20191111191419assignment_21 x20191111191419assignment_11 x
Please see the attached documents for the details needed to complete these assignments. My dissertation is on “Cloud Security.” These are two separate assignments.
***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***
Instructions
Outline a research design to study “Cloud Security.” Pay careful attention to the tradeoffs that were made to mitigate plausible threats to validity. Although your research design strategy outline is a first draft and you have not yet explored all of the possible designs in quantitative research, the strategy should be as realistic as possible with what you do know. Do your best to operationalize an approach to addressing your problem. In your research design outline, include the following:
· Statement of the problem
· Independent variable(s)
· Dependent variable(s)
· Measurement instrument or how the data will be collected
· Statistical test to be employed
· Assumptions of the statistical test to be employed
· Sample size needed
· Inclusion criteria for subjects to be included
· Exclusion criteria for subjects to be excluded. (Note: To facilitate calculating the estimate of sample size needed, a link to G*Power has been included in the weekly references.)
Once your research design outline has been developed, revisit your design with a critical eye on remaining plausible threats to validity. Briefly discuss the plausibility of the four threats to valid inference making as it pertains to your research design. Be sure to note both limitations and delimitations.
Length: 4-5 pages not including title page and references
Your response should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards
***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***
***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***
Instructions
Locate three different PhD dissertations from three different universities that incorporate a quantitative methodology for “Cloud Security.” For each, respond to the following:
· What problem was the study trying to address?
· What factors within the study (other than the researcher stating it directly) convinced you that the quantitative method was the appropriate method for this study?
· How did each researcher support the use of the quantitative research method for their respective study?
· How did each researcher ensure the study would adhere to ethical requirements for conducting quantitative research as a PhD candidate?
· What theory or theories did the researcher use when conducting the study? What was the contribution to theory made by the study?
Length: 4-6 pages not including title page and references
Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect doctoral-level writing and APA standards.
***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***