Project Proposal: Biometric Technology, Challenges and Opportunities
VerifiedAdded on  2022/12/12
|21
|4467
|336
Project
AI Summary
This project proposal explores the realm of biometric technology, focusing on its applications in authentication and security within organizations. It delves into various biometric methods, including facial recognition, fingerprint readers, and voice recognition, examining their functionalities, advantages, and disadvantages. The proposal addresses key research questions regarding biometric solutions for security, application fields, and the opportunities and drawbacks of implementation. A comprehensive literature review supports the research, covering positive and negative recognition, application fields, and biometric solutions. The proposal includes a detailed project plan, ethical considerations, and relevant references, providing a thorough overview of the subject. The report discusses the evolution of biometric technology, its role in modern security systems, and the challenges and opportunities it presents for organizations seeking to enhance their security protocols. The proposal also examines the ethical dimensions of biometric implementation, including data privacy and potential biases. The project aims to provide a comprehensive understanding of biometric technology and its implications.

Running head: PROJECT PROPOSAL
Project Proposal
Name of Student-
Name of University-
Author’s Note-
Project Proposal
Name of Student-
Name of University-
Author’s Note-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1PROJECT PROPOSAL
Title- Biometric Technology Recognition: Their Challenges and Opportunities
Abstract
The organizations mainly search for more methods of authentication that are secured for
accessing, e-commerce as well as includes some other application security. For this reason
biometrics is now a days increasing its attention in the organizations. But, there always remains a
doubt whether to use biometric in the organization or not. And if decided, the company gets
confused about which biometric to choose and which is the best technology of biometric for
them to use. There are different applications of biometric that are used in an organization.
Biometrics is considered as the automated recognition of the individuals that are based on
behavioural characteristics and the biological characteristics. Biometric is a particular tool that
helps to establish the confidence of a particular individual. This report deals with the details of
the biometric use and different types of biometric that an organization uses. This report also
states advantages as well as disadvantages that are discussed in this report below.
Title- Biometric Technology Recognition: Their Challenges and Opportunities
Abstract
The organizations mainly search for more methods of authentication that are secured for
accessing, e-commerce as well as includes some other application security. For this reason
biometrics is now a days increasing its attention in the organizations. But, there always remains a
doubt whether to use biometric in the organization or not. And if decided, the company gets
confused about which biometric to choose and which is the best technology of biometric for
them to use. There are different applications of biometric that are used in an organization.
Biometrics is considered as the automated recognition of the individuals that are based on
behavioural characteristics and the biological characteristics. Biometric is a particular tool that
helps to establish the confidence of a particular individual. This report deals with the details of
the biometric use and different types of biometric that an organization uses. This report also
states advantages as well as disadvantages that are discussed in this report below.

2PROJECT PROPOSAL
Table of Contents
Title..................................................................................................................................................1
1. Introduction..................................................................................................................................4
2. Research Questions......................................................................................................................5
3. Literature Review........................................................................................................................5
3.1 Positive and Negative Recognition........................................................................................5
3.2 Application Fields included in Biometrics Technology........................................................6
3.3 Biometric Solutions for Security Purpose.............................................................................7
3.5 Advantages and Disadvantages of Biometrics Security System...........................................8
4. Research Methodologies............................................................................................................10
4. 1. Analysing the sources of information................................................................................10
4.2. Research method.................................................................................................................10
4.3 Data collection or systems design methods.........................................................................11
4.4 Ethical Considerations.........................................................................................................11
5. Detailed Project Plan.................................................................................................................12
6. Conclusion.................................................................................................................................13
7. References..................................................................................................................................15
8. Appendices................................................................................................................................18
9. Ethical Consideration.................................................................................................................20
Table of Contents
Title..................................................................................................................................................1
1. Introduction..................................................................................................................................4
2. Research Questions......................................................................................................................5
3. Literature Review........................................................................................................................5
3.1 Positive and Negative Recognition........................................................................................5
3.2 Application Fields included in Biometrics Technology........................................................6
3.3 Biometric Solutions for Security Purpose.............................................................................7
3.5 Advantages and Disadvantages of Biometrics Security System...........................................8
4. Research Methodologies............................................................................................................10
4. 1. Analysing the sources of information................................................................................10
4.2. Research method.................................................................................................................10
4.3 Data collection or systems design methods.........................................................................11
4.4 Ethical Considerations.........................................................................................................11
5. Detailed Project Plan.................................................................................................................12
6. Conclusion.................................................................................................................................13
7. References..................................................................................................................................15
8. Appendices................................................................................................................................18
9. Ethical Consideration.................................................................................................................20
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3PROJECT PROPOSAL
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4PROJECT PROPOSAL
1. Introduction
The concept of biometric deals with unique physical as well as behavioural
characteristics that helps to recognize the identity of the individual and authenticate the identity
of the individual (Vazquez-Fernandez and Gonzalez-Jimenez 2016). There are common physical
biometrics that includes fingerprints, retina, facial, and palm and geometry characteristics. For
the security of an organization, the organizations mainly uses three different type of
authentication.
ï‚· The credentials that are known that is a PIN, a password or some personal information
that are included.
ï‚· The credentials that are needed that is a smart card, token like SecureID card or card key.
ï‚· Something that is related to an individual that is biometric.
From all the above stated security authentication, biometric is one the most important as
well as secured. Biometric authentication cannot be borrowed, forgotten or can be stolen.
Forging the biometric data is not possible practically. The behavioural characteristics in
biometric includes signature, the voice, gait as well as the keystroke pattern used in an
organization. From all the biometric technologies, signature is one of the most developed
technology that are used for authentication.
Different from tokens or systems that are based on password based, the system of
biometric functions without particular input, knowledge or the user cooperation that includes the
recognition includes in authentication (Mitchell and Shing 2018). The system of biometric is
considered as a general replacement for all other authentication technologies. Combination of the
1. Introduction
The concept of biometric deals with unique physical as well as behavioural
characteristics that helps to recognize the identity of the individual and authenticate the identity
of the individual (Vazquez-Fernandez and Gonzalez-Jimenez 2016). There are common physical
biometrics that includes fingerprints, retina, facial, and palm and geometry characteristics. For
the security of an organization, the organizations mainly uses three different type of
authentication.
ï‚· The credentials that are known that is a PIN, a password or some personal information
that are included.
ï‚· The credentials that are needed that is a smart card, token like SecureID card or card key.
ï‚· Something that is related to an individual that is biometric.
From all the above stated security authentication, biometric is one the most important as
well as secured. Biometric authentication cannot be borrowed, forgotten or can be stolen.
Forging the biometric data is not possible practically. The behavioural characteristics in
biometric includes signature, the voice, gait as well as the keystroke pattern used in an
organization. From all the biometric technologies, signature is one of the most developed
technology that are used for authentication.
Different from tokens or systems that are based on password based, the system of
biometric functions without particular input, knowledge or the user cooperation that includes the
recognition includes in authentication (Mitchell and Shing 2018). The system of biometric is
considered as a general replacement for all other authentication technologies. Combination of the

5PROJECT PROPOSAL
approaches of a biometric with some other methods does not includes much security which does
not include user cooperation that are included.
2. Research Questions
The research questions that this research paper addresses are listed below:
1. What are the biometric solutions that are used for security purposes of authentication?
2. What are the fields that uses biometric technology for its security purposes?
3. What are the opportunities and drawbacks of using biometric technology?
3. Literature Review
3.1 Positive and Negative Recognition
As stated by Chandy et al. (2017), there are possible two kinds of applications in
biometrics that can be established. One is negative recognition and the other is positive
recognition. Both of these recognitions are explained below:
Positive recognition: The applications that does not require the users to give its identity
for the convenience comes under this group. The process of identification requires less
operations compared to the verification of the user and the identification process is easy to
operate. The verification of identity is mainly used in the place of positive recognition (Alsaadi
2015). The operation mode of positive recognition is very interesting and the user might be
interested to be recognized. This process of recognition is positive. If recognition is not done, the
attempt of the individual will be rejected.
Negative recognition: Negative recognition mainly includes a system to establish if a
person denies of being that person (Mahadi et al. 2018). The main purpose of including the
approaches of a biometric with some other methods does not includes much security which does
not include user cooperation that are included.
2. Research Questions
The research questions that this research paper addresses are listed below:
1. What are the biometric solutions that are used for security purposes of authentication?
2. What are the fields that uses biometric technology for its security purposes?
3. What are the opportunities and drawbacks of using biometric technology?
3. Literature Review
3.1 Positive and Negative Recognition
As stated by Chandy et al. (2017), there are possible two kinds of applications in
biometrics that can be established. One is negative recognition and the other is positive
recognition. Both of these recognitions are explained below:
Positive recognition: The applications that does not require the users to give its identity
for the convenience comes under this group. The process of identification requires less
operations compared to the verification of the user and the identification process is easy to
operate. The verification of identity is mainly used in the place of positive recognition (Alsaadi
2015). The operation mode of positive recognition is very interesting and the user might be
interested to be recognized. This process of recognition is positive. If recognition is not done, the
attempt of the individual will be rejected.
Negative recognition: Negative recognition mainly includes a system to establish if a
person denies of being that person (Mahadi et al. 2018). The main purpose of including the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6PROJECT PROPOSAL
negative recognition helps to prevent a particular person from using multiple identities. The
methods of classical recognition can provide this particular type of recognition. The biometrics
can be used for negative recognition. The applications of government as well as forensics mainly
belongs to this particular group where the users is not identified and is not collaborative.
3.2 Application Fields included in Biometrics Technology
As stated by Haupt and Mozer (2015), the physical control of access mainly refers to all
the processes that includes the physical characteristics. The control of logical access mainly
includes schemes, techniques, as well as procedures that are used in the biometric system. There
are many difference between the control of physical access as well as control of logical access.
Physical Access Control: This control mainly covers the authentication process of
identity that requires all the users to include the physical characteristics. This is mainly used in
location which needs high security such as military, police stations, and the hospitals. The
common use of physical control access are the application that are applied in computers or at
doors. These applications are very confidential and is important and include very high level of
security. The physical access mainly helps to reduce the problems of human related risks.
Logical Access Control: the logical access is mainly a process that includes a scheme
control that refers to a particular process to control the scheme containing the data files or the
computer programs (Masupha et al. 2015). The logical access contains personal as well as
privacy information that includes different users. This technology is mainly used by the military
as well as governments for protecting the data for having high security using the technology of
biometric.
negative recognition helps to prevent a particular person from using multiple identities. The
methods of classical recognition can provide this particular type of recognition. The biometrics
can be used for negative recognition. The applications of government as well as forensics mainly
belongs to this particular group where the users is not identified and is not collaborative.
3.2 Application Fields included in Biometrics Technology
As stated by Haupt and Mozer (2015), the physical control of access mainly refers to all
the processes that includes the physical characteristics. The control of logical access mainly
includes schemes, techniques, as well as procedures that are used in the biometric system. There
are many difference between the control of physical access as well as control of logical access.
Physical Access Control: This control mainly covers the authentication process of
identity that requires all the users to include the physical characteristics. This is mainly used in
location which needs high security such as military, police stations, and the hospitals. The
common use of physical control access are the application that are applied in computers or at
doors. These applications are very confidential and is important and include very high level of
security. The physical access mainly helps to reduce the problems of human related risks.
Logical Access Control: the logical access is mainly a process that includes a scheme
control that refers to a particular process to control the scheme containing the data files or the
computer programs (Masupha et al. 2015). The logical access contains personal as well as
privacy information that includes different users. This technology is mainly used by the military
as well as governments for protecting the data for having high security using the technology of
biometric.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7PROJECT PROPOSAL
The difference between logical access and the physical access is that the logical access is
mainly used for computer networks as well as controlling of the systems. This helps to reduce
the complexity of the requirements of using passwords for the users.
3.3 Biometric Solutions for Security Purpose
Facial Recognition: The human face recognition is the earliest characteristics that are to
be used as biometric system for securing the identity of a user. For the technology of facial
recognition, it is widely used because there is no need of using any type of physical contact
between the device and the users (Saifan et al. 2016). The cameras helps to scan the face of the
users and matches the data with the database for identification and verification. It is very easy to
install as well as it requires expensive hardware. The technology of facial recognition is widely
used in different types of security systems that includes physical controlling access as well as
computer accounts of users. The negative factor that is included with the technology of facial
recognition includes with the user ages, the facial recognition of the user will change over the
time.
Fingerprint reader: There are number of ridges in the fingerprints of the users and the
valleys are also present in the surface of the finger which are unique for identifying each human.
The ridges of the fingers forms main points, the ridges ending where there is the ending of the
ridges, the ridges bifurcations which includes ridges to split in two parts. The unique point of the
fingerprint is determining the different types of patterns of the ridges and the furrows and
includes minutiae points. There are basically five basic patterns that are included in a
fingerprint.
However, this fingerprint technique also has many disadvantages in a system. If the
fingerprint gets damaged due to some accident or some marks on the surface, it becomes very
The difference between logical access and the physical access is that the logical access is
mainly used for computer networks as well as controlling of the systems. This helps to reduce
the complexity of the requirements of using passwords for the users.
3.3 Biometric Solutions for Security Purpose
Facial Recognition: The human face recognition is the earliest characteristics that are to
be used as biometric system for securing the identity of a user. For the technology of facial
recognition, it is widely used because there is no need of using any type of physical contact
between the device and the users (Saifan et al. 2016). The cameras helps to scan the face of the
users and matches the data with the database for identification and verification. It is very easy to
install as well as it requires expensive hardware. The technology of facial recognition is widely
used in different types of security systems that includes physical controlling access as well as
computer accounts of users. The negative factor that is included with the technology of facial
recognition includes with the user ages, the facial recognition of the user will change over the
time.
Fingerprint reader: There are number of ridges in the fingerprints of the users and the
valleys are also present in the surface of the finger which are unique for identifying each human.
The ridges of the fingers forms main points, the ridges ending where there is the ending of the
ridges, the ridges bifurcations which includes ridges to split in two parts. The unique point of the
fingerprint is determining the different types of patterns of the ridges and the furrows and
includes minutiae points. There are basically five basic patterns that are included in a
fingerprint.
However, this fingerprint technique also has many disadvantages in a system. If the
fingerprint gets damaged due to some accident or some marks on the surface, it becomes very

8PROJECT PROPOSAL
difficult for identify (Zapata et al. 2017). The system mainly requires finger surface of the users
so that they might have a minutiae or some pattern so that the patterns matches. There is a
limitation factor for the algorithm security in the system. The system of fingerprint security
mainly consists of different applications that includes cell phones, the flash drives, the laptops
and many other devices.
Voice Recognition: For voice recognition, there are mainly two factors for making a voice
of human unique; a physiological component which is commonly known as the voice trait and
the second is the behavioural component that includes the voice accent. By the combination of
all the factors, it is not possible to imitate the voice of other person in an exact manner (Hsiao et
al. 2016). Taking the advantages of these factors, the technology of biometrics is created in the
system of voice recognition to verify the identification of a person only with their voice. The
technology of voice recognition mainly focus on the tract of the voice. This is because it includes
a unique characteristics in a physiological trait. This voice recognition works perfectly with the
access control for the users.
Singh, A. and Chatterjee (2015) stated that this technology also has some disadvantages.
These factors affects the quality of a particular system. The performance related with the voice
recognition technology allows the users to record the voice on their database is the most
important part. The users are mainly asked to have a repeat paraphrase of the voice or some
sequence numbers so that the voice of the person is stored accurately.
3.5 Advantages and Disadvantages of Biometrics Security System
Advantages
difficult for identify (Zapata et al. 2017). The system mainly requires finger surface of the users
so that they might have a minutiae or some pattern so that the patterns matches. There is a
limitation factor for the algorithm security in the system. The system of fingerprint security
mainly consists of different applications that includes cell phones, the flash drives, the laptops
and many other devices.
Voice Recognition: For voice recognition, there are mainly two factors for making a voice
of human unique; a physiological component which is commonly known as the voice trait and
the second is the behavioural component that includes the voice accent. By the combination of
all the factors, it is not possible to imitate the voice of other person in an exact manner (Hsiao et
al. 2016). Taking the advantages of these factors, the technology of biometrics is created in the
system of voice recognition to verify the identification of a person only with their voice. The
technology of voice recognition mainly focus on the tract of the voice. This is because it includes
a unique characteristics in a physiological trait. This voice recognition works perfectly with the
access control for the users.
Singh, A. and Chatterjee (2015) stated that this technology also has some disadvantages.
These factors affects the quality of a particular system. The performance related with the voice
recognition technology allows the users to record the voice on their database is the most
important part. The users are mainly asked to have a repeat paraphrase of the voice or some
sequence numbers so that the voice of the person is stored accurately.
3.5 Advantages and Disadvantages of Biometrics Security System
Advantages
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9PROJECT PROPOSAL
As stated by Radhika, Jeddy and Nithya (2016), there are many advantages related with
the use of biometric in an organization. The first advantage that the biometric system includes of
using the new technology as its uniqueness and this is one of the main characteristics that helps
the use of biometric technology to become more important in the organizations. With the
uniqueness involved in biometric technology, each of the identification of the individual will
include effective identification of the users. The chance of having two users using the same
identification in technology of biometric security is not possible.
Secondly, the biometric is considered as a high secured way for identifying the users that
makes technology less addicted for the users for sharing their high sensitive data (Wiercioch,
Teufel and Teufel 2016). The users can share the fingerprints, iris as well as allowing the users
for accessing the information security. Each constraint that is used during the identification
consists of single property that are used by the users.
Lastly, the advantage of using the biometric technology is that the data that are related
with the biometric cannot be stolen, forgotten, as well as lost. The aspect of the biometric
technology mainly makes the technology popular (Padma and Srinivasan 2016). The method of
biometric helps to identify as well as give access to the users to make the identification very
easy. The system of biometrics security is very easy to install as well as requires very small
amount of funding for the equipment.
Disadvantages
As stated by Meng et al. (2015), there are many flaws that are included in using the
biometric system. The applications system of biometric has many weakness that causes many
problems for the users. If the system of biometric uses fingerprints for identifying the users, any
As stated by Radhika, Jeddy and Nithya (2016), there are many advantages related with
the use of biometric in an organization. The first advantage that the biometric system includes of
using the new technology as its uniqueness and this is one of the main characteristics that helps
the use of biometric technology to become more important in the organizations. With the
uniqueness involved in biometric technology, each of the identification of the individual will
include effective identification of the users. The chance of having two users using the same
identification in technology of biometric security is not possible.
Secondly, the biometric is considered as a high secured way for identifying the users that
makes technology less addicted for the users for sharing their high sensitive data (Wiercioch,
Teufel and Teufel 2016). The users can share the fingerprints, iris as well as allowing the users
for accessing the information security. Each constraint that is used during the identification
consists of single property that are used by the users.
Lastly, the advantage of using the biometric technology is that the data that are related
with the biometric cannot be stolen, forgotten, as well as lost. The aspect of the biometric
technology mainly makes the technology popular (Padma and Srinivasan 2016). The method of
biometric helps to identify as well as give access to the users to make the identification very
easy. The system of biometrics security is very easy to install as well as requires very small
amount of funding for the equipment.
Disadvantages
As stated by Meng et al. (2015), there are many flaws that are included in using the
biometric system. The applications system of biometric has many weakness that causes many
problems for the users. If the system of biometric uses fingerprints for identifying the users, any
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10PROJECT PROPOSAL
accident caused with the user might result in loss of the finger. This might face difficulty in
verification of the process. For the methods of voice recognition, there is illnesses that might
include throat strep which can be hard for the users to access the information (Enamamu et al.
2017). There is another factor that might influence the system of voice recognition with some
continuous aging for the users. The noise in the environment can also hamper the voice
recognition that helps to identify the users to make the users that are to be identified.
According to Shen et al. (2016), for the iris or the rental scanning of the applications, the
users might be very intrusive. The users may have concern with their safety of eyes when the iris
of the human is scanned for retinal scan. The databases that are used for storing the user
identification might be very large which might include a potential threat. For scanning the
characteristics of the iris and to store the large amount of the data related, biometrics system used
mainly requires new as well as modern technologies. The cost in the equipment is very much
expensive.
4. Research Methodologies
4. 1. Analysing the sources of information: All the sources from where the information
are taken to carry out this research paper is books, articles, thesis papers, and all the other
published materials that are related to the biometrics security in authentication. The information
that are mainly included in this research paper is mainly collected from the online library
including the Google scholar, as well as the published materials that have a proper title, the
publication information and the name of the author (Walliman 2017). For doing the citation,
Harvard referencing style is used that will mainly state the authority of all authors, the state of
publication related with the journal and the associated with the publisher.
accident caused with the user might result in loss of the finger. This might face difficulty in
verification of the process. For the methods of voice recognition, there is illnesses that might
include throat strep which can be hard for the users to access the information (Enamamu et al.
2017). There is another factor that might influence the system of voice recognition with some
continuous aging for the users. The noise in the environment can also hamper the voice
recognition that helps to identify the users to make the users that are to be identified.
According to Shen et al. (2016), for the iris or the rental scanning of the applications, the
users might be very intrusive. The users may have concern with their safety of eyes when the iris
of the human is scanned for retinal scan. The databases that are used for storing the user
identification might be very large which might include a potential threat. For scanning the
characteristics of the iris and to store the large amount of the data related, biometrics system used
mainly requires new as well as modern technologies. The cost in the equipment is very much
expensive.
4. Research Methodologies
4. 1. Analysing the sources of information: All the sources from where the information
are taken to carry out this research paper is books, articles, thesis papers, and all the other
published materials that are related to the biometrics security in authentication. The information
that are mainly included in this research paper is mainly collected from the online library
including the Google scholar, as well as the published materials that have a proper title, the
publication information and the name of the author (Walliman 2017). For doing the citation,
Harvard referencing style is used that will mainly state the authority of all authors, the state of
publication related with the journal and the associated with the publisher.

11PROJECT PROPOSAL
4.2. Research method: The research methods that are included with this research paper is
quantitative methodology as well as qualitative methodology. The research methods that are
included in this research paper is primary research methods and secondary research method. The
primary research method includes carrying out interviews and surveys with a particular selected
area. For secondary research methods, all qualitative data are collected from different online
books and online published books that are related with the research topic (Schoenduwe et al.
2015). Both primary method as well as secondary methods are used to carry out the research to
evaluate the use of biometric for security purpose.
4.3 Data collection or systems design methods: The method of data collection is
basically a method that includes the results of the development process included with the systems
(Ding-Mastera et al. 2018). The groups that are involved in this process of data collection mainly
helps to collect the data related to the topic and is then undertaken as well as analysing the data
that are being collected. The method of data collection mainly helps to conduct the research is
primary data collection method and secondary research methods. The data that are collected for
primary data collection are collected from interview and survey that are being carried out. For
carrying out the quantitative methodology, the quantitative data is being analysed that are
collected from the survey and the questionnaires that are being carried out. Survey and interview
will be held that will be carried out with respondents (Divakar and Arakeri 2018). The
respondents included for carrying out the research is employees of three technological companies
and interview will be carried out within the managers of the organization. For analysing the
qualitative data, different journals and different articles are being studied that includes
observations of different authors who have their different views on the related topic.
4.2. Research method: The research methods that are included with this research paper is
quantitative methodology as well as qualitative methodology. The research methods that are
included in this research paper is primary research methods and secondary research method. The
primary research method includes carrying out interviews and surveys with a particular selected
area. For secondary research methods, all qualitative data are collected from different online
books and online published books that are related with the research topic (Schoenduwe et al.
2015). Both primary method as well as secondary methods are used to carry out the research to
evaluate the use of biometric for security purpose.
4.3 Data collection or systems design methods: The method of data collection is
basically a method that includes the results of the development process included with the systems
(Ding-Mastera et al. 2018). The groups that are involved in this process of data collection mainly
helps to collect the data related to the topic and is then undertaken as well as analysing the data
that are being collected. The method of data collection mainly helps to conduct the research is
primary data collection method and secondary research methods. The data that are collected for
primary data collection are collected from interview and survey that are being carried out. For
carrying out the quantitative methodology, the quantitative data is being analysed that are
collected from the survey and the questionnaires that are being carried out. Survey and interview
will be held that will be carried out with respondents (Divakar and Arakeri 2018). The
respondents included for carrying out the research is employees of three technological companies
and interview will be carried out within the managers of the organization. For analysing the
qualitative data, different journals and different articles are being studied that includes
observations of different authors who have their different views on the related topic.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 21
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.