- Posted by: essay
- Category: Free essays
Confidentiality was the essential condition of the study. All interviews and questionnaires were conducted on the condition of keeping confidentiality.
The aforementioned subjects were involved in the current study, which was grounded on several methods, among which it is possible to distinguish face-to-face interviews, phone call interviews, online chat interviews, online questionnaires, the use of focus groups and other studies related to the topic of the current study. In such a way, all the methods could be grouped into four categories, including interviews, questionnaires, focus group, and analysis of studies concerning the topic of the current study.
Along with interviews and questionnaire, the current study focused on using other studies available to the researcher, which concerned the topic of the current study. In actuality, many researchers (Behzad, 2003) have studied the development of wireless technologies and problems that have appeared after their implementation. Obviously, the experience of other researchers was important in terms of understanding the major directions, where threats to wireless technologies could appear and defining some strategies, with the help of which possible threats could be either prevented or eliminated. At the same time, studies conducted by different researchers could reveal some common trends and findings, which could indicate to the systematic nature of the identified trends and problems. Therefore, the analysis of other studies could be and was very helpful in terms of the current study.
Validity and Reliability of Instruments
Interviews and questionnaires as well as focus groups are reliable and valid methods of study, which are widely-applied. At the same time, they depend on the experience of the researcher. These methods should be conducted responsibly and the researcher should compare all the responses and single out basic trends in the development of wireless technologies, existing threats and find out the ways to their prevention.
Face-to-face interviews involved three groups of subjects, including IT specialists, experts, and average users. At the same time, face-to-face interviews involved only a part of subjects because other subjects could not participate in face-to-face interviews. In fact, face-to-face interviews were one of the most efficient methods of the current study because they allowed the researcher to obtain detailed information directly from the subjects. In such a way, the research could obtain the information concerning the essence of the study and existing threats to wireless technologies along with possible solutions to the enhancement of data protection from the interviewed subjects. In the course of the interview, the research could not only receive responses from the interviewed subjects but also observe the non-verbal signs, such as mimics, gestures, facial expressions, eyes movement, and other elements of non-verbal communication. Therefore, the researcher could obtain more information from face-to-face interviews from other interviews conducted either via phone or online. The observation of non-verbal responses was very important in terms of understanding the extent, to which subjects were relaxed and felt comfortable in the course of the interview.
Phone call interviews were also quite effective because they allowed the researcher to interview subjects and pose questions concerning the subject of the study. At the same time, the communication was relatively limited because the interviewer could not observe responses of the subjects to questions. Instead, the researcher could only record responses in the course of a phone conversation. Nevertheless, this type of interviews was also quite effective because these interviews allowed to discuss questions that emerged in the course of interviews and the interviewer could precise some issues, which were particularly important for the study, its purpose and problem. At the same time, phone interviews allowed involving subjects, which were remote and could not participate in face-to-face interviews. As a result, phone call interviews expanded the scope of the study and involve subjects which were remote from the place, where the study took place.
In this regard, online chat interviews were similar to phone call interviews but online chat interviews could not be as reliable as face-to-face interviews and phone call interviews because the researcher had little information on subjects involved in the study. In fact, the researcher had only the information granted by the subjects themselves. On the other hand, the online chat interviews had substantial advantages compared to face-to-face and phone call interviews because interviewed persons felt being more relaxed and ease in the course of the interview. In fact, all interviews were conducted anonymously, but the researcher had information on the position of interviewed persons, their name, and other details essential for the study but this information cannot be uncovered because of the terms and conditions of the agreement between the researcher and the subjects involved in the study. In case of online chat interviews, the researcher had little information on the subjects because the information could not be verified properly and the researcher had to rely on the subjects and the information they provided about themselves and their position. Nevertheless, the degree of sincerity in their responses could be even higher compared to other interviews conducted in terms of the current study because the interviewed persons did not suffer from the pressure of the study they felt being involved in. As a result, they were relaxed and felt comfortable in the course of the interview. Even though, the researcher attempted to created comfortable conditions for all subjects involved in interviews, but still face-to-face interviews raised certain anxiety in subjects because, judging from their non-verbal language, they were a bit nervous, while they were interviewed.
In this regard, online questionnaires were similar to online chat interviews, although questionnaires were different from different in regard to the possible responses from the part of the subjects. To put it more precisely, unlike interviews, where subjects were free to answer as they liked to the set of questions suggested to all subjects, questionnaires had not only questions but also possible answers. The subjects had to choose the option they considered to be the most convenient or true. In such a way, their responses were relatively limited. On the other hand, the questionnaire allowed the researcher to narrow the scope of the study and to focus on specific issues, which the subjects of the study had to choose or to respond in the course of the questionnaire. In this regard, the study focused on specific questions concerning wireless technologies, existing threats and possible ways of the data protection and solution of other problems that may emerge in the course of the development and implementation of wireless technologies. In fact, the questionnaire was important in terms of understanding and studying specific issues related to the problem of the current study.
Finally, the current study used the focus groups method. The application of this method focused on the finding possible solutions to threats and problems related to the application of wireless technologies, especially in relation to information breaches and information security. In fact, interviews, questionnaire and the analysis of other studies allowed identifying major threats, whereas focus groups were supposed to find possible strategies to be applied to solve existing problems and prevent existing and potential threats. Focus groups comprised two groups of subjects. The first group of subjects consisted of IT specialists, experts and average users. The researcher set the problem, namely poor information security of wireless technologies and the elaboration of effective data protection strategies the first group has to tackle. The group was supposed to discuss existing threats related to wireless technologies and suggest their solutions to existing problems. The second group was the control group, which consisted of IT specialists, experts, and average users. Unlike the first group, which was comprised predominantly of IT specialists and experts, the control group consisted mainly of average users, whereas IT specialists and experts were involved to enhance the control group. Both groups worked on one and the same problem and were supposed to elaborate their solutions to the problem. As they found the solution and suggested their strategies to enhance data protection of wireless technologies and other possible problems identified in the study in regard to wireless technologies, the strategies suggested by both groups were analyzed and compared. In such a way, the research could compare strategies suggested by the first group, consisting of professionals in the field of IT and wireless technologies mainly, with responses of individuals, the majority of which had little experience in developing wireless technologies and solving problems raised by the implementation and use of wireless technologies. In such a way, the study could reveal the difference in approaches used by professionals and the extent to which strategies developed by two groups differ.