You are on page 1of 66

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 06: Managing a Successful Computing Project

Submission date 7/1/2022 Date Received 1st submission 8/1/2022

Re-submission Date Date Received 2nd submission

Student Name Dinh Huy Hoang Student ID GCH190440

Class GCH0804 Assessor name Do Tien Thanh

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.

Student’s signature Hoang

Grading grid

P1 P2 P3 P4 M1 M2 M3 D1 D2
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:


IV Signature:
Table of contents
1. Introduction............................................................................................................................................................................................. 5
1.1 Purpose of research........................................................................................................................................................................5
1.2 Scope of research........................................................................................................................................................................... 5
1.3 Plan of research.............................................................................................................................................................................. 6
2. Literature review......................................................................................................................................................................................6
2.1 Research methodologies................................................................................................................................................................ 6
2.2 Primary research.............................................................................................................................................................................6
2.2.1 Definition.............................................................................................................................................................................. 6
2.2.2 Methods............................................................................................................................................................................... 7
2.2.3 How primary research applied to the author’s research..................................................................................................... 8
2.3 Secondary research........................................................................................................................................................................ 9
2.3.1 Definition.............................................................................................................................................................................. 9
2.3.2 Methods............................................................................................................................................................................... 9
2.3.3 How secondary research applied to the author’s research................................................................................................10
2.3.4 Comparing secondary research and primary research...................................................................................................... 11
2.4 Qualitative research..................................................................................................................................................................... 12
2.4.1 Definition............................................................................................................................................................................12
2.4.2 Methods............................................................................................................................................................................. 12
2.4.3 How qualitative research applied to the author’s research...............................................................................................12
2.5 Quantitative research................................................................................................................................................................... 12
2.5.1 Definition............................................................................................................................................................................ 13
2.5.2 Methods............................................................................................................................................................................. 13
2.5.3 Comparing quantitative research and qualitative research.............................................................................................. 13
2.6 Secondary research in remote working....................................................................................................................................... 14
2.6.1 Remote working definition.................................................................................................................................................14
2.6.2 Impact of remote working..................................................................................................................................................15
2.6.3 Security problems............................................................................................................................................................... 18
2.6.4 Solutions to handle security problems............................................................................................................................... 20
2.7 Hypothesis.................................................................................................................................................................................... 22
3. Primary research....................................................................................................................................................................................22
3.1 Interviews..................................................................................................................................................................................... 22
3.1.1 Questions............................................................................................................................................................................23
3.1.2 Answers.............................................................................................................................................................................. 24
3.2 Surveys..........................................................................................................................................................................................29
3.2.1 Questions............................................................................................................................................................................29
3.3 Observations......................................................................................................................................................................... 42
4. Analyze...................................................................................................................................................................................................43
4.1 Analyse research findings and data..............................................................................................................................................43
4.2 Recommendation for improving the system or future research.................................................................................................. 51
5. Conclusion..............................................................................................................................................................................................54
6. Appendix................................................................................................................................................................................................ 54
7. Plan-appendix........................................................................................................................................................................................ 59
8. Ethical forms.......................................................................................................................................................................................... 60
9. Other materials...................................................................................................................................................................................... 64
10. References........................................................................................................................................................................................... 65

List of tables
Table 1 : Comparing differences of primary and secondary research (Surshi, 2017).............................................................................. 11

Table 2 : Quantitative research vs qualitative research (Streefkerk, 2021)............................................................................................. 14

Table 3 : Frequency and Percentage Distribution of the Respondents in terms of Benefits and Challenges of Working Remotely..... 17

1. Introduction
1.1 Purpose of research
With the improvement of technology in era 4.0, our quality life also improve more. Especially in covid pandemic, the leveraging
technology brought the conveniences to people that working remotely. Besides the new improvements and developments there are
still drawbacks in using technology and managing technology such as: lack of knowledge in technology, security problems, etc. From
this motivation, the author desires to research more solutions and techniques for improving the quality of remote working.

1.2 Scope of research


Actually, because of covid pandemic everything now is locked down. Therefore, the author could not go to companies which are
doing related works directly. Therefore, the scope of research would cover in social network. To demonstrate the research, the
author will make questionnaires with his friends who were working remotely to collect data and drawbacks during working. In
addition, the author also made survey to reach widely people and conducted observations for the idea of research.
1.3 Plan of research
In this research, to make it work in higher performance. Some steps will be listed as:

First step is to determine method to research. In there, the author determined to choose secondary research (will be explained
below) for the method to collect data. The author will review papers from 1st tier conference including related works to get more
directions in research. In addition, by watching videos on YouTube that shared related information to extend data then evaluate
them as well. Through it, the author will consolidate and supplement current information and circumstances compared to past or
future. Moreover, knowledge from YouTube will be a bit subjective, so the author will distill them in the best way.

After choosing secondary research as well and collected data from YouTube them evaluated them. The author wants to confirm data
validation by conducting interviews people who were working remotely, in addition the survey to collect widely data and leverage
them to understand more objects surrounding research.

Last but indispensable, during the research process the author would get directions, objectives from the tutor to go straight to target.

2. Literature review
2.1 Research methodologies
Research methodology simply refers to a topic that the researcher want to dive in deeper than learning to solve existed problems or
improve new methods. More specifically, it’s about how a researcher systematically designs a study to ensure valid and reliable
results that address the research aims and objectives. The value of research is either in contributing to the enrichment of human
knowledge or in contributing to the creation of material wealth for society (Jansen, 2020).

2.2 Primary research


2.2.1 Definition
According to (Driscoll, 2010), Information and data collected and searched directly, not through information and knowledge in books,
newspapers, or other researches are considered primary research. According to the original investigation developed in the 19th
century by John Stuart Mill, primary research often applies the principles of the scientific method. In particular, the purpose of
primary research is to evaluate and confirm statements and eliminate prejudices. Although the application of the scientific method
allows researchers to learn more about the world and observable phenomena. Using the scientific method, researchers develop
research questions or hypotheses and collect data on events, objects, or people that is measurable, observable, and replicable. The
ultimate goal in conducting primary research is to learn about something new that can be confirmed by others and to eliminate our
own biases in the process.

2.2.2 Methods

Interviews

(Driscoll, 2010) indicated that interviews, or question and answer sessions with one or more people, are an excellent way to learn in-
depth information from a person for your primary research project. This section presents information on how to conduct a
successful interview, including choosing the right person, ways of interviewing, recording your interview, interview locations, and
transcribing your interview.

Although the interview method to collect more information for research has been around for a long time, it still plays a very
important part today. Face-to-face interviews will help the questioner and the respondent understand each other better through
manners and attitudes, thereby asking accurate questions aimed at the topic they want to research.

Surveys

Follow (Driscoll, 2010), surveys and interviews both of them involve asking people questions. However, interviews and surveys are
quite different data collection methods. Creating a survey may seem easy at first, but developing a quality survey can be quite
challenging. When conducting a survey, you need to focus on the following areas: survey creation, survey testing, survey sampling,
and distributing your survey. In addition, surveys method is to use in social network and media to get information (indirectly), for
interviews it’s directly.

In my opinion, one of the key to create a successful survey is to keep survey form short and focused. Because participants are
unlikely to fill out a survey that is lengthy, and you’ll have a more difficult time during your analysis if your survey contains too many
questions and long sentences.

Observations

Regarding (Driscoll, 2010), observations are always essential for any researchers and related majors. In fact, they lead to some of the
most important scientific discoveries in human history. For example, Charles Darwin used observations of the animal and marine life
at the Galapagos Islands to help him formulate his theory of evolution that he describes in On the Origin of Species. Today, social
scientists, natural scientists, engineers, computer scientists, educational researchers, and many others use observations as a primary
research method.

Based on the research questions, therefore observations can be conducted on nearly any subject matter, and the kinds of
observations. Suppose that you might observe traffic or parking patterns on campus to get a sense of what improvements could be
made.

2.2.3 How primary research applied to the author’s research

In part 1.3 - Plan of research, the author mentioned at 2nd step after applying secondary research at first step, the author would
apply primary research for collecting data by making questionnaires. In order to understand what people thinking while working
remotely and their objective thinking, questionnaires got it. Besides, to identify specific needs from people surrounding, the author
will use primary research.
2.3 Secondary research

2.3.1 Definition

According to (Formplus, 2021), secondary research is a common approach to a systematic investigation in which the researcher
depends only on existing data during the research process. This research design involves organising, collating and analysing these
data samples for valid research conclusions.

In other words, secondary research is also known as desk research since it involves synthesising and collecting existing data that can
be sourced from the internet, peer-reviewed journals, textbooks... What the secondary researcher does is to study already
established patterns in previous researchers and apply this information to the specific research context.

2.3.2 Methods

Online data collection:

(Formplus, 2021) indicated that online data is data that is collected from the internet. Rencently, this method has become popular
because the internet provides a large pool of both free and paid research resources that can be easily accessed with the click of a
button. In addition, researchers could leverage the knowledge based on IT to crawl data from the internet for personal targets.

While this method simplifies the data gathering process, the researcher must take care to depend solely on authentic sites when
collecting information. In some way, the internet is a virtual aggregation for all other sources of secondary research data. However,
cleaning data is required when collecting on the internet because they are unstructured data, organising them again to use is the
pre-processing.
Data from Government and Non-government Archives:

Regarding (Formplus, 2021), research materials from government and non-government archives and these archives usually contain
verifiable information that provides useful insights on varying research contexts. Comparing to online data, this resource is more
reliable than online data because only verified data could be posted by the government, online data is not.

The challenge, however, is that such data is not always readily available due to a number of factors. For instance, some of these
materials are described as classified information, it would be difficult for researchers to have access to them.

Data from Libraries:

Data from libraries is the best choice for researchers, academic information in major knowledge will be stored in books, journals,
paper… In addition, this type of data includes many sources of information that can help researchers expand their knowledge and
ideas when implementing. Moreover, some researchers donate several copies of dissertations to public and private libraries,
especially in cases of academic research. In addition, business directories, newsletters, annual reports and other similar documents
that can serve as research data, are gathered and stored in libraries, in both soft and hard copies. Data from a long time ago also
could be found in libraries to understand the history behind the arising of major research (Formplus, 2021).

2.3.3 How secondary research applied to the author’s research

There is a truth that for any research, secondary research is the requirement step in any research topic. Because the power of it
could be brought is large scale collected data. Actually to make research more reliable, as much as data, opinions, related works are
more clearly, more higher percentage of success. Region of interest of objectives from that also mentioned . In addition, secondary
research is very low cost for the author as student is the best choice, sometimes it’s even free.
2.3.4 Comparing secondary research and primary research

Title of based Primary research Secondary research


knowledge

Meaning Research conducted to gather Secondary Research is one that


involves the use of information
first-hand information, for the
gathered originally by primary
current problem is called Primary research.
Research.

Data type Raw data Analysed and interpreted


information

Data Required specific to the needs of May or may not be specific to the
needs of researcher
researcher

Process has many involved relationships Rapid and Easy

Cost High Low

Time Long Short

Table 1: Comparing differences of primary and secondary research (Surshi, 2017)


2.4 Qualitative research

2.4.1 Definition

According to (Streefkerk, 2021), Qualitative research is expressed in words. It is used to understand concepts, thoughts or
experiences. This type of research enables you to gather in-depth insights on topics that are not well understood. Common
qualitative methods include interviews with open-ended questions, observations described in words, and literature reviews that
explore concepts and theories.

2.4.2 Methods

Qualitative data is difficult to analyze. It consists of text, images or videos instead of numbers. Some common approaches to
analyzing qualitative data include:

- Qualitative content analysis: Tracking the occurrence, position and meaning of words or phrases.

- Thematic analysis: Closely examining the data to identify the main themes and patterns.

- Discourse analysis: Studying how communication works in social contexts.

- Observation analysis: Gathering and searching for information and data through observations phenomenon occurring or through
experience, interview directly, etc.

2.4.3 How qualitative research applied to the author’s research

In the author’s research, observation part will be conducted. Therefore, qualitative is also executed.

2.5 Quantitative research


2.5.1 Definition

According to (Streefkerk, 2021), Quantitative research is expressed in numbers and graphs. It is used to test or confirm theories and
assumptions. This type of research can be used to establish generalizable facts about a topic. Common quantitative methods include
experiments, observations recorded as numbers, and surveys with closed-ended questions.

2.5.2 Methods

Quantitative data is based on numbers. Simple math or more advanced statistical analysis is used to discover commonalities or
patterns in the data. The results are often reported in graphs and tables. Applications such as Excel, SPSS, or R can be used to
calculate things like:

- Average scores.

- The number of times a particular answer was given.

- The correlation or causation between two or more variables.

- The reliability and validity of the results.

2.5.3 Comparing quantitative research and qualitative research

Quantitative research Qualitative research

Focuses on testing theories and hypotheses Focuses on exploring ideas and formulating a
theory or hypothesis

Analyzed through math and statistical analysis Analyzed by summarizing, categorizing and
interpreting

Mainly expressed in numbers, graphs and tables Mainly expressed in words

Requires many respondents Requires few respondents

Closed (multiple choice) questions Open-ended questions

Table 2: Quantitative research vs qualitative research (Streefkerk, 2021)

2.6 Secondary research in remote working


2.6.1 Remote working definition

Remote working has various definitions, some of them are presented here:

- In 1990 the International Labor Organization defined telework as a form of work that is done in the place far-off from
essential office. Thus, workers will be separated from personal communication with colleagues. The new technology will lead
to the division by communicational facilities (Golden, 2008).

- On other hands, remote working is not a work but a way of institute work that is built around information dealing out.
Persons or groups of citizens are away from the company, the client or the service provider, doing the job that involves the
use of a range of types of electronic tools and engaged person, product or result of a remote pass (Parand, 2017).

- According to (Eldin, 2018), remote working is defined simply as a kind of work process that keeps workers doing their job
activities from distance or out of work surroundings.
Based on definitions above, the general remote working is a type of work that people use other communications to exchange
information. With the rapidly strong development of the Internet, people combine the term “remote working” with the connectivity
of the Internet. Remote work has been around for a long time because small groups can exchange information by phone or by email.
However, at the moment, especially during this covid pandemic, the concept of remote working is really mentioned a lot. Actually,
users will use specific platforms for learning and working purposes such as: Google Meet, Microsoft Teams, Zoom Meeting...

In addition, remote working has other terms such as: online working, distance working, work from home (WFH), working remotely…
But in general, the main goal is still to use the Internet and other platforms to support work and study to exchange information
indirectly via transmission lines such as Wifi.

According to ATAC 2006, there are numerous ways in which remote working can be conducted. These include:

- Telework centres: which are offices that give workplaces and other workstations that allow the representatives from few
associations to utilise. This sort of remote working is seen as helpful in light of the fact that it can give preferred innovation
over the home office.

- Online learning: before the pandemic Covid-19, online learning terms were defined as learning on online platforms such as:
Coursera, Udemy… However in the era of pandemic, we all are students who are using online learning as a new method of
learning to improve knowledge by using meeting platforms: Google Meet, Microsoft Teams, Zoom Meeting....

- Working space: Officers and workers have been working normally especially in Covid pandemic. Most people leverage
technology knowledge in working remotely, information that used paper to exchange now it must use online transformation
to exchange such as: Gmail, Google Drive,... Meeting in company is also organized in meeting platforms that described above.

2.6.2 Impact of remote working


In spite of working remotely in era 4.0 as the highest improvement of technology. However, the productivity and revenue of the
company is the big question. Could working remotely replace traditional work methods? Or could it be as a result of the inability to
use the remote working properly? (Ahmed, 2018).

The positive impacts of implementing remote working:

According to (Ghanbari, 2017)

- Reduced Cost of travel from home to office and return back home, purchasing new wear, saving gasoline consumption and
workspace and reducing pollution.

- Remote work will increase productivity and morale. It can even lead to job opportunities outside the country or abroad for
talent and manpower to carry out activities.

- Control and time management will be more flexible.

The negative impacts of implementing remote working:

- Without contact with managers and partners when working, it made more harder to face problems.

- Some people will be distracted when working from home or other places by domestic life, good and bad, children around,
they may demand your attention, TV shows. Remote Workers have unlimited access to time-wasting websites, emails and
social media which affect the tasks and productivity.

- A big problem is about security when working remotely such as: lost data; hacker attacks; fraudulent tuition transactions…
Those problems could be affected hugly to the reputation and quality of the company.
In addition, (Marivic, 2019) and (Flores, 2019) synthetic and stat important factors that affect to the productivity and performance of
remote working:

Benefits Challenges

Aspect % Rank Aspect % Rank

More flexible hours 83.72 1 Collaborating/Communicati 53.49 1


ng with others

Better Work-Life balance 76.74 2 Making the Technology 44.19 2


work

Greater responsibility for 69.77 3 Finding information 34.88 3


how manage time

Job productivity/Job 53.49 4 Balancing Work/Life 33.88 4


satisfaction demands

Quality of work 37.21 5 Organizing time 30.23 5

Table 3: Frequency and Percentage Distribution of the Respondents in terms of Benefits and Challenges of Working Remotely
Following the table above, we could easily make evaluations that:

- For the benefits, the first five on the list were as follows: More flexible hours topped the roster with a percentage of 83.72 % .
Garnering a percentage of 76.74 %, Better work life balances garnered the second spot. 69.77 % of the respondents chose
having Greater Responsibility for how one manages his/her time as the third most beneficial factor in working remotely.
Coming in fourth spot was the Job Productivity/Job Satisfaction with a percentage of 53.49 %. Lastly, a Better Job Prospect
was chosen as the fifth ranked benefit with a percentage of 37.21 %.

- For the challenges, the top five on the list were as follows: The number one challenge encountered by the remote workers
was Collaborating/Communicating with others with a percentage 53.49 % . The second challenge they usually encountered
was Making the Technology Work with a percentage of 44.19 %. Third place was Finding Information with a percentage of
34.88 %. Ranked fourth challenge encountered was Balancing Work-Life demands with a percentage of 32.55 %. Lastly,
Organizing his/her time was the fifth-ranked most encountered challenge by the workers with a percentage of 30.23 %.

In conclusion, benefits/positive impact and challenges/negative impact have a big insertion area. Creative people work better while
working remotely because they could control and manage time smarter to make the work more productive by contacting partners
and following the news. However, lazy people have difficulty working remotely because they are too lazy to communicate and
cultivate technology knowledge. Moreover, the security in technology is also a big problem that people faced with when working
remotely, many workers and companies now point to that this is the hardest problem they can handle.

2.6.3 Security problems

As millions of people work from home, we have seen the increasing of the largest ever global remote workers. Their computers and
data are far away from a secure lab environment to detect huge data security risks. On the other hand when the transition has had
to happen in a short space of time will make wrong things that could leak data overcoming the scope of the company.
According to (Malecki, 2020), cyber criminals are exploiting the Covid-19 pandemic by launching ransomware attacks on unprepared,
unprotected businesses. For example, cyber attacks against the financial sector increased by a staggering 238%, a huge number than
usual. Furthermore, those surveyed reported that attempts at destruction, not just information theft, are becoming more common,
which means that attacked technology is becoming more and more sophisticated. Therefore, people who are lack of knowledge
about technology could be the priority targets for hackers.

Nurse and William (2021) indicated that cyber security has been a key concern during the pandemic as companies have been rushed
into migrating to new technology platforms and services to communicate, allow remote working. Therefore, cyber criminals have
kept track of the various issues caused by remote working to increase their variety and number of attacks.

In addition, Nurse and William (2021) also pointed out technology-related security risks for companies could be happened:

- Unfamiliarity (or lack of proficiency) with new remote-working technology (e.g., Microsoft Teams, Zoom, etc.) leading to
mistakes in the use and management of security features. There is a truth that many conferences and meetings were
interrupted while working because bad guys infiltrated inside and caused negative sounds or actions that affected the
meeting.

- Security issues with remote-working and remote communication technologies can expose an organisation to increased risk
through the network. That’s true, many popular types of cyber threats could be listed such as: Malware, DDoS, Ransomware,
Trojan Virus…

- Data may be stolen from the home or remote-working environment. Actually, this is the big problem and the highest target
for hackers when attacking to steal something. Leaked data could be leveraged by competitive companies or blackmail
customers. These things will make the company and the business suffer a great deal of reputational damage and even
bankruptcy.
- Employee’s privacy is also a shortcoming. Working from home means more visits to websites and emails for employees. This
can be noticeable to hackers especially if unsecured websites will expose privacy information.

In recap, security problems while working remotely have been born a long time ago. In the past, we are used to terms like viruses,
hackers... but now that cyber attacks are becoming more and more sophisticated, more intelligent and sophisticated viruses are also
born and have concepts. such as: trojan virus, cyber attack, worms,... As far as the author can see, in each decade viruses of different
sophistication will be born, and now in the first years of the new decade plus the work to be done. remote work due to the
pandemic. A lot of security issues are happening, artificial intelligence is becoming more and more popular, it is possible that viruses
can learn and collect important information on their own once they have entered a personal computer. So, below the author will
present some methods to minimize security attack problems.

2.6.4 Solutions to handle security problems

According to (Malecki, 2020), the first step for any business moving to remote working should be careful about data management
and storage. Because of it, they need to implement a technique that automatically saves documents and data to a shared area such
as: Google Drive, One Drive, Microsoft 365 or re-build a company’s on-premise shared drive. This thing is very important for any
business, auto back-up data will avoid when information is stolen and blackmailed by hackers. Especially employees who always
store data in local back-up files, nowadays ransomware is able to encrypt back-ups, therefore storing data on cloud is the best
recommendation and choice for employees and company.

He also provided number of additional steps that businesses can take to build and maintain a secure remote working environment,
including:
- Reinforce infrastructure: This thing is compulsory for any business, however while remote working it needs to improve more.
Strong security protocols will ensure that all work devices have the appropriate endpoint protection measures installed and a
strong VPN solution for a secure connection to the company network.

- Secure the network: This includes the deployment of software that can constantly scan for viruses and suspicious
connections.

- Communicate safely: Ensure that all people don’t leak information out of the scope of the company. Use trusted platforms to
exchange important information and share by tools such as: email, drive, dropbox…

Nurse and William (2021) indicated that any business must train cybersecurity for employees. The training should cover taking
flexible precautions to protect privacy and network. Employees should always check their devices usually to make sure that they are
trusted devices and unlikely to be bringing infections into the network. In addition, companies should provide laptops to employees
to avoid the need for them to use personal devices, it will make company easier in management.

To sum up, two articles above showed security problems and some solutions to handle them. In general, both of them present quite
detailed information about security. However, in my opinion some popular types of security problems should be listed more such as:
password theft, key log tracking, phishing attack, authentication, traffic interception. Moreover, these types also provide the
corresponding solutions to handle and protect. Although back-up methods were described by leveraging cloud storage such as:
Google Drive, whereas some old but quite easy methods for people with poor technology to store data such as using USB, hard
drive... should also be given and analysed in which case should be used accordingly. In other hands, training for employees about
security problems could be improved more by teaching them how to encrypt data, testing them usually and installing some security
softwares to protect from viruses.
2.7 Hypothesis
─ Working remotely currently is very important in covid pandemic

─ Many people were not familiar with remote working style

─ Working remotely is lack of contact and communication in more important and difficult business, which maybe leads to
potentially poorer productivity and performance

─ Many people had knowledge in security but not much

─ Security is the big problem when working remotely

─ Current security tools are not enough to meet the requirements and need to be improved

3. Primary research
As the author mentioned in part 1.3 - Plan, he conducted the research at 2nd step by leveraging data and information collected
during interview and survey. Actually, the people who took part in the interview has to choose from the author to be suitable with
the topic of questionnaires. They were working remotely is the best case for interviewing. Based on the collected data and
information after survey and interview, the author will stat and evaluate them then make unbiased comments on that information.

3.1 Interviews
In this interview, the author is going to make some questions about security problems for workers while working remotely. From
that, he hopes that more data will be explored to help his research more reliable.

Location: Google Meet

Time: 9 P.M - 10 P.M (11/22/2021)


3.1.1 Questions

Q1: How long do you working remotely?

Q2: Are you familiar with this working style when you have to switch from the traditional way of working to working remotely?

Q3: What is the reason that makes you have difficulty when working such as lack low-tech, inability to self-study, lack of time
control...?

Q4: After a long time working remotely, do you think your productivity in particular and your team work in general is higher than
traditional working or not? Could you show some information to proof your opinion?

Q5: If the productivity is not higher than before, even lower. What is the reasons that make it lower following your opinions such as:
lack of contact, lack of communication, lack of motivation, unsupervised…?

Q6: Do you have any knowledge in security and heard about stealing data to sell it on pirated websites?

Q7: During working remotely, there is a truth that your company/working space applied a platform for meeting, store data, manage
information of client... which methods that your working space applied to avoid hackers and be passive to handle?

Q8: Have you ever been attacked by virus or hackers or something like that?

Q9: If you were a victim of security problems, how did it affect to you?

Q10: Can you proactively address the security issue, or do you wait for help from others?

Q11: Did you heard about Chongluadao.vn, a Vietnamese extension could protect clients avoid clicking untrusted website apply AI
technology?
Q12: Where do you usually store your data for easy management and storage in bad cases such as: local disk, USB, cloud…?

3.1.2 Answers

Bui Duc Lan - Fresher Developer at IFY solution company

Q1: How long do you working remotely?

Until now, he has worked remotely for a half of year (about 6 months).

Q2: Are you familiar with this working style when you have to switch from the traditional way of working to working remotely?

Actually, at first time working remotely he felt quite hard to be familiar. However, until now he felt like very comfortable and
familiar while working remotely.

Q3: What is the reason that makes you have difficulty when working such as lack low-tech, inability to self-study, lack of time
control...?

As he told that people who are lack of skills in technology and inability to self-study got mostly. Therefore, the company should give
them a long for learning skills in technology such as: open a quick training course for using technology in working remotely.

Q4: After a long time working remotely, do you think your productivity in particular and your team work in general is higher than
traditional working or not? Could you show some information to proof your opinion?

In his work, comparing to the beginning of working remotely the productivity is not really high, even lower than traditional working
method. Whereas, after 2 months working remotely when all the work were going to be more smoothly and his team was more
familiar. The productivity and performance of work were improved and boosted more, even it was going faster and smarter than
traditional working.
Q5: If the productivity is not higher than before, even lower. What is the reasons that make it lower following your opinions ?

In his opinion, the reasons that made the productivity of working is lower includes: lack of contact, lack of communication, lack of
motivation, unsupervised…

Q6: Do you have any knowledge in security and heard about stealing data to sell it on pirated websites?

As a developer, make sure that he has basic knowledge in security especially while working remotely.

Q7: During working remotely, there is a truth that your company/working space applied a platform for meeting, store data,
manage information of client... which methods that your working space applied to avoid hackers and be passive to handle?

Out of the area of meeting, he told that his company used a private server for working/meeting and store data.

Q8: Have you ever been attacked by virus or hackers or something like that?

Yes, he has been attacked by virus. The reason is when he wanted to take a tool about the data for his work, but in his company that
tool was not used. Therefore, he had to download that tool from a website on Internet. Unfortunately, the website he downloaded
consisted some thread viruses.

Q9: If you were a victim of security problems, how did it affect to you?

Thread viruses that he downloaded on the website attacked and steal all his data stored in local disk of his computer. This thing is
very terrible.

Q10: Can you proactively address the security issue, or do you wait for help from others?

He had to set up and run his operating system again to back-up his data and restart his computer.
Q11: Did you heard about Chongluadao.vn, a Vietnamese extension could protect clients avoid clicking untrusted website apply
AI technology?

Yes, he heard about Chongluadao.vn. But he didn’t use it currently.

Q12: Where do you usually store your data for easy management and storage in bad cases such as: local disk, USB, cloud…?

For his case, to store data for easy management and avoid some bad cases happened, his company opened a private server for
internal company using. This thing maybe is the best choice now.

Nguyen Quoc Anh - Senior Full-stack Developer at OPC company

Q1: How long do you working remotely?

Actually his company was invested from foreign finance and most of his team are foreigner. Therefore, he did working remotely
about 12 months ago, a long time.

Q2: Are you familiar with this working style when you have to switch from the traditional way of working to working remotely?

Because of the long time he worked remotely, therefore he was familiar with working style. Even, he really like working remotely
because he can manage his time flexibly and did other works.

Q3: What is the reason that makes you have difficulty when working such as lack low-tech, inability to self-study, lack of time
control...?

For his case, he is good at technology and able to self-study fast, so he didn’t face with any difficulties while remote working.
Q4: After a long time working remotely, do you think your productivity in particular and your team work in general is higher than
traditional working or not? Could you show some information to proof your opinion?

Follow his personal opinion, working remotely helped him work many jobs at the same time. He could work for his company and
also took part in a research festival. Finally, he got 2nd prize with his team in that research festival around the country.

Q5: If the productivity is not higher than before, even lower. What is the reasons that make it lower following your opinions?

The hardest problem when working remotely follow his opinion is lack of communication with other teams in company. As you know,
working not only one developer team, it required many other parts such as: sale, BA, marketing…

Q6: Do you have any knowledge in security and heard about stealing data to sell it on pirated websites?

Make sure that, he had much knowledge in security because currently he is senior full-stack developer.

Q7: During working remotely, there is a truth that your company/working space applied a platform for meeting, store data,
manage information of client... which methods that your working space applied to avoid hackers and be passive to handle?

For his company, they had a private server that only open for their staffs.

Q8: Have you ever been attacked by virus or hackers or something like that?

He has been attacked by hackers. In detail, his database was attacked and stole by hacker can called SQL Injection. Even, hackers
asked him transfer some Bitcoin to take his database again.

Q9: If you were a victim of security problems, how did it affect to you?

So lucky, this database included fake data for his subject in college. Therefore, it affected not much to him.
Q10: Can you proactively address the security issue, or do you wait for help from others?

Because he had experience in this problem, so at the first time creating database he set Crawl Jokes data after specify time, the
database will auto back-up. Therefore, data lost not much in this case.

Q11: Did you heard about Chongluadao.vn, a Vietnamese extension could protect clients avoid clicking untrusted website apply
AI technology?

He had heard about Chongluadao.vn, an extension from Vietnamese developed by HieuPC. However, before this extension launched
he has used the same extension from J2 team. The common mechanism of these two extensions is to filter websites that are
reported bad by the community

Q12: Where do you usually store your data for easy management and storage in bad cases such as: local disk, USB, cloud…?

According to his opinion and his experience in deploying project, concealing customer information is more important than back-up.
Therefore, we should have information encryption algorithms in case hackers attack but they cannot exploit customer information.
Of course, using cloud services is quite good, but the limitation is that it is difficult to configure and cannot be edited directly.
3.2 Surveys
In this section, the author will use Google Form to conduct survey in research. Because of its utilities for owner and users, the author
can exchange and get information easier by give people link to Google Form. In addition, Google Form also provides many cases for
question such as: check box, multi check box, range, small paragraph…

3.2.1 Questions
3.2.2 Answers

As you see in this chart, most people now are working remotely. It includes: 65% working from home, 25% combine working from
home and go to company, 10% not working from home but stay in the company and not coming home. In conclusion, this leads to
the fact that the number of working remotely is very large. The remaining few, if they don't work remotely, will work in combination
or work and stay at the company because of the specifics of the job.
Following this chart, we can obtain that remote working is now a very important part. It is understandable that the covid epidemic is
becoming very complicated, so most companies and offices allow employees to work remotely to ensure productivity and health.
About 90% people thought that working remotely is very import, the remain maybe didn’t working from home, they probably
worked and stayed in company directly.

Following this chart, we can obtain that in the era of technology 4.0 mostly people reached technology. About 70% people are good
at technology, 30% remain are low-tech. However, in my opinion people who consider themselves to be less tech-savvy are those
who don't have much experience with computers and are really good at it, not necessarily ignorant.
In this section, to evaluate people who are working remotely were familiar with working remotely or not. In detail, 55% people are
familiar, 25% got a little problem, 20% are not familiar. In generally, people who work remotely for a long time will gradually
improve their familiarity with remote working. 25% of people are having a little problem that will improve in the future. the
remaining 20% who can't get used to it are probably people who are old and have never been exposed to computers and technology
before, so it's difficult to get used to.

In this section, we obtain the productivity and performance while working remotely comparing to before. With 5 is the average
value compared with the previous normal working mode. Greater than 5 means higher productivity than before and less than 5 is
vice versa. In general, the number of people who are more productive than before and the number of people who feel less
productive is quite small. The number of people achieving productivity (8 > 5) is the largest (25%) and is a fairly accurate number to
describe the productivity of everyone working remotely.
Based on the statistics above, we see that most people working remotely have basic knowledge of security issues. However, the
number of people who really have knowledge is not high, specifically as follows: 45% have much knowledge on security, 35% have a
little understanding, the remaining 20% have almost no knowledge at all. To go into detail see the common security problems that
they often encounter.
According to the above statistics, security errors like Fraud and DDoS are very common mistakes for most people. In fact, DDoS
errors are common, but rarely encountered in individual cases, but often in organizations. As for the Fraud security error, it is too
common such as threatening emails, total money ... However, the remaining security errors will cause more serious consequences
than the common ones. Specifically, the statistics are as follows: DDoS (55%), Trojan Virus (20%), SQL Injection (35%), Key Logger
(40%), Fraud (90%).

In summary, based on these parameters, we can say that the understanding of security is still quite poor. Therefore, when working
remotely, there are many vulnerabilities that hackers use to tempt those who lack security skills and understanding.

Based on the numbers that the chart above gives, we can obtain that the number of people encountering security errors is quite
large. Namely: 80% have ever been attacked by a virus. It is also quite understandable because the security knowledge listed above
has reflected correctly.
About the effects when the computer is attacked by hackers through security holes. The theft of information about data makes up
the majority of today, information stored on local disks and personal information on social networking sites will be stolen and sold.
In addition to the personal information of the computer owner, the information of the customers that the business they are working
for will also be stolen. This is really bad for the business system and reputation of the business. About the specific information
collected as follows: 15% crashed computer, 90% lost data, 70% leaked data
According to the information listed above, it seems that people will tend to fix it themselves first, otherwise it will be called IT
support. But in general, the number of people calling IT support will account for the majority, which is understandable because
according to the survey above, there are not many people who really have experience in handling security issues. Specifically, the
information is as follows: 55% self-fix, 65% calling IT support, 10% do nothing. From here we can also realize that the initiative is not
high when it comes to security problems.

With the collected information and statistics about the software used to protect the security holes, the most used software is BKAV.
This is also quite easy to explain because most people in Vietnam will use BKAV software from the team from Vietnam. In addition,
there is an extension used on the Web environment, Chongluadao.vn, which also has a high number of votes. This is a recently
launched extension, but its applicability is quite high, it helps us to filter bad websites, lack of security and will not allow clicking.
Specific information about the software voted as follows: 80% BKAV, 20% Kasperski, 15% Anti-virus, 60% Chongluadao.com.
When asked about the features of current security software that really give them peace of mind when working remotely. More than
half of people think that these software need more recent improvements, meaning that certain limitations still exist. Specifically:
65% needs more improvement, 35% only needs these.

Finally, when asked if there are new software measures introduced to improve the limitations of current security software, as well as
protect users from high-level security vulnerabilities. Most people find it quite interesting and interested, meaning they still have a
need to use a more optimal software. This is also the motivation to help the author do more in-depth research to come up with new
methods. In detail: 90% very interesting, 5% a little, 5% don’t care.
3.3 Observations

Traditional challenges

Following my hypothesis in part 2.7, the author have mentioned that working remotely could be more flexible to manage time for
working, entertainment, family… Besides, in this link the creator who were working remotely in 8 year state that there are existed
problems such as: affect to mental health because lack of contact and communication with partners, even lost motivation is the
usual. This will be the cause of the decrease in working efficiency compared to the traditional working. In the last video, he also
provided some ways to overcome challenges while remotely working.

Traditional tips for overcoming challenges

In this video, the creator showed some notices for improve the productivity while working remotely. In there, the author didn’t not
focuses on technological improvements but focuses on several ways to improve the mental quality of working remotely to increase
work efficiency by: planning work the night before, practicing good habits. Get used to a scientific lifestyle, exercise, and sports to
reduce stress and work better…

Security challenges

Apart from the traditional problems while working remotely above, security is the big problem that many people and company
didn’t handle as well. Leaking data, stealing data, Virus… are everywhere on the website. Therefore, it’s very import to improve
some solutions to handle them.
Handling security challenges via Chongluadao.vn and cloud based

As the author mentioned above, Chongluadao.com is the utility extension tool for protecting client comprehensively when browsing
the web including: warn of the danger when accessing a certain website, check black links and block sites, lock permissions to sites
with content not suitable for children… In addition, we can use cloud for storing data to make sure that in some bad cases local
computer broken down, data still be stored.

4. Analyze

4.1 Analyse research findings and data

Working remotely currently is very important in covid pandemic

According to information I collected in interview, survey and observations, most people are currently working remotely in their work.
About 90% people thought that working remotely is very important and helpful. Especially in covid pandemic, all things are lock-
downed, direct contact when coming to the company to work will cause a high risk of infection, so working remotely is the best
option and very important.
Beside, working remotely bring many new things helpful. Following a survey of VNExpress said that: “half of all office workers prefer
to work from home as they do amid the nationwide social distancing campaign”. Even, they really like remote working, the reasons
includes: enjoying remote work are comfort (52 percent), saving travel time (20 percent), safety (19 percent), flexibility (16 percent),
and time for family (7 percent).

Many people were not familiar with remote working style


From the statistics obtained, I could say that many people are not really familiar with working remotely. About 70% people have
some skills in technology, 30% are not confident with their basic skills. As you know, working remotely requires all works through
Internet and computer. Therefore, lack of skills in technology will face with many difficulties.

To better understand and elaborate on my point that many people are still not familiar with this style of remote working. The
statistics have shown the following: 50% people thought that they are familiar with this working style, 25% having a little problem
and 25% can't change traditional working habits yet. These statistics show that the basic limitation of working remotely is that
everyone's adaptation is different.

In addition, (Kashyap, 2021) pointed that: “Not everyone is familiar with working remotely” and in the interviewing, Lan told that:
“in his company, many people feeling difficult to adapt and often tired when facing the computer every day, every hour.” However,
this is still not a big problem because people can gradually improve their technology skills or ask their loved ones for help. Like me,
when working remotely, my mother often asks me to install software as well as guide to manipulate tools that she has never used.

Working remotely is lack of contact and communication in more important and difficult business, which maybe leads to
potentially poorer productivity and performance
Although telecommuting has been quite a while now, some even have been working remotely for almost 2 years. However, there
are still many reasons why remote working has not completely replaced the traditional working style. Many people have access to
remote work, it allows them to arrange their time more flexibly instead of having a fixed time of day as before, but productivity of
work cannot be compared with before because of lack of contact and communication, so what are the main reasons?

With the statistics presented above, with the highest number of people feeling that working remotely is 25% (at point 8), the
number of people who feel there is no development even Even worse accounted for 30% (at points 5, 4, 3). The fact that the number
of people with increased productivity is higher can be explained through interviews with Lan and Quoc Anh. Both of them find that
each person's ability to work will improve gradually over time, but it's really not fast enough to meet the required work schedule.
This will leads to low efficiency and performance.

To proof and show the reasons made working remotely had drawbacks and make work not high productivity, VNExpress said that:
“A small of number of respondents dislike remote work due to lack of concentration (45 percent), inadequate facilities (16 percent),
limited communication with colleagues (11 percent) and difficulty in solving problems (8 percent)”.
In addition, (Janza, 2020) listed the main reasons of remote working that affect to productivity of work includes: (i) teamwork and
leadership can be a little bit more challenging. Indeed, leading a remote team can be challenging. There can be a sense of lack of
control and it can be a little harder to build team spirit when face with hard problems; (ii) feelings of isolation, working remotely
leads to a lack of sharing and communication in work, even life. No one lives that can only work day by day without having fun, but
when forced to work remotely for a long time, the worldview is closed, causing a feeling of being lost; (iii) distractions at home and
losing work-life balance, when working remotely there are no office distractions, but on the other hand a remote worker can face a
whole bunch of new distractions, especially working from home - like kids, pets, hobbies, TV and so on. However, if you’re constantly
working without proper breaks or any kind of life-work balance, work productivity declines fast in the long run.

Many people had knowledge in security but not much

The first is statistics on understanding and impact of security on work, about 45% have experience and understanding, 35% have
little understanding and 25% have almost no understanding of this problem. This information indicates that more than half of the
people lack knowledge about security. It will lead to extremely serious consequences for the organization or company where they
are working.
In addition, when asked about the types of security bugs they know, they only know about the basic common security errors that
have been around for a long time such as: DDoS, Fraud. However, for serious security errors that greatly affect the system, their
understanding is not high such as: Trojan Virus, SQL Injection, Key Logger. Specific statistics are as follows: 55% of people have
knowledge of DDoS, 20% Trojan Virus, 35% SQL Injection, 40% Key Logger, 90% Fraud.

According to (Horne, 2016), the numbers and size of cyber security attacks are increasing and Australia is one of the world’s largest
targets. The Federal government noted the current impact of cyber attacks on the Australian economy is A$17 billion annually. The
reasons are many and include a lack of direction and commitment to understanding information security at the strategic level.
Research from the Australian National University shows executive/board knowledge of cyber risks among medium sized businesses
is inadequate and board-level governance of cyber security risks varies wildly between organisations. This is troubling given the
ultimate accountability of board directors.

Security is the big problem when working remotely

With the statistics inside, we all see that the number of people being attacked through security holes is increasing day by day. About
80% of people have been attacked by viruses or hackers. This is an alarming number, although above the number of people who
have not such high security knowledge, that is, those who have knowledge of security can still be attacked in one way or another.
Because hackers are getting more sophisticated day by day.

In addition, when interviewing Quoc Anh, he was once attacked through SQL by changing his SQL login information, the hacker
asked him to redeem his account by blackmail. Another example is the case of Lan, he was also attacked by a malicious code when
trying to find the tool he needed through the website and when he clicked on that malicious website, everything on his computer It's
already out of control and files can be lost instantly.

Similar to the two people I interviewed, when asked about the impact of a security attack, up to 90% of people have lost data files,
70% of people have had personal information or data leaked. customers, 15% have been suspended and cannot use. These indicate
that, in addition to the mental limitations of remote working, security flaws are a huge problem that we need to be mindful of when
working remotely.

Moreover, when facing problems, the number of people who can handle their own problems is not high. Normally, they will call IT
support parties for help, but in the context of remote working and the covid pandemic, going directly to the place to repair will be
difficult. Therefore, we need to have a way to handle it ourselves to optimize productivity and avoid bad cases.
Through interviews, surveys and observations, it has been shown that, when working remotely, many people will encounter security
problems with varying degrees of danger. Even those with technical skills are not sure that they can fully handle the errors and
problems when being attacked through their computer. It will cause enormous impacts not only for individuals but also for
organizations and customers.

Current security tools are not enough to meet the requirements and need to be improved

As the picture above, with the collected information and statistics about the software used to protect the security holes, the most
used software is BKAV. This is also quite easy to explain because most people in Vietnam will use BKAV software from the team from
Vietnam. In addition, there is an extension used on the Web environment, Chongluadao.vn, which also has a high number of votes.
This is a recently launched extension, but its applicability is quite high, it helps us to filter bad websites, lack of security and will not
allow clicking. Specific information about the software voted as follows: 80% BKAV, 20% Kasperski, 15% Anti-virus, 60%
Chongluadao.com.

Most people have installed and are using security software, but they still need help from IT support. This indicates that innovative
research methods are needed to make it easier for anyone to deal with security issues, which are especially important when working
remotely. Therefore, when asked about the need to improve existing anti-security software, most people agree that new
improvements are needed.

Because of the limitations of the current tools and tools, when asked about the need for research to find new solutions to overcome
those limitations, most people find it interesting because really they need a new solution that keeps them away from security
problems. From here will help me have more motivation to research to suggest new and improved versions.

4.2 Recommendation for improving the system or future research

As the researcher (author) mentioned above, working remotely are contributing a very important part to life, even becoming
indispensable. Especially in this covid pandemic, where everything is limited, remote working is probably mandatory for
organizations and individuals. However, working remotely also has many limitations, which the author mentioned in detail above.
Recalling the first limitation is the mental problem when working remotely, not everyone has the same mentality and workspace, so
some people will quickly adapt to working remotely, but vice versa. Normally, having many outdoor activities will be very restrictive
when you have to stay indoors and face a computer screen all day. This will lead to unsatisfactory work productivity and will affect
organizations and individuals. In addition to the problem of low morale when working remotely, security issues are also a topic of
concern and solutions are found day by day. Imagine that all unencrypted customer information was stolen by hackers and sold on
bad websites. The bad guys will take advantage of that opportunity to blackmail customers or steal customers' personal assets
through the information obtained. This will cause great damage to the business and reputation of the organization as well as the
individual who caused the vulnerability.

Based on those remaining weaknesses, the author will be given recommendations and suggestions for future improvement to
handle this issue.

Improve mental

According to the author, improving personal morale when working will make them comfortable to have more ideas and will deal
with work flexibly, even a lot better than the original. However, it's completely normal to feel stressed, unmotivated, anxious, and
uncertain. First, people need to be aware that they are in a stressful situation at work in order to receive help information from
people around or through websites. This does not seem important, but it is very important for those who are in a state of lack of
motivation, are always stressed with work or even loved ones. Next, let's take a look at some of the tips the author thinks will greatly
improve this worst case scenario:

− Set and stick to a routine: Without steady schedules, the lines between work and personal time can get blurred and be
stressful to get right. Follow your normal sleep and working style, and stay consistent. Get up at the same time day by day and
have a breakfast will help you keep discipline hobby. Try scheduling in your "commute time" and spend it exercising, reading or
listening to music before logging in.

− Create a creative working space: If it is possible, find a quiet space away from people and distractions like living room. In
addition, prepare everything you need in one place, before you start work such as: chargers, pens, paper and anything else –
and close the door to keep your private space. Lastly, get comfortable. While it might be tempting to sit on the sofa, it's much
better to sit at a desk or table. If you can, let's set up items you love around the work area, it will keep you motivated anyway.

− Take a break: Spend time for break is important to help manage feelings of stress. Moreover, try to take lunch and regular
screen breaks, and give yourself time to concentrate on something else so you feel more focused when you return. Even just 5
to 10 minutes of short breaks each hour can really help your productivity too. Even if possible, spend time outdoors when you
can.

Security

In the above sections, the author has mentioned the outstanding problems of security in general, of course the basic solutions have
also been presented in a general to detailed manner through interviews, surveys and observations. Below, the author will suggest
some recommendations to improve security issues:

− Training a security course: First but very necessary, lack of security training can expose your organization to a variety of
cyber risks, so it is essential to prioritize employee training as a means of protection against external cyber threats. Security
training should be administered to every employee during the onboarding process, with curriculum varying based on job
function and seniority. Regular testing of employees’ cybersecurity literacy will allow you to evaluate the effectiveness of the
education programs you have in place.

− Implement automated cybersecurity solutions: Implementing automation into your organization’s network environment is
imperative when working to mitigate risk and improve security practices. Using automated cybersecurity solutions to monitor
your network gives time back to IT teams, allowing security professionals to focus their efforts on high-risk threats. Indeed, the
implementation of automated security methods will help organizations solve security problems more often instead of manually
as before, moreover, hackers often attack at the sleeping time of everyone. one should have an automated method would be
very helpful.

− Always encrypt important data: This is extremely important but many people are still not aware of its importance.
Sometimes, hackers can break into your data system, but if the important data you have encrypted according to some algorithm,
it will make hackers take time to decrypt or even cannot steal. that information. The backup is also important, but in my opinion
the encryption will need to be done before the backup.

5. Conclusion
In this report, the author was shown knowledge and related topics in working remotely. In addition, he also provided his research
methodologies in evaluating advantages and disadvantages of working remotely, and to demonstrate his words, the author
implemented interview, survey and observations. To recap all things the proposed, analyzing topics through data collected was
presented above, and the author showed his recommendations and suggestions to improve working remotely system.

6. Appendix
Student Name: Dinh Huy Hoang Student Number: GCH0804

Tutor: Do Tien Thanh Date: 25/11/2021

Unit 13: Computing research project

Propose title: Key security concerns when working remotely

Section One: Title, objective, responsibilities


Research question:

What are the solutions in your corporation to handle security problems while working remotely for
employees in IT domain?
Objectives

I want to learn:

● What are security problems while working remotely?


● How security problems affect to productivity of work?
● What platforms are helpful and useful to reduce risks of security problems?
● What is the popular risk of security that you usually face with?
● Why security is the big problem for huge of technology companies?
● Maybe hackers can leverage the risk of security to steal important data of users and companies?
Section Two: Reasons for choosing this research project

Reasons for choosing the project

● Actually, covid pandemic is around the world and most of schools, college, company must be online learning and
working remotely. However, there are many problems when did it, security is the biggest problem.
● In a company or an organization, the issue of security is always a top priority to handle, especially when working
remotely. Hackers can use tricks through networks, emails or links to steal personal or corporate information.
● Stolen corporate and personal data can be sold for ransom or used by the company's competitors for personal gain.
Section Three: Literature sources searched

The initial sources which could help me to answer those questions:

1. Document 1: Lopes Dias, A. and Entradas Silva, R., 2017. The Role of Organizational Values in Commitment of
Employees. The case of private security employees working remotely. International Journal of Science and Research
(IJSR), 6(12), pp.519-526.
2. Document 2: Cook, S., 2019. Making a Success of Managing and Working Remotely. IT Governance.
Use of key literature sources to support your research question, objective or hypothesis:

Section Four: Activities and timescales

1. Collect materials relating to research’s question and objectives


2. Complete research proposal
3. Milestone 1[11-6]: Get feedback from the Tutor about the research proposal
4. Produce project plan
5. Writing literature review and represent the findings in term of hypothesizes
6. Check project progress: research proposal, plan, literature review
7. Preparation for primary research(to confirm the findings in literature review or clarify the questions might arise after the
literature review)
8. Milestone 2[25-6]: Get feedback from the Tutor about the plan of primary research.
9. Milestone 3[27-6]: Get feedback from the Tutor about the result of literature review
10. Conducting the primary research
11. Milestone 4[16-7]: Represent the findings in primary research and get feedback from Tutor
12. Writing assignment 1 which contains LO1, LO2
13. Milestone 5[29-7]: Submit assignment 1 -Draft
14. Milestone 6[1-8]: Submit assignment 1- Final
15. Writing Assignment 2 which contain LO3, LO4
16. Milestone 7[10-8]: Submit assignment 2 -Draft
17. Milestone 8[12-8]: Presentation- put everything together.
18. Milestone 9[18-8]: Submit assignment 2- Final
Activities to be carried out during the research project (e.g. research, development, analysis of ideas, writing, data collection,
numerical analysis, tutor meetings, production of final outcome, evaluation, writing the report) and likely durations:

Milestone one:

Target Date(set by tutor)

Milestone two:

Target Date(set by tutor)

Section Five: Research approach and methodologies

● Research process: sequential


● Research classes: quantitative and qualitative
● Research methods: case study, survey

Type of research approach and methodologies you are likely to use, and reasons for your choice:

What your areas of research will cover:

Comments and agreement from tutor

[This part not for student]


Comments (optional):

I confirm that the project is not work which has been or will be submitted for another qualification and is appropriate.

Agreed: ................................................................... (Name) .................................................................................... (Date) ..........................

Comments and agreement from project proposal checker (if applicable)

[This part not for student]

Comments (optional):

Agreed: ................................................................... (Name) .................................................................................... (Date) ..........................


7. Plan-appendix
8. Ethical forms
Research Ethics Approval Form
All students conducting research activity that involves human participants or the use of data collected from human participants are
required to gain ethical approval before commencing their research. Please answer all relevant questions and note that your form
may be returned if incomplete.
For further support and guidance please see your respective Unit Tutor.
Before completing this form, we advise that you discuss your proposed research fully with your Unit Tutor. Please complete this
form in good time before your research project is due to commence.
9. Other materials
Interview Nguyen Quoc Anh

https://drive.google.com/file/d/1AjYU16NRq9l4Rh8hnxbEd1VQsJELW6qP/view?usp=sharing

Interview Bui Duc Lan

https://drive.google.com/file/d/10ZusD3OIDxc_m7_RQq5ukvdo4pc7aC88/view?usp=sharing

Observation

https://www.youtube.com/watch?v=PG7lQJWJFVI

https://www.youtube.com/watch?v=n9yYprpKoKM&t=16s

https://www.youtube.com/watch?v=5f0HW9XtGe8

https://www.youtube.com/watch?v=mx91EKR34tY
10. References
[1] Ghanbari.A, Bakhtjoo.SH, 2017, Teleworking (foundations, principles and methods, including the administration of teleworking
projects), first edition, publisher Frazma processing, Tehran

[2] Elshaiekh, N., Hassan, Y. and Abdallah, A., 2018. The Impacts of Remote Working on Workers Performance. 2018 International
Arab Conference on Information Technology (ACIT),.

[3] Golden, T.D., Veiga, J.F., and Dino, R.N. (2008). The impact of professional isolation on teleworker job performance and turnover
intentions: Does time spent teleworking, interacting face-to-face, or having access to communication-enhancing technology matter?
Journal of Applied Psychology, 93:6, 1412-1421

[4] Marivic, D. and Flores, F., 2019. Understanding The Challenges Of Remote Working And It’s Impact To Workers. International
Journal of Business Marketing and Management, 4(11), pp.40-44.

[5] Nurse, Jason R. C. and Williams, Nikki and Collins, Emily and Panteli, Niki and Blythe, John and Koppelman, Ben (2021) Remote
Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy. In: 23rd International Conference on
Human-Computer Interaction

[6] Malecki, F., 2020. Overcoming the security risks of remote working. Computer Fraud & Security, 2020(7), pp.10-12.

[7] Lynn Driscoll, D., 2010. Writing Spaces: Readings on Writing. 1st ed. Creative Commons License, pp.150 - 180.

[8] Blog, F., 2021. What is Secondary Research? + [Methods & Examples]. [online] Formpl.us.
Available at: <https://www.formpl.us/blog/secondary-research>
[Accessed 8 December 2021].
[9] S, S., 2017. Difference Between Primary and Secondary Research (with Comparison Chart) - Key Differences. [online] Key
Differences.
Available at: <https://keydifferences.com/difference-between-primary-and-secondary-research>
[Accessed 8 December 2021].

[10] Jansen, D. and Warren, K., 2020. What Is Research Methodology? Definition + Examples - Grad Coach. [online] Grad Coach.
Available at: <https://gradcoach.com/what-is-research-methodology/>
[Accessed 4 January 2022].

[11] Streefkerk, R., 2021. Qualitative vs. quantitative research. [online] Scribbr.
Available at: <https://www.scribbr.com/methodology/qualitative-quantitative-research/>
[Accessed 4 January 2022].

[12] Kashyap, S., 2021. Everything we want you to know about working remotely beforehand. [online] ProofHub.
Available at: <https://www.proofhub.com/articles/working-remotely>
[Accessed 29 December 2021].

[13] Ahn Horne, C., 2016. Lack of cyber security knowledge leads to lazy decisions from executives. [online] The Conversation.
Available at: <https://theconversation.com/lack-of-cyber-security-knowledge-leads-to-lazy-decisions-from-executives-68065>
[Accessed 4 January 2022].

You might also like