Tesco: Managing Challenges Through Cloud Computing - A Case Study
VerifiedAdded on 2024/06/11
|32
|7633
|270
Case Study
AI Summary
This case study analyzes the implementation of cloud computing within Tesco, focusing on the challenges faced by the company. It outlines the context, background, and purpose of the research, emphasizing issues such as data security, cyber attacks, and quality of service. The assignment explores various applications of cloud computing, including cost reduction and improved accessibility. The methodology includes research philosophy, approach, design, and data collection methods. The results section presents both quantitative and qualitative data, including survey results and respondent feedback. The discussion section analyzes the findings, and the conclusion and recommendations provide insights for managing cloud computing challenges. The study aims to help learners understand the implementation and overcome the challenges associated with cloud computing.

Manage the challenges through implementing new technology
such as cloud computing: a case study of Tesco
1
such as cloud computing: a case study of Tesco
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Executive Summary:........................................................................................................................3
1. Introduction:................................................................................................................................4
1.1 Outlines context:....................................................................................................................4
1.2 Background............................................................................................................................4
1.2.1 Application of Cloud Computing:......................................................................................4
1.2.2 Challenges associated with cloud computing:....................................................................5
1.2.3 Overcoming the challenges:...............................................................................................6
1.3 Purpose:.................................................................................................................................8
1.4 Defines terms and sets limits of the research.........................................................................8
1.5 Rationale................................................................................................................................8
2. Methodology:.............................................................................................................................10
2.1 Research Philosophy............................................................................................................10
2.2 Research Approach..............................................................................................................11
2.3 Research Design..................................................................................................................11
2.4 Data Collection Method.......................................................................................................12
2.5 Sampling Techniques and Size............................................................................................12
3. Results:......................................................................................................................................14
3.1 Quantitative data collection:................................................................................................14
Table 8: Frequency of up gradation for cloud computing.............................................................20
Figure 8: Frequency of up gradation for cloud computing............................................................20
\9. Do far do you agree this technology will help the company in future time?...........................20
Figure 9: Acceptance level of respondents....................................................................................21
3.2 Qualitative data collection:......................................................................................................21
4. Discussion..................................................................................................................................23
2
Executive Summary:........................................................................................................................3
1. Introduction:................................................................................................................................4
1.1 Outlines context:....................................................................................................................4
1.2 Background............................................................................................................................4
1.2.1 Application of Cloud Computing:......................................................................................4
1.2.2 Challenges associated with cloud computing:....................................................................5
1.2.3 Overcoming the challenges:...............................................................................................6
1.3 Purpose:.................................................................................................................................8
1.4 Defines terms and sets limits of the research.........................................................................8
1.5 Rationale................................................................................................................................8
2. Methodology:.............................................................................................................................10
2.1 Research Philosophy............................................................................................................10
2.2 Research Approach..............................................................................................................11
2.3 Research Design..................................................................................................................11
2.4 Data Collection Method.......................................................................................................12
2.5 Sampling Techniques and Size............................................................................................12
3. Results:......................................................................................................................................14
3.1 Quantitative data collection:................................................................................................14
Table 8: Frequency of up gradation for cloud computing.............................................................20
Figure 8: Frequency of up gradation for cloud computing............................................................20
\9. Do far do you agree this technology will help the company in future time?...........................20
Figure 9: Acceptance level of respondents....................................................................................21
3.2 Qualitative data collection:......................................................................................................21
4. Discussion..................................................................................................................................23
2

4.1 Quantitative analysis:...........................................................................................................23
4.2 Qualitative analysis:.............................................................................................................27
5. Conclusion.................................................................................................................................28
6. Recommendations:....................................................................................................................29
Reference list:................................................................................................................................30
3
4.2 Qualitative analysis:.............................................................................................................27
5. Conclusion.................................................................................................................................28
6. Recommendations:....................................................................................................................29
Reference list:................................................................................................................................30
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Executive Summary:
The purpose of this research project is to understand the implementation of cloud computing
within the companies and deal with the challenges that exist within the company at present. The
research mainly deals with the various problems faced by the companies and it also presents the
solutions to these challenges. With the help of this research project, the learners will be able to
understand the different ways and means by which cloud computing can be implemented in a
proper and precise manner within the companies as a whole. It has also the results of the surveys
that have been performed and as a result of this; it presents a clear idea about the various
responses of the people who have participated in the research.
4
The purpose of this research project is to understand the implementation of cloud computing
within the companies and deal with the challenges that exist within the company at present. The
research mainly deals with the various problems faced by the companies and it also presents the
solutions to these challenges. With the help of this research project, the learners will be able to
understand the different ways and means by which cloud computing can be implemented in a
proper and precise manner within the companies as a whole. It has also the results of the surveys
that have been performed and as a result of this; it presents a clear idea about the various
responses of the people who have participated in the research.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1. Introduction:
1.1 Outlines context:
The purpose of this assignment is to manage the existing challenges with the implementation of
cloud computing. There are many companies that generally face issues in the management of
their business. This assignment focuses on the case study of Tesco and it spheres the various
challenges that are faced by the company. Alongside this, it also outlines the ways and means by
which it helps the company to manage the challenges that are faced by the company by
implementing cloud computing. Some major issues faced by cloud computing are security of
data and its privacy, cyber attacks, quality of service, cost of bandwidth and it performance as
well as its control and governance.
1.2 Background
The companies that usually face challenges with the implementation of cloud computing have
made efforts so that they can easily overcome the challenges. However, it is also known as a
matter of fact that there are still many challenges that are faced by the companies and they are
yet to be solved. With the help of this assignment, the issues faced by the companies will be
discussed and the solution to these issues will also be provided.
1.2.1 Application of Cloud Computing:
In this section, the various applications of cloud computing has been discussed in a detailed
manner. It can be said that cloud computing usually has a very limitless application. With the
help of proper and precise middleware, the functions of a computer can easily be performed by
the accurate usage of cloud computing. It has the capacity to perform almost all the systems
associated with the processing of words upto the customized programs of the computers that are
usually designed for the betterment of a company as a whole. The various applications of cloud
computing has been discussed in a detailed manner below:
With the proper usage of cloud computing, the clients will be easily able to use all their data and
application from wherever they want and at any time. With the help of any interne linked
computer, users can easily get their access to cloud computing. This can be done because the
5
1.1 Outlines context:
The purpose of this assignment is to manage the existing challenges with the implementation of
cloud computing. There are many companies that generally face issues in the management of
their business. This assignment focuses on the case study of Tesco and it spheres the various
challenges that are faced by the company. Alongside this, it also outlines the ways and means by
which it helps the company to manage the challenges that are faced by the company by
implementing cloud computing. Some major issues faced by cloud computing are security of
data and its privacy, cyber attacks, quality of service, cost of bandwidth and it performance as
well as its control and governance.
1.2 Background
The companies that usually face challenges with the implementation of cloud computing have
made efforts so that they can easily overcome the challenges. However, it is also known as a
matter of fact that there are still many challenges that are faced by the companies and they are
yet to be solved. With the help of this assignment, the issues faced by the companies will be
discussed and the solution to these issues will also be provided.
1.2.1 Application of Cloud Computing:
In this section, the various applications of cloud computing has been discussed in a detailed
manner. It can be said that cloud computing usually has a very limitless application. With the
help of proper and precise middleware, the functions of a computer can easily be performed by
the accurate usage of cloud computing. It has the capacity to perform almost all the systems
associated with the processing of words upto the customized programs of the computers that are
usually designed for the betterment of a company as a whole. The various applications of cloud
computing has been discussed in a detailed manner below:
With the proper usage of cloud computing, the clients will be easily able to use all their data and
application from wherever they want and at any time. With the help of any interne linked
computer, users can easily get their access to cloud computing. This can be done because the
5

data is not just limited to any single computer or within a company’s personal network (Botta et
al., 2016).
With the application of cloud computing, the cost of using hardware can be easily brought down
to a great extent. With the help of this, the requirement of hardware would also go down on
behalf of the clients. As a result of this, there will no longer be any need to buy a computer that
is considerably fast or should possess the maximum memory, because with the help of cloud
computing these demands of the clients can be easily resolved. Rather the client can buy a cheap
terminal of computer and can use it to fulfill their requirements. As a result of this, the client will
not require any large sized device to use cloud computing (Bera et al., 2015).
There are many companies that use computers in order to conduct the operations of their
business and as a result of this; they need to ensure that they have equipped system in their
companies for meeting their requirements. With the help of cloud computing, the companies can
get access to the computer systems easily. The companies will not have to buy individual license
of the employees instead they can pay a legitimate sum of money to the company of cloud
computing (Ahmed et al., 2015).
In many cases, digital storage and servers usually take a lot of space. There are many companies
that usually purchase physical space in order to store these servers as they do not have the direct
access to the sites. Therefore, with the help of cloud computing, the companies can have easy
access to these sites and therefore, they will not have the need to purchase any extra physical
space.
1.2.2 Challenges associated with cloud computing:
There are many companies that are taking recourse to cloud computing due to its growing
popularity. The main reason as to why people are beginning to use cloud computing is because it
can give easy access to the companies in order to get to its information and data, without much
expenses. However, besides the positivity of cloud computing, there are various issues that exist
within the usage of cloud computing. Some of these issues have been discussed in a detailed
manner below:
Privacy and Security of Data:
6
al., 2016).
With the application of cloud computing, the cost of using hardware can be easily brought down
to a great extent. With the help of this, the requirement of hardware would also go down on
behalf of the clients. As a result of this, there will no longer be any need to buy a computer that
is considerably fast or should possess the maximum memory, because with the help of cloud
computing these demands of the clients can be easily resolved. Rather the client can buy a cheap
terminal of computer and can use it to fulfill their requirements. As a result of this, the client will
not require any large sized device to use cloud computing (Bera et al., 2015).
There are many companies that use computers in order to conduct the operations of their
business and as a result of this; they need to ensure that they have equipped system in their
companies for meeting their requirements. With the help of cloud computing, the companies can
get access to the computer systems easily. The companies will not have to buy individual license
of the employees instead they can pay a legitimate sum of money to the company of cloud
computing (Ahmed et al., 2015).
In many cases, digital storage and servers usually take a lot of space. There are many companies
that usually purchase physical space in order to store these servers as they do not have the direct
access to the sites. Therefore, with the help of cloud computing, the companies can have easy
access to these sites and therefore, they will not have the need to purchase any extra physical
space.
1.2.2 Challenges associated with cloud computing:
There are many companies that are taking recourse to cloud computing due to its growing
popularity. The main reason as to why people are beginning to use cloud computing is because it
can give easy access to the companies in order to get to its information and data, without much
expenses. However, besides the positivity of cloud computing, there are various issues that exist
within the usage of cloud computing. Some of these issues have been discussed in a detailed
manner below:
Privacy and Security of Data:
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Security of data and privacy is considered to be one of the most important issues that are related
to cloud computing. There is a cloud service provider that is used in the cloud computing system
and with the help of this, the privacy and security of the user is transferred to the cloud vendor.
Therefore, there is a huge amount of risk associated with this because the user’s information and
personal data can be easily misused by the third party. Therefore, the users have to be really
careful while they are using cloud computing and sharing their personal information (Avram,
2014).
Cyber Attacks:
The service providers of cloud computing has to deal with another major issue that is directly
related to cyber attacks. Most of the data that is stored in the cloud computing server is often
stored with a major fear of being misused and as a result it might result to cyber attack. The size
of the stored data is said to be highly vulnerable and if in case there is cyber attack; the entire
data might be lost. These attacks have increased in recent times with the help of bot malware,
virtual machines and various attacks made by brute forces. Therefore, it is of utmost importance
that the service providers should have a thorough inspection so that the security level in the cloud
computing server can be determined. Despite the strict investigation of the security measures,
attacks on cloud computing servers still have a fair enough chance (Sadiku et al., 2014).
Quality of service:
It is known as a matter of fact that the quality of services can also be an issue as to why most of
the companies do not shift their data and information into the cloud computing server. There is
no guarantee that the data of the company will be protected and this is major reason as to why
most companies are afraid of using it (Ali et al., 2015).
1.2.3 Overcoming the challenges:
Developing a secure strategy of cloud computing:
The service providers of cloud computing should ensure that the data or information that is
stored in the cloud computing server has to be safe and secure no matter what. Therefore, it is
important for the service providers to make sure that they establish a completely developed
strategy for the benefit of the companies that store their information in the cloud computing
7
to cloud computing. There is a cloud service provider that is used in the cloud computing system
and with the help of this, the privacy and security of the user is transferred to the cloud vendor.
Therefore, there is a huge amount of risk associated with this because the user’s information and
personal data can be easily misused by the third party. Therefore, the users have to be really
careful while they are using cloud computing and sharing their personal information (Avram,
2014).
Cyber Attacks:
The service providers of cloud computing has to deal with another major issue that is directly
related to cyber attacks. Most of the data that is stored in the cloud computing server is often
stored with a major fear of being misused and as a result it might result to cyber attack. The size
of the stored data is said to be highly vulnerable and if in case there is cyber attack; the entire
data might be lost. These attacks have increased in recent times with the help of bot malware,
virtual machines and various attacks made by brute forces. Therefore, it is of utmost importance
that the service providers should have a thorough inspection so that the security level in the cloud
computing server can be determined. Despite the strict investigation of the security measures,
attacks on cloud computing servers still have a fair enough chance (Sadiku et al., 2014).
Quality of service:
It is known as a matter of fact that the quality of services can also be an issue as to why most of
the companies do not shift their data and information into the cloud computing server. There is
no guarantee that the data of the company will be protected and this is major reason as to why
most companies are afraid of using it (Ali et al., 2015).
1.2.3 Overcoming the challenges:
Developing a secure strategy of cloud computing:
The service providers of cloud computing should ensure that the data or information that is
stored in the cloud computing server has to be safe and secure no matter what. Therefore, it is
important for the service providers to make sure that they establish a completely developed
strategy for the benefit of the companies that store their information in the cloud computing
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

server. If they are able to develop a secure cloud computing network, then the companies will be
able to store their data in the cloud computing network without any risk (Sultan, 2014).
Choosing the exact workload:
There are many companies that prefer to keep their information in the cloud computing network.
Their ideology is not always based on ‘all or nothing’. Sometimes they have to be precise in the
type of data that they want to transfer to the cloud computing server. They have to be very
careful about the information that they transfer in the cloud computing server. If they are careful
enough, then they will not face any issue related to the security or privacy of the information
transferred.
Understanding the Provider’s cloud architecture:
It can be said that the cloud computing server has no exact language or industry standards.
Therefore, it is of utmost importance on behalf of the companies to ensure that they have a
thorough inspection about the techniques and architectures of the provider cloud computing
server. They have to trust the service providers and at the same time verify the network so as to
ensure that the stored data are safe and secure when they are being stored in the cloud computing
network (Whaiduzzaman et al., 2014).
Ensuring the persistence of data:
Nowadays, most of the companies have issues while storing their data due to the growth of the
infrastructure. Therefore, it can be said that the development and invention of cloud computing
network is known as a welcome situation for most of these companies in order to keep their data
and information. However, there are times when the cloud computing network fails to get the
required data or information when it is needed by the company. Therefore, it is the duty of the
companies to ensure that these stored data are mostly persistence so that they can be regained in
times of the company’s need (Bilal et al., 2014).
8
able to store their data in the cloud computing network without any risk (Sultan, 2014).
Choosing the exact workload:
There are many companies that prefer to keep their information in the cloud computing network.
Their ideology is not always based on ‘all or nothing’. Sometimes they have to be precise in the
type of data that they want to transfer to the cloud computing server. They have to be very
careful about the information that they transfer in the cloud computing server. If they are careful
enough, then they will not face any issue related to the security or privacy of the information
transferred.
Understanding the Provider’s cloud architecture:
It can be said that the cloud computing server has no exact language or industry standards.
Therefore, it is of utmost importance on behalf of the companies to ensure that they have a
thorough inspection about the techniques and architectures of the provider cloud computing
server. They have to trust the service providers and at the same time verify the network so as to
ensure that the stored data are safe and secure when they are being stored in the cloud computing
network (Whaiduzzaman et al., 2014).
Ensuring the persistence of data:
Nowadays, most of the companies have issues while storing their data due to the growth of the
infrastructure. Therefore, it can be said that the development and invention of cloud computing
network is known as a welcome situation for most of these companies in order to keep their data
and information. However, there are times when the cloud computing network fails to get the
required data or information when it is needed by the company. Therefore, it is the duty of the
companies to ensure that these stored data are mostly persistence so that they can be regained in
times of the company’s need (Bilal et al., 2014).
8

1.3 Purpose:
The main purpose of this assignment is to manage the challenges faced by the company with the
implementation of cloud computing. With the help of this assignment, the learners will be able to
understand the main issues that are faced by the companies with the usage of cloud computing.
The assignment will also help the learners to understand the ways and means by which these
issues can be dealt with or overcome.
1.4 Defines terms and sets limits of the research
There are various terms that have been used in order to successfully conduct the research. Some
of them are cloud computing, challenges in its operations and many more. Cloud computing is a
technology that helps a company to store their valuable data or information so that it can be used
for various future needs. However, there are various challenges that are related to the usage of
cloud computing. There are a lot of security issues as well as privacy issues that may take place
in cloud computing and in some cases they might be lost or can also be misused.
Time limitation: It is a matter of fact that the research had a lot of limitations of time. As a result
of this; there are a lot of things that could not be researched by the researcher. Therefore, the
shortage of time is considered as one of the major limitations that have been faced.
Cost limitation: Cost is also taken into consideration when the research was being conducted. As
a result of cost limitation, the research could not be performed the way it was supposed to be
performed.
Low availability of secondary data: There was lack of secondary data when the research was
being performed. Therefore, the research could not be performed with the help of secondary data
analysis.
1.5 Rationale
There are many companies that have recently faced issues with cloud computing. Therefore, the
topic that has been chosen based on managing issues of a certain company with the
implementation of could compute. There are many companies that have faced some serious
issues with cloud computing. This assignment spheres all the issues that are faced by the
company such as lack of security and privacy, misuse of the stored data and information, cyber
9
The main purpose of this assignment is to manage the challenges faced by the company with the
implementation of cloud computing. With the help of this assignment, the learners will be able to
understand the main issues that are faced by the companies with the usage of cloud computing.
The assignment will also help the learners to understand the ways and means by which these
issues can be dealt with or overcome.
1.4 Defines terms and sets limits of the research
There are various terms that have been used in order to successfully conduct the research. Some
of them are cloud computing, challenges in its operations and many more. Cloud computing is a
technology that helps a company to store their valuable data or information so that it can be used
for various future needs. However, there are various challenges that are related to the usage of
cloud computing. There are a lot of security issues as well as privacy issues that may take place
in cloud computing and in some cases they might be lost or can also be misused.
Time limitation: It is a matter of fact that the research had a lot of limitations of time. As a result
of this; there are a lot of things that could not be researched by the researcher. Therefore, the
shortage of time is considered as one of the major limitations that have been faced.
Cost limitation: Cost is also taken into consideration when the research was being conducted. As
a result of cost limitation, the research could not be performed the way it was supposed to be
performed.
Low availability of secondary data: There was lack of secondary data when the research was
being performed. Therefore, the research could not be performed with the help of secondary data
analysis.
1.5 Rationale
There are many companies that have recently faced issues with cloud computing. Therefore, the
topic that has been chosen based on managing issues of a certain company with the
implementation of could compute. There are many companies that have faced some serious
issues with cloud computing. This assignment spheres all the issues that are faced by the
company such as lack of security and privacy, misuse of the stored data and information, cyber
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

stacks and many more (Fox, 2017). Therefore, with the help of this assignment, the learners will
be able to understand the issues that are related to cloud computing and they will also be able to
analyze its impact on different companies. Alongside this, the learners will also be able to
understand the ways and means by which these issues can be dealt with in a positive manner.
Due to the growth of the issues related to cloud computing, the topic has been chosen for the
research. It also focuses on the ways in which these problems can be resolved so that the
company does not lose any data or information that are being stored in the cloud computing
network.
10
be able to understand the issues that are related to cloud computing and they will also be able to
analyze its impact on different companies. Alongside this, the learners will also be able to
understand the ways and means by which these issues can be dealt with in a positive manner.
Due to the growth of the issues related to cloud computing, the topic has been chosen for the
research. It also focuses on the ways in which these problems can be resolved so that the
company does not lose any data or information that are being stored in the cloud computing
network.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2. Methodology:
2.1 Research Philosophy
It is known as a matter of fact that the research philosophy mainly deals with the development of
the entire knowledge related to the work. In a more precise manner it can be said that the
research philosophy is generally the belief that is developed in the process of collection of the
data and its analysis. There are many types of research philosophy that are used in general. Some
of them are interpretivism, positivism, pragmatism and realism. The research philosophy that is
used is positivism. It is also known as a matter of fact that the main choices of the research
philosophy are mainly based on various practical implications of the entire research
(Rittinghouse and Ransome, 2016).
Positivism: The main reason as to why this philosophy is used is because it is considered to be
highly structured. It can also gather large samples for the better understanding of the research
project. It is mainly done with the help of quantitative data analysis; however it can be used in a
qualitative way as well. In this type of philosophy, all the facts are ideally analyzed during the
course of the entire research project. The study that is made by the researcher based on
positivism is mainly independent of the entire research work.
11
2.1 Research Philosophy
It is known as a matter of fact that the research philosophy mainly deals with the development of
the entire knowledge related to the work. In a more precise manner it can be said that the
research philosophy is generally the belief that is developed in the process of collection of the
data and its analysis. There are many types of research philosophy that are used in general. Some
of them are interpretivism, positivism, pragmatism and realism. The research philosophy that is
used is positivism. It is also known as a matter of fact that the main choices of the research
philosophy are mainly based on various practical implications of the entire research
(Rittinghouse and Ransome, 2016).
Positivism: The main reason as to why this philosophy is used is because it is considered to be
highly structured. It can also gather large samples for the better understanding of the research
project. It is mainly done with the help of quantitative data analysis; however it can be used in a
qualitative way as well. In this type of philosophy, all the facts are ideally analyzed during the
course of the entire research project. The study that is made by the researcher based on
positivism is mainly independent of the entire research work.
11

2.2 Research Approach
There are mainly two types of research approach. They are deductive research approach and
inductive research approach. With the help of deductive research approach, the researcher can
easily test the validity of all the assumptions that has been made. However, with the help of
inductive research approach, the researcher can easily contribute to the emergence of various
new ideas and theories. With the help of deductive research approach, the set of different
theories and hypothesis can either be taken or rejected based on their validity (Yan et al., 2016).
The research approach that has been selected in this research work is deductive research
approach. It is known as a matter of fact that in most cases in a deductive research approach if in
case the premises are true, then it should be kept in mind that the conclusions are also true. With
the help of data collection, the researcher is able to evaluate various propositions. With the help
of deductive research approach, the researcher is able to make falsification of the theory as well
as its verifications.
2.3 Research Design
In most of the cases, research design is said to be selection that is made by the researcher based
on the qualitative and quantitative design that is considered to be most suited for the course of
the entire research. However, it can be said that research design is mainly divided into two major
segments. They are exploratory as well as conclusive. The research design that has been selected
in this research work is exploratory research design. With the help of exploratory research, the
researcher is able to explore various areas of the entire research that is being done. The research
design is mainly open ended and moreover it does not help the researcher with any conclusive
evidence of the research that is being done. By following the exploratory research design, the
researcher can also change the course of their entire research work. Therefore with the help of
research design, the researcher will be able to carry out the research in a successful manner (Wu
et al., 2015).
12
There are mainly two types of research approach. They are deductive research approach and
inductive research approach. With the help of deductive research approach, the researcher can
easily test the validity of all the assumptions that has been made. However, with the help of
inductive research approach, the researcher can easily contribute to the emergence of various
new ideas and theories. With the help of deductive research approach, the set of different
theories and hypothesis can either be taken or rejected based on their validity (Yan et al., 2016).
The research approach that has been selected in this research work is deductive research
approach. It is known as a matter of fact that in most cases in a deductive research approach if in
case the premises are true, then it should be kept in mind that the conclusions are also true. With
the help of data collection, the researcher is able to evaluate various propositions. With the help
of deductive research approach, the researcher is able to make falsification of the theory as well
as its verifications.
2.3 Research Design
In most of the cases, research design is said to be selection that is made by the researcher based
on the qualitative and quantitative design that is considered to be most suited for the course of
the entire research. However, it can be said that research design is mainly divided into two major
segments. They are exploratory as well as conclusive. The research design that has been selected
in this research work is exploratory research design. With the help of exploratory research, the
researcher is able to explore various areas of the entire research that is being done. The research
design is mainly open ended and moreover it does not help the researcher with any conclusive
evidence of the research that is being done. By following the exploratory research design, the
researcher can also change the course of their entire research work. Therefore with the help of
research design, the researcher will be able to carry out the research in a successful manner (Wu
et al., 2015).
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 32
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





