Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges
Added on 2024-06-03
16 Pages2722 Words140 Views
|
|
|
NIT6130 INTRODUCTION TO RESEARCH
ASSIGNMENT 3 – METHODOLOGY
By
i
ASSIGNMENT 3 – METHODOLOGY
By
i
![Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fsecurity-and-privacy-in-intelligence-assistance-a-mixed-methods-approach-to-analyzing-collaboration-challenges-page-1.webp&w=3840&q=10)
Table of Contents
Table of Contents.................................................................................................................................ii
List of Figures.....................................................................................................................................iii
List of Tables.......................................................................................................................................iv
Chapter 1 Methodology........................................................................................................................1
1.1 Research Problem and Reorganized Collected Literature..........................................................1
1.1.1 Research Problem Statement...............................................................................................1
1.1.2 Reorganized Collected Literature........................................................................................3
1.2 Types of Methodology...............................................................................................................4
1.2.1 Qualitative and Quantitative Methodologies.......................................................................4
1.2.2 Type of Chosen Methodology.............................................................................................4
1.3 Review of the Existing Methodologies......................................................................................5
1.3.1 Selection of sub problem.....................................................................................................5
1.3.2 Analysis of the Selected Methodologies.............................................................................5
Literature 1: Lack of collaboration between the government and private firms..........................5
Literature 2...................................................................................................................................8
1.3.3 Relevance of the Research Problem....................................................................................9
1.3.4 Summary of the Reviewed Methodologies.........................................................................9
1.4 Proposed Methodology...............................................................................................................9
1.4.1 Identification and Justification..........................................................................................10
1.4.2 Benefits and Limitations...................................................................................................10
1.4.3 Framework and Explanation.............................................................................................11
List of References...............................................................................................................................13
ii
Table of Contents.................................................................................................................................ii
List of Figures.....................................................................................................................................iii
List of Tables.......................................................................................................................................iv
Chapter 1 Methodology........................................................................................................................1
1.1 Research Problem and Reorganized Collected Literature..........................................................1
1.1.1 Research Problem Statement...............................................................................................1
1.1.2 Reorganized Collected Literature........................................................................................3
1.2 Types of Methodology...............................................................................................................4
1.2.1 Qualitative and Quantitative Methodologies.......................................................................4
1.2.2 Type of Chosen Methodology.............................................................................................4
1.3 Review of the Existing Methodologies......................................................................................5
1.3.1 Selection of sub problem.....................................................................................................5
1.3.2 Analysis of the Selected Methodologies.............................................................................5
Literature 1: Lack of collaboration between the government and private firms..........................5
Literature 2...................................................................................................................................8
1.3.3 Relevance of the Research Problem....................................................................................9
1.3.4 Summary of the Reviewed Methodologies.........................................................................9
1.4 Proposed Methodology...............................................................................................................9
1.4.1 Identification and Justification..........................................................................................10
1.4.2 Benefits and Limitations...................................................................................................10
1.4.3 Framework and Explanation.............................................................................................11
List of References...............................................................................................................................13
ii
![Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fsecurity-and-privacy-in-intelligence-assistance-a-mixed-methods-approach-to-analyzing-collaboration-challenges-page-2.webp&w=3840&q=10)
List of Tables
Table 1: Collection of Literature..........................................................................................................................3
Table 2: Demographic information records – Total participants = 100.............................................................6
Table 3: Responses...............................................................................................................................................7
Table 4: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and responses for using
advanced technologies for data storage on a scale from 1(low) to(high)............................................................8
Table 5: Relevance of Methodology.....................................................................................................................9
iii
Table 1: Collection of Literature..........................................................................................................................3
Table 2: Demographic information records – Total participants = 100.............................................................6
Table 3: Responses...............................................................................................................................................7
Table 4: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and responses for using
advanced technologies for data storage on a scale from 1(low) to(high)............................................................8
Table 5: Relevance of Methodology.....................................................................................................................9
iii
![Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fsecurity-and-privacy-in-intelligence-assistance-a-mixed-methods-approach-to-analyzing-collaboration-challenges-page-3.webp&w=3840&q=10)
Chapter 1
Methodology
The research has been conducted to analyse “Security and Privacy in intelligence assistance” and
various journals have been considered for analysing the impact of continuous surveillance. The most
important topic of discussion is the development of an advanced cyber-security system which can be
developed jointly by the government and private firms. The research also contains the possible
hindrances of working in partnership with the government.
The structure that is followed to perform the research is; the research statement is prepared and the
suitable research journals have been selected. After that, the main issues are identified and the possible
results of quantitative analysis have been done. The results have been analysed and the methods that can
be used has been justified by evaluating its benefits and limitations. At the last section, the framework
of the research has been illustrated and suitable explanation has been provided.
1
Methodology
The research has been conducted to analyse “Security and Privacy in intelligence assistance” and
various journals have been considered for analysing the impact of continuous surveillance. The most
important topic of discussion is the development of an advanced cyber-security system which can be
developed jointly by the government and private firms. The research also contains the possible
hindrances of working in partnership with the government.
The structure that is followed to perform the research is; the research statement is prepared and the
suitable research journals have been selected. After that, the main issues are identified and the possible
results of quantitative analysis have been done. The results have been analysed and the methods that can
be used has been justified by evaluating its benefits and limitations. At the last section, the framework
of the research has been illustrated and suitable explanation has been provided.
1
![Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fdocument%2Fpages%2F2024-06-03%2Fsecurity-and-privacy-in-intelligence-assistance-a-mixed-methods-approach-to-analyzing-collaboration-challenges-page-4.webp&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Methodology for Privacy Preservation in Cloud Computing - Deskliblg...
|15
|2898
|229
Data Security in Cloud Computing Systemslg...
|12
|2956
|40
Introduction to Research: Assignment-3 Methodologylg...
|14
|2242
|163
Application of Natural Language Processing in Education: Methodologylg...
|13
|2843
|158
Quantitative Research Methodslg...
|14
|2478
|47
Research Methodology for NIT6130 Assignment 3lg...
|17
|2870
|455