Saturday, June 8, 2019

Integrating software applications in cloud-Enabled Enterprises Research Proposal

Integrating software applications in cloud-Enabled Enterprises methodology - Research Proposal Example2. To carry through software applications that enabled BYOD in the Enterprise domain. 3. To implement security protocols for BYOD devices that meet the of necessity of Enterprise frame working This chapter develops a search methodology for pursuing the objectives. The chapter includes research methods section that identifies the proposed methods for implementing the theme, research design, and role of the researchers, the studys facilitators, research participants, and instrumentation for the study. The section also discusses validity and reliability of the selected data collection instruments, data collection procedure, proposed data analysis approach and flee study for the research. Research method The descriptive study proposes a mixed research approach for investigating its objectives. The method get out be explored through range study. It integrates qualitative and quantit ative techniques and has the advantages of minimizing weaknesses of each of the techniques and optimizing the techniques strengths. Its advantages and its correspondence to the scope of the research justify its source. Data that is collected in quantitative techniques reflect on the actual prize in an occurrence and not a researchers perception. ... Such data leave inform needs in organizations computing systems and consequences of such needs towards development of optimal integrated systems with suitable software applications and desirable security measures. Research design Experimental design is proposed for the studys quantitative approach. close up design will be used. It involves observation of data from partitioned sample space and suits the scope of the study that seeks data on features of integrated computing systems that can co-exist with an green lights network, information on software applications are compatible with BYOD in an organizations network, and security prot ocols that are suitable for BYOD in an enterprises network. Qualitative data will be collected based on participants experiences. The research design is predetermined and is therefore fixed. Role of the assort members The group members will assume active roles in the research process. The groups roles began with identification of the researchs title and scope, investigations into the studys background information, and development of the research problem and research objectives. The groupalso assume the role of developing and implementing the research methodology. After data collection, the group will analyze the data and document research findings and recommendations to stakeholders to the study. Facilitators The group will also be facilitators of the study, will facilitate data collection processes, and technical aspects of data analysis and documentation of the studys findings. Participants The study will involve three categories of participants, employees of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.