I will pay for the following article BYOD-Polcies for Mitigation of Data Loss. The work is to be 8 pages with three to five sources, with in-text citations and a reference page. Do they think the administration is doing enough through encryption of data, fingerprint scanning and other data protection measures that have been instituted? And as a result, have the data loss incidences decreased? This type of research, notes Marnie (2012), also focuses on particular factors that motivate people to do things the way they do, for example employee leaving with the company’s sensitive data, or to behave in a certain manner are analyzed. The research methods will discuss the research philosophy that informs this study or that the researcher subscribes to, the research strategy and the research instruments that will be utilized in the bid to achieve the objectives of the study.
This research is analytical in nature since the objective of the study is to investigate the effectiveness of the recommended BYOD data protection policies being used by the IT professionals and the Human Resource managers. A research philosophy refers to the preferred approach applied by the researcher in search of knowledge, establishing the nature of the problem and its context (Cooper and Schindler, 2006). Here, the existence of the problem, knowledge, values and reason are clearly delineated. The research philosophy of this study will include the epistemology and the research approach. Epistemology is that type of thinking where the phenomena is taken and thought to be true, a stark contrast of doxology which tends to treat the phenomena according to what is believed to be true. The objectivism epistemology will be used. Through this the researcher will have the duty of decipher and map out the reality of the situation (Bryman, 1999). The research will try as much as possible to quantify the answers provided. The data collection instruments to be employed have been structured to enable quantification of data even though they will not be empirically analyzed like in quantitative studies. Some of the answers that need quantification are those for the number of data breaches recorded monthly in an organization and the number of employees that have been granted access to the organization’s network among others.
There are no reviews yet.