Computer Security Research

1021 Words5 Pages

1.3 Research questions
1.3.1 Main research question
• How do students not studying a computer related course perceive computer security in their lives and actions?
1.3.2 Research sub questions
• What is computer Security?
• What is security in a physical context.
• What is computer Security awareness ?
• Benefits of computer security awareness?
• What are the results of the students current perception of computer security
• Why students may perceive computer security the way they do?
• What resources are in place to assist with better computer awareness and security on campus 1.4 Research Approach
According to Creswell (cited by Maree, 2007:265) the main objective of qualitative research is to investigate and interpret a fact or situation …show more content…

That is the perceptions students have with regards to computer security. Along with the a brief description on the case study methodology and rationale of the study
Chapter Two – Methodology, an In-depth look at the methodology used the plan to gather and interpret the data. The validity of the data to be used as well as the ethical considerations
Chapter Three – Literature review here key concepts will be further investigated. That is Computer Security, Student Security perceptions ad practices
Chapter Four – A literature review on similar work. Look at projects that fall in the same line with my research to see what results they got and the methodology they used
Chapter Five – The Empirical work, The data collected will fall under this section.
Chapter Six – Results, here the researcher will be interpreting and discussing the results from the empirical work
Yin (2009:18) states that a case study is an empirical study that explores a current situation in depth and within its actual environment particularly to make the boundaries between the situation and its environment more visible.
1.6 Conclusion
2 RESEARCH …show more content…

He is a student at the NWU although a graduate; he can be seen as an insider. Also having worked with some of the students, some may see him as an outsider. So it’s of the utmost importance that the researcher should not portray an image that can be seen as intimidating to the students he is going to interview, and be taken seriously by members of staff he plans on interviewing.
The researcher has biases and strong convictions set in the importance of computer security and its awareness. Even with these the researcher should be careful not to contaminate results by driving the research in such a way that it would results in his biases being supported. Thus he must have the right mix of objectivity and yet be able to relate with his interviewees such that they will give answers about how they truly perceive the elements of computer security. There are certain skills the researcher is aware of that he needs to possess to effectively interview his participants however with this in mind he is determined to make as if, better yet “Fake It Till He Makes It”. He aims to simulate the attitudes and strategies needed to conduct

Open Document