informed recommendation for further research based on the literature review.
Conclusion (1-2 pages): Concludes the paper. The Conclusion demonstrates support of the thesis statement based on the Literature Review and Research Approach.
References: List of references that supports each citation in the paper (DON’T CONFUSE THIS WITH A BIBLOGRAPHY). The reference list needs to be in Turabian parenthetical citations-reference list style. THIS MEANS IN-TEXT CITATIONS FOR ARTICLES, BOOKS, AND JOURNALS MUST INCLUDE PAGE NUMBERS. For an 18 page paper, the Reference List should include at least 15 sources. At least two-thirds (10) of the sources must be from authoritative books/scholarly article sources in order to provide credibility and evidence of library research.
Businesses utilize Information Technology (IT) such as computer hardware and software to run their operations. Even small companies such as a local gift shop have at least one computer that runs accounting or point of service applications. In today’s economy, it is not uncommon to find businesses in virtually every industry utilizing complex IT hardware and software.
There are many examples of IT business applications and hardware. Salesmen use customer relationship management systems to manage interactions with their customers. They may also use applications that identify sales leads to help generate potential new sources of revenue. All of these activities are done with a computer or mobile device. Logistics departments utilize software, which helps match open orders ready for shipment with the cheapest available carrier automatically. Plant managers monitor and tweak their production lines using software specifically designed for manufacturing. Analysts uncover important trends and business insights through business intelligence applications, which pull information from company databases stored on locally owned and maintained servers (Slabeva 2010, 47).
Information technology is vital in helping businesses reduce costs and generate more revenue. In today’s economy, IT hardware and software make it possible to reduce costs. This cost reduction is accomplished through automating and increasing the efficiency of tasks. These tasks often include customer billing and product development. Businesses using IT solutions can increase revenues through business analysis and customer service applications. These businesses may also use marketing options associated with Web applications. In many cases, in a given industry, the company with the best IT hardware and software has the advantage over their competitors in efficiency and opportunities for revenue. They may have access to technology that their competitors do not, or they may utilize the technology that they and their competitors both have more effectively to create the advantage (Armbrust et al. 2009, 14).
IT is now important for all businesses. However, it can be expensive if significant hardware is required, and this can be an obstacle for smaller companies. For example, a large and small shipping company may want to invest in third party sales forecasting software. The software may require investment in expensive software volume licenses, new servers/computers, or IT personnel (Buyya, Yeo & Venugopal 2008, 1). For the large company, finding the money for this is less of a problem than it is for the smaller company. They may even have additional server space, computers, and IT resources already present to handle the implementation of the new software. The smaller company may not have money available to invest in the software, computers, servers, and IT resources necessary to successfully implement the forecasting software (Slabeva 2010, 50).
Currently, the software and servers a business implements must exist close to business’ client computers to maximize the efficiency of application execution (Armbrust et al., 2009). This paradigm is what makes investment in information technology expensive for businesses. All of the software on the client machine in an organization must be installed and updated individually, requiring investment in IT human resources to carry out these responsibilities (Buyya, Yeo & Venugopal 2008, 1). In addition, departments using intricate software may need to invest in high-performance, high-cost computers in order for the software to run properly. Moreover, as this software improves and grows more complex over time, investment in new hardware to replace old, outdated computers may be necessary. Furthermore, business data must be stored on physical servers that require heavy investment to purchase and maintain (Armbrust et al. 2009, 3).
The current information technology paradigm used by most businesses today involves having all data storage and analysis done at the place of business. While this is now a well-accepted practice, it is predicted that in the not-so-distant future, businesses will rapidly shift to the cloud computing. Cloud computing can be understood as a model of operations in which computing is viewed as a service instead of a product. In this paradigm information, software, and data storage are provided to computers and other technology devices as a service. This can be conceptualized as similar to the way electricity is provided to a number of clients over a grid that can be used in many different ways (Armbrust et al. 2009, 12). These services are most commonly provided over the Internet. In the cloud computing model, software and hardware exist as services shared by many companies. Software in the cloud can be accessed by companies through lightweight front-end applications such as a simple web browser, and the majority of the processing of these applications occurs on the third party providers’ machines. All of this will yield reduced costs for businesses through increased technology upward and downward scalability options, cheaper client hardware, and reduced IT human capital cost. In addition, the cloud computing model provides for more rapid updating of technology for businesses. It also increases software availability on various operating systems and mobile devices (Harding 2011, 38, 42-44).
As cloud computing matures, businesses are more likely to invest in cloud based technologies such as remote data storage, because of the significant cost reductions and technology advantages associated with storing data on remote servers operated by third parties (Armbrust et al. 2009, 12). However, many companies are wary of issues inherent in remote data storage such as data security, auditability, and availability. It is the thesis of this paper that the uploading and downloading of information into the cloud are well protected and safe from data abuse. Furthermore, data storage in the cloud is likely to be safe, and these types of concerns should not serve as a deterrent for businesses to use the cloud in this manner. Additional research needs to be done on the safety level of data storage in the cloud. This paper puts forth suggestions for possible research in this area.