You are on page 1of 52

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC HND in Computing

Assessor Mr. Niruban Internal Verifier Mr. Thanulagshan


Unit 13: Computing Research Project
Unit(s)
Final Research Project Proposal - Remote working
Assignment title
Student’s name Thayalan Odniel
Pass Merit Distinction

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

1
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

2
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Thayalan Odniel / (BAT/A-006969)

Unit Title Unit 13: Computing Research Project

Assignment Number 1 Assessor Mr. Niruban


18/01/2021 Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine appropriate research methodologies and approaches as part of the research
process
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

3
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor


My lecturer for the Computer Research Proposal unit is Mr. Niruban. His lecturing style is
perfect. He used a variety of interesting techniques to lecture us and supported us in completing
our assignment on time. He not only encouraged us to do our best, but he also guided us to do
our best.

Assessor Date
signature
odniel.odniel.1234@gmail.com 18/01/2021
Student Date
signature

4
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Pearson
Higher Nationals in
Computing
Unit 13: Computing Research Project
Project Proposal

5
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

6
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(odniel.odniel.1234@gmail.com) (18/01/2021)

7
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Thayalan Odniel / (BAT/A-006969)

Unit Number and Title Unit 13 – Computing Research Project

Academic Year 2021/22

Unit Tutor Mr. Niruban

Assignment Title

Issue Date 14/08/2021

Submission Date 18/01/2021

IV Name & Date

Submission format

Research Project Proposal

 The submission is in the form of an individual written report.


 This should be written in a concise, formal business style using single spacing and font
size 12.
 You are required to make use of headings, paragraphs and subsections as appropriate,
and all work must be supported with research
 Reference using the Harvard referencing system.
 Please provide a referencing list using the Harvard referencing system.
The recommended word limit is minimum 2000 words.
Unit Learning Outcomes:

LO1. Examine appropriate research methodologies and approaches as part of the research
process.

8
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Assignment Brief and Guidance:

Remote Working
“The option to work remotely was already being embraced by some businesses in the pre-
pandemic era. These businesses were making some progress to adapt their working practices
to accommodate remote working by allowing those in certain job roles to take the opportunity
to work from home, albeit a day or two a week. However, on the whole there had been a
reluctance to have staff working remotely and this has largely centred around productivity
concerns, security implications and technology issues.

The global pandemic however necessitated and accelerated the move to remote working. The
vast majority of businesses have now shifted some or all of their operations online, and almost
all of their staff are working from home. The enabling force behind this necessary shift has been
the different technologies and platforms that facilitate workers to achieve business goals
remotely.
This sudden shift to remote working took place within weeks and months and has not been
without issues. Several surveys conducted during this period cited business leaders complaining
about how technology problems have impacted their business and employees while working
remotely.
The biggest issues remote workers face are being frequently disconnected from corporate
networks, slow file downloads, poor quality of video meetings and long response times when
loading apps. As a result, building secure, effective and integrated technology capability, to
continue this flexibility in the workforce, has now become a priority for all organizations. “
(Pearson, 2020)
Choosing a research objective/question.
Students are required to choose a research topic and come up with their own research
questions based on the suggested research scope. It is extremely important to complete a
strong research project with clear, well focused and defined objectives. A central skill in
selecting a research objective is the ability to select a suitable and focused research objective.
The research topic could be based on the following areas.

 Digital transformation strategies


 Monitoring and productivity tools, their uses and implications
 Key security concerns when working remotely.

9
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
The Learner requires to produce a research proposal that clearly defines a research question
or hypothesis, supported by a literature review (Use the project proposal and ethical
consideration form template formats)
Project Proposal should cover following areas.
1. Definition of research problem or question. (This can be stated as a research question,
objectives or hypothesis)
2. Provide a literature review giving the background and conceptualisation of the proposed
area of study. (This would provide existing knowledge and benchmarks by which the data
can be judged)
3. Critically evaluate research process /different research methodologies by demonstrating
an understanding of the pitfalls, ethical issues, and limitations. Choose a suitable research
methodology and justify the selection.
Draw points (1–3, above) together into a research proposal by getting agreement with your
tutor.

10
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Grading Rubric

Grading Criteria Achieved Feedback

P1 Produce a research proposal that clearly defines a


research question or hypothesis, supported by a
literature review

P2 Examine appropriate research methods and


conduct primary and secondary research.

M1 Evaluate different research approaches and


methodology and make justifications for the choice of
methods selected based on philosophical/ theoretical
frameworks.
D1 Critically evaluate research methodologies and
processes in application to a computing research
project to justify chosen research methods and
analysis.

11
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Research Proposal Form
Student Name Thayalan Odniel
Student number BAT/A-006969 Date 18/01/2021
Centre Name Esoft Metro Campus Batticaloa
Unit Unit:13 Computing Research Project
Tutor Niruban vijayaraja
Proposed title
Impact of security issue on remotely working; a special reference to Brandix in Srilanka

Section One: Title, objective, responsibilities

Title or working title of research project (in the form of a question, objective or hypothesis): Research
project objectives (e.g. what is the question you want to answer? What do you want to learn how
to do? What do you want to find out?): Introduction, Objective, Sub Objective(s), Research
Questions and/or Hypothesis
Research Questions
1) What is the effect of securely enabling access on remote working at Brandix organization
in Srilanka?
2) What are the impacts of security challenges on remote working at Brandix organization
in Srilanka?
3) What are the impacts of an advanced protected environment on remote working at Brandix
organization in Srilanka?
Research objectives
1) To establish the effect of securely enabling access on remote working at Branches of
Brandix organization in Srilanka.
2) To determine the impacts of security challenges on remote working at Branches of
Brandix organization in Srilanka.
3) To identify the impacts of an advanced protected environment on remote working at
Branches of Brandix organization in Srilanka.

Section Two: Reasons for choosing this research project


Reasons for choosing the project (e.g. links to other subjects you are studying, personal interest,
future plans, knowledge/skills you want to improve, why the topic is important): Motivation,
Research gap

12
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
The significance of this study is that it shows how security issues affect remote working in
Colombo-based enterprises. Solving security issues is becoming a great relief for IT-based
businesses. Going to work and sitting there is enough work for many people, but remote
working cannot accomplish that physically. Technology, on the other hand, may be a "force
multiplier" for businesses. Employees can use online resources to obtain support on demand
beyond the physical reach of their executive through the utilization of remote working.
Working from home might also be beneficial in other ways. Furthermore, remote working
does not end with the end of the working day. Employees may use the internet to access
work resources and projects whenever and wherever they have an online connection.
Employees that need to spend more time working on projects can use online meetings and
submissions to work from home while still keeping up with their coworkers. Additionally,
executives might use technology to find resources and participate in virtual expert
improvement initiatives and meetings. They may also create personal working networks with
a variety of tools to find and share ideas and resources, as well as get assistance from their
peers. Remote working may be used to boost productivity and help businesses grow.

Section Three: Literature sources searched


Use of key literature sources to support your objective, Sub Objective, research question and/or
hypothesis: Can include the Conceptual Framework
According to the (Pranggono & Arabo (2020). sudden reliance on technology for
connecting people, and the move to a perhaps ‘less’ cyber secure home environment,
remote working has had a significant impact on the cyber security of organizations, cyber
security employees and the cyber security industry. Khan, Brohi and Zaman (2020)
identified their view on the ‘Top Cyber Security Threats amid COVID-19 Pandemic’,
highlighting cyber security threats that have either increased or been adapted as a result of
pandemic conditions. Many organizations have seen an increase in Distributed Denial of
Services (DDoS) attacks. There has been an increase in malicious domains using words
such as ‘corona-virus’ and malicious websites. Cyber criminals are also taking advantage
of the current situation by spreading Malware, Spywares, and Trojans, launching
ransomware attacks and sending out spam email. Furthermore, attackers are sending out
malicious messages via social media and using browsing apps, such as fake COVID-19
information apps. Attackers are also using business email compromise scams by using
coronavirus disease as a tool (Khan et al., 2020), as part of the wider trends whereby cyber
criminals have taken advantage of the situation and have been targeting vulnerable people

13
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
and systems (Pranggono & Arabo (2020). These diverse range of issues have put an
enormous strain on the cyber security industry and the respective information security
departments and staff inside organizations.
In 2019, Nominet released a survey concerning Chief Information Security Officers
(CISOs) stress and wellbeing. The survey demonstrated that CISOs are generally under
high levels of stress that impact both their mental and physical health. CISOs also reported
working beyond contracted hours, not taking holiday or sick leave. This then negatively
impacts the organization, as stress prevents CISOs from performing efficiently and can
result in burnout (Nominet, 2019). During COVID-19 this stress and these long hours are
very likely to have increased (Salari et al., 2020). Limited relevant cyber security awareness
relating to remote working have also been highlighted as a potential challenge to cyber
security. Cyber security practices in the home are different from those in the office,
therefore employees need to be made aware of and trained in new behaviors and practices
they may need to adopt. Johnston, Wech, Jack and Beavers (2010), in a survey of over 500
remote and in-office employees, found some factors that contributed to information
security policy compliance and compliance differences between remote and in-house
employees. The study found that remote employees differ from office employees in their
perceived levels of security and privacy policy awareness, self-efficacy, and compliance
intentions. These findings suggest that the lack of support (be it verbal, demonstrative, or
material-based) reduces remote employees’ ability for awareness of security and privacy
policies within their organizations and their ability to comply with such policies (Johnston
et al., 2010). This is also supported by previous work demonstrating how the ‘remote-
worker status’ can lead to diminished information security awareness (Johnston, Wech, &
Jack, 2000).

Section Four: Activities and timescales


Activities to be carried out during the research project (e.g. research, development,
analysis of ideas, writing, data collection, numerical analysis, tutor meetings, production
of final outcome, evaluation, writing the report) and How long this will take:
Milestone Propose completion data
Study the topic August 14, 2021
Preparing research proposal September 23, 2021
Proposal submission October 15, 2021
Gathering primary and secondary data October 22, 2021

14
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Preparing task1, task2 and task3 for the research October 24, 2021
Developing questionnaire November 18, 2021
Data collection from questionnaire December 18, 2021
Data analysis December 30, 2021
Finalizing research December 29, 2021
Research submission December 29, 2021

Section Five: Research approach and methodologies


Type of research approach and methodologies you are likely to use, and reasons for your
choice: What your areas of research will cover: Research Onion; Sample Strategy/Method;
Sample Size
Research Onion
(Positivism, Deductive, Survey, Mono Method, Cross-sectional, Data collection, Data
Analysis)
Reference List
gartner. 2022. remote-work. [ONLINE] Available
at: https://www.gartner.com/en/information-technology/glossary/remote-work. [Accessed
14 January 2022].
collinsdictionary. 2022. security. [ONLINE] Available
at: https://www.collinsdictionary.com/dictionary/english/security. [Accessed 14 January
2022].
editage. 2022. background-of-your-study. [ONLINE] Available
at: https://www.editage.com/insights/how-to-write-the-background-of-your-study.
[Accessed 14 January 2022].
spica. 2022. remote-work-advantages-disadvantages. [ONLINE] Available
at: https://www.spica.com/blog/remote-work-advantages-disadvantages. [Accessed 14
January 2022].
isixsigma. 2022. problem-statement. [ONLINE] Available
at: https://www.isixsigma.com/new-to-six-sigma/getting-started/how-to-write-an-
effective-problem-statement/. [Accessed 14 January 2022].
study. 2022. research-questions. [ONLINE] Available
at: https://study.com/academy/lesson/writing-research-questions-purpose-examples.html.
[Accessed 14 January 2022].

15
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
editage. 2022. research-objective. [ONLINE] Available
at: https://www.editage.com/insights/what-is-research-objective. [Accessed 14 January
2022].
editage. 2022. scope-and-delimitations-study. [ONLINE] Available
at: https://www.editage.com/insights/what-meaning-scope-and-delimitations-study.
[Accessed 14 January 2022].
scribbr. 2022. literature-review. [ONLINE] Available
at: https://www.scribbr.com/dissertation/literature-review/. [Accessed 14 January 2022].
trybugle. 2022. knowledge-gaps. [ONLINE] Available
at: https://www.trybugle.com/blog/how-to-identify-knowledge-gaps-in-your-team.
[Accessed 14 January 2022].
questionpro. 2022. research. [ONLINE] Available
at: https://www.questionpro.com/blog/what-is-research/. [Accessed 14 January 2022].
thesismind. 2022. research-onion. [ONLINE] Available
at: https://thesismind.com/analysis-of-saunders-research-onion/. [Accessed 14 January
2022].
medium. 2022. research-methodology. [ONLINE] Available at: https://medium.com/ma-
leading-design/research-methodology-45871a6e4cc7. [Accessed 14 January 2022].
scribbr. 2022. methodology. [ONLINE] Available
at: https://www.scribbr.com/category/methodology/. [Accessed 14 January 2022].
mackenziecorp. 2022. research-strategy. [ONLINE] Available
at: https://www.mackenziecorp.com/phase-2-clearly-define-research-strategy/. [Accessed
14 January 2022].

Comments and agreement from tutor


Comments (optional):

I confirm that the project is not work which has been or will be submitted for another qualification
and is appropriate.

Agreed Yes ☐ No ☐ Name Date

Comments and agreement from project proposal checker (if applicable)


Comments (optional):

I confirm that the project is appropriate.

Agreed Yes ☐ No ☐ Name Date

16
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Research Ethics Approval Form
All students conducting research activity that involves human participants or the use of data
collected from human participants are required to gain ethical approval before commencing
their research. Please answer all relevant questions and note that your form may be returned
if incomplete.
Section 1: Basic Details
Project title: Impact of security issue on remotely working; a special reference to
Brandix in Srilanka
Student name: Thayalan Odniel
Student ID number: BAT/A-006969
Programme: HND in Computing
School: Esoft Metro Campus
Intended research start date: 14/08/2021
Intended research end date: 30/12/2021
Section 2: Project Summary
Please select all research methods that you plan to use as part of your project
 Interviews: ☐
 Questionnaires: ☒
 Observations: ☐
 Use of Personal Records: ☐
 Data Analysis: ☐
 Action Research: ☐
 Focus Groups: ☐
 Other (please specify): ☐ ................................................................
Section 3: Participants
Please answer the following questions, giving full details where necessary.
Will your research involve human participants?

Who are the participants? Tick all that apply:


Age 12-16 ☐ Young People aged 17–18 ☐ Adults ☒
How will participants be recruited (identified and approached)?
Describe the processes you will use to inform participants about what you are doing:
Studies involving questionnaires:

Will participants be given the option of omitting questions they do not wish to answer?

Yes ☐ No ☒
If “NO” please explain why below and ensure that you cover any ethical issues arising from this.

Studies involving observation:

Confirm whether participants will be asked for their informed consent to be observed.

Yes ☐ No ☒
Will you debrief participants at the end of their participation (i.e. give them a brief explanation of
the study)?

Yes ☐ No ☒

17
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Will participants be given information about the findings of your study? (This could be a brief
summary of your findings in general)

Yes ☐ No ☒

Section 4: Data Storage and Security

Confirm that all personal data will be stored and processed in compliance with the Data Protection
Act (1998)
Yes ☒ No ☐
Who will have access to the data and personal information?
During the research:

Where will the data be stored?


Will mobile devices such as USB storage and laptops be used?
Yes ☒ No ☐
If “YES”, please provide further details:
After the research:

Where will the data be stored?


How long will the data and records be kept for and in what format?
Will data be kept for use by other researchers?
Yes ☐ No ☒
If “YES”, please provide further details:

Section 5: Ethical Issues


Are there any particular features of your proposed work which may raise ethical concerns? If so,
please outline how you will deal with these:

It is important that you demonstrate your awareness of potential risks that may arise as a
result of your research. Please consider/address all issues that may apply. Ethical concerns
may include, but are not limited to the following:
 Informed consent.
 Potentially vulnerable participants.
 Sensitive topics.
 Risks to participants and/or researchers.
 Confidentiality/anonymity.
 Disclosures/limits to confidentiality.
 Data storage and security, both during and after the research (including transfer,
sharing, encryption, protection).
 Reporting.
 Dissemination and use of your findings.

Section 6: Declaration

18
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
I have read, understood and will abide by the institution’s Research and Ethics Policy:
Yes ☒ No ☐
I have discussed the ethical issues relating to my research with my Unit Tutor:
Yes ☒ No ☐
I confirm that to the best of my knowledge:
The above information is correct and that this is a full description of the ethics issues that may arise
in the course of my research.

Name: Thayalan Odniel

Date: 18/01/2021

Please submit your completed form to: ESOFT Learning Management System (ELMS)

19
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
HIGHER NATIONAL DIPLOMA IN
SOFTWARE ENGINEERING
PROJECT PROPOSAL

THAYALAN ODNIEL
BAT/A-006969
IMPACT OF SECURITY ISSUE ON REMOTELY
WORKING; A SPECIAL REFERENCE TO
BRANDIX IN SRILANKA
SUPERVISOR: V.NIRUBAN

20
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Acknowledgement
First of all, I thank God for all the opportunities, trials and strength that have been showered
on me to finish writing the assignment. I experienced so much during this process and this
assignment also helped me in doing a lot of research and I came to know about so many new
things. Not only from the academic aspect but also from the aspect of professionally. First and
foremost, I would like to sincerely thank my lecturer Mr. V.Niruban for the guidance, positive
encouragement and a warm spirit to finish this assignment. It has been a great pleasure and
honor to have him as my lecturer. Secondly, my deepest gratitude goes to all of my family
members. It would not be possible to write this assignment without support from them. I offer
my special thanks to all my friends. May God shower the above-cited personalities with success
and honor in their life.
Yours sincerely,
T. Odniel

21
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Abstract
The pandemic has had a tremendous influence on modern civilization. Millions of individuals
around the world have been forced to remote work, often in temporary workplaces, and with a
range of new, unfamiliar digital technologies in order to stop the virus from spreading. In this
research, researcher look at the security issues that remote working brought up during the
coronavirus outbreak. We've discovered a number of security issues as a result of the facts of
this time period via our work. Lack of remote-working security training, increased stress and
anxiety, hasty technology implementation, and the existence of untrustworthy persons in a
remote-working setting (e.g., in flats haring) can all lead to increased cyber-risk. Moreover,
we've seen that while businesses try to handle these and other hazards provided by remote
workers, employee privacy (including personal information and activities) is frequently
jeopardized. This may be seen in the widespread use of remote monitoring, management, and
surveillance technology in the workplace. Such technologies create a slew of security concerns.
This was a case study in which data were collected through questionnaire. The samples of
respondents were chosen as research participants. The study established that security issue have
a strong and positive effect on remote working.
Keyword: Security issue, remote working

22
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Table of Contents
Acknowledgement ................................................................................................................... 21

Abstract .................................................................................................................................... 22

List of Figure ............................................................................................................................ 25

List of Table ............................................................................................................................. 26

List of Abbreviation and Acronyms......................................................................................... 27

Chapter 01 ................................................................................................................................ 28

1.0 Introduction .................................................................................................................... 28

1.1 Background of the study ................................................................................................ 28

1.2 Problems Statement........................................................................................................ 31

1.3 Research Questions ........................................................................................................ 32

1.4 Research objectives ........................................................................................................ 32

1.5 Justification .................................................................................................................... 32

1.6 Delimitation/Scope......................................................................................................... 32

1.7 Chapter profile ............................................................................................................... 33

Chapter 02 ................................................................................................................................ 34

2.0 Literature review ............................................................................................................ 34

2.1 Knowledge gap .............................................................................................................. 37

Chapter 03 ................................................................................................................................ 38

3.0 Research methodology ................................................................................................... 38

3.1 Research Onion .............................................................................................................. 38

3.1.1 Research philosophy ................................................................................................... 39

3.1.2 Research approaches ................................................................................................... 41

3.1.3 Research strategies ...................................................................................................... 42

3.1.4 Research choice........................................................................................................... 44

3.1.5 Time zone .................................................................................................................... 45

3.1.6 Data Collection & Analysis ........................................................................................ 46

23
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
3.2 Population and Sampling ............................................................................................... 46

3.3 Role of Researcher ......................................................................................................... 47

3.4 Conceptual framework ................................................................................................... 47

3.5 Generalizability .............................................................................................................. 48

3.6 Data collection ............................................................................................................... 48

3.7 Hypothesis Collection .................................................................................................... 48

3.8 Ethical consideration ...................................................................................................... 48

3.9 Time Line ....................................................................................................................... 49

4.0 Conclusion ..................................................................................................................... 50

References ................................................................................................................................ 51

24
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
List of Figure
Figure 1 Working from Home and Having Security Concerns ............................................... 28
Figure 2 Brandix organization in Sri Lanka remote working growth ...................................... 29
Figure 3 Research Onion.......................................................................................................... 38
Figure 4 Conceptual framework .............................................................................................. 47
Figure 5 Time Limit ................................................................................................................. 49

25
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
List of Table
Table 1 Benefits and Drawbacks of remote working ............................................................... 30
Table 2 Chapter profile ............................................................................................................ 33
Table 3 Population and Sampling ............................................................................................ 46

26
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
List of Abbreviation and Acronyms
WFH - Work from home
SI - Security issue
RW- Remote working

27
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Chapter 01
1.0 Introduction
This chapter introduces and contextualizes the study. Its purpose is to describe the research's
basis and motivation, as well as to highlight the study's problem. It provides a background,
research questions, delimitation, and objectives, as well as the study's significance. Finally, it
emphasizes the study's chapter profile.

Figure 1 Working from Home and Having Security Concerns

1.1 Background of the study


The purpose of this research is to provide an analytical and theoretical background to the field
of security issues and how they affect remote working in Brandix in Sri Lanka. Every day,
security concerns are displacing traditional work methods. This is the crucial reference for
anybody looking for guidance on how to pick the correct technology for a job or flexible
working program at the right price. The term "security concern" has been defined in a variety
of ways. Over three decades of work and remote work development, the historical backdrop of
the security issue can be seen. Research indicates employers and employees benefit from
remote work options (Felstead & Henseke, 2017). Employers benefit from a productive and
cost-effective work force and lower costs in terms of building purchase, building, or
maintenance (Felstead & Henseke, 2017). Employees benefit from increased job satisfaction,
job-related wellbeing, and work-life balance (Felstead & Henseke, 2017). Smith et al. (2018)
notes increased productivity, less distractions, higher employee morale, and greater autonomy
for the employee as benefits to remote working. Despite these benefits, it has been noted that
the adoption of remote work has been slower than expected since its origination in the 1970s
(Torten et al., 2016). Employee’s may be hindered by personal preference over their own

28
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
flexibility in work schedule or work-life balance, feeling isolated, and declining relationships
with colleagues (Smith et al., 2018; Torten et al., 2016).
Research indicates that there is a positive correlation between remote working and job
satisfaction, although results varied between those who permanently work remotely and those
who do so in smaller increments (Smith et al., 2018). The positive relationship between these
two variables is linked with personality types and communication channels, as was the case of
Smith et al. (2018), as well as in terms of satisfaction, performance, and productivity, as Torten
et al. (2016) investigated. Studies have outlined variables such as organizational commitment
and enthusiasm for the job contributing to job satisfaction in a remote work environment
(Felstead & Henseke, 2017).
Branches of Brandix The graph below depicts the growth of remote working in Sri Lanka till
November 2021.

SriLanka Brandix organization Remote working


growth
120%
100% 100% 93% 99%
91% 92% 93% 88%
80% 74% 81%
60%
40% 35%
20%
0% Total
47 47 47 47 47 47 47 47 47 47 Linear (Total)
BAI 1 BAI 2 BAI3 BEB BEK BEKA BEN BERA EKALA BEKT
November

Figure 2 Brandix organization in Sri Lanka remote working growth

Several obstacles present themselves within existing research. These include separating remote
workers that exclusively work outside of a traditional work environment from those that only
do so part-time and separating those who voluntarily work remotely from those who do not.
This research focuses on those who have been working remotely at least one day per week for
at least six months since March 2020. Smith et al. (2018) indicates that restricting the criteria
regarding exclusive remote working could significantly influence results. The study will
analyze results based on voluntary versus involuntary remote working individuals.

29
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Table 1 Benefits and Drawbacks of remote working

Potential Benefits Potential Benefits Potential Drawbacks Potential Drawbacks


(Solution Provider) (Employee) (Solution Provider) (Employee)
 Reduced  On-demand  The necessity  The
overall costs availability of making an importance
 Reduced  Self-pacing upfront cost of having
working time  Interactivity  Complications access to
 Consistent  Newly in software technology
delivery of updated and hardware  Tasks that
information information  The have been
 Effective is available employees posted or
remote in a timely workload that may be
working and manner.  The accessed
information importance of online are
management adequate necessary.
systems can content  Social and
transmit and selection and cultural
capture powerful awareness is
technical leadership dropping.
skills. structure
Certification  Acceptance of
and proof of other cultures
completion

30
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
1.2 Problems Statement
Employees in typical remote work spaces rely heavily on their managers. Employees, on the
other side, deserve similar attention. Employee may struggle with knowledge and information.
As a result, they are having difficulty managing their remote work load. Employee in online
curricula, on either side, benefit from one-on-one communication. Traditional remote work is
structured such that one business owns the amount of employee in a certain workplace. Distinct
employees have different working styles and utilize various working strategies. They are
concerned by equality. If the tutor does not treat all of the pupils equally, it will undermine
their self-esteem. As a result, the manager lacks the necessary balance when it comes to treating
employees fairly. For those who want a lot of attention, remote work is the ideal option.
Standardized consideration is emphasized in remote working. In a return back, talents and
abilities deep and thorough and thought are impossible to achieve. Employees are not
encouraged to work the procedures and abilities needed to solve problems by their employers.
The function of the lead is to disseminate information to employees, who then accept it and
retain it in their minds. This style of labor prevents employees from grasping complex topics
and developing lifetime self-work abilities. As a result, they will have difficulty
comprehending subsequent ideas and working. For a more involved environment, hire remote
work support. In the remote environment, the management must accomplish all module
expectations within the allocated time. As a result, employee will choose what to work. The
introduction of a remote working environment was supposed to be a solution, but it hasn't been
able to meet the simultaneous difficulties of rising expectations and quickly changing
environment content.
It suggests that remote working based on information and communication technology might
help branches of Brandix in Sri Lanka enhance their remote working. The conclusion is that
the present concentration on remote working has failed to account for its general lack of
accessibility and cost, and that mixed media technologies should be supported in distant
working. Working has gotten considerably simpler thanks to the internet and digital
technologies, with many individuals and organizations thinking that remote work is far superior
to working in a shared workspace.

31
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
1.3 Research Questions
1) What is the effect of securely enabling access on remote working at Brandix organization in
Srilanka?
2) What are the impacts of security challenges on remote working at Brandix organization in
Srilanka?
3) What are the impacts of an advanced protected environment on remote working at Brandix
organization in Srilanka?

1.4 Research objectives

The main aim of the study was to investigate the impact of security issue on remote working
at Branches of Brandix organization in Srilanka.
1) To establish the effect of securely enabling access on remote working at Branches of Brandix
organization in Srilanka.
2) To determine the impacts of security challenges on remote working at Branches of Brandix
organization in Srilanka.
3) To identify the impacts of an advanced protected environment on remote working at
Branches of Brandix organization in Srilanka.

1.5 Justification
The significance of this study lies in the importance of private organization remote working,
which serve as work production hubs and as one of the most significant indicators for an
organization success. It also lies in disclosing an essential aspect of the function of the SI
process in enhancing remote work. As a result, generating technical expertise and establishing
a work organization are critical.

1.6 Delimitation/Scope
This study has the scope of investigating the impact of the security concern in order to conduct
this research, Sri Lanka’s Brandix organization have selected. It was hoped that this study
would provide valuable insights to the remote working of Brandix organization in Sri Lanka
on the effect of security issue on remote working and challenges in Security issue.

32
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
1.7 Chapter profile
Table 2 Chapter profile

Chapter Contents
Chapter one: Introduction This chapter introduces and contextualizes
the study. Its purpose is to describe the
research's basis and motivation, as well as to
highlight the study's problem. It provides
background information, research questions,
delimitation, and objectives, as well as the
study's importance. Finally, it emphasizes
the study's chapter profile.
Chapter two: Literature review The next chapter provides background for
the significance of this chapter, which is to
locate a literature review, which is a
scholarly publication that incorporates
current knowledge, substantive discoveries,
as well as theoretical and methodological
contributions to a certain area. The
researchers next explain the research's
problem knowledge gap.
Chapter three: Research methodology The relevance of research methods is
discussed in the next chapter. The research
onion, population and sampling, data
collection, the researcher's role,
generalizability, validity and reliability, data
analysis, the conceptual framework, and the
hypothesis statement are all included.
Finally, it discusses ethical issues as well as
technological advancements.

33
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Chapter 02
2.0 Literature review
This chapter will provide background for the significance of this chapter, which is to discover
a literature review, which is a scholarly publication that contains current knowledge, including
substantive discoveries, as well as theoretical and methodological contributions to a specific
area. The researchers next explain the research's problem knowledge gap. Remote working,
also known as working from home or telecommuting (Molino et al., 2020), due to the COVID-
19 and subsequent imposed lockdowns, is now considered by many to be the ‘new normal’
(Davis, Kotowski, Daniel, Gerding, Naylor & Syck, 2020; Williamson, Colley & Hanna‐
Osborne, 2020). This section outlines how remote working has occasionally provided benefits
to some employees, but has also taken away the affordances the office provides while creating
new stressors (for example, where schools are closed during lockdown, employees with
parental responsibilities are also forced to balance work and childcare).
Some research showed benefits of remote working. Bloom, Liang, Roberts and Ying (2015) in
a research study in China found that working from home led to a 13% performance increase.
Home workers also reported improved work satisfaction and their attrition rate halved. An IBM
case study (Heinonen, 2009) found that flexible working increased perceptions of productivity,
with women especially placing high importance on working from home as a benefit. However,
these studies took place before the pandemic, through which remote working was likely
considered an optional benefit.
Research during COVID-19 shows that remote working has resulted in negative impacts to
employee wellbeing and mental health. Some research suggests remote working promotes an
‘always on’ working mode, which encourages mental and physical fatigue (Hernandez, 2020;
Molino et al., 2020).
One study consisting of qualitative interviews of 50 newly working from home employees
suggested that working from home can impact productivity in a negative way (Mustajab et al.,
2020). This reduction in productivity was stated by participants to be due to a number of
reasons, such as multitasking, decreased motivation and childcare responsibilities. Participants
also attributed the decline to psychological issues
(Mustajab et al., 2020).
The Institute of Employment working at home wellbeing survey (Bevan, Mason and Bajorek,
2020) also looked at how working from home was affecting the UK workforce and their mental
health. Participants reported problems with health, aches and pains, diet and exercise, poor

34
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
sleep and increased exhaustion. Half the participants reported not being happy with work life
balance, while 30% felt isolated. The survey found mental health to be even worse in younger
workers (ISE, 2020). King’s College London and Ipsos Mori (2020), in a survey of over 2000
UK residents, found that half of the respondents said they felt more anxious or depressed than
normal, and that 38% have slept less or less well than normal. However, it should also be noted
that during a global pandemic, it is hard to tease out the differences between what are the mental
health costs of working from home and the psychological repercussions of a global pandemic.
Some organisations have used technology to monitor and track employee performance.
Electronic surveillance methods include web browsing activity, email communications, and
the personal information of employees (Blumenfeld, Anderson & Hooper, 2020). The
increased use of these technologies through lockdown poses several challenges to the privacy
of employees. While also represents a form of micromanagement that both limits worker
autonomy and increases job strain (Blumenfeld, Anderson &Hooper, 2020).
Remote working has introduced a number of additional challenges to employees’ effectiveness
and productivity, with employees reporting experiencing communication problems owing to
internet glitches, workplace isolation, not taking breaks like they would in the office,
interruptions and prioritising work too much (Prasad, Rao, Vaidya & Muralidhar, 2020).
Khan, Brohi and Zaman (2020) identified their view on the ‘Top Cyber Security Threats amid
COVID-19 Pandemic’, highlighting cyber security threats that have either increased or been
adapted as a result of pandemic conditions. Many organisations have seen an increase in
Distributed Denial of Services (DDoS) attacks. There has been an increase in malicious
domains using words such as ‘corona-virus’ and malicious websites. Cyber criminals are also
taking advantage of the current situation by spreading Malware, Spywares, and Trojans,
launching ransomware attacks and sending out spam email. Furthermore, attackers are sending
Information apps. Attackers are also using business email compromise scams by using
coronavirus disease as a tool (Khan et al.,2020), as part of the wider trends whereby cyber
criminals have taken advantage of the situation and have been targeting vulnerable people and
systems (Pranggono & Arabo (2020). These diverse range of issues have put an enormous
strain on the cyber security industry and the respective information security departments and
staff inside organisations.
In 2019, Nominet released a survey concerning Chief Information Security Officers (CISOs)
stress and wellbeing. The survey demonstrated that CISOs are generally under high levels of
stress that impact both their mental and physical health. CISOs also reported working beyond

35
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
contracted hours, not taking holiday or sick leave. This then negatively impacts the
organisation, as stress prevents CISOs from performing efficiently and can result in burnout
(Nominet, 2019). During COVID-19 this stress and these long hours are very likely to have
increased (Salari et al., 2020).
Limited relevant cyber security awareness relating to remote working have also been
highlighted as a potential challenge to cyber security. Cyber security practices in the home are
different from those in the office, therefore employees need to be made aware of and trained in
new behaviours and practices they may need to adopt. Johnston, Wech, Jack and Beavers
(2010), in a survey of over 500 remote and in-office employees, found some factors that
contributed to information security policy compliance and compliance differences between
remote and in-house employees. The study found that remote employees differ from office
employees in their perceived levels of security and privacy policy awareness, self-efficacy, and
compliance intentions. These findings suggest that the lack of support (be it verbal,
demonstrative, or material-based) reduces remote employees’ ability for awareness of security
and privacy policies within their organisations and their ability to comply with such policies
(Johnston et al., 2010). This is also supported by previous work demonstrating how the
‘remote-worker status’ can lead to diminished information security awareness (Johnston,
Wech, & Jack, 2000).
Other researchers have argued that working from home increases the risk of (usually
unintentional) insider threats. Research claims that a third of surveyed organisations had
experienced a cyber-attack as a direct result of an employee working outside of the businesses'
security perimeter (Cybsafe, 2018). Chapman 2020 argues that working from home may cause
the same issues as ‘bring your own device’, or BYOD, policies. If employees are working on
a personal device, the device should be secured with a company-sanctioned level of
Anti-virus software and password protection technologies. Furthermore, malicious cyber actors
are taking Advantage of the pandemic and targeting home workers in an attempt to steal
information (Chapman, 2020).
In terms of potential guidance to employees, Okereafor and Adebola (2020) make some
recommendations for staying secure in light of COVID-19 themed malicious cyber activity.
They suggest individuals: test commercial websites before making payments, be vigilant to
phishing emails and other social engineering techniques, install anti-malware software, avoid
clicking on suspicious web addresses and URLs, verify information sources about coronavirus,
and back up data.

36
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Kritzinger and von Solms (2010) propose the E-Awareness Model (E-AM) to overcome issues
of information security awareness with remote working. The authors suggest that home users
can be forced to acquaint themselves with the risks involved in venturing into cyberspace, by
being forced to take information security modules online. However, this model does not
necessarily mean users would be more likely to comply with organisational policies, as
awareness does not always lead to behavioural change (Bada, Sasse & Nurse, 2019; Ertan et
al., 2018). Furthermore, employees may respond negatively to enforce training, reducing their
trust with the organisation. Researchers have suggested that information security knowledge
and awareness, once developed in the workplace, is transferred to the home environment
(Talib, Clarke & Furnell, 2013). The authors suggest that this learning strategy presents an
opportunity to move away from organizational awareness programs and to move towards
awareness raising strategies that will develop an all-round individual security culture for users
independent of whether they work in the office or remotely (Talib et al., 2013).

2.1 Knowledge gap


Learning about remote working is crucial in Sri Lanka, however there aren't enough research
articles submitted. According to the researcher, this study will potentially fill this need.

37
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Chapter 03
3.0 Research methodology
The relevance of research methods is discussed in the next chapter. The research onion,
population and sampling, data collection, the researcher's role, generalizability, validity and
reliability, data analysis, the conceptual framework, and the hypothesis statement are all
included. Finally, it discusses ethical issues as well as technological advancements. (study.com,
2022)
3.1 Research Onion

Figure 3 Research Onion

38
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
3.1.1 Research philosophy
Research philosophy is concerned with the origins, nature, and evolution of knowledge. A
research philosophy is a set of beliefs about how evidence on a topic should be gathered,
processed, and utilized. Although the concept of knowledge production may appear to be
substantial, researcher are already doing it as part of your dissertation research. To answer the
research topic, researcher will gather secondary and primary data and conduct data analysis,
which will result in the development of new knowledge. Throughout the research process,
assumptions regarding the sources and nature of information are made. The author's major
assumptions will be reflected in the research philosophy, and these assumptions will serve as
the foundation for the research plan. In general, there are several fields of research philosophy
that are connected to a wide range of subjects. There are four primary research philosophies in
the field of business studies in particular:
 Pragmatism
 Positivism
 Realism
 Interpretivism
Pragmatism
Only notions that assist action are considered important by the pragmatist research philosophy.
"Recognize that there are many diverse ways of perceiving the world and doing research, that
no single point of view can ever present the complete picture, and that there may be numerous
realities," according to pragmatics.
Positivism
Positivism holds that only "factual" information derived from observation (the senses),
including measurement, is reliable. The researcher's function in positivist studies is confined
to data collecting. Positivism is based on observable data that can be analyzed statistically.
Realism
The realism research philosophy is based on the premise that reality is separate from the human
mind. This philosophy is founded on the premise that knowledge is produced in a scientific
manner. Direct and critical realism are the two types of realism.
Direct realism: "What researcher see is what researcher get" is how naïve realism, often known
as "what researcher see is what researcher get," is described. In other words, direct realism
depicts the world through the eyes of the individual.

39
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Critical realism: maintains, on the other hand, that people do experience real-world
experiences and pictures. Sensations and pictures of the actual world, according to critical
realism, can be deceiving and seldom depict the real reality.
Critical realists, on the other hand, acknowledge that our senses and other variables might come
in the way of our ability to explore reality. As a result, critical realists could remark that squares
A and B have the same hue.
Direct realists believe that the world is largely stable. They are solely interested in one level,
whether it is a person, a group, or an organization. Critical realists, on the other hand, recognize
the value of multi-level investigation. As a researcher who adheres to the critical realism
research philosophy, researcher must recognize the effect and interdependence of the person,
the group, and the organization.
Interpretivism
Interpretivism, also known as interpretivism, entails researchers interpreting study materials,
so incorporating human interest into a study. "Interpretive scholars think that the only way to
access reality (given or socially built) is through social creations like language, awareness,
shared meanings, and tools," according to the study. The critique of positivism in the social
sciences served as the foundation for the development of interpretivist philosophy. As a result,
qualitative analysis takes precedence over quantitative analysis in this philosophy.
Justification
Positivist research implies that knowledge exists outside of the research subject. Researcher
going to do some study on "Key security considerations when working remotely." Positivism
examines and tests the hypothesis before arriving at a conclusion. Positivism considers personal
experience to be a reliable source of information. However, many fundamental and vital
notions like causation, time, and space are not founded on personal experience. It is a procedure
that has been scientifically examined. Observation and analysis are used in direct realism
analysis. Experience, according to critical realism, is feelings, or pictures of real things, rather
than the objects itself. The norms, procedures, and values were the focus of Interpretivism. In
quantitative research, these are not taken into account. Positivism implies that all forms of
processes may be viewed as a variant of individual behavior or working relationships.
Successful implementation of positivism has been challenged as being too dependent on the
status quo. To put it another way, study findings are just descriptive, thus they don't provide
insight into complex topics. Based on work of several scholars in the field of RW, researcher
have primarily covered the security, future problems, and positives of remote working (RW)

40
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
in this study article. All of the applications researcher looked into were from the Brandix
organization. Positivism is a philosophical philosophy that claims that specific ("positive")
knowledge is founded on phenomena, their aspects, and their relationships. Empirical evidence
is data (positive truth) that has been verified using the senses. As a result, positivism is
established on remote working.

3.1.2 Research approaches


The study strategy and technique consists of a series of phases that progress from general
assumptions to specific data collecting, analysis, and interpretation methods. As a result, it is
reliant on the nature of the research topic being addressed as well as the rationale for the choice.
The major difference between deductive and inductive techniques is the applicability of
hypotheses to the research.
Deductive research
"Developing a hypothesis (or hypotheses) based on existing theory, and then constructing a
research method to test the hypothesis" is what a deductive approach is all about.
"Deductive reasoning" is defined as "reasoning from the specific to the universal." If a theory
or a case example appears to imply a causal relationship or link, it may be accurate in many
circumstances. A logical design may be used to investigate if this relationship or link held true
in more general situations."
Hypotheses, which may be derived from the theory's premises, can be used to describe the
deductive process. To put it another way, the deductive method is concerned with drawing
conclusions from premises or assertions.
Induction begins with observations and aims to discover a pattern within them, whereas
deduction begins with observations and seeks to find a pattern within them.
Deductive approach offers the following advantages:
Explaining causal links between ideas and variables is possible.
Quantitative measurement of ideas is possible.
Possibility of generalizing research results to some extent.
Inductive research
The inductive technique, also known as inductive reasoning, begins with observations, and
hypotheses are presented as a result of observations at the conclusion of the research process.
"The search for pattern from observation and the creation of explanations – theories – for those
patterns through a sequence of hypotheses" is what inductive research entails. Inductive

41
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
investigations do not need any theories or hypotheses at the start of the research process, and
the researcher is free to change the path of the study once it has begun.
It is critical to emphasize that using an inductive method does not mean ignoring theories when
developing research questions and objectives. The inductive approach aims to generate
meaning from the data set collected in order to identify patterns and relationships in order to
construct a theory; however, the inductive approach does not preclude the researcher from
formulating the research question to be investigated using existing theory. Learning through
experience is the foundation of inductive thinking. In order to derive conclusions, patterns,
resemblances, and regularities in experience are observed.
Justification
The influence of security concerns on remote working is the theme of my research. The
researcher formulates a set of hypotheses at the outset of the study while using a deductive
approach. The hypotheses are then tested using applicable research methodologies to determine
if they are correct or incorrect. "Top to bottom" research is a deductive research strategy. This
is why researcher decided to do my study using a deductive technique. The effect of a security
issue on remote workers, as well as natural events that are linked to a problem that already
exists.

3.1.3 Research strategies


The essential components of a research project are introduced in a research strategy, such as
the study topic area and emphasis, as well as the research perspective. The study design, as
well as the methodologies of research researcher began to choose your research subject,
construct your research statement, and consider potential research questions in the first half of
this course (s). While researcher may have certain research questions or objectives in mind, it's
conceivable that you're unsure of the best technique to use to answer those questions at this
time.
Case Study: This concentrates on a detailed analysis of a single case or a small group of
instances. In general, case study research seeks information from a variety of sources and
employs a variety of data formats, including observations, surveys, interviews, and document
analysis. Data can be either qualitative or quantitative, or a combination of the two. Case study
research provides for a comprehensive and multifaceted examination of a topic or issue.
Qualitative interviews: Qualitative interviews come in a variety of formats (structured, semi-
structured, and unstructured), and they are the most extensively utilized data collection

42
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
approach. Interviews provide access to a wealth of information. They need substantial planning
in terms of the structure's construction, judgments regarding who and how to interview,
whether to do individual or group interviews, and how to analyzing and interpreting the
interviews. Interviewees must possess a diverse set of abilities, including strong social,
listening, and communication skills. Interviews take time to conduct, and they are prone to
errors and biases that must be eliminated at the design stage.
Quantitative survey: This is a common strategy in research study since it offers access to a
large number of people. The widespread and low-cost distribution of surveys, as well as the
management of replies, is made possible by the availability of web sites. Although creating
questions may look simple, creating a relevant questionnaire that allows researchers to answer
research questions is complex. Questionnaires must be appealing to responders and cannot be
excessively extensive, obtrusive, or difficult to comprehend. They must also correctly measure
the problem under inquiry. For these reasons, it's also a good idea to employ surveys that are
currently on the market and have been fully verified wherever feasible.
Action-oriented research: This is a type of practical business study that is aimed at bringing
about a change or producing change suggestions. Action-oriented research is a collaborative
approach that combines theory and practice, as well as action and reflection, together. Insiders
are frequently involved in the project. This is because it is based on the requirement to actively
engage participants in order for them to create project ownership. Participants will have to put
the modification into action when the project is completed.
Experiment: is a type of traditional research in which the researcher manipulates one variable
while controlling or randomizing the others. It includes a control group and only tests one effect
at a time. In this situation, tactics such as sample selection and research of the influence of
interaction on a certain process, model, or other experimental methodology that might lead to
beneficial discoveries are also included.
Justification
Quantitative research is used to quantify actions, views, attitudes, and other characteristics in
order to generate broad generalizations based on a wider population. In quantitative research,
measurable data is used to express facts and identify trends. The outcomes of this sort of study
are derived using statistical and mathematical instruments. Quantitative data will conclude on
a problem's purpose and grasp how prevalent it is by searching for outcomes that can be
extrapolated to a broader population while attempting to quantify it. Online, print, mobile, and

43
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
kiosk surveys; online polls; systematic observations; face-to-face interviews, phone interviews,
and so on are all examples of this data collecting strategy.

3.1.4 Research choice


Mono method
A monomethod research employs only one method, either quantitative or qualitative. In a
quantitative research, the data is usually in numerical form, and it is examined using
quantitative data analysis tools.
In a monomethod study, just one method is used, either quantitative or qualitative. In a
quantitative research, the data is usually in numerical form, and it is examined using
quantitative data analysis tools.

Mix method
The phrase "mixed methods" refers to a newly developed research approach that promotes the
systematic integration, or "mixing," of quantitative and qualitative data within a single study
or long-term research program. The underlying idea of this technique is that integrating
quantitative and qualitative data gathering and analysis allows for a more full and synergistic
use of data than separate quantitative and qualitative data collection and analysis. Mixed
methods research has lately extended into the health and medical sciences, including nursing,
family medicine, social work, mental health, pharmacy, allied health, and other professions. Its
methodologies have been created and modified over the previous decade to fit a wide range of
research issues.
Multi method
When two or more research projects, each complete in itself, are done to answer research
questions and/or hypotheses, a subject, or a program, this is known as multiple methods or
multi-method design. The investigations may use a combination of quantitative, qualitative, or
both methodologies, similar to mixed methods research. The projects can be implemented in
either a parallel or sequential manner. Unlike mixed methods research, each study project is
individually designed and carried out to address a specific sub-question.
Justification
The two methods of data collecting must be followed by multimethod and mixed methods.
However, there is an alternative method that differs from one to the next. It means that if the
researcher uses the mixed technique, they must gather data in both ways, but they must

44
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
eventually shift the path for data selection. In addition, the researcher used Multi approach
since they need to gather data in both directions and analyze the data. However, because to the
nature of my issue, researcher must use both quantitative and qualitative data gathering
methods. Researcher, and my project is called "Impact of Key Security Concerns When
Working Remotely," and it's a quantitative project. As a result, choose for the mono method,
because data is collected in just one way, which is the quantitative data gathering technique.

3.1.5 Time zone


Cross sectional
Cross-sectional and the longitudinal studies are observational studies. This means that
researchers record information about their subjects without manipulating the study
environment. In our study, researcher would simply measure the cholesterol levels of daily
walkers and non-walkers along with any other characteristics that might be of interest to us.
Researcher would not influence non-walkers to take up that activity, or advise daily walkers to
modify their behavior. In short, we’d try not to interfere.
The defining feature of a cross-sectional study is that it can compare different population
groups at a single point in time. Think of it in terms of taking a snapshot. Findings are drawn
from whatever fits into the frame.
Longitudinal study
A longitudinal study is observational, just as a cross-sectional one. As a result, researchers do
not interact with their participants once again. A longitudinal study, on the other hand, involves
researchers making multiple observations of the same people over a lengthy period of time,
possibly many years.
A longitudinal study has the advantage of allowing researchers to detect changes in the features
of the target population at both the group and individual level. The important thing to remember
is that longitudinal studies go beyond a particular point in time. As a result, they can create
scenario.
Justification
A cross-sectional research design has the advantage of allowing researchers to compare many
variables at once. With little or no additional expense, researcher could, for example, look at
age, gender, income, and educational level in connection to walking and cholesterol levels. As
a result, researcher conducting research in a quantitative method, and researcher also
conducting this study at a high national diploma level. As a result, researcher limited to brief

45
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
time intervals. That is why researcher chose a Cross-sectional Time Horizon study horizon for
a brief timeframe.

3.1.6 Data Collection & Analysis


Primary data
Researcher was received from the original information source. The original data were more
dependable and had a higher level of decision-making confidence, with the trusted analysis
having a direct link to the events' occurrence. The working environment of industries
(observation, images, and photographs) and industry employees (management and bottom
workers) are the key data sources (interview, questionnaires and discussions).
Secondary data
A desk review was done to gather information from a variety of secondary sources. Reports
and project materials from each industrial sector are included (more on medium and large
level). The remaining data came from the firms' manuals, reports, and some management
documents that were included in the desk review. Secondary data sources were gathered from
OSH literatures, and the remaining data came from the companies' manuals, reports, and some
management documents. On the manufacturing industry sectors, reputable journals, books,
various articles, periodicals, conferences, magazines, newsletters, newspapers, websites, and
other sources were evaluated. For the review, data was also gathered from existing working
documents, manuals, procedures, reports, statistical data, policies, regulations, and standards.
In general, for this research study, the desk review has been completed to this end, and it had
been polished and modified upon manuals and documents obtained from the Brandix
Organization.
Researcher used latest version of SPSS tool for data analyzing part of this study.
3.2 Population and Sampling
Table 3 Population and Sampling

No Target Audience Population Sampling

1 Brandix HQ 110 30
2 InQube Capital (Pvt) Ltd 75 20
3 Brandix Corporate Campus 50 15
4 Fortude (Pvt) Ltd 30 5
5 Total 265 70

46
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
Brandix Organization in Sri Lanka provided the information. 110 employees were chosen as
the population at Brandix HQ, and sample was taken from 30 of them, whereas 75 employees
were chosen as the population at InQube Capital (Pvt) Ltd, and sampling was taken from 20 of
them. At Brandix Corporate Campus, 50 employees were chosen and 15 samples were
collected. Finally, 30 employees from Fortude (Pvt) Ltd were chosen as the population, and
data from 5 of them was obtained as sampling. To collect data, 265 workers from four Brandix
Organization branches, as well as 70 samples of respondents, were chosen as research
participants for the instructional study.

3.3 Role of Researcher


In this study, the researcher is doing research in order to address a classic study problem. The
researcher has picked a study topic for this purpose. Then researcher looked for research
sources to create a research topic that was in line with my theory. The data for this study was
obtained after the researcher created the research topic. After then, the researcher evaluated the
data that had been obtained. Finally, the researcher came to a conclusion and made a
suggestion. For this investigation, the researcher has used a quantitative research guided by a
conceptual model helps to clarify the systematic role of the quantitative research.

3.4 Conceptual framework


This section assesses a framework that was utilized in the study to investigate the impact of SI
on remote working.

Figure 4 Conceptual framework

47
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
3.5 Generalizability
The term "generalizability" refers to the capacity of a researcher's experimental results to be
applied to other similar social environments and sectors. The findings of this study are also
applicable to the medical business.

3.6 Data collection


The practice of gathering information from the Brandix organization in Sri Lanka is known as
data collection. The researcher used two approaches to acquire data for this investigation. The
primary way of data collecting entails gathering information from first-hand sources. The
primary data for this study was collected using a survey and a questionnaire. Another technique
is secondary data collection, which refers to data that has previously been collected and
processed by someone else. For secondary data collecting, the researcher used books,
periodicals, and newspapers.

3.7 Hypothesis Collection


Q1: What is the effect of securely enabling access on remote working at Brandix organization
in Srilanka?
H0: There is no significant relationship between enabling access and remote working.
Ha1: There is a significant relationship between enabling access and remote working.

Q2: What are the impacts of security challenges on remote working at Brandix organization in
Srilanka?
H0: There is no significant relationship between security challenges and remote working.
Ha1: There is a significant relationship between security challenges and remote working.

Q3: What are the impacts of an advanced protected environment on remote working at Brandix
organization in Srilanka?
H0: There is no significant relationship between advanced protected and remote working.
Ha1: There is a significant relationship between advanced protected and remote working.

3.8 Ethical consideration


One of the most essential aspects of the research is the ethical considerations. It aids in the
preservation of study participants' privacy, which must be guaranteed. This research was
conducted without discrimination based on likes, dislikes, gender, age, or any other factor.

48
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
3.9 Time Line

Figure 5 Time Limit

49
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
4.0 Conclusion
The inquiry indicates that the researcher used statistical parametric analysis, and our findings
clearly show that effective security concerns have a major and favorable impact on remote
working at Brandix in Sri Lanka.
The following are the effects of the security issue on remote working at the Brandix
organization in Sri Lanka:
 Improved Accessibility
 Cost-cutting on travel
 Personalization
 Workflow disruption is kept to a minimum.
 Increased Productivity and Time Savings
 Consistency is something that researcher should learn.
 Streamlined Training Procedures
The researchers came to the conclusion that effective security concerns play an essential part
in improving performance and, as a result, will lead to the success of remote working at Brandix
in Sri Lanka.

50
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
References
gartner. 2022. remote-work. [ONLINE] Available
at: https://www.gartner.com/en/information-technology/glossary/remote-work. [Accessed
14 January 2022].
collinsdictionary. 2022. security. [ONLINE] Available
at: https://www.collinsdictionary.com/dictionary/english/security. [Accessed 14 January
2022].
editage. 2022. background-of-your-study. [ONLINE] Available
at: https://www.editage.com/insights/how-to-write-the-background-of-your-study.
[Accessed 14 January 2022].
spica. 2022. remote-work-advantages-disadvantages. [ONLINE] Available
at: https://www.spica.com/blog/remote-work-advantages-disadvantages. [Accessed 14
January 2022].
isixsigma. 2022. problem-statement. [ONLINE] Available
at: https://www.isixsigma.com/new-to-six-sigma/getting-started/how-to-write-an-effective-
problem-statement/. [Accessed 14 January 2022].
study. 2022. research-questions. [ONLINE] Available
at: https://study.com/academy/lesson/writing-research-questions-purpose-examples.html.
[Accessed 14 January 2022].
editage. 2022. research-objective. [ONLINE] Available
at: https://www.editage.com/insights/what-is-research-objective. [Accessed 14 January
2022].
editage. 2022. scope-and-delimitations-study. [ONLINE] Available
at: https://www.editage.com/insights/what-meaning-scope-and-delimitations-study.
[Accessed 14 January 2022].
scribbr. 2022. literature-review. [ONLINE] Available
at: https://www.scribbr.com/dissertation/literature-review/. [Accessed 14 January 2022].
trybugle. 2022. knowledge-gaps. [ONLINE] Available
at: https://www.trybugle.com/blog/how-to-identify-knowledge-gaps-in-your-team.
[Accessed 14 January 2022].
questionpro. 2022. research. [ONLINE] Available
at: https://www.questionpro.com/blog/what-is-research/. [Accessed 14 January 2022].

51
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project
thesismind. 2022. research-onion. [ONLINE] Available at: https://thesismind.com/analysis-
of-saunders-research-onion/. [Accessed 14 January 2022].
medium. 2022. research-methodology. [ONLINE] Available at: https://medium.com/ma-
leading-design/research-methodology-45871a6e4cc7. [Accessed 14 January 2022].
scribbr. 2022. methodology. [ONLINE] Available
at: https://www.scribbr.com/category/methodology/. [Accessed 14 January 2022].
mackenziecorp. 2022. research-strategy. [ONLINE] Available
at: https://www.mackenziecorp.com/phase-2-clearly-define-research-strategy/. [Accessed
14 January 2022].

52
THAYALAN ODNIEL (BAT/A-006969) Computing Research Project

You might also like