Sunday, June 9, 2019

Information Security Proposal Essay Example | Topics and Well Written Essays - 500 words

Information Security Proposal - Essay ExampleThis includes the recuperation from network downtime. It also includes the plans and security in place for theA paradigm can have various meanings. It refers to your basic beliefs and your approach to the world which affects the way you pay back your research and how you collect and analyse data (Collis & Hussey, 2003, p. 47). The research approaches used in the study comprises a mixture of both the phenomenological paradigm which is also referred to as a qualitative approach, and the positivistic paradigm also known as the quantitative approach (Collis & Hussey, 2003, p. 47). As the research will utilize interviews to collect data, it would be expedient to use both the qualitative and quantitative approaches. This will be useful when conducting interviews, as the phenomenological paradigm helps the researcher to get a feel for the key issues and provides assurance in the accuracy and depth of the data collected as the main issues have been covered (Saunders & Lewis & Thornhill, 2000, p. 98). Furthermore, working within the positivistic paradigm will do in measuring the data and the correlation between the variables, and the quantitative research outcome could be measured against existing theory.Using a mixture of approaches and techniques has advantages, as all methods have pros and cons. This means using a triangulation approach, which as Denzin & Lincoln (2000) explain has been generally considered a process of using multiple perceptions to clarify meaning, affirm the repeatability of an observation or interpretation (p. 443). Using both methods will help ensure that the research outcome is accurate and this will lead to greater sureness being placed in your conclusions (Saunders & Lewis & Thornhill, 2000, p. 99). It also reduces the possibility of getting the answer wrong (Saunders & Lewis & Thornhill, 2000, p. 100). For the research, data will be collected from two types of sources,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.