Sign In
Not register? Register Now!
Pages:
5 pages/≈1375 words
Sources:
6 Sources
Level:
APA
Subject:
Business & Marketing
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Research Proposal for an Information Security Management (Research Proposal Sample)

Instructions:

Create a high level proposal for a quantitative research project on information security management, preferably, Human Factors in Information Security Management, Hacking, or any other topic in IS security management. 
The proposal should include the following:
• Research problem
• Purpose of research
• Significance of research
• Quantitative Research questions and hypotheses
• Population
• Sampling size
• Data collection
• Instrument description and validation
• Statistical analysis methods

source..
Content:

Quantitative Research Proposal for an Information Security Management Topic
Name
Institutional Affiliation Quantitative Research Proposal for an Information Security Management Topic
Introduction
A robust security information system is one of the key pillars of success in any business organization (James, 2012). The security in the information system is assessed regarding the availability, authenticity of sensitive organizational assets, confidentiality, and integrity. As a result, every management in the business field strives to ensure that its organization’s information system is not exposed to threats. Setbacks in the information system profoundly affect organizations’ chances to realize the formulated goals and objectives (Chu, Chau, & So, 2015). The defects in the system affect the flow of information and reliability which adversely affects the decision-making process. It is notable that having an effective information security system is a collaboration of management of various measures in an organization. Such measures include human factors, technological innovations among others. This paper examines the impacts of human factors on information security management in business organizations in an attempt to address the issue. The paper also suggests possible ways to curb the issue from human factors perspectives.
Research Problem
To understand various challenges that hinder the effective management of information security in business organizations, scholars have uncovered numerous issues that facilitate the problem. However, it is observed that the majority of the studies tends to address the issue from a technical point of view while the role of human behaviors’ and performance is given little attention (Solic, Jovic, & Blazevic, 2013). Technological advancements in an organization do not fully guarantee secure information systems. Human factors have a central role in having an effective information security system. Human factors are responsible for at least 80 percent of all incidences that threaten is safety in organizations (Puhakainen & Siponen, 2010). In this regards, IS users security awareness and overall behaviors are critical. Initiating positive human behaviors among IS users has been observed to be a key in managing information security in business organizations.
Purpose of the research
The main purpose of this paper is to determine common factors contributed by employees that threaten efficient management of information security in an organization. A particular focus will give to human behaviors that influence information security to determine whether they can be altered. Upon determining whether identified human behaviors can be changed, the research will explore various alternatives for adjusting such traits. Alternatives identified will be presented in a general way without detailed assessment. Finally, the paper will attempt to assess whether adequate employee training can be used to enhance information security system. The effectiveness of training will be determined in aspects of availability, accessibility, open communication and feedbacks.
Significance of the Research
A central significance of this paper is that it will shed light on the current employees' factors that influence information security management in an organization. While the focus will be human behaviors, a discussion regarding identified traits will reveal how they affect the management of information security in organizations. Moreover, the paper will be of great importance in determining whether employees' behaviors that influence information security can be altered and provides means of adjustment where applicable. Finally, the discoveries of this research will determine the employees' training can effectively enhance the management of information security system in business organizations. In this regard, the paper will reveal the features of an efficient employee that managers should highly consider in their effort to improve information security system.
Research Questions
Research questions provide the guidelines and focus on quantitative research. A rule of thumb is to have research questions that are clear and produce data that can be replicated to form a valid argument (Cargan, 2007). To accomplish the purpose of this study, the following four research questions are formulated:
What are employees’ factors that negatively influence information security system in organizations?
Is it possible to alter employees’ behaviors that influence information security system?
What are alternatives for adjusting negative employees’ behaviors that influence information security?
What is the role of employee training on improving information security management?
Population
Determining the population to be used is the backbone of scientific research. A rule of thumb is to ensure that the size and type of population chosen align with the purpose of the study (McNabb, 2015). In this regard, the population selected must describe the quantity and cases in the research. Also, the population chosen must be a representative of all possible elements in the study. This ensures that data findings can be generalized and replicated to serve studies beyond subject being studied. In this research, the population will be employees in both public and private sectors where two organizations in each sector will be selected.
Sampling Size
The sampling frame for the research will be all staff of the four organizations selected whose jobs touches on issues related to information systems. The desired sampling size will be 80 respondents. This implies that every organization will be represented by 20 respondents in the final sampling size. The sampling procedure adopted in the study will be probabilistic. Specifically, systematic random sampling method will be used. The systematic sampling method is chosen since it's less tedious compared to simple random sampling (McNabb, 2015). The simplicity of this technique aligns with the primary purpose the study.
Data Collection
Data collection is a crucial stage in quantitative research. To ensure that the data collected serves the purpose this research, the paper will utilize both primary and secondary sources. Primary data will be collected in the selected firms using survey method. The survey will be administered either face to face or be conducted online. Moreover, observation will be used to collect primary data. To complement the main the data gathered, this research will also collect data from secondary sources. Specifically, the paper will only utilize data from peer-reviewed scholarly articles only. Secondary data will be presented in a form of a literature review where theories related to the topic will also be discussed.
Instrument Description and Validation
The instrument to collect primary data in this research will be questionnaires. The questionnaires will be delivered manually where face to face interaction will be involved or be delivered via mail. Providing two options will ensure that the respondents utilize the method that is convenient for them. The purpose of the study will clearly explain while confidentiality and anonymity will also be assured. Other ethical issues such as freedom to participate voluntarily will meet. The questionnaires will be designed to comprise both open-ended and close-ended questions. The two forms of questions play a vital role regarding probing in quantitative research. The questionnaire will be pretested with a representative sample comprising of the expert panel to determine its v...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • The Current Exchange Rate System Applied in China
    Description: An exchange rate system is integral in any country. The exchange system adopted by any country helps to dictate its position in the international forces of trade...
    7 pages/≈1925 words| 6 Sources | APA | Business & Marketing | Research Proposal |
  • Male Strip Club Dc
    Description: The strip club will plan to capture up to 4% market share of the local market and an additional 2 % and 2.5 % for the subsequent two years (Startupbizhub.com, 2015)...
    5 pages/≈1375 words| 6 Sources | APA | Business & Marketing | Research Proposal |
  • The Role of Leadership and Management Strategies for the Growth and Sustainability of Intern. . .
    Description: This paper is a research proposal on the role of leadership and management strategies for the growth and sustainability of international businesses. ...
    10 pages/≈2750 words| 19 Sources | APA | Business & Marketing | Research Proposal |
Need a Custom Essay Written?
First time 15% Discount!