Having developed a research question and conducted a literature review, the next step is to apply an appropriate research methodology to address the research question. When choosing a research methodology, it is essential that the researcher chooses a methodology that matches the research question.
Gather conclusions from your readings and research as to what method would be best for your topic. For your methodology section:
- Describe methods, populations, and ethics for the information management security issue.
- Qualitative examples may include: case study, multi case-study, Delphi, et cetera.
- Quantitative examples may include: survey, nonexperimental, correlation, et cetera.
- Synthesize the current best quantitative or qualitative methodological approach for your information management security issue.
- Identify what instrument will be used, or for qualitative research, what interview questions will be asked.
- Describe the population chosen and how participants are contacted.
- Describe how sampling is performed.
- Include a 20-reference bibliography.
Review the specific documents from your program on research methodology.
Your writing should demonstrate critical thinking skills, a writing style in which sentences are clear, concise, and direct, and provide a well-supported analysis using appropriately formatted references.
Additional Requirements
- Written communication: Ensure written communication is free of errors that detract from the overall message.
- Number of resources: Include at least 20 current scholarly or professional resources.
- Formatting: Format resources and citations according to current APA guidelines.
- Length: Include 4–6 double-spaced pages, excluding the title page and reference pages. Include a title page and reference page.
- Font and font size: Use Times New Roman, 12 point.
Below are some methodology research resources you can utilize
Readings
- Tests and Methods Searching.
- Sage Research Methods.
- Ray, B. K., Tao, S., Olkhovets, A., & Subramanian, D. (2013). A decision analysis approach to financial risk management in strategic outsourcing contracts. EURO Journal on Decision Processes, 1(3–4), 187–203.
- Relph, A., & Parker, D. (2014). Outsourcing: A strategic risk? Management Services, 58(3), 20–24.
- Sady, B. A. (2013). 4 tips for managing outsourcing risks. CPA Practice Advisor, 23(8), 16.
- Thakurta, R., & Rao, U. H. (2015). Examining risks with outsourcing decisions: A case study. Journal of Services Research, 15(1), 159–170.
- Wayman, M. (2013). Curbing outsourcing risks. Internal Auditor, 70(1), 41–44.
- Wiengarten, F., Pagell, M., & Fynes, B. (2013). The importance of contextual factors in the success of outsourcing contracts in the supply chain environment: The role of risk and complementary practices. Supply Chain Management, 18(6), 630–643.
Use the Internet to explore the following:
- Research Methodology. (n.d.). Research methodology approaches. Retrieved from http://www.dissertationretreat.org/researchMethodology.php
Please, consider the following when writing the assignment
- Identify the research purpose, methodology, and questions to be addressed.
20%
- Describe methods, populations, and ethics for the information risk management issue.
20%
- Synthesize the current best qualitative methodological approach for the information risk management issue.
20%
- Demonstrate critical thinking skills in selecting methods for the analysis of an issue.
20%
- Demonstrate a writing style in which sentences are clear, concise, and direct.
20%