Advanced Research Topics In IT / IS Assessment
MITS6011/ MITS6012advanced Research Topics In IT/ IS Assessment Documen
Please consider a research problem in Information Technology or Information Systems arising from fields such as medical, business, science, engineering, hospitality, banking, etc. Early selection of the research problem is crucial, as the first deliverable is in session 3, and all subsequent work stems from this problem. The process will mimic academic research, equipping students with the skills for future research activities. The research question should focus on a specific aspect of the chosen problem, formulated during sessions 1 and 2.
Deliverables include a research question and abstract (session 3), full proposal (session 5), an introduction and expanded abstract (session 7), literature review with multiple parts (sessions 8-10), methodology (sessions 11-12), a comprehensive research report (session 13), and a final presentation (session 14). All submissions must be uploaded via Turnitin by the specified deadlines; late submissions incur penalties. Plagiarism has zero tolerance, and submissions will be checked for originality.
Paper For Above instruction
Introduction
Understanding the rapid evolution of technology and its integration across diverse sectors has become an imperative for contemporary research. In particular, the intersection of information technology (IT) and information systems (IS) offers fertile ground for scholarly investigation, especially given their profound influence on business operations, healthcare, finance, and other vital areas. This research aims to explore a specific problem within this domain, seeking to contribute to the body of knowledge while addressing practical challenges faced by organizations in implementing IT solutions effectively.
The importance of this research lies in its potential to inform best practices, guide decision-makers, and influence policy development in technology adoption. As digital transformation accelerates, understanding the factors that hinder or facilitate successful IT integration becomes critical. The problem selected should reflect current issues such as cybersecurity threats, data privacy concerns, technology resistance, or system interoperability, among others.
Background and Context
The exponential growth of IT infrastructure has transformed industries worldwide. However, this rapid evolution presents challenges related to organizational readiness, user acceptance, security vulnerabilities, and technological complexity. Previous studies highlight that despite substantial investments, many projects fail to deliver expected benefits due to inadequate planning, poor stakeholder engagement, or technical shortcomings (Brynjolfsson & McAfee, 2014). Therefore, investigating the underlying factors influencing successful implementation or adoption remains a pertinent research goal.
In healthcare, for instance, implementing electronic health records (EHR) systems has faced resistance from personnel, concerns over data security, and interoperability issues (Boonstra & Broekhuis, 2010). Similarly, in the banking sector, cybersecurity threats threaten customer trust and regulatory compliance (Kshetri & Voas, 2017). These examples underscore the significance of understanding contextual and technological factors impacting IT deployment. The proposed research will focus on an identified problem—such as data security in cloud computing—within a specific sector, for example finance or healthcare.
Research Problem and Question
The central research problem can be articulated as follows: "What are the critical factors influencing the adoption and effective implementation of cloud-based data security solutions in the healthcare industry?" The corresponding research question refines this to focus on specific elements, such as: "How do organizational, technological, and regulatory factors affect healthcare providers' adoption of cloud data security solutions?" This question will guide data collection and analysis aimed at uncovering barriers, facilitators, and best practices.
Significance of the Study
This research aims to address a pressing need for evidence-based strategies to improve cloud security adoption in healthcare. The findings could assist practitioners in designing more effective implementation frameworks, policymakers in formulating supportive regulations, and academics in advancing the theoretical understanding of technology acceptance. Additionally, the study will contribute to closing knowledge gaps related to barriers faced by healthcare providers during digital transformation efforts.
Methodological Approach
The research will employ a mixed-methods approach, combining qualitative interviews with IT managers and healthcare professionals and quantitative surveys to gather comprehensive insights. Data collection will focus on identifying key organizational, technological, and regulatory factors influencing decision-making. Descriptive and inferential statistical analyses will be used to analyze survey data, while thematic analysis will interpret interview transcripts.
This approach ensures a nuanced understanding of the complex interplay between various factors, facilitating valid and reliable conclusions. Ethical considerations, such as confidentiality and informed consent, will be strictly adhered to throughout the research process. The methodology aligns with accepted standards in IT research, ensuring replicability and validity.
Expected Contributions
The study is expected to contribute to both theoretical and practical domains. Theoretically, it will extend existing models of technology adoption, such as the Technology Acceptance Model (TAM), by incorporating contextual factors specific to healthcare cloud security (Venkatesh & Davis, 2000). Practically, results will offer actionable recommendations for healthcare organizations aiming to improve security measures and streamline adoption processes. Policymakers will also benefit from insights into regulatory challenges and enablers.
Proposed Timeline
- Weeks 1-2: Finalize research problem and develop detailed plan
- Weeks 3-4: Conduct literature review and refine research questions
- Weeks 5-6: Develop research instruments (surveys, interview guides)
- Week 7: Obtain ethics approval
- Weeks 8-10: Data collection (surveys and interviews)
- Weeks 11-12: Data analysis and interpretation
- Weeks 13-14: Drafting and review of research report
- Week 15: Final submission and preparation for presentation
References
- Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W. W. Norton & Company.
- Boonstra, A., & Broekhuis, M. (2010). Barriers to the adoption of enterprise resource planning systems: A review. International Journal of Management Reviews, 12(2), 44–66.
- Kshetri, N., & Voas, J. (2017). Blockchain-enabled e-voting. IEEE Software, 34(4), 95-99.
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46(2), 186–204.
- HIMSS Analytics. (2018). 2018 report on healthcare IT implementation challenges. Healthcare Information and Management Systems Society.
- Lu, Y., & Ramamurthy, K. (2011). Understanding the determinants of cloud computing adoption in healthcare organizations—a model and measurement. Electronic Markets, 21(3), 161–178.
- Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health Information Science and Systems, 2(3).
- Alharkan, I., & Aslam, N. (2018). Cloud computing security in healthcare: A survey. IEEE Access, 6, 64467–64493.
- Holden, R., & Karsh, B. T. (2010). The technology acceptance model: Its past and its future in health care. Journal of Biomedical Informatics, 43(1), 159-172.
- Nguyen, T. T., et al. (2019). Examining the determinants of cloud computing adoption: An integrated model. Procedia Computer Science, 155, 148–154.