A Research Proposal on Biometric Technology in the Workplace
VerifiedAdded on 2023/01/23
|32
|6641
|83
Report
AI Summary
This research proposal investigates the implementation of biometric technology in the workplace, addressing its benefits, ethical considerations, and potential drawbacks. The proposal begins with a background on the increasing popularity of biometric systems, such as fingerprint scanners and facial recognition, highlighting their advantages over traditional authentication methods like passwords. The research questions focus on the helpfulness of biometric techniques, employee awareness of their benefits, and employee support for their use. The literature review covers an overview of biometric technology, its advantages (enhanced security, time-saving), and disadvantages (potential for misuse, privacy concerns). The methodology section explores various research approaches, including questionnaires, interviews, surveys, focus groups, and case studies, ultimately selecting interviews and surveys as the primary methods for data collection. The proposal also examines the use of biometric technology in the UK, including its application in schools and various sectors. The abstract provides a concise overview of the study's focus on the impact of biometric technology on workplace practices. Keywords include: the workplace, monitoring, workplace punctuality, and biometric technology.

Running Head: RESEARCH PROPOSAL
Research Proposal
Name of the Student
Name of the University
Author Note
Research Proposal
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1RESEARCH PROPOSAL
Table of Contents
1.Background...................................................................................................................................3
2.Research Questions.......................................................................................................................3
3.Literature Review.........................................................................................................................4
3.1Overview of Biometric Technology.......................................................................................4
3.2 Benefits of the Biometric systems.........................................................................................5
3.3 Ethics of using biometric information...................................................................................5
3.4 Disadvantages of Biometric technology................................................................................5
3.5 The biometric technology in the UK.....................................................................................6
4.Methodology Review....................................................................................................................6
4.1Questionnaires........................................................................................................................7
4.2Interviews...............................................................................................................................7
4.3Surveys...................................................................................................................................8
4.4The Focus Group....................................................................................................................9
4.5The case studies....................................................................................................................10
4.6Chosen Methodologies.........................................................................................................10
4.6.1.Interview...........................................................................................................................10
4.6.2.Survey...............................................................................................................................11
5.Conclusion..................................................................................................................................12
Table of Contents
1.Background...................................................................................................................................3
2.Research Questions.......................................................................................................................3
3.Literature Review.........................................................................................................................4
3.1Overview of Biometric Technology.......................................................................................4
3.2 Benefits of the Biometric systems.........................................................................................5
3.3 Ethics of using biometric information...................................................................................5
3.4 Disadvantages of Biometric technology................................................................................5
3.5 The biometric technology in the UK.....................................................................................6
4.Methodology Review....................................................................................................................6
4.1Questionnaires........................................................................................................................7
4.2Interviews...............................................................................................................................7
4.3Surveys...................................................................................................................................8
4.4The Focus Group....................................................................................................................9
4.5The case studies....................................................................................................................10
4.6Chosen Methodologies.........................................................................................................10
4.6.1.Interview...........................................................................................................................10
4.6.2.Survey...............................................................................................................................11
5.Conclusion..................................................................................................................................12

2RESEARCH PROPOSAL
Abstract
In the modern world of digitalization, people are completely surrounded by the technologies and
the tools. From the entrepreneurs to the enterprises, technology supports in the empowerment at
all levels. The information and communication technology has hugely affected people’s lives in
the modern world. The information empowers people and the information technology facilitates
the access to it. In the recent years, the rise of the smartphones, internet and the computing
devices have transformed the way people connect and collaborate with others. Biometric is one
such technology which emerged quietly and crept into the lives of people. The biometric is used
in the Airport security, the attendance system is the workplaces, in bank security, criminal
identification, cash-less shopping, the financial transaction management, internet banking and
many others. The primary research question is how much the biometric technology has been
helpful in the workplace. The proposal investigates the ethical issues related to the use of
biometric technology in the workplace.
Key words
The workplaces, monitoring, workplace punctuality, biometric technology
Abstract
In the modern world of digitalization, people are completely surrounded by the technologies and
the tools. From the entrepreneurs to the enterprises, technology supports in the empowerment at
all levels. The information and communication technology has hugely affected people’s lives in
the modern world. The information empowers people and the information technology facilitates
the access to it. In the recent years, the rise of the smartphones, internet and the computing
devices have transformed the way people connect and collaborate with others. Biometric is one
such technology which emerged quietly and crept into the lives of people. The biometric is used
in the Airport security, the attendance system is the workplaces, in bank security, criminal
identification, cash-less shopping, the financial transaction management, internet banking and
many others. The primary research question is how much the biometric technology has been
helpful in the workplace. The proposal investigates the ethical issues related to the use of
biometric technology in the workplace.
Key words
The workplaces, monitoring, workplace punctuality, biometric technology

3RESEARCH PROPOSAL
1.Background
There are various reasons of the biometric technologies gaining popularity in the
workplaces. The technology has different advantages over the authentication methods. In the
past few years, various organizations have solely relied on the four digit pins and passwords to
access the different sets of data in the workplace. It is quite often that the hackers can easily
penetrate through breaking the passwords. The sensitive data have been stolen through breaking
the passwords. The handling of the sensitive data through wrong hands can result in critical
problems. The data access can be restricted through the biometric technologies. Recently, the
iPhone X has launched the face recognition as a way for checking authentication. The business
owners use the biometric technology to maintain the data related to employee attendance along
with the overtime payments. Through the biometric technology, the employee reaching time can
be tracked accurately. Moreover, the companies can also use the biometric technology
integration along with the automated time management systems for saving both time and money.
This proposal will investigate the ethical issues related to use of biometric technology in the
workplace.
2.Research Questions
How much the biometric techniques are helpful in the workplace?
Are the employees aware of the benefits of the biometric technology in the workplace?
Do the employees support the use of biometric technology in the workplace?
1.Background
There are various reasons of the biometric technologies gaining popularity in the
workplaces. The technology has different advantages over the authentication methods. In the
past few years, various organizations have solely relied on the four digit pins and passwords to
access the different sets of data in the workplace. It is quite often that the hackers can easily
penetrate through breaking the passwords. The sensitive data have been stolen through breaking
the passwords. The handling of the sensitive data through wrong hands can result in critical
problems. The data access can be restricted through the biometric technologies. Recently, the
iPhone X has launched the face recognition as a way for checking authentication. The business
owners use the biometric technology to maintain the data related to employee attendance along
with the overtime payments. Through the biometric technology, the employee reaching time can
be tracked accurately. Moreover, the companies can also use the biometric technology
integration along with the automated time management systems for saving both time and money.
This proposal will investigate the ethical issues related to use of biometric technology in the
workplace.
2.Research Questions
How much the biometric techniques are helpful in the workplace?
Are the employees aware of the benefits of the biometric technology in the workplace?
Do the employees support the use of biometric technology in the workplace?
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4RESEARCH PROPOSAL
3.Literature Review
3.1Overview of Biometric Technology
The tern biometric is related to the application of the measurable physical characteristics
of the human body. The biometric scanners were limited to the spy stories and the science
fictions. Now, the technology is commonly used in relation to the security devices. The
techniques have been used for the security purposes. The methods include the matching of a
person with their photograph or matching with the passport descriptions such as weight, height,
skin colour, eyes and hair. With the development of the advanced technologies, various
electronic scanning devices have also been developed for the security purpose. The devices are
the voice recognition recorders, the fingerprint, thumbprint and handprint scanners, the retinal
scanners, the facial recognition systems and keystroke dynamic recognition software.
The conventional forms of identification have been subject to fraud and manipulation. Taken for
example, there are various card systems which proven to be highly vulnerable. The chances of
forgery in the card systems are high. Hence, the biometric technology has proven to be far more
efficient and effective form of identification.
The increase in the availability of such equipment, the employers are utilizing within
their access control systems. The implementation of the biometric security in the workplace,
initiated the ethical and the legal concerns. Taken for example, the investigation of the criminals
uses the fingerprints as the source of identification. It has raised the apprehension regarding a
loss of dignity. However, there might arise questions on the ability of an employer to compel the
staffs for providing appropriate samples that allows the biometric systems to operate. There are
also some other particular issues which arise in relation to the security and privacy.
3.Literature Review
3.1Overview of Biometric Technology
The tern biometric is related to the application of the measurable physical characteristics
of the human body. The biometric scanners were limited to the spy stories and the science
fictions. Now, the technology is commonly used in relation to the security devices. The
techniques have been used for the security purposes. The methods include the matching of a
person with their photograph or matching with the passport descriptions such as weight, height,
skin colour, eyes and hair. With the development of the advanced technologies, various
electronic scanning devices have also been developed for the security purpose. The devices are
the voice recognition recorders, the fingerprint, thumbprint and handprint scanners, the retinal
scanners, the facial recognition systems and keystroke dynamic recognition software.
The conventional forms of identification have been subject to fraud and manipulation. Taken for
example, there are various card systems which proven to be highly vulnerable. The chances of
forgery in the card systems are high. Hence, the biometric technology has proven to be far more
efficient and effective form of identification.
The increase in the availability of such equipment, the employers are utilizing within
their access control systems. The implementation of the biometric security in the workplace,
initiated the ethical and the legal concerns. Taken for example, the investigation of the criminals
uses the fingerprints as the source of identification. It has raised the apprehension regarding a
loss of dignity. However, there might arise questions on the ability of an employer to compel the
staffs for providing appropriate samples that allows the biometric systems to operate. There are
also some other particular issues which arise in relation to the security and privacy.

5RESEARCH PROPOSAL
3.2 Benefits of the Biometric systems
There are few specific reasons to use the biometric technology in the workplaces. In the
past years, many organizations used to rely on the passwords and the four digit security codes.
The hackers can easily break the passwords and penetrate into the secured places. The sensitive
data such as trade, customer information reached in wrong hands might create critical issues. The
biometric technology is far more effective because it uses the personalized identifications. The
technology helps to save huge time because in the past years, it was difficult to keep record of
the attendance and punctuality of each employee. The biometric technology is helpful in
tracking the entry and exit time of the employees accurately. Apart from these, the biometric
technology has helped the organizations to increase the security levels.
3.3 Ethics of using biometric information
There are some of the ethical concerns related to the use of the biometric information in
the workplace. The employer having the biometric information of an employee or a visitor
should use the information only for the security purpose and not for others. There must be a
contractual agreement between the employer and the person providing the biometric information.
In the past, the employers in the organizations used to introduce the surveillance cameras into the
workplace with the intention of protecting the staff’s physical properties. The footage could be
extracted from the surveillance cameras for monitoring. There have been developed some of the
industry codes for protecting the personal information.
3.4 Disadvantages of Biometric technology
Although biometric technology has gained huge popularity in the organizations, there are
some de-merits too of the technology. One of the biggest disadvantage of biometric is , it cannot
be altered remotely. When a person loses access to an email, it can always initiate a remote way
3.2 Benefits of the Biometric systems
There are few specific reasons to use the biometric technology in the workplaces. In the
past years, many organizations used to rely on the passwords and the four digit security codes.
The hackers can easily break the passwords and penetrate into the secured places. The sensitive
data such as trade, customer information reached in wrong hands might create critical issues. The
biometric technology is far more effective because it uses the personalized identifications. The
technology helps to save huge time because in the past years, it was difficult to keep record of
the attendance and punctuality of each employee. The biometric technology is helpful in
tracking the entry and exit time of the employees accurately. Apart from these, the biometric
technology has helped the organizations to increase the security levels.
3.3 Ethics of using biometric information
There are some of the ethical concerns related to the use of the biometric information in
the workplace. The employer having the biometric information of an employee or a visitor
should use the information only for the security purpose and not for others. There must be a
contractual agreement between the employer and the person providing the biometric information.
In the past, the employers in the organizations used to introduce the surveillance cameras into the
workplace with the intention of protecting the staff’s physical properties. The footage could be
extracted from the surveillance cameras for monitoring. There have been developed some of the
industry codes for protecting the personal information.
3.4 Disadvantages of Biometric technology
Although biometric technology has gained huge popularity in the organizations, there are
some de-merits too of the technology. One of the biggest disadvantage of biometric is , it cannot
be altered remotely. When a person loses access to an email, it can always initiate a remote way

6RESEARCH PROPOSAL
of recovering it. During the process, the person becomes able to change the password or add the
two-factor authentication that doubles the security of the account. The way biometric works, the
person has to be near the device for securing the data set. When the first fingerprint is registered
in a device, the device asks to give multiple presses taken from different angles. The samples are
used as the original data for comparing subsequent unlock attempts. One disadvantage is that the
passwords can be changed whenever needed but the fingerprint, retina and Iris can never be
changed. The copy of these when taken by someone can do anything and nothing can be
changed. The fingerprint can be easily copied by creating fake fingers. The copy of the finger
line patterns can be helpful in opening up the device.
3.5 The biometric technology in the UK
In the UK, the biometric identification are being rapidly used in maximum of the public
and the private sector organizations especially in the Border Agency. The biometric
identification is also being used in the schools of Britain. In the year 2012, it has been reported
by BBC that almost 33 % of the secondary schools are requiring the parents to use the biometric
identification. Reports also suggest that millions of pupils are getting fingerprinted. In the
public and the private sectors, there are various purposes to use the biometric technology such as
the payment processing, the automated cash dispensers, work permits, healthcare, driving
licensing, voting and any other reasons. It is assumed that in the coming years, the security
factors in the biometric will increase around Britain and in other countries.
4.Methodology Review
In a research project, there are various approaches to be used. The main objective of the
approaches is to answer the research questions. The approaches can be divided into two types,
of recovering it. During the process, the person becomes able to change the password or add the
two-factor authentication that doubles the security of the account. The way biometric works, the
person has to be near the device for securing the data set. When the first fingerprint is registered
in a device, the device asks to give multiple presses taken from different angles. The samples are
used as the original data for comparing subsequent unlock attempts. One disadvantage is that the
passwords can be changed whenever needed but the fingerprint, retina and Iris can never be
changed. The copy of these when taken by someone can do anything and nothing can be
changed. The fingerprint can be easily copied by creating fake fingers. The copy of the finger
line patterns can be helpful in opening up the device.
3.5 The biometric technology in the UK
In the UK, the biometric identification are being rapidly used in maximum of the public
and the private sector organizations especially in the Border Agency. The biometric
identification is also being used in the schools of Britain. In the year 2012, it has been reported
by BBC that almost 33 % of the secondary schools are requiring the parents to use the biometric
identification. Reports also suggest that millions of pupils are getting fingerprinted. In the
public and the private sectors, there are various purposes to use the biometric technology such as
the payment processing, the automated cash dispensers, work permits, healthcare, driving
licensing, voting and any other reasons. It is assumed that in the coming years, the security
factors in the biometric will increase around Britain and in other countries.
4.Methodology Review
In a research project, there are various approaches to be used. The main objective of the
approaches is to answer the research questions. The approaches can be divided into two types,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7RESEARCH PROPOSAL
the qualitative and the quantitative. The methodologies include the interviews, the surveys,
questionnaires, case studies and others. Each methodology either qualitative or qualitative has
its own merits and drawbacks too. In every research project, the selection of the suitable
methodology is important and it should be based on the type of data- collection method used in
the research project.
4.1Questionnaires
The questionnaires can be considered as both the qualitative and quantitative method. It
depends on the nature of the questions. The questions with the close ending are analyzed with
the quantitative methods. It may include the bar-charts, the pie-charts and the percentages too.
The open-ended answers are analyzed with the qualitative method which involves critical
analyses and discussions too. It is without using the calculations and the numbers. The
questions should be formulated having used an unambiguous and straightforward manner. The
questions should be prepared in a logical order. There are various benefits of the questionnaires.
It increases the speed of data collection with low or almost no cost. There are certain
disadvantages too such as the respondents often randomly answer the questions without reading
them.
4.2Interviews
The interviews are the qualitative research techniques that involve the conduction of
intensive individual interviews among small number of respondents. It helps to explore their
perspectives on a specific idea, situation or program. There are different formats of interviews
such as the structured, semi-structured and unstructured. The structured interviews are a series
of pre-determined questions which are used at the time of interview. The interviewees answer to
the questions in the same order is in which they are set. The data analysis is considered to be a
the qualitative and the quantitative. The methodologies include the interviews, the surveys,
questionnaires, case studies and others. Each methodology either qualitative or qualitative has
its own merits and drawbacks too. In every research project, the selection of the suitable
methodology is important and it should be based on the type of data- collection method used in
the research project.
4.1Questionnaires
The questionnaires can be considered as both the qualitative and quantitative method. It
depends on the nature of the questions. The questions with the close ending are analyzed with
the quantitative methods. It may include the bar-charts, the pie-charts and the percentages too.
The open-ended answers are analyzed with the qualitative method which involves critical
analyses and discussions too. It is without using the calculations and the numbers. The
questions should be formulated having used an unambiguous and straightforward manner. The
questions should be prepared in a logical order. There are various benefits of the questionnaires.
It increases the speed of data collection with low or almost no cost. There are certain
disadvantages too such as the respondents often randomly answer the questions without reading
them.
4.2Interviews
The interviews are the qualitative research techniques that involve the conduction of
intensive individual interviews among small number of respondents. It helps to explore their
perspectives on a specific idea, situation or program. There are different formats of interviews
such as the structured, semi-structured and unstructured. The structured interviews are a series
of pre-determined questions which are used at the time of interview. The interviewees answer to
the questions in the same order is in which they are set. The data analysis is considered to be a

8RESEARCH PROPOSAL
straightforward way to compare and contrast different answers given to a single question. The
unstructured interviews, from the research viewpoint are the least reliable process. There are no
prior-preparation of the interview questions and data is collected in an informal manner. On the
other hand, the semi- structured interviews consist both the formal and the informal questions
and settings. The interviewer prepares a set of questions to be answered by the interviewees.
There can be some additional questions too for more clarification.
There are various advantages of interviews which includes the possibilities of collecting
detailed information regarding the research question. This is a type of primary data collection
having direct control over the process having chance to clarify few issues. However, there are
few disadvantages too such as the prolonged time for collecting data. The difficulties connected
with arranging proper time with the sample group also arise.
4.3Surveys
The survey methods can be referred to as “questioning individuals on a particular topic
having described the responses. In the research projects, the survey methods are used as the
primary data collection for testing the concepts, reflecting the attitude of people and conduct
segmentation research. The survey method can be applied in both the qualitative and quantitative
studies. The survey method serves two purposes such as describing few aspects of population
and testing the hypothesis regarding the type of relationships within a population. The survey
methods can be divided into three categories. This is the mail survey, the personal interview and
the telephone survey. The mail survey is a written survey which is self-administered, the
telephone survey is conducted over the telephones. The personal interview is a face to face
interview of the respondents. The most popular varieties of the surveys include the interviews,
the questionnaires and the documentation review. In order to conduct the survey, firstly, a
straightforward way to compare and contrast different answers given to a single question. The
unstructured interviews, from the research viewpoint are the least reliable process. There are no
prior-preparation of the interview questions and data is collected in an informal manner. On the
other hand, the semi- structured interviews consist both the formal and the informal questions
and settings. The interviewer prepares a set of questions to be answered by the interviewees.
There can be some additional questions too for more clarification.
There are various advantages of interviews which includes the possibilities of collecting
detailed information regarding the research question. This is a type of primary data collection
having direct control over the process having chance to clarify few issues. However, there are
few disadvantages too such as the prolonged time for collecting data. The difficulties connected
with arranging proper time with the sample group also arise.
4.3Surveys
The survey methods can be referred to as “questioning individuals on a particular topic
having described the responses. In the research projects, the survey methods are used as the
primary data collection for testing the concepts, reflecting the attitude of people and conduct
segmentation research. The survey method can be applied in both the qualitative and quantitative
studies. The survey method serves two purposes such as describing few aspects of population
and testing the hypothesis regarding the type of relationships within a population. The survey
methods can be divided into three categories. This is the mail survey, the personal interview and
the telephone survey. The mail survey is a written survey which is self-administered, the
telephone survey is conducted over the telephones. The personal interview is a face to face
interview of the respondents. The most popular varieties of the surveys include the interviews,
the questionnaires and the documentation review. In order to conduct the survey, firstly, a

9RESEARCH PROPOSAL
sample or the audience is required with a series of survey respondent’s data. The respondents
are required for answering the survey questions. There are two types of sampling such as the
probability sampling and the non-probability sampling. The probability sampling method is a
method where the respondents are selected on the basis of the theory of probability. The non-
probability sampling on the other hand is a method where the respondents are selected on the
basis of their own gut or discretion without any predefined selection process.
4.4The Focus Group
The focus group is a qualitative research technique which is used by the companies for
marketing. It consists of small number of participants within 6-12 from the target market. The
focus group is a qualitative research that asks the participants to respond to open –ended
questions. The other type is the quantitative research which is more data driven and uses the
surveys or the questionnaires for deriving numerical based percentages or statistics. There are
various benefits of the focus group. It is helpful when the research results are highly un-
predictive. The focus group allows the participant to express their feelings in an open
conversation. Another benefit is that the moderator can easily observe the dynamic among the
members of the focus group. There are certain drawbacks of the focus group such as the primary
concern of the focus group is “groupthink”. There are often instances of people influencing the
other people in the group. It can be referred to as a process of gathering a group of people by
selecting them deliberately. It intends to conduct a planned discussion for eliciting he consumer
perceptions regarding a particular topic area of interest. The focus group helps to obtain data
from the consumers without using the survey method. The survey instruments tend to be
considered as scientific while producing the quantitative data. The focus group has a distinct
advantage of being flexible in designs which capitalize on the ability of decision. The focus
sample or the audience is required with a series of survey respondent’s data. The respondents
are required for answering the survey questions. There are two types of sampling such as the
probability sampling and the non-probability sampling. The probability sampling method is a
method where the respondents are selected on the basis of the theory of probability. The non-
probability sampling on the other hand is a method where the respondents are selected on the
basis of their own gut or discretion without any predefined selection process.
4.4The Focus Group
The focus group is a qualitative research technique which is used by the companies for
marketing. It consists of small number of participants within 6-12 from the target market. The
focus group is a qualitative research that asks the participants to respond to open –ended
questions. The other type is the quantitative research which is more data driven and uses the
surveys or the questionnaires for deriving numerical based percentages or statistics. There are
various benefits of the focus group. It is helpful when the research results are highly un-
predictive. The focus group allows the participant to express their feelings in an open
conversation. Another benefit is that the moderator can easily observe the dynamic among the
members of the focus group. There are certain drawbacks of the focus group such as the primary
concern of the focus group is “groupthink”. There are often instances of people influencing the
other people in the group. It can be referred to as a process of gathering a group of people by
selecting them deliberately. It intends to conduct a planned discussion for eliciting he consumer
perceptions regarding a particular topic area of interest. The focus group helps to obtain data
from the consumers without using the survey method. The survey instruments tend to be
considered as scientific while producing the quantitative data. The focus group has a distinct
advantage of being flexible in designs which capitalize on the ability of decision. The focus
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10RESEARCH PROPOSAL
groups are considered as a part of the series were the participants vary but there is constant area
of interest.
4.5The case studies
The case studies are also a research method use especially in the business area. It is a
qualitative method used to analyze particular issues in the boundaries of an environment,
organization or situation. As per the design, the case studies can be classified into two groups
such as the explanatory case studies and the descriptive case studies. The descriptive case
studies focus on the analysis of interpersonal events after a certain period has passed. The
exploratory case study aims to find the answers of “who “ and “ what “. The data collection
method in the exploratory research is accompanied by the data collection methods such as the
questionnaires, the interviews and the experiments. The advantages of the case study methods
are that it includes the data collection in the context of integration, phenomenon and quantitative
data in the data analysis. The drawback are the lack of rigor, the challenges connected with the
data analysis with little basis for the generalizations of conclusions.
4.6Chosen Methodologies
4.6.1.Interview
The interview is a qualitative method that helps to answer the research questions. The
reason behind choosing this topic is to collect the open –ended answers which cannot be
answered through the survey method. This method will give the participants, the opportunity to
elaborate on their answers to the question of the interviewer. It allows the interviewers to ask
additional questions relevant to the topic. Since, this is an investigative research, in –depth
analysis is required for the better analysis from the participants. Hence, the present research
groups are considered as a part of the series were the participants vary but there is constant area
of interest.
4.5The case studies
The case studies are also a research method use especially in the business area. It is a
qualitative method used to analyze particular issues in the boundaries of an environment,
organization or situation. As per the design, the case studies can be classified into two groups
such as the explanatory case studies and the descriptive case studies. The descriptive case
studies focus on the analysis of interpersonal events after a certain period has passed. The
exploratory case study aims to find the answers of “who “ and “ what “. The data collection
method in the exploratory research is accompanied by the data collection methods such as the
questionnaires, the interviews and the experiments. The advantages of the case study methods
are that it includes the data collection in the context of integration, phenomenon and quantitative
data in the data analysis. The drawback are the lack of rigor, the challenges connected with the
data analysis with little basis for the generalizations of conclusions.
4.6Chosen Methodologies
4.6.1.Interview
The interview is a qualitative method that helps to answer the research questions. The
reason behind choosing this topic is to collect the open –ended answers which cannot be
answered through the survey method. This method will give the participants, the opportunity to
elaborate on their answers to the question of the interviewer. It allows the interviewers to ask
additional questions relevant to the topic. Since, this is an investigative research, in –depth
analysis is required for the better analysis from the participants. Hence, the present research

11RESEARCH PROPOSAL
method will help to answer the question with better emphasis. Taken for example, the interview
questions will be like “ What do you think about the advantage and disadvantages of biometric
technology used in the workplace ?”. Such open ended question will help the researchers to get
more information for answering to the research question. The participant will be allowed to
express their own concerns in great detail.
Moreover, the participants will be interviewed in their own preferred place with
comfortable environment. The reactions of the participants will be accounted in the personal
interview which will help the researcher to determine their moods and perspectives. Another
benefit of the interview method is that if a participant does not understand a particular question,
he /she can ask the interviewer to repeat or decode it. 50 participants from 3 different
multinational companies will be requested to participate in the 40 minutes interview.
4.6.2.Survey
The survey method is also selected for answering the research question. The reasons
behind choosing the qualitative research method is that it is a quick and easy method suitable for
collecting necessary data from a large population within a short period of time. The interview
method is used for the detailed information; the survey will allow the researcher to gain
necessary data with low cost. The data will be analysed in the numerical form and create
generalized conclusions. The surveys are fast resulting and a huge amount of data can be
gathered simultaneously. The survey will be conducted through the web portal or emails. 250
participants from different multinational companies will be used for completing the survey.
method will help to answer the question with better emphasis. Taken for example, the interview
questions will be like “ What do you think about the advantage and disadvantages of biometric
technology used in the workplace ?”. Such open ended question will help the researchers to get
more information for answering to the research question. The participant will be allowed to
express their own concerns in great detail.
Moreover, the participants will be interviewed in their own preferred place with
comfortable environment. The reactions of the participants will be accounted in the personal
interview which will help the researcher to determine their moods and perspectives. Another
benefit of the interview method is that if a participant does not understand a particular question,
he /she can ask the interviewer to repeat or decode it. 50 participants from 3 different
multinational companies will be requested to participate in the 40 minutes interview.
4.6.2.Survey
The survey method is also selected for answering the research question. The reasons
behind choosing the qualitative research method is that it is a quick and easy method suitable for
collecting necessary data from a large population within a short period of time. The interview
method is used for the detailed information; the survey will allow the researcher to gain
necessary data with low cost. The data will be analysed in the numerical form and create
generalized conclusions. The surveys are fast resulting and a huge amount of data can be
gathered simultaneously. The survey will be conducted through the web portal or emails. 250
participants from different multinational companies will be used for completing the survey.

12RESEARCH PROPOSAL
5.Conclusion
The rise in the use of the biometric technology in the workplace brings various issues to
the individuals especially the employees who are under the working environment. The
literatures have been covered for acknowledging the ways in which the topic has been researched
in the past years. This research proposal has well explained the topic of “ the ethics of biometric
technology use” in the workplace. The topic has been explored for answering the question of
“How much the biometric techniques are helpful in the workplace?” . The proposal revels that
different methodologies will be used for answering the research question.
6.Project Plan
Please refer to the Appendix A in the Appendices section. In the Gantt Chart , the
fragmented version of the research project is shown with appropriate dates.
7.Ethical Issues
The possible ethical issues arising from the research project which involves the human
participants. Hence, an ethical review form is provided in the Appendix B revealing the ethical
issues relate to the research project.
8.Consent Form
The data from the participants will be gathered to answer the research question. Hence,
each participant will be given a consent form where they will need to sign. Please refer to the
Appendix C in the Appendices section.
5.Conclusion
The rise in the use of the biometric technology in the workplace brings various issues to
the individuals especially the employees who are under the working environment. The
literatures have been covered for acknowledging the ways in which the topic has been researched
in the past years. This research proposal has well explained the topic of “ the ethics of biometric
technology use” in the workplace. The topic has been explored for answering the question of
“How much the biometric techniques are helpful in the workplace?” . The proposal revels that
different methodologies will be used for answering the research question.
6.Project Plan
Please refer to the Appendix A in the Appendices section. In the Gantt Chart , the
fragmented version of the research project is shown with appropriate dates.
7.Ethical Issues
The possible ethical issues arising from the research project which involves the human
participants. Hence, an ethical review form is provided in the Appendix B revealing the ethical
issues relate to the research project.
8.Consent Form
The data from the participants will be gathered to answer the research question. Hence,
each participant will be given a consent form where they will need to sign. Please refer to the
Appendix C in the Appendices section.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13RESEARCH PROPOSAL
9.Pilot interview questions
The interview will be one approach to gather data answering the research question.
Hence, the pilot interview questions will be give in the Appendix D.
10.Pilot Survey questions and design
The survey will be another approach to gather data answering the research question.
Hence, a pilot survey design is given along with the questions.
9.Pilot interview questions
The interview will be one approach to gather data answering the research question.
Hence, the pilot interview questions will be give in the Appendix D.
10.Pilot Survey questions and design
The survey will be another approach to gather data answering the research question.
Hence, a pilot survey design is given along with the questions.

14RESEARCH PROPOSAL
11.References
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative
research. Sage.
Athale, S.S., Patil, D., Deshpande, P. and Dandawate, Y.H., 2015. Hardware implementation of
palm vein biometric modality for access control in multilayered security system. Procedia
Computer Science, 58, pp.492-498.
Bell, E., Bryman, A. and Harley, B., 2018. Business research methods. Oxford university press.
Bernard, H.R., 2017. Research methods in anthropology: Qualitative and quantitative
approaches. Rowman & Littlefield.
Borgianni, Y., Rauch, E., Maccioni, L. and Mark, B.G., 2018, December. User Experience
Analysis in Industry 4.0-The Use of Biometric Devices in Engineering Design and
Manufacturing. In 2018 IEEE International Conference on Industrial Engineering and
Engineering Management (IEEM)(pp. 192-196). IEEE.
Carroll, T., 2016. Employee Perceptions of Biometric Security Adoption in the Workplace.
Northcentral University.
Durães, D., Carneiro, D., Bajo, J. and Novais, P., 2018. Modelling a smart environment for
nonintrusive analysis of attention in the workplace. Expert Systems, 35(5), p.e12275.
11.References
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative
research. Sage.
Athale, S.S., Patil, D., Deshpande, P. and Dandawate, Y.H., 2015. Hardware implementation of
palm vein biometric modality for access control in multilayered security system. Procedia
Computer Science, 58, pp.492-498.
Bell, E., Bryman, A. and Harley, B., 2018. Business research methods. Oxford university press.
Bernard, H.R., 2017. Research methods in anthropology: Qualitative and quantitative
approaches. Rowman & Littlefield.
Borgianni, Y., Rauch, E., Maccioni, L. and Mark, B.G., 2018, December. User Experience
Analysis in Industry 4.0-The Use of Biometric Devices in Engineering Design and
Manufacturing. In 2018 IEEE International Conference on Industrial Engineering and
Engineering Management (IEEM)(pp. 192-196). IEEE.
Carroll, T., 2016. Employee Perceptions of Biometric Security Adoption in the Workplace.
Northcentral University.
Durães, D., Carneiro, D., Bajo, J. and Novais, P., 2018. Modelling a smart environment for
nonintrusive analysis of attention in the workplace. Expert Systems, 35(5), p.e12275.

15RESEARCH PROPOSAL
Goldstein, D.M. and Alonso-Bejarano, C., 2017. E-Terrify: Securitized Immigration and
Biometric Surveillance in the Workplace. Human Organization, 76(1), p.1.
Kashyap, R., 2019. Biometric Authentication Techniques and E-Learning. In Biometric
Authentication in Online Learning Environments (pp. 236-265). IGI Global.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications
Limited.
Moore, P. and Piwek, L., 2017. Regulating wellbeing in the brave new quantified
workplace. Employee Relations, 39(3), pp.308-316.
North-Samardzic, A., 2019. Biometric Technology and Ethics: Beyond Security
Applications. Journal of Business Ethics, pp.1-18.
Pai, C.K., Wang, T.W., Chen, S.H. and Cai, K.Y., 2018. Empirical study on Chinese tourists’
perceived trust and intention to use biometric technology. Asia Pacific Journal of Tourism
Research, 23(9), pp.880-895.
Rubin, A. and Babbie, E.R., 2016. Empowerment series: Research methods for social work.
Cengage Learning.
Salvador, L.C.R., 2017, September. Security systems: The introduction of biometrie technology
as a smart solution. In 2017 IEEE 15th International Symposium on Intelligent Systems and
Informatics (SISY) (pp. 000347-000352). IEEE.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
Goldstein, D.M. and Alonso-Bejarano, C., 2017. E-Terrify: Securitized Immigration and
Biometric Surveillance in the Workplace. Human Organization, 76(1), p.1.
Kashyap, R., 2019. Biometric Authentication Techniques and E-Learning. In Biometric
Authentication in Online Learning Environments (pp. 236-265). IGI Global.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications
Limited.
Moore, P. and Piwek, L., 2017. Regulating wellbeing in the brave new quantified
workplace. Employee Relations, 39(3), pp.308-316.
North-Samardzic, A., 2019. Biometric Technology and Ethics: Beyond Security
Applications. Journal of Business Ethics, pp.1-18.
Pai, C.K., Wang, T.W., Chen, S.H. and Cai, K.Y., 2018. Empirical study on Chinese tourists’
perceived trust and intention to use biometric technology. Asia Pacific Journal of Tourism
Research, 23(9), pp.880-895.
Rubin, A. and Babbie, E.R., 2016. Empowerment series: Research methods for social work.
Cengage Learning.
Salvador, L.C.R., 2017, September. Security systems: The introduction of biometrie technology
as a smart solution. In 2017 IEEE 15th International Symposium on Intelligent Systems and
Informatics (SISY) (pp. 000347-000352). IEEE.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16RESEARCH PROPOSAL
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A
guidebook and resource. John Wiley & Sons.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A
guidebook and resource. John Wiley & Sons.

17RESEARCH PROPOSAL
12.Appendices
12.1 Appendix A
The project plan- Gantt Chart
Task name Duration Start Finish Predecessor
Pilot study of the
chosen research
methodology
Administer 5
pilot surveys
Administer 5
pilot
interviews
Amend
survey for
any
improvement
s suggested
from the pilot
surveys
Amend
survey for
any
10 days total
3 days
3 days
2 days
2 days
1/05/19 WED
1/05/19
5/05/19
9/05/19
12/05/109
11/05/19
4/05/19
8/05/19
11/05/19
14/05/19
12.Appendices
12.1 Appendix A
The project plan- Gantt Chart
Task name Duration Start Finish Predecessor
Pilot study of the
chosen research
methodology
Administer 5
pilot surveys
Administer 5
pilot
interviews
Amend
survey for
any
improvement
s suggested
from the pilot
surveys
Amend
survey for
any
10 days total
3 days
3 days
2 days
2 days
1/05/19 WED
1/05/19
5/05/19
9/05/19
12/05/109
11/05/19
4/05/19
8/05/19
11/05/19
14/05/19

18RESEARCH PROPOSAL
improvement
s suggested
from the pilot
interviews
Execute Chosen
research
methodologies
Administer
surveys via a
company web
portal for
employees in
the
organization
Interview 15
employees
from
company 1
Interview 15
employees
from
company 2
Interview 20
30 days total
30 days
5 days
5 days
5 days
15/05/19
15/05/19
15/05/19
21/05/19
28/05/19
15/06/19
15/06/19
20/05/19
26/05/19
2/06/19
2
improvement
s suggested
from the pilot
interviews
Execute Chosen
research
methodologies
Administer
surveys via a
company web
portal for
employees in
the
organization
Interview 15
employees
from
company 1
Interview 15
employees
from
company 2
Interview 20
30 days total
30 days
5 days
5 days
5 days
15/05/19
15/05/19
15/05/19
21/05/19
28/05/19
15/06/19
15/06/19
20/05/19
26/05/19
2/06/19
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19RESEARCH PROPOSAL
employees
from
company 3
Analysis of results
gathered from surveys
and interviews
Analyse
survey results
Analyse
interview
results from
company 1
Analyse
interview
results from
company 2
Analyse
interview
results from
company 3
Write up
critical
evaluation
29 days
13 days
6 days
6 days
11 days
34 days
4/06/19
4/06/19
18/06/19
25/06/19
1/07/19
13/07/19
3/07/19
17/06/19
24/06/19
30/06/19
12/07/19
16/08/19
7
12
12
employees
from
company 3
Analysis of results
gathered from surveys
and interviews
Analyse
survey results
Analyse
interview
results from
company 1
Analyse
interview
results from
company 2
Analyse
interview
results from
company 3
Write up
critical
evaluation
29 days
13 days
6 days
6 days
11 days
34 days
4/06/19
4/06/19
18/06/19
25/06/19
1/07/19
13/07/19
3/07/19
17/06/19
24/06/19
30/06/19
12/07/19
16/08/19
7
12
12

20RESEARCH PROPOSAL
Write up final
report on the
overall
research topic
and project
12.2 Appendix B
DE MONTFORTUNIVERSITY
APPLICATION FORM TO GAIN APPROVAL FOR ACTIVITIES INVOLVING
HUMAN RESEARCH
Notice to Staff and Students
If your research involves using human tissue or fluid samples please DO NOT use this
application form.
Please approach the Research and Commercial Office, Faculty of Health and Life
Sciences, 2.25L Hawthorn Building, Phone: 7891 / 7777 for the correct application form
if you are using human tissue.
The University requires that approval is obtained by members of staff of the University
and by students of the University who wish to engage in the type of research detailed
below. Please use this form for an application if your research involves:
1. Gathering information from or/and about individual human beings (and
organisations) through:
interviewing
surveying
questionnaires
Write up final
report on the
overall
research topic
and project
12.2 Appendix B
DE MONTFORTUNIVERSITY
APPLICATION FORM TO GAIN APPROVAL FOR ACTIVITIES INVOLVING
HUMAN RESEARCH
Notice to Staff and Students
If your research involves using human tissue or fluid samples please DO NOT use this
application form.
Please approach the Research and Commercial Office, Faculty of Health and Life
Sciences, 2.25L Hawthorn Building, Phone: 7891 / 7777 for the correct application form
if you are using human tissue.
The University requires that approval is obtained by members of staff of the University
and by students of the University who wish to engage in the type of research detailed
below. Please use this form for an application if your research involves:
1. Gathering information from or/and about individual human beings (and
organisations) through:
interviewing
surveying
questionnaires

21RESEARCH PROPOSAL
observation of human behaviour
modifying/disturbing human behaviour
interfering in normal physiological and/or psychological processes
2. Using archived data in which individuals are identifiable.
3. Researching into activities which involves direct observation of or contact with
those who are or who might reasonably be supposed to be engaged in or have
engaged in criminal activities or activities which are related to criminal activity
4. Research which involves a risk of physical or psychological injury to the
researcher or any other person involved in the research
5. Supporting innovation that might impact on human behaviour e.g. Behavioural
Studies
[It should be noted that in regard to research into illegal activities there are no
exclusions or blanket permissions and the University Insurance cover may not
apply if the research activity has not been cleared by the University or, in certain
cases with delegated authority, the appropriate Faculty Committee.]
Guidance and support will be given by your supervisor (for student research), your line
manager or an appropriate designated officer/ Faculty Research Office. Queries arising
out of this should be directed to:
FAILURE TO GAIN FREC APPROVAL FOR YOUR RESEARCH MEANS THAT YOUR PROJECT
MAY BE FAILED OR THAT YOU ARE SUBJECT TO DISCIPLINARY ACTION.
observation of human behaviour
modifying/disturbing human behaviour
interfering in normal physiological and/or psychological processes
2. Using archived data in which individuals are identifiable.
3. Researching into activities which involves direct observation of or contact with
those who are or who might reasonably be supposed to be engaged in or have
engaged in criminal activities or activities which are related to criminal activity
4. Research which involves a risk of physical or psychological injury to the
researcher or any other person involved in the research
5. Supporting innovation that might impact on human behaviour e.g. Behavioural
Studies
[It should be noted that in regard to research into illegal activities there are no
exclusions or blanket permissions and the University Insurance cover may not
apply if the research activity has not been cleared by the University or, in certain
cases with delegated authority, the appropriate Faculty Committee.]
Guidance and support will be given by your supervisor (for student research), your line
manager or an appropriate designated officer/ Faculty Research Office. Queries arising
out of this should be directed to:
FAILURE TO GAIN FREC APPROVAL FOR YOUR RESEARCH MEANS THAT YOUR PROJECT
MAY BE FAILED OR THAT YOU ARE SUBJECT TO DISCIPLINARY ACTION.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22RESEARCH PROPOSAL
DE MONTFORTUNIVERSITY
APPLICATION FORM FOR RESEARCH ACTIVITY REQUIRINGHUMAN RESEARCH
ETHICS CONSIDERATION OR APPROVAL
Staff/Student Name Programme (if relevant)
Title of Research Project
Brief description of proposed activity and its objectives:
The ethics of Bio-metric technology in the workplace
The survey – A survey will b conducted for finding out the concerns of the employees in
the workplace regarding the use of bio-metric technology. It also aimed at finding out
their thought on its benefits or losses. The survey will be done by using the online survey
tool such as Survey Monkey. The employees will be 250 in number from different
multinational companies.
The interview- The interview method will be used for gathering in-depth information on
the research topic. It will also help to gain additional information for the employees
related to the topic of concern. 50 participants from 3 different multinational companies
will be requested to participate in the 40 minutes interview
DE MONTFORTUNIVERSITY
APPLICATION FORM FOR RESEARCH ACTIVITY REQUIRINGHUMAN RESEARCH
ETHICS CONSIDERATION OR APPROVAL
Staff/Student Name Programme (if relevant)
Title of Research Project
Brief description of proposed activity and its objectives:
The ethics of Bio-metric technology in the workplace
The survey – A survey will b conducted for finding out the concerns of the employees in
the workplace regarding the use of bio-metric technology. It also aimed at finding out
their thought on its benefits or losses. The survey will be done by using the online survey
tool such as Survey Monkey. The employees will be 250 in number from different
multinational companies.
The interview- The interview method will be used for gathering in-depth information on
the research topic. It will also help to gain additional information for the employees
related to the topic of concern. 50 participants from 3 different multinational companies
will be requested to participate in the 40 minutes interview

23RESEARCH PROPOSAL
Ethical issues identified: How these will be addressed:
To which ethical codes of conduct have you referred? These are specific to each Faculty
and if you have a query please ask your supervisor or Faculty REC for advice.
1. During the collection of data from
different sources such as surveys
and interviews for finding the
concerns regarding the use of
biometric technology in the
workplace. It can be difficult to
assume the behaviors and opinions
of the participants while answering
the questions.
2. The confidentiality
3. The privacy and the data
protection
4. Management of the interview data
5. Management of the survey data
6. Data destruction
1. The people participating will be
informed that these interview and
surveys are only for the research
purpose.
2. The purpose of the research, the
involved activities will be explained to
the participants.
3. There will be a signed consent from
every participant in the study.
4. The interview data can be managed by
explaining to the participants that the
personal data which is the most
essential will be asked for otherwise
not.
5. After the completion of the research
project the participants’ data will be
kept for a limited period and not more
than that. The data will be completely
destroyed after that.
6. The data will be used only if the
participants agree.
Ethical issues identified: How these will be addressed:
To which ethical codes of conduct have you referred? These are specific to each Faculty
and if you have a query please ask your supervisor or Faculty REC for advice.
1. During the collection of data from
different sources such as surveys
and interviews for finding the
concerns regarding the use of
biometric technology in the
workplace. It can be difficult to
assume the behaviors and opinions
of the participants while answering
the questions.
2. The confidentiality
3. The privacy and the data
protection
4. Management of the interview data
5. Management of the survey data
6. Data destruction
1. The people participating will be
informed that these interview and
surveys are only for the research
purpose.
2. The purpose of the research, the
involved activities will be explained to
the participants.
3. There will be a signed consent from
every participant in the study.
4. The interview data can be managed by
explaining to the participants that the
personal data which is the most
essential will be asked for otherwise
not.
5. After the completion of the research
project the participants’ data will be
kept for a limited period and not more
than that. The data will be completely
destroyed after that.
6. The data will be used only if the
participants agree.

24RESEARCH PROPOSAL
How have concerns regarding the safety of the researcher and/or the research subject been
addressed if applicable?
Checklist for applicant:
Has the research proposal identified any of the following research procedures?
1. Gathering information from or/and about human beings through: Interviewing, Surveying,
Questionnaires, Observation of human behaviour
2. Using archived data in which individuals are identifiable
3. Researching into illegal activities, activities at the margins of the law or activities that have a
risk of personal injury
4. Supporting innovation that might impact on human behaviour e.g. Behavioural Studies
How have concerns regarding the safety of the researcher and/or the research subject been
addressed if applicable?
Checklist for applicant:
Has the research proposal identified any of the following research procedures?
1. Gathering information from or/and about human beings through: Interviewing, Surveying,
Questionnaires, Observation of human behaviour
2. Using archived data in which individuals are identifiable
3. Researching into illegal activities, activities at the margins of the law or activities that have a
risk of personal injury
4. Supporting innovation that might impact on human behaviour e.g. Behavioural Studies
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25RESEARCH PROPOSAL
The following should be considered. Please tick yes as relevant:
Providing participants with full details of the objectives of the research
Providing information appropriate for those whose first language is not English
Voluntary participation with informed consent
Written description of involvement
Freedom to withdraw
Keeping appropriate records
Signed acknowledgement and understanding by participants
Relevant codes of conduct/guidelines
Are there other/additional factors that could/will give rise to ethical concerns? E.g.
Communication difficulties
None
List of accompanying documentation to support the application:
(1) A copy of the research proposal
(2) The details of arrangements for participation of human subjects(including recruitment,
consent and confidentiality procedures and documentation as appropriate)
(3) A copy of all the documentation provided to the volunteer to ensure the clarity of
informationprovided
(4) Copies of appropriate other ethical committee permissions (internal or external) or
supporting documentation
(5) If appropriate: a list of proprietary drugs or commercial drugs to be used in the proposed
investigation includingformulation, dosage and route of administration and known adverse side
effects
The following should be considered. Please tick yes as relevant:
Providing participants with full details of the objectives of the research
Providing information appropriate for those whose first language is not English
Voluntary participation with informed consent
Written description of involvement
Freedom to withdraw
Keeping appropriate records
Signed acknowledgement and understanding by participants
Relevant codes of conduct/guidelines
Are there other/additional factors that could/will give rise to ethical concerns? E.g.
Communication difficulties
None
List of accompanying documentation to support the application:
(1) A copy of the research proposal
(2) The details of arrangements for participation of human subjects(including recruitment,
consent and confidentiality procedures and documentation as appropriate)
(3) A copy of all the documentation provided to the volunteer to ensure the clarity of
informationprovided
(4) Copies of appropriate other ethical committee permissions (internal or external) or
supporting documentation
(5) If appropriate: a list of proprietary drugs or commercial drugs to be used in the proposed
investigation includingformulation, dosage and route of administration and known adverse side
effects

26RESEARCH PROPOSAL
(6) A statement of your competence to carry out this research as a student or a brief one page
curriculum vitae for each applicant, including recent publications (staff only)
(7) Other documentation as advised necessary:
There are normally four possible outcomes from reviewing the activity against the procedures in
place:
1. no ethical issues
2. minor ethical issues which have been addressed and concerns resolved
3. major ethical issues which have been addressed and concerns resolved
4. ethical issues that have not been resolved/addressed
Provisional approval could be given at the discretion of the Research Ethics Committee.
Authorisation is dependent on Faculty.Please refer to your faculty guidelines for details on how outcomes are
reached:
The reviewer advises the PMB/SAB/REC of those activities in the first three outcomes.
Activities in the fourth outcome are submitted to the Faculty REC for resolution
The approved form must be kept with project documents, e.g. be included as an appendix in
the report.
Signature of researcher / student Date
Signature of supervisor Date
Line Manager or Head of School signature (Staff only) Date
This form complies with the DMU policy statement on Human Research Ethics, a full copy of
which can be found in the General Regulations and Procedures Affecting Students.
A separate form is required for each project.
(6) A statement of your competence to carry out this research as a student or a brief one page
curriculum vitae for each applicant, including recent publications (staff only)
(7) Other documentation as advised necessary:
There are normally four possible outcomes from reviewing the activity against the procedures in
place:
1. no ethical issues
2. minor ethical issues which have been addressed and concerns resolved
3. major ethical issues which have been addressed and concerns resolved
4. ethical issues that have not been resolved/addressed
Provisional approval could be given at the discretion of the Research Ethics Committee.
Authorisation is dependent on Faculty.Please refer to your faculty guidelines for details on how outcomes are
reached:
The reviewer advises the PMB/SAB/REC of those activities in the first three outcomes.
Activities in the fourth outcome are submitted to the Faculty REC for resolution
The approved form must be kept with project documents, e.g. be included as an appendix in
the report.
Signature of researcher / student Date
Signature of supervisor Date
Line Manager or Head of School signature (Staff only) Date
This form complies with the DMU policy statement on Human Research Ethics, a full copy of
which can be found in the General Regulations and Procedures Affecting Students.
A separate form is required for each project.

27RESEARCH PROPOSAL
ADVANCE APPROVAL OF RESEARCH ACTIVITY INVOLVING HUMAN RESEARCH
ETHICS
1 Respondents' co-operation in a research project is entirely voluntary at all stages. They
must not be misled when being asked for co-operation.
2 Respondents' anonymity must be strictly preserved. If the Respondent on request from
the Researcher has given permission for data to be passed on in a form which allows that
Respondent to be identified personally:
(a) the Respondent must first have been told to whom the information would be supplied
and the purpose for which it will be used, and also
(b) the Researcher must ensure that the information will not be used for any non-research
purpose and that the recipient of the information has agreed to conform to the
requirements of any relevant Code of Practice.
3 The Researcher must take all reasonable precautions to ensure that Respondents are in
no way directly harmed or adversely affected as a result of their participation in a research
project.
4 The Researcher must take special care when interviewing children and young people.
The Faculty REC will give advice on gaining consent for studies involving children or
young people.
5 Respondents must be told (normally at the beginning of the interview) if observation
techniques or recording equipment are used, except where these are used in a public
place. If a respondent so wishes, the record or relevant section of it must be destroyed or
deleted. Respondents' anonymity must not be infringed by the use of such methods.
6 Respondents must be enabled to check without difficulty the identity and bona fides of the
Researcher.
ADVANCE APPROVAL OF RESEARCH ACTIVITY INVOLVING HUMAN RESEARCH
ETHICS
1 Respondents' co-operation in a research project is entirely voluntary at all stages. They
must not be misled when being asked for co-operation.
2 Respondents' anonymity must be strictly preserved. If the Respondent on request from
the Researcher has given permission for data to be passed on in a form which allows that
Respondent to be identified personally:
(a) the Respondent must first have been told to whom the information would be supplied
and the purpose for which it will be used, and also
(b) the Researcher must ensure that the information will not be used for any non-research
purpose and that the recipient of the information has agreed to conform to the
requirements of any relevant Code of Practice.
3 The Researcher must take all reasonable precautions to ensure that Respondents are in
no way directly harmed or adversely affected as a result of their participation in a research
project.
4 The Researcher must take special care when interviewing children and young people.
The Faculty REC will give advice on gaining consent for studies involving children or
young people.
5 Respondents must be told (normally at the beginning of the interview) if observation
techniques or recording equipment are used, except where these are used in a public
place. If a respondent so wishes, the record or relevant section of it must be destroyed or
deleted. Respondents' anonymity must not be infringed by the use of such methods.
6 Respondents must be enabled to check without difficulty the identity and bona fides of the
Researcher.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

28RESEARCH PROPOSAL
12.3Appendix C
The Ethics of Surveillance in the Workplace Research Consent Form
Dear Participant,
The purpose of this interview and survey is for a research purpose only as it is part of my
research project “The ethics of biometric technology in the workplace”. The aim of this research
project is to investigate the concerns employees have regarding the data that is collected about
them through surveillance in the workplace, and whether they are aware of the different
surveillance techniques used in the workplace by organisations and employers.
I am inviting you to take part in an interview and a survey in which you will be asked to answer
a series of questions; you may wish to complete them both on the same day or you may
tocomplete the survey in your own time and send it back to me.The interview research session
will involve only two people, me and the participant (yourself) and it will not be recorded in any
kind of way, only your answers will be taken down on paper by me, and the interview session
will last about 30 minutes.
Your participation in this research is voluntary and you have the right to withdraw any time. You
will get to keep a signed copy of the informed consent form if you wish to take part in this
research, and any information recorded from this research will not be passed on to any third
party. All the data and information collected from this research is fully confidential and will only
be stored on my personal laptop, and the university account which is password protect and
prevents anyone from accessing my account other than myself.
12.3Appendix C
The Ethics of Surveillance in the Workplace Research Consent Form
Dear Participant,
The purpose of this interview and survey is for a research purpose only as it is part of my
research project “The ethics of biometric technology in the workplace”. The aim of this research
project is to investigate the concerns employees have regarding the data that is collected about
them through surveillance in the workplace, and whether they are aware of the different
surveillance techniques used in the workplace by organisations and employers.
I am inviting you to take part in an interview and a survey in which you will be asked to answer
a series of questions; you may wish to complete them both on the same day or you may
tocomplete the survey in your own time and send it back to me.The interview research session
will involve only two people, me and the participant (yourself) and it will not be recorded in any
kind of way, only your answers will be taken down on paper by me, and the interview session
will last about 30 minutes.
Your participation in this research is voluntary and you have the right to withdraw any time. You
will get to keep a signed copy of the informed consent form if you wish to take part in this
research, and any information recorded from this research will not be passed on to any third
party. All the data and information collected from this research is fully confidential and will only
be stored on my personal laptop, and the university account which is password protect and
prevents anyone from accessing my account other than myself.

29RESEARCH PROPOSAL
The personal data collection from this research will be minimised and the personal data which is
necessarily needed will be asked for otherwise not. Your data will only be used with this project
but will not have any of your personal details included.
Once the research project is complete, the data and information gathered about the participant
will be kept for a maximum time of 1 year but, no more than that, and the entire data and
information collected will be fully destroyed.
If you have any questions regarding this project or research please do not hesitate to contact
myself XXXXXXX, student at De Montfort University via the following email address;
pxxxxxxxx@myemail.dmu.ac.uk
By signing this consent form you specify that you understand the following:
I understand the purpose of this project and agree to take part in this research
I understand that the data collected will only be used in this project
I understand that I can withdraw from this research at any time
I understand that the data will be fully destroyed as stated above
Participants Signature: _________________________________
Date of Participants Signature: ___________________________
Researcher’s Signature: __________________________________
Date of Researcher’s Signature: ____________________________
12.4 Appendix D ( Workplace interview)
1 Gender – Male Female
2 What is your job position in the organization ?
3 What do you feel about the biometric technology n the workplace ?
The personal data collection from this research will be minimised and the personal data which is
necessarily needed will be asked for otherwise not. Your data will only be used with this project
but will not have any of your personal details included.
Once the research project is complete, the data and information gathered about the participant
will be kept for a maximum time of 1 year but, no more than that, and the entire data and
information collected will be fully destroyed.
If you have any questions regarding this project or research please do not hesitate to contact
myself XXXXXXX, student at De Montfort University via the following email address;
pxxxxxxxx@myemail.dmu.ac.uk
By signing this consent form you specify that you understand the following:
I understand the purpose of this project and agree to take part in this research
I understand that the data collected will only be used in this project
I understand that I can withdraw from this research at any time
I understand that the data will be fully destroyed as stated above
Participants Signature: _________________________________
Date of Participants Signature: ___________________________
Researcher’s Signature: __________________________________
Date of Researcher’s Signature: ____________________________
12.4 Appendix D ( Workplace interview)
1 Gender – Male Female
2 What is your job position in the organization ?
3 What do you feel about the biometric technology n the workplace ?

30RESEARCH PROPOSAL
4 Are you supportive of the technologies used ?
5 Can you elaborate about the different biometric technologies used in the organization ?
6 What do you feel about the time punctuality maintained through biometric ?
7 What do you feel about the security concerns of the biometric technology ?
8 Do you trust your organization which holds your biometric information ?
12.5 Appendix E ( Workplace Survey)
The aim of this survey is to investigate the function of bio-metric technology in the workplace to
determine whether the employees are aware of the benefits of the technology or not. The survey
gathers data from the workplace context. The survey has been conducted for the research
purpose only and all the data collected will be kept confidential. Thank you for being a part of
this survey. Please tick in one of the given circle to select the answer.
1. What is your gender ?
Male Female
2. What is the type of the organization where you work ?
Public Sector Private Sector Non-profit organization
3. How long have you been working in this organization?
Less than one year 1 to5 years 6 to 10 years more than 15 years
4. How can your job role be classified?
Clerical Educational Professional Managerial Marketing Security Transport
5. Do you find the bio-metric technology useful in the workplace?
Yes No
6. Do you think this technology has brought changes in the workplace?
4 Are you supportive of the technologies used ?
5 Can you elaborate about the different biometric technologies used in the organization ?
6 What do you feel about the time punctuality maintained through biometric ?
7 What do you feel about the security concerns of the biometric technology ?
8 Do you trust your organization which holds your biometric information ?
12.5 Appendix E ( Workplace Survey)
The aim of this survey is to investigate the function of bio-metric technology in the workplace to
determine whether the employees are aware of the benefits of the technology or not. The survey
gathers data from the workplace context. The survey has been conducted for the research
purpose only and all the data collected will be kept confidential. Thank you for being a part of
this survey. Please tick in one of the given circle to select the answer.
1. What is your gender ?
Male Female
2. What is the type of the organization where you work ?
Public Sector Private Sector Non-profit organization
3. How long have you been working in this organization?
Less than one year 1 to5 years 6 to 10 years more than 15 years
4. How can your job role be classified?
Clerical Educational Professional Managerial Marketing Security Transport
5. Do you find the bio-metric technology useful in the workplace?
Yes No
6. Do you think this technology has brought changes in the workplace?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

31RESEARCH PROPOSAL
Yes No
7. Overall, how would you rate the use of the bio-metric technology in the workplace?
1 2 3 4 5
8. Do you think that the employees are maintaining the punctuality for the use of bio-metric
technology?
Yes No
Yes No
7. Overall, how would you rate the use of the bio-metric technology in the workplace?
1 2 3 4 5
8. Do you think that the employees are maintaining the punctuality for the use of bio-metric
technology?
Yes No
1 out of 32
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.