Tuesday, October 15, 2019
Information Security Proposal Essay Example | Topics and Well Written Essays - 500 words
Information Security Proposal - Essay Example This includes the recovery from network downtime. It also includes the plans and security in place for the A paradigm can have various meanings. It refers to ââ¬Å"your basic beliefsâ⬠and your approach to the world which affects the way you define your research and how you collect and analyse data (Collis & Hussey, 2003, p. 47). The research approaches used in the study comprises a mixture of both the ââ¬Å"phenomenological paradigmâ⬠which is also referred to as a ââ¬Å"qualitativeâ⬠approach, and the ââ¬Å"positivistic paradigmâ⬠also known as the ââ¬Å"quantitativeâ⬠approach (Collis & Hussey, 2003, p. 47). As the research will utilize interviews to collect data, it would be advantageous to use both the qualitative and quantitative approaches. This will be useful when conducting interviews, as the phenomenological paradigm helps the researcher to ââ¬Å"get a feel for the key issuesâ⬠and provides ââ¬Å"confidenceâ⬠in the accuracy and depth of the data collected as the main issues have been covered (Saunders & Lewis & Thornhill, 2000, p. 98). Furthermore, working within the positivistic paradigm will assist in measuring the data and the correlation between the variables, and the quantitative research outcome could be measured against existing theory. Using a mixture of approaches and techniques has advantages, as all methods have pros and cons. This means using a triangulation approach, which as Denzin & Lincoln (2000) explain ââ¬Å"has been generally considered a process of using multiple perceptions to clarify meaning, verifying the repeatability of an observation or interpretationâ⬠(p. 443). Using both methods will help ensure that the research outcome is accurate and this ââ¬Å"will lead to greater confidence being placed in your conclusionsâ⬠(Saunders & Lewis & Thornhill, 2000, p. 99). It also reduces the ââ¬Å"possibility of getting the answer wrongâ⬠(Saunders & Lewis & Thornhill, 2000, p. 100). For the research, data will be collected from two types of sources,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.