The Difference Between Professionalism And Ethics
VerifiedAdded on 2022/08/20
|23
|5788
|12
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MSc Information Systems Management
IMAT5262 Research, Ethics
& Professionalism in
Computing
Assignment - Project Proposal
Pxxxxxxxx
De Montfort University
IMAT5262 Research, Ethics
& Professionalism in
Computing
Assignment - Project Proposal
Pxxxxxxxx
De Montfort University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Abstract
The main aim of this research is to address the impact of technology on privacy of
professionals working in the IT field and its ethical implications. This report evaluated that IT
professionals faced different ethical issues such as breaches of data and theft of data. It is
also discussed that there are different ethical guidelines that should be considered to avoid
ethical issues. It is also demonstrated that quantitative research would be used to gather
quantitative information related to the impact of technology on the privacy of professionals
working in the IT field and its ethical implications. It is identified that survey through
questionnaire would be used to gather the information regarding research concern. It is also
evaluated that statistical data analysis techniques would be used to analyse the data in a
statistical manner. It is also identified that for completing the project, there would be a need
for 9 weeks in research.
Key Words
IT professionals, ethical implications, privacy, breaches of data, and theft of data
1
Computing
Abstract
The main aim of this research is to address the impact of technology on privacy of
professionals working in the IT field and its ethical implications. This report evaluated that IT
professionals faced different ethical issues such as breaches of data and theft of data. It is
also discussed that there are different ethical guidelines that should be considered to avoid
ethical issues. It is also demonstrated that quantitative research would be used to gather
quantitative information related to the impact of technology on the privacy of professionals
working in the IT field and its ethical implications. It is identified that survey through
questionnaire would be used to gather the information regarding research concern. It is also
evaluated that statistical data analysis techniques would be used to analyse the data in a
statistical manner. It is also identified that for completing the project, there would be a need
for 9 weeks in research.
Key Words
IT professionals, ethical implications, privacy, breaches of data, and theft of data
1
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Contents
1. Background................................................................................................................................3
2. Research questions.................................................................................................................3
3. Literature Review......................................................................................................................3
4. Methodology Review................................................................................................................7
5. Conclusion...............................................................................................................................11
6. References...............................................................................................................................12
APPENDICES...................................................................................................................................14
7. Appendices..............................................................................................................................14
8. Project Plan..............................................................................................................................14
9. Ethical Review Form..............................................................................................................14
10. Consent Form...........................................................................................................................19
11. Pilot study..................................................................................................................................20
2
Computing
Contents
1. Background................................................................................................................................3
2. Research questions.................................................................................................................3
3. Literature Review......................................................................................................................3
4. Methodology Review................................................................................................................7
5. Conclusion...............................................................................................................................11
6. References...............................................................................................................................12
APPENDICES...................................................................................................................................14
7. Appendices..............................................................................................................................14
8. Project Plan..............................................................................................................................14
9. Ethical Review Form..............................................................................................................14
10. Consent Form...........................................................................................................................19
11. Pilot study..................................................................................................................................20
2
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
1. Background
In IT Field Company, privacy is one of the most difficult personal and professional concerns
of modern times. However, privacy cannot be significantly identified without focusing on the
basic foundation regarding ethics. Professional workers cannot reach a meaningful
normative conclusion regarding workplace privacy obligations and rights without a common
and fundamental understanding regarding the ethical basis of justice as well as, thorough
comprehending about the organizational and individual issues and motivations (Veruggio,
Operto, and Bekey, 2016).
In this research, the impact of technology on the privacy of professionals working in the IT
field as well as, ethical implications would be discussed. It is identified that traditional ethical
analysis provides some instructions regarding how to assess the balance between the right
of workers to the privacy and needs of employers for data through which, the workplace
could be managed (De Goede, et. al., 2019).
However, guidance is not similar to the resolution as there is concern about workplace
privacy right. There is a need to draw ethical theory for advancing a mean through which,
feasible ethical balance related to workplace privacy could be addressed. The key focus is
about employee privacy specifically, because it is a critical field in which technology is
spurred through a desire for data and the ease of its assembly. It must make sure that
ethical analysis can remain effective with the possibility to create through innovations
(Leclercq-Vandelannoitte, 2017).
Individual privacy is a significant area that is illustrated clearly as a foundation for unethical
business attitude by the use of technologies. Firms can track the usage of the internet,
purchasing habits, individual movements, and gather individual data regarding millions of
consumers and possible clients. Whereas, governments have used legislation restricting the
set of individual information and permitting persons regarding some control through what
firms can gather and store. In addition, ethical businesses should decide independently of
legislation regarding feasible behavior (Luppicini and So, 2016).
2. Research questions
Following are the research questions:
RQ1: What is the conceptual understanding regarding the privacy of professionals working in
the IT field?
RQ2: How technology can impact on the privacy of professionals working in the IT field?
RQ3: What are the ethical implications to keep the privacy of professionals working in the IT
field?
3. Literature Review
According to Bredenoord Clevers and Knoblich (2017), data privacy protection could be
complex because of social technological risk and new security issues. This uncertainty exists
3
Computing
1. Background
In IT Field Company, privacy is one of the most difficult personal and professional concerns
of modern times. However, privacy cannot be significantly identified without focusing on the
basic foundation regarding ethics. Professional workers cannot reach a meaningful
normative conclusion regarding workplace privacy obligations and rights without a common
and fundamental understanding regarding the ethical basis of justice as well as, thorough
comprehending about the organizational and individual issues and motivations (Veruggio,
Operto, and Bekey, 2016).
In this research, the impact of technology on the privacy of professionals working in the IT
field as well as, ethical implications would be discussed. It is identified that traditional ethical
analysis provides some instructions regarding how to assess the balance between the right
of workers to the privacy and needs of employers for data through which, the workplace
could be managed (De Goede, et. al., 2019).
However, guidance is not similar to the resolution as there is concern about workplace
privacy right. There is a need to draw ethical theory for advancing a mean through which,
feasible ethical balance related to workplace privacy could be addressed. The key focus is
about employee privacy specifically, because it is a critical field in which technology is
spurred through a desire for data and the ease of its assembly. It must make sure that
ethical analysis can remain effective with the possibility to create through innovations
(Leclercq-Vandelannoitte, 2017).
Individual privacy is a significant area that is illustrated clearly as a foundation for unethical
business attitude by the use of technologies. Firms can track the usage of the internet,
purchasing habits, individual movements, and gather individual data regarding millions of
consumers and possible clients. Whereas, governments have used legislation restricting the
set of individual information and permitting persons regarding some control through what
firms can gather and store. In addition, ethical businesses should decide independently of
legislation regarding feasible behavior (Luppicini and So, 2016).
2. Research questions
Following are the research questions:
RQ1: What is the conceptual understanding regarding the privacy of professionals working in
the IT field?
RQ2: How technology can impact on the privacy of professionals working in the IT field?
RQ3: What are the ethical implications to keep the privacy of professionals working in the IT
field?
3. Literature Review
According to Bredenoord Clevers and Knoblich (2017), data privacy protection could be
complex because of social technological risk and new security issues. This uncertainty exists
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
for abuse of technology that could be implemented to process and store the information. For
instance, considering the firm universal serial bus (USB) system home for individual
convenience may create risk about breaching the regulation of company where no firm
belongings shall leave firm premises in spite of authorization. This risk can become a data
threat when USB incorporates confidential firm information such as data regarding marketing
approach, records of personnel performance as well as, employee information like date of
birth and employee address. There is risk to take USB such as theft or loss.
Definition of Privacy
In the view of Quinn (2017), privacy could be illustrated as a personal situation of life that is
featured through exclusion from the persuasive. The aspect follows through the right to be
left alone as well as, states that there is a perception about privacy that sets the courses in
order to pass the privacy laws. In such a manner, privacy can be illustrated as natural right
that facilitates foundation for lawful rights. There is a right for privacy and is hence protected
under the privacy regulation.
On the other side, Manjikian (2017) stated that privacy could be significant right because it is
a required condition for other authority like personal autonomy. There is an association
between human dignity, privacy, as well as, freedom. There is a need to respect the privacy
of the individual and need to acknowledge the right of individuals to freedom as well as,
recognizing that individual as an independent person.
Different Categories of Private Information
According to Lowry Dinev and Willison (2017), privacy is illustrated as the entirety of data
that is applicable for an individual in the state related to isolation. There is fact that privacy
could be demonstrated by means of data that implies it is significant for distinguishing
different classes of privacy such as private communication and data that is associated with a
body of an individual for privacy, other personal data, as well as, information with respect to
possessions of an individual. Along with this, each of these classes is briefly described as
follow:
Private communications
On the other hand, Weckert (2017) evaluated that this class of privacy concerns is related to
all forms of personal communication where an individual wants to keep private. The data can
exchange at the time of reference interview among user and data professional that could be
identified as an instance.
Personal information
Patterson Wilkins and Painter (2018) have illustrated as those classes of data that refer to
only that specific individual such as financial information and bibliographic (name and
address). This kind of data is regarding the relevance of all classes about data professionals.
It is also highly associated with property rights. As per this, an individual does have control of
4
Computing
for abuse of technology that could be implemented to process and store the information. For
instance, considering the firm universal serial bus (USB) system home for individual
convenience may create risk about breaching the regulation of company where no firm
belongings shall leave firm premises in spite of authorization. This risk can become a data
threat when USB incorporates confidential firm information such as data regarding marketing
approach, records of personnel performance as well as, employee information like date of
birth and employee address. There is risk to take USB such as theft or loss.
Definition of Privacy
In the view of Quinn (2017), privacy could be illustrated as a personal situation of life that is
featured through exclusion from the persuasive. The aspect follows through the right to be
left alone as well as, states that there is a perception about privacy that sets the courses in
order to pass the privacy laws. In such a manner, privacy can be illustrated as natural right
that facilitates foundation for lawful rights. There is a right for privacy and is hence protected
under the privacy regulation.
On the other side, Manjikian (2017) stated that privacy could be significant right because it is
a required condition for other authority like personal autonomy. There is an association
between human dignity, privacy, as well as, freedom. There is a need to respect the privacy
of the individual and need to acknowledge the right of individuals to freedom as well as,
recognizing that individual as an independent person.
Different Categories of Private Information
According to Lowry Dinev and Willison (2017), privacy is illustrated as the entirety of data
that is applicable for an individual in the state related to isolation. There is fact that privacy
could be demonstrated by means of data that implies it is significant for distinguishing
different classes of privacy such as private communication and data that is associated with a
body of an individual for privacy, other personal data, as well as, information with respect to
possessions of an individual. Along with this, each of these classes is briefly described as
follow:
Private communications
On the other hand, Weckert (2017) evaluated that this class of privacy concerns is related to
all forms of personal communication where an individual wants to keep private. The data can
exchange at the time of reference interview among user and data professional that could be
identified as an instance.
Personal information
Patterson Wilkins and Painter (2018) have illustrated as those classes of data that refer to
only that specific individual such as financial information and bibliographic (name and
address). This kind of data is regarding the relevance of all classes about data professionals.
It is also highly associated with property rights. As per this, an individual does have control of
4
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
data that is associated with personal possessions in some instances. For instance, an
individual can keep the privacy of data regarding the places in which, a wallet is maintained.
The impact of technology on processes of personal and private data
Definition of Information Technology
In contrast to this, Stahl (2019) stated that before influencing about application of technology
in processing related to personal as well as, private data could be dealt. It is significant to
concisely pay focus on concept technology. In addition, information technology is related to
collecting, organizing, storage as well as, distribution of data in different formats through
indications of computer and telecommunications tools as per micro-electronics.
The Ethical Implications for application of Technology in Processing of data
In the view of Friedman and Hendry (2019), although technology has a higher effect on
collecting, storage, retrieval as well as, dissemination of data, its key ethical impact is
associated with inaccessibility or accessibility along with, data manipulation. It develops
possibility about wider and concurrent access of data. Through the implication, it is
becoming easier for accessing the private data of an individual by more individuals. In
contrast to this, an individual could be excluded through the required data in electronic
format through an indication of different security measures like passwords. The impact
related to the application of technology on individual privacy may manifest itself in different
fields.
On the other side, Wilkins (2018) stated that electronic assessment about an individual
within an organization is associated with personal data. It is performed through so-called
automated judgments. The justification through firms for application of such technology can
increase productivity. However, there is an ethical problem that pertains to the application of
these technologies. The privacy of an individual in an organization can threat by these
systems. It could lead to fear of feeling and of all ways that are known as a panopticon
situation.
In the opinion of Ferguson Thornley and Gibb (2016), reading and interception of e-mail
messages pose an ethical issue that is associated with private communication of a person. It
can technically prospect for intercepting the e-mail message as well as, reading thereof is
justified through firm since they initially see technology infrastructure as a resource that
belongs to firm and not individual. In addition to this, messages can be intercepted to identify
an individual to see whether they practice facility for private causes and to perform their task.
Main Ethical Issues
According to Stanton et al. (2017), in processing and handling of different sorts of personal
and private information, professionals working in IT fields can face different ethical concerns.
There is a need to decide the class of personal and private data in professional working. The
confidential treatment of these data is a key issue that is specifically increasing the data
5
Computing
data that is associated with personal possessions in some instances. For instance, an
individual can keep the privacy of data regarding the places in which, a wallet is maintained.
The impact of technology on processes of personal and private data
Definition of Information Technology
In contrast to this, Stahl (2019) stated that before influencing about application of technology
in processing related to personal as well as, private data could be dealt. It is significant to
concisely pay focus on concept technology. In addition, information technology is related to
collecting, organizing, storage as well as, distribution of data in different formats through
indications of computer and telecommunications tools as per micro-electronics.
The Ethical Implications for application of Technology in Processing of data
In the view of Friedman and Hendry (2019), although technology has a higher effect on
collecting, storage, retrieval as well as, dissemination of data, its key ethical impact is
associated with inaccessibility or accessibility along with, data manipulation. It develops
possibility about wider and concurrent access of data. Through the implication, it is
becoming easier for accessing the private data of an individual by more individuals. In
contrast to this, an individual could be excluded through the required data in electronic
format through an indication of different security measures like passwords. The impact
related to the application of technology on individual privacy may manifest itself in different
fields.
On the other side, Wilkins (2018) stated that electronic assessment about an individual
within an organization is associated with personal data. It is performed through so-called
automated judgments. The justification through firms for application of such technology can
increase productivity. However, there is an ethical problem that pertains to the application of
these technologies. The privacy of an individual in an organization can threat by these
systems. It could lead to fear of feeling and of all ways that are known as a panopticon
situation.
In the opinion of Ferguson Thornley and Gibb (2016), reading and interception of e-mail
messages pose an ethical issue that is associated with private communication of a person. It
can technically prospect for intercepting the e-mail message as well as, reading thereof is
justified through firm since they initially see technology infrastructure as a resource that
belongs to firm and not individual. In addition to this, messages can be intercepted to identify
an individual to see whether they practice facility for private causes and to perform their task.
Main Ethical Issues
According to Stanton et al. (2017), in processing and handling of different sorts of personal
and private information, professionals working in IT fields can face different ethical concerns.
There is a need to decide the class of personal and private data in professional working. The
confidential treatment of these data is a key issue that is specifically increasing the data
5
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
through reference interviews. The key ethical issues in this regard are related to a personal
description, obtained through a reference interview that could be used for specific purposes
as compared to collected data.
On the other hand, De Padirac (2018) evaluated that the accuracy of data is a key ethical
issue and it can create specific significance in cases in which, data professional is
performing to personal data that could have direct impact on life of individuals. For example,
it is handling regarding medical data.
Applicable Ethical Norms
As per the view of Dörr and Hollnbuchner (2017), truth is illustrated as an ethical norm that
has dual moral use. Initially, it deals as a norm for accurate exactness of data. As a norm, it
can instruct data professional about accurate and factually feasible treatment of private data.
In second place, the truth could be about appearance related to virtues of ethics like
trustworthiness, openness, and honesty.
On the other side, Leclercq-Vandelannoitte (2019) stated that freedom is the norm of
individuals that gives freedom to make selections with respect to privacy and intrusion.
However, it cannot be related to absolutize. Hence, the selection of privacy from intrusion
could not be restricted freedom of others.
In the view of Finn and Wright (2016), the human rights norm is associated with freedom
however could be regarded as a more concrete application norm. It can be applied to privacy
that indicates juridical acknowledgment as well as, protection related to right of an individual
to privacy. As an individual, human rights can protect the person from unlawful interferences
through society in the private life of a person.
Ethical Guidelines for Data Professional
As per the opinion of Van Hoof et al. (2018), as a response about autonomy and freedom of
a person, professional data should act on assumption. For example, a client could be
considered as confidential all private as well as, personal data that can be handled through
professional data. It implies that data professional can acknowledge right of client for
controlling to specific degree any private as well as, personal data that is relied on the norm
of freedom.
On the other side, McGuire and Holt (2017) evaluated that merging about personal and other
private data of a person into several databases as compared to one for which, it was initially
gathered should be performed with required caution. It is particularly appropriate in the
condition in which client is not aware about such merging and implications thereof. However,
it gives the right to the client to access the data on the central database as well as, chance
to change the incorrect data and right to understand who is practicing the data and purpose
of these use have relied on norms related to human rights, truth, and freedom.
6
Computing
through reference interviews. The key ethical issues in this regard are related to a personal
description, obtained through a reference interview that could be used for specific purposes
as compared to collected data.
On the other hand, De Padirac (2018) evaluated that the accuracy of data is a key ethical
issue and it can create specific significance in cases in which, data professional is
performing to personal data that could have direct impact on life of individuals. For example,
it is handling regarding medical data.
Applicable Ethical Norms
As per the view of Dörr and Hollnbuchner (2017), truth is illustrated as an ethical norm that
has dual moral use. Initially, it deals as a norm for accurate exactness of data. As a norm, it
can instruct data professional about accurate and factually feasible treatment of private data.
In second place, the truth could be about appearance related to virtues of ethics like
trustworthiness, openness, and honesty.
On the other side, Leclercq-Vandelannoitte (2019) stated that freedom is the norm of
individuals that gives freedom to make selections with respect to privacy and intrusion.
However, it cannot be related to absolutize. Hence, the selection of privacy from intrusion
could not be restricted freedom of others.
In the view of Finn and Wright (2016), the human rights norm is associated with freedom
however could be regarded as a more concrete application norm. It can be applied to privacy
that indicates juridical acknowledgment as well as, protection related to right of an individual
to privacy. As an individual, human rights can protect the person from unlawful interferences
through society in the private life of a person.
Ethical Guidelines for Data Professional
As per the opinion of Van Hoof et al. (2018), as a response about autonomy and freedom of
a person, professional data should act on assumption. For example, a client could be
considered as confidential all private as well as, personal data that can be handled through
professional data. It implies that data professional can acknowledge right of client for
controlling to specific degree any private as well as, personal data that is relied on the norm
of freedom.
On the other side, McGuire and Holt (2017) evaluated that merging about personal and other
private data of a person into several databases as compared to one for which, it was initially
gathered should be performed with required caution. It is particularly appropriate in the
condition in which client is not aware about such merging and implications thereof. However,
it gives the right to the client to access the data on the central database as well as, chance
to change the incorrect data and right to understand who is practicing the data and purpose
of these use have relied on norms related to human rights, truth, and freedom.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
In view of Chang Shi and Zhang (2019), the data professional should inform the client openly
about the intended intention of the application of all private and personal data. It implies to
the permission of the client. There are several avenues that exist to seek this permission. It
also prefers the technique of implied informed consent.
In contrast to this, Bruynseels et al. (2018) illustrated that corporation that has gathered data
about an individual must persistently inform that an individual regarding the different
application of data. Furthermore, clients should be provided a chance to consent among
users and to withhold their agreement. Moreover, burden is about a client to response as
well as, inadequate response consider consent. But, client should be granted chance to
withdraw consent as per norms of freedom as well as, rights of humans.
4. Methodology Review
SECTION 1 - REVIEW
Research approaches
Qualitative Research
It is related to the exploratory investigation that is implemented to increase the knowledge
related to fundamental opinions, reasons, and motivations. It facilitates insights into issues
and supports to create hypotheses and ideas about possible qualitative research. It is used
for uncovering the trends in views and ideas together with, creates depth into the issue
(Quinlan, et. al., 2019).
Qualitative data collection techniques vary through the application of semi-structured or
unstructured tools. There are some common techniques such as observations, focus groups,
as well as, individual interviews. The size of sample for this is small and respondents are
selected to meet given quota. The qualitative investigation has the requirement for labour-
intensive analysis procedures like recoding and categorization. In the same manner,
qualitative research has the need for proficient investigators in order to obtain targeted
information through a set of participants. Moreover, several conclusions are derived as per
the same data that is relied on the personal features of the investigator (Hair Jr, Page, and
Brunsveld, 2019).
Quantitative Research
Quantitative research is executed for measuring issue through manner of developing
statistical data, which could be changed into usable statistics. It is implemented for
measuring the opinions, behaviours, attitudes, and other specified variables as well as,
generalizes the outcomes from a larger sample population (Bell, Bryman, and Harley, 2018).
In addition to this, quantitative research implements measurable information in order to
formulate data and uncover the outlines in an investigation. This method is highly structured
as compared to qualitative data gathering techniques. There are different methods such as
different kinds of surveys such as mobile surveys, paper surveys, kiosk surveys, telephone
7
Computing
In view of Chang Shi and Zhang (2019), the data professional should inform the client openly
about the intended intention of the application of all private and personal data. It implies to
the permission of the client. There are several avenues that exist to seek this permission. It
also prefers the technique of implied informed consent.
In contrast to this, Bruynseels et al. (2018) illustrated that corporation that has gathered data
about an individual must persistently inform that an individual regarding the different
application of data. Furthermore, clients should be provided a chance to consent among
users and to withhold their agreement. Moreover, burden is about a client to response as
well as, inadequate response consider consent. But, client should be granted chance to
withdraw consent as per norms of freedom as well as, rights of humans.
4. Methodology Review
SECTION 1 - REVIEW
Research approaches
Qualitative Research
It is related to the exploratory investigation that is implemented to increase the knowledge
related to fundamental opinions, reasons, and motivations. It facilitates insights into issues
and supports to create hypotheses and ideas about possible qualitative research. It is used
for uncovering the trends in views and ideas together with, creates depth into the issue
(Quinlan, et. al., 2019).
Qualitative data collection techniques vary through the application of semi-structured or
unstructured tools. There are some common techniques such as observations, focus groups,
as well as, individual interviews. The size of sample for this is small and respondents are
selected to meet given quota. The qualitative investigation has the requirement for labour-
intensive analysis procedures like recoding and categorization. In the same manner,
qualitative research has the need for proficient investigators in order to obtain targeted
information through a set of participants. Moreover, several conclusions are derived as per
the same data that is relied on the personal features of the investigator (Hair Jr, Page, and
Brunsveld, 2019).
Quantitative Research
Quantitative research is executed for measuring issue through manner of developing
statistical data, which could be changed into usable statistics. It is implemented for
measuring the opinions, behaviours, attitudes, and other specified variables as well as,
generalizes the outcomes from a larger sample population (Bell, Bryman, and Harley, 2018).
In addition to this, quantitative research implements measurable information in order to
formulate data and uncover the outlines in an investigation. This method is highly structured
as compared to qualitative data gathering techniques. There are different methods such as
different kinds of surveys such as mobile surveys, paper surveys, kiosk surveys, telephone
7
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
interviews, systematic observations, website interceptors, online polls, and longitudinal
studies (Gray, 2019). This technique could be limited in its chase of concrete and statistical
association that can lead to an investigator that can overlook the wider themes as well as,
associations. By emphasizing numbers, a researcher can run risk of missing unexpected
and large picture data, which could advantage the business (Fuller, et. al., 2016).
Techniques for data collection
Following are different techniques of data collection:
Focus groups:
It is highly implemented qualitative methods that can be considered in data gathering.
Moreover, a focus group can consider the limited amount of participants from within the
target market. The key aim of the focus group is to address the answers to the way what and
how questions. The key benefit of using this technique is that there is no need to
communicate with group in an individual (Teagarden, Von Glinow, and Mellahi, 2018). In
current times, the focus group could be sent to an online survey on different systems and
responses could be gathered at the click of a button. This is an expensive technique rather
than other qualitative research techniques. It could be used for explaining complex
procedures. This technique is effective while it comes to market investigation on new
products as well as, testing new aspects (Delen and Zolbanin, 2018).
Case study research:
The case study technique has developed over previous periods and created valuable
qualitative research techniques. It could be implemented in order to illustrate the entity and
organization. This kind of research technique is implemented within different areas such as
social sciences and education. This technique could look complex to deal however it is one
of different manners for conducting an investigation since it considers the deep diver as well
as, thorough comprehension about data-gathering techniques as well as, inferring the
information (Gray, 2019).
Interview
The interview technique could be developed to yield perfect sample about overall population.
Since virtually everyone could be reached through and could respond towards strategy. It
would be remembered that questionnaire strategy can be strictly limited through fact that
only well-educated an individual could be protected through it. Moreover, application of the
interview technique makes sure the higher amount of usable returns in comparison to other
techniques (Hair Jr, Page, and Brunsveld, 2019. There is a need to return visits for
comprehensive items about schedule and correct mistakes could be developed without
annoying to informants. However, efficacy for interviews is relied on thorough skills and
training of interviewers as on demanding administration over them. The data recorded could
be incomplete and inaccurate (Teagarden, Von Glinow, and Mellahi, 2018).
8
Computing
interviews, systematic observations, website interceptors, online polls, and longitudinal
studies (Gray, 2019). This technique could be limited in its chase of concrete and statistical
association that can lead to an investigator that can overlook the wider themes as well as,
associations. By emphasizing numbers, a researcher can run risk of missing unexpected
and large picture data, which could advantage the business (Fuller, et. al., 2016).
Techniques for data collection
Following are different techniques of data collection:
Focus groups:
It is highly implemented qualitative methods that can be considered in data gathering.
Moreover, a focus group can consider the limited amount of participants from within the
target market. The key aim of the focus group is to address the answers to the way what and
how questions. The key benefit of using this technique is that there is no need to
communicate with group in an individual (Teagarden, Von Glinow, and Mellahi, 2018). In
current times, the focus group could be sent to an online survey on different systems and
responses could be gathered at the click of a button. This is an expensive technique rather
than other qualitative research techniques. It could be used for explaining complex
procedures. This technique is effective while it comes to market investigation on new
products as well as, testing new aspects (Delen and Zolbanin, 2018).
Case study research:
The case study technique has developed over previous periods and created valuable
qualitative research techniques. It could be implemented in order to illustrate the entity and
organization. This kind of research technique is implemented within different areas such as
social sciences and education. This technique could look complex to deal however it is one
of different manners for conducting an investigation since it considers the deep diver as well
as, thorough comprehension about data-gathering techniques as well as, inferring the
information (Gray, 2019).
Interview
The interview technique could be developed to yield perfect sample about overall population.
Since virtually everyone could be reached through and could respond towards strategy. It
would be remembered that questionnaire strategy can be strictly limited through fact that
only well-educated an individual could be protected through it. Moreover, application of the
interview technique makes sure the higher amount of usable returns in comparison to other
techniques (Hair Jr, Page, and Brunsveld, 2019. There is a need to return visits for
comprehensive items about schedule and correct mistakes could be developed without
annoying to informants. However, efficacy for interviews is relied on thorough skills and
training of interviewers as on demanding administration over them. The data recorded could
be incomplete and inaccurate (Teagarden, Von Glinow, and Mellahi, 2018).
8
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Survey through questionnaire
Surveys are informal to create particularly while practicing the advanced survey software
solutions that are available in current times. There are different investigators who are
tempted to perform much of their data gathering through online. But, it cannot be always
preferred techniques of data gathering particularly when participants are hard to reach the
fields. Whether an investigator practices an online survey, paper survey, mobile survey, and
integration of all modes, the method can rely on the kind of investigation and demographics
of participants (Delen and Zolbanin, 2018).
A survey is beneficial for relatively easy to manage and could be created in less time period
as compared to other data gathering techniques. This mode is cost-effective however cost
relies on the survey technique. However, options of survey questions can lead to unclear
information since some answer options could be interpreted distinctly through participants. In
addition to this, surveys related to close-ended questions could have a lower rate of validity
as compared to other types of questions (Teagarden, et. al., 2018).
Observation
Observation is a mode for gathering information through observing. In addition to this, the
observation data collection technique could be classified as a participatory investigation
since an investigator has to immerse themselves in a setting in which participants are related
to taking notes and recording (Fuller, et. al., 2016).
The benefits of this data collection technique are direct access to investigation phenomena,
higher extents of flexibility in the context of application as well as, creating permanent record
of phenomena could be referred to later. It could be disadvantageous for longer time needs,
higher extents of observer bias, and affects an observer on primary information in a manner
that presents the observer. It could influence behaviour to elements of sample groups. The
key limitation of using this approach is that it could make the subjects conscious to detriment
the unaffectedness about behaviour where an observer wants to perceive. An investigator
has to weigh cautiously that relatively gains and losses to these two strategies before
employing to anyone (Quinlan, et. al., 2019).
Analysis methods
Statistical data analysis
Statistical techniques are related to mathematical models and techniques that are
implemented in the statistical assessment of raw research information. The use of statistical
techniques can extract the data from research data and facilitates the different manners for
evaluating the robustness of investigation outputs. The benefit is that they are accurate and
parameters like a mean and the standard deviation is related to exact measurement about
population such as it is unlike to statistic that can merely estimate. The benefit is about
9
Computing
Survey through questionnaire
Surveys are informal to create particularly while practicing the advanced survey software
solutions that are available in current times. There are different investigators who are
tempted to perform much of their data gathering through online. But, it cannot be always
preferred techniques of data gathering particularly when participants are hard to reach the
fields. Whether an investigator practices an online survey, paper survey, mobile survey, and
integration of all modes, the method can rely on the kind of investigation and demographics
of participants (Delen and Zolbanin, 2018).
A survey is beneficial for relatively easy to manage and could be created in less time period
as compared to other data gathering techniques. This mode is cost-effective however cost
relies on the survey technique. However, options of survey questions can lead to unclear
information since some answer options could be interpreted distinctly through participants. In
addition to this, surveys related to close-ended questions could have a lower rate of validity
as compared to other types of questions (Teagarden, et. al., 2018).
Observation
Observation is a mode for gathering information through observing. In addition to this, the
observation data collection technique could be classified as a participatory investigation
since an investigator has to immerse themselves in a setting in which participants are related
to taking notes and recording (Fuller, et. al., 2016).
The benefits of this data collection technique are direct access to investigation phenomena,
higher extents of flexibility in the context of application as well as, creating permanent record
of phenomena could be referred to later. It could be disadvantageous for longer time needs,
higher extents of observer bias, and affects an observer on primary information in a manner
that presents the observer. It could influence behaviour to elements of sample groups. The
key limitation of using this approach is that it could make the subjects conscious to detriment
the unaffectedness about behaviour where an observer wants to perceive. An investigator
has to weigh cautiously that relatively gains and losses to these two strategies before
employing to anyone (Quinlan, et. al., 2019).
Analysis methods
Statistical data analysis
Statistical techniques are related to mathematical models and techniques that are
implemented in the statistical assessment of raw research information. The use of statistical
techniques can extract the data from research data and facilitates the different manners for
evaluating the robustness of investigation outputs. The benefit is that they are accurate and
parameters like a mean and the standard deviation is related to exact measurement about
population such as it is unlike to statistic that can merely estimate. The benefit is about
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
obtaining parameters for the larger population. It could be time and cost consuming (Bell,
Bryman, and Harley, 2018).
Thematic analysis
The thematic analysis provides a researcher a flexible way for data analysis and permits an
investigator with several methodological backgrounds and engaging in such kind of analysis.
It facilitates a vast flexible amount when there is flexible thematic analysis. It could lead to
inconsistency as well as, lack of coherence while creating themes originated from the
investigation (Hair Jr, Page, and Brunsveld, 2019).
SECTION 2 - SELECTION
Methodology will be used in the proposal
In this proposal, different methods would be used such as quantitative, survey through a
questionnaire, and statistical data analysis technique as it helps to capture the information
about the impact of technology on privacy of professionals working in IT field and its ethical
implications (Gray, 2019).
Reasoning for selection
The quantitative approach would be selected because it would provide the chances to arrive
at higher sample size. In such a manner, it would be possible for sound generalize
conclusion and it would be considered as a more trustworthy and robust technique. It would
also permit higher objectivity as well as, the accuracy of outcomes related to the impact of
technology on privacy about professionals working in IT field and its ethical implications
(Delen and Zolbanin, 2018).
A survey through questionnaires would be selected since it facilitates a comparatively
prompt, cheap, as well as, effective manner for creating a higher amount of data from the
higher sample size. The questionnaire would serve for recording the performance to a
selected group of individuals in a specific field, gather opinions, and general feedback
(Teagarden, et. al., 2018).
Statistical data analysis method would be chosen since statistical understanding will support
the researcher to practice the proper techniques to gather information about the impact of
technology on privacy about professionals working in the IT field and its ethical implications
(Hair Jr, Page, and Brunsveld, 2019).
Statistical analysis would consider gathering as well as, scrutinizing each data sample in set
of items where, samples could be considered. An investigator would practice the data
analysis such as normality test (deciding to practice parametric/non-parametric statistics),
reliability test (Cronbach Alpha / Composite Reliability), descriptive statistics, and Pearson /
Spearman correlational test (Delen and Zolbanin, 2018).
10
Computing
obtaining parameters for the larger population. It could be time and cost consuming (Bell,
Bryman, and Harley, 2018).
Thematic analysis
The thematic analysis provides a researcher a flexible way for data analysis and permits an
investigator with several methodological backgrounds and engaging in such kind of analysis.
It facilitates a vast flexible amount when there is flexible thematic analysis. It could lead to
inconsistency as well as, lack of coherence while creating themes originated from the
investigation (Hair Jr, Page, and Brunsveld, 2019).
SECTION 2 - SELECTION
Methodology will be used in the proposal
In this proposal, different methods would be used such as quantitative, survey through a
questionnaire, and statistical data analysis technique as it helps to capture the information
about the impact of technology on privacy of professionals working in IT field and its ethical
implications (Gray, 2019).
Reasoning for selection
The quantitative approach would be selected because it would provide the chances to arrive
at higher sample size. In such a manner, it would be possible for sound generalize
conclusion and it would be considered as a more trustworthy and robust technique. It would
also permit higher objectivity as well as, the accuracy of outcomes related to the impact of
technology on privacy about professionals working in IT field and its ethical implications
(Delen and Zolbanin, 2018).
A survey through questionnaires would be selected since it facilitates a comparatively
prompt, cheap, as well as, effective manner for creating a higher amount of data from the
higher sample size. The questionnaire would serve for recording the performance to a
selected group of individuals in a specific field, gather opinions, and general feedback
(Teagarden, et. al., 2018).
Statistical data analysis method would be chosen since statistical understanding will support
the researcher to practice the proper techniques to gather information about the impact of
technology on privacy about professionals working in the IT field and its ethical implications
(Hair Jr, Page, and Brunsveld, 2019).
Statistical analysis would consider gathering as well as, scrutinizing each data sample in set
of items where, samples could be considered. An investigator would practice the data
analysis such as normality test (deciding to practice parametric/non-parametric statistics),
reliability test (Cronbach Alpha / Composite Reliability), descriptive statistics, and Pearson /
Spearman correlational test (Delen and Zolbanin, 2018).
10
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
5. Conclusion
From the above interpretation, it can be concluded that technology has both positive and
negative impacts on the privacy of professionals working in the IT field. It can be
summarised that technology can aid to secure the data in longer-term but at the same time,
there is a risk of breach of private and personal data in case of the insensitive password. It
can be concluded that there is a need for IT professionals to consider ethical regulations to
maintain the privacy of professionals working in the IT sector. It can be concluded that there
are some ethical implications that should be considered in research such as an
acknowledgment of autonomy, freedom of a person, and professional data act. It can be
summarised that different methodologies would be used for completing the research such as
quantitative research, statistical data analysis methods, and Survey through questionnaire.
11
Computing
5. Conclusion
From the above interpretation, it can be concluded that technology has both positive and
negative impacts on the privacy of professionals working in the IT field. It can be
summarised that technology can aid to secure the data in longer-term but at the same time,
there is a risk of breach of private and personal data in case of the insensitive password. It
can be concluded that there is a need for IT professionals to consider ethical regulations to
maintain the privacy of professionals working in the IT sector. It can be concluded that there
are some ethical implications that should be considered in research such as an
acknowledgment of autonomy, freedom of a person, and professional data act. It can be
summarised that different methodologies would be used for completing the research such as
quantitative research, statistical data analysis methods, and Survey through questionnaire.
11
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
6. References
Bell, E., Bryman, A. and Harley, B., 2018. Business research methods. Oxford university
press.
Bredenoord, A.L., Clevers, H. and Knoblich, J.A., 2017. Human tissues in a dish: the
research and ethical implications of organoid technology. Science, 355(6322), p.eaaf9414.
Bruynseels, K., Santoni de Sio, F. and van den Hoven, J., 2018. Digital twins in health care:
ethical implications of an emerging engineering paradigm. Frontiers in genetics, 9, p.31.
Chang, V., Shi, Y. and Zhang, Y., 2019. The Contemporary Ethical and Privacy Issues of
Smart Medical Fields. International Journal of Strategic Engineering (IJoSE), 2(2), pp.35-43.
De Goede, M., Bosma, E., and Pallister-Wilkins, P. eds., 2019. Secrecy and Methods in
Security Research: A Guide to Qualitative Fieldwork. Routledge.
De Padirac, B., 2018. The international dimensions of cyberspace law. Routledge.
Delen, D. and Zolbanin, H.M., 2018. The analytics paradigm in business research. Journal of
Business Research, 90, pp.186-195.
Dörr, K.N. and Hollnbuchner, K., 2017. Ethical challenges of algorithmic journalism. Digital
journalism, 5(4), pp.404-419.
Ferguson, S., Thornley, C. and Gibb, F., 2016. Beyond codes of ethics: how library and
information professionals navigate ethical dilemmas in a complex and dynamic information
environment. International Journal of Information Management, 36(4), pp.543-556.
Finn, R.L. and Wright, D., 2016. Privacy, data protection and ethics for civil drone practice: A
survey of industry, regulators and civil society organizations. Computer Law & Security
Review, 32(4), pp.577-586.
Friedman, B. and Hendry, D.G., 2019. Value sensitive design: Shaping technology with
moral imagination. MIT Press.
Fuller, C.M., Simmering, M.J., Atinc, G., Atinc, Y. and Babin, B.J., 2016. Common methods
variance detection in business research. Journal of Business Research, 69(8), pp.3192-
3198.
Gray, D.E., 2019. Doing research in the business world. Sage Publications Limited.
Hair Jr, J.F., Page, M., and Brunsveld, N., 2019. Essentials of business research methods.
Routledge.
Leclercq-Vandelannoitte, A., 2017. An ethical perspective on emerging forms of ubiquitous
it-based control. Journal of business ethics, 142(1), pp.139-154.
Leclercq-Vandelannoitte, A., 2019. Is Employee Technological “Ill-Being” Missing from
Corporate Responsibility? The Foucauldian Ethics of Ubiquitous IT Uses in
Organizations. Journal of Business Ethics, 160(2), pp.339-361.
12
Computing
6. References
Bell, E., Bryman, A. and Harley, B., 2018. Business research methods. Oxford university
press.
Bredenoord, A.L., Clevers, H. and Knoblich, J.A., 2017. Human tissues in a dish: the
research and ethical implications of organoid technology. Science, 355(6322), p.eaaf9414.
Bruynseels, K., Santoni de Sio, F. and van den Hoven, J., 2018. Digital twins in health care:
ethical implications of an emerging engineering paradigm. Frontiers in genetics, 9, p.31.
Chang, V., Shi, Y. and Zhang, Y., 2019. The Contemporary Ethical and Privacy Issues of
Smart Medical Fields. International Journal of Strategic Engineering (IJoSE), 2(2), pp.35-43.
De Goede, M., Bosma, E., and Pallister-Wilkins, P. eds., 2019. Secrecy and Methods in
Security Research: A Guide to Qualitative Fieldwork. Routledge.
De Padirac, B., 2018. The international dimensions of cyberspace law. Routledge.
Delen, D. and Zolbanin, H.M., 2018. The analytics paradigm in business research. Journal of
Business Research, 90, pp.186-195.
Dörr, K.N. and Hollnbuchner, K., 2017. Ethical challenges of algorithmic journalism. Digital
journalism, 5(4), pp.404-419.
Ferguson, S., Thornley, C. and Gibb, F., 2016. Beyond codes of ethics: how library and
information professionals navigate ethical dilemmas in a complex and dynamic information
environment. International Journal of Information Management, 36(4), pp.543-556.
Finn, R.L. and Wright, D., 2016. Privacy, data protection and ethics for civil drone practice: A
survey of industry, regulators and civil society organizations. Computer Law & Security
Review, 32(4), pp.577-586.
Friedman, B. and Hendry, D.G., 2019. Value sensitive design: Shaping technology with
moral imagination. MIT Press.
Fuller, C.M., Simmering, M.J., Atinc, G., Atinc, Y. and Babin, B.J., 2016. Common methods
variance detection in business research. Journal of Business Research, 69(8), pp.3192-
3198.
Gray, D.E., 2019. Doing research in the business world. Sage Publications Limited.
Hair Jr, J.F., Page, M., and Brunsveld, N., 2019. Essentials of business research methods.
Routledge.
Leclercq-Vandelannoitte, A., 2017. An ethical perspective on emerging forms of ubiquitous
it-based control. Journal of business ethics, 142(1), pp.139-154.
Leclercq-Vandelannoitte, A., 2019. Is Employee Technological “Ill-Being” Missing from
Corporate Responsibility? The Foucauldian Ethics of Ubiquitous IT Uses in
Organizations. Journal of Business Ethics, 160(2), pp.339-361.
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Lowry, P.B., Dinev, T. and Willison, R., 2017. Why security and privacy research lies at the
center of the information systems (IS) artifact: Proposing a bold research agenda. European
Journal of Information Systems, 26(6), pp.546-563.
Luppicini, R. and So, A., 2016. A technological review of commercial drone use in the
context of governance, ethics, and privacy. Technology in Society, 46, pp.109-119.
Manjikian, M., 2017. Cybersecurity Ethics: An Introduction. Routledge.
McGuire, M.R. and Holt, T.J. eds., 2017. The Routledge Handbook of Technology, Crime,
and Justice. Taylor & Francis.
Patterson, P., Wilkins, L. and Painter, C., 2018. Media ethics: Issues and cases. Rowman &
Littlefield.
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods. South-
Western Cengage.
Quinn, M.J., 2017. Ethics for the information age. Pearson.
Stahl, B.C., 2019. Teaching ethical reflexivity in information systems: How to equip students
to deal with moral and ethical issues of emerging information and communication
technologies. Journal of Information Systems Education, 22(3), p.8.
Stanton, S.J., Sinnott-Armstrong, W. and Huettel, S.A., 2017. Neuromarketing: Ethical
implications of its use and potential misuse. Journal of Business Ethics, 144(4), pp.799-811.
Teagarden, M.B., Von Glinow, M.A. and Mellahi, K., 2018. Contextualizing international
business research: Enhancing rigor and relevance. Journal of World Business, 53(3),
pp.303-306.
Van Hoof, J., Verboor, J., Oude Weernink, C.E., Sponselee, A.A.G., Sturm, J.A., Kazak,
J.K., Govers, G.M.J., and Van Zaalen, Y., 2018. Real-time location systems for asset
management in nursing homes: An explorative study of ethical aspects. Information, 9(4),
p.80.
Veruggio, G., Operto, F. and Bekey, G., 2016. Roboethics: Social and ethical implications.
In Springer handbook of robotics (pp. 2135-2160). Springer, Cham.
Weckert, J., 2017. Computer ethics. Routledge.
Wilkins, L., 2018. 2 A History of Media Ethics: From Application to Theory and Back
Again. Communication and Media Ethics, 26, p.15.
APPENDICES
7. Appendices
8. Project Plan
Research Milestones week wee wee wee wee wee wee wee wee
13
Computing
Lowry, P.B., Dinev, T. and Willison, R., 2017. Why security and privacy research lies at the
center of the information systems (IS) artifact: Proposing a bold research agenda. European
Journal of Information Systems, 26(6), pp.546-563.
Luppicini, R. and So, A., 2016. A technological review of commercial drone use in the
context of governance, ethics, and privacy. Technology in Society, 46, pp.109-119.
Manjikian, M., 2017. Cybersecurity Ethics: An Introduction. Routledge.
McGuire, M.R. and Holt, T.J. eds., 2017. The Routledge Handbook of Technology, Crime,
and Justice. Taylor & Francis.
Patterson, P., Wilkins, L. and Painter, C., 2018. Media ethics: Issues and cases. Rowman &
Littlefield.
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods. South-
Western Cengage.
Quinn, M.J., 2017. Ethics for the information age. Pearson.
Stahl, B.C., 2019. Teaching ethical reflexivity in information systems: How to equip students
to deal with moral and ethical issues of emerging information and communication
technologies. Journal of Information Systems Education, 22(3), p.8.
Stanton, S.J., Sinnott-Armstrong, W. and Huettel, S.A., 2017. Neuromarketing: Ethical
implications of its use and potential misuse. Journal of Business Ethics, 144(4), pp.799-811.
Teagarden, M.B., Von Glinow, M.A. and Mellahi, K., 2018. Contextualizing international
business research: Enhancing rigor and relevance. Journal of World Business, 53(3),
pp.303-306.
Van Hoof, J., Verboor, J., Oude Weernink, C.E., Sponselee, A.A.G., Sturm, J.A., Kazak,
J.K., Govers, G.M.J., and Van Zaalen, Y., 2018. Real-time location systems for asset
management in nursing homes: An explorative study of ethical aspects. Information, 9(4),
p.80.
Veruggio, G., Operto, F. and Bekey, G., 2016. Roboethics: Social and ethical implications.
In Springer handbook of robotics (pp. 2135-2160). Springer, Cham.
Weckert, J., 2017. Computer ethics. Routledge.
Wilkins, L., 2018. 2 A History of Media Ethics: From Application to Theory and Back
Again. Communication and Media Ethics, 26, p.15.
APPENDICES
7. Appendices
8. Project Plan
Research Milestones week wee wee wee wee wee wee wee wee
13
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
1 k 2 k 3 k 4 k 5 k 6 k 7 k 8 k 9
Selection of feasible
concern
Literature review
Selection of suitable
techniques
Designing of survey
questionnaire
Choosing the right
sample size from a
targeted population by
using a sampling
technique
Data analysis with
interpretation
Report writing
Submission of Report
The above table shows that in the first week, the researcher would select the feasible
concern, in the second week, it would consider a literature review, and in the third week, the
selection of feasible techniques would be performed in research. Next week, the researcher
would choose the right sample size through the targeted population with the application of a
sampling tool. In the 5th, 6th, & 7th week, the researcher would analyse the data with the
interpretation. Under next week, report writing would be considered and last week would be
associated with report submission.
9. Ethical Review Form
14
Computing
1 k 2 k 3 k 4 k 5 k 6 k 7 k 8 k 9
Selection of feasible
concern
Literature review
Selection of suitable
techniques
Designing of survey
questionnaire
Choosing the right
sample size from a
targeted population by
using a sampling
technique
Data analysis with
interpretation
Report writing
Submission of Report
The above table shows that in the first week, the researcher would select the feasible
concern, in the second week, it would consider a literature review, and in the third week, the
selection of feasible techniques would be performed in research. Next week, the researcher
would choose the right sample size through the targeted population with the application of a
sampling tool. In the 5th, 6th, & 7th week, the researcher would analyse the data with the
interpretation. Under next week, report writing would be considered and last week would be
associated with report submission.
9. Ethical Review Form
14
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
15
Computing
15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
16
Computing
16
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
17
Computing
17
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
18
Computing
18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
10. Consent Form
19
Computing
10. Consent Form
19
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
11. Pilot study
Demographic-based question
SQ1: Please specify your gender
Male
Female
SQ2: Please mention your age-group
19-24 years
25-30 years
31-36 years
Above 36 years
20
Computing
11. Pilot study
Demographic-based question
SQ1: Please specify your gender
Male
Female
SQ2: Please mention your age-group
19-24 years
25-30 years
31-36 years
Above 36 years
20
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
SQ3: Please specify your experience in IT fields
0-3 years
4-6 years
7-9 years
More than 10 years
Objectives based questions
SQ4: Do you agree that privacy is a significant right since it is a required condition for
other rights like personal autonomy?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ5: Do you agree that ethical guidelines give the right to the client to access the
data on the central database as well as, chance to change the incorrect data?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ6: Do you believe that the data professional should inform the client openly about
the intended intention of the application of all private and personal data?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ7: Do you agree that freedom is the norm of individual that gives freedom to make
selections with respect to privacy and intrusion?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ8: Do you believe that clients should be provided a chance to consent among
users and to withhold their agreement?
Strongly agree
21
Computing
SQ3: Please specify your experience in IT fields
0-3 years
4-6 years
7-9 years
More than 10 years
Objectives based questions
SQ4: Do you agree that privacy is a significant right since it is a required condition for
other rights like personal autonomy?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ5: Do you agree that ethical guidelines give the right to the client to access the
data on the central database as well as, chance to change the incorrect data?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ6: Do you believe that the data professional should inform the client openly about
the intended intention of the application of all private and personal data?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ7: Do you agree that freedom is the norm of individual that gives freedom to make
selections with respect to privacy and intrusion?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ8: Do you believe that clients should be provided a chance to consent among
users and to withhold their agreement?
Strongly agree
21
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Agree
Neutral
Disagree
Strongly disagree
SQ9: Do you perceive that human rights can protect the person from unlawful
interferences through society in the private life of a person?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ10: Do you agree that truth could be about expression related to virtues of ethics
like trustworthiness, openness, and honesty?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
22
Computing
Agree
Neutral
Disagree
Strongly disagree
SQ9: Do you perceive that human rights can protect the person from unlawful
interferences through society in the private life of a person?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
SQ10: Do you agree that truth could be about expression related to virtues of ethics
like trustworthiness, openness, and honesty?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
22
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.