Verified Document

Third Proposed Research Design For Term Paper

Essentially, this is the concept that data should be collected from different sources in order to help show the same conclusion will be met from different data collection sources. As such, the participants will be asked to bring with them any data they provide in terms of documentation of insider threats, their own notes and strategies to combat those threats, and finalized security briefings that are available for this research review and utilize within the data collection process. It is well-known that some of the data desired here will be too sensitive to actually be used, however, there is a wide enough breadth of options that will allow participants to bring some form of alternative data that can be used to help measure the reliability and validity of the data collected from the interview process. After data collection, data analysis. After each and every interview, the researcher will focus on coding and categorizing the bulk of the interview content by utilizing a number of field notes that were presented by Groenewald (2004) and outlined in Shank (2006). There are four layers of field notes that can be taken during the process of the interviews and directly after that will help with this process. First there are observational notes, which focus on the observation of the interview and the contents seen within it. Then there are theoretical notes, where the researcher begins to pull out...

Third comes methodological notes, which are typically written either before or during the interview process and can help future interviews in terms of reminding the interviewer to do certain things at certain times. Finally, there are analytical notes which are typically written right after the interview had taken place. These are some of the more portal notes for the later coding categorizing particular themes. Abstract summaries of all the interviews are needed in order to be able to categorize them by particular themes. Summaries will also be written for each of the documents the participants supply to augment the interviewing process.
Once field notes are thoroughly taken down and organized, the researcher will then set out to pull out certain codes that can be placed into categories. Several categories from each interview will be pulled out based on the frequency of particular words, digression of topics, and overall tone of the participant during the interview. Summaries will help categorize interview content and documents provided based on certain codes. The ones that are most frequent among a number of different interviews can then be used to make assumptions regarding the nature of insider threats and what should be considered as warnings before they actually are able to cause damage on a cloud computing platform.

Sources used in this document:
In order to ensure reliability and validity, the research is also going to use elements of methodological triangulation. Essentially, this is the concept that data should be collected from different sources in order to help show the same conclusion will be met from different data collection sources. As such, the participants will be asked to bring with them any data they provide in terms of documentation of insider threats, their own notes and strategies to combat those threats, and finalized security briefings that are available for this research review and utilize within the data collection process. It is well-known that some of the data desired here will be too sensitive to actually be used, however, there is a wide enough breadth of options that will allow participants to bring some form of alternative data that can be used to help measure the reliability and validity of the data collected from the interview process.

After data collection, data analysis. After each and every interview, the researcher will focus on coding and categorizing the bulk of the interview content by utilizing a number of field notes that were presented by Groenewald (2004) and outlined in Shank (2006). There are four layers of field notes that can be taken during the process of the interviews and directly after that will help with this process. First there are observational notes, which focus on the observation of the interview and the contents seen within it. Then there are theoretical notes, where the researcher begins to pull out certain theoretical elements found within the interview content. Third comes methodological notes, which are typically written either before or during the interview process and can help future interviews in terms of reminding the interviewer to do certain things at certain times. Finally, there are analytical notes which are typically written right after the interview had taken place. These are some of the more portal notes for the later coding categorizing particular themes. Abstract summaries of all the interviews are needed in order to be able to categorize them by particular themes. Summaries will also be written for each of the documents the participants supply to augment the interviewing process.

Once field notes are thoroughly taken down and organized, the researcher will then set out to pull out certain codes that can be placed into categories. Several categories from each interview will be pulled out based on the frequency of particular words, digression of topics, and overall tone of the participant during the interview. Summaries will help categorize interview content and documents provided based on certain codes. The ones that are most frequent among a number of different interviews can then be used to make assumptions regarding the nature of insider threats and what should be considered as warnings before they actually are able to cause damage on a cloud computing platform.
Cite this Document:
Copy Bibliography Citation

Related Documents

Small Computer Systems Proposed Research
Words: 4808 Length: 15 Document Type: Term Paper

According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and

Self-Analysis of Research Bias
Words: 662 Length: 2 Document Type: Journal

Research instruments fall into two broad categories: those compiled by the researcher him or herself in the form of recorded observations, logs, and rating scales and those completed by the interview subject him or herself in the form of questionnaires and interviews. Regardless of the instruments used, research studies should be guided by acceptable standards of validity and reliability. "Validity is the extent to which an instrument measures what it

Spotlighting Samplings 4 Qualitative Research Choices 6
Words: 16532 Length: 60 Document Type: Research Paper

Spotlighting Samplings 4 Qualitative Research Research Choices 6 the Phenomenology Method The Ethnography Method DEPTH Four Qualitative Approach Comparison Strengths and Critiques of Case Studies "A research design indicates the full research process from conceptualization of the research problem, generation of data, analysis and interpretation of findings, and dissemination of results" (Magilvy & Thomas, 2009, What and Why… Section, ¶ 4). The Question of Interest What type of research design should the researcher use? To answer the study's critical research

The Impact of Using Bilingual Call Compared To Family Interpreters...
Words: 3427 Length: 10 Document Type: Research Paper

Introduction Elderly Hispanic between the ages of 50 to 75 is only eloquent in their native language. They are referred to as Limited English proficient (LEP) patients. As a result, they are disenfranchised due to the language barrier which often necessitates for an interpreter. In urgent medical cases, ad hoc interpreters who are often family members act as interpreters between the patient and the physician. However, the NSW policy stipulates a

Sarbanes-Oxley Research Proposal Abstract the
Words: 1494 Length: 3 Document Type: Term Paper

The use of statistical techniques including t-tests, ANOVA, Pearson's Correlation Coefficient analysis and the use of predictive statistics techniques in addition to those mentioned will be used. Expected Results of Research It is anticipated that the Act will be shown to have a statistically significant effect on smaller firms choosing to stay private, and if they are public already, to choose to either go back to being privately held or be acquired. Further, it is expected

Compiling Research Information Over the
Words: 3685 Length: 12 Document Type: Term Paper

This amount of flexibility helps to give them an edge, in adjusting with a host of challenges they are facing over the long-term. (Hanna, 2009, pp. 30 -- 53) The article that was written by Gruber (2011) is showing how frontline employees play a vital role in addressing the needs of stakeholders. This is because they are directly working with customers, suppliers and third parties on a regular basis. Those

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now