You are on page 1of 19

Sir, I commend your delivery on this article in the scheduled 24hours.

It is like you are already


familiar with the project topic. I am impressed and happy. This implies we are going on this
journey to the end hopefully.

My view on the Methodology are below for your further and urgent action please. I would be
glad to have the reviewed methodology on Sunday so I can hopefully see my supervisor on
Monday.

The Methodology should not just be qualitative as it may be classified as Information Science
rather than Computing Science. Can we inject a level of quantitative in this journey towards
the development of a Success Prediction System?

Please refer to the list of observations for inclusions at the end of the write up. They would go
a long way to strengthen this submission. The flowcharts and database structure are especially
important.

The items in red in the body of text also needs your attention.

CHAPTER THREE

RESEARCH METHODOLOGY

3.1 Introduction:

This chapter outlines the methodology adopted for the development of the success prediction
model for cloud computing adoption at the organizational level in Nigeria. The research
methodology is crucial in ensuring the validity, reliability, and effectiveness of the developed
model. This section presents the overall approach, data collection methods, data analysis
techniques, and the steps involved in the development and validation of the model
3.2 Research Design:

This study adopted a systematic literature review as the methodological technique for handling
the material. Additionally, a qualitative research strategy was utilized. A systematic literature
review involves the analysis of existing publications to extract information. This process include
identifying relevant and related topics and drawing conclusions that are supported by credible
and reliable evidence. The aim is to provide a basis for extracting required data, policy-making
and practical applications. The implementation of a meticulous audit strategy was crucial for this
review, as it sought to uncover as much relevant research as possible pertaining to the research
questions, and employ explicit methods to determine what can be reliably concluded based on
these reviews.

Following an extensive examination of several qualitative research strategies, the multi-case


study approach was determined to be the most appropriate and was chosen for this study. Case
studies are research methodologies that include the thorough examination of a representative
occurrence known as the case. Yin (2019) defines case studies as empirical investigations that
examine a phenomena inside an actual environment, using different sources of information. Case
studies may be classified as either quantitative or qualitative research, depending on the nature of
the investigation (Yin, 2019). This study employs a research strategy that mostly relies on
qualitative data, as supported by the reasons stated in the previous paragraphs. The increasing
use of case studies as a research design is due to several benefits associated with this strategy,
many of which are in line with the needs of this study and the features of the research topic.

3.2.1 Literature Review Approach

A comprehensive search of literature was conducted using reputable academic databases such as
PubMed, ScienceDirect, Google Scholar, and other authorized sources. The search was
conducted using key terms derived from the PICO approach, which is often used in qualitative
research. In this technique, the letter P represents the study population, I represents the
intervention being examined, C represents the comparison being made, and O represents the
result of interest. The focal points of discussion were cloud computing adoption, the
development of a success prediction model, and the cloud computing adoption at organizational
level in Nigeria.

As a result of using a thorough search strategy, a substantial amount of data was discovered. To
minimize redundancy and extraneous details, this research focuses on pertinent sections of each
article and the primary material studied. Therefore, this review used exact writing as an
evaluative tool. The method included the implementation of a systematic strategy, which
included the consideration of recent evaluations conducted by scholars and the exclusion of
papers without complete content. Furthermore, the researcher conducted a comprehensive
analysis of the collected data, ensuring reliability and validity via rigorous methodological
procedures. Based on this analysis, a conclusion was drawn to address the research questions.

3.2.2 Qualitative Research

This research is aimed at understanding the development of a success prediction model for cloud
computing adoption at organizational level in Nigeria. Thus, in understanding the context
specific meanings and actions of cloud computing experts, the research takes into cognizance
that ‘reality’ is socially constructed by subjective responses by these cloud computing
professionals. It is for this reason that a qualitative research underpinned by a constructivist
ontology and an interpretivist epistemology are deemed more appropriate and used to guide the
research strategy and techniques of this study. According to Pink et al. (2013, pg 2-3), “deeper
understandings of the realities and lived experiences of those within the industry would enable
problems to be reframed in ways which account for both the specificities of the contexts to which
they relate and the socialities, materialities and experiences through which they unfold”.

3.3 Target Population

This study primarily targets organizations that have experience with cloud adoption. The target
audience consists of a heterogeneous collection of persons, including cloud computing experts,
AI and machine learning professionals, and administrators. These individuals are computer
experts and play a vital role in developing and implementing a comprehensive model for cloud
computing adoption at the organizational level and especially for businesses in developing
countries which may be a complex and demanding task.

By developing this comprehensive model, organizations will be equipped with a structured


approach to assess their readiness for cloud adoption, identify potential challenges, and develop
an effective implementation plan. The model will serve as a valuable resource for organizations
seeking to fully leverage the potential of cloud computing and enhance their overall
performance.

The model therefore aims to provide proper technical guidance and financial advice for
organizations seeking to effectively leverage cloud computing capabilities to enhance their
operations and achieve their business goals. It will weigh cloudless running costs versus running
costs if cloud computing is adopted and predict the success rate for any given organization.

3.4. Inclusion and Exclusion Criteria:

3.4.1 Identification of Search Terms and Data Collection Methods

A comprehensive search will be conducted in the scienceDirect database, PubMed, and Google
Scholar databases. The research topic was explored via the use of search terms: cloud computing
adoption, the development of a success prediction model, and the cloud computing adoption at
organizational level in Nigeria.

Our literature list is limited to 2013 - 2024. At the outset of the investigation, the completed
content produced a substantial amount of information that included topics outside the scope of
this thesis.

The inquiry question was formulated using the Population, Intervention, Comparison, Outcomes
(PICO) methodology. The strategy is a methodological approach used to establish a rigorous
research framework and originated at Oxford. The acronym PICOs stands for Population,
Intervention, Comparison, and Outcomes, which serves as a condensed approach. The PICO
technique is a good approach to dissect a research subject into distinct and searchable
components. The individual components are searched in isolation and afterwards combined.

A literature search was conducted using the PubMed, Google Scholar, and ScienceDirect
databases. The search phrases used were "cloud computing adoption," "development of a success
prediction model," and "cloud computing adoption at organizational level in Nigeria." The
searches were first conducted in a random manner, without specific criteria, and then narrowed
down by restricting the timeframe to the years 2013 to 2023.

cloud computing adoption, the development of a success prediction model, and the cloud
computing adoption at organizational level in Nigeria.

3.4.2 Database search, inclusion and exclusion criteria of articles / Data:

Step 1: Identified all relevant material using the search phrase "cloud computing adoption" as the
primary focus of the study, then conducted a "general review" to gather other information
pertaining to the central topic.

In the second step, the text was examined for the presence of the phrase "cloud computing
adoption at organizational level in Nigeria" as the primary topic of interest in this study.

Step 3: Conducted a search using the keywords "the development of a success prediction model"
in order to get comprehensive information pertaining to the main subject matter at hand and to
focus the collection of data for the study. In Step 3, the keyword phrases were conjoined using
the coordinating conjunction "AND." Furthermore, the search query used the inclusive term
"cloud computing adoption in Nigeria" to provide the desired result.

A search conducted on the PubMed database yielded a total of 191 publications related to the
topic of "cloud computing adoption." Similarly, a search for "the development of a success
prediction model," resulted in 115 articles, a search for "cloud computing adoption at
organizational level in Nigeria" generated 108 articles. The same search phrases were used inside
the ScienceDirect database, resulting in a retrieval of more than 600 items. In addition, a search
using comparable phrases was conducted on Google Scholar, yielding more than 1,000 papers.
The researcher intentionally excluded irrelevant factors in order to get a manageable dataset that
aligns with the scope and capabilities of this study. Tables 3.1 and 3.2 provide the findings
pertaining to the listed items.

Table 3.1: Database search results

Database Date of Number Number of Number Number of Number of


Search of Duplicates of articles full
Search articles qualified for content/subst
Results qualified secondary antial articles
for inclusion available
Primary Criteria
inclusion
Criteria

Pub med 03-02-2024 1034 328 51 21 18

(2013 -
2023)

Googlesch 30-02-2024 1534 306 53 18 17


olar

(2013 -
2023)

ScienceDi 01-02-2024 914 274 32 16 9


rect

(2013 -
2023)
Table 3.2. Inclusion and Exclusion criteria

Consideration Criteria Prohibition Criteria

I. Scholastic /academic journal I. Title

II. Reference acessibility II. Abstract

III. Full Content/ text III. Discussion

IV. Articles of cloud computing adoption in


domains other than the development of a success
IV. Literatures published between 2013 – 2023 prediction model.

V. Most recent articles were favored, release

earlier than or on year 2023 V. Articles not from scholastic or academic

VI. Subjective and quantitative databases

VI. Articles with advantages and disadvantages


VII. Literatures corresponding to research cloud computing adoption.

question

VIII. Must be extracted from authorized VII. Articles with publication year later than

academic data pages 2013.


II. Literatures’ objective must be related with

the objective of this study

III. Articles with full texts and abstract

IV. Qualitative and quantitative research

articles.

3.4.2.1. PRISMA stream chart

During the keyword search, a total of 222 articles were identified. In order to identify the most
relevant and informative articles for this survey, several necessary and optional inclusion criteria
were used. The discovered restrictions pertaining to years and titles associated with the article's
appearance amounted to a total of 54.

At that juncture, the supplementary criteria for selection included papers that exhibited
subjectivity and quantifiability, were of recent release, had dynamism, were readily available,
and contained pertinent data in accordance with the research inquiry. After the application of
these criteria, a total of 12 items were excluded. The final viewpoint was to regulate the selection
of items that would be made fully open and available for readers. Following the observation of
that particular point, just five papers remain that are capable of addressing the research question.

Scientists are required to develop a methodology for effectively managing literature in order to
facilitate efficient identification of relevant research materials. The aforementioned approach
was used in the identification of significant resources. The titles and revised compositions of the
inquiry underwent a two-phase screening process.
3.4.2.2. Systematic Selection Process

A total of 110 articles were identified using a systematic selection process, whereby the search
was restricted to the appropriate year and duplicate entries were eliminated. There were a total of
54 duplicates. After eliminating all instances of duplication, the 110 articles underwent a two-
step screening process based on their titles and abstracts. The Prisma flow chart provides a
comprehensive visual representation of the procedures involved in the inclusion and exclusion
process. During the first stage of the procedure, a screening was conducted to ensure that the
articles selected were written in English and that their titles were relevant to and addressed the
research issue.

A total of 64 articles were discarded due to not meeting the predetermined inclusion criteria. The
abstracts of the remaining 46 publications were further screened to see whether they provided
pertinent material that may contribute to addressing the study issue. Among the total of 46
papers, a subset of 14 articles was chosen for inclusion, while the other 32 articles were
discarded. The 14 chosen publications underwent a thorough reevaluation to ensure that they
specifically addressed the development of a success Prediction Model for Cloud computing
adoption at organizational level in Nigeria. Ultimately, five relevant pieces of literature were
selected based on their alignment with the autonomy and breadth of the research topic, with the
aim of focusing on the specific objectives.

3.5 Sampling Strategy:

The study used a purposive sample technique, which involves choosing individuals based on
their direct relation to the aims of the research. The researcher will interact with 50 indigenous
organizations with varying degree of knowledge about Cloud computing tendencies, with a
view to extracting factors primarily affecting adoption of cloud computing in Nigeria. These
factors will be aligned with research goals and weighted in readiness for input into the success
prediction model.
Cloud computing experts will undergo interviews. This sample method enables a detailed
examination of various prediction models for cloud computing adoption at organizational level
in Nigeria in different cloud computing organizations, while also assuring a reasonable number
of participants for thorough qualitative research.

3.6 Research Instrument:

The data collection method will involve employing a semi-structured questionnaire as the
research instrument. The semi-structured questionnaire comprises open-ended inquiries. The
semi-structured interview is a technique that entails presenting questions inside a pre-established
framework focused on a certain topic. Semi-structured interviews, often used in research,
typically exhibit a qualitative characteristic.

3.7 Validity of the Research Instrument

Validity is the ability of a research instrument to accurately measure what it is trying to measure.
Validity in this study refers to the survey instrument's capacity to assess the relevant factors
affecting the adoption of cloud computing in Nigeria, consistency and accuracy of acquired
data and the viability of statistical and programming capacity in the development of an
indigenous prediction model for cloud computing adoption at organizational level in Nigeria.
The usage of recognized scales, such as the COSO framework, will be utilized to boost validity,
and the survey questions will address all pertinent facets of the constructs. Another strategy to
ensure construct validity is to create survey questions that precisely evaluate the intended
constructs. Additionally, face validity can be improved by creating survey questions that are easy
for respondents to understand. For the survey instrument to accurately measure the constructs
under investigation, validity is essential (Cresswell, 2015).

3.8. Method of Data Collection


Cloud computing experts working in AI and Machine learning organizations will undergo
thorough semi-structured interviews. The collected data will possess qualitative characteristics.
These interviews will enable the exploration of distinct perspectives, individual experiences, and
deep insights related to the covered issues (Creswell, 2015).

The data from the systematic literature review will be derived via the process of comparative
analysis.

3.9 Method of Data Analysis

The interviews will be evaluated using thematic analysis to identify recurring patterns, themes,
and issues in the qualitative data. The systematic approach allows for the extraction of
meaningful insights and the development of a comprehensive understanding of the development
of an indigenous prediction model for cloud computing adoption at organizational level in
Nigeria (Boru, 2018).

3.9.1 Thematic Analysis:

Thematic analysis is a qualitative method used to identify, analyze, and report patterns (themes)
within a dataset. In the context of the thesis topic "Development of a Success Prediction Model
for Cloud Computing Adoption at Organizational Level in Nigeria," thematic analysis can be
applied to extract meaningful insights from qualitative data. Here are the steps for conducting
thematic analysis:

1. Familiarization with Data:

This step involves the familiarization with the qualitative data pertaining to the usage of cloud
computing in enterprises based in Nigeria.
The interviews, survey replies, or any written material gathered throughout the study will be
analyzed.

2. Data Coding:

Begin the coding process by assigning labels or codes to segments of the data that represent
concepts or ideas.

Use open coding to create initial codes without preconceived categories.

3. Generating Initial Themes:

Organize the codes into potential themes based on recurring patterns or similarities.

Allow themes to emerge organically from the data rather than imposing predefined categories.

4. Reviewing Themes:

Review and refine the identified themes. Check if they accurately represent the content of the
coded data.

Consider the relationships between themes and explore how they contribute to the understanding
of cloud computing adoption.

5. Defining and Naming Themes:

Clearly define each theme by summarizing the underlying concepts.

Provide concise and meaningful names for each theme to capture its essence.
6. Organizing Themes:

Arrange the themes into a coherent structure. Consider hierarchical relationships or potential
connections between themes.

Group similar themes together and identify overarching categories if applicable.

7. Reviewing and Refining:

Conduct a thorough review of the thematic analysis. Ensure that the themes accurately reflect the
patterns in the data.

Refine the themes based on feedback, discussion, or further examination

8. Description Writing:

Compose comprehensive explanations for each Theme, using specific instances or excerpts from
the data to elucidate essential aspects. Incorporate relevant background information and subtle
details to increase the depth and complexity of the analysis.

9. Interpretation:

Analyze the consequences of each themes in relation to the adoption of cloud computing at the
organizational level in Nigeria.

Examine the importance of the topics in relation to the advancement of theories, the
establishment of prediction model, and their practical implementations.

10. Memoing:
Throughout the analysis process, reflective memos are maintained, documenting insights,
methodological decisions, and analytical considerations. Memos contribute to transparency and
reflexivity in the analytical process. For example, a memo may document reflections on the
unexpected emergence of a new theme or the rationale behind combining specific codes into a
single theme (Miles et al., 2014).

11. Reporting and Documentation:

The thematic analysis concludes by documenting findings in a comprehensive manner. A


coherent narrative is developed that integrates themes, coded data excerpts, and interpretations.
Clarity and alignment with the academic rigor expected in a thesis context are ensured. Specific
instances from the transcripts are cited to support key findings and interpretations (Braun &
Clarke, 2006).

12. Verification and Validation:

Findings are subjected to verification and validation by seeking feedback from colleagues or
experts familiar with qualitative research methodologies. Instances where external reviewers
confirm the coherence of themes or provide additional perspectives enhance the reliability and
trustworthiness of the thematic analysis outcomes (Miles et al., 2014).

13. Reflexivity and Validation:

Reflexivity is acknowledged and incorporated into the analysis, recognizing the researcher's
influence on the interpretation of data. Reflection on potential biases is undertaken, ensuring
transparency in reporting the analytical process. Instances where the researcher's preconceptions
or assumptions may have influenced the interpretation are transparently acknowledged in the
thesis (Finlay, 2002).
14. Iterative method:

Thematic analysis often involves an iterative method. Remain receptive to reconsidering and
improving topics in light of new insights or further data.

Utilizing thematic analysis on qualitative data in the specific context of cloud computing
adoption in Nigerian firms enables a detailed examination of patterns, which aids in the creation
of prediction model and a more profound comprehension of the elements that impact adoption.

Thematic analysis is a qualitative research method used to identify, analyze, and report patterns
within data. In the context of exploring the development of various prediction models for cloud
computing adoption at organizational level in Nigeria, this approach allows for the extraction of
meaningful insights by systematically organizing and interpreting the data.

3.9.2 As per the Literature review, a systematic Selection Process will be done.

The first filtering process resulted in a reduction of the number of papers retrieved from
PubMed, ScienceDirect, and GoogleScholar to a total of 375 articles. The second criterion for
screening pertained to the substance of the examination and its likelihood of including
information relevant to the research question, while also providing enough responses. The
criteria for qualifying or incorporation were contingent upon the PICO framework, which sought
to re-arrange the words in order to communicate the details of the research question's
conclusions.

The assessment questions were designed to assess the interrelation between words and how they
contributed to the anticipated replies. The inclusion of papers pertaining to the development of
an indigenous prediction model for cloud computing adoption at organizational level in Nigeria
was among the discretionary factors taken into account. At each stage of applying the inclusion
and exclusion criteria, it was essential to prioritize the topic matter, target population, and
research question.
Start Data Collection

Identify relevant variables and metrics

Gather Qualitative and Quantitative Data Gather Data from Systematic Literature Review

End Data Collection

Qualitative and Quantitative Data


Model development and Testing
Analysis

Fig. 3.1: Segmented flowchart depicting the methodology


Fig. 3.2: Database diagram to reflect the model development

3.10 Ethical Considerations

Ensuring the ethical handling of participants is of utmost importance. The research will comply
with ethical protocols, which include getting informed permission, safeguarding confidentiality,
and giving participants the prerogative to withdraw from the study at any juncture without
repercussions. Relevant Ethical issues are included throughout all stages of the study, ranging
from the recruiting of participants to the analysis of data. The purpose of these considerations is
to maintain the values of respect, autonomy, confidentiality, and transparency.
REFERENCES

Boru, T. (2018). Chapter five Research design and methodology 5.1. Introduction Citation:
Lelissa tb (2018); Research Methodology; University of South Africa, PHD Thesis.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in
Psychology, 3(2), 77-101.
Creswell, J. (2015). Qualitative inquiry and research design : choosing among five
approaches. 3rd ed. Thousand Oaks, Calif ; London: Sage Publications.
Finlay, L. (2002). Negotiating the swamp: The opportunity and challenge of reflexivity in
research practice. Qualitative Research, 2(2), 209-230.
Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative data analysis: A methods
sourcebook. Sage Publications.
Pink, S., Tutt, D. & Dainty, A. (2013). Ethnographic research in the construction industry.
Yin, R. (2009). Case Study Research : Design and Methods. 4th ed. Thousand Oaks, Calif.;
London: Sage.

You might also like