Sign In
Not register? Register Now!
You are here: HomeCourseworkTechnology
Pages:
22 pages/≈6050 words
Sources:
15 Sources
Level:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Prepape Comprehensive Examination Written Responses (Coursework Sample)

Instructions:

COMPREHENSIVE EXAMINATION: WRITTEN RESPONSES I understand that Capella University’s Academic Honesty Policy (3.01.01) holds learners accountable for the integrity of work they submit, which includes, but is not limited to, discussion postings, assignments, comprehensive exams, and the dissertation. Students are expected to understand the Policy and know that it is their responsibility to learn about Instructor and general academic expectations with regard to proper citation of sources in written work as specified in APA Publication Manual, 6th Edition. Serious sanctions can result from violations of any type of the Academic Honesty Policy including dismissal from the University.

source..
Content:

COMPREHENSIVE EXAMINATION WRITTEN RESPONSES
Submitted by:
Presented in Partial Fulfillment
of the Requirements for the Degree of Masters.
STATEMENT OF ORIGINAL WORK
I understand that Capella University’s Academic Honesty Policy (3.01.01) holds learners accountable for the integrity of work they submit, which includes, but is not limited to, discussion postings, assignments, comprehensive exams, and the dissertation. Students are expected to understand the Policy and know that it is their responsibility to learn about Instructor and general academic expectations with regard to proper citation of sources in written work as specified in APA Publication Manual, 6th Edition. Serious sanctions can result from violations of any type of the Academic Honesty Policy including dismissal from the University.
I attest this document represents my own work. Where I have used the ideas of others, I have paraphrased and given credit according to the guidelines of the APA Publication Manual, 6th Edition. Where I have used the words of others (i.e. direct quotes), I have followed the guidelines for using direct quotes prescribed by the APA Publication Manual, 6th Edition.
I have read, understood, and abided by Capella University’s Academic Honesty Policy (3.01.01). I further understand Capella University takes plagiarism seriously; regardless of intention, the result is the same.
I understand that placement of my learner ID# below constitutes signing and attesting to this Statement of Original Work.
Attested to by:
QUESTION 1
Compare and contrast at least 2 quantitative research approaches (for example, Structural Equation Modeling, Regression Analysis) which have been used or may be used in studies on how inadequate employee training can compromise valuable information. Examine and discuss the issues of sampling, validity, reliability, and bias relative to the chosen approaches.
Introduction
The question requires a comparison and contrast of two quantitative research approaches that have been used or may be used when studying “how inadequate employee training could compromise valuable organizational information”. In furtherance, the question requires that much focus be based on discussion and examination of validity, reliability, and biasness in relation to the chosen approaches. In underscoring study question, it is imperative to begin by defining the meaning of information security.
Information security refers to defensive process of denying or restricting unauthorized access, disclosure or use, disruption, perusal, modification, destruction, inspection or recording data. The term could as well be used generally regardless of electronic or physical data. The comprehensive examination will entail comparative analysis of two quantitative research approaches (Hall, Nardi and Fienberg, 2011). In contrast, it will explore effective quantitative analysis in real life situation as far as security of information is concerned in an organization (Hoyle, 2014).
However, the two approaches that will be explored are Structural Equation Modeling (SEM) and Regression Analysis (RA), and their application on how inadequate employee training could compromise valuable information. It could be explained further that quantitative study comprises of collection of raw data and consequent conversion of statistical information into mathematical form in order to ease analysis and drawing explorative conclusions (Mueller, 2012). Moreover, determination and manipulation of statistical data requires comparison of quantitative analysis methods to be used to analyze effects of inadequate employee training on valuable information in an organization (Hee-Dong et. al., 2014).
However, research will have hypotheses especially regarding questions to be addressed; for example, predictions about perceived relationships between inadequate employee training and security of information in an organization. The process would enhance disparities and comparison of variables. Moreover, to be assured of integrity and reliability, the study will explore questions through various instruments and materials like observation check lists and computer tests, in addition to a clearly defined plan of action leading to determination of how effective an organization could adopt employee training for securing crucial information (Mair, Wu, and Bentler, 2010). In continuation, below is the illustration of importance of adequate training on information security.
Importance of Adequate Employee Training on Information Security Awareness
With regard to organization, adequate employee training is necessary in order to enhance information security, indeed the process require a lot of work and resources. As such, employees within an organization need to explore challenging tasks regarding security of information (Aloise, 2010). Unless there is effective training on how to handle organizational data, it would be useless to waste resources to train. When employees are unable to maintain confidentiality of information, organization risks exhibiting information mishandling or inappropriate use by unauthorized persons (Hall and Fienberg, 2011). Such organization is likely to be noncompliant of highly growing number of legal implications for privacy and data security. Other valuable assets and organizational corporate reputation are likely to be compromised as well (Kirlappos and Sasse, 2012).
Moreover, when initiating change, it is imperative to state that not every employee would embrace similar ideology (Hall and Fienberg, 2011). To some extent, employees would feel as is the process of initiative information system is aimed at rendering their services obsolete. This is based on the fact that specific employees may not cope with change, while others would view it with positivity. Such processes within an organization would be taken to safeguard data (Chaudhuri, Monteleoni, and Sarwate, 2011).
Meanwhile, in analyzing how inadequate employee training could compromise valuable information within an organization, it is realistic that numeric dataset should be adopted through quantitative analysis methods and techniques (Vacca, 2012). Moreover, the analyses are based on levels of research validity, reliability and also considering information biases to adopt an all-inclusive approach to deliver comprehensive outcome on how organizational information could be secured. Thus leading to high production efficiency (Fox, Nie and Byrnes, 2012).
An organization should highlight how trainings would be conducted and appropriate methods in communicating the training resources, whether the organization is concerned with verification of desired results from training sessions or not (Vacca, 2012; Koenig-Lewis, Palmer and Moll, 2010). In other words, an organization should integrate strategies that ease ability to update and retrain employees on education programs routinely in order to improve level of information security (Chaudhuri, Monteleoni, and Sarwate, 2011). Training should also consider and integrate work and compliance ethics between employees and management. It implies that both staff and management should put into practice similar information (Aloise, 2010). This could enhance results through accountability and compliance with published policies within organization. Hence accomplishing targeted benchmarks in organization as far as security of valuable information is concerned (Hall and Fienberg, 2011).
Moreover, quantitative data is often collected through respective processes and procedure that could effectively be integrated in statistical analysis, for example; stylish SCP (statistical computer packages) like SPSS (Hoyle, 2014). Moreover, analysis determine the extent to which IT and management practices could be adopted to positively impact organizational practices (Mueller, 2012). This process involve and integrates research variables which varies with research process adopted. However, statistical analysis will explore how inadequate employee training could lead to intrusion of valuable organizational information (Skyrius & Bujauskas, 2010). In furtherance, comparison of quantitative techniques creates in-depth understanding of how to secure organization’s information, leading to understanding issues related to sampling, data validity, reliability, and bias respectively (Hoyle, 2014).
It is important to restate that study objectivity targeted exploration of how inadequate employee training affects level of skills in averting information system intrusion (Fox, Nie and Byrnes, 2012). However, adopting IT training may change employee or management approach to common problems that necessitated the integration of new system making the participants to derive negative attitude towards the management practices (Mueller, 2012). Moreover, it necessitates adoption of critical approach to examine methods of implementing secure system. Thus leading to conclusions that emphasize on how to avoid exhibited biases.
Besides, research will ensure measure what claims about whether IT systems have positive impact on management in organizational setup (Hall, Nardi and Fienberg, 2011). There would be clear understanding of IT system in organization, hence adopting effective process in preparation for data control (Zhou, 2012; Mueller, 2012).
Conversely, the external factors, which might affect employees’ level of acquaintance with system security are important factor in ensuring that information management system (IT system) is not accompanied by other changes that might adversely affect the organization (Fox, Nie and Byrnes, 2012). Moreover, key emphasis within quantitative study are based on rational perception which aims at moving from general to specific IS (information system) considerations regarding the study topic, which at times could be regarded as a top-down approach (Skyrius...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!