question archive Background Sample problem statement and research questions Your problem statement, research questions and literature review will serve as the basis for preparing your theoretical framework
Subject:Computer SciencePrice:14.89 Bought3
Background Sample problem statement and research questions Your problem statement, research questions and literature review will serve as the basis for preparing your theoretical framework. Company X is struggling with the problem that many online customers do not return to make subsequent purchases. Management wants to increase customer loyalty and believes that improved customer satisfaction will play a major role in achieving this goal. To investigate this problem, you have identi?ed the following problem statement, objective, and research questions: Problem: Many online customers do not return to make subsequent purchases. Objective: To increase customer loyalty and thereby generate more revenue. Research question: ‘How can the satisfaction of company X’s online customers be improved in order to increase customer loyalty?’ Sub-Questions: 1. ‘What is the relationship between customer loyalty and customer satisfaction?’ 2. ‘How satis?ed and loyal are company X’s online customers currently?’ 3. ‘What factors affect the satisfaction and loyalty of company X’s online customers?’ As the concepts of “loyalty” and “customer satisfaction” play a major role in the investigation and will later be measured, they are essential concepts to de?ne within the theoretical framework. Sample theoretical framework Below is a (simpli?ed) example of how you can describe and compare de?nitions and theories. In this example, we focus on the concept of ‘customer satisfaction.’ What your paper should sound like 2.1 Customer satisfaction Thomassen (2003, p. 69) de?nes customer satisfaction as “the perception of the customer as a result of consciously or unconsciously comparing their experiences with their expectations.” Kotler & Keller (2008, p. 80) build on this de?nition, stating that customer satisfaction is determined by “the degree to which someone is happy or disappointed with the observed performance of a product in relation to his or her expectations.” Performance that is below expectations leads to a dissatis?ed customer, while performance that satis?es expectations produces satis?ed customers. Expectations being exceeded leads to a “very satis?ed or even pleasantly surprised customer” (Kotler & Keller, 2003, p. 80). The de?nition of Zeithaml and Bitner (2003, p. 86) is slightly different from that of Thomassen: “Satisfaction is the consumer ful?llment response. It is a judgement that a product or service feature, or the product of service itself, provides a pleasurable level of consumption-related ful?llment.” Zeithaml and Bitner’s emphasis is thus on obtaining a certain satisfaction in relation to purchasing. Thomassen’s de?nition is the most relevant to the aims of this study, given the emphasis it places on unconscious perception. Although Zeithaml and Bitner, like Thomassen, say that customer satisfaction is a reaction to the experience gained, there is no distinction between conscious and unconscious comparisons in their de?nition. Company X claims in its mission statement that it wants to sell not only a product, but also a feeling; as a result, unconscious comparison will play an important role in the satisfaction of its customers. Thomassen’s de?nition is therefore more relevant to the current study. Thomassen’s Customer Satisfaction Model According to Thomassen, both the so-called value proposition and other in?uences have an impact on ?nal customer satisfaction. In his satisfaction model (Fig. 1), Thomassen shows that word-of-mouth, personal needs, past experiences, and marketing and public relations determine customers’ needs and expectations. These factors are compared to their experiences, and this comparison between expectations and experiences determines a customer’s satisfaction level. Thomassen’s model is important for this study: it allows us to determine both the extent to which company X’s customers are satis?ed and where improvements can be made. Models are helpful but not required Fig. 1: Customer satisfaction creation (Thomassen, 2007, p.30). Rubric for Theoretical Framework Overview Alignment Connection to Literature: No Present Emerging Approaches Expectations Meets Expectations Exceeds Expectations 0 points 20 points 25 points 30 points 34 points Attempts to introduce the theoretical framework. Somewhat Introduces the theoretical framework. Introduces the theoretical framework. Thoroughly Introduces the theoretical framework. 20 points 25 points 30 points 33 points Attempts to discuss how the framework supports the mock dissertation topic. Somewhat discusses how the framework supports the mock dissertation topic. Discusses how the framework supports the mock dissertation topic. Thoroughly discusses how the framework supports the mock dissertation topic. 20 points 25 points 30 points 33 points Attempts to provides a theoretical context for developing the proposed literature review. Somewhat provides a theoretical context for developing the proposed literature review. Provides a theoretical context for developing the proposed literature review. Thoroughly provides a theoretical context for developing the proposed literature review. 0 points 0 points Chapter 2 Review of the Literature Introduction • Topic – subject or subject matter of a study – e.g., “faculty teaching,” “organizational creativity,” “psychological stress” • Conduct literature review about the topic – Worth studying? – Scope? – Can be studied Creswell, Research Design 5e SAGE Publishing, 2018 3 The Research Topic • Gain insight into the topic by – Drafting a working title • “My study is about…” – Posing a brief question • What needs to be answered? Creswell, Research Design 5e SAGE Publishing, 2018 4 The Research Topic • First step is to examine research on the topic • How does this project contribute to the literature? • New topic, new elements, replication with new participants? Creswell, Research Design 5e SAGE Publishing, 2018 5 The Research Topic • The topic can be researched if – You have access to participants – You have resources to collect and analyze information • The topic should be researched if – The research will add to the literature about the topic – Scholars will be interested in the topic – A study of it will advance your personal goals Creswell, Research Design 5e SAGE Publishing, 2018 6 The Literature Review • Shares the results of other studies • Relates the study to the larger dialogue in the literature • Provides a framework for establishing the importance of the study • Provides a benchmark for comparing the results to other findings Creswell, Research Design 5e SAGE Publishing, 2018 7 The Literature Review The use of the literature: • Seek opinion of adviser or faculty members • Tell the reader you are aware of literature • Literature reviews take several forms: – Integrate what others have done and said – Criticize previous scholarly works – Bridge between related topics – Identify the central issues in the field Creswell, Research Design 5e SAGE Publishing, 2018 8 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 9 The Literature Review The use of the literature: • In quantitative studies, researchers use literature to: – Provide direction to the research questions and hypotheses – Introduce a problem – Introduce and describe the theory that will be used – Examine the usefulness of the theory – Compare results with existing literature or predictions Creswell, Research Design 5e SAGE Publishing, 2018 10 The Literature Review The use of the literature: • In mixed methods studies, researchers use the literature: – In either a quantitative or qualitative approach – In each phase, consistent with either the quantitative or qualitative approach – Relative to the intended audience Creswell, Research Design 5e SAGE Publishing, 2018 11 The Literature Review Steps in conducting a literature review: • Identify key words • Search databases • Identify about 50 research reports in articles or books • Collect those that are central to your topic • Design a literature map • Draft summaries of relevant articles • Write a literature review, organizing it by important concepts Creswell, Research Design 5e SAGE Publishing, 2018 12 The Literature Review Searching computerized databases: • Computerized databases of the literature are available the Internet • Databases provide access to journal articles, conference papers and dissertations on a wealth of topics Creswell, Research Design 5e SAGE Publishing, 2018 13 The Literature Review Searching computerized databases: • Some of these online databases include: - ERIC - ProQuest - Sociological Abstracts - PsycINFO - Science Direct - Google scholar Creswell, Research Design 5e SAGE Publishing, 2018 - EBSCO - PubMed - SSCI 14 The Literature Review Searching computerized databases: • Use both free databases and those available in your academic library • Search several databases, even those outside your field • Use guides to terms to locate articles • Locate articles close to your topic and use their terms in your search • Use databases that provide access to full text Creswell, Research Design 5e SAGE Publishing, 2018 15 The Literature Review A priority for selecting literature material: • Start with broad syntheses (such as encyclopedias) if you are new to the topic • Turn to journal articles in national journals – Best source for research reports • Next, consider books • Then examine conference papers • Scan for dissertations • Lastly, consider reports on the web Creswell, Research Design 5e SAGE Publishing, 2018 16 The Literature Review A literature map of the research • A literature map is a visual summary of existing research on a topic • The structure of the literature map may be: – Hierarchical pattern – Flowchart layout – Series of circles • Write a narrative description Creswell, Research Design 5e SAGE Publishing, 2018 17 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 18 The Literature Review Abstracting studies: • Abstracts summarize major elements of the article • For research studies: – Mention the problem – State the central purpose – State information about the population and sample – Review key results – Point out methodological flaws (if a critique or methods review) Creswell, Research Design 5e SAGE Publishing, 2018 19 The Literature Review Abstracting studies: • For nonempirical studies (essays, opinions, etc.) – Mention the problem – Identify the central theme – State the major conclusions – Mention flaws in reasoning or logic (if a methodological review) Creswell, Research Design 5e SAGE Publishing, 2018 20 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 21 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 22 The Literature Review Style manuals: • Style manuals provide guidelines for producing scholarly work and include directions on: – Citing references in-text – End-of-text references – Creating headings – Footnotes (not used in all style manuals) – Presenting tables and figures • Reminder: Consistently use the chosen style manual Creswell, Research Design 5e SAGE Publishing, 2018 23 The Literature Review Definition of terms • Identify and define terms that readers need to understand a proposal • Define terms introduced in all sections of the research plan: – Title of the study – Problem statement – Purpose statement – Research questions, hypotheses, or objectives – Literature review – Theory base of the study – Methods section Creswell, Research Design 5e SAGE Publishing, 2018 24 The Literature Review Definition of terms • Qualitative studies – Inductive and evolutionary in nature – The definition of terms may appear later in the written report, perhaps in the data analysis • Quantitative studies – Deductive with a fixed set of objectives – All relevant terms are comprehensively defined earlier in the study Creswell, Research Design 5e SAGE Publishing, 2018 25 The Literature Review Definition of terms • Mixed methods studies – Follows the use of quantitative or qualitative approach – Clarify terms related to mixed methods Creswell, Research Design 5e SAGE Publishing, 2018 26 The Literature Review Definition of terms • Define terms when they first appear in the manuscript • Use specific operational definitions • Do not define terms using everyday language, be guided by the literature • Define terms so that they accomplish different goals • One may use a definition of terms section in the manuscript Creswell, Research Design 5e SAGE Publishing, 2018 27 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 28 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 29 The Literature Review Creswell, Research Design 5e SAGE Publishing, 2018 30 The Literature Review A quantitative or mixed methods literature review: • Introduce the review with a statement about the organization of the sections • Review literature about the independent variables • Review literature about the dependent variables • Review literature that relates the independent variables to the dependent variables Creswell, Research Design 5e SAGE Publishing, 2018 31 The Literature Review A quantitative or mixed methods literature review: • Provide a summary – Highlight important studies – Capture major themes – Suggest why more research is needed – Advance how the proposed study will fill this need Creswell, Research Design 5e SAGE Publishing, 2018 32 Summary • Identify your topic through a brief title or central research question • Use the literature to – Present similar studies – Relate the study to the literature – Provide a framework for comparison • Different purpose depending on approach • Search databases using key terms Creswell, Research Design 5e SAGE Publishing, 2018 33 DSRT 837 – B03 PROFESSIONAL WRITING & PROPOSAL DEVELOPMENT WEEK 7 AGENDA FOR CLASS • COMPONENTS OF A LITERATURE REVIEW • THEORETICAL FRAMEWORKS • LITERATURE REVIEW FUNNEL WEEK 7 OVERVIEW OBJECTIVES THIS WEEK, WE WILL REVIEW THE COMPONENTS OF CHAPTER TWO OF THE DISSERTATION. WE WILL ANALYZE THE STRUCTURES OF LITERATURE REVIEWS AND DISCUSS THE LITERATURE REVIEW FUNNEL PROCESS. ? ANALYZE THE ORGANIZATIONAL STRUCTURES OF LITERATURE REVIEWS. ? LOGICALLY ORGANIZE THE TOPICS NEEDED FOR YOUR MOCK DISSERTATION LITERATURE REVIEW ? DEVELOP A THEORETICAL FRAMEWORK THAT SUPPORTS YOUR CHOSEN METHODOLOGY FROM WEEK 5 AND THE LITERATURE FROM THIS WEEK. DISSERTATION CHAPTERS • CHAPTER ONE: INTRODUCTION • CHAPTER TWO: REVIEW OF LITERATURE • CHAPTER THREE: PROCEDURES AND METHODOLOGY • CHAPTER FOUR: RESEARCH FINDINGS • CHAPTER FIVE: SUMMARY, DISCUSSION AND IMPLICATIONS CONTENTS OF CHAPTER TWO • INTRODUCTION• TOPIC OVERVIEW/DEFINITION, LITERATURE BEING INVESTIGATED (PEER-REVIEWED RESEARCH STUDIES, DISSERTATIONS, ETC.) EXCLUSIONS, OVERVIEW OF STATEMENT OF GENERAL FINDINGS, COMMENT ON AVAILABILITY OF SOURCES RELATED TO YOUR TOPIC • THEORETICAL FRAMEWORK • BODY • SUMMARY THE RESEARCH TOPIC • FIRST STEP IS TO EXAMINE RESEARCH ON THE TOPIC • HOW DOES THIS PROJECT CONTRIBUTE TO THE LITERATURE? • NEW TOPIC, NEW ELEMENTS, REPLICATION WITH NEW PARTICIPANTS? Creswell, Research Design 5e SAGE Publishing, 2018 THE LITERATURE REVIEW • SHARES THE RESULTS OF OTHER STUDIES • RELATES THE STUDY TO THE LARGER DIALOGUE IN THE LITERATURE • PROVIDES A FRAMEWORK FOR ESTABLISHING THE IMPORTANCE OF THE STUDY • PROVIDES A BENCHMARK FOR COMPARING THE RESULTS TO OTHER FINDINGS Creswell, Research Design 5e SAGE Publishing, 2018 Literature Review Purpose • DETERMINE THE CURRENT STATE OF KNOWLEDGE • ESTABLISHES CREDIBILITY • ALLOWS THE WRITER TO SET HIS OR HER OWN WORK IN THE CONTEXT OF OTHERS • ESTABLISHES THE THEORETICAL ORIENTATION OF WHAT WILL FOLLOW THE LITERATURE REVIEW RESEARCHERS USE LITERATURE TO: – PROVIDE DIRECTION TO THE RESEARCH QUESTIONS AND HYPOTHESES – INTRODUCE A PROBLEM – INTRODUCE AND DESCRIBE THE THEORY THAT WILL BE USED – EXAMINE THE USEFULNESS OF THE THEORY – COMPARE RESULTS WITH EXISTING LITERATURE OR PREDICTIONS Creswell, Research Design 5e SAGE Publishing, 2018 STEPS IN CONDUCTING A LITERATURE REVIEW • IDENTIFY KEY WORDS • SEARCH DATABASES • IDENTIFY ABOUT 50 RESEARCH REPORTS IN ARTICLES OR BOOKS • COLLECT THOSE THAT ARE CENTRAL TO YOUR TOPIC • DESIGN A LITERATURE MAP OR LITERATURE BINDER • DRAFT SUMMARIES OF RELEVANT ARTICLES • WRITE A LITERATURE REVIEW, ORGANIZING IT BY IMPORTANT CONCEPTS Creswell, Research Design 5e SAGE Publishing, 2018 LITERATURE REVIEW BINDER TABLE OF CONTENTS: - INTRODUCTION/ PROBLEM & PURPOSE• HOW MANY GIFTED STUDENTS ARE WE TALKING ABOUT? - AT A GLANCE JOLLY & MATTHEWS, 2012: 5 MILLION - WRITING - RESOURCES MILLIGAN, NEAL, & SINGLETON, 2012: 4.9 – 5 MILLION IN US - BODY/METHODOLOGY - AT A GLANCE - WRITING - RESOURCES ROSS & CROSS, 2014: 5 MILLION NEED LIKE-MINDED PEERS • ARE GIFTED LEARNERS HAVING THEIR NEEDS MET? - CONCLUSION/RESULTS & IMPLICATIONS - AT A GLANCE - WRITING - RESOURCES HUSBAND & HUNT: 2015: ACCOUNTABILITY IN THE CLASSROOM SEEMS MORE IMPORTANT NOW THAT MEETING THE NEEDS OF EACH INDIVIDUAL STUDENT. ESPECIALLY IF THE STUDENT IS ALREADY SCORING THE BENCHMARK SCORE ON ACHIEVEMENT TESTS. NO CHILD LEFT BEHIND TAKES AWAY INDIVIDUAL STUDENT FOCUS. - REFERENCE LIST - TOSSED ARTICLES DEE, JACOB, HOXBY, & LADD, 2010: NCLB FOCUSES ONLY ON IMPROVING LOW TEST SCORES LITERATURE REVIEW STRUCTURE • VARIOUS APPROACHES TO ORGANIZING THE BODY OF A LITERATURE REVIEW: • CHRONOLOGICAL – TRACE THE DEVELOPMENT OF THE TOPIC OVER TIME • THEMATIC – RECURRING CENTRAL THEMES ORGANIZED INTO SUBSECTIONS THAT ADDRESS DIFFERENT ASPECTS OF THE TOPIC • METHODOLOGICAL – COMPARE THE RESULTS AND CONCLUSIONS THAT EMERGE FROM DIFFERENT RESEARCH METHODS • THEORETICAL – OFTEN THE FOUNDATION FOR A THEORETICAL FRAMEWORK; DISCUSS VARIOUS THEORIES, MODELS, AND DEFINITIONS OF KEY CONCEPTS. • RESEARCHER MAY COMBINE SEVERAL OF THESE STRATEGIES (EX: OVERALL STRUCTURE MIGHT BE THEMATIC, BUT EACH THEME IS DISCUSSED CHRONOLOGICALLY). • SHOULD FOLLOW SAME STRUCTURE AS A GENERAL PARAGRAPH (TOPIC SENTENCE, DETAILS, SUMMARY) • SHOULD FLOW FROM BEGINNING TO END…USE TRANSITION WORDS LITERATURE REVIEW PITFALLS • POORLY DEFINED TOPIC: TOO BROAD OR TOO NARROW • UNAWARE OF MAJOR RESEARCHERS ON A TOPIC • INCLUDE OUTDATED RESEARCH • FAIL TO INCLUDE RESEARCH THAT DIFFERS FROM THEIR POINT OF VIEW • SUMMARIZE ARTICLES RATHER THAN INTEGRATING THE FINDINGS (ORGANIZED BY TOPICS AND FEW OR NOT CONNECTIONS MADE BETWEEN ARTICLES. REVIEW OF LITERATURE • WHEN WRITING A LITERATURE REVIEW, THE GOAL OF THE RESEARCHER IS TO DETERMINE THE CURRENT STATE OF KNOWLEDGE ABOUT A PARTICULAR TOPIC BY ASKING, ”WHAT DO WE KNOW OR NOT KNOW ABOUT THIS ISSUE?” • IMPERATIVE TO EXAMINE SEVERAL DIFFERENT SOURCES TO DETERMINE WHERE THE KNOWLEDGE OVERLAPS AND WHERE THE GAPS ARE • REQUIRES A SYNTHESIS OF DIFFERENT SUBTOPICS TO COME TO A GREATER UNDERSTANDING OF THE STATE OF KNOWLEDGE ON A LARGER ISSUE • BASED ON RESEARCH STUDIES, AND SHOULD NOT CONTAIN RESEARCHER’S OPINIONS LITERATURE REVIEW • NOT A SUMMARY • THE INDIVIDUAL ARGUMENTS MUST BE PUT TOGETHER TO REVEAL THE WHOLE STATE OF KNOWLEDGE • SHOULD BE ORGANIZED IN PARAGRAPHS BY SUBTOPICS DISCUSSED ABOUT THE LARGER TOPIC AND SHOULD FLOW…LITERATURE REVIEW FUNNEL ASSISTS IN DEVELOPING LITERATURE REVIEW CHAPTER • EXAMPLE: ONE SECTION OF A LIT REVIEW MIGHT READ “RESEARCHER A SUGGESTS THAT X IS TRUE. RESEARCHER B ALSO ARGUES THAT X IS TRUE, BUT POINTS OUT THE EFFECTS OF X MAY BE DIFFERENT FROM THOSE SUGGESTED BY RESEARCHER A.” • ORGANIZATION IS CRITICAL TO KEEP YOUR RESEARCH ORGANIZED TO MAKE THE WRITING PROCESS SIMPLER. ONE STRATEGY IS A LITERATURE REVIEW BINDER. LITERATURE REVIEW FUNNEL • TOOL FOR DISCOVERING THE BROADER AUDIENCE AND IMPACT FOR YOUR RESEARCH PROJECT • A WAY TO VISUALIZE YOUR INTRODUCTION AND LITERATURE REVIEW BY CONSIDERING THE BROADER LITERATURES FROM WHICH YOU ARE NARROWING YOUR SPECIFIC RESEARCH QUESTION LITERATURE REVIEW FUNNEL SAMPLE RESEARCH FUNNEL • RESEARCH QUESTION: WHAT IMPACT HAS KENTUCKY EDUCATION REFORM HAD ON POTENTIAL TEACHER BURNOUT? • BACKGROUND OR DISTANTLY RELATED WORK: EARLY AGES • • • • 1957-1958 FRUSTRATION WITH US DEPARTMENT OF EDUCATION WHICH LED TO MORE MATH AND SCIENCE • 1960-1965 JOHNSON REFORM (INCLUSION) • 1980’S REGAN’S “A NATION AT RISK” WHICH BEGAN ACCOUNTABILITY • EARLY 2000’S NO CHILD LEFT BEHIND (ASSESSMENT) • 2010+ RACE TO THE TOP NARROW CATEGORIES THAT ARE CLOSER TO THE WORK YOU ARE DOING: MODERN DAYS • HOW DID THIS CHANGE EDUCATION IN KENTUCKY? • WHAT WAS ITS IMPACT ON KY TEACHERS AND PROFESSION? • DID THIS CHANGE HOW WE TAUGHT? SPECIFIC CATEGORIES: RECENT DAYS • KPREP – HIGH STAKES TESTING • TPGES – KENTUCKY EVALUATION SYSTEM FOR TEACHERS MOST SPECIFIC AND SIMILAR STUDIES: BURNOUT • WHAT CAUSES JOB BURNOUT IN GENERAL? • WHAT CAUSES TEACHER BURNOUT? RESEARCH FUNNEL • RESEARCH QUESTION: WHAT IMPACT HAS KENTUCKY EDUCATION REFORM HAD ON POTENTIAL TEACHER BURNOUT? • THEORETICAL FRAMEWORK: ATTRITION THEORY; SOCIAL IDENTITY THEORY; PATH-GOAL THEORY; LEADER-MEMBER EXCHANGE THEORY RESEARCH FUNNEL • EARLY AGES (BACKGROUND OR DISTANTLY RELATED WORK) • 1957-1958 FRUSTRATION WITH US DEPARTMENT OF EDUCATION WHICH LED TO MORE MATH AND SCIENCE • 1960-1965 JOHNSON REFORM (INCLUSION) • 1980’S REGAN’S “A NATION AT RISK” WHICH BEGAN ACCOUNTABILITY • EARLY 2000’S NO CHILD LEFT BEHIND (ASSESSMENT) • 2010+ RACE TO THE TOP • MODERN DAYS (NARROW CATEGORIES THAT ARE CLOSER TO THE WORK YOU ARE DOING) • HOW DID THIS CHANGE EDUCATION IN KENTUCKY? • WHAT WAS ITS IMPACT ON KY TEACHERS AND PROFESSION • DID THIS CHANGE HOW WE TAUGHT? THE ROLE OF RESEARCH Research Question (What am I going to Study?) Theory (What existing ideas are there about my research problem?) Evidence: what data do I need to answer my question? Methods(How am I going to generate and analyze this data?) THEORY……. • GUIDES RESEARCH AND ORGANIZES IDEAS/FRAMES WHAT WE LOOK AT AND HOW WE THINK ABOUT IDEAS • PROVIDES A CONTEXT FOR PREDICTIONS/DIRECTS US TO IMPORTANT QUESTIONS • SUGGESTS WAYS TO MAKE SENSE OF OUR DATA • HELPS RESEARCHER SEE THE FOREST INSTEAD OF A SINGLE TREE • HAS THE CAPACITY TO GENERATE NEW RESEARCH The theoretical framework is the foundation from which all knowledge is constructed (metaphorically and literally) for a research study. The theoretical framework provides a grounding base, or an anchor, for the literature review, and most importantly, the methods and analysis. Lysagh (2011) THEORETICAL FRAMEWORK INCLUDES: • CONCEPTS • DEFINITIONS • REFERENCE TO RELEVANT SCHOLARLY LITERATURE • EXISTING THEORY • IT DEMONSTRATES AN UNDERSTANDING OF THEORIES AND CONCEPTS THAT ARE RELEVANT TO THE TOPIC OF YOUR RESEARCH • CONNECTS THE RESEARCHER TO EXISTING KNOWLEDGE THEORETICAL FRAMEWORK ASSIGNMENT • DEVELOP A 1 PAGE THEORETICAL FRAMEWORK FOR YOUR MOCK DISSERTATION TOPIC. • INCLUDE: • OVERVIEW: (PROBLEM STATEMENT, RESEARCH QUESTIONS, AND INTRODUCTION TO THEORETICAL FRAMEWORK) • HOW THE THEORETICAL FRAMEWORK SUPPORTS THE MOCK DISSERTATION TOPIC (DESCRIBE AND COMPARE DEFINITIONS AND THEORIES) • CONNECTION TO LITERATURE (PROVIDES A THEORETICAL CONTEXT FOR DEVELOPING THE PROPOSED LITERATURE REVIEW) PRACTICAL CONNECTION ASSIGNMENT • WRITTEN ASSIGNMENT WHERE YOU WILL DEMONSTRATE HOW THIS COURSE RESEARCH HAS CONNECTED AND CAN/COULD BE PUT INTO PRACTICE WITHIN YOUR OWN CAREER. • REFLECTION OF AT LEAST 500 WORDS (2 PAGES DOUBLE SPACED) • PERSONAL CONNECTION: DISCUSS HOW THE KNOWLEDGE, SKILLS, OR THEORIES OF THIS COURSE HAVE BEEN APPLIED, OR COULD BE APPLIED, IN A PRACTICAL MANNER TO YOUR CURRENT WORK ENVIRONMENT. IF YOU ARE NOT EMPLOYED, DEMONSTRATE A CONNECTION TO YOUR DESIRED WORK ENVIRONMENT. • DUE TUESDAY, AUGUST 17 BY 8PM EXTRA CREDIT OPPORTUNITY • TIME TO SHOW OFF YOUR HARD WORK! • USE THE UNIVERSITY OF CUMBERLANDS’ DISSERTATION TEMPLATE TO COPY OVER YOUR CHAPTERS ONE AND THREE AND YOUR CHAPTER TWO THEORETICAL FRAMEWORK. • POST YOUR COMPLETED PAPER TO THE 8.2 DISCUSSION BOARD • A REPLY TO A PEER IS NOT NECESSARY TO EARN THE EXTRA CREDIT BUT YOU ARE WELCOME TO REPLY TO OTHERS • WORTH: 10 BONUS POINTS • DUE: TUESDAY, AUGUST 17TH BY 8PM WEEK 7 ASSIGNMENTS ? DUE SUNDAY BY 9:00 PM: 1. THEORETICAL FRAMEWORK PAPER 2. LITERATURE REVIEW FUNNEL Cyber Security in Healthcare Research topic: Enhancing Cyber Security in Healthcare -With the Help of Machine Learning Research question: How can machine learning help to improve and protect cybersecurity in learning? Cybersecurity in health care involves protecting medical information, technologies, and new medical processes by introducing programs, data, and devices from unauthorized access. Over the years, technology has improved, which has significantly impacted many national sectors. For instance, in healthcare, cybersecurity has played an essential role in its improvement; not only has it helped the organization protect its patient safety and security, but it has also ensured that it is effective and quality health care to every patient. Health care organizations are more vulnerable and are significantly targeted by cyber-attack because they have expensive information and high intelligence value. Health care organizations have essential information such as patients' protected health care information, personal identification information, for example, intellectual properties, social security number, and financial information like credit card and bank accounts' numbers; this are data that are highly targeted by the cyber attacker (Tschider el at 2017). Hacking health care records causes high risks to patients' privacy, safety, and care delivery. For these reasons, health care organizations need to develop machine learning that will improve and provide cybersecurity. Machines' learning means giving computers the ability to access security threats in your organization and focus on valuable and strategic tasks. Medical organizations can enhance cybersecurity in health care with the help of machine learning in the following ways. First, machine learning has algorithms that detect hackers faster through agency networks and stops attacks; this protects health care organizations from cyber-attack and hacking of important information. Secondly, machine learning help health analyst to detect seizures, analyze networks protection of endpoints and protect vulnerable information from being assessed. Machine learning systems filter data and go through human analyst and gives alert in case of attacks. Additionally, machine learning detects repetitive tasks; this ensures that the staff focuses on more crucial work and focuses on high-value decision-making activities. Machine learning can protect many health organizations from cyber-attacking actions. Reference Tschider, C. A. (2017). Enhancing cybersecurity for the digital health marketplace. Annals Health L., 26, 1. Research Methodology 1 Chapter III: Research Methodology 2 Chapter III: Research Methodology Introduction As technology advances in different sectors, data breaches have been increased in various organizations carried out by hackers who need customers' personally identifiable information. The healthcare sector seems to be a key target because it keeps this kind of data for its customers, which raises concerns about firm protection. Therefore, safeguarding these data or information requires crucial anti-cybercrime developments in the patients’ health sector. Artificial Intelligence (AI) is one of the developments that can establish bits of help improving and insurance of network safety in healthcare. Network safety in medical services includes securing clinical data, advancements in the medical sector, and new clinical cycles by presenting projects, information, and gadgets to unapproved access. Innovation has improved, which has affected numerous public areas. For example, in medical care, online protection has assumed a fundamental part in its improvement. Not only has it assisted the association with securing its patients' wellbeing and security, but it has likewise guaranteed that it is viable and quality medical care for each patient. The purpose behind this paper is to provide information on how the health sector can shield itself from information penetration as per the Identity theft resource center in 2019. The methods that can uncover data and worker mindfulness will assist the health sector with protection from being assaulted by different sources. Research Paradigm The study on the cause of data breaches in the health sector and its implications used a quantitative research paradigm. Quantitative research has various goals: establishing ontology, phenomenology, logic, and epistemology of the examined variables. Its application has a range of important information from other research since logical, ontological, and further research will 3 help to solve the research problem. Quantitative analysis is of great importance. The study is centered around evaluating the dynamics of cybersecurity capability development in healthcare and how internal organizational dynamics influence the vulnerability of patients' information (Bryman & Bell, 2015). The boundaries utilized in estimation are the solitary factors that change. Each occurrence expresses an assorted quantitative example question that needs to be resolved by using an alternate border. The responses to the quantitative review questions characterize the exploration purposes and evaluate the different subjects of investigation. Research Design To effectively resolve a research problem, reliable and sufficient data is required, both qualitative and quantitative data, to determine the root cause of data breaching in the health sector (Alawneh, 2008). Close-ended inquiries will help control the study by navigating different areas while the discrete response from these areas is used to allocate value. Also, it simplifies the comparison of the reactions from various individuals, which, in turn, enables analysis of the survey’s findings. The majority of analytical responses from the responses will be recorded when attempting to clarify their understanding of a penetrate and how information lost can be characterized into purposeful dangers and coincidental dangers. Additionally, the closed-ended questions will be designed so that a participant can take two to three minutes to complete them. Data collection and Sampling Procedures The closed-ended questions are considered in the data collection process, which will provide a hint of the actual situations for workers who are currently working in the health sector. They are easy to read and mark an assent structure clarifying the reason for the exploration and were given the alternative to skipping an inquiry if they feel awkward responding to a question. Thus, the specific respondents are easy to compare and code for further statistical analysis. 4 Enlisting will be through promotions from web-based media and from known contacts whose training and identified work experience with the examination that was being led. Their reactions will be inclined to in two segments; quantitative and subjective. While investigating the personal information from the poll, we directed a topical examination to more readily dissect the members' reactions to the closed-ended inquiries (Namey et al.,2012). For the most part, the analyst will be targeting a large population and its specific pattern or a comparable thought that can help lay out the examination. It will foster some codes to recognize equivalent subjects and standards. Then, at that point, they began to assemble an underlying rundown or perspective on these codes to distinguish the examples wherein the members discussed insider dangers and information breaks. The selection of words and searching for electives will determine various perspectives/experiences on information penetration. Statistical Tests Summary T-test and Z-test are the preferable statistical test when dealing with quantitative data in the research. Therefore, we will foster both paired and unpaired t- and z-tests. For instance, most of the closed-ended questions consist of yes or no answers; hence it will be easier to determine the relationship between dynamics of cybercrime activities in healthcare through the two sets of data. Additionally, the tests will establish statistical evidence of a relationship between machine learning and data protection in healthcare. While using these tests, there is a need to develop the significance level that will reject the null hypothesis. In this case, the tests will be undertaken under a 5% significance level, and the data be presented in tables and a statistical test matrix. They will establish the level of probability in which healthcare data security and machine learning correlate with health records breached and affected by the data breach. Hence, the emergent results will be noted and coded as part of the process while the coding process and 5 analysis be primarily conducted manually. However, the study can use SPSS qualitative research software for data storage and assistance in identifying emergent themes. 6 References Alawneh, M., & Abbadi, I. M. (2008, August). Preventing information leakage between collaborating organizations. In Proceedings of the 10th International Conference on Electronic Commerce (pp. 1-10). Bell, E., & Bryman, A. (2015). Business research methods. 4. uud. p. Identity theft resource center (2019). https://www.idtheftcenter.org/ data-breaches/ Guest, G., MacQueen, K. M., & Namey, E. E. (2012). Introduction to applied thematic analysis. Applied thematic analysis, 3(20), 1-21.