Assignment 1-Brief - Remoting Working - Mai Tran Nguyen Khoi 1639....
Assignment 1-Brief - Remoting Working - Mai Tran Nguyen Khoi 1639....
Assignment 1-Brief - Remoting Working - Mai Tran Nguyen Khoi 1639....
Submission Format:
LO1 Examine appropriate research methodologies and approaches as part of the research process
LO2 Conduct and analyze research relevant for a computing research project
LO3 Communicate the outcomes of a research project to identified stakeholders
Page 1
Introduction to theme
Remote Working
The option to work remotely was already being embraced by some businesses in the pre-pandemic era.
These businesses were making some progress to adapt their working practices to accommodate remote
working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or
two a week. However, on the whole there had been a reluctance to have staff working remotely and this
has largely centered around productivity concerns, security implications and technology issue. The global
pandemic however necessitated and accelerated the move to remote working.
The vast majority of businesses have now shifted some or all of their operations online, and almost all of
their staff are working from home. The enabling force behind this necessary shift has been the different
technologies and platforms that facilitate workers to achieve business goals remotely.
The biggest issues remote workers face is being frequently disconnected from corporate networks, slow
file downloads, poor quality of video meetings and long response times when loading apps. As a result,
building secure, effective and integrated technology capability, to continue this flexibility in the workforce,
has now become a priority for all organizations
Page 2
Learning Outcomes and Assessment Criteria
LO1 & 2
P1 Produce a research proposal that M1 Evaluate different research
clearly defines a research question or approaches and methodology and D1 Critically evaluate research
hypothesis supported by a literature make justifications for the choice of methodologies and processes in
Page 3
Table of contents
P1 Produce a research proposal that clearly defines a research question or
hypothesis supported by a literature review.
1.Introduction about research
2. Purpose of research
3. Research methodologies
4.My solution
5. DISADVANTAGE OF SECONDARY
6. conclusion
REFERENCES
Page 4
P1 Produce a research proposal that clearly defines a research question or hypothesis
supported by a literature review.
1.Introduction about research: The purpose of research is to enhance society by advancing knowledge
through the development of scientific theories, concepts and ideas.
_ A research purpose is met through forming hypotheses, collecting data, analyzing results, forming
conclusions, implementing findings into real-life applications and forming new research questions.
2. Purpose of research: RESEARCHERS ARE CONSTANTLY TRYING TO FIND NEW WAYS TO UNDERSTAND THE
WORLD AND HOW THINGS WORK – WITH THE ULTIMATE GOAL OF IMPROVING OUR LIVES.
Page 5
_ FIND OUT WHAT IS KNOWN, WHAT IS NOT AND WHAT WE CAN DEVELOP FURTHER. IN THIS WAY, SCIENTISTS CAN
DEVELOP NEW THEORIES, IDEAS AND PRODUCTS THAT SHAPE OUR SOCIETY AND OUR EVERYDAY LIVES.
_THE PURPOSE OF RESEARCH IS TO FURTHER UNDERSTAND THE WORLD AND TO LEARN HOW THIS KNOWLEDGE
CAN BE APPLIED TO BETTER EVERYDAY LIFE. IT IS AN INTEGRAL PART OF PROBLEM SOLVING.
3. Research methodologies.
. Primary Research :
_ One of the most important advantages is, data collected is first hand and is accurate. In other words,
there is no dilution of data. Also, this research method can be customized to suit personal requirements and
needs of organizations or businesses.
_ Primary research focuses mainly on problem in hand, which means entire attention is directed to find
probable solution to a pinpointed subject matter. Primary research allows researchers to go in depth of a
matter and study all foreseeable options.
_ Data collected can be controlled. Primary research gives a means to control how data is collected and
used. It’s up to the discretion of businesses or organizations who are collecting data how to best make use
of data to get meaningful research insights.
_ Primary research is a time-tested method, therefore, one can rely on the results that are obtained from
conducting this type of research.
_ One of the major disadvantages of primary research is, it can be quite expensive to conduct. One may be
required to spend a huge sum of money depending on the setup or primary research method used. Not all
businesses or organizations may be able to spend a considerable amount of money.
_ This type of research can be time-consuming. Conducting interviews, sending and receiving online
surveys can be quite an exhaustive process and need investing time and patience for the process to work.
_ Moreover, evaluating results and applying the findings to improve product or service will need additional
time.
_ Sometimes just using one primary research method may not be enough. In such cases, use of more than
one method is required and this might increase both times required to conduct research and the cost
associated with it.
. Secondary research:
Page 6
Secondary research or desk research is a research method that involves using already existing data.
Existing data is summarized and collated to increase the overall effectiveness of research.
Secondary research includes research material published in research reports and similar documents.
These documents can be made available by public libraries, websites, data obtained from already filled
in surveys etc. Some government and non-government agencies also store data, that can be used for
research purposes and can be retrieved from them.
Secondary research is much more cost-effective than primary research, as it makes use of already existing
data, unlike primary research where data is collected first hand by organizations or businesses or they can
employ a third party to collect data on their behalf.
Secondary research is cost effective and that’s one of the reasons that makes it a popular choice among a
lot of businesses and organizations. Not every organization is able to pay huge sum of money to
conduct research and gather data. So, rightly secondary research is also termed as “desk research”, as
data can be retrieved from sitting behind a desk.
1. Data available on the internet: One of the most popular ways of collecting secondary data is
using the internet. Data is readily available on the internet and can be downloaded at the click of a
button.
This data is practically free of cost or one may have to pay a negligible amount to download the
already existing data. Websites have a lot of information that businesses or organizations can use
to suit their research needs. However, organizations need to consider only authentic and trusted
website to collect information.
2. Government and nongovernment agencies: Data for secondary research can also be
collected from some government and non-government agencies. For example, US Government
Printing Office, US Census Bureau, and Small Business Development Centers have valuable and
relevant data that businesses or organizations can use.
There is a certain cost applicable to download or use data available with these agencies. Data
obtained from these agencies are authentic and trustworthy.
Page 7
3. Public libraries: Public libraries are another good source to search for data for this research.
Public libraries have copies of important research that were conducted earlier. They are a
storehouse of important information and documents from which information can be extracted.
The services provided in these public libraries vary from one library to another. More often,
libraries have a huge collection of government publications with market statistics, large collection
of business directories and newsletters.
The data that is collected by universities is mainly for primary research. However, businesses or
organizations can approach educational institutions and request for data from them.
Businesses or organizations can request to obtain data that is most relevant to their study.
Businesses not only have the opportunity to identify their prospective clients but can also know
about the avenues to promote their products or services through these sources as they have a
wider reach.
1. Most information in this research is readily available. There are many sources from which
relevant data can be collected and used, unlike primary research, where data needs to collect from
scratch.
2. This is a less expensive and less time-consuming process as data required is easily available
and doesn’t cost much if extracted from authentic sources. A minimum expenditure is associated
to obtain data.
Page 8
3. The data that is collected through secondary research, gives organizations or businesses an
idea about the effectiveness of primary research. Hence, organizations or businesses can form a
hypothesis and evaluate cost of conducting primary research.
1. Although data is readily available, credibility evaluation must be performed to understand the
authenticity of the information available.
2. Not all secondary data resources offer the latest reports and statistics. Even when the data is
accurate, it may not be updated enough to accommodate recent timelines.
3. Secondary research derives its conclusion from collective primary research data. The success
of your research will depend, to a greater extent, on the quality of research already conducted by
primary research.
Page 9
. Qualitative research. _ Qualitative research involves collecting and analyzing non-numerical
data (e.g., text, video, or audio) to understand concepts, opinions, or experiences. It can be used
to gather in-depth insights into a problem or generate new ideas for research.
_ Qualitative research is the opposite of quantitative research, which involves collecting and
analyzing numerical data for statistical analysis.
_ Qualitative research is commonly used in the humanities and social sciences, in subjects such
as anthropology, sociology, education, health sciences, history,……..
Primary research is understood as finding things that have not been done before. With the basic understanding of a
certain thing or event that we seek and invent new things.
Secondary research is understood as developing old things that have already been done. Through the studies of our
predecessors, we develop and gradually perfect it.
In general, primary and secondary research are aimed at creating new things and developing them to be useful.
Page 10
Primary research Secondary research
1. Interviews 1. Collected on internet or magazine.
2. Survey 2. Library
3. Questionaires
4. Focus group
5. Visits to competitors' locations
The above works make it possible for researchers to gather information and synthesize it. This is useful for their
research. Capture the real situation and gather opinions of the masses to improve the project they want to research.
For primary studies, the work is somewhat heavier. Because they have to search and collect data from numbers. For
them these jobs are very important, it directly affects their studies, and takes a lot of time and effort. From tasks
such as interviewing , surveying , questioning their research problems , gathering research members into a group .
These steps can take months, years or more. As for secondary research, they have an advantage over the initial step,
that they have data that has been studied before and take that as a stepping stone. The data that has been studied
before they can be taken as a document to continue research and complete an unfinished project. However,
researching a project takes a lot of time and effort, not only a few days and months can be completed.
Cons: Because of the processes involved, primary Cons: A major disadvantage of secondary research
research can be very time-consuming, sometimes is that the researcher may have difficulty obtaining
requiring months or even years. It can also be a information specific to his or her needs.
very costly process Additionally, existing research data may not have
the currency necessary to be useful.
Regarding primary research, it is a unique kind of research in my opinion, because it has not been done before. It is
also advantageous for researchers because they collect original data on the subject matter of interest to them.
Besides, changing and repairing their project also happens easily because this is the first step of the project. As for
the disadvantage, it is too obvious, because it is the first step of the research, so they will and will spend a lot of time,
money, effort and human resources. They have to prepare everything about technology equipment to support
research and data collection, so they spend a lot of time.
As for secondary research, they have the advantage of the first step that they don't have to start the preparation of
technological equipment, because that is what has been done before, their job is to continue. Keep developing it to
be as complete as possible. And I think , the disadvantage for them is probably the ability to guarantee the data .
Projects that have been done for a long time will lead to data loss, now everything is new and the old stuff is no
longer of maximum benefit. And because they are old, it can lead to data interference. The data is likely no longer
reliable.
III. Comparison
Looking at these two research concepts, we can easily recognize them.
Page 11
Secondary research is less expensive than primary research
Secondary research is less time consuming than primary research
But that is the surface of these two research concepts, in fact, we still have to collect data whether old or new. And
of course the data selection of these two research concepts is the same. And the common point of these two
concepts is that they both aim for new things.
IV. My solution
After all of the above, my final choice is primary research. I wanted to research something new , unique and
challenging . Choosing a completely new project will take time to find data, but it will be more profitable.
V. DISADVANTAGE OF SECONDARY
Existing research data may not have the currency necessary to be useful. That is, it is no longer guaranteed to be
optimal, the old data, the old model is no longer suitable for current use.
VI. CONCLUSION
The appropriate research methods and research approaching have a huge impact with the whole researchprocess.
Inorder to make a good research, we realised that the appropriate research methods and appropriate
researchapproachingmust be chosen carefully. After discussing, we decided to use Survey/Interview methods for
Primary research, Secondary Data Analysisforsecondary research and Pragmatics research approaching
Survey questions
Page 12
Page 13
P3 Conduct primary and secondary research using appropriate methods for a computing
research project that consider costs, access and ethical issues.
Primary research
Page 14
Interviews
We’re all familiar with interviews. This research method usually involves one-on-one or small group
sessions, conducted over the phone or in a face-to-face environment. Interviews are great for
collecting large amounts of data from a small sample of subjects, or when specific information
needs to be extracted from experts.
For example, for a piece on developing more sustainable energy sources, a journalist would
choose to interview a subject matter expert to extract the primary research they need. Not only is
the information more authoritative and accurate, but it’s also more compelling.
Be aware though, direct interaction can alter people’s opinions. For interviews and focus groups,
it’s best to get an expert to manage and read the room to avoid skewing results.
Surveys
Another industry staple. Though much more rigid compared to interviews (with predefined
questions and themes), surveys are a great way to reach a target market and collect relevant data
at scale. Surveys will typically provide a limited amount of information from a large group of people
(as there are only so many questions you can ask before respondents get bored).
To get the most value out of surveys, it’s worth defining your audience and questions well in
advance. Try to think of key themes that you want to explore and what you want to get out of the
data collected.
For example, a supermarket might send out a survey to their customers on customer satisfaction,
asking questions about the overall in-store experience, the online experience, what customers
would like to see, and more. Because it’s issued at scale, the supermarket can get a good
understanding of what their larger customer base thinks.
Worried about your questions? Here’s how you can write great ones.
Page 15
Observations
While it might be the most arduous form of field research, observation is arguably the most
impartial as there’s no interaction between the researcher and the subject. As such, this approach
removes or reduces bias that could be encountered during an interview or survey, as the subject’s
actions are not influenced by other factors.
For instance, a sports car manufacturer might want to see how their vehicles are used in real-world
scenarios and if there are any limitations on the customer. This could be a case of visiting a race
track or car showroom to see how customers use the vehicles.
Page 16
Focus groups
This method is great for gathering data on particular topic areas. Sitting between interviews and
surveys, focus groups allow you to engage a small group of people, e.g. subject matter experts.
More informal than interviews but more professional than surveys, they’re a great way to gain
insight and valuable information on customers, pain points, and other areas of interest in your
industry.
For example, a technology manufacturer might put together a focus group to discuss technology
adoption amongst 24-36-year-olds ahead of a new product launch. Through this focus group, they
can learn more about how 24-36-year-olds purchase and engage with new tech solutions.
Research services
While the process of gathering data is relatively straightforward, making sense of it (and having the
right skills to turn it into insight) can be tough.
This is precisely why so many brands and businesses turn to research services. According to our
data, 97% of market research is outsourced. This allows brands and businesses to gain access to
relevant information for truly original research.
Though a more modern form (and approach) to primary research, research services enable brands
and businesses to collect data and analyze it very quickly. But the main benefit? Expertise.
With research services you get a team of experts who know exactly what research questions to
ask and how to turn survey responses into actionable insight. They know how to get the right
respondents and the ideal sample sizes, as well as leverage primary research and secondary
research data to build comprehensive, revealing reports.
At Qualtrics, we have a team of experts who can streamline your research process for both
primary and secondary research, helping to uncover insights in days, not weeks. Learn more about
our research services.
Page 17
How to conduct Secondary Research?
Here are the steps involved in conducting secondary research:
1. Identify the topic of research: Before beginning secondary research, identify the topic that
needs research. Once that’s done, list down the research attributes and its purpose.
2. Identify research sources: Next, narrow down on the information sources that will provide
most relevant data and information applicable to your research.
3. Collect existing data: Once the data collection sources are narrowed down, check for any
previous data that is available which is closely related to the topic. Data related to research can be
obtained from various sources like newspapers, public libraries, government and non-government
agencies etc.
Page 18
4. Combine and compare: Once data is collected, combine and compare the data for any
duplication and assemble data into a usable format. Make sure to collect data from authentic
sources. Incorrect data can hamper research severely.
Page 19
5. Analyze data: Analyze data that is collected and identify if all questions are answered. If not,
repeat the process if there is a need to dwell further into actionable insights.
Page 20
P4 Apply appropriate analytical tools, analyses research findings and data.
1. To conduct the survey, I will first develop an online form using Google Surveys and
distribute it to employees. I'd like to use Python to examine the data once I've finished
collecting it. I use Python to replace Google's default tool since it provides more diverse
visualizations and allows me to access raw data from Google Forms.Step 1 creating Google
Form:
Here is link of google form:
https://docs.google.com/forms/d/1N_plHQfb0DhVitd8P5bnUk8NiVTZF8ZKv9i70l4qUjE/edit
Figure 1 Question 1
Page 21
Figure 2 Question 2
Figure 3 Question 3
Page 22
Figure 4 Question 4
Figure 5 Question 5
Page 23
Figure 6 Question 6
Figure 7 Question 7
Page 24
Figure 8 Question 8
Figure 9 Question 9
Page 25
Figure 10 Question 10
import numpy as np
Page 26
import pandas as pd
import statsmodels.api as sm
sns.set()
In second step, I will convert fields into array. This step will help us calculation the result.
After second step, the field column in datasheet will change into simple number and we can use
simple code to calculate the result. Everyone can see an example on the slide, in question two Python
has count the people who voted for IT technician is eight pp
Page 27
Figure 14 Create chart
After finishing process data, we can visualize the data. On the slide is an example about pie chart Which
I created based on collected data.
Page 28
4. Analyzing:
First question, the result age from 20-30 is 75 %, it means almost employees are young, therefor when you want to
create a training course they will easily learn and study. The rest of them is quite young and there are no old
employees in organization.
In second question is about job question. Occupation can affect to knowledge about cyber security, based
on upper chart we can predict this organization is in IT field, a lot of staffs are IT Technician.
Page 29
4.3 Which kind of Operation are you using?
In the third question 75% chose MS window and only small group people are using Linux. Linux is an
operation of GOOGLE; it would be fine if the users were IT technician, but Linux is not a friendly operation
for normal users. With this result the IT manager should be care and create new policy.
4.4 If you are using Microsoft Window) Which version Microsoft is installed on your
computer:
In this question I want to find out the version of window users, because some versions have not been supported from
Microsoft. If you want to use some versions such as Window 7 or XP it would be a risk, those versions may be existing
hiding risks and they would be become a backdoor for the hackers.
Page 30
4.5 Which web browsers do you use to access internet?
Similar to question about version of Window, some web browser such as Internet explorer, it may be too old to be
used and some project deployed on web platform cannot work with IE. One more thing, it also exists risks because of
without support from Microsoft.
In upper chart about updating window habit of users, the result is 50% percent people let window working
automatically. This thing can cause window can be late for updating new version or ceased upgrading the
new one. Luckily no people reject to update window, it means they really care about cyber security and they
always to learn something new.
Page 31
4.7 Which antivirus is installed on your computer?
About using antivirus program, near 20 percent people did not install antivirus, those devices can damage to
the system while connecting from home. One more thing in this pie chart, using various antivirus can cause
some problem too. Example: unsynchronized with system can cause disconnection issue or policy of firewall.
Number eight chart. The truth is there are still a lot of people are using unlicensed software. The question is
“Which software have you purchased recently?” but thirty-one pp has not bought any software recently. In
fact, when you purchase new laptop or computer, you must buy with software.
Page 32
4.9 How long would you change the passwords?
The nineth chart has showed us lack policies, 50% percent people don’t change the password and slow
replacing password. Unchanging password in long period against recommend security rules of reputational
organization.
4.10 What kind of security method do you use to lock your devices (such as laptop,
smartphone, laptop)?
This question has shown about a general habit of users. When doing work from home, it means the
employees sometimes work in home or coffee shop, with twelve percent without security method in
circumstance lost devices can be easily opened and the criminal is capable reading secret files. One more
thing, the hacker can use these devices to log in the system such as local application or access secret files.
Page 33
P5 Communicate research outcomes in an appropriate manner for the intended audience.
5. Stakeholders:
My stakeholders were divided into four categories:
• The Chairmans: These are individuals who hold the top position inside an organization.
• IT Department: This group is in charge of the organization's system infrastructure and policy
development. The IT department is in charge of the organization's security.
• The rest of the Departments' Chiefs or Leaders: Different departments are managed by different people.
6. Importance of research:
After doing research, I’ve got the latest news about “Work from Home” a popular work which are applying widely in
COVID 19 Pandemic from that I can draw back precious experiences and use it for my organization. In additionally,
while doing research, I can catch the problem about security happening when operating “Work from Home”. Depend
on the position of the readers, my result can provide variety new aspects for them. I would start with the first
stakeholder.
First with The Chairmans who are in the top positions, actually they are merely internet users but with position as the
Founders of Organization, those peoples should be known what are happening in their organization. Via my research
and recommend solutions, they will have a view about “Work from home” and understand all risks hiding in this kind
of work then giving reasonable decision while managing organization.
About IT Department, through the survey they can check again their policies and fill the holes existing in the system.
One more thing my research also provide the latest news about cyber-criminals such as new kind of malwares, cheating
form on the internet, fake website…Beside this is also a chance for the Chief who want to test the security knowledges
of IT staffs.
The rest of Stakeholders are The Chiefs or Leaders of the rest Departments and Employees, summary they are
merely internet users. My research is going to provide to them the necessary knowledges about cyber-
security and help them in understanding the importance of protecting personal devices while using internet.
I hope my research would give them a new aspect about security thence they will change the habits effect
to the system.
Page 34
7. Justification:
Returning to P1's initial hypothesis, research reveals that existing hazards are hidden among internet users.
Users' devices can become a backdoor for hackers to attack the system if they run unlicensed software or
do not install antivirus. I am confident that my initial premise is correct because, according to the eighth
question, Vietnamese people still choose to utilize free software. Thirty-one percent of employees in the
company still use unlicensed software, as seen in the diagram below:
Figure 26 Example 1
Although 31.2 percent is a small percentage, the number of people that use unlicensed is high. This might
make the organization's system weaker and weaker, even if you have developed a strong defense. One last
point for number ten:
Figure 27 Example 2
12.5 percent of people have left their personal gadgets unprotected. For instance, a member of staff had his
telephones robbed, but he had not set up a password to lock his phone, and the robber was from a
competitor firm. This crook may find it simple to unlock the phone and obtain information from it.
Page 35
According to the poll, a modern and hard system can be quickly destroyed by a simple reason; thus, in order
to improve the system, especially in the COVID era, where practically everyone must work from home, the
use of the internet by employees in organizations is a serious worry. A minor fissure might get larger and
eventually demolish the wall.
8. Solution:
In order to improve habits of user here are some recommend:
First the organization should create courses to train employees about cyber security, those courses will
reduce kind of attack such as fake email, poison link… during using internet of users. About using untrusted
operation, no setting up password or no updating windows, IT department should give more strict policies
such as denying accessing local data and collect information about devices or staffs. In seventh question, the
organization should choose a trusted program and require all employees must use it, this step can reduce
the unstable in the system. The last problem about unlicensed software, that problem come from people,
the organization should provide for their staffs trusted devices or software and require the employees must
use it.
With solution I recommend upper, I hope we can provide the safe for users and system while doing work
from home. Although some solution is very hard to implement, with development of technology I believe
we can overcome.
Page 36
1. References
Sự khác biệt giữa các đối tượng, từ và thuật ngữ. 2022. Khác biệt giữa nghiên cứu cấp và nghiên cứu thứ cấp
(Giáo dục) . [trực tuyến] Có tại: <https://vi.sawakinome.com/articles/education/difference-between-primary-
research-and-secondary-research-2.html> [Truy cập ngày 14 tháng 4 năm 2022].
2. Vi.411answers.com. 2022. Ưu điểm và Nhược điểm của Sơ đồ dữ liệu và Thứ cấp là gì? . [trực tuyến] Có tại:
<https://vi.411answers.com/a/uu-diem-va-nhuoc-diem-cua-du-lieu-so-cap-va-thu-cap-la-gi.html > [Truy cập
ngày 14 tháng 4 năm 2022].
3. Grad Coach. 2022. Phương pháp nghiên cứu là gì? Định nghĩa + Ví dụ - Grad Coach . [trực tuyến] Có tại:
<https://gradcoach.com/what-is-research-methodology/> [Truy cập ngày 14 tháng 4 năm 2022].
4. QuestionPro. 2022. Nghiên cứu thứ cấp- Định nghĩa, Phương pháp và Ví dụ. | QuestionPro . [trực tuyến] Có
tại: <https://www.questionpro.com/blog/secondary-research/> [Truy cập ngày 14 tháng 4 năm 2022].
5. QuestionPro. 2022. Nghiên cứu Định tính: Định nghĩa, Các loại, Phương pháp và Ví dụ . [trực tuyến] Có tại:
<https://www.questionpro.com/blog/qual Định-research-methods/> [Truy cập ngày 14 tháng 4 năm 2022].
6. Qualtrics. 2022. Nghiên cứu thứ cấp: Định nghĩa, phương pháp và ví dụ . [trực tuyến] Có tại:
<https://www.qualtrics.com/experience-management/research/secondary-research/> [Truy cập ngày 14 tháng
4 năm 2022].
7. Umgc.edu. 2022. WRTG - Tài nguyên Nghiên cứu là gì? . [trực tuyến] Có tại: <https://www.umgc.edu/current-
students/learning-resources/writing-center/online-guide-to-writing/tutorial/chapter4/ch4-06.html#:~: text =
Your% 20research% 20resources% 20can% 20come, you% 20or% 20someone% 20else% 20designs.> [Truy
cập ngày 14 tháng 4 năm 2022].
8. Dịch vụ Nghiên cứu và Đổi mới. 2022. Dịch vụ Nghiên cứu . [trực tuyến] Có tại:
<https://www.ucl.ac.uk/research-innovation-services/research-services-0> [Truy cập ngày 14 tháng 4 năm
2022].
Page 37