Describe the theoretical framework

Assignment Help Basic Computer Science
Reference no: EM132665988

You need to find and read a journal article on your potential dissertation topic ( Security threats to organization while Remote work is the topic) that uses a quantitative survey and data analysis methods. This article must be from a credible journal, preferably one that is listed on the Scimago website .

While you might be planning on doing a qualitative study, your topic will be informed by theories that have been researched using quantitative methods. The majority of peer-reviewed research journal articles on organization and management are quantitative. In fact, 88 percent of leadership articles published in the past are quantitative studies.

You will use this article for discussions in Units 1, 2, and 3, and the assignment in Unit 2. The higher the quality of article and journal, the easier these exercises will be and the more you will get out of them.

After you have read the article that you found, complete the following:

Identify and briefly describe the study.

Identify the key theories that inform this research.

Describe the theoretical framework used for this study, including the variables and relationships.

For each variable, identify the type (independent, dependent, moderating, mediating, et cetera).

For each variable, identify the level of measurement (nominal, ordinal, interval, and ratio) and how it is measured.

Reference no: EM132665988

Questions Cloud

National goals : Prepare an essay exposing your reasons to agree or disagree with each of the Healthy People 2020 National goals.
Distinguish labor and variable-overhead efficiency variances : Distinguish labor and variable-overhead efficiency variances. Crystal Glassware Company has the following standards and flexible-budget data.
What are the effects on tom gross income : The company reimburses each employee who rides the bus $100 a month for the cost of a pass. What are the effects on Tom gross income
Find the forward price : Find the forward price such that you are indifferent between the two choices.
Describe the theoretical framework : Describe the theoretical framework used for this study, including the variables and relationships.
Prepare a research project on the surveillance state : Your Research Project on the surveillance state consists of two parts: a Powerpoint presentation consisting of at least 12 slides not including title.
Compare the company performance against the prior year : The company sells sanitisers and made a high quantity of sales, Compare the company's performance against the prior year performance Hint: Use Du Pont Analysis
Develop a workforce with the skills to handle iot security : Security practitioners suggest that key IoT security steps include: Design a technical solution to reduce security vulnerabilities, Align the legal.
Childhood cognitive development : Overview of Jean Piaget and how he contributed to the field of childhood cognitive development. what do you think of his theory and what did his critics think

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss the importance of vulnerability management

Discuss the importance of vulnerability management and ongoing vulnerability management planning. Performing a Vulnerability Assessment

  What is the probability that the stenographer makes no typos

What is the probability that the stenographer makes no typos in an hour?

  Explain what it means for language to be compiled

Write three (3) sentences (a total of 100 wordsor less) ,to briefly explain what it means for a language to be compiled.

  IT Driving Business Strategy-Digital Transformation

Consider how IT systems and business strategies focused on digital interactions can transform the way companies are doing business.

  Auditing tools and techniques

Research computer-assisted tools and techniques for auditing process to examine effective controls.

  Sprint planning and burndown chart

Determine which product backlog items (user stories) need to be included in the very first iteration. Add the above user stories to the first iteration backlog.

  Social structure or social process theory

Describe how social structure or social process theory apply to MS-13 group; if both apply, explain how they apply and if neither applies explain why.

  Write a program that generates v random points

Write a program that generates V random points in the plane, then builds a flow network with edges (in both directions) connecting all pairs of points within a given distance d of each other (see Program 3.20), setting each edge's capacity usi..

  What is the maximum tolerable value of ?

Two current sources realized by identical MOSFETs (Fig. 6.40) match to within 1%, i.e., 0:99ID2 D1 D2. If VDS1 = 0:5 V and VDS2 = 1 V, what is the maximum tolerable value of λ.

  Design a multidimensional database using a star schema

Describe the ideal background for an employee who is going to manage the data warehouse.

  Security administration and access control

From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability. Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical a..

  What advice would you give the managers of this company

What advice would you give the managers of this company? What would be the best storage system for their needs and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd