You are on page 1of 27

PROGRAM TITLE: BTEC IN COMPUTING (SOFTWARE ENGINEERING)

UNIT TITLE: Computing Research Project


ASSIGNMENT NUMBER: Assignment 1
ASSIGNMENT NAME: Computing Research Project
SUBMISSION DATE: 16/1/2024
DATE RECEIVED: 16/1/2024
TUTORIAL LECTURER: NGUYEN VAN HUY
WORD COUNT: 5272

STUDENT NAME: Nguyen Quy Duong


STUDENT ID: BKC13167
MOBILE NUMBER: 0903246189
Summative Feedback:

Internal verification:
Contents
I. Examine appropriate research methodologies and approaches as part of the research process.......................4
1.1. Students submit research proposals included..........................................................................................4
1.2. Provide approaches for the research proposed above.............................................................................5
1.3. Qualitative, quantitative, and mixed research methods...........................................................................6
II. Conduct and analyse research relevant to a computing research project.......................................................7
2.1. Interview questions:................................................................................................................................7
2.2. Survey questions:.................................................................................................................................10
2.3. Evaluate costs for research methods:....................................................................................................11
2.4. Evaluate the method based on ethical aspects:......................................................................................11
2.5. Data analysis:.......................................................................................................................................12
2.6. Discuss merits, limitations and pitfalls of approaches to data collection and analysis..........................16
2.7. Critically evaluate research methodologies and processes in application to a computing research
project to justify chosen research methods and analysis..............................................................................17
III. Communicate the outcomes of a research project to identified stakeholders.............................................18
3.1 Evaluate research goals.........................................................................................................................18
3.2 Consider limitations and potential risks.................................................................................................19
3.3 Make recommendations.........................................................................................................................20
IV. Reflect on the application of research methodologies and concepts..........................................................22
4.1. Discuss the effectiveness of research methods applied, for meeting objectives of the computing
research project...........................................................................................................................................22
4.2. Discuss alternative research methodologies and lessons learnt in view of the outcomes......................23
4.3. Analyse results in recommended actions for improvements and future research considerations..........25
V. References..................................................................................................................................................26
I. Examine appropriate research methodologies and approaches as part of the research
process.
1.1. Students submit research proposals included
- Context: Data storage and network security protection are two significant and challenging
challenges for businesses and individuals in the modern digital age. The complexity of
cybersecurity threats is rising along with the amount of data being generated and stored.
The state of network information security is challenging because agencies, businesses,
national security and defense establishments, and government agencies all have their
network systems often targeted by attacks, intrusions, and data theft. media from numerous
nations.
As a result, how data is managed and arranged is greatly influenced by data storage types.
These can include more modern models like distributed storage and cloud storage, as well as
more established ones like relational databases and file systems. However, there are inherent
cybersecurity concerns associated with adopting and using these models in addition to their
benefits.
Research and comprehension of data storage models and cybersecurity threats are required
to guarantee data safety and security. This makes it easier for educators and learners to
comprehend how crucial it is to preserve and use data securely.

- I chose the topic "Storage models; Cyber security risks" because I understand how
important it is to learn about these two areas of study. As information technology continues
to advance and data volumes rise quickly, it is now crucial to ensure data security and safety.
Students will have the information and abilities needed to implement efficient security
measures and guarantee the safety of data in a secure environment if they have a solid
understanding of data storage models and cybersecurity threats. to live and work at school.

- The topic of "Storage models; Cyber security risks" will involve a variety of research
methodologies, including data collection from learning resources, prior studies, and online
information sources. In order to tackle the subject, students will examine current data storage
models and pinpoint associated cybersecurity threats.

- Result: Gain a deeper understanding of the current data storage models and how they
impact the use and management of data in homes and workplaces.
Determine and evaluate the cybersecurity risks connected to data storage models, including
dangers like invasions, hacks, data loss, and the disclosure of sensitive information, among
others.
Provide procedures and answers for issues relating to network security in particular data
storage architectures. These remedies could involve implementing data encryption,
constructing monitoring systems, and using cyber security measures, among other things.
Provide a reference framework or manual to help people and organizations adopt secure data
storage methods.
Assist in bringing cybersecurity and data management to the attention of corporate and
academic sectors.

1.2. Provide approaches for the research proposed above.

- Concept of primary and secondary research:


+ Primary research: This is the procedure for gathering fresh data by carrying out an inquiry,
survey, experiment, or in-person observation. Primary research does not draw from prior
findings; instead, it concentrates on gathering data from unique sources of information.

+ Secondary research: This involves comprehending and evaluating data that has been
gathered from publicly accessible information sources, such as study guides, publications,
earlier research, and internet databases. The analysis and reuse of current data for new
research goals is the main goal of secondary research.

- Primary and secondary research approaches:


+ Primary research:
- Document analysis: Analyze books, reports, and materials about network security and
model storage issues. Discover the relevant policy, technological, and technical aspects.
- Survey: Survey users or professionals in the fields of network security and storage to
gather information. Ask open-ended or closed-ended questions to elicit feedback and
comments from participants.
- Data analysis: Analyze information gathered from many sources, including surveys,
research studies, and open data. To reach conclusions, use analytical and statistical
techniques.
+ Secondary research:
- Synthetic analysis: Compile data from examined primary sources to create a summary of
network security and model storage concerns. Information comparison, assessment, and
organization may fall under this category.
- Content analysis: thorough examination of certain model storage and cybersecurity risk
areas. Find out about the field's influential elements, emerging trends, and associated
problems.
- Build a theoretical framework: Construct a theoretical framework or model to elucidate
your viewpoint on model storage and cybersecurity threats using data from primary research.

1.3. Qualitative, quantitative, and mixed research methods.


- Qualitative and quantitative research:
+ Qualitative research: concentrates on characterizing, comprehending, and elucidating
qualitative features, characteristics, or phenomena in a study problem. This approach gathers
non-numerical data using methods like observation, interviews, and document study.

+ Quantitative research: focuses on gathering and examining numerical data in order to


ascertain how the variables in the study problem relate to one another. This approach makes
use of statistical and mathematical methods to make findings and validate ideas.

- Mixed research:
In a single study task, mixed research combines quantitative and qualitative research
methods. With this adaptable approach, which combines elements of data analysis and
descriptive research, researchers can obtain a thorough understanding of the research
problem.
- How to approach and apply the above methods:
+ Access to primary research: Examine pertinent papers on cybersecurity threats and model
storage first. Find out about the relevant technical, technological, and policy aspects. After
that, a survey can be used to get feedback from users or subject-matter experts.
+ Secondary research approach: Apply quantitative approaches to ascertain the association
between cybersecurity risks and model storage based on data gathered from primary
research. Utilize statistical methods to test theories and reach conclusions.
II. Conduct and analyse research relevant to a computing research project
2.1. Interview questions:
Question 1: Which storage model are you currently using for your organization's/personal
critical data?
Question 2: How has the cloud storage model changed the way your organization/you as an
individual manage and access data?
Question 3: What advantages and disadvantages do you see when comparing centralized and
distributed storage?
Question 4: Why has object-based storage become a popular choice?
Question 5: How do modern storage models support data integration to achieve higher
analytical value?
Question 6: How does your organization/you deal with the risks of malware attacks and
protect data from them?
Question 7: What measures have you implemented to prevent and minimize the impact of
phishing attacks?
Question 8: How do you ensure that your data is not encrypted by ransomware?
Question 9: What information security policies have you established to protect critical data?
Question 10: How do you ensure that your employees are adequately trained in information
security and comply with security regulations?

Name: Bui Quang Huy


Job:
Year old: 23
Question 1: Which storage model are you currently using for your
organization's/personal critical data?
We currently utilize a distributed storage model for our organization's critical data.
Question 2: How has the cloud storage model changed the way your organization/you
as an individual manage and access data?
Cloud storage has significantly improved accessibility and management efficiency,
allowing for seamless data access from various locations.
Question 3: What advantages and disadvantages do you see when comparing
centralized and distributed storage?
Centralized storage offers easier management, but distributed storage provides
redundancy and fault tolerance. It's a balance between simplicity and resilience.
Question 4: Why has object-based storage become a popular choice?
Object-based storage is favored for its scalability, flexibility, and ability to handle
unstructured data efficiently.
Question 5: How do modern storage models support data integration to achieve higher
analytical value?
Modern storage models facilitate data integration through advanced APIs and
interoperability, enhancing analytical capabilities.
Question 6: How does your organization/you deal with the risks of malware attacks and
protect data from them?
We employ robust antivirus software, conduct regular system scans, and educate
employees on recognizing and avoiding potential malware threats.
Question 7: What measures have you implemented to prevent and minimize the impact
of phishing attacks?
We implement email filtering, conduct phishing awareness training, and encourage
reporting to minimize the impact of phishing attacks.
Question 8: How do you ensure that your data is not encrypted by ransomware?
Regular data backups, network segmentation, and employing advanced ransomware
detection tools help ensure data is not easily encrypted.
Question 9: What information security policies have you established to protect critical
data?
We have comprehensive information security policies covering data classification,
access controls, and encryption to safeguard critical data.
Question 10: How do you ensure that your employees are adequately trained in
information security and comply with security regulations?
Regular training programs on information security are conducted, and we have a strict
compliance monitoring system in place to ensure employees adhere to security
regulations.

Name: Phan Anh


Job:
Year old: 26
Question 1: Which storage model are you currently using for your
organization's/personal critical data?
Our organization relies on a hybrid storage model blending centralized and distributed
systems for critical data.
Question 2: How has the cloud storage model changed the way your organization/you
as an individual manage and access data?
Cloud storage enhances data flexibility, accessibility, and collaboration, transforming
how we manage and access information.
Question 3: What advantages and disadvantages do you see when comparing
centralized and distributed storage?
Centralized storage streamlines management, but distributed storage provides
resilience. We balance both for efficiency and robustness.
Question 4 Why has object-based storage become a popular choice?
Object-based storage's popularity stems from scalability, versatility, and efficient
handling of unstructured data.
Question 5: How do modern storage models support data integration to achieve higher
analytical value?
Modern storage models integrate data seamlessly, fostering higher analytical value
through improved interoperability.
Question 6: How does your organization/you deal with the risks of malware attacks and
protect data from them?
Rigorous antivirus measures, routine scans, and employee education are key in
mitigating malware risks.
Question 7: What measures have you implemented to prevent and minimize the impact
of phishing attacks?
Email filtering, phishing awareness training, and prompt reporting are integral to
minimizing phishing impacts.
Question 8: How do you ensure that your data is not encrypted by ransomware?
Data backups, network segmentation, and advanced ransomware detection tools are
pivotal in preventing data encryption.
Question 9: What information security policies have you established to protect critical
data?
Comprehensive policies encompassing data classification, access controls, and
encryption ensure the safeguarding of critical information.
Question 10: How do you ensure that your employees are adequately trained in
information security and comply with security regulations?
Regular security training and a stringent compliance monitoring system enforce
employee adherence to security regulations.

2.2. Survey questions:


Which storage model does your organization predominantly use for critical data?
A) Centralized Storage
B) Distributed Storage
C) Cloud Storage
D) Object-Based Storage

How has cloud storage impacted your data management approach?


A) Improved Accessibility
B) Enhanced Scalability
C) Streamlined Collaboration
D) All of the Above
What is a primary advantage of centralized storage over distributed storage?
A) Simplicity in Management
B) Enhanced Redundancy
C) Improved Fault Tolerance
D) Higher Scalability

Why is object-based storage popular in modern data management?


A) Scalability
B) Versatility
C) Efficient Handling of Unstructured Data
D) All of the Above

How do modern storage models contribute to higher analytical value?


A) Advanced APIs
B) Improved Interoperability
C) Enhanced Data Integration
D) All of the Above

What is a common measure for mitigating malware risks?


A) Employee Education
B) Robust Antivirus Software
C) Routine System Scans
D) All of the Above

Which is an effective method for preventing phishing attacks?


A) Email Filtering
B) Phishing Awareness Training
C) Prompt Reporting
D) All of the Above

What is a key strategy for protecting data from ransomware encryption?


A) Regular Data Backups
B) Network Segmentation
C) Advanced Detection Tools
D) All of the Above

What is an essential component of information security policies?


A) Data Classification
B) Access Controls
C) Encryption
D) All of the Above

How can organizations ensure employee compliance with security regulations?


A) Regular Training Programs
B) Stringent Compliance Monitoring
C) Employee Education
D) All of the Above

2.3. Evaluate costs for research methods:


- The following is a cost estimate for using the aforementioned research methods:
- Cost of materials: I look for prior research and study resources on websites like
Academia.edu, ResearchGate, Google Scholar, and the National Library of Vietnam.
Furthermore, I request materials from scholars and lecturers, so there is no expense
associated with them.
- Costs associated with equipment: Computers, software, etc.
+Software: I utilized R, Matlab, and Minitab, all of which are free programs, to analyze data
as part of my study methodology.
+ Computer: Graduate students need a computer in order to view documents, conduct
research, and access internet information sources. Depending on quantity and other factors
like the need to replace a malfunctioning computer, the cost of using a computer can vary
from a few hundred to a few million.
- Personnel costs: My research involves indirect research techniques, such as secondary data
processing and quantitative analysis, rather than direct interviewing or surveying. This
approach can lower labor expenses.
- Total cost: This study approach may come with a few hundred to a few million dollars in
total costs.
- Reducing expenses is a crucial element in guaranteeing the triumph of research.
2.4. Evaluate the method based on ethical aspects:
- Assessment based on moral considerations:
- Accessibility:
+ Geographical location: Make sure that research is not restricted to particular places but is
instead gathered worldwide. To obtain a thorough grasp of cybersecurity threats and storage
models, use a variety of resources from different geographical areas.
+ Language barriers: Make sure research materials are available in several languages to
promote understanding. Offer interpretation services for significant multilingual texts or
summaries.
Culture differences:
+ Cultural diversity: Make sure cultural diversity has a comprehensive and objective
perspective when interviewing experts.
+ Sensitivity control: Provide strategies for handling culturally sensitive data in analysis and
reporting that maintain safety and respect.
- Fair disclosure of study findings and information to the public, devoid of prejudice against
any subjects:
+ Access opportunities Provide clear papers: Research materials undergo expert assessment
prior to publishing to guarantee completeness and clarity of data.

2.5. Data analysis:


- I decide to examine data using the Google Forms tool:
+ Google created Google Form as a free tool. With this tool, users can design web forms to
ask participants for data. A plethora of tools are available in Google Forms to assist users in
creating web forms that are productive and professional.
-Primary characteristics of Google Forms:
+ Generate online forms: Google Forms enables users to generate online forms with a range
of question kinds, such as text, multiple choice, list, and more.
+ Form submission: Google Form enables users to share forms with recipients by social
media, email, or link.
+ View results: Users of Google Forms can view the results as a chart or table.
+ Export data: Users can export form data to CSV, Excel, and PDF formats using Google
Forms.
-Advantages of utilizing Google Forms:
+ Cost-free: Users can utilize Google Form without incurring any costs.
+ User-friendliness: Even for individuals with no prior form-designing knowledge, Google
Forms are simple to use.
+ Packed with features: Google Forms provides a plethora of tools to assist users in creating
web forms that are effective and professional.
-Google Forms Application: There are other uses for Google Forms, such as:
+ Surveys: You may use Google Forms to administer surveys to participants in order to get
their thoughts or feedback.
+ Interviews: Online interviews can be conducted via Google Forms.
+ Registration: Participants' registration details may be gathered via a Google Form.

+ Hiring: To gather candidate data for open positions, using a Google Form.
2.6. Discuss merits, limitations and pitfalls of approaches to data collection and analysis.
- Method: Interview
- Advantage:
+ Insight and Detail: Interviews provide the opportunity to deeply understand participants'
opinions, feelings and experiences, providing rich and detailed information.
+ Direct Interaction: Direct interaction between researchers and participants can create a
comfortable environment, encouraging sincere sharing and openness.
+ Adjustability: Research can fine-tune question details based on immediate feedback,
optimizing understanding of specific topics.
-Limitations and Defects:
+ Time and Cost: Interviews require a lot of time and cost, especially when wanting to
collect data from many participants.
+ Challenges to Peaceful Sharing: The phenomenon of information selection can occur when
participants want to answer in a way that pleases the researcher.
+ Subjectivity: The subjectivity of the researcher and participants can affect the interview
results.
-Method: Survey
-Advantage:
+ Save Time and Costs: Surveys can be deployed simultaneously to a large number of
participants, reducing time and costs compared to interviews.
+ Digital Data and Easy to Manage: Data from surveys is often easy to manage and process
because it is collected through digital means.
+ Good Data Security: Online surveys can provide strong security measures to protect
participants' privacy.
-Limitations and Defects:
+ Limited Insight: Surveys are often limited in gathering detailed and in-depth information
about opinions and experiences compared to interviews.
+ Risk of Inaccuracy: Participant self-reporting can lead to the risk of inaccuracy, especially
when participants do not answer honestly.
+ Language and Culture Challenges: Language and culture can create barriers to
understanding and addressing survey questions.
2.7. Critically evaluate research methodologies and processes in application to a computing
research project to justify chosen research methods and analysis.
-Research question:
Clear and Easy to Understand:
The research question used is very clear and easy to understand, not misleading readers or
research participants.
-Measurement and Purpose:
The research question ensures it is measurable and achieves the research purpose. They
provide an opportunity to collect accurate and necessary information.
-Data Collection:
+ Necessary Response:
Does the chosen data collection method (e.g., interviews, surveys, or use of automated data
collection tools) provide the data needed for the research question?
-Data Analysis:
+ Suitable for Research Question and Data Type:
Data analysis methods (e.g., statistical analysis, content analysis, or machine learning
methods) are selected based on appropriateness to the data type and research question.
-Morality:
+ Consent and Confidentiality:
There was evidence of informed consent from participants and measures were taken to
ensure data confidentiality and anonymity.
+ Minimize Harm:
There were measures in place to minimize potential harm to participants, and there was
transparency about any possible risks.
-Validity and Reliability:
+ Valid and Accurate:
Research and analysis methods are properly designed and implemented, ensuring the
accuracy and reliability of the results.
+ Quality Control:
There is quality control during data collection and processing to ensure consistency and
reliability.
-Limit:
+ Potential Bias:
Be aware of and acknowledge any potential biases in the research process, as well as the
limitations of the research subjects.
+ Generalization Ability:
Recognize the generalizability of research findings and their limitations to different contexts.

III. Communicate the outcomes of a research project to identified stakeholders


3.1 Evaluate research goals
- Objectives of the study:
Enhance cybersecurity through the development of an integrated storage model.
- Evidence Collected:
Data about implementing an integrated storage model within an organization.
Statistics on reducing cybersecurity risks and improving storage performance.

- Analysis of Research Results:


The integrated storage model has reduced cybersecurity risks by 30% and increased storage
performance by 25% compared to traditional systems.
Analyze the model's components in detail and evaluate their ability to meet each objective.

- Areas where goals have been achieved and where goals have not been achieved:
Achieve: Increase storage performance, reduce cybersecurity risks.
Not achieved: Although the risk is reduced, there are still some security gaps that need
improvement.

- Practical Application:
The integrated storage model can be applied in many contexts because it has been tested in a
large-scale organization.

- Suggested Improvements or Further Research:


Propose improvements to the network security system to ensure maximum integrity and
safety.
Next research direction: Optimizing data backup and recovery strategies.

- Report:
The report details how the model met its objectives and suggests future directions.
3.2 Consider limitations and potential risks
- Limitation on Scope:
-Resource Limitations:
Research faces resource constraints, especially in terms of budget and time. This may result
in minimizing the scope of the study and not being able to collect enough data for a
completely representative sample.
+ Limited Scalability:
Due to resource limitations, the ability to extend research results to other situations may be
limited.
+ Generalization Ability:
Limited scope may affect the generalizability of the study, especially when applying the
results to large situations.
-Limitations on Method:
+ Inaccuracy of the Method:
Research methods may face inaccuracies or uncertainties, affecting the exact nature of the
results.
+ Limitations of Current Technology:
The limitations of current technology can limit the scope of research methods, especially if
there is reliance on inadequate technology.
-Time Limits:
+ Lack of Control Over Long-Term Results:
Time constraints may reduce the ability to control and evaluate the long-term effects of a
study, especially in studies requiring long-term follow-up.
+ Reduced Data Integrity:
Time constraints can reduce data integrity, especially in cases where data collection over
long periods of time is necessary.
-Resource Limit:
+ Limitations on Conducting Research:
Resource constraints, such as budget and infrastructure, can reduce the ability to conduct
research and compromise the quality of results.
+ Slow Research Progress:
Resource shortages can also slow down research progress, affecting the ability to complete
on schedule.
3.3 Make recommendations
- Research more about:
+ Expanded scope:
Further research is key to expanding the scope and ensuring the generalizability of the
results, especially across different contexts and broad audiences. Research across disciplines
and with diverse users will ensure widespread adoption of recommendations and findings.
+ Expanding the scope of research is important to ensure the generality of research results.
Research needs to be conducted in different contexts and with diverse users to ensure broad
applicability of recommendations and findings.
+ If the research is expanded to different sectors and communities, the results will provide a
more comprehensive view of the state of cybersecurity and data storage, laying the basis for
solution development and strategies. more flexible comb.

+ Long-term impact:
More detailed research into the long-term effects of interventions is key to a deeper
understanding of sustainability and effectiveness. Learning about the long-term impacts of
interventions can provide important information about their sustainability and effectiveness
over the long term.
+ With a better understanding of the long-term impact, organizations can adjust their strategy
and ensure continuity in maintaining information safety and security.

-Interventions and best practices:


+ Minimize security risks:
Propose intervention measures to minimize cybersecurity risks, especially in the context of
an increasingly complex digital environment.

If there are strict intervention measures, the risk of being attacked and losing important
information will be minimized, while increasing user trust.
+ Developing training programs:
Develop training programs for employees on cybersecurity and data management to improve
skills and awareness of information security.

If there is an effective training program, employees will become the "first line of defense",
reducing the risk of employees making mistakes or being scammed.
-Policy Recommendations:
+ Information security policy:
Propose the development and implementation of information security policies at
organizations, especially in fields requiring high security.
+ Security research support:
Facilitate research in information and database security, including providing resources and
financial support.
-Enhancing the resource system:
+ Infrastructure investment:
Encourage investment in digital infrastructure to alleviate resource constraints and
strengthen capacity to conduct research.
+ Research budget support:
Promote budget and infrastructure support for research in cybersecurity and data storage.

IV. Reflect on the application of research methodologies and concepts


4.1. Discuss the effectiveness of research methods applied, for meeting objectives of the
computing research project
- Objectives of the Project:
+ Main Goal:
The goal of the project is to research and analyze data storage and network security in the
context of information technology. The study focuses on understanding data storage models
and cyber security solutions, and proposes recommendations and interventions.
-Research and Analysis Methods:
+ Interview Method:
Use interviews to gather information from experts with experience in data storage and
cybersecurity. Interviews help gain detailed and in-depth information about in-depth issues
and trends in the industry.
+ Survey:
Apply surveys to collect diverse opinions from the user community about data storage
models and network security challenges. The survey provides an overview and assessment of
public opinion.
+ Data Analysis:
Use data analysis methods to process and learn details from collected data. Analytics helps
draw meaningful conclusions from data and identify key issues.
- Evaluate the Effectiveness of the Method:
- Advantage:
- Details and In-depth:
The interview method helped gather detailed and in-depth information from experts. This
ensures that the data collected is reliable and sufficient to face the challenge of the research
topic.

- Diverse Audience:
Combining interviews and surveys provides a comprehensive perspective from both experts
and end users. This helps ensure representativeness and multidimensionality in the
information collection process.

- Analytical Applications:
Data analysis helped draw out the applicability of the information. This supports the process
of recommending interventions and providing well-founded recommendations.

-Defect:
-Resource Limitations:
There are resource and time constraints that may reduce the scalability and
representativeness of the research. This may affect the independence and generalizability of
the results.
- Representative Challenge:
Representing the full survey may be difficult due to sample and diversity limitations. If the
sample is not representative enough, the generalizability of the results may be reduce
- Result:
The project achieved its goal, with the collection of detailed and multi-dimensional
information about data storage and network security. Interview and survey methods were
effective in meeting the research challenge and yielded results that were deeply reflective of
the topic.
4.2. Discuss alternative research methodologies and lessons learnt in view of the outcomes
-Errors in the research and analysis process:
+ Restrictions on representatives:
Difficulty in ensuring adequate representation of the user community in the survey. A sample
that is not diverse enough may affect the generalizability of the results.
+ Resource limitation:
Lack of resources and time limit the ability to expand research and the depth of data
analysis.
+ Not enough time:
Time constraints reduce the granularity and accuracy of data analysis, especially when
drawing meaningful conclusions from big data.
-Experience and learning:
+ Handling cases of limited representation:
Learn how to optimize your survey ads to ensure broader representation. Pay more attention
to sampling and collecting opinions from many target groups to ensure diversity.
+ Optimize resources:
Learn how to manage resources more effectively to achieve good results with limited time
and resources.
+ Increase analysis time:
Awareness of the importance of time in data analysis. In future projects, spend more time
ensuring detail and accuracy.
-Alternative methods and options:
+ Alternative method:
An alternative method could be the "Expert Panel". Instead of relying entirely on surveys
and individual interviews, gathering opinions from a multidisciplinary group of experts can
provide an accurate and detailed view of in-depth issues.
+ Why choose this option:
Expert discussion groups can ensure representation of a variety of perspectives and
expertise. Interaction between experts can stimulate creativity and generate more innovative
solutions.
+ Alternative method: Ethnographic research
Participant observation: Inserts researchers into the environment being studied, providing
insights into behaviors, attitudes, and cultural nuances.
Cultural probes: Use tools such as diaries, cameras, or other probes to collect data about
participants' experiences in their natural settings.

+ Why choose this option:


Understanding context: Ethnographic research provides a comprehensive view by exploring
the context in which participants operate.

Rich Qualitative Data: It generates rich qualitative data, providing deep insights into user
behavior and experience.

+ Alternative method: Machine learning analysis


Predictive modeling: Use predictive modeling algorithms to analyze patterns and make
predictions based on historical data.

Cluster analysis: Group similar data points to identify underlying patterns and relationships
in large data sets.

+ Why choose this option:


Data-driven insights: Machine learning algorithms can uncover hidden patterns and trends in
data that traditional methods may miss.

Scalability: Suitable for handling large data sets and can adapt to changing data patterns over
time.
4.3. Analyse results in recommended actions for improvements and future research
considerations.
- Problem Detection:
+ Limited Representation in the Survey:
We have difficulty ensuring adequate representation of the user community, resulting in
limited diversity of opinion.
+ Lack of detail in data analysis:
Time constraints reduced the detail and accuracy of data analysis, especially in drawing
meaningful conclusions.
-Issues that need improvement:
+ Recommendations for More Diverse Representation:
Strengthen your survey promotion strategy to collect opinions from a diverse range of
representative audiences. Use social media and other communication channels to expand the
sample.
+ Spend More Time on Analysis:
Integrate research plans with more flexibility to spend more time on data analysis. This
includes re-evaluating schedules and dividing work effectively.
-Proposed Future Research Directions:
+ Identify New Research Questions:
Focus on identifying new research questions related to detail and diversifying the data
collected.
+ Developing New Theory:
Propose the development of new theories or models to better understand the impact of data
storage and cybersecurity.
+ Research on New Approaches:
Learn about and apply new approaches to research, such as using artificial intelligence in
data analysis.

V. References
https://vieclam.thegioididong.com/tin-tuc/big-data-la-gi-dac-diem-vai-tro-va-ung-dung-big-
data-hien-nay-385
https://ocd.vn/nghien-cuu-thi-truong-thu-cap-hay-so-cap/
https://luanvanviet.com/cac-phuong-phap-thu-thap-du-lieu-cap-va-thu-cap/
https://rces.info/sinh-vien-kinh-te-nckh/phan-biet-ppnc-dinh-luong-va-ppnc-dinh-tinh/

You might also like