Sign In
Not register? Register Now!
Pages:
13 pages/≈3575 words
Sources:
19 Sources
Level:
Harvard
Subject:
IT & Computer Science
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

FACTORS DISCOURAGING PARTICIPATION OF GIRLS IN ICT EDUCATION (Research Proposal Sample)

Instructions:

this is the second part of the assignment submitted as sample 1. this assignment requires to extend the work done in assignment 1 (critical literature review) and develop a research proposal. The research topic, research questions, conceptual framework, literature, methods, significance, limitations and ethical issues must be presented as part of the research proposal in association with your allocated research article As part of the development of the research proposal based on the allocated research article, it is required to investigate at least ten (10) relevant scholarly articles relevant to the keywords of the allocated research article in order to present the arguments in the
proposal. the headings are already provided.

source..
Content:

Assignment 2
FACTORS DISCOURAGING PARTICIPATION OF GIRLS IN ICT EDUCATION
Table of Content
Abstract
Introduction
Research Questions
* General Research Question
* Specific Research Questions
Conceptual Framework
* Hypothesis
Literature
Methods
* Design: Strategy and Framework
* Sample
* Data Collection: Instruments and Procedures
* Data Analysis
Significance
Limitations and Delimitations
Ethical Issues
Appendix 1

Abstract
Information and Communication Technology has become so essential in everyday life that the necessity of learning the related skills throughout one's life has become critical. The technology is having a direct impact on education development in STEM braches Information Technology and Computer Science. Due to the increasing use of technology, appropriate skill demands are on the rise but the number of professionals is still very limited. Especially the number of female professionals in extremely less; it is lesser than the one-quarter of the total ICT professionals. This is due to the lack of interest of female students in pursuing ICT related studies or careers. There are many factors which are responsible for creating a certain perception and influencing the decision-making process. This paper aims to cover the major factors which have an impact on a female student's decision of pursuing an ICT career path. This paper consists and details about the impact of Stereotypical Factors, Individual's Attitude and Underrepresentation of females in the technology field. The paper includes research and focusing on the questions regarding responsible factors and how they impact the overall issue. This paper examines empirical research which is aimed at concluding the perception of female students towards the field of technology and medicine. This research takes a 'life approach' which includes the final perception affected by the 'life events' of the participant. The paper includes a conceptual framework which includes the responsible factors which are independent of each other and gives the intensity of the impact.
Introduction
Information and Communication Technologies (ICT) have become the building blocks of modern society by taking over all aspects of life (Daniel, 2002). The ICT industry includes telecommunication services and equipment, information technology services and equipment, internet services, online libraries and documentation, broadcasting and media, commercial information services and providers, and all other communication and information related proceedings. Along with business and governance, the field of education has also been influenced by ICT; the use of information and communication technologies has greatly affected the research, learning and teaching experiences (Yusuf, 2005).

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Machine Learning based intrusion detection systems
    Description: Intrusion Detection Systems (IDS) are software or hardware systems that are designed to detect unauthorized access or malicious activity on a computer network or system. IDS can be used to protect organizations from a range of threats, including cyber-attacks, viruses, and other security breaches...
    1 page/≈275 words| 4 Sources | Harvard | IT & Computer Science | Research Proposal |
Need a Custom Essay Written?
First time 15% Discount!