The greater part of the current security
VerifiedAdded on 2022/08/20
|28
|6341
|11
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MSc Information Systems Management
IMAT5262 Research, Ethics
& Professionalism in
Computing
Assignment - Project Proposal
‘A study on role of privacy and anonymity in computing and
information technology in the context of Tesco’
Pxxxxxxxx
De Montfort University
DO NOT INCLUDE YOUR
NAME AS THE WORK WILL
BE ANONYMOUSLY MARKED
IMAT5262 Research, Ethics
& Professionalism in
Computing
Assignment - Project Proposal
‘A study on role of privacy and anonymity in computing and
information technology in the context of Tesco’
Pxxxxxxxx
De Montfort University
DO NOT INCLUDE YOUR
NAME AS THE WORK WILL
BE ANONYMOUSLY MARKED
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Abstract
The key aim of this investigation is to evaluate role of privacy and anonymity in computing
and information technology with respect to Tesco. This report addresses different chapters
such as introduction, LR (literature review), RM (research methodology), data analysis and
findings, conclusion and recommendation. Furthermore, introduction chapter supports to
know different chapters such as research background, significance of investigation, aim and
objectives of research. It supports to know the depth understanding of investigation issue.
The literature review chapter supports critically evaluates role of privacy and anonymity in
computing and information technology with respect to Tesco. In this study, quantitative
research methods have been practiced by incorporating survey through questionnaire method.
In addition, data analysis and findings chapter demonstrate privacy and anonymity in
computing and information technology plays an imperative role in meeting aim and purpose
of investigation issue. The conclusion chapter depicts that information technology has
positive impacts in making the privacy of data.
Key Words
Privacy, anonymity, information technology, data privacy, and computing
1
Computing
Abstract
The key aim of this investigation is to evaluate role of privacy and anonymity in computing
and information technology with respect to Tesco. This report addresses different chapters
such as introduction, LR (literature review), RM (research methodology), data analysis and
findings, conclusion and recommendation. Furthermore, introduction chapter supports to
know different chapters such as research background, significance of investigation, aim and
objectives of research. It supports to know the depth understanding of investigation issue.
The literature review chapter supports critically evaluates role of privacy and anonymity in
computing and information technology with respect to Tesco. In this study, quantitative
research methods have been practiced by incorporating survey through questionnaire method.
In addition, data analysis and findings chapter demonstrate privacy and anonymity in
computing and information technology plays an imperative role in meeting aim and purpose
of investigation issue. The conclusion chapter depicts that information technology has
positive impacts in making the privacy of data.
Key Words
Privacy, anonymity, information technology, data privacy, and computing
1
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Contents
1. Background.......................................................................................................................3
Research aim and objectives...................................................................................................4
2. Research questions............................................................................................................4
3. Literature Review.............................................................................................................5
Past developments and history...............................................................................................5
4. Methodology Review.........................................................................................................9
6. Conclusion.......................................................................................................................15
7. References........................................................................................................................16
APPENDICES........................................................................................................................19
8. Project Plan.....................................................................................................................19
10. Consent Form.....................................................................................................................2
11. Pilot study...........................................................................................................................5
2
Computing
Contents
1. Background.......................................................................................................................3
Research aim and objectives...................................................................................................4
2. Research questions............................................................................................................4
3. Literature Review.............................................................................................................5
Past developments and history...............................................................................................5
4. Methodology Review.........................................................................................................9
6. Conclusion.......................................................................................................................15
7. References........................................................................................................................16
APPENDICES........................................................................................................................19
8. Project Plan.....................................................................................................................19
10. Consent Form.....................................................................................................................2
11. Pilot study...........................................................................................................................5
2
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
1. Background
In the retail sector, it is quite complicated for balancing data privacy by getting competitive
benefits. The retailer’s requisite the customer data for delivering products, evaluate the
customer profile, as well as offering modified services. In addition, the capability to survive
the organization in the marketplace is depending on how much they know about the existing
as well as new consumer’s needs. It could make differentiate the organization as compared to
other companies. Moreover, it is evaluated that current tools facilitate to easily understand the
needs of consumers and make their products and services.
With respect to getting higher benefits, the organization should need to which services are
more accessed by the customers. Moreover, it is illustrated that consumer cannot endure
anymore as well as data is subject to be shared with third parties named as advertisers. In
addition, it is examined that many researchers have identified data privacy as a sectorial as
well as national level phenomenon (Xu, et al., 2014). In addition, it is evaluated there is the
gap in our knowledge of company strategies which type of data is collected by instore as well
as online shopping, as well as how it can affect the data privacy.
It is illustrated that the organizational level of data privacy behavior as companies was
handling individual data. Since most of the study on privacy has not identified wider
managerial as well as organizational concerns. It seems to be the mismatch where the
companies are worried about data privacy but studies rarely reflect this level of evaluations in
its researchers. It is illustrated that the collection of individual data become an effective
theme during the 1970s before World wide web developed new sales methods for online
retailing in the 1990’s. Moreover, many firms tried to take benefit of this tool in reaching
customers as well as it was argued that a successful retailer has using both physical as well as
online stores. These sources would support to increase the profitability of the firm (Barocas
and Nissenbaum, 2014).
3
Computing
1. Background
In the retail sector, it is quite complicated for balancing data privacy by getting competitive
benefits. The retailer’s requisite the customer data for delivering products, evaluate the
customer profile, as well as offering modified services. In addition, the capability to survive
the organization in the marketplace is depending on how much they know about the existing
as well as new consumer’s needs. It could make differentiate the organization as compared to
other companies. Moreover, it is evaluated that current tools facilitate to easily understand the
needs of consumers and make their products and services.
With respect to getting higher benefits, the organization should need to which services are
more accessed by the customers. Moreover, it is illustrated that consumer cannot endure
anymore as well as data is subject to be shared with third parties named as advertisers. In
addition, it is examined that many researchers have identified data privacy as a sectorial as
well as national level phenomenon (Xu, et al., 2014). In addition, it is evaluated there is the
gap in our knowledge of company strategies which type of data is collected by instore as well
as online shopping, as well as how it can affect the data privacy.
It is illustrated that the organizational level of data privacy behavior as companies was
handling individual data. Since most of the study on privacy has not identified wider
managerial as well as organizational concerns. It seems to be the mismatch where the
companies are worried about data privacy but studies rarely reflect this level of evaluations in
its researchers. It is illustrated that the collection of individual data become an effective
theme during the 1970s before World wide web developed new sales methods for online
retailing in the 1990’s. Moreover, many firms tried to take benefit of this tool in reaching
customers as well as it was argued that a successful retailer has using both physical as well as
online stores. These sources would support to increase the profitability of the firm (Barocas
and Nissenbaum, 2014).
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Research rationale
This study is significant for gathering data regarding concepts as well as anonymity usually
misunderstood within the digital way. From the application of this tool, this investigation
would be significant to capture data related to investigation matter. This study supports
comprehending different research methods named as qualitative and quantitative technique.
This study could support to get the technical information that would support to effectively
conducting the study (Al Omar, et al., 2017).
Research aim and objectives
The key purpose of this investigation is to examine role of privacy and anonymity in
computing and information technology with respect to Tesco. Following research objectives
are considered by investigator to achieve the aim of research purpose:
To comprehend role of privacy and anonymity in computing and information
technology with respect to Tesco
To explore factors affecting privacy as well as anonymity in computing and
information technology with respect to Tesco
To recommends strategies in improving the privacy as well as anonymity in computing and
information technology with respect to Tesco
2. Research questions
The following research questions are considered by the investigator to meet the research
purposes:
What is the role of privacy and anonymity in computing and information technology
with respect to Tesco?
Which factors affecting the privacy as well as anonymity in computing and
information technology with respect to Tesco?
Which strategies are effective in collecting improving organizational performance?
4
Computing
Research rationale
This study is significant for gathering data regarding concepts as well as anonymity usually
misunderstood within the digital way. From the application of this tool, this investigation
would be significant to capture data related to investigation matter. This study supports
comprehending different research methods named as qualitative and quantitative technique.
This study could support to get the technical information that would support to effectively
conducting the study (Al Omar, et al., 2017).
Research aim and objectives
The key purpose of this investigation is to examine role of privacy and anonymity in
computing and information technology with respect to Tesco. Following research objectives
are considered by investigator to achieve the aim of research purpose:
To comprehend role of privacy and anonymity in computing and information
technology with respect to Tesco
To explore factors affecting privacy as well as anonymity in computing and
information technology with respect to Tesco
To recommends strategies in improving the privacy as well as anonymity in computing and
information technology with respect to Tesco
2. Research questions
The following research questions are considered by the investigator to meet the research
purposes:
What is the role of privacy and anonymity in computing and information technology
with respect to Tesco?
Which factors affecting the privacy as well as anonymity in computing and
information technology with respect to Tesco?
Which strategies are effective in collecting improving organizational performance?
4
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
3. Literature Review
Past developments and history
Acquisti et al. (2015) stated that privacy is associated with the content. Refraining by public
eye as well as keeping confidentiality. Another method of privacy can be to record with the
cloud storage offers named as drop box. It will mean the individual will understand who is
long as have encrypted files as well as only have a key to decrypt such files then information
is private. In such a situation, an individual has privacy. It is illustrated that anonymity is
when an individual comprehend that they are but potentially they comprehend what are you
doing.
In such way, while an individual complete their practices and exercise something differs as
compared to their character. For example, there are large number of availability of
individuals but there are equivalent chances for each one to perform their tasks. This setting
can deal for assessing the content however it is not developed yet. In contrast to this, Kear et
al. (2014) addressed that the control of the interchanges and the progression of data are
obligatory for any substance that plans to oversee the general public. There are numerous
substances with such interests: governments, organizations, autonomous people, and so forth.
The majority of the exploration accessible on the subject cases that the primary originators of
the dangers against security and secrecy are legislative establishments and large corporations.
The inspirations driving these dangers are changed. All things considered, they can be
characterized under four classifications: social, political, mechanical and conservative. In
spite of the connection between them, the four classes have various foundations.
Social & political motivations
Zhang (2018) stated that human interaction is the best way of conducting the research in an
imperative way. Internet is best tool for social interaction as it is famous in the current time.
Popularity as well as enables that internet provides fundamental assent for society.
5
Computing
3. Literature Review
Past developments and history
Acquisti et al. (2015) stated that privacy is associated with the content. Refraining by public
eye as well as keeping confidentiality. Another method of privacy can be to record with the
cloud storage offers named as drop box. It will mean the individual will understand who is
long as have encrypted files as well as only have a key to decrypt such files then information
is private. In such a situation, an individual has privacy. It is illustrated that anonymity is
when an individual comprehend that they are but potentially they comprehend what are you
doing.
In such way, while an individual complete their practices and exercise something differs as
compared to their character. For example, there are large number of availability of
individuals but there are equivalent chances for each one to perform their tasks. This setting
can deal for assessing the content however it is not developed yet. In contrast to this, Kear et
al. (2014) addressed that the control of the interchanges and the progression of data are
obligatory for any substance that plans to oversee the general public. There are numerous
substances with such interests: governments, organizations, autonomous people, and so forth.
The majority of the exploration accessible on the subject cases that the primary originators of
the dangers against security and secrecy are legislative establishments and large corporations.
The inspirations driving these dangers are changed. All things considered, they can be
characterized under four classifications: social, political, mechanical and conservative. In
spite of the connection between them, the four classes have various foundations.
Social & political motivations
Zhang (2018) stated that human interaction is the best way of conducting the research in an
imperative way. Internet is best tool for social interaction as it is famous in the current time.
Popularity as well as enables that internet provides fundamental assent for society.
5
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Recently, it is projected that there are approximately 2.7 billion people users of the internet at
a global level. In addition, it is examined that the basics of such threats are often inspired by
an ideological cause. Thus, in the companies wherein speech free, privacy, as well as
anonymity, considered a state enemy. Moreover, the global defense as well as social morality
are some key arguments used when mitigating acts against anonymity as well as privacy.
Yüksel et al. (2017) illustrated that there are different cases wherein threats against
anonymity as well as privacy occur caused by effective technology. There are creation threats
that could occur accidentally. In addition, it is illustrated that information technology could
use much software caused by determine the users' information and making profitability in the
organization. In the current is, technology can play significant role in getting favourable data
but due to huge amount of information sometimes organizational would be confuted to
manage the data effectively. For securing a huge amount of data at a large scale is becoming
a major issue in the current period, hence organization has needed to use the information
technology and need to imply this tool to make higher befits. In support of this, Barocas and
Nissenbaum (2014) stated that the huge data of business, as well as personal information of
consumers, could be secured by the new tool. Moreover, the huge amount of business as well
as individual information transmitted as well as stored automatically, the key opportunity for
information breaches are melodramatically enhanced as well as a business might forestall
quick reactions to complete the satisfy state patchwork as well as federal information breach
rules. In addition, it is illustrated that those rules continue in raising the standard of
information security uses, constricting associates expect higher responsibility for such
standards.
III. MECHANISMS USED TO INTERFERE in PRIVACY AND ANONYMITY
Aitzhan and Svetinovic (2016) stated that any conceivable danger on the physical layer infers
direct access to the equipment associated with the system. Most normal antiquities used are
6
Computing
Recently, it is projected that there are approximately 2.7 billion people users of the internet at
a global level. In addition, it is examined that the basics of such threats are often inspired by
an ideological cause. Thus, in the companies wherein speech free, privacy, as well as
anonymity, considered a state enemy. Moreover, the global defense as well as social morality
are some key arguments used when mitigating acts against anonymity as well as privacy.
Yüksel et al. (2017) illustrated that there are different cases wherein threats against
anonymity as well as privacy occur caused by effective technology. There are creation threats
that could occur accidentally. In addition, it is illustrated that information technology could
use much software caused by determine the users' information and making profitability in the
organization. In the current is, technology can play significant role in getting favourable data
but due to huge amount of information sometimes organizational would be confuted to
manage the data effectively. For securing a huge amount of data at a large scale is becoming
a major issue in the current period, hence organization has needed to use the information
technology and need to imply this tool to make higher befits. In support of this, Barocas and
Nissenbaum (2014) stated that the huge data of business, as well as personal information of
consumers, could be secured by the new tool. Moreover, the huge amount of business as well
as individual information transmitted as well as stored automatically, the key opportunity for
information breaches are melodramatically enhanced as well as a business might forestall
quick reactions to complete the satisfy state patchwork as well as federal information breach
rules. In addition, it is illustrated that those rules continue in raising the standard of
information security uses, constricting associates expect higher responsibility for such
standards.
III. MECHANISMS USED TO INTERFERE in PRIVACY AND ANONYMITY
Aitzhan and Svetinovic (2016) stated that any conceivable danger on the physical layer infers
direct access to the equipment associated with the system. Most normal antiquities used are
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
known as system taps: gadgets that give access to the information stream of the system once
they are connected to it. These gadgets can be utilized either to screen the system quietly
(sniffing) or to divert the full traffic of the system to an alternate hub. Verifiably, any
perception of the system traffic includes the probability of influencing the security and
obscurity of the traffic.
On the other side, Aitzhan and Svetinovic (2016) examined that the majority of the
equipment arrangements focusing on the information interface layer center around the media
get to control (MAC) sublayer. It is in the MAC sublayer that specific channels can be
executed. The tending of the goals happens right now, is exceptional. This is the primary
control point for those elements that are meaningful to get some data concerning the client's
character, information streams and goals. Note, the property of uniqueness of the MAC
address and the present standard permits the classification of the gadgets present in the
system. This can prompt an untimely ID of the client (by maker/model).
Bettini and Riboni, (2015) illustrated that as of late, data innovation and portable
correspondence innovation are firmly coordinated and grow quickly. These have advanced
the improvement of the Internet, portable Internet, distributed computing, huge information
and the Internet of things. Simultaneously, an assortment of new help models improve the
nature of living significantly, for example, internet business administrations spoke to by
Amazon/Taobao, informal organization administrations spoke to by Facebook/Wechat,
vehicle administrations spoke to by Uber/Didi.
In support of this, Shen et al. (2018) stated that that nonetheless rise and fast advancement of
new innovation and new assistance mode lead to a typical circumstance in which enormous
clients close to home data interfaces across data frameworks, biological systems and even
national system limits. In each progression of the entire data lifecycle, the client's close to
home data can be definitely held in different data frameworks, for example, assortment,
7
Computing
known as system taps: gadgets that give access to the information stream of the system once
they are connected to it. These gadgets can be utilized either to screen the system quietly
(sniffing) or to divert the full traffic of the system to an alternate hub. Verifiably, any
perception of the system traffic includes the probability of influencing the security and
obscurity of the traffic.
On the other side, Aitzhan and Svetinovic (2016) examined that the majority of the
equipment arrangements focusing on the information interface layer center around the media
get to control (MAC) sublayer. It is in the MAC sublayer that specific channels can be
executed. The tending of the goals happens right now, is exceptional. This is the primary
control point for those elements that are meaningful to get some data concerning the client's
character, information streams and goals. Note, the property of uniqueness of the MAC
address and the present standard permits the classification of the gadgets present in the
system. This can prompt an untimely ID of the client (by maker/model).
Bettini and Riboni, (2015) illustrated that as of late, data innovation and portable
correspondence innovation are firmly coordinated and grow quickly. These have advanced
the improvement of the Internet, portable Internet, distributed computing, huge information
and the Internet of things. Simultaneously, an assortment of new help models improve the
nature of living significantly, for example, internet business administrations spoke to by
Amazon/Taobao, informal organization administrations spoke to by Facebook/Wechat,
vehicle administrations spoke to by Uber/Didi.
In support of this, Shen et al. (2018) stated that that nonetheless rise and fast advancement of
new innovation and new assistance mode lead to a typical circumstance in which enormous
clients close to home data interfaces across data frameworks, biological systems and even
national system limits. In each progression of the entire data lifecycle, the client's close to
home data can be definitely held in different data frameworks, for example, assortment,
7
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
stockpiling, handling, discharge (counting trade), obliteration, etc. It prompts the partition of
the proprietorship, the administration and the usage right of data, which genuinely
undermines clients' privileges to assent, to be eradicated/to be overlooked and to broaden
approval.
Benson et al. (2015) illustrated that the absence of the help of viable observing innovation
prompts the trouble of following and crime scene investigation of security attack. The greater
part of the current security protecting plans center around moderately segregated application
situations and specialized focuses, and propose answers for explicit issues in a given
application situation. The protection saving plan dependent on getting to control innovation is
reasonable for a single data framework, yet the security saving issue in metadata stockpiling
and distributing isn't explained.
In support that, Martin and Murphy (2017) examined that security protecting plans depend on
cryptography is additionally just appropriate to a solitary data framework. In spite of the fact
that the usage of key administration with the assistance of believed outsiders can understand
the trading of security data between multi-data frameworks, the cancellation right/overlooked
right and the all-encompassing approval after the trade is not settled. The protection
safeguarding plan dependent on speculation, disarray, secrecy advances fluffs up information,
making it difficult to be reestablished, and consequently can be applied to numerous
situations, for example, single anonymizing and multi-anonymizing with expanded security
saving level.
Sicari et al. (2015) stated that In a nutshell, existing security protecting advances can't meet
the necessities of the security safeguarding in the intricate data framework, prompting
unsolved protection saving issues in the run of the mill application situations, for example,
online business and long range interpersonal communication. Accordingly, from the point of
view of the entire lifecycle conservation on protection data and to answer the interest of
8
Computing
stockpiling, handling, discharge (counting trade), obliteration, etc. It prompts the partition of
the proprietorship, the administration and the usage right of data, which genuinely
undermines clients' privileges to assent, to be eradicated/to be overlooked and to broaden
approval.
Benson et al. (2015) illustrated that the absence of the help of viable observing innovation
prompts the trouble of following and crime scene investigation of security attack. The greater
part of the current security protecting plans center around moderately segregated application
situations and specialized focuses, and propose answers for explicit issues in a given
application situation. The protection saving plan dependent on getting to control innovation is
reasonable for a single data framework, yet the security saving issue in metadata stockpiling
and distributing isn't explained.
In support that, Martin and Murphy (2017) examined that security protecting plans depend on
cryptography is additionally just appropriate to a solitary data framework. In spite of the fact
that the usage of key administration with the assistance of believed outsiders can understand
the trading of security data between multi-data frameworks, the cancellation right/overlooked
right and the all-encompassing approval after the trade is not settled. The protection
safeguarding plan dependent on speculation, disarray, secrecy advances fluffs up information,
making it difficult to be reestablished, and consequently can be applied to numerous
situations, for example, single anonymizing and multi-anonymizing with expanded security
saving level.
Sicari et al. (2015) stated that In a nutshell, existing security protecting advances can't meet
the necessities of the security safeguarding in the intricate data framework, prompting
unsolved protection saving issues in the run of the mill application situations, for example,
online business and long range interpersonal communication. Accordingly, from the point of
view of the entire lifecycle conservation on protection data and to answer the interest of
8
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
methodical security safeguarding in complex application situations, we set forward the
security registering hypothesis and the key innovation framework, including security
processing system, formal meaning of protection figuring, four standards of security
processing structure, calculation plan criteria, assessment of protection saving impact, and
protection registering language.
4. Methodology Review
SECTION 1 - REVIEW
Qualitative Research
This investigation is exploratory type research that is practiced for comprehending
knowledge about the motivation, reason, and opinion behind choosing qualitative type
research. It will also assist in developing hypotheses for this study. Qualitative research is
primarily thoughts and opinion of another researcher that supports in analysing the problem
in depth. There are different techniques which are used for qualitative data collection such as
semi-structured technique and unstructured techniques. Certain methods of qualitative data
collection are named as group discussion, observation/ participation and individual interviews
(Mackey and Gass, 2015).
For this approach, a small sample size is selected and under this, research participants are
chosen to accomplish allocated quota. A labor-intensive analysis technique is required for
this qualitative study which is named as recording, categorization etc. Along with this, well-
experienced research scholars are required for qualitative research to get the specified
information from the selected group of research candidates. Further, the various conclusion
is developed from the information that is gathered through the personal characteristics of the
research participant (Flick, 2015).
Quantitative Research
9
Computing
methodical security safeguarding in complex application situations, we set forward the
security registering hypothesis and the key innovation framework, including security
processing system, formal meaning of protection figuring, four standards of security
processing structure, calculation plan criteria, assessment of protection saving impact, and
protection registering language.
4. Methodology Review
SECTION 1 - REVIEW
Qualitative Research
This investigation is exploratory type research that is practiced for comprehending
knowledge about the motivation, reason, and opinion behind choosing qualitative type
research. It will also assist in developing hypotheses for this study. Qualitative research is
primarily thoughts and opinion of another researcher that supports in analysing the problem
in depth. There are different techniques which are used for qualitative data collection such as
semi-structured technique and unstructured techniques. Certain methods of qualitative data
collection are named as group discussion, observation/ participation and individual interviews
(Mackey and Gass, 2015).
For this approach, a small sample size is selected and under this, research participants are
chosen to accomplish allocated quota. A labor-intensive analysis technique is required for
this qualitative study which is named as recording, categorization etc. Along with this, well-
experienced research scholars are required for qualitative research to get the specified
information from the selected group of research candidates. Further, the various conclusion
is developed from the information that is gathered through the personal characteristics of the
research participant (Flick, 2015).
Quantitative Research
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Quantitative research is exercised for measuring the issues in order to develop numerical
information that can be changed into required statistics. This technique is practiced for
computing defined variables such as opinion, behaviour and attitudes and it also supports in
generalizing the result from a larger population of the sample. It is analysed that the
quantitative data pooling technique is more structured rather than qualitative data collection
technique. Quantitative data pooling techniques consider different forms of surveys that are
named as paper surveys, systematic observations, face-to-face interviews, telephone
interviews, kiosk surveys, website interceptors, systematic observations, mobile surveys,
online surveys, website interceptors, longitudinal studies, online polls and face-to-face
interviews (Bresler and Stake, 2017).
Techniques for data collection
Focus groups:
It is significant methods of quantitative research that could be exercised for accumulating the
relevant data. The focus group generally considers a particular number of research
participants range between 6-10. The main purpose of the focus group is to discover the
answer to the why, how and what type of question will be developed. The most imperative
factor and advantage of a focus group are that personal interaction with the targeted group of
the research scholar is not required (Bauer, 2014).
In the current era, the focus group can be sent to the respondents as an online survey on the
different types of devices and their responses could be gathered by just clicking a button. It is
analyzed that the focus group is a very expensive technique of data pooling as compared to
other methods of qualitative research. Usually, this method is practiced for explaining
complicated processes. This method of qualitative research is more advantageous when it is
practiced for conducting market research on fresh and new products and developing
innovative concepts (Mohajan, 2018).
10
Computing
Quantitative research is exercised for measuring the issues in order to develop numerical
information that can be changed into required statistics. This technique is practiced for
computing defined variables such as opinion, behaviour and attitudes and it also supports in
generalizing the result from a larger population of the sample. It is analysed that the
quantitative data pooling technique is more structured rather than qualitative data collection
technique. Quantitative data pooling techniques consider different forms of surveys that are
named as paper surveys, systematic observations, face-to-face interviews, telephone
interviews, kiosk surveys, website interceptors, systematic observations, mobile surveys,
online surveys, website interceptors, longitudinal studies, online polls and face-to-face
interviews (Bresler and Stake, 2017).
Techniques for data collection
Focus groups:
It is significant methods of quantitative research that could be exercised for accumulating the
relevant data. The focus group generally considers a particular number of research
participants range between 6-10. The main purpose of the focus group is to discover the
answer to the why, how and what type of question will be developed. The most imperative
factor and advantage of a focus group are that personal interaction with the targeted group of
the research scholar is not required (Bauer, 2014).
In the current era, the focus group can be sent to the respondents as an online survey on the
different types of devices and their responses could be gathered by just clicking a button. It is
analyzed that the focus group is a very expensive technique of data pooling as compared to
other methods of qualitative research. Usually, this method is practiced for explaining
complicated processes. This method of qualitative research is more advantageous when it is
practiced for conducting market research on fresh and new products and developing
innovative concepts (Mohajan, 2018).
10
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Case study research
This method is very significant technique of qualitative investigation method that is practiced
from the past few years. This method is used for describing information about the
organization or about an individual and business. It is observed that this research method is
advantageous for various areas like social sciences, education as well as, other fields. This
technique is not so easy to operate but at the same, this is one of the easiest tools for
performing a research study because it considers depth knowledge of the data pooling
technique and concluding the information (Dumay and Cai, 2015).
Interview
This technique could be developed for gathering the information from suitable sample from
general population since in practical way, research have ability to reach on each individual
throughout this strategy. It would be identified that questionnaire strategy is limited through
fact that only literate individuals through covering it. The application of interview technique
makes sure the higher amount of usable returns rather than other techniques. In addition to
this, returned visits for completing the items on schedule and correcting mistakes could
usually be developed without annoying to informant. However, the efficacy of interviews
relied on through skills and training of interviewers as on severe management over them.
Along with this, recorded could be incomplete as well as, infeasible (Taherdoost, 2016).
Survey through questionnaire
Surveys could be easily created particularly while practicing the advanced survey software
solutions i.e. available in current times. There are different researchers who have making
efforts to collect the data through online software but it is not always preferred technique of
data collection particularly when participants are in hard to reach fields. Whether an
investigator practices mobile survey, paper and online survey or combination of all
11
Computing
Case study research
This method is very significant technique of qualitative investigation method that is practiced
from the past few years. This method is used for describing information about the
organization or about an individual and business. It is observed that this research method is
advantageous for various areas like social sciences, education as well as, other fields. This
technique is not so easy to operate but at the same, this is one of the easiest tools for
performing a research study because it considers depth knowledge of the data pooling
technique and concluding the information (Dumay and Cai, 2015).
Interview
This technique could be developed for gathering the information from suitable sample from
general population since in practical way, research have ability to reach on each individual
throughout this strategy. It would be identified that questionnaire strategy is limited through
fact that only literate individuals through covering it. The application of interview technique
makes sure the higher amount of usable returns rather than other techniques. In addition to
this, returned visits for completing the items on schedule and correcting mistakes could
usually be developed without annoying to informant. However, the efficacy of interviews
relied on through skills and training of interviewers as on severe management over them.
Along with this, recorded could be incomplete as well as, infeasible (Taherdoost, 2016).
Survey through questionnaire
Surveys could be easily created particularly while practicing the advanced survey software
solutions i.e. available in current times. There are different researchers who have making
efforts to collect the data through online software but it is not always preferred technique of
data collection particularly when participants are in hard to reach fields. Whether an
investigator practices mobile survey, paper and online survey or combination of all
11
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
techniques. The mode can rely on kind of investigation and demographics of participants
(Khan, 2014).
Advantages
Significantly easy to manage
It could be created in minimum time (compared to other data-gathering techniques)
Cost-effective however cost relies on survey techniques.
Disadvantages
Survey question could create uncertain information since some answer choices could
be comprehended distinctly by participants.
Survey related to close-ended questions could have minimum rate of validity as
compared to other types of questions (Riedl, et al., 2014).
Observation
It is mode for gathering the information via observing applicants. This data collection
technique is considered as a participatory investigation since an investigator has to cautiously
taking notes and recording about participants. The key benefits of using this technique is
direct access to investigation phenomena, higher extent of flexibility with respect to
application and creating permanent record for phenomena that could be refereed at later. It is
disadvantageous due to longer requirements of time, higher extents of observer bias as well
as, effect of observer on primary information in a way that availability of observer could
affect the behaviour of sample elements of group. The key limitation of direct approach is
that it could make conscious to subject about detriment of natural behaviour that observer
wants to perceive. An investigator hence to weigh cautiously the relative losses and gains
about these two approaches earlier employing to anyone (Khan, 2014).
Analysis methods
Statistical data analysis
12
Computing
techniques. The mode can rely on kind of investigation and demographics of participants
(Khan, 2014).
Advantages
Significantly easy to manage
It could be created in minimum time (compared to other data-gathering techniques)
Cost-effective however cost relies on survey techniques.
Disadvantages
Survey question could create uncertain information since some answer choices could
be comprehended distinctly by participants.
Survey related to close-ended questions could have minimum rate of validity as
compared to other types of questions (Riedl, et al., 2014).
Observation
It is mode for gathering the information via observing applicants. This data collection
technique is considered as a participatory investigation since an investigator has to cautiously
taking notes and recording about participants. The key benefits of using this technique is
direct access to investigation phenomena, higher extent of flexibility with respect to
application and creating permanent record for phenomena that could be refereed at later. It is
disadvantageous due to longer requirements of time, higher extents of observer bias as well
as, effect of observer on primary information in a way that availability of observer could
affect the behaviour of sample elements of group. The key limitation of direct approach is
that it could make conscious to subject about detriment of natural behaviour that observer
wants to perceive. An investigator hence to weigh cautiously the relative losses and gains
about these two approaches earlier employing to anyone (Khan, 2014).
Analysis methods
Statistical data analysis
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
The statistical method of data analysis is termed as the technique, model or mathematical
formula that is practiced by the researcher in the numerical analysis of raw data of research
study. Implementation of statistical technique in the research study extracts data from the
research information and delivers various ways for evaluating the strength of the research
outcome. This is the main advantage of the statistical approach that it is a precise method of
data analysis. Under this, standard deviation or mean is an accurate measurement of the
targeted population. But at the same time, it is also analyzed that this method of data
evaluation is quite costly and takes more time as compared to another method for attaining
parameters of a large population (Habib, et al., 2014).
Thematic analysis
Thematic data analysis provides a flexible approach to evaluate the data and enables the
research scholar to practice various methodological backgrounds and also engage in the
analysis process. In addition, this method also delivers a wider range of flexibility. Due to the
flexibility of this technique, this method can be a reason for inconsistency and also lead to
lack of rationality during developing themes from the research information (Cope, 2015)
5.
13
Computing
The statistical method of data analysis is termed as the technique, model or mathematical
formula that is practiced by the researcher in the numerical analysis of raw data of research
study. Implementation of statistical technique in the research study extracts data from the
research information and delivers various ways for evaluating the strength of the research
outcome. This is the main advantage of the statistical approach that it is a precise method of
data analysis. Under this, standard deviation or mean is an accurate measurement of the
targeted population. But at the same time, it is also analyzed that this method of data
evaluation is quite costly and takes more time as compared to another method for attaining
parameters of a large population (Habib, et al., 2014).
Thematic analysis
Thematic data analysis provides a flexible approach to evaluate the data and enables the
research scholar to practice various methodological backgrounds and also engage in the
analysis process. In addition, this method also delivers a wider range of flexibility. Due to the
flexibility of this technique, this method can be a reason for inconsistency and also lead to
lack of rationality during developing themes from the research information (Cope, 2015)
5.
13
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
SECTION 2 – SELECTION
Reasoning for selection
Quantitative approach
A quantitative research method is an effective tool because it enables the investigator for
conducting the study on sample size. Through this method, the investigator would be able to
meet the research issue. This method would be effective in generalizing the content and
support to make an effective conclusion. The quantitative method would aid to the researcher
in making trustworthiness result. It could permit for making accuracy in the research
outcome. For collecting the quantitative information, survey through questionnaire is
practiced by researcher caused by getting reliable data towards investigation matter (Hannula,
et al., 2014).
The main reason for selecting this tool is to get cheap and quick data towards the research
issue. This technique could be significant for getting information from the larger sample size.
It is also addressed that the survey questionnaire is vital for making a record of data by
gathering the opinion as well as general feedback. In this study, the statistical data analysis
method is gathered because this supports to get data towards the research matter. In this, the
researcher will use this tool caused by getting reliable information about study matter. This
tool is effective in evaluating the outcome. Moreover, statistical data analysis considers
examining the information that the sample could be drawn. The investigator could practice
different sources such as descriptive statistics, Pearson / Spearman correlational test,
reliability test, and Cronbach Alpha (Abdulghani, et al., 2014).
14
Computing
SECTION 2 – SELECTION
Reasoning for selection
Quantitative approach
A quantitative research method is an effective tool because it enables the investigator for
conducting the study on sample size. Through this method, the investigator would be able to
meet the research issue. This method would be effective in generalizing the content and
support to make an effective conclusion. The quantitative method would aid to the researcher
in making trustworthiness result. It could permit for making accuracy in the research
outcome. For collecting the quantitative information, survey through questionnaire is
practiced by researcher caused by getting reliable data towards investigation matter (Hannula,
et al., 2014).
The main reason for selecting this tool is to get cheap and quick data towards the research
issue. This technique could be significant for getting information from the larger sample size.
It is also addressed that the survey questionnaire is vital for making a record of data by
gathering the opinion as well as general feedback. In this study, the statistical data analysis
method is gathered because this supports to get data towards the research matter. In this, the
researcher will use this tool caused by getting reliable information about study matter. This
tool is effective in evaluating the outcome. Moreover, statistical data analysis considers
examining the information that the sample could be drawn. The investigator could practice
different sources such as descriptive statistics, Pearson / Spearman correlational test,
reliability test, and Cronbach Alpha (Abdulghani, et al., 2014).
14
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
6. Conclusion
In the context of above table, it could be summarized that privacy and anonymity play an
imperative role in computing and information technology with respect to Tesco. Tesco has
used information technology caused by securing the information and making a higher profit.
This tool could aid the organization in making higher profits. This study is also effective to
know about the qualitative as well as quantitative research methods. The qualitative method
can be significant in gathering conceptual information towards research issue. It can also be
illustrated that the quantitative research method can be effective in getting the numerical
information towards investigation issue. It can be summarized that the retailer’s requisite
customer data for delivering products, evaluate the customer profile, as well as offering
modified services. In addition, the capability to survive the organization in the marketplace is
depending on how much they know about the existing as well as new consumer’s needs. It
could make differentiate the organization as compared to other companies.
15
Computing
6. Conclusion
In the context of above table, it could be summarized that privacy and anonymity play an
imperative role in computing and information technology with respect to Tesco. Tesco has
used information technology caused by securing the information and making a higher profit.
This tool could aid the organization in making higher profits. This study is also effective to
know about the qualitative as well as quantitative research methods. The qualitative method
can be significant in gathering conceptual information towards research issue. It can also be
illustrated that the quantitative research method can be effective in getting the numerical
information towards investigation issue. It can be summarized that the retailer’s requisite
customer data for delivering products, evaluate the customer profile, as well as offering
modified services. In addition, the capability to survive the organization in the marketplace is
depending on how much they know about the existing as well as new consumer’s needs. It
could make differentiate the organization as compared to other companies.
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
7. References
Abdulghani, H.M., Shaik, S.A., Khamis, N., Al-Drees, A.A., Irshad, M., Khalil, M.S.,
Alhaqwi, A.I. and Isnani, A., 2014. Research methodology workshops evaluation using the
Kirkpatrick’s model: translating theory into practice. Medical Teacher, 36(sup1), pp.S24-
S29.
Acquisti, A., Brandimarte, L. and Loewenstein, G., 2015. Privacy and human behavior in the
age of information. Science, 347(6221), pp.509-514.
Aitzhan, N.Z. and Svetinovic, D., 2016. Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions
on Dependable and Secure Computing, 15(5), pp.840-852.
Aitzhan, N.Z. and Svetinovic, D., 2016. Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions
on Dependable and Secure Computing, 15(5), pp.840-852.
Al Omar, A., Rahman, M.S., Basu, A. and Kiyomoto, S., 2017, December. Medibchain: A
blockchain based privacy preserving platform for healthcare data. In International conference
on security, privacy and anonymity in computation, communication and storage (pp. 534-
543). Springer, Cham.
Barocas, S. and Nissenbaum, H., 2014. Big data’s end run around anonymity and
consent. Privacy, big data, and the public good: Frameworks for engagement, 1, pp.44-75.
Barocas, S. and Nissenbaum, H., 2014. Big data's end run around procedural privacy
protections. Communications of the ACM, 57(11), pp.31-33.
Bauer, G.R., 2014. Incorporating intersectionality theory into population health research
methodology: challenges and the potential to advance health equity. Social science &
medicine, 110, pp.10-17.
16
Computing
7. References
Abdulghani, H.M., Shaik, S.A., Khamis, N., Al-Drees, A.A., Irshad, M., Khalil, M.S.,
Alhaqwi, A.I. and Isnani, A., 2014. Research methodology workshops evaluation using the
Kirkpatrick’s model: translating theory into practice. Medical Teacher, 36(sup1), pp.S24-
S29.
Acquisti, A., Brandimarte, L. and Loewenstein, G., 2015. Privacy and human behavior in the
age of information. Science, 347(6221), pp.509-514.
Aitzhan, N.Z. and Svetinovic, D., 2016. Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions
on Dependable and Secure Computing, 15(5), pp.840-852.
Aitzhan, N.Z. and Svetinovic, D., 2016. Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions
on Dependable and Secure Computing, 15(5), pp.840-852.
Al Omar, A., Rahman, M.S., Basu, A. and Kiyomoto, S., 2017, December. Medibchain: A
blockchain based privacy preserving platform for healthcare data. In International conference
on security, privacy and anonymity in computation, communication and storage (pp. 534-
543). Springer, Cham.
Barocas, S. and Nissenbaum, H., 2014. Big data’s end run around anonymity and
consent. Privacy, big data, and the public good: Frameworks for engagement, 1, pp.44-75.
Barocas, S. and Nissenbaum, H., 2014. Big data's end run around procedural privacy
protections. Communications of the ACM, 57(11), pp.31-33.
Bauer, G.R., 2014. Incorporating intersectionality theory into population health research
methodology: challenges and the potential to advance health equity. Social science &
medicine, 110, pp.10-17.
16
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Benson, V., Saridakis, G. and Tennakoon, H., 2015. Information disclosure of social media
users. Information Technology & People.
Bettini, C. and Riboni, D., 2015. Privacy protection in pervasive systems: State of the art and
technical challenges. Pervasive and Mobile Computing, 17, pp.159-174.
Bresler, L. and Stake, R.E., 2017. Qualitative research methodology in music education.
In Critical Essays in Music Education (pp. 113-128). Routledge.
Cope, D.G., 2015, November. Case study research methodology in nursing research.
In Oncology nursing forum (Vol. 42, No. 6, pp. 681-682). Oncology Nursing Society.
Dumay, J. and Cai, L., 2015. Using content analysis as a research methodology for
investigating intellectual capital disclosure. Journal of Intellectual Capital.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Habib, M.M., Pathik, B.B. and Maryam, H., 2014. Research methodology-contemporary
practices: guidelines for academic researchers. Cambridge Scholars Publishing.
Hannula, M., Suoranta, J. and Vadén, T., 2014. Artistic Research: Methodology. Narrative,
Power and the Public.
Kear, K., Chetwynd, F. and Jefferis, H., 2014. Social presence in online learning
communities: The role of personal profiles. Research in Learning Technology, 22.
Khan, S.H., 2014. Phenomenography: A qualitative research methodology in
Bangladesh. International Journal on New Trends in Education and Their Implications, 5(2),
pp.34-43.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Routledge.
Martin, K.D. and Murphy, P.E., 2017. The role of data privacy in marketing. Journal of the
Academy of Marketing Science, 45(2), pp.135-155.
17
Computing
Benson, V., Saridakis, G. and Tennakoon, H., 2015. Information disclosure of social media
users. Information Technology & People.
Bettini, C. and Riboni, D., 2015. Privacy protection in pervasive systems: State of the art and
technical challenges. Pervasive and Mobile Computing, 17, pp.159-174.
Bresler, L. and Stake, R.E., 2017. Qualitative research methodology in music education.
In Critical Essays in Music Education (pp. 113-128). Routledge.
Cope, D.G., 2015, November. Case study research methodology in nursing research.
In Oncology nursing forum (Vol. 42, No. 6, pp. 681-682). Oncology Nursing Society.
Dumay, J. and Cai, L., 2015. Using content analysis as a research methodology for
investigating intellectual capital disclosure. Journal of Intellectual Capital.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Habib, M.M., Pathik, B.B. and Maryam, H., 2014. Research methodology-contemporary
practices: guidelines for academic researchers. Cambridge Scholars Publishing.
Hannula, M., Suoranta, J. and Vadén, T., 2014. Artistic Research: Methodology. Narrative,
Power and the Public.
Kear, K., Chetwynd, F. and Jefferis, H., 2014. Social presence in online learning
communities: The role of personal profiles. Research in Learning Technology, 22.
Khan, S.H., 2014. Phenomenography: A qualitative research methodology in
Bangladesh. International Journal on New Trends in Education and Their Implications, 5(2),
pp.34-43.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Routledge.
Martin, K.D. and Murphy, P.E., 2017. The role of data privacy in marketing. Journal of the
Academy of Marketing Science, 45(2), pp.135-155.
17
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Mohajan, H.K., 2018. Qualitative research methodology in social sciences and related
subjects. Journal of Economic Development, Environment and People, 7(1), pp.23-48.
Riedl, R., Davis, F.D. and Hevner, A.R., 2014. Towards a NeuroIS research methodology:
intensifying the discussion on methods, tools, and measurement. Journal of the Association
for Information Systems, 15(10), p.4.
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H. and Tang, Y., 2018. Cloud-aided lightweight
certificateless authentication protocol with anonymity for wireless body area
networks. Journal of Network and Computer Applications, 106, pp.117-123.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust
in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Taherdoost, H., 2016. Sampling methods in research methodology; how to choose a sampling
technique for research. How to Choose a Sampling Technique for Research (April 10, 2016).
Ulmer, J.B., 2017. Posthumanism as research methodology: Inquiry in the
Anthropocene. International Journal of Qualitative Studies in Education, 30(9), pp.832-848.
Xu, Y., Ma, T., Tang, M. and Tian, W., 2014. A survey of privacy preserving data publishing
using generalization and suppression. Applied Mathematics & Information Sciences, 8(3),
p.1103.
Yüksel, B., Küpçü, A. and Özkasap, Ö., 2017. Research issues for privacy and security of
electronic health services. Future Generation Computer Systems, 68, pp.1-13.
Zhang, D., 2018, October. Big data security and privacy protection. In 8th International
Conference on Management and Computer Science (ICMCS 2018). Atlantis Press.
18
Computing
Mohajan, H.K., 2018. Qualitative research methodology in social sciences and related
subjects. Journal of Economic Development, Environment and People, 7(1), pp.23-48.
Riedl, R., Davis, F.D. and Hevner, A.R., 2014. Towards a NeuroIS research methodology:
intensifying the discussion on methods, tools, and measurement. Journal of the Association
for Information Systems, 15(10), p.4.
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H. and Tang, Y., 2018. Cloud-aided lightweight
certificateless authentication protocol with anonymity for wireless body area
networks. Journal of Network and Computer Applications, 106, pp.117-123.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust
in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Taherdoost, H., 2016. Sampling methods in research methodology; how to choose a sampling
technique for research. How to Choose a Sampling Technique for Research (April 10, 2016).
Ulmer, J.B., 2017. Posthumanism as research methodology: Inquiry in the
Anthropocene. International Journal of Qualitative Studies in Education, 30(9), pp.832-848.
Xu, Y., Ma, T., Tang, M. and Tian, W., 2014. A survey of privacy preserving data publishing
using generalization and suppression. Applied Mathematics & Information Sciences, 8(3),
p.1103.
Yüksel, B., Küpçü, A. and Özkasap, Ö., 2017. Research issues for privacy and security of
electronic health services. Future Generation Computer Systems, 68, pp.1-13.
Zhang, D., 2018, October. Big data security and privacy protection. In 8th International
Conference on Management and Computer Science (ICMCS 2018). Atlantis Press.
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
APPENDICES
8. Project Plan
The project plan supports to comprehend different research acts that are considered by the
researcher (Ulmer, 2017). This project plan could support to determine time for meeting
research aim. The following table demonstrate the time for meeting the aim of study:
Task
1st
and
2nd
Week
3rd
and
4th
Week
5th
and
6th
Wee
k
7th
and
8th
Week
9th
and
10th
Week
11th
and
12th
Week
13th
to
16th
week
17th
to
20th
Week
21st
to
23rd
Week
Planning of the
research
Determination of
research aim
Aim and
Objectives
finalization
Structuring of
the study
Evaluation of
Journals for
research
Literature Review
activity
Determination of
19
Computing
APPENDICES
8. Project Plan
The project plan supports to comprehend different research acts that are considered by the
researcher (Ulmer, 2017). This project plan could support to determine time for meeting
research aim. The following table demonstrate the time for meeting the aim of study:
Task
1st
and
2nd
Week
3rd
and
4th
Week
5th
and
6th
Wee
k
7th
and
8th
Week
9th
and
10th
Week
11th
and
12th
Week
13th
to
16th
week
17th
to
20th
Week
21st
to
23rd
Week
Planning of the
research
Determination of
research aim
Aim and
Objectives
finalization
Structuring of
the study
Evaluation of
Journals for
research
Literature Review
activity
Determination of
19
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
data collection
method
Survey design
Make draft
Evaluation of the
data
Interpretation
and findings
Conclusions as
well as
Recommendation
s
Final Submission
With respect to the above table, it can be concluded that there are many acts that are
considered by the investigator to conduct their study. These research acts are named as
planning of the research, determination of research aim, aim and objectives finalization,
structuring of the study, and evaluation of journals for research. Other acts are literature
review activity, determination of data collection method, survey design; make draft,
evaluation of the data, interpretation and findings, conclusions as well as recommendations,
and final submission. in this study, the data collection method takes higher time as compared
to other research acts hence this act could be more time taking over the other acts. The
researcher completes their research act in determined time.
20
Computing
data collection
method
Survey design
Make draft
Evaluation of the
data
Interpretation
and findings
Conclusions as
well as
Recommendation
s
Final Submission
With respect to the above table, it can be concluded that there are many acts that are
considered by the investigator to conduct their study. These research acts are named as
planning of the research, determination of research aim, aim and objectives finalization,
structuring of the study, and evaluation of journals for research. Other acts are literature
review activity, determination of data collection method, survey design; make draft,
evaluation of the data, interpretation and findings, conclusions as well as recommendations,
and final submission. in this study, the data collection method takes higher time as compared
to other research acts hence this act could be more time taking over the other acts. The
researcher completes their research act in determined time.
20
Ethical Review Form
Provide details of ethical issues that can arise from a research project that involves
humans as participants
an Ethical Review Form must be completed (Please bear in mind that the below is simply
an example)
Provide details of ethical issues that can arise from a research project that involves
humans as participants
an Ethical Review Form must be completed (Please bear in mind that the below is simply
an example)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
1
Computing
1
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
10. Consent Form
Provide a consent form which participants will need to sign in order to take part in the
research activity. (Please bear in mind that the below is simply an example)
The Ethics of Surveillance in the Workplace Research Consent Form
Dear Participant,
The purpose of this interview and survey is for a research purpose only as it is part of my
research project “The ethics of surveillance in the workplace”. The aim of this research
project is to investigate the concerns employees have regarding the data that is collected
about them through surveillance in the workplace, and whether they are aware of the different
surveillance techniques used in the workplace by organisations and employers.
I am inviting you to take part in an interview and a survey in which you will be asked to
answer a series of questions; you may wish to complete them both on the same day or you
may to complete the survey in your own time and send it back to me. The interview research
session will involve only two people, me and the participant (yourself) and it will not be
recorded in any kind of way, only your answers will be taken down on paper by me, and the
interview session will last about 30 minutes.
Your participation in this research is voluntary and you have the right to withdraw any time.
You will get to keep a signed copy of the informed consent form if you wish to take part in
this research, and any information recorded from this research will not be passed on to any
2
Computing
10. Consent Form
Provide a consent form which participants will need to sign in order to take part in the
research activity. (Please bear in mind that the below is simply an example)
The Ethics of Surveillance in the Workplace Research Consent Form
Dear Participant,
The purpose of this interview and survey is for a research purpose only as it is part of my
research project “The ethics of surveillance in the workplace”. The aim of this research
project is to investigate the concerns employees have regarding the data that is collected
about them through surveillance in the workplace, and whether they are aware of the different
surveillance techniques used in the workplace by organisations and employers.
I am inviting you to take part in an interview and a survey in which you will be asked to
answer a series of questions; you may wish to complete them both on the same day or you
may to complete the survey in your own time and send it back to me. The interview research
session will involve only two people, me and the participant (yourself) and it will not be
recorded in any kind of way, only your answers will be taken down on paper by me, and the
interview session will last about 30 minutes.
Your participation in this research is voluntary and you have the right to withdraw any time.
You will get to keep a signed copy of the informed consent form if you wish to take part in
this research, and any information recorded from this research will not be passed on to any
2
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
third party. All the data and information collected from this research is fully confidential and
will only be stored on my personal laptop, and the university account which is password
protect and prevents anyone from accessing my account other than myself.
The personal data collection from this research will be minimised and the personal data
which is necessarily needed will be asked for otherwise not. Your data will only be used with
this project but will not have any of your personal details included.
Once the research project is complete, the data and information gathered about the participant
will be kept for a maximum time of 1 year but, no more than that, and the entire data and
information collected will be fully destroyed.
If you have any questions regarding this project or research please do not hesitate to contact
myself XXXXXXX, student at De Montfort University via the following email address;
pxxxxxxxx@myemail.dmu.ac.uk
By signing this consent form you specify that you understand the following:
9. I understand the purpose of this project and agree to take part in this research
10. I understand that the data collected will only be used in this project
11. I understand that I can withdraw from this research at any time
12. I understand that the data will be fully destroyed as stated above
3
Computing
third party. All the data and information collected from this research is fully confidential and
will only be stored on my personal laptop, and the university account which is password
protect and prevents anyone from accessing my account other than myself.
The personal data collection from this research will be minimised and the personal data
which is necessarily needed will be asked for otherwise not. Your data will only be used with
this project but will not have any of your personal details included.
Once the research project is complete, the data and information gathered about the participant
will be kept for a maximum time of 1 year but, no more than that, and the entire data and
information collected will be fully destroyed.
If you have any questions regarding this project or research please do not hesitate to contact
myself XXXXXXX, student at De Montfort University via the following email address;
pxxxxxxxx@myemail.dmu.ac.uk
By signing this consent form you specify that you understand the following:
9. I understand the purpose of this project and agree to take part in this research
10. I understand that the data collected will only be used in this project
11. I understand that I can withdraw from this research at any time
12. I understand that the data will be fully destroyed as stated above
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Participants Signature: _________________________________
Date of Participants Signature: ___________________________
Researcher’s Signature: __________________________________
Date of Researcher’s Signature: ____________________________
11. Pilot study
Please specify your gender
Male
Female
Please specify your experience in Tesco
Less than 1 years
2 to 6 years
More than 7 years
Please specify your age
Under 23
24 to 28
More than 28
Do you agree that privacy is associated to the content. Refraining by public eye as well as
keeping confidentiality?
Strongly Agree
4
Computing
Participants Signature: _________________________________
Date of Participants Signature: ___________________________
Researcher’s Signature: __________________________________
Date of Researcher’s Signature: ____________________________
11. Pilot study
Please specify your gender
Male
Female
Please specify your experience in Tesco
Less than 1 years
2 to 6 years
More than 7 years
Please specify your age
Under 23
24 to 28
More than 28
Do you agree that privacy is associated to the content. Refraining by public eye as well as
keeping confidentiality?
Strongly Agree
4
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
Agree
Neutral
Disagree
Strongly disagree
Do you feel that that human interaction is a best way of conducting study in an imperative
manner?
Yes
No
Do you agreed that technology could plays an imperative role in getting favourable
information but due to the huge amount of information sometimes organizational would
confuted to manage the data effectively?
Strongly Agree
Agree
Neutral
Disagree
Strongly disagree
Do you feel that huge data of business as well as personal information of consumers could be
secured by the new tool?
Yes
No
Do you feel that The greater part of the current security protecting plans center around
moderately segregated application situations and specialized focuses, and propose answers
for explicit issues in a given application situation?
Yes
No
5
Computing
Agree
Neutral
Disagree
Strongly disagree
Do you feel that that human interaction is a best way of conducting study in an imperative
manner?
Yes
No
Do you agreed that technology could plays an imperative role in getting favourable
information but due to the huge amount of information sometimes organizational would
confuted to manage the data effectively?
Strongly Agree
Agree
Neutral
Disagree
Strongly disagree
Do you feel that huge data of business as well as personal information of consumers could be
secured by the new tool?
Yes
No
Do you feel that The greater part of the current security protecting plans center around
moderately segregated application situations and specialized focuses, and propose answers
for explicit issues in a given application situation?
Yes
No
5
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in
Computing
6
Computing
6
1 out of 28
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.