Assignment 1-Brief - Remoting Working - Mai Tran Nguyen Khoi 1639....

Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

ASSIGNMENT 1 BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number UNIT 13: Computing Research Project

Assignment title Proposing and conducting a research project

Academic Year 2021 - 2022

Unit Tutor Ho Hai Van

Issue date 10 September 2021 Submission date

IV name and date

Submission Format:

Format: The submission is in the form of 1 document


You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference properly,
and that understand the guidelines on plagiarism. If you do not, you definitely get failed

Unit Learning Outcomes:

LO1 Examine appropriate research methodologies and approaches as part of the research process
LO2 Conduct and analyze research relevant for a computing research project
LO3 Communicate the outcomes of a research project to identified stakeholders

Assignment Brief and Guidance:

Page 1
Introduction to theme
Remote Working
The option to work remotely was already being embraced by some businesses in the pre-pandemic era.
These businesses were making some progress to adapt their working practices to accommodate remote
working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or
two a week. However, on the whole there had been a reluctance to have staff working remotely and this
has largely centered around productivity concerns, security implications and technology issue. The global
pandemic however necessitated and accelerated the move to remote working.
The vast majority of businesses have now shifted some or all of their operations online, and almost all of
their staff are working from home. The enabling force behind this necessary shift has been the different
technologies and platforms that facilitate workers to achieve business goals remotely.
The biggest issues remote workers face is being frequently disconnected from corporate networks, slow
file downloads, poor quality of video meetings and long response times when loading apps. As a result,
building secure, effective and integrated technology capability, to continue this flexibility in the workforce,
has now become a priority for all organizations

Choosing a research objective/question


Students are to choose their own research topic for this unit. Strong research projects are those with
clear, well focused and defined objectives. A central skill in selecting a research objective is the ability to
select a suitable and focused research objective. One of the best ways to do this is to put it in the form of
a question. Students should be encouraged by tutors to discuss a variety of topics related to the theme
to generate ideas for a good research objective.
The range of topics discussed could cover the following:
 Digital transformation strategies
 Monitoring and productivity tools, their uses and implications
 Key security concerns when working remotely
You have to set you own research question in the research proposal base on the previous range of topic.
The research question must be specific enough example: the audience of the research (job, age..), kind of
devices(personal devices, household appliances, or combination of some kinds)

Page 2
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine appropriate research methodologies and approaches as part of


the research process

LO1 & 2
P1 Produce a research proposal that M1 Evaluate different research
clearly defines a research question or approaches and methodology and D1 Critically evaluate research

hypothesis supported by a literature make justifications for the choice of methodologies and processes in

review. methods selected based on application to a computing research

philosophical/theoretical frameworks. project to justify chosen research


methods and analysis.
P2 Examine appropriate research
methods and approaches to primary
and secondary research.

LO2 Conduct and analyse research relevant for a computing research


project

P4 Apply appropriate analytical tools, M2 Discuss merits, limitations and


analyse research findings and data. pitfalls of approaches to data
collection and analysis.

LO3 Communicate the outcomes of a research project to identified D2 Communicate critical


stakeholders analysis of the outcomes and
make valid, justified
P5 Communicate research outcomes M3 Coherently and logically recommendations.
in an appropriate manner for the communicate outcomes to the
intended audience. intended audience demonstrating
how outcomes meet set research
objectives.

Page 3
Table of contents
P1 Produce a research proposal that clearly defines a research question or
hypothesis supported by a literature review.
1.Introduction about research

2. Purpose of research

3. Research methodologies

P2 Examine appropriate research methods and approaches to primary and


secondary research.
1.Review primary and secondary
2.Pros and cons of both research
3. Comparison

4.My solution
5. DISADVANTAGE OF SECONDARY
6. conclusion

P3 Conduct primary and secondary research using appropriate methods for a


computing research project that consider costs, access and ethical issues.

P4 Apply appropriate analytical tools, analyse research findings and data

P5 Communicate research outcomes in an appropriate manner for the intended


audience.

REFERENCES

Page 4
P1 Produce a research proposal that clearly defines a research question or hypothesis
supported by a literature review.

1.Introduction about research: The purpose of research is to enhance society by advancing knowledge
through the development of scientific theories, concepts and ideas.

_ A research purpose is met through forming hypotheses, collecting data, analyzing results, forming
conclusions, implementing findings into real-life applications and forming new research questions.

2. Purpose of research: RESEARCHERS ARE CONSTANTLY TRYING TO FIND NEW WAYS TO UNDERSTAND THE
WORLD AND HOW THINGS WORK – WITH THE ULTIMATE GOAL OF IMPROVING OUR LIVES.

Page 5
_ FIND OUT WHAT IS KNOWN, WHAT IS NOT AND WHAT WE CAN DEVELOP FURTHER. IN THIS WAY, SCIENTISTS CAN
DEVELOP NEW THEORIES, IDEAS AND PRODUCTS THAT SHAPE OUR SOCIETY AND OUR EVERYDAY LIVES.

_THE PURPOSE OF RESEARCH IS TO FURTHER UNDERSTAND THE WORLD AND TO LEARN HOW THIS KNOWLEDGE
CAN BE APPLIED TO BETTER EVERYDAY LIFE. IT IS AN INTEGRAL PART OF PROBLEM SOLVING.

3. Research methodologies.

. Primary Research :

Advantages of Primary Research

_ One of the most important advantages is, data collected is first hand and is accurate. In other words,
there is no dilution of data. Also, this research method can be customized to suit personal requirements and
needs of organizations or businesses.
_ Primary research focuses mainly on problem in hand, which means entire attention is directed to find
probable solution to a pinpointed subject matter. Primary research allows researchers to go in depth of a
matter and study all foreseeable options.
_ Data collected can be controlled. Primary research gives a means to control how data is collected and
used. It’s up to the discretion of businesses or organizations who are collecting data how to best make use
of data to get meaningful research insights.
_ Primary research is a time-tested method, therefore, one can rely on the results that are obtained from
conducting this type of research.

Disadvantages of Primary Research

_ One of the major disadvantages of primary research is, it can be quite expensive to conduct. One may be
required to spend a huge sum of money depending on the setup or primary research method used. Not all
businesses or organizations may be able to spend a considerable amount of money.
_ This type of research can be time-consuming. Conducting interviews, sending and receiving online
surveys can be quite an exhaustive process and need investing time and patience for the process to work.
_ Moreover, evaluating results and applying the findings to improve product or service will need additional
time.
_ Sometimes just using one primary research method may not be enough. In such cases, use of more than
one method is required and this might increase both times required to conduct research and the cost
associated with it.

. Secondary research:

Page 6
Secondary research or desk research is a research method that involves using already existing data.
Existing data is summarized and collated to increase the overall effectiveness of research.

Secondary research includes research material published in research reports and similar documents.
These documents can be made available by public libraries, websites, data obtained from already filled
in surveys etc. Some government and non-government agencies also store data, that can be used for
research purposes and can be retrieved from them.

Secondary research is much more cost-effective than primary research, as it makes use of already existing
data, unlike primary research where data is collected first hand by organizations or businesses or they can
employ a third party to collect data on their behalf.

Secondary Research Methods with Examples

Secondary research is cost effective and that’s one of the reasons that makes it a popular choice among a
lot of businesses and organizations. Not every organization is able to pay huge sum of money to
conduct research and gather data. So, rightly secondary research is also termed as “desk research”, as
data can be retrieved from sitting behind a desk.

1. Data available on the internet: One of the most popular ways of collecting secondary data is
using the internet. Data is readily available on the internet and can be downloaded at the click of a
button.

This data is practically free of cost or one may have to pay a negligible amount to download the
already existing data. Websites have a lot of information that businesses or organizations can use
to suit their research needs. However, organizations need to consider only authentic and trusted
website to collect information.

2. Government and nongovernment agencies: Data for secondary research can also be
collected from some government and non-government agencies. For example, US Government
Printing Office, US Census Bureau, and Small Business Development Centers have valuable and
relevant data that businesses or organizations can use.

There is a certain cost applicable to download or use data available with these agencies. Data
obtained from these agencies are authentic and trustworthy.

Page 7
3. Public libraries: Public libraries are another good source to search for data for this research.
Public libraries have copies of important research that were conducted earlier. They are a
storehouse of important information and documents from which information can be extracted.

The services provided in these public libraries vary from one library to another. More often,
libraries have a huge collection of government publications with market statistics, large collection
of business directories and newsletters.

4. Educational Institutions: Importance of collecting data from educational institutions for


secondary research is often overlooked. However, more research is conducted in colleges and
universities than any other business sector.

The data that is collected by universities is mainly for primary research. However, businesses or
organizations can approach educational institutions and request for data from them.

5. Commercial information sources: Local newspapers, journals, magazines, radio and TV


stations are a great source to obtain data for secondary research. These commercial information
sources have first-hand information on economic developments, political agenda, market research,
demographic segmentation and similar subjects.

Businesses or organizations can request to obtain data that is most relevant to their study.
Businesses not only have the opportunity to identify their prospective clients but can also know
about the avenues to promote their products or services through these sources as they have a
wider reach.

Advantages of Secondary Research

1. Most information in this research is readily available. There are many sources from which
relevant data can be collected and used, unlike primary research, where data needs to collect from
scratch.

2. This is a less expensive and less time-consuming process as data required is easily available
and doesn’t cost much if extracted from authentic sources. A minimum expenditure is associated
to obtain data.

Page 8
3. The data that is collected through secondary research, gives organizations or businesses an
idea about the effectiveness of primary research. Hence, organizations or businesses can form a
hypothesis and evaluate cost of conducting primary research.

4. Secondary research is quicker to conduct because of availability of data. It can be completed


within a few weeks depending on the objective of businesses or scale of data needed.

Disadvantages of Secondary Research

1. Although data is readily available, credibility evaluation must be performed to understand the
authenticity of the information available.

2. Not all secondary data resources offer the latest reports and statistics. Even when the data is
accurate, it may not be updated enough to accommodate recent timelines.

3. Secondary research derives its conclusion from collective primary research data. The success
of your research will depend, to a greater extent, on the quality of research already conducted by
primary research.

Key Differences between Primary Research and Secondary Research

Page 9
. Qualitative research. _ Qualitative research involves collecting and analyzing non-numerical
data (e.g., text, video, or audio) to understand concepts, opinions, or experiences. It can be used
to gather in-depth insights into a problem or generate new ideas for research.

_ Qualitative research is the opposite of quantitative research, which involves collecting and
analyzing numerical data for statistical analysis.

_ Qualitative research is commonly used in the humanities and social sciences, in subjects such
as anthropology, sociology, education, health sciences, history,……..

P2 Examine appropriate research methods and approaches to primary and secondary


research.
I. Review primary and secondary
1. Introduction to primary and secondary research

Primary research is understood as finding things that have not been done before. With the basic understanding of a
certain thing or event that we seek and invent new things.

Secondary research is understood as developing old things that have already been done. Through the studies of our
predecessors, we develop and gradually perfect it.

In general, primary and secondary research are aimed at creating new things and developing them to be useful.

What the researcher must do is:

Page 10
Primary research Secondary research
1. Interviews 1. Collected on internet or magazine.
2. Survey 2. Library
3. Questionaires
4. Focus group
5. Visits to competitors' locations

The above works make it possible for researchers to gather information and synthesize it. This is useful for their
research. Capture the real situation and gather opinions of the masses to improve the project they want to research.
For primary studies, the work is somewhat heavier. Because they have to search and collect data from numbers. For
them these jobs are very important, it directly affects their studies, and takes a lot of time and effort. From tasks
such as interviewing , surveying , questioning their research problems , gathering research members into a group .
These steps can take months, years or more. As for secondary research, they have an advantage over the initial step,
that they have data that has been studied before and take that as a stepping stone. The data that has been studied
before they can be taken as a document to continue research and complete an unfinished project. However,
researching a project takes a lot of time and effort, not only a few days and months can be completed.

II. Pros and cons of both research


And to continue the matter of primary and secondary research I will give some pros and cons about it as follows:

Primary research Secondary research


Pros: Perhaps the greatest advantage of primary Pros: As it is largely based on already existing data
research is that it allows the researcher to obtain derived from previous research, secondary
original data that are current and highly specific to research can be conducted more quickly and at a
his or her needs. lesser cost.

Cons: Because of the processes involved, primary Cons: A major disadvantage of secondary research
research can be very time-consuming, sometimes is that the researcher may have difficulty obtaining
requiring months or even years. It can also be a information specific to his or her needs.
very costly process Additionally, existing research data may not have
the currency necessary to be useful.

Regarding primary research, it is a unique kind of research in my opinion, because it has not been done before. It is
also advantageous for researchers because they collect original data on the subject matter of interest to them.
Besides, changing and repairing their project also happens easily because this is the first step of the project. As for
the disadvantage, it is too obvious, because it is the first step of the research, so they will and will spend a lot of time,
money, effort and human resources. They have to prepare everything about technology equipment to support
research and data collection, so they spend a lot of time.

As for secondary research, they have the advantage of the first step that they don't have to start the preparation of
technological equipment, because that is what has been done before, their job is to continue. Keep developing it to
be as complete as possible. And I think , the disadvantage for them is probably the ability to guarantee the data .
Projects that have been done for a long time will lead to data loss, now everything is new and the old stuff is no
longer of maximum benefit. And because they are old, it can lead to data interference. The data is likely no longer
reliable.

III. Comparison
Looking at these two research concepts, we can easily recognize them.

Page 11
 Secondary research is less expensive than primary research
 Secondary research is less time consuming than primary research

But that is the surface of these two research concepts, in fact, we still have to collect data whether old or new. And
of course the data selection of these two research concepts is the same. And the common point of these two
concepts is that they both aim for new things.

IV. My solution
After all of the above, my final choice is primary research. I wanted to research something new , unique and
challenging . Choosing a completely new project will take time to find data, but it will be more profitable.

V. DISADVANTAGE OF SECONDARY
Existing research data may not have the currency necessary to be useful. That is, it is no longer guaranteed to be
optimal, the old data, the old model is no longer suitable for current use.

VI. CONCLUSION
The appropriate research methods and research approaching have a huge impact with the whole researchprocess.
Inorder to make a good research, we realised that the appropriate research methods and appropriate
researchapproachingmust be chosen carefully. After discussing, we decided to use Survey/Interview methods for
Primary research, Secondary Data Analysisforsecondary research and Pragmatics research approaching

Survey questions

Page 12
Page 13
P3 Conduct primary and secondary research using appropriate methods for a computing
research project that consider costs, access and ethical issues.
Primary research

Page 14
Interviews

We’re all familiar with interviews. This research method usually involves one-on-one or small group
sessions, conducted over the phone or in a face-to-face environment. Interviews are great for
collecting large amounts of data from a small sample of subjects, or when specific information
needs to be extracted from experts.

For example, for a piece on developing more sustainable energy sources, a journalist would
choose to interview a subject matter expert to extract the primary research they need. Not only is
the information more authoritative and accurate, but it’s also more compelling.

Be aware though, direct interaction can alter people’s opinions. For interviews and focus groups,
it’s best to get an expert to manage and read the room to avoid skewing results.

Surveys

Another industry staple. Though much more rigid compared to interviews (with predefined
questions and themes), surveys are a great way to reach a target market and collect relevant data
at scale. Surveys will typically provide a limited amount of information from a large group of people
(as there are only so many questions you can ask before respondents get bored).

To get the most value out of surveys, it’s worth defining your audience and questions well in
advance. Try to think of key themes that you want to explore and what you want to get out of the
data collected.

For example, a supermarket might send out a survey to their customers on customer satisfaction,
asking questions about the overall in-store experience, the online experience, what customers
would like to see, and more. Because it’s issued at scale, the supermarket can get a good
understanding of what their larger customer base thinks.

Worried about your questions? Here’s how you can write great ones.

Page 15
Observations

While it might be the most arduous form of field research, observation is arguably the most
impartial as there’s no interaction between the researcher and the subject. As such, this approach
removes or reduces bias that could be encountered during an interview or survey, as the subject’s
actions are not influenced by other factors.

For instance, a sports car manufacturer might want to see how their vehicles are used in real-world
scenarios and if there are any limitations on the customer. This could be a case of visiting a race
track or car showroom to see how customers use the vehicles.

Page 16
Focus groups

This method is great for gathering data on particular topic areas. Sitting between interviews and
surveys, focus groups allow you to engage a small group of people, e.g. subject matter experts.

More informal than interviews but more professional than surveys, they’re a great way to gain
insight and valuable information on customers, pain points, and other areas of interest in your
industry.

For example, a technology manufacturer might put together a focus group to discuss technology
adoption amongst 24-36-year-olds ahead of a new product launch. Through this focus group, they
can learn more about how 24-36-year-olds purchase and engage with new tech solutions.

Research services

While the process of gathering data is relatively straightforward, making sense of it (and having the
right skills to turn it into insight) can be tough.

This is precisely why so many brands and businesses turn to research services. According to our
data, 97% of market research is outsourced. This allows brands and businesses to gain access to
relevant information for truly original research.

Though a more modern form (and approach) to primary research, research services enable brands
and businesses to collect data and analyze it very quickly. But the main benefit? Expertise.

With research services you get a team of experts who know exactly what research questions to
ask and how to turn survey responses into actionable insight. They know how to get the right
respondents and the ideal sample sizes, as well as leverage primary research and secondary
research data to build comprehensive, revealing reports.

At Qualtrics, we have a team of experts who can streamline your research process for both
primary and secondary research, helping to uncover insights in days, not weeks. Learn more about
our research services.

Page 17
How to conduct Secondary Research?
Here are the steps involved in conducting secondary research:

1. Identify the topic of research: Before beginning secondary research, identify the topic that
needs research. Once that’s done, list down the research attributes and its purpose.

2. Identify research sources: Next, narrow down on the information sources that will provide
most relevant data and information applicable to your research.

3. Collect existing data: Once the data collection sources are narrowed down, check for any
previous data that is available which is closely related to the topic. Data related to research can be
obtained from various sources like newspapers, public libraries, government and non-government
agencies etc.

Page 18
4. Combine and compare: Once data is collected, combine and compare the data for any
duplication and assemble data into a usable format. Make sure to collect data from authentic
sources. Incorrect data can hamper research severely.

Page 19
5. Analyze data: Analyze data that is collected and identify if all questions are answered. If not,
repeat the process if there is a need to dwell further into actionable insights.

Page 20
P4 Apply appropriate analytical tools, analyses research findings and data.

1. To conduct the survey, I will first develop an online form using Google Surveys and
distribute it to employees. I'd like to use Python to examine the data once I've finished
collecting it. I use Python to replace Google's default tool since it provides more diverse
visualizations and allows me to access raw data from Google Forms.Step 1 creating Google
Form:
Here is link of google form:
https://docs.google.com/forms/d/1N_plHQfb0DhVitd8P5bnUk8NiVTZF8ZKv9i70l4qUjE/edit

Here are some pictures of created questionnaire:

Figure 1 Question 1

Page 21
Figure 2 Question 2

Figure 3 Question 3

Page 22
Figure 4 Question 4

Figure 5 Question 5

Page 23
Figure 6 Question 6

Figure 7 Question 7

Page 24
Figure 8 Question 8

Figure 9 Question 9

Page 25
Figure 10 Question 10

2. Step 2 get raw data:


Here is raw data after finishing the survey:

Figure 11 Raw Data

3. Step 3 using Python:


 First step, I will import necessary features to create chart such as pandas, seaborn etc…

import numpy as np

Page 26
import pandas as pd

import matplotlib.pyplot as plt

import statsmodels.api as sm

import seaborn as sns

sns.set()

 In second step, I will convert fields into array. This step will help us calculation the result.

Figure 12 Second step

 After second step, the field column in datasheet will change into simple number and we can use
simple code to calculate the result. Everyone can see an example on the slide, in question two Python
has count the people who voted for IT technician is eight pp

Figure 13 Third step

Final step, creating chart:

Page 27
Figure 14 Create chart

After finishing process data, we can visualize the data. On the slide is an example about pie chart Which
I created based on collected data.

Figure 15 Chart Example

Page 28
4. Analyzing:

4.1 How old are you?

Figure 16 Chart of question 1

First question, the result age from 20-30 is 75 %, it means almost employees are young, therefor when you want to
create a training course they will easily learn and study. The rest of them is quite young and there are no old
employees in organization.

4.2 Please supply information about your position job!

Figure 17 Chart of question 2

In second question is about job question. Occupation can affect to knowledge about cyber security, based
on upper chart we can predict this organization is in IT field, a lot of staffs are IT Technician.

Page 29
4.3 Which kind of Operation are you using?

Figure 18 Chart of question 3

In the third question 75% chose MS window and only small group people are using Linux. Linux is an
operation of GOOGLE; it would be fine if the users were IT technician, but Linux is not a friendly operation
for normal users. With this result the IT manager should be care and create new policy.

4.4 If you are using Microsoft Window) Which version Microsoft is installed on your
computer:

Figure 19 Chart of question 4

In this question I want to find out the version of window users, because some versions have not been supported from
Microsoft. If you want to use some versions such as Window 7 or XP it would be a risk, those versions may be existing
hiding risks and they would be become a backdoor for the hackers.

Page 30
4.5 Which web browsers do you use to access internet?

Figure 20 Chart of question 5

Similar to question about version of Window, some web browser such as Internet explorer, it may be too old to be
used and some project deployed on web platform cannot work with IE. One more thing, it also exists risks because of
without support from Microsoft.

4.6 How often do you use Windows Update?

Figure 21 Chart of question 6

In upper chart about updating window habit of users, the result is 50% percent people let window working
automatically. This thing can cause window can be late for updating new version or ceased upgrading the
new one. Luckily no people reject to update window, it means they really care about cyber security and they
always to learn something new.

Page 31
4.7 Which antivirus is installed on your computer?

Figure 22 Chart of question 7

About using antivirus program, near 20 percent people did not install antivirus, those devices can damage to
the system while connecting from home. One more thing in this pie chart, using various antivirus can cause
some problem too. Example: unsynchronized with system can cause disconnection issue or policy of firewall.

4.8 Which software have you purchased recently?

Figure 23 Chart of question 8

Number eight chart. The truth is there are still a lot of people are using unlicensed software. The question is
“Which software have you purchased recently?” but thirty-one pp has not bought any software recently. In
fact, when you purchase new laptop or computer, you must buy with software.

Page 32
4.9 How long would you change the passwords?

Figure 24 Chart of question 9

The nineth chart has showed us lack policies, 50% percent people don’t change the password and slow
replacing password. Unchanging password in long period against recommend security rules of reputational
organization.

4.10 What kind of security method do you use to lock your devices (such as laptop,
smartphone, laptop)?

Figure 25 Chart of question 10

This question has shown about a general habit of users. When doing work from home, it means the
employees sometimes work in home or coffee shop, with twelve percent without security method in
circumstance lost devices can be easily opened and the criminal is capable reading secret files. One more
thing, the hacker can use these devices to log in the system such as local application or access secret files.

Page 33
P5 Communicate research outcomes in an appropriate manner for the intended audience.

5. Stakeholders:
My stakeholders were divided into four categories:

• The Chairmans: These are individuals who hold the top position inside an organization.

• IT Department: This group is in charge of the organization's system infrastructure and policy
development. The IT department is in charge of the organization's security.

• The rest of the Departments' Chiefs or Leaders: Different departments are managed by different people.

• Employees: All employees who work for the company.

6. Importance of research:
After doing research, I’ve got the latest news about “Work from Home” a popular work which are applying widely in
COVID 19 Pandemic from that I can draw back precious experiences and use it for my organization. In additionally,
while doing research, I can catch the problem about security happening when operating “Work from Home”. Depend
on the position of the readers, my result can provide variety new aspects for them. I would start with the first
stakeholder.

First with The Chairmans who are in the top positions, actually they are merely internet users but with position as the
Founders of Organization, those peoples should be known what are happening in their organization. Via my research
and recommend solutions, they will have a view about “Work from home” and understand all risks hiding in this kind
of work then giving reasonable decision while managing organization.

About IT Department, through the survey they can check again their policies and fill the holes existing in the system.
One more thing my research also provide the latest news about cyber-criminals such as new kind of malwares, cheating
form on the internet, fake website…Beside this is also a chance for the Chief who want to test the security knowledges
of IT staffs.

The rest of Stakeholders are The Chiefs or Leaders of the rest Departments and Employees, summary they are

merely internet users. My research is going to provide to them the necessary knowledges about cyber-
security and help them in understanding the importance of protecting personal devices while using internet.
I hope my research would give them a new aspect about security thence they will change the habits effect
to the system.

Page 34
7. Justification:
Returning to P1's initial hypothesis, research reveals that existing hazards are hidden among internet users.
Users' devices can become a backdoor for hackers to attack the system if they run unlicensed software or
do not install antivirus. I am confident that my initial premise is correct because, according to the eighth
question, Vietnamese people still choose to utilize free software. Thirty-one percent of employees in the
company still use unlicensed software, as seen in the diagram below:

Figure 26 Example 1

Although 31.2 percent is a small percentage, the number of people that use unlicensed is high. This might
make the organization's system weaker and weaker, even if you have developed a strong defense. One last
point for number ten:

Figure 27 Example 2

12.5 percent of people have left their personal gadgets unprotected. For instance, a member of staff had his
telephones robbed, but he had not set up a password to lock his phone, and the robber was from a
competitor firm. This crook may find it simple to unlock the phone and obtain information from it.
Page 35
According to the poll, a modern and hard system can be quickly destroyed by a simple reason; thus, in order
to improve the system, especially in the COVID era, where practically everyone must work from home, the
use of the internet by employees in organizations is a serious worry. A minor fissure might get larger and
eventually demolish the wall.

8. Solution:
In order to improve habits of user here are some recommend:

First the organization should create courses to train employees about cyber security, those courses will
reduce kind of attack such as fake email, poison link… during using internet of users. About using untrusted
operation, no setting up password or no updating windows, IT department should give more strict policies
such as denying accessing local data and collect information about devices or staffs. In seventh question, the
organization should choose a trusted program and require all employees must use it, this step can reduce
the unstable in the system. The last problem about unlicensed software, that problem come from people,
the organization should provide for their staffs trusted devices or software and require the employees must
use it.

With solution I recommend upper, I hope we can provide the safe for users and system while doing work
from home. Although some solution is very hard to implement, with development of technology I believe
we can overcome.

Page 36
1. References
Sự khác biệt giữa các đối tượng, từ và thuật ngữ. 2022. Khác biệt giữa nghiên cứu cấp và nghiên cứu thứ cấp
(Giáo dục) . [trực tuyến] Có tại: <https://vi.sawakinome.com/articles/education/difference-between-primary-
research-and-secondary-research-2.html> [Truy cập ngày 14 tháng 4 năm 2022].
2. Vi.411answers.com. 2022. Ưu điểm và Nhược điểm của Sơ đồ dữ liệu và Thứ cấp là gì? . [trực tuyến] Có tại:
<https://vi.411answers.com/a/uu-diem-va-nhuoc-diem-cua-du-lieu-so-cap-va-thu-cap-la-gi.html > [Truy cập
ngày 14 tháng 4 năm 2022].
3. Grad Coach. 2022. Phương pháp nghiên cứu là gì? Định nghĩa + Ví dụ - Grad Coach . [trực tuyến] Có tại:
<https://gradcoach.com/what-is-research-methodology/> [Truy cập ngày 14 tháng 4 năm 2022].
4. QuestionPro. 2022. Nghiên cứu thứ cấp- Định nghĩa, Phương pháp và Ví dụ. | QuestionPro . [trực tuyến] Có
tại: <https://www.questionpro.com/blog/secondary-research/> [Truy cập ngày 14 tháng 4 năm 2022].
5. QuestionPro. 2022. Nghiên cứu Định tính: Định nghĩa, Các loại, Phương pháp và Ví dụ . [trực tuyến] Có tại:
<https://www.questionpro.com/blog/qual Định-research-methods/> [Truy cập ngày 14 tháng 4 năm 2022].
6. Qualtrics. 2022. Nghiên cứu thứ cấp: Định nghĩa, phương pháp và ví dụ . [trực tuyến] Có tại:
<https://www.qualtrics.com/experience-management/research/secondary-research/> [Truy cập ngày 14 tháng
4 năm 2022].
7. Umgc.edu. 2022. WRTG - Tài nguyên Nghiên cứu là gì? . [trực tuyến] Có tại: <https://www.umgc.edu/current-
students/learning-resources/writing-center/online-guide-to-writing/tutorial/chapter4/ch4-06.html#:~: text =
Your% 20research% 20resources% 20can% 20come, you% 20or% 20someone% 20else% 20designs.> [Truy
cập ngày 14 tháng 4 năm 2022].
8. Dịch vụ Nghiên cứu và Đổi mới. 2022. Dịch vụ Nghiên cứu . [trực tuyến] Có tại:
<https://www.ucl.ac.uk/research-innovation-services/research-services-0> [Truy cập ngày 14 tháng 4 năm
2022].

Page 37

You might also like