Find The Below Dissertations In The ProQuest Dissertations A

Find The Below Dissertations In The Proquest Dissertations Provide A

Find the below dissertations in the Proquest Dissertations. Provide a summary of the research methods in each dissertation. Quantitative Methodology: Dominguez, A. (2013). Evaluating the acceptance of cloud-based productivity computer solutions in small and medium enterprises (Order No. ). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I ProQuest Dissertations & Theses Global. ().

Qualitative Methodology: Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. ). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I ProQuest Dissertations & Theses Global. ().

Mixed Methods: Srinivas, S. K. (2018). Security analytics tools and implementation success factors: Instrument development using delphi approach and exploratory factor analysis (Order No. ). Available from Dissertations & Theses @ Capella University; ProQuest Dissertations & Theses A&I ProQuest Dissertations & Theses Global. ().

Paper For Above instruction

Analysis of Research Methodologies in Selected Dissertations from ProQuest

Understanding the research methodologies employed in academic dissertations provides insight into how scholars approach complex issues and contribute to their fields. The three dissertations under review—dominated by diverse research paradigms—highlight the nuanced application of quantitative, qualitative, and mixed methods. Each employs distinct strategies tailored to their specific research questions, aiming to generate valid, reliable, and insightful findings.

Quantitative Methodology: Dominguez (2013)

Dominguez’s dissertation utilizes a primarily quantitative research methodology to evaluate the acceptance of cloud-based productivity solutions among small and medium enterprises (SMEs). Quantitative research involves the collection of numerical data that can be statistically analyzed to identify patterns, relationships, and significant differences. In this case, Dominguez likely employed structured surveys or questionnaires distributed to SME decision-makers and employees, capturing their perceptions, attitudes, and usage behaviors regarding cloud solutions.

This approach typically involves predefining hypotheses or research questions, developing standardized measurement instruments, and employing statistical tools—such as descriptive statistics, inferential analyses, and possibly regression models—to analyze the data. The goal is to quantify acceptance levels and identify factors influencing adoption, providing empirical evidence to support organizational decision-making. The rigorous nature of quantitative methods enhances generalizability and the ability to test theories statistically, aligning well with the dissertation’s aim to evaluate acceptance levels across a broad SME population.

Qualitative Methodology: Burkhead (2014)

Burkhead’s phenomenological study adopts a qualitative research framework to explore the lived experiences of information security professionals encountering security incidents in their work environments. Phenomenology is a qualitative approach focused on understanding individuals’ subjective experiences and the essence of particular phenomena. Typically, data collection methods include in-depth interviews, focus groups, or personal narratives, aiming to gather rich, detailed descriptions of participants’ perceptions and emotions.

This methodology involves thematic analysis or interpretative analysis to identify common patterns, meanings, and themes in the data. By examining how security professionals experience and manage incidents, the study seeks to generate an in-depth understanding of their challenges, coping mechanisms, and perceptions of incident management efficacy. The ethnographic nature of phenomenology enables researchers to develop nuanced insights that are contextually rich and reflective of real-world complexities, making it highly suitable for exploring experiential phenomena such as security incidents.

Mixed Methods: Srinivas (2018)

Srinivas’s dissertation employs a mixed methods approach, integrating both qualitative and quantitative procedures to develop an instrument assessing security analytics tools and identifying success factors. The study begins with qualitative techniques—specifically the Delphi method, which involves iterative rounds of expert consultation to reach consensus on critical factors or constructs related to security analytics and implementation success.

This qualitative phase is complemented by quantitative techniques, such as exploratory factor analysis (EFA), used to validate the instrument and uncover underlying dimensions of success factors. The combination of Delphi and EFA allows for a comprehensive understanding: the Delphi process ensures content validity through expert consensus, while EFA statistically identifies latent constructs within the gathered data.

This integrative methodology supports robust instrument development by capturing expert insights and empirically testing the instrument’s structure, thereby enhancing its reliability and applicability. The mixed methods design ensures a comprehensive exploration of complex phenomena, making it a powerful approach in technology and security research domains.

Conclusion

Each dissertation demonstrates the strategic application of research methodologies aligning with their specific research questions and objectives. Dominguez's quantitative approach enables broad generalizability of findings related to technology acceptance among SMEs. Burkhead's qualitative phenomenology provides deep insights into personal experiences with security incidents. Srinivas’s mixed methods approach combines the strengths of both paradigms to develop a validated instrument for understanding success factors in security analytics deployment.

Collectively, these dissertations exemplify the importance of methodological rigor and tailored design in producing impactful research capable of informing both academic theory and practical application in the field of information security and technology adoption.

References

  • Dominguez, A. (2013). Evaluating the acceptance of cloud-based productivity computer solutions in small and medium enterprises. ProQuest Dissertations Publishing.
  • Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management. ProQuest Dissertations Publishing.
  • Srinivas, S. K. (2018). Security analytics tools and implementation success factors: Instrument development using delphi approach and exploratory factor analysis. ProQuest Dissertations Publishing.
  • Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
  • Patton, M. Q. (2015). Qualitative research & evaluation methods: Integrating theory and practice. Sage publications.
  • Franklin, B. (2014). The Delphi technique: A review. International Journal of Qualitative Methods.
  • Leedy, P. D., & Ormrod, J. E. (2014). Practical research: Planning and design. Pearson.
  • Yin, R. K. (2018). Case study research and applications: Design and methods. Sage publications.
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478.
  • Fitzgerald, B., & Kenny, R. (2016). Process modeling and IS design: A review and research agenda. European Journal of Information Systems, 25(6), 517-547.