Tuesday, April 16, 2019

Integrating software applications in cloud-Enabled Enterprises Research Proposal

Integrating software applications in cloud-Enabled Enterprises methodological analysis - explore Proposal Example2. To implement software applications that enabled BYOD in the Enterprise domain. 3. To implement pledge protocols for BYOD devices that concern the needs of Enterprise frame working This chapter develops a look methodology for pursuing the objectives. The chapter includes research methods region that identifies the proposed methods for implementing the study, research design, and role of the researchers, the studys facilitators, research participants, and instrumentation for the study. The section also discusses validity and reliability of the selected information hookup instruments, info collection procedure, proposed data analysis approach and pilot study for the research. Research method The descriptive study proposes a mixed research approach for investigating its objectives. The method leave behind be explored through field study. It integrates qualitative and quantitative techniques and has the advantages of minimizing weaknesses of each of the techniques and optimizing the techniques strengths. Its advantages and its correspondence to the scope of the research vindicate its source. Data that is collected in quantitative techniques reflect on the actual value in an circumstance and not a researchers perception. ... Such data ordain inform needs in organizations computing systems and consequences of such needs towards development of optimal incorporated systems with suitable software applications and desirable security measures. Research design Experimental design is proposed for the studys quantitative approach. Blocked design will be used. It involves observation of data from partitioned sample space and suits the scope of the study that seeks data on features of integrated computing systems that can co-exist with an enterprises network, information on software applications are compatible with BYOD in an organizations network, an d security protocols that are suitable for BYOD in an enterprises network. Qualitative data will be collected based on participants experiences. The research design is predetermined and is therefore fixed. routine of the group members The group members will assume active roles in the research process. The groups roles began with appellation of the researchs title and scope, investigations into the studys background information, and development of the research problem and research objectives. The groupalso assume the role of developing and implementing the research methodology. After data collection, the group will analyze the data and document research findings and recommendations to stakeholders to the study. Facilitators The group will also be facilitators of the study, will facilitate data collection processes, and technical aspects of data analysis and documentation of the studys findings. Participants The study will involve common chord categories of participants, employees o f

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.