Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Potential:

Discussion 1: Focus-Determining Potential Areas of Research

Throughout this program, you may have been thinking about areas of interest upon which you may like to focus for your doctoral study project. More clearly and narrowly defining potential areas of research is an essential step toward determining a problem statement, purpose statement, research question, and research objectives.

Use this Discussion to work together with your colleagues to further clarify and develop one another's potential research focus.

To prepare for this Discussion:

• Consider the following to help you define your areas of research interest:

o Information technology issues or problems in your organization that you would like to study more deeply because it stimulates your interest and passion

o IT issues you have observed in your practice, read about in the news or in a professional journal, or any issues you feel are of importance to the IT field, as a whole

o Issues that will challenge your knowledge and experience in the IT field

o Areas of research that might lead to social change and improvements in your professional practice

• Review the media programs:

o Purposes of Research

o Doctoral Research: Social Change

Post a 350- to 500-word analysis of three potential areas of research in your workplace or the information technology field that you are considering pursuing for your doctoral study.

Explain why these areas are important to your organization or to the IT field and how they may serve to further social change.

Identify who these issues are important to, and explain why. Also, analyze the ways in which these areas of interest may lend themselves to research-based solutions.

Be sure to support your postings and responses with specific references to the reading(s) and/or media segment(s) and use APA format.

Discussion 2: Hot Topics-Research Ethics in the Field of Information Technology

It is of paramount importance to pay particular attention to ethical considerations when engaging in research. Ensuring that research is conducted ethically protects the researcher, subjects, and, ultimately, society itself.

Whether your research involves the direct application of a technology solution to a target population or the surveying and measuring of a phenomenon, you must consider how your research and interactions over the course of your research impact others.

To prepare for this Discussion:

• Consider the ethical choices you might need to make to collect data and how ethics is related to your potential research in the IT field.

• Consider issues such as bias, confidentiality, reciprocity, consent, and other issues you may face as a researcher when collecting and recording data.

• Review Chapter 4, "Writing Strategies and Ethical Considerations" of the Creswell text.

By Day 3, post a 200- to 400-word analysis of ethical research challenges you might experience if you were to conduct research on one of the areas of research interest you identified in Week 1 Discussion and the organizational context in which you might conduct your research.

Explain how you might address these ethical challenges to ensure integrity in the research process. Include an analysis of the ethical values that underlie your decisions and the practical application of those values in your research process to ensure your research integrity.

Be sure to support your postings and responses with specific references to the reading(s) and/or media segment(s) and use APA format.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92369426
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Management Information System

Discussion question choose one of the two questions listed

Discussion Question: Choose one of the two questions listed below and respond in your main post, following the instructions below. Main posts should be at least 150 words and include at least one APA formatted source. Re ...

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

Since osi model is a virtual model based on your reading

Since OSI model is a virtual model; based on your reading this week, why do you think the data communication industry would use the layered OSI reference model? What does modeling mean to you? How would you model somethi ...

Crime prevention through environmental design cpted is

Crime Prevention Through Environmental Design (CPTED) is defined as a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender ...

In the realm of it security policies should include a

In the realm of IT Security, policies should include a Physical Security Policy. Our dependence on computers has resulted in massive amounts of sensitive, and valuable information being physically and digitally stored. T ...

Question suppose that you enhance an architecture by

Question : Suppose that you enhance an architecture by replacing its floating-point divider with a new hardware divider on which division is 15 times faster. For your application code running on the original hardware, 2% ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

Many organizations have now adopted or begun to offer cloud

Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization. Select two (2) organizations in which you ar ...

Taskyour team task is to address two network security

Task: Your team task is to address two network security problems that this organization's network faces and use scholarly research to help document the findings. Preparing your paper: Your team makes up the nature of Sou ...

In the week 1 discussion you identified one 1 example of a

In the Week 1 discussion, you identified one (1) example of a business function or operation and the business rules associated with information you would want to store about a student at a university. You will build upon ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As