Search for:

Posted on March 31st, 2013, by

Methodology
The study of threats wireless technologies are vulnerable should involve the use of effective methods, which allow conducting detailed qualitative analysis of the current development of wireless technologies, existing threats and possible strategies for data protection and improvement of the information security. In this regard, the study focuses on the use of diverse methods of qualitative analysis, which help to identify the major threats and possible solutions to existing and potential problems wireless technologies may face in the future. However, first of all, it is necessary to define the subjects involved in the study.
Subjects
The study involves three major groups of subjects, including IT professionals, experts studying the problem of cyber crimes and wireless technologies, and average users, who have experience of using wireless technologies. In fact, the choice of subjects for the current study is very important because they should represent different views and standpoints, which should be taken into consideration in the course of the detailed analysis of the findings of the study. All subjects are of different age, race, gender, and cultural background. At the same time, IT professionals and experts are of approximately the same educational level, although they may have different specialization within their field of work. As for users, the subjects for the current study were selected in such a way that they could present possibly broader social groups of different age, gender, origin, cultural background, educational background, occupation but what united them all was the use of wireless technologies and devices. This was the major condition for the selection of subjects for the current study. The diversity of subjects involved in the current study was intentional because, in such a way, the study can provide the researcher with the broader view on the problem and open different ways to the solution of the problem of the study. The diversity of subjects of the study contributes to the better understanding of the essence of the problem, namely the current situation in regard to the development of wireless technologies, existing threats and possible ways of their prevention and solution of existing problems in the field of using wireless technologies, devices and networks.
The involvement of IT professionals in the current study was essential because IT professionals have a profound knowledge of wireless technologies and, what is more, they can forecast the further development of wireless technologies. At the same time, they work with wireless technologies and they develop them, to a significant extent. Therefore, they should be aware of possible risks and threats wireless technologies are exposed to at the moment as well as they can forecast what threats and risks to wireless technologies can emerge in the future.
In addition, IT specialists can use their professional experience, skills and abilities to assess adequately strengths and potential of wireless technologies. In such a way, they can correlate existing strengths and advantages of wireless technologies compared to conventional technologies and risks and threats wireless technologies may be exposed to. Through the involvement of IT professionals in the current study, it is possible to obtain the expertise opinion on the current development of wireless technologies, their future and technical risks and threats wireless technologies may face.
At the same time, IT professionals have an extensive experience of developing and using wireless technologies. Therefore, they know probably better than other subjects the essence of wireless technologies and their actual potential. Moreover, they know how technologies will develop in the future because it is IT professionals, who develop ITs that are currently implemented or will be implemented in the nearest and distant future. Therefore, the study of wireless technologies and threats they are exposed to along with the development of effective strategies of data protection would be impossible without the involvement of IT professionals. custom term paper
In this regard, the involvement of experts was also important. To put it more precisely, experts involved in the current study work in different fields, including education, journalism, technology science, and other fields but what was the uniting criterion that was common to all experts involved in the current study was their in-depth knowledge and study of the problem of using wireless technologies. The involvement of experts from different fields, who work on the problem of using wireless technologies, contributes to the large-scale analysis of actual problems, difficulties and challenges wireless technologies are currently facing or may face in the future. In addition, experts’ opinion can help to find possible solutions to current problems of wireless technologies, especially in terms of the enhancement of data protection. In actuality, experts involved in the current have extensive knowledge of wireless technologies because they work and study wireless technologies in details. Therefore, they can enhance the opinion of IT specialists and reveal new aspects of using and protection of wireless technologies from such threats as natural disasters, hacking/cracking, and illegal computer activities.
At the same time, experts can provide the researcher with a broader view on wireless technologies, threats they are exposed to and their solutions. In this regard, it is important to place emphasis on the fact that experts conduct the detailed study of wireless technologies, threats and their prevention. However, unlike IT specialists, experts working on the problem of wireless technologies can provide a more objective and critical view on wireless technologies. What is meant here is the fact that IT specialists are often involved in the production or use of wireless technologies. Therefore, their opinion concerning wireless technologies, threats they are exposed to and ways of their solution are, to a certain extent subjective, because, as a rule, they ground their judgments on their empirical knowledge, whereas experts tend to ground their judgments concerning wireless technologies on their studies and critical evaluation of their findings concerning wireless technologies.
In this regard, average users are more subjective than experts but still they provide very important information concerning practical aspects of using wireless technologies. To put it more precisely, average users have a subjective opinion concerning wireless technologies. However, it is average users, who use wireless technologies on the regular basis. In fact, they are the end users of wireless technologies and it is for the average users wireless technologies are developed for. Therefore, the current study cannot ignore the opinion of average users on wireless technologies, possible threats and ways of their solution.
However, average users may be helpful mainly in terms of identification of existing threats and certain problems or advantages of using wireless technologies, whereas their professional and educational background cannot make their opinion on the prevention of threats to wireless technologies and data protection reliable and valid in terms of the current study. Nevertheless, average users can reveal possible errors made by IT specialists or experts in their judgments concerning practical implementation of wireless technologies. In such a way, the involvement of average users contributes to the better understanding of practical aspects of using contemporary wireless technologies that is very important for the study of threats associated with wireless technologies and strategies of data protection and elimination of threats associated with wireless technologies.
The aforementioned subjects were involved in the current study, which was grounded on several methods, among which it is possible to distinguish face-to-face interviews, phone call interviews, online chat interviews, online questionnaires, the use of focus groups and other studies related to the topic of the current study. In such a way, all the methods could be grouped into four categories, including interviews, questionnaires, focus group, and analysis of studies concerning the topic of the current study.
Face-to-face interviews involved three groups of subjects, including IT specialists, experts, and average users. At the same time, face-to-face interviews involved only a part of subjects because other subjects could not participate in face-to-face interviews. In fact, face-to-face interviews were one of the most efficient methods of the current study because they allowed the researcher to obtain detailed information directly from the subjects. In such a way, the research could obtain the information concerning the essence of the study and existing threats to wireless technologies along with possible solutions to the enhancement of data protection from the interviewed subjects. In the course of the interview, the research could not only receive responses from the interviewed subjects but also observe the non-verbal signs, such as mimics, gestures, facial expressions, eyes movement, and other elements of non-verbal communication. Therefore, the researcher could obtain more information from face-to-face interviews from other interviews conducted either via phone or online. The observation of non-verbal responses was very important in terms of understanding the extent, to which subjects were relaxed and felt comfortable in the course of the interview.
Phone call interviews were also quite effective because they allowed the researcher to interview subjects and pose questions concerning the subject of the study. At the same time, the communication was relatively limited because the interviewer could not observe responses of the subjects to questions. Instead, the researcher could only record responses in the course of a phone conversation. Nevertheless, this type of interviews was also quite effective because these interviews allowed to discuss questions that emerged in the course of interviews and the interviewer could precise some issues, which were particularly important for the study, its purpose and problem. At the same time, phone interviews allowed involving subjects, which were remote and could not participate in face-to-face interviews. As a result, phone call interviews expanded the scope of the study and involve subjects which were remote from the place, where the study took place.
In this regard, online chat interviews were similar to phone call interviews but online chat interviews could not be as reliable as face-to-face interviews and phone call interviews because the researcher had little information on subjects involved in the study. In fact, the researcher had only the information granted by the subjects themselves. On the other hand, the online chat interviews had substantial advantages compared to face-to-face and phone call interviews because interviewed persons felt being more relaxed and ease in the course of the interview. In fact, all interviews were conducted anonymously, but the researcher had information on the position of interviewed persons, their name, and other details essential for the study but this information cannot be uncovered because of the terms and conditions of the agreement between the researcher and the subjects involved in the study. In case of online chat interviews, the researcher had little information on the subjects because the information could not be verified properly and the researcher had to rely on the subjects and the information they provided about themselves and their position. Nevertheless, the degree of sincerity in their responses could be even higher compared to other interviews conducted in terms of the current study because the interviewed persons did not suffer from the pressure of the study they felt being involved in. As a result, they were relaxed and felt comfortable in the course of the interview. Even though, the researcher attempted to created comfortable conditions for all subjects involved in interviews, but still face-to-face interviews raised certain anxiety in subjects because, judging from their non-verbal language, they were a bit nervous, while they were interviewed.
In this regard, online questionnaires were similar to online chat interviews, although questionnaires were different from different in regard to the possible responses from the part of the subjects. To put it more precisely, unlike interviews, where subjects were free to answer as they liked to the set of questions suggested to all subjects, questionnaires had not only questions but also possible answers. The subjects had to choose the option they considered to be the most convenient or true. In such a way, their responses were relatively limited. On the other hand, the questionnaire allowed the researcher to narrow the scope of the study and to focus on specific issues, which the subjects of the study had to choose or to respond in the course of the questionnaire. In this regard, the study focused on specific questions concerning wireless technologies, existing threats and possible ways of the data protection and solution of other problems that may emerge in the course of the development and implementation of wireless technologies. In fact, the questionnaire was important in terms of understanding and studying specific issues related to the problem of the current study.
Along with interviews and questionnaire, the current study focused on using other studies available to the researcher, which concerned the topic of the current study. In actuality, many researchers (Behzad, 2003) have studied the development of wireless technologies and problems that have appeared after their implementation. Obviously, the experience of other researchers was important in terms of understanding the major directions, where threats to wireless technologies could appear and defining some strategies, with the help of which possible threats could be either prevented or eliminated. At the same time, studies conducted by different researchers could reveal some common trends and findings, which could indicate to the systematic nature of the identified trends and problems. Therefore, the analysis of other studies could be and was very helpful in terms of the current study.
Finally, the current study used the focus groups method. The application of this method focused on the finding possible solutions to threats and problems related to the application of wireless technologies, especially in relation to information breaches and information security. In fact, interviews, questionnaire and the analysis of other studies allowed identifying major threats, whereas focus groups were supposed to find possible strategies to be applied to solve existing problems and prevent existing and potential threats. Focus groups comprised two groups of subjects. The first group of subjects consisted of IT specialists, experts and average users. The researcher set the problem, namely poor information security of wireless technologies and the elaboration of effective data protection strategies the first group has to tackle. The group was supposed to discuss existing threats related to wireless technologies and suggest their solutions to existing problems. The second group was the control group, which consisted of IT specialists, experts, and average users. Unlike the first group, which was comprised predominantly of IT specialists and experts, the control group consisted mainly of average users, whereas IT specialists and experts were involved to enhance the control group. Both groups worked on one and the same problem and were supposed to elaborate their solutions to the problem. As they found the solution and suggested their strategies to enhance data protection of wireless technologies and other possible problems identified in the study in regard to wireless technologies, the strategies suggested by both groups were analyzed and compared. In such a way, the research could compare strategies suggested by the first group, consisting of professionals in the field of IT and wireless technologies mainly, with responses of individuals, the majority of which had little experience in developing wireless technologies and solving problems raised by the implementation and use of wireless technologies. In such a way, the study could reveal the difference in approaches used by professionals and the extent to which strategies developed by two groups differ.

Posted in Term paper writing | Tagged , | Leave a comment

Leave a comment

Your email address will not be published. Required fields are marked *





0 Comments