Research Design Chapter 4 PDF
Document Details
Uploaded by FabulousCentaur
Tags
Related
- Experimental Design and Research Methods PDF
- CE/EL/ES/GL/GM/MA/MC 352 Research Methods & Ethics in Science PDF
- Chapter 1 - Research Methods & Design I PDF
- Research Methods in Software Engineering PDF
- Chapter 2 Personality Assessment, Measurement, and Research Methods PDF
- Qualitative, Quantitative, and Mixed Methods Approaches PDF
Summary
This document is a chapter on research design, focusing on the process of designing a research study. It explores various steps involved such as identifying a research problem, setting the scope, and conducting a literature review for a research question in the context of cybersecurity.
Full Transcript
Research Design Chapter 4 Introduction Designing a research study is often a major challenge Many academic researchers are uncertain how to identify and craft the research problem to be addressed in the inquiry and how to frame the main research question The beginner must do the fo...
Research Design Chapter 4 Introduction Designing a research study is often a major challenge Many academic researchers are uncertain how to identify and craft the research problem to be addressed in the inquiry and how to frame the main research question The beginner must do the following: 1. conceptualize a research idea 2. set the scope of the research problem 3. consider whether the problem is researchable Continue … finding a researchable area may not be straightforward to facilitate this challenge we will use: funnel strategy The funnel strategy is a mental model, which a researcher can adapt, to provide guidance on : 1. research process 2. enabling the flow of thoughts and ideas Research Design research design is the important steps in planning a research study The main function of a research design is to explain how we will find answers to the research question. Research design refers to the systematic and structured plan or blueprint that outlines how a research study will be conducted. It encompasses the overall strategy and framework for collecting, analyzing, and interpreting data to address a specific research problem or question. Research design includes decisions about the research methodology, data collection methods, data analysis techniques, and the overall approach to achieving the research objectives. 1. The Subject Area First phase: identifying a broad subject of interest, such as cybersecurity vulnerability then thoroughly reviewing relevant scholarly literature to determine if it's a worthwhile research area. The researcher should also note knowledge gaps and understand the current ideas related to the chosen topic. Creating a list of keywords is important for advancing knowledge. The second phase involves building a knowledge tree, which helps the researcher gain a broader understanding of the topic and ensures it hasn't been extensively covered by others 2. Preparing and Writing the Background Discussion the background section attempts to offer an understanding of theories and concepts that have relevance to the study and prepares the researcher to scope the problem space and domain. It serves as a link to existing knowledge, which fosters a better understanding of the research problem (qualitative research) or hypothesis (quantitative research) and propels the choice of research methods Continue … Theoretical backgrounds complement the review of literature in the area, noting that: - the guiding theories and concepts should be ‘planted’ in the background discussion - and then discussed extensively in the literature review Continue … Based on the funnel strategy, narrowing the focus to a specific topic of interest, such as: cybersecurity challenges experienced in a particular economic sector (banking or medical information systems (IS)) in a particular country. the researcher should establish sufficient knowledge of: the applicable theories and concepts in computer security, information security, network security, application security, people security, etc. Continue … then narrows the scope further to the factors and variables relevant to cybersecurity challenges, in the context of the topic. Subsequently, the researcher may highlight cyber risk governance, cybersecurity professional skills and cybersecurity applications in the banking sector as the three elements or variables to be examined in relation to cybersecurity challenges. These even more specific concepts can help identify the appropriate literature. Then get deeper into the particular topic in this case on cyber risk governance in the banking sector. Continue … Summary This is the process of limiting the scope of the study to a particular clearly defined research problem and its specific elements. Example: Enhancing Cybersecurity Measures through Artificial Intelligence Background Discussion broad context of cybersecurity challenges narrows down to the role of AI in cybersecurity discusses the current state of research identifies gaps states the aim of the research concludes with its potential impact - cite sources and references using APA style: https://apastyle.apa.org/ 3. Review of Scholarly Literature A literature review might help you understand the issue and allowing you to state the research question clearly and concisely. Symbolically, this characterizes a narrowing step in the funnel stem. Therefore, a researcher will read academic articles, such as: 1. books, 2. journals, 3. and conference proceedings that are related to the topic area compiles a descriptive summary of important ideas provides a critical review of the relevant works 4. Identifying Gaps, Flaws, Defects and Weaknesses The literature review should be very thorough so that it finds: gaps, flaws, defects, and weaknesses in existing studies as well as the best relevant works in the field. Continue … Identifying gaps, flaws, and weaknesses shows how the proposed research fits into the field of study. the researcher should substantiate how the literature contributes to the understanding of the problem by pointing to the strengths and gaps in the literature literature review also help in: deal with conflicting concepts resolve confusing issues prevent duplication of effort justifying the necessity for further study scope the study frame the research problem statement 5. More Thoughts on Scoping the Research It is concerned with establishing the boundaries of the research (what is included, what is excluded) so that the researcher can address the hypothesis or the main research question within set parameters The objective is to clearly understand and precisely describe the limits of the study Following the example in Figure 4.1 the subject area is cybersecurity cybersecurity is so vast that there is a need to narrow the topic to, say, cyber risk management. Continue … the researcher would focus on risk-related concepts and frameworks, not on cybersecurity in general. Here, we will only include background information, literature, theories, and ideas that are relevant to cyber risk management in the research problem statement Thus, scoping is the product of the initial review of the existing body of knowledge in the general area of the field of study, that is, cybersecurity. The result of this scoping exercise is written up in the research problem statement, which states: - the main research problem - Three or four elements of that problem to be studied. 5.1 The Research Problem Statement writing a problem statement serves to improve the understanding and contextualization of the problem space and its significance A well-understood problem is vital to resolving the problem and provides an effective solution When composing a statement, it is important to situate the research problem within a relevant context that is concise and directly related to the problem domain. This contextualization should provide the potential for discovering an answer, a practical response, a solution, or a contribution to theoretical knowledge. It is imperative to recognize the significance of theory in facilitating the development of enduring solutions and innovations across various domains. 5.2 Sample of Research Problem Statement Over the past decade, financial institutions have sought to understand the factors contributing to large-scale cyber-attacks. The identity theft trend in the financial industry suggests that insiders’ abuse of personally identifiable information (PII) accounts for many security breaches leading to identity theft and compromise of personal information. Identity theft accounts for huge financial losses in the banking industry which consequentially erodes customer trust. It has been argued that lack of effective cybersecurity governance, efficient legislation and regulation contributes significantly to identity theft in the financial services industry. Continue … The above statement suggests that a quantitative or qualitative approach can help determine how the various factors of governance, legislation and regulation can affect identity theft. Developing the Flow of Ideas The funnel strategy diagram depicts the mental process that generates the flow of ideas that should be followed in the design of a research study. Certain questions that the researcher poses to her/himself Where does the problem lie? Who does the problem affect? What is the context? What is the overarching research problem? What are the three key related elements of this research problem? How will it affect the economic sector, or social sector, if the findings are able to address the problem? Is there a timeline to fix the problem? Is it all important to fix the problem? Is the problem a temporary issue or is there a likelihood that it continues into the future? Continue … Is the research capable of revising existing knowledge or practices? If so, how? Once the answers to these questions are provided, the researcher should have a well-rounded problem statement and make a few drafts until the problem statement is as polished as possible. writing the research proposal Step 1: Identify the main goal. - goal will be highlighted as Prepare Research Proposal: Type this central idea in the ‘main idea’ box. Step 2: Identify the activities needed to prepare the research proposal. - Preparing a research proposal starts with three components: 1. Component 1: The selection of research title, problem and purpose statement research questions or hypotheses 2. Component 2: The building of a logical or reasonable conceptual/analytical framework 3. Component 3: Determination of methodology and methods Continue Step 3 … Step 3: Determine and specify the tasks that must be achieved. major activities and the corresponding action: 1: Preparing the research title Action: A suitable title must identify the research topic 2. Building the conceptual/analytical framework Action: 1. detailed literature review, 2. time for reading papers from scholarly journals, 3. selecting appropriate concepts and theory(ies) to guide the research, 4. identifying gaps in knowledge to be addressed, 5. drawing an analytical framework diagram and including a short explanation of the diagram. Continue Step 3 … 3: Developing the research methodology Action: Based on the research gaps, objectives or questions identified, methodology design tasks include specifying the following: Activity 3.1 Data collection approach: This involves preparing the research instruments, identifying the study population, determining the sampling frame and pretesting the questionnaire (quantitative survey) or the interview guide (qualitative study). Activity 3.2 Statistical analysis: This requires proper understanding of statistical tools and how to carry oust statistical analysis for each hypothesis, where the study is quantitative. Parametric validations are also vital to validate the researcher’s expected/proposed result. Continue … These steps can be modified while assigning timeframes for each of the activities the researcher will be able to make a rough estimate of how long it will take to be able to prepare the research proposal If the researcher has a fixed period within which to submit the draft proposal, the researcher can allocate specific periods for the accomplishment of each activity, which can facilitate submitting the proposal on time summary With this sort of mapping, the researcher is armed with an array of possible alternatives to narrow and scope the study, in such a way that a fresh contribution to the body of knowledge is achievable. The point here is that the researcher must explore the literature broadly, while at the same time bearing in mind the constraints of the study.