Thursday, December 5, 2019

Professional Research and Communication

Question: Discuss about the Professional Research and Communication. Answer: Introduction Research is identified as the most prominent way to express the innovative facts and ideas about the current and new topics. Through the help of research, gathering of the statistical and analytical data also becomes possible and the generated output can also be clarified easily. The wide range of research work is carried out to solve various issues. The research work shown below mainly covers three questions. These questions will be help in providing the suitable assistance to the complete the research work. To conduct suitable research work, the academic research is identified as a method in which systematic study is carried out in the rigorous manner to generate the suitable output in an appropriate way. The domain selected for the discussion is named as the Information security system. The information security system is identified as the most live and current topic of the organization in a professional manner. The reason for selecting this topic is that it becomes quite difficult to manage the data in the systematic form and generation of suitable information is so difficult. The management of the information security system is identified on the private as well as on the government level. The research focus mainly on the specific strategy making, identification of risk and assessment, security policy and security governance and many other aspects. The information security system is the method to manage the most suitable software related to the organization (Olavsrud, 2015). To manage these perspectives, the organizations have to put forward systematic approach in an appropriate track. The research question for conducting suitable research is shown below. This research question will be helpful in providing the suitable platform for performing proper research. Is Information security system considered as the most prominent topic related to the IT in an Organization? The world view of the researchers is comparatively different from other perspectives. The issues and problems related to the particular topic are required to be analyzed both with the negative and positive frame. The issues related to the information security system are identified in both the private and government organization. As the information security system is based on the three elements which are named as the confidentiality, integrity and availability, so to fulfill the basic coordination related to the elements, the researchers and basic organization people have to adapt suitable policies and processes by the help of which, a calculative approach on the world class level can be managed (Ahmad Maynard, 2013). The research paradigm is identified as the major process in which the static framework is provided to the candidate to make the suitable sense of the world. By this, the person can able to manage a specific approach related to the particular topic. The paradigm also possesses three specific components which are identified as the ontology, epistemology and methodology. All these three components have their definite working aspects related to the organization. The usage will be dependent upon the criteria of the requirement of the research. For pursuing suitable research in the correct direction, the two major approaches are identified on the initial level. These approaches are named as the Positivism and Interpretivisim. Both these approaches are well versed with the specific approach related to the organization. The positivism is the factor which is mentioned for the real facts and figures mentioned for conducting the research. For this research, the most appropriate is the positivis m (Australian Government, 2016). Through this process, the quantitative methodology is selected for the suitable processing. The observations are considered on the different level and the validity of the research results can also be evaluated on the initial stage (Knapp, Marshall, Rainer, Morrow, 2006). By using this criteria identified for the research paradigm, it can be considered that the Information security system can become more strengthened and organized. For the government level, the maintenance of information security system is identified as the most basic approach to secure the data. For all these perspectives, the further research can be carried out to analyze the suitable results. The selection of the quantitative and qualitative research methodology can be done to make the research more live and result oriented. The above discussion is helpful in defining the selection of suitable topic related to the IT in the organization. The problem and issues related to the Information security system are also defined on an initial level. But, to manage the different problems and to find out the suitable solution related to it, it is essential to put forward the basic ideas and approaches related to the data collection and analysis. The data collection and analysis is the most suitable process which is essential to manage in any research process. The research process is incomplete without the availability of proper data. The suitable methods and selection of techniques should be defined properly. The two approaches identified for the management of the data are named as the quantitative and qualitative method of data collection. Both these aspects are appropriate for managing the population, but the most suited one will be selected for further analysis. The qualitative methodology is the method in which analysis will be done on the basis of suitable quality and the quantitative is the preparation of data on the basis of charts and appropriate graphs. As the positivism is selected to carry out the research work, so the quantitative methodology is selected for proper processing. The quantitative methodology is the process in which hypotheses are developed before the observations. The quantitative method possesses scientific observations, data interpretations, deductive logic, suitable process and well recognized structure. The data is interpreted through specific logics and deductions (Goldkuhl, 2012). The quantitative methodology can be applied in three ways which are identified as the descriptive non- experimental, quasi experimental and experimental. These methodologies will be helpful in providing suitable assistance in the most specific manner. The experimental type of theory is well suited for the completion of research work. The experimental data is well suited for providing the most sustainable results in case of the topic selected above. The ideas are also generated on a wide level. For this topic, the sample of about 100 employees from different organization can be identified who are working for the information security system. There are various areas that are considered for the Information security system in the organization (Elsevier, 2016). The samples should be selected in a proper way, so that it becomes easier to do the calculation. For the sampling, the stratified, clustering, random and system sampling techniques can be determined on the large scale. Apart from this, for solving and identifying the problem definition, the major techniques which can be used are the abstraction, divide and conquer reduction, trial and error and lateral thinking. By using these techniques, the issues related to problems can be solved out and required result can be generated. The fundamentals of research and the generated report through it are incomplete without hypotheses and variable related to it. The declared variables helps in defining suitable assistance to the growth aspects of the research and also aids in identifying the probability of completing the research work. The relation between the variable is identified with the help of hypotheses in a suitable direction. Hypotheses are completely assumed on basis of the variables. The suitable variables will be helpful in providing the suitable result orientation facility. The variables in hypotheses are categorized into four types which are dependent, independent, extraneous and confounding. The independent variable can be manipulated as per the requirement of the scenario, but there are no changes observed in the dependent variable. The independent variables are those which can be changed and managed in the systematic manner. The effect of the dependent variables is measured through these variables. The dependent variables are those which can be changed and managed as per the changes are observed in the independent variables. The independent variable in case of this research work is the Information security system and the major aspect related to it, and the dependent variable are those aspects in the organization due to which the changes are observed. The suitable changes in the independent variables are responsible for making the changes in the dependent variable. Other than this aspect, the extraneous variable are counted as those variables that are optional for the dependent variable. In place of independent variable, the extraneous can be used. The last variable which can be used in the research work is identified as the confounding variable. This variable is also responsible for creating the effect on the e xisting dependent variable. With the help of this variable, the suitable changes can be observed in a definite mode. The majorly used variables are the dependent and independent variables which can create an indefinite approach while performing suitable coordination. These two variables gets selected here because the dependency and assumptions of both the variables are identified with each other and the suitable results can also be generated simultaneously (Turn Ware, 1976). After deciding the method of data collection and analysis, it is also essential to identify the type of data to be selected. The data is also categorized in various forms. The topic is mainly related to the issues and problems related to the information security system, so selection of the data can also be managed and maintained in those aspects only. The categorization of the data on both the qualitative and quantitative aspects is considered on different level. But, as the quantitative approach seems to be more suitable, so the categorization of the quantitative data is more focused. The different type of data which are defined for the suitable management are named as the nominal, ordinal, interval and ration (Trochim, 2006). The nominal data type is identified for the exclusive categories and management of data. In ordinal one, the categorization and management are quite different in a comparative manner. The interval and ration is an aspect in which the calculation is identified by considering the suitable interval between the calculations for the suitable coordination. From all these data types, the nominal and ordinal one will be helpful in providing suitable assistance. The information security system is quite a different concept for which the suitable execution can only be done by these data types. The reason for selecting these sort of data types in contrast to the common problems and issue related to the information security system is that with this selection, it becomes easier to manage the most basic problems related to the organization and the system too. The issues like cyber-attack, professional issues to the IT professional are observed continuously. To manage these issues, the different type of data and variable should be identified at an initial level. These different identifications and selection of the data type will be helpful in making the research easier and comfortable (Shinder, 2005). Conclusion The above defined research work is identified as the different piece of research. The issues which are identified in the discussion are considered as the totally different concept in comparison to the other type of research works. Due to the complexity of the topic, the research is so rigorous and time taking too. After performing the research, it is concluded that the information security system in the organization needs some specific working aspects and the selection. The data selected for the suitable processing is identified as the proper selection. If the data is not suitable as per the requirement, the generation of the result wont be appropriate. For generating the suitable output, it is essential that the research work should be carried in a correct direction with the suitable aspects. The selection of data also matters for the complete process. References Ahmad, A., Maynard, S. (2013). Information Security Management: Factors that Influence Security Investments in SMES. University of Melbourne, Department of Computing and Information Systems. Retrieved from https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1156context=ism Australian Government. (2016, June 03). Australian Government Information Security. Retrieved from https://www.protectivesecurity.gov.au/informationsecurity/Pages/default.aspx Elsevier. (2016). Research elements. Retrieved from https://www.elsevier.com/books-and-journals/research-elements Goldkuhl, G. (2012). Pragmatism vs interpretivism in qualitative information systems research. European Journal of Information Systems, 21(2), 135-146. Retrieved from https://pdfs.semanticscholar.org/6d3c/20168fcf96de21a9b0bb424a31d3d66d3f24.pdf Knapp, K., Marshall, T., Rainer, R., Morrow, D. (2006). The Top Information Security Issues Facing Organizations: What Can Government Do to Help? Retrieved from https://www.infosectoday.com/Articles/topissues.pdf?bcsi_scan_64741547a7fe261b=0bcsi_scan_filename=topissues.pdf Olavsrud, T. (2015, December 21). 5 information security trends that will dominate 2016. Retrieved from https://www.cio.com/article/3016791/security/5-information-security-trends-that-will-dominate-2016.html Shinder, D. (2005, August 02). Ethical issues for IT security professionals. Retrieved from https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-professionals.html Trochim, W. (2006, October 20). Types of Data: Research methods. Retrieved from https://www.socialresearchmethods.net/kb/datatype.php Turn, R., Ware, W. (1976). Privacy and security issues in information systems. The Rand corporation. Retrieved from https://www.rand.org/content/dam/rand/pubs/papers/2008/P5684.pdf.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.