Question: Environmental security is the tropical area. Topic is remote workers and describe IT security/cyber security issues of remote working/workers to an organization. (Qualitative research )
PARAGRAPH 1: Clearly and explicitly name the topical area within your specialization. Define the topical area based on the current literature.
PARAGRAPH 2: Identify three major or distinct threads within the topical area. For each thread of literature, cite 4 recent empirical studies (3-7 years old) that synthesize the major construct of that theme.
1.2 Research Finding Gap
PARAGRAPH 1: Will be 4-6 sentences in length. For each of the 4-5 empirical articles listed in the chosen thread (from section 1.1):
· Identify the research problem the authors sought to resolve.
· Summarize the results of the empirical study.
PARAGRAPH 2: Articulate the gap – the research problem – the proposed study will fulfill. Present the study (example below) proposed, written properly. Identify the conceptual/theoretical framework for the study.
The proposed study will seek to ________ (understand, describe, develop, discover) the ________ (central phenomenon, experience/event, process) for _______ (the target population).
Provide 3 paragraphs covering the following:
PARAGRAPH 1: Background information on the thread of literature chosen
PARAGRAPH 2: Deeper dive (2-3 sentences) into the thread that logically flows to the research gap
PARAGRAPH 3: Discussion connecting deeper dive findings in previous paragraph to the research problem
2.2 Research Question(s)
State the overarching Research Question in 1 question. For example:
What is the ________ (central phenomenon, experience/event, process) among _______ (the target population of participants) at/in _________ (site/location)?
2.3 Purpose of the Study
INSTRUCTIONS: Complete the following template:
The purpose of this _________________ (generic qualitative inquiry, phenomenological, case study) research is to ________ (understand, describe, develop, discover) the ________ (central phenomenon, experience/event, process) for _______ (the target population of participants such as the individual, groups, organizations) at/in _________ (site/location) informed by the ________(theory or theories). At this stage in the research, the ______ (central phenomenon, event, process) being studied will be generally defined as ____________ (provide a credibly supported definition from a scholarly, peer-reviewed source).
2.4 Research Methodology and Basic Design Overview
The research methodology of the proposed study is qualitative research. [Define what this means through the literature]. The research design proposed is [generic qualitative inquiry, phenomenology, case study]. [Define what your design means through the literature]. [Explain how this approach fits the research gap and research question]. Be sure to include both current and seminal research on methodology and design.
3.1 Theoretical Foundations
Identify the proposed theory and explain what the theory means. Include in this 1-2 paragraph summary: Include citations throughout!
· A definition of the theory
· The genesis (origin) of the theory
· The phenomena that have been studied under this theory
· If the theory has evolved over time (For example, Change Management Theory has evolved into Organizational Change Management Theory).
3.2 Theoretical Implications
Here you will explain how the phenomenon you are studying will contribute to a greater understanding of the theory (see bullet points in left column for specific content expectations).
3.3 Practical Implications
Explain who/what will benefit from your proposed study. For example, if you were giving a presentation on your study, who would you want to be in the audience and why? This should be one paragraph with sufficient citations to support the proposed target audience.
4.1 Research Design
This is a deeper dive into the research design from Section 2.4. Clearly explain both the research method chosen and why that method is appropriate for the lens of your proposed study. Additionally, explain the ontological, epistemological, axiological, and methodological assumptions of your design and why the chosen design best fits the proposed study. Finally, provide step-by-step approach to gathering data using your methodology. This should be a minimum of 2 paragraphs and contain sufficient citation support.
4.2 Population and Sample
4.3 Ethical Considerations
Identify all potential risks to participants within the study and explain how each risk will be mitigated to reduce ethical conflicts. This includes the participants along with any data collected through other providers. Be sure to address the security/privacy/confidentiality of all data and to cite literature associated with this area including The Belmont Report.
In text mention: The Belmont Report (U.S. Department of Health and Human Services, 1979).
U.S. Department of Health and Human Services. (1979). The Belmont report: Ethical principles and guidelines for the protection of human subjects of research (45 CFR 46). Retrieved from http://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/.
This section should be a minimum of 2 paragraphs.
5.1 Data Collection – Sampling Procedures
5.2 Data Collection Procedures
5.3 Guiding Interview Questions
5.4 Data Analysis
5.5 Role of the Researcher
5.6 Credibility, Dependability and Transferability
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more