The aspect of discerning quantitative and qualitative research enables a researcher with the ability to present a phenomenon to the academic community in an appropriate manner (Venkatesh, Brown, & Bala, 2013). The researcher chooses the best method to present the study to an audience based on items such as the type of study to be conducted, the type of data needed for the study, and the amount of resources needed to complete the study. The resources include money, personnel, and arguably the most important resource of time. Additionally, the researcher becomes astute at reviewing other articles in similar methodology, which are either of a quantitative, qualitative, or a mixed method research design. In this article, the author will focus on five select qualitative articles. During this focus, the author will provide a summarization of a topic followed by presenting the problem, purpose, design, and findings of the research article. Moreover, Venkatesh, et al. (2013) stated qualitative research assists in providing the reader a better understanding of a phenomenon by articulating a narrative description of the study to the audience.
Article 1: Women in Information Security
Summarization of topic
In an article written by Woszczynski and Shade (2010), an examination is presented on how five women that chose a career in information security (IS) are perceived and how others can assist women in mitigating entry barriers into the IS career field. The authors initiated the discussion by describing a meeting that occurred in the White House, whereas there was only one woman out of 29 information security academics that were called to discuss a recent information security breach (Woszczynski & Shade, 2010). Herein lies the ration...
... middle of paper ...
... M., & Huda Mazumder, M. (2013). Cross-cultural management and organizational performance: A content analysis perspective. International Journal of Business & Management, 8(8), 133-146. doi:10.5539/ijbm.v8n8p133
Venkatesh, V., Brown, S. A., & Bala, H. (2013). Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS Quarterly, 37(1), 21-54. Retrieved from http://www.misq.org/
Woszczynski, A. B., & Shade, S. (2010). A call to IS educators to respond to the voices of women in information security. Journal of Information Systems Education, 21(2), 223-231. Retrieved from http://jise.org/
Zinszer, K., Tamblyn, R., Bates, D. W., & Buckeridge, D. L. (2013). A qualitative study of health information technology in the Canadian public health system. BMC Public Health, 13(1), 1-7. doi:10.1186/1471-2458-13-509
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
Glaser , C. L. (1997). The Security Dilemma Revisited. Cambridge University press, 50(1), 171-201. Retrieved from http://www.gwu.edu/~iscs/assets/docs/cg-docs/SecurityDilemma-WP-1997.pdf
In the article “When Women Stopped Coding”, David Greene and Steve Henn from National Public Radio speak about the gender occupational differences in the field of computer science (). The field of computer science is currently dominated by men, but the number of women in this occupation had been sufficiently strong in the past until the percentage significantly dropped in 1984 (). Steve Henn explained that reason behind the drop of women in computer science was because of social factors. Henn gave his first example by speaking about a woman named Patty Ordonez. Ordonez was extremely smart in high school but when she entered Johns Hopkins for computer science, she began to struggle in class (). Her struggle was not due to her own intelligence
If health information technology has been adopted widely, there would be more than $81 billion annually save in the United States only (Gee & Newman, 2013). Despite the vast improvement of health information technology in the current century when compared to the past, there still some challenges in adopting the technology. For example, patients and healthcare providers’ frustration with the current system, and a high cost of the information technology can be mentioned. However, healthcare organizations are thoroughly delivering care, access the patients’ health data, run their analysis for better health outcomes, and gain opportunities to better quality improvement through many electronic health delivery systems (Health information technology, n.d.; Wager, Lee, & Glaser,
The author could have employed other methods of qualitative research such as, narrative analysis, grounded theory, discourse analysis, data display and analysis, content analysis and quantifying qualitative data and computer assisted qualitative data analysis software (CAPDAS) (Saunders et al., 2016). Nevertheless, these approaches seem cumbersome sometimes and take a long time to complete (Willig, 1999; Braun and Clarke, 2006 and Smith and Bekker,
Qualitative research is an approach that attempts to situate an activity that locates the observer in the world by providing the study to occur in their natural setting and by attempting to make sense of, or interpret information (Denzin and Lincoln, 2005). A characteristic of qualitative research is to use a variety of empirical materials such as personal experience, interviews, and questionnaires. It is imperative to understand the task at hand and how to fully carry out the study when using a qualitative research approach in order to find out the information needed. One view of qualitative research is it involves examining individual’s experiences and documenting those experiences in detail (Jones, 2011). By documenting these observations the researcher is ensuring validity in his or her data and giving the correct creditability to those who participated in the study.
According to Bryman and Bell (2015), a research strategy is “a general orientation to the conduct of business research” (p. 37). Researchers distinguish between a qualitative, quantitative, and mixed methods research. While qualitative research focuses on understanding texts and words and usually applies an inductive approach, quantitative data aims at measuring numerical and statistical data and typically follows a deductive approach (Bryman & Bell, 2015, pp. 37–38). A mixed methods research combines qualitative and quantitative research strategy, where either one of the two strategies is prioritised over the other or have the same status (Bryman & Bell, 2015, pp. 643–645).
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
Information Security Analysts are the guardians of information systems, they arrange and execute efforts to establish safety to shield an association's PC frameworks and systems from invasion and cyberattacks. Analysts help companies avoid, screen and react to breaches and cyberattacks. Analysts have to constantly adjust in order to stay ahead of cyber attackers, stay exceptional knowledgeable on the most recent strategies assailants are utilizing to penetrate PC frameworks and on IT security. Experts look into new security innovation to choose what will most successfully ensure the safety of the company they work for. This may include going to cybersecurity meetings to hear first hand research from different experts who have encountered new sorts of assaults.
To understand a Feminist scholar’s perspective of security, there needs to be clarification of their understanding of International Relations. For an individual without knowledge of IR, they are accustomed
Sonderberg, A-M & N Holden. (2002), Rethinking cross cultural management in a globalizing business world' International Journal of Cross Culture Management 2(1): 103-121
With technology rapidly changing as fast as we blink our eyes, it is important for people to learn as much as possible about the computer world if they want to maintain a decent lifestyle because the world we live in revolving around those technologies. As McKee points out, “most jobs now require intelligence and technical skill” (1). Each year, there is something either added or modified to computers, which forces people to learn computer literacy at a steady pace. While some love computers, others despise them. When comparing people’s attitudes towards computers, statistics show a gender gap that proves most females’ attitudes are drastically different from the attitudes of males. Several studies prove that women not only lack an interest in technology, but they also chose not to enroll in computer classes. Since computers and technology play an enormous role in the world today, more technology professionals are needed. It is extremely important for more women to become knowledgeable in these areas. Swain and Harvey argue, “This technology gender gap is affecting half our population and causing it to be unprepared to contribute to the demands of a high-tech twenty-first century” (17). While this may not seem like a serious issue to some, it is an issue that will ultimately lead to a bigger problem if not handled immediately. So why are there so few women in the technology field? To answer that question, I must first find out why are there so few women in the technology and computer classes, considering that this atmosphere is the most common place where the interest for computers is born.
National Institute of Standards and Technology. (2012, March/April). Basing Cybersecurity Training on User Perceptions. (IEEE Report 1540-7993/12). (pp. 40-49). Retrieved from University of Maryland University College IEEE Computer Society website: http://www.computer.org.ezproxy.umuc.edu/portal/web/csdl
...chniques and procedures among those associated with quantitative or qualitative research. A literature review, which included document analysis, was used to answer sub-questions one, two and three. A model building approach was suggested to answer sub-question four. In addition, the study uses a case study as a proof-of-concept. The use of a case study is a qualitative empirical study to strengthen the research validity. Since the research methods directly responding to the research questions (Literature review and Model building) make use of textual data, we classified this study as a qualitative study. Table 3.1 below summarises the classification of this study in terms of the dimensions discussed above.
Information assurance is a very critical issue within the 21st century. The rise of hackers in a technology dependent world has not only affected individual consumers, but also businesses and governments. Personal lives are being affected by data breaches every day due to the increase of cyber criminals that are attacking databases of various companies such as Target and Home Depot. The education that I expect to receive from Regis University and the MSIA program is one that will not only help me understand how to resolve these current threats that affect different sectors, but also one that will prepare me to be ahead of the threats within the future. I expect to understand what are the security issues that allow hackers to be successful in