24 Jul Using the topic and research question you developed in week 1, you will design a qualitative instrument that could potentially answer your topic/research question if it were to be
Need a 3 page answer for the attached question. All the details needed are in the document.
APA format, intext citations and references are must.
need answer in 12 Hours
Qualitative Data Collection Instrument
Overview: Using the topic and research question you developed in week 1, you will design a qualitative instrument that could potentially answer your topic/research question if it were to be applied to a qualitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies.
Directions:
You will develop a word document to include:
1. View the rubric to make sure you understand the expectations of this assignment.
a. DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx
2. Your research question in the form of a qualitative question (if it was not already).
3. An instrument or protocol (interview, ethnography, focus group protocol, etc) that could be used to answer the qualitative version of your research question.
4. A one paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the qualitative version of your research question. This should include citations from the literature to support justification.
Week1 Research Question:
Using Data Science Techniques To Enhance Data Security in SMBs
Data science is being embedded into cyber security and data security. It is being used to identify the patterns of past attacks and predict the potential risks within the framework of the system. Machine learning is highly used in analyzing large data sets to find the patterns that spot an attack.
Due to the high licensing cost and contracts, many small and medium-scale businesses use open-source tools and applications. This tends to put these organizations in harm’s way. Due to the low volume of data or fewer users in the organization, the management will choose open-source software tools, which sometimes have fewer security protocols and high exposure to data breaches and security threats.
Research Questions:
· What drives SMBs to choose open-source technologies?
· How safe are these open-source data science technologies?
· What measures can be taken to aid SMBs in using open-source data science tools to protect their data better?
I work with a small insurance firm where various open-source applications are used daily. I want to leverage my experience and access to this situation and try finding answers to the above along with my research. I plan to find the reasons behind the management’s decisions and what factors drive technical teams to choose particular open-source technologies. I will research more on their pitfalls and successful implementations.
DSRT 837 Rubric (Adapted from Doctoral Research Handbook)
Criterion |
4 (Expert) |
3 (Proficient) |
2 (Fair) |
1 (Poor) |
I. Critical and reflective thinking capable of facilitating institutional, informational technology, or business related problem-solving or school/ college improvement |
Critically analyzed the topic. Discussion of the topic was extensive and anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Meaning of the analysis was summarized. |
Critically analyzed the topic. Discussion of the topic was anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Either the analysis or summary lacked some level of detail. |
Somewhat critically analyzed the topic. Discussion of the topic was minimally anchored in fact and reason. Information about significant aspects of the topic were somewhat analyzed from the perspective of key related concepts. Analysis and summary included but lacks a significant level of analysis and discussion. |
Minimally discussed the topic without supporting facts and reasons. Poor organization of the information and limited level of detail. |
II. Consideration for the impact of leadership, information technology, or business on institutional constituents. |
Demonstrates an extensive understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a good understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a fair understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a minimal understanding of the topic’s relationship to leadership, information technology, or business. |
III. Effective analytical and communication skills |
Demonstrates a professional level of skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Demonstrates acceptable skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs minor improvement in skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs significant improvement in skills associated formatting, grammar, spelling, syntax, and use of numbers. |
IV. Knowledge of genres, paradigms, theories, literature or trends in business, criminal justice, education, English, health sciences, history, information technology, math, nursing, psychology, religion, or student personnel services. |
Subject is identified, realistic, and grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified and is realistic, but it lacks grounding in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified but is not realistic or grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject area is not established. |
V. Required Components of the assignment as listed in the assignment directions. |
All required parts of the assignment as listed in the assignment directions are included. |
Minor information is missing from the required components of the assignment as listed in the assignment directions. |
Significant information is missing from the required components of the assignment as listed in the assignment directions. |
The assignment lacks the detail needed to meet the requirements for the components of the assignment as listed in the assignment directions. |
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.