You are on page 1of 9

Asia Pacific University of Technology and Innovation

.

Module Name and Code: Research Methods for Computing and Technology (CT098-3.5-2-RMCT)
Intake Code: UC2F1303IT {NC}
Program Enrolled In: BSc. in Information Technology, with specialism in Network Computing
Title of the Final Year Project: Integrated Offline Text, Voice Communication & Secure File Sharing System
Words Count: 1775 words
Lecturer’s Name: MUEEN UDDIN
Done By: Shuaib Juma Mohamed - TP027814

.................................................................................................................. TABLE OF CONTENTS ..............2........ Table of Contents 1......................................7 6.....................................CT098-3. SOLUTION .............................6 4..................................................... 4 3..........1.............................................................. INTRODUCTION..............2...2................................. RESEARCH OBJECTIVES ............... Interviews............. PERSONAL REFLECTION ............................................................................... 6 6.......................................................1.. 3................ 9 ii .................................................................................................................................................................................................7 6............................................................................ RESEARCH QUESTIONS .............................. 8 8............................................................................................................................1................................................................................................................................. RESEARCH AIM .................5 RESEARCH AIMS & OBJECTIVES ....... 6 4.........................................................................................................5-2-RMCT Individual Assignment 1....................................................................................................... Surveys ........................................................... II 2..................................................................................................5 3.................................................................................................................. REFERENCE LIST ........................7 7............... PROBLEM STATEMENT AND LITERATURE REVIEW ................................................6 5........................................................................................ PROBLEM STATEMENT AND LITERATURE REVIEW ................................................................ 6 6......... 5 4..............................................1.............................................................................................................................................................1............................................. PRIMARY RESEARCH ......................... RESEARCH DESIGN ..............1...................................................................................................................................................................................................................

Voice Communication & Secure File Sharing System 3 .5-2-RMCT Individual Assignment Integrated Offline Text.CT098-3.

n.). Voice Communication & Secure File Sharing System will be based on the ClientServer architecture in a Local Area Network (LAN) thus does not require a connection to the Internet for it to work and makes it immune against cyber-attacks.d. Voice Communication & Secure File Sharing System is intended for employees’ usage within an organization to enhance communication ways between employees and secure the shared files among them. Instant Messaging or IM is one type of communications services that enables and allows two or more users to communicate via texts in real time between each other. Introduction Integrated Offline Text.CT098-3. The Integrated Offline Text. by using Voice-Over Internet Protocol [VoIP] (Wisegeek.d. the same message appears instantly to the intended user at the same time (Rapaport. As one of the users types a message. Voice Communication & Secure File Sharing System. voice Communication and secure encrypted file sharing between two or more users. 2001) Voice communication is another type of communication between two or more users which happens over the Internet.5-2-RMCT Individual Assignment 2. The Integrated Offline Text. 4 . n. VoIP turns analog audio signal (voice) into digital data which allows it to be transmitted over the Internet and to anywhere in the world (Roos & Valdes .). is basically an integrated offline software system of an instant Massaging.

CT098-3.). Thus in an active workplace. 5 . Employees communicate with each other within an organization through various methods such as Emails. employees’ communication is vital for the success of the organization. these methods are installed and used with no security implementation on the file sharing side and without the organizations oversight. Solution The Researcher is proposing an offline application system for employees’ communications within an organization. internal letters or memos. These methods are being deployed in organizations to enhance employees’ communications and productivity. Problem Statement and Literature Review 3. which leads to exposing organization data and network to theft and damage which makes the organization vulnerable for a security attack (Ean. The proposed application system can offer text and voice communications as well as the ability to secure files with Advanced Encryption Standard (AES) before sharing between employees within an organization. the organization tend to make employees communications a priority to achieve organization missions and goals as well as success (Boggess.1.5-2-RMCT Individual Assignment 3. Alongside. the vast majority of these methods used in the organizations requires a constant access to a high end Internet line which may cost a lot of money due to the total cost of product software or/and hardware with the total cost of maintenance (Ramey. Skype or OOVOO for voice and video conversations and file sharing to make employees communicate with each other instantly within a workplace and achieve organizational success. 2011). 2013). and it does not cope with the rapid changing trend of the organization (Beyond. Thus organizations started using other methods for employee communications like Yahoo Messenger. 2013). However. 3.d. Problem Statement and Literature Review In any organization. These current methods provide convenient but not truly reliable communication between employees.2. n.

 To secure files with Advanced Encryption Standard (AES) before sharing between employees within an organization. Research Questions  What are the impacts of using LAN Based Text & Voice Communication System within an Enterprise?  What are the Advantages of using AES Encryptions?  What are the different types of file encryptions methods? 6. Some of these methods are Interviews. The Primary Methods are any data collected by the researcher himself or herself such as interviews or observations.). Research Aims & Objectives 4. Research Aim This research proposal aims to develop an offline application system that is based on the Client-Server Architecture in a LAN which is able to send and receive instant messages.5-2-RMCT Individual Assignment 4. collecting and measuring information of interest that leads the researcher to answer their research questions.).2. n.1. They are divided into two categories. Research Objectives The Research objectives are:  To develop an offline application based on the Client-Server Architecture that can offer voice communication. 4. Self-Administered Surveys and Documents Review. n. Observation. the Primary Methods and the Secondary Methods. voice communication and securing files with Advanced Encryption Standard (AES) before sharing between employees within an organization. Data collecting and gathering methods are set of methodologies for gathering. 5.CT098-3. test their hypotheses or evaluate different outcomes related to the research (The Office Of Research Integrity (ORI).d. In this research proposal the data collecting and gathering methods will be carried as following: 6 . While the Secondary Methods are data which is already exists such as documents or previous research papers (University of Surrey. instant messaging and secure file sharing between enterprise employees.d. Research Design Research design descries in details all the data collecting and gathering methods that will be used by the researcher in order to carry and do the research phase of the proposal.

).1.d. For this research proposal the researcher will conduct ten face to face semi-structured interviews with employees from 3 different organizations which are Sapura Group. The survey will be send to the targeted individuals by Email asking them kindly to participate in the survey.d. Interviews A method of collecting data by asking the interviewee orally some set of questions through face to face or over the phone and record the answer given by the interviewee.). and casual interview (University of Surrey. Structure which means a formal interview. AirAsia and Digi Telecommunications to gather relevant information and background about the current methods for employees’ communications that are used in their organizations.1. it aims to collect the opinions of the survey participants (Cherry. Semi Structure which means moderate level of formality interview and Unstructured which is none formal.2. Some of the online survey questions that would be added are:  Are you an Academic or None Academic Staff?  State your job title in APU?  How do you communicate with other APU staff during the duty hours?  What are the disadvantages of using those communication methods within the organization? 7 . Some of the questions that would be asked on the participants are:  Would you please state the employees’ communication methods used by your organizations?  For what purposes the organization employees use these communication methods?  What are the disadvantages of using these communication methods within the organization?  What kind of data is sent. Surveys Surveys are another data collecting method used in gathering background information about a topic of interest. n. n.1.CT098-3.1. Primary Research 6. Interview are divided into 3 categories. They are commonly used to collect self-report data from groups of participants.5-2-RMCT Individual Assignment 6. The survey aims to gather relevant information and background data about the participants methods used for communications with other APU staffs within the University. For this research proposal the researcher will create an online survey containing several questions targeting a sample from the academic and non-academic staff of the Asia Pacific University (APU). received and shared within employees? 6.

However. it came to the researcher mind that doing the interview with some employees of Sapura Group. The researcher has no background knowledge of how to code a file encryption application. firstly understand how file encryption and decryption works. Nonetheless. he will face some difficulties working with sockets programming as it is part of the java Network Computing programming and considered as Advance programming which the researcher will have to do self-studies on that topic in order to be able to proceed with the project. Thirdly. The researcher will have to conduct the interview during the organizations business hours which will be difficult to manage as the researcher might have classes that will be missed in order to do the interview. although the researcher has a very good knowledge in Java programming and a basic knowledge of java Advance programming. with the help of the supervisor and the available resources in the APU Library the researcher is confident of his ability to proceed with this research and complete it in time. Secondly. As well as the researcher will have to communicate with the organizations formally and setup a research interview that suits the interviewees. AirAsia and Digi Telecommunications will be difficult and will take time. Personal Reflection After doing this research. and what method of file encryption that can be implemented within the project.CT098-3.5-2-RMCT Individual Assignment 7. 8 . Before doing the interview the researcher must understand who to target in each organization in order to get the best results and information. thus the researcher will have to refer to websites and APU Library books in order to be able to implement it within the project. the researcher realized that proceeding with this research to the second step which is for the Final Year Project (FYP) will be a bit difficult and hard due to some limitation and difficulties that faced the researcher while doing this research proposal. some of these limitations and difficulties that faced the researcher are.

2013. The Advantages And Disadvantages Of Technology In The Workplace. S.d. L. The Journal of the South East Asia Research centre for Communication and Humanities. Roos. R..com/what-is-voice-chat.howstuffworks.d. 15 tips for effective employee communication. K. [Online] Available at: http://libweb. L.1-12. [Online] Available at: http://www. [Online] Available at: http://www.htm [Accessed 26th October 2013].1-5. How VoIP Works. 2001. n. Ramey.dhhs.. University of Surrey.d. n. n. Transform Magazine..com/articles/how-to-encourage-communication-between-employees-12513-article.com/iptelephony. Cherry.html [Accessed 1st November 2013]. How to Encourage Communication Between Employees. n..com/Main/Articles/15_tips_for_effective_employee_communication_45031..ragan. Computer-Mediated Communication and Organizational Communication: The Use of New Communication Technology in the Workplace. Introduction to Research.surrey. [Online] Available at: http://www. Reference List Beyond. [Online] Available at: http://ori. & Valdes .about. pp.d. Wisegeek.ac. K. Instant Messaging For Corporate Collaboration.CT098-3.wisegeek. D.html [Accessed 22nd November 2013]. 9 .useoftechnology. What Is Voice Chat? [Online] Available at: http://www.d.htm [Accessed 26th October 2013]. What Is a Survey? [Online] Available at: http://psychology.uk/library/skills/Introduction%20to%20Research%20and%20Managing%20Information %20Leicester/page_21.gov/education/products/n_illinois_u/datamanagement/dctopic. Data collection. Rapaport. 3. Ean.com/technology-workplace-2/ [Accessed 15th November 2013].5-2-RMCT Individual Assignment 8. n. 2013. [Online] Available at: http://computer.htm [Accessed 22nd November 2013]. The Office Of Research Integrity (ORI).com/od/researchmethods/f/survey.beyond. Boggess. pp. n. 2011..d.aspx [Accessed 1st November 2013].htm [Accessed 22nd November 2013].