.

Friday, August 23, 2019

Information Security Proposal Essay Example | Topics and Well Written Essays - 500 words

Information Security Proposal - Essay Example This includes the recovery from network downtime. It also includes the plans and security in place for the A paradigm can have various meanings. It refers to â€Å"your basic beliefs† and your approach to the world which affects the way you define your research and how you collect and analyse data (Collis & Hussey, 2003, p. 47). The research approaches used in the study comprises a mixture of both the â€Å"phenomenological paradigm† which is also referred to as a â€Å"qualitative† approach, and the â€Å"positivistic paradigm† also known as the â€Å"quantitative† approach (Collis & Hussey, 2003, p. 47). As the research will utilize interviews to collect data, it would be advantageous to use both the qualitative and quantitative approaches. This will be useful when conducting interviews, as the phenomenological paradigm helps the researcher to â€Å"get a feel for the key issues† and provides â€Å"confidence† in the accuracy and depth of the data collected as the main issues have been covered (Saunders & Lewis & Thornhill, 2000, p. 98). Furthermore, working within the positivistic paradigm will assist in measuring the data and the correlation between the variables, and the quantitative research outcome could be measured against existing theory. Using a mixture of approaches and techniques has advantages, as all methods have pros and cons. This means using a triangulation approach, which as Denzin & Lincoln (2000) explain â€Å"has been generally considered a process of using multiple perceptions to clarify meaning, verifying the repeatability of an observation or interpretation† (p. 443). Using both methods will help ensure that the research outcome is accurate and this â€Å"will lead to greater confidence being placed in your conclusions† (Saunders & Lewis & Thornhill, 2000, p. 99). It also reduces the â€Å"possibility of getting the answer wrong† (Saunders & Lewis & Thornhill, 2000, p. 100). For the research, data will be collected from two types of sources,

No comments:

Post a Comment