QUESTION 1 – (25 MARKS)
(a) Explain how the term ‘research’ as used in science differs from how it is used in everyday life. Then provide an example of an ICT research project that uses action research to illustrate your definition.
(b) A research project commonly includes the following phases: define research problem, design research, collect data, analyse data and report findings. In your own words, briefly describe what occurs in each of these phases.
(c) A project is defined as a temporary endeavour undertaken to create a unique product, service, or result, and these are some of the attributes of a project:
The research project described in the abstract below is temporary as it will have ended once the data analysis was done and the findings were published. Describe how each of the other attributes listed above is a characteristic of the project.
Studies show that virtual project teams are on the increase, so organizations need assurance that they can be managed just as effectively as traditional projects. The virtual project structure introduces new challenges for project managers. One such challenge is the development and maintenance of trust within the virtual environment. The aim of this research is to explore the role of trust in virtual project teams and to investigate how trust influences project outcomes. Data was collected from a survey of members of the Project Management Institute. A model of trust in the virtual team environment was proposed and tested using Partial Least Squares (PLS). The results show that team trust predicts project success. Institution-based trust is found to have an influence on swift trust; however, the role of swift trust on virtual project success was less clear. The study also finds that the perceived traditional experience of the project manager does not have any influence on virtual project success. Project managers must be aware of both interpersonal as well as organizational factors of trust as they plan for project success. This research adds to the body of knowledge by providing insights into trust dynamics in the virtual project structure.
(d) A variety of both research and professional codes of ethics exist; for example, the National Statement on Ethical Conduct in Human Research (2007), the ACS Code of Ethics and the Singapore Computer Society Code of Conduct.
(e) Answer the following questions about project management:
QUESTION 2 (25 MARKS)
H1: Implementing intelligent user interfaces leads to improved user satisfaction
(d) Explain how non-probability sampling techniques differ from probability sampling techniques Use examples of specific techniques in your answer.
(e) The following questions relate to quantitative data analysis.
QUESTION 3 (25 MARKS)
RQ: Does having experienced a previous malware attack influence user security behaviour?
(b) The following abstract describes a project.
The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of network protocols. Energy consumption and network coverage are two important challenges in wireless sensor networks. We investigate intelligent techniques for node positioning to reduce energy consumption while coverage is preserved. A genetic algorithm is developed to create energy efficient node positioning in wireless sensor networks. The results of a proof of concept implementation show that the intelligent algorithm can extend the network lifetime for different network positioning methods.
(c) Explain how case study research and action research differ. Your answer should include three (3) key differences and examples of each to illustrate these differences.
(d) i. Suggest a suitable sampling frame and approach to sampling from that sampling frame (i.e. sampling technique) for the following research question:
RQ2: What are the most important issues currently facing Chief Information Officers?
QUESTION 4 – Short Answer (25 MARKS)
(a) The four categories of ICT products that might be designed and created as part of ICT research are constructs, models, methods and instantiations. Provide a detailed example of each type and explain why it fits into that category.
(b) Answer each of the following questions about experiments:
(c) Use of the Internet by consumers is growing rapidly, but you have been unable to find concrete information on how successfully consumers are using it to locate and acquire goods they need.
Identify a research question and hypothesis for a research study you might undertake to investigate one aspect of this issue. Label the independent variable and the dependent variable in your hypothesis.
(d) “A project’s schedule depends only on the project’s task durations”. Do you agree or disagree with this statement? Explain your response.
(e) In your own words, explain what causality is. If you wish to establish causality in your research, what conditions must be established?
We value our customers and so we ensure that what we do is 100% original..
At Custom Writing, we believe in exemplary services that are fully geared toward customer satisfaction. That is why we don’t shy away from giving you the following guarantees;
Trusting us with your work is the best decision you have made, our pleasure lies in seeing you satisfied at 100%. If in the rear chance it happens that you are not satisfied, then know that we will equally not be satisfied. But worry not, our 30 days- Money back guarantee is all you need and that is what we promise you..Read more
We utilize profoundly equipped and gifted writers who produce unique papers liberated from any form of plagiarism. To guarantee this, we run all papers finished by our scholars through a Plagiarism checker to ensure uniqueness and originality. In any case, on the off chance that you have vulnerabilities about the originality or falsification of any paper we have finished and conveyed to you, please get in touch with us straight away. We will quickly investigate, and if the paper is seen as counterfeited, we will take suitable actions including but not limited to, revising the paper for free and in extreme cases we will activate the money back guarantee.Read more
We have an obligation deliver great and specially composed assignments. Our revision strategy endeavors to ensure total client satisfaction, comfort, and a genuine feelings of serenity. We make minor updates and corrections to the underlying request as part of our continuous assistance. However, revisions should just incorporate changes and alterations that were not effectively met, in the underlying request and that are inside the rules as per the current request structure..Read more
Our client's Data is an Integral part of our business but clearly, we are not in the business of offering our clients' very own data to others. We realize that you care how your online data is utilized and shared, we equally value your trust that we will do so cautiously and sensibly. We Promise to ensure the security of your own data during transmission by utilizing encryption conventions and programming. Likewise assist us with securing your information by not sharing your passwords and usernames.Read more
In submitting a request with us, you consent to the services we give. We will strive to take the necessary steps to convey a far reaching paper according to your prerequisites. Equally we depend on your cooperation to guarantee that we convey on this order.Read more