Top Banner
Research Methodology
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Research Methodology

Page 2: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

METHODOLOGYSOLUTION

Research Methodology

PROBLEM

Page 3: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Research Methodology

• Structured way that you are going to follow for the problem that you are going to address

• Process that takes FROM problem TO proposed solution

• Need some proof that this solution can indeed meet the specified objectives

• One methodology – may have a number of research methods

Page 4: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Research Methods– literature surveys– surveys– case studies– models– prototypes– experiments– mathematical proofs– algorithms– simulations– arguments

Page 5: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Literature Survey (Study / Review)

Anderson, A.M. (1991). Comparing risk analysis methodologies. Proceedings of the IFIP TC11 Seventh International Conference on Information Security (pp. 301-311). North Holland, New York, NY, Amsterdam.

Baccarini, D., Salm, G., & Love, P.E.D. (2004). Management of risks in information technology

projects. Industrial Management & Data Systems, 104(4), 286 - 295. Emerald Group Publishing Limited.

Babbie, E. (1992). The practice of social research (6th ed.). Belmont, CA:Wadsworth. Baldwin, R., Scott, C., & Hood, C. (1998). Introduction. In R. Baldwin, C. Scott & C. Hood (Eds.),

Reader on Regulation. Oxford: Oxford University Press. Bandyopadhyay, K., Mykytyn, P.P., & Mykytyn, K. (1999). A framework for integrated risk

management in information technology. Management Decision, 37(5), 437-444. MCB Press. Barton, T.L., Shenkir, W.G., & Walker, P.L. (2002). Making Enterprise RISK MANAGEMENT Pay

Off. Financial Times – Prentice Hall: New Jersey

Page 6: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Survey

Page 7: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Research Methods– literature surveys– surveys– case studies– models– prototypes– experiments– mathematical proofs– algorithms– simulations– arguments

Page 8: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Model

Gathering of Information

Questionnaires

Process & Compare

Current Security

Required Security

Management Awareness

Graphical Reports of Security State

Information Security Controls

per Legal Aspect

produced byLegal Compliance Analysis

Legal Compliance Questionnaire

Legal Requirements

%

Legal Aspects

Legal Matrix

ISO

17799

Legal Aspects

Page 9: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Prototype

Page 10: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Research Methods– literature surveys– surveys– case studies– models– prototypes– experiments– mathematical proofs– algorithms– simulations– arguments

Page 11: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

PROJECT SPECIFICATIONName of candidate

Name of supervisor (if known) OR research group

Proposed title of project / topicDescription of problem area

Problem statement (& research questions)

Project goals, objectives and rationale

Development specifications (if applicable)

Page 12: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Examples

• 1 - 5

Page 13: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 14: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 15: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 16: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 17: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 18: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 19: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1Methodology

The project will start with a detailed general literature survey to determine the current international trends. Relevant information that has been published previously will be investigated.

This will be followed by a focussed literature survey to determine topics that are included in current programmes. Along with this, an industry investigation will be done to determine topics included in company programmes that are known for sound information security. Based on the above, a questionnaire will be drafted and forwarded to a number of South African companies. The objective of this questionnaire will be to determine the topics to be included in a generic programme, as well as the level of detail in them.

Having analysed the results of the questionnaire, the common content of a generic information security awareness programme will be argued.

Page 20: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Example 1 – continued …• Detailed general literature survey

– To establish what has been done in this area

• Focused literature survey (specific)– Zoom in

• Investigation– Case study

• Questionnaire– Survey

• Analysis– Analyse results of survey

• Argumentation (reasoning)– Build your argument (express & motivate your reasoning)

Page 21: Research Methodology. METHODOLOGY SOLUTION Research Methodology PROBLEM.

Summary

• RESEARCH– Based on facts

• RESEARCH METHODOLOGY– Must be in line with your research philosophy – Research philosophy = area/paradigm in

which you conduct your research