You are on page 1of 3

1. What policy and procedure must be used as a guide when undertaking research for CBSA?

The policy and procedure is designed to detail out the Complete Business Solution
Australia’s (CBSA) commitment to research integrity and ethics, both internal and external,
and the responsibilities of researchers in practicing research, and procedures of how research
should be undertaken.

2. What are the key features of accessing digital information using CBSA systems including:
 What policy and procedures are used to manage access to CBSA’s systems?
1. Keep Track of Employees
If a business has multiple shifts with large groups of employees coming and going at odd
hours, an Access Control System can help organize the chaos and inform you if an
employee is in the building when they shouldn’t be. It can also help you keep track of
who has shown up for work and who hasn’t.
2. Secure Sensitive Documents and Data
Many businesses have documents or data that should not be accessible to everyone in the
company. An access control system allows a business to limit the access to certain areas
that hold hardware or software that this information is saved on.
 How is access granted to CBSA’s systems?
1. The Tag – Each user has a Tag which will be authorised on certain doors at specific times by
the system administrator,
2. The Reader – Is on the controlled side of the door (both sides if control is in and out). The
Tag is presented in the proximity of the reader and, if authorised at that time on that door,
the door lock will be opened.
3. The Controller – This is the core of the system, it stores all the authorisation information,
which it receives from a PC. When it receives a Tag ID from a reader, it releases a door
lock if that Tag is authorised at that door.
4. The Lock – This can be any electro-mechanical locking device, fail safe or fail secure.

3. What are the key features of storing and transmission of CBSA work files including:
 What policy and procedures are used to manage document development and storage?
- Document Management Policy & Procedures defines Complete Business Solutions
Australia’s (CBSA) approach to the development, review, naming and version control
of all documents including tools, forms, resources, policies and procedures
 Where are work files stored and transmitted from?
- Electronic file storage
The cloud-based storage system has folders set up for each area ofthe business. Files
must be saved in the folder most appropriate toits area of business.
 How are documents version controlled?
- Version control is the process by which different drafts and versions of a document or
record are managed. It is a tool which tracks a series of draft documents, culminating
in a final version.
 How are documents archived?
- Document archiving is the process by which paper documents are securely stored for
long periods of time in any data medium (hard drive, DVDs, cloud, etc). 
4. List three legal and ethical obligations of undertaking research for CBSA.
 Researches must ensure that the research is undertaken safely and to minimize any
associated risks.
 Researches must show respect to any research participant and to research sources.
 Researches must disclose any conflict of interest that could threaten the research.

5. Describe the principles of reliability and validity in relation to research, and why it is
important that research is both reliable and valid.
Reliability and validity are two most important and fundamental features that should be in the
evaluation of any measurement instrument or tool for a good research.
Reliability is about how consistently a method measure something in the research. The result
of the measurement can be reliable without being valid. However, if the result of
measurement is valid, it is usually also called reliable.
Validity is about how accurately a method measures what it is intended to be measure. For
example, if the research has a high validity means that produces result that correspond to real
properties, characteristics, and variation in the physical or social world. One of the indicator
is high validity that show a measurement is valid. Otherwise, if a method is not reliable, it
probably isn’t valid. If the research show valid means that the instrument can be used to
measure what should be measured.

6. Briefly outline and explain one possible process for conducting a research project.
 Step 1 : Identify the problem
The researcher need to identify the problem within the community that become a problem
and concern.
 Step 2 : Review the literature
When the problem has been identified, the researcher must learn about the topic and the
literature must related to research problem. In step 2 provides foundational knowledge.
The review of literature also educates the researcher about what studies have been
conducted in the past, how these studies were conducted, and the conclusions about the
problem.
 Step 3 : Clarify the problem
After the literature has been reviewed it’s guides the researcher clarifies the problem and
narrows the scope of study.
 Step 4 : Clearly define terms and concepts
Terms and concepts are used in the purpose statement of the study or the description of
the study. The researcher must specifically define terms and concepts for the study to
minimize confusion.
 Step 5 : Define the population
The researcher must define who the population of this research it can be focus on a
specific group of people, facilities, park development, employee or etc.
 Step 6 : Develop the instrument plan
The instrument plan like a road map, specifying who will participate in the study, how,
when, and where the data will be collected.
 Step 7 : Collect data
After the instrument plan completed, the actual study will be begin with the collection of
data. When collecting data it is important because it will provide the information needed
to answer the research question. Data can be collected with questionnaire, observation,
and literature.
 Step 8 : Analyse the data
The final step is analyse the data to answer the research question or problem. The result
of the analysis will be reviewed and summarized related to the research questions.

7. Describe what quantitative and qualitative primary data is, and give strategies (techniques) of
how each can be collected.
Quantitative data collection methods rely on random sampling and structured data collection
instruments that have been determined response categories. The results are easy to
summarize, compare, and generalize. Quantitative data is measureable and expressed in
numerical form.
The techniques of quantitative data collected include:
 Administering surveys with close-ended questions (face-to-face and telephone
interviews, mail questionnaires, etc).
 Experiments/clinical trials.
 Observing and recording well-defined events.
 Obtaining relevant data from management information systems.
Qualitative data collection methods looks at several factors to provide a depth of
understanding to raw data. The focus of qualitative methods is collection, analysis, and
management of data according to the thoughts and feelings of research participants, instead
of counting responses or recording numeric data.
The techniques of qualitative data collected include:
 In-depth interview
 Observation methods
 Documents review

8. What is meant by the terms ‘primary data’ and ‘secondary data’?


Primary data is a data that collected by the researcher from first-hand sources, using methods
like surveys, interviews, or experiments. And for secondary data is a data that have been
collected from studies, surveys, or experiments by other people for other research.

You might also like