Third Proposed Research Design For Term Paper

PAGES
3
WORDS
924
Cite

Essentially, this is the concept that data should be collected from different sources in order to help show the same conclusion will be met from different data collection sources. As such, the participants will be asked to bring with them any data they provide in terms of documentation of insider threats, their own notes and strategies to combat those threats, and finalized security briefings that are available for this research review and utilize within the data collection process. It is well-known that some of the data desired here will be too sensitive to actually be used, however, there is a wide enough breadth of options that will allow participants to bring some form of alternative data that can be used to help measure the reliability and validity of the data collected from the interview process. After data collection, data analysis. After each and every interview, the researcher will focus on coding and categorizing the bulk of the interview content by utilizing a number of field notes that were presented by Groenewald (2004) and outlined in Shank (2006). There are four layers of field notes that can be taken during the process of the interviews and directly after that will help with this process. First there are observational notes, which focus on the observation of the interview and the contents seen within it. Then there are theoretical notes, where the researcher begins to pull out...

...

Third comes methodological notes, which are typically written either before or during the interview process and can help future interviews in terms of reminding the interviewer to do certain things at certain times. Finally, there are analytical notes which are typically written right after the interview had taken place. These are some of the more portal notes for the later coding categorizing particular themes. Abstract summaries of all the interviews are needed in order to be able to categorize them by particular themes. Summaries will also be written for each of the documents the participants supply to augment the interviewing process.
Once field notes are thoroughly taken down and organized, the researcher will then set out to pull out certain codes that can be placed into categories. Several categories from each interview will be pulled out based on the frequency of particular words, digression of topics, and overall tone of the participant during the interview. Summaries will help categorize interview content and documents provided based on certain codes. The ones that are most frequent among a number of different interviews can then be used to make assumptions regarding the nature of insider threats and what should be considered as warnings before they actually are able to cause damage on a cloud computing platform.

Sources Used in Documents:

In order to ensure reliability and validity, the research is also going to use elements of methodological triangulation. Essentially, this is the concept that data should be collected from different sources in order to help show the same conclusion will be met from different data collection sources. As such, the participants will be asked to bring with them any data they provide in terms of documentation of insider threats, their own notes and strategies to combat those threats, and finalized security briefings that are available for this research review and utilize within the data collection process. It is well-known that some of the data desired here will be too sensitive to actually be used, however, there is a wide enough breadth of options that will allow participants to bring some form of alternative data that can be used to help measure the reliability and validity of the data collected from the interview process.

After data collection, data analysis. After each and every interview, the researcher will focus on coding and categorizing the bulk of the interview content by utilizing a number of field notes that were presented by Groenewald (2004) and outlined in Shank (2006). There are four layers of field notes that can be taken during the process of the interviews and directly after that will help with this process. First there are observational notes, which focus on the observation of the interview and the contents seen within it. Then there are theoretical notes, where the researcher begins to pull out certain theoretical elements found within the interview content. Third comes methodological notes, which are typically written either before or during the interview process and can help future interviews in terms of reminding the interviewer to do certain things at certain times. Finally, there are analytical notes which are typically written right after the interview had taken place. These are some of the more portal notes for the later coding categorizing particular themes. Abstract summaries of all the interviews are needed in order to be able to categorize them by particular themes. Summaries will also be written for each of the documents the participants supply to augment the interviewing process.

Once field notes are thoroughly taken down and organized, the researcher will then set out to pull out certain codes that can be placed into categories. Several categories from each interview will be pulled out based on the frequency of particular words, digression of topics, and overall tone of the participant during the interview. Summaries will help categorize interview content and documents provided based on certain codes. The ones that are most frequent among a number of different interviews can then be used to make assumptions regarding the nature of insider threats and what should be considered as warnings before they actually are able to cause damage on a cloud computing platform.


Cite this Document:

"Third Proposed Research Design For" (2012, December 29) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/third-proposed-research-design-for-77230

"Third Proposed Research Design For" 29 December 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/third-proposed-research-design-for-77230>

"Third Proposed Research Design For", 29 December 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/third-proposed-research-design-for-77230

Related Documents

According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and

INTERNET-BASED MANUFACTURING SYSTEM. Design internet-based manufacturing system for the oversea small manufacturing companies Global competitions and rapid changes in the customers' requirements are forcing the manufacturing companies to adopt the Information Technology (IT) for the production and the configuration of manufacturing process. With the increase in demand for more specialized products, the traditional mode of production is no more capable to meet the customers' requirements. In the present competitive market environment,

Research instruments fall into two broad categories: those compiled by the researcher him or herself in the form of recorded observations, logs, and rating scales and those completed by the interview subject him or herself in the form of questionnaires and interviews. Regardless of the instruments used, research studies should be guided by acceptable standards of validity and reliability. "Validity is the extent to which an instrument measures what it

Com. (2006) Nutritional information database retrieved 13 Dec 2006 at Fitday.com. (2006) Nutritional information database retrieved 13 Dec 2006 at < http://fitday.com/> Severson, Kim. (13 Dec 2003) "New York Gets Ready to Count Calories." The New York Times. Retrieved 13 Dec 2006 at Schlosser, Eric. (2005) Fast Food Nation. New York: Harper Perennial. "Supersize Me." (2004). Directed by Morgan Spurlock. "Overweight and Obesity."(2006) CDC: Council for Disease Control. Retrieved 13 Dec 2006 at

Spotlighting Samplings 4 Qualitative Research Research Choices 6 the Phenomenology Method The Ethnography Method DEPTH Four Qualitative Approach Comparison Strengths and Critiques of Case Studies "A research design indicates the full research process from conceptualization of the research problem, generation of data, analysis and interpretation of findings, and dissemination of results" (Magilvy & Thomas, 2009, What and Why… Section, ¶ 4). The Question of Interest What type of research design should the researcher use? To answer the study's critical research

Introduction Elderly Hispanic between the ages of 50 to 75 is only eloquent in their native language. They are referred to as Limited English proficient (LEP) patients. As a result, they are disenfranchised due to the language barrier which often necessitates for an interpreter. In urgent medical cases, ad hoc interpreters who are often family members act as interpreters between the patient and the physician. However, the NSW policy stipulates a