logo

Essay on Security Awareness & Privacy in Social Media

   

Added on  2020-07-22

25 Pages6536 Words41 Views
A study of security awareness & privacy in social media in theHigher Education Industry

Table of ContentsCHAPTER: RESEARCH METHODOLOGY................................................................................1Overview......................................................................................................................................1Research design...........................................................................................................................1Research approach.......................................................................................................................1Research philosophy....................................................................................................................2Data collection techniques...........................................................................................................2Sampling technique.....................................................................................................................3Data analysis................................................................................................................................3Validity and reliability.................................................................................................................4Ethical considerations..................................................................................................................4CHAPTER: DATA ANALYSIS.....................................................................................................6Overview......................................................................................................................................6Data analysis................................................................................................................................6Conclusion.................................................................................................................................20REFERENCES..............................................................................................................................21APPENDIX....................................................................................................................................22

CHAPTER: RESEARCH METHODOLOGYOverview Research methodology is a process that is used by investigator in order to present the datain systematic manner. This framework is very beneficial for dissertation as some effectiveapproaches are used and plan has been prepared (Mackey and Gass, 2015). On the basis of this,some specific research issues or problems can be resolved in an effective way so that objectivescan be accomplished. Some areas are there which are explained in the field of study like design,sampling, analysis, data collection, approach and philosophy. The researcher has to select someappropriate tools so that findings can be presented in an appropriate manner. The justification isalso given of each and every method so that valid and reliable outcome can be achieved. Byusing these, it can be evaluated that how security awareness and privacy in social media can beenhanced in education industry. Research designA design has to be selected by the researcher which will act as a plan or blueprint for theinvestigator. On the basis of some specifications, an appropriate procedure can be used throughwhich data can be controlled or presented. There are various designs like casual, experimental,exploratory, descriptive and so on. In descriptive, in-depth evaluation is conducted of the topicso that understanding can be improved (Vaioleti, 2016). In casual, the cause and effectrelationship is identified between different variables and in experimental, some actions areperformed in laboratory so that effective outcome can be achieved. Here, in the present dissertation descriptive research design has been followed so thatconcepts related to topic can be analysed and along with this in-depth evaluation can beperformed. This is the most appropriate design as this is the only one through which significanceof social media and its privacy concerns can be identified. Others are not significant for thecurrent dissertation so in this way valid outcomes can also be achieved. The different aspects,factors and solutions can be evaluated which are associated with the current field of study. Onthe basis of present information, the overall effectiveness and accuracy of data can be achieved. Research approachBy selecting an appropriate approach researcher will be able to get result of the studywhich is conducted in the market. It is the responsibility of investigator to choose an effective1

approach so that they will be able to get an outcome. There are two types of approaches likeinductive and deductive. In inductive, new theories or cases has been developed on the basis ofsurvey which is conducted on a specific sample size (Flick, 2015). On the other hand, indeductive some hypothesis is developed on the basis of existing theories. In the present field of study, inductive is used by researcher so that specified researchquestions can be resolved. When those questions are get resolved then research will be able todevelop some new theories which will be helpful in accomplishing objectives. Along with this,it can also be identified that how awareness among people can be enhanced and social securitycan be ensured. Research philosophyResearchers made some assumptions about the dissertation topic that in what manner itshould be completed. By using this, overall information can be analysed and interpret so thatresearch objectives can be attained. Through this, data can be transformed and due to which finalresults can be achieved. There are two types of philosophical approaches like interpretivism andpositivism (Smith, 2015). In interpretivism, real world problems are identified and for this viewsof people have been gathered so that overall study can be conducted in successful way. On theother hand, positivism is used by investigator in order to evaluate the hypothesis. For this, sometools like statistical and mathematical are used so that their efficiency can be achieved. Here, interpretivism research approach is used by investigator so that perceptions ofrespondents can be identified for the particular problem like privacy on social media and securityawareness. So, by using current method the specified goals can be attained in successful way. Data collection techniques There are different sources like primary and secondary through which information for therelated topic can be collected. For the researcher, it is necessary to gather relevant data so thatcurrent field of study can be conducted and goals can be achieved. Primary sources are related tosome surveys or investigations like questionnaire, observation, focus group, interview and so on.In questionnaire, some open ended as well as close ended questions has been asked by researcherto their respondents so that effective solutions can be identified. In interview approach, face toface interaction has been performed in between interviewer or interviewee so that their ideas canbe evaluated effectively. In observation, investigator analyse the activities which are conductedby respondents. Through this, first hand data can be collected so this will be helpful in2

identifying the solutions for issues (Geerts, 2011). On the other hand, secondary data is the onewhich is published on some articles, newspapers, magazines and so on. This is more authenticateinformation which can help the researcher in order to maintain validity. In the current dissertation, data has been collected on the basis of both primary andsecondary sources. In primary, questionnaire survey is conducted in marketplace on highereducational industries effectively (ZAHARIA, 2017). The views and opinions of differentrespondents are identified regarding to the security awareness and privacy issues of social media(Roberts, 2013). If opinion of people is same in every situation, then in this way their reliabilitycan be ensured. After gathering the information from different authenticate sources, it can beanalysed that objectives can be achieved in appropriate manner. Sampling techniqueSample is a kind of group on which the survey has been conducted by the researcher.Sampling is a technique through which number of respondents has been selected from the largepopulation. Probabilistic and non-probabilistic are two types of sampling which can be used byinvestigator (Snyder, 2012). In first method, some criteria have been selected and equalopportunities are given to everyone but in another approach, no criteria are set. Here, in thecurrent field of study random sampling is used by investigator so that people can be selectedrandomly without any criteria. Here, the survey has been conducted on the young people of UK who are using socialmedia more. For this, the target sample is 20 and questionnaire has been conducted on somehigher educational industries of United Kingdom (Lord, 2017)). After performing overallinvestigation, specified research objectives can be achieved and questions can be resolved.Data analysisData analysis is an approach that is used by researcher in order to gather and interpret therelevant information related to study. On the basis of this, the collected data can be evaluated,manipulated and transformed so that research aim can be attained. There are two types ofanalysing techniques like qualitative and quantitative (Williams, 2011). In qualitative, surveyshave been conducted in which an investigator asked some questions to their respondents so thattheir ideas can be identified regarding privacy in social media and security awareness. After that,all responses will be presented in graphical format so that interpretation can become easy. Inanother quantitative method, some mathematical and statistical tools are used so that accuracy of3

result can be calculated in an effective manner. In this, data is represented in numerical form soin this analysis can be performed. In the current dissertation, qualitative research method has been applied as in this humanperceptions are identified related to field of study. Along with this, thematic approach is used byresearcher in which some themes are made on the basis of survey. When perceptions of peopleare identified than these can be represented in the graphical format which can help the researcherin interpreting the results easily. Validity and reliabilityFor an investigator, it is essential to maintain the accuracy of results which are gatheredthrough survey analysis. There are two factors validity and reliability which can help in attainingsuccess in current field of study (Roberts, 2013). Validity is the aspect that is related to the extentto which some appropriate measures can be take place so that its authenticity can be ensured. Forthis, data has been collected from various authenticate sources so that effective outcome can bedrawn. Reliability is another factor which produce some stable or consistent results so thatoverall specified research objectives can be accomplished. In order to ensure validity of result, researcher needs to collect some information for theirproject from trusted sources (Pierre, 2012). Some sources are like journals, books, articles and soon. Apart from this, if researcher conducted survey and each time they get same result then inthis case their reliability can be maintained. So, in this way success can be achieved in thecurrent research project or study. Ethical considerations Ethical practices are the basic things which needs to be followed by investigator at the timeof conducting field study. By adopting some of these code of practices, a boundary can be set forthe people who are associated with the dissertation so that they all behave in positive way. Thereare various practices which should be followed while conducting investigation like:The questionnaire is given to only those people who are interested and experienced as noone is forced to answer the questions which are asked by researcher. The personal information of respondents is not shared with other people without theirpermission or concern. So, for this data is stored at safe place so that no other people canaccess that information and through this confidentiality also maintained. 4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Management Challenges and Solutions for Effective Utilization of Artificial Intelligence in Business Firms
|22
|800
|257

Hospitality Industry Assignment Case Study
|44
|12669
|35

Terrorist Events and Increase in Hate Crime Incidents (Doc)
|8
|2066
|72

Solution Design (Research Design and Methodology)
|48
|20792
|255

Effectiveness of Social Media Marketing in Brand Awareness
|6
|1238
|35

Security and GDPR issues and concerns in healthcare organizations: the case of health records databases
|65
|18570
|52