IT-Web Research Proposal: Data preparation/data collection/numerical experiment design

Research Proposal: Data preparation/data collection/numerical experiment design

Justification for the Empirical Study

The goal of this research paper is to make use of a mixed method that integrates both qualitative and quantitative research methods. A combination of qualitative and quantitative research methods with an exploratory research design is critical, as it will assist the researcher while conducting the process of data collection in a reliable and valid manner (Creswell, 2009). The underlying principle behind the adoption of this research technique is that qualitative research method is used with the objective of understanding a particular phenomenon, thereby enabling the researcher to discover the innermost meaning of the research study (Creswell 2003). For instance, with regards to the current study, the use of this approach shall enable the researcher to resolve the opinions, perspectives, and attitudes on the need to raise awareness against the importance of IT Security, and more so against Vulnerabilities. Moreover, Walker (2005) explains that the choice of a quantitative research strategy is based on the fact that it provides the researcher with a platform from where he/she can carry statistical inferences to the study. In the same vein, it will also allow the researcher to use numerical representations while explaining a phenomenon based on the available observations (Creswell, 2003).

In contrast, qualitative research approach is to be used because it provides insights, which later on allow for the generation of theoretical frameworks (Creswell, 2003; Wilson, 2010). The reason for choosing both qualitative and quantitative research strategy is based on the observation that it allows a researcher to estimate and to relate different variables used in the research (Creswell, 2003; Creswell, 2009). At the same time, the use of both qualitative and quantitative research strategies enables the researcher to make use of the opinions and attitudes of the participants to support the statistical data (Creswell, 2003; Williams 2007). Creswell (2003) further contends that a mixed approach can be helpful in a research study in the sense that it enables the researcher to gain an in-depth understanding of the roles of awareness as regards the importance of IT security in an organization and individual levels.

A new and non-obvious technique /solution to answer the problem

            The current research study is concerned with determining whether raising awareness on the importance of IT Security promotes safe and secure information systems. It is important to note that there are certain practices that organizations can use in a bid to enhance organizational security awareness related to the importance of IT security against related vulnerabilities. Some of the possible practices include training personnel and employees, determining the roles for security awareness and making it an organizational culture to promote security awareness throughout the organization. After collection of data from the sample selected, it would be possible to come up with the best solution to the current problems being experienced as a result of advancement in IT. The proposed solution is for organizations to carry out security awareness as an on-going program to make sure that training and knowledge is not just made available as an annual activity, it is instead applied to maintain a high level of IT security awareness on a daily basis. Moreover, people have become the weakest links in the IT security chain and no amount of the latest security technology can guarantee protection against vulnerabilities and risks (Caldwell, 2013). The proposed solution is appropriate because security technology can protect core systems from technological attacks, but it cannot protect organizations against employees and personnel giving away information on social media networks or using the information making the organization vulnerable. However, creating awareness gives the employees the necessary information required when dealing with IT security in both individual and organizational levels.

Collect Suitable Data For Your Research

Datasets of different characteristics are required while undertaking research study while carrying out experimental case studies. The choice of synthetic data sets is based on the observation that it is essential in meeting certain characteristics that are not found in real data. In this study, the researcher has planned to use synthetic data set because it is generally difficult to get access to real cyber incident data, related to IT security awareness. As part of creating the required data set, the first step is to search for past studies related to the subject under study so as to compile the necessary data. In addition, the most viable data sets are to be used in the study with the intention of answering the research questions.

Synthetic Datasets Description

The generated datasets are formed by the following attributes:

  1. Age –values between 30 and 55 so as to only consider an adult population. This age is suitable because a population within this confine provides reliable data needed to answer the proposed research questions.
  2. Gender: male, female. This is necessary to promote gender equality and minimize sample bias and errors in sampling and data collection.
  3. Industrial group: 15 different organizations such as communication, transportation and manufacturing are ideal for the study. The businesses will be randomly chosen out of the given set of business fields.  Within this set, the most appropriate companies (15) are selected. Notably, the dataset will be used to achieve the study’s objectives.

At the same time, we have different types of data that this study requires that can be accessed through search engines such as Google Scholar among others. After the data has been collected, the researcher will take steps to make sure that there is no data overlap with data used and avoid duplication. For the dataset generated, the researcher is to capture enough materials, which can be applicable in the study. Synthetic data has been chosen because it will allow a fair comparison with other proposed solutions in existing literature. For example, other solutions can be compared with the proposed solutions in terms of the pros and cons to accept or refute the proposed hypothesis.

Experimental Plan

            The primary goal of the experiment is to provide a recommendation concerning the importance of carrying out security awareness as an on-going program to make sure that training and knowledge acquired can be applied to maintain a high level of IT security awareness on a daily basis. The synthetic data sets collected will be useful in determining whether the proposed recommendations are appropriate and feasible when employed and integrated in organizations. It will also be used to determine if synthetic datasets predict the same as the real data collected through the use of questionnaires from the 15 selected companies to be used in the study.  

The significance of the Experiment

The experiment is important because it will enable the researcher to ensure that all the objectives that have been listed have been realized fully, and that the necessary recommendations for the research findings have been provided and explained in-depth.

References

Caldwell, T. (2013). Risky business: why security awareness is crucial for employees. Retrieved from http://www.theguardian.com/media-network/media-network-blog/2013/feb/12/business-cyber-security-risks-employees.

Creswell, J. (2009). Research design: quantitative and qualitative approaches (3nd Ed). California, CA: Thousand Oaks. .

Creswell, J. W. (2003). Research design: qualitative, quantitative, and mixed method approaches. London, UK: SAGE.

Walker, W. (2005). The strengths and weaknesses of research designs involving quantitative measures. Journal of Research in Nursing, 10(5), 571–582.

Williams, C. (2007). Research methods. Journal of Business & Economic Research, 5(3), 65-71.

Wilson, S. (2010). Research is ceremony: indigenous research methods. Nova Scotia, Canada: Fernwood Publishing Co., Ltd