Great PUBH6013 Qualitative Research Sample

Great PUBH6013 Qualitative Research Sample

Introduction

Development of information technology and its application of communication paved way for number of applications. Internet of Things (IoT) is an emerging technology which connects people with things globally (Mahakam et al. 2015).http://Great PUBH6013 Qualitative Research Sample

A research by Gartner has reported that in 2020 the number of devices connected through internet will be more than 20.8 billion. Enterprises transmit more information with the help of wireless network and IoT.

Many risk factors are involved in the transaction of records through the internet; hackers may attack the information’s in the IoT devices which may raise new threads (Mahakam et al.2015).http://Great PUBH6013 Qualitative Research Sample

Get Assignment Help from Industry Expert Writers (1)

Identification of risk factors involved transforming information and using an IoT device is an important urgent need of the IT industry today. This study aims to identify and define the key factors of risk involved in the usage of IoT. The emerging challenge not only affects the enterprises technology it also affects the operational risk (Debrecen & Gray 2015).http://Great PUBH6013 Qualitative Research Sample

Literature Review

IoT technology has been widely used throughout the global market. It helps to deliver the real time information through wired and wireless network using GPS or Cloud computing. The application of IoT is widely used in the supply chain management (Weber 2010).http://Great PUBH6013 Qualitative Research Sample

  The number of people involved in IoT are diverse and the type of information that are passed through the IoT devices are high which also included complicated data which may create new problems regarding the security and privacy policies of the IoT.

The aims of the IT governance try to manage the IT investment by providing a control mechanism to the organization. It also ensures the organization’s business objective by risk monitoring and efficiently controlling the behavior of the application.

Risk factors are controlled internal by good enterprise during the operational stage by providing a good management mechanism to prevent the occurrence of the risk (Beasley et al. 2005).http://Great PUBH6013 Qualitative Research Sample

In IoT multiple users are connect using various devices with different networks a multilevel security is needed to ensure the management of information flow.  Multi agent infrastructure service related to IoT devices and its performance is point by Kato et al. (2014).http://Great PUBH6013 Qualitative Research Sample

Research Method, design and Data analysis

Get Assignment Help from Industry Expert Writers (1)

A qualitative research method is adopted to find out the risk factors involved in the application of IoT. Delphi method is used find out the reasonable research procedure for the development of the research.

Delphi method is a commonly used method to collect information from expert knowledge. The main aim of this method is to send questions to experts individually and ask answers form the experts through communication and based on the judgment of the expert experience (Limestone & Turnoff 1975).http://Great PUBH6013 Qualitative Research Sample

Enterprise risk factor due to the use of IoT is initially identified in this study. Using Delphi expert questionnaire prototype the risk factors are analyzed. The steps involved in the release of questionnaire are

  • Identification of expert team
  • Design of expert questionnaire
  • Sending the questionnaire to the expert
  • Getting the opinions from the experts
  • The validity of questions are confirmed using the verification analysis
  • A report is produced on the risk factors

Collection of information through the questionnaire is planned to be done in two rounds.

The first round of the questionnaire consist of finding out the inconsistent problem and experts opinion about the inconsistency,  The second round of the questionnaires was done to confirm the results of the first round now the questions are given to many number of people, scholars and small scale expert team to achieve expert validity.

According to (Hills & Fowles 1975) the suitable experts for the analysis may range from 10 to 50. Based on the requirement of the survey experts from information technology and risk management were selected to conduct a survey using the questionnaire.

List of Questionnaire prepared for the survey are

  1. What is the risk that you have been undergone after implementing the IoT in your enterprise or home?
  2. Do you feel there is any security issue in using IoT? If your answer is yes give the reason.
  3. How does IoT implementation useful in your business?
  4. Does the implementation of IoT have an impact on time and cost factor on your business?
  5. Do you have any plan to extend the implementation of IoT device in your business?
  6. Will you suggest the implementation of IoT for others in their business? Justify your answer.
  7. How long you are using IoT in your business?
  8. In which area you have implemented the IoT devices in your business?
  9. Give some benefits and disadvantage that you faced after the implementation of IoT?
  10. Cost factor involved in the implementation of IoT?
  11. Risk and cost involved in the maintenance of IoT devices.
  12. Have you faced an IoT attacks? If yes what type of attack did you face?
  13. Is there any loss of data by means of IoT device that you use?
  14. Have you taken any measures to protect the data from IoT attacks?
  15. Whether the information send through the IoT is transparent?
  16. Is there any authentication to access the information stored?
  17. If there is an IoT attack is it possible to recover the system from the attack without any loss of data.
  18. Is there any possibilities that an IoT attack can spoil the whole system that are connected with the IoT.
  19. Can any one alter the functioning of the IoT devices without our knowledge which may lead to a negative impact on the business?
  20. If any IoT device fails to function during the peak hours what are the possibilities to overcome this situation.

The above questionnaire can be send to the experts of different fields and the answers received from the expert can be used to analysis the result about the risk factors involved in IoT.

Before sending the questions to expert the questions should be reviewed by an expert team to check whether the questions framed meet the needs of the research and are valuable questions.

If there is any suggestion by the expert regarding the questions the suggestions are carried out and the final approved questions are sent to the expert for analysis.

Identification of suitable experts to sent the questionnaire

The final questions are sent to experts in the different fields like IT, Business men, Risk analyst etc. First a list of top IT personals working with IoT are identified and a request is sent to them asking permission to spare some time and help us in identification of the risk involved in IoT.

Business men who have implemented IoT devices to monitor their business are approached and a few risk analyst are identified and the questions are sent to them based on their interest.

If we are sending questionnaire to the people who are not interested to answer they will not respond to our question or they won’t provide a correct response to the question which may lead to a wrong analysis.

Choosing a right expert for getting the response to the prepared questions is also an important task in the analysis process.

Conclusion

The aim of this study is to identify the risk factors that are involved in the implementation of IoT devices in business monitoring.

A literature survey is made on the risk factors involved in the implementation of IoT devices and questionnaire are framed base on the Delphi expert to get the suggestions and feedbacks of the expert about the risk factors involved in the implementation of IoT.

Many researches are ongoing based on the security attacks and data integrity of IoT devices. Since many devices are connected through IoT the data transmission rate may also have some effects.

A large volume of data is being collected daily through the use of IoT devices so there is a huge chance of security issues in using IoT for the business environment.

The data that are collected through the IoT devices are passed through different routers and unknown networkers so the reliability of data is also a great challenge for the researchers.

References

Siboni, S., Glezer, C., Shabtai, A. and Elovici, Y. (2019) ‘A Weighted Risk Score Model for IoT Devices’, Lecture Notes in Computer Science. Springer International Publishing, pp. 20–34. doi: 10.1007/978-3-030-24900-7_2.

Mengru Tu (2018) ‘An exploratory study of Internet of Things (IoT) adoption intention in logistics and supply chain management: A mixed research approach’ The international journal of Logistics Management.

Parvaneh Asgahri, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi (2018). ‘Internet of Things applications: A Systematic Review’

Peter J.Ryan, Richar B. Watson. (2017) ‘Research challenges for the Internet of Things: What Role can or play?, Systens 2017, 5,24.

Linstone, H.A. and Turoff, M. (Eds.). (1975). The Delphi method: Techniques and applications (Vol. 29). Reading, M Gartner A: Addison-Wesley.

Debreceny, R.S. and G.L. Gray. (2015). IT governance and process maturity: A multinational field study. Journal of Information Systems, 27 (1), 157-188

Madakam, S., Ramaswamy, R. and Tripathi, S. (2015). Internet of Things (IoT): A Literature Review. Journal of Computer and Communications, 3 (5), 164-173

Weber, R.H. (2010). Internet of Things–New security and privacy challenges. Computer Law & Security Review, 26 (1), 23-30

Know more about UniqueSubmission’s other writing services:

 

Leave a Comment