Professional Documents
Culture Documents
Chapter Three 3.0 Research Methodology Outline
Chapter Three 3.0 Research Methodology Outline
3.1 Introduction
The main objective of this research was to investigate Banking Data Protection Schemes and
inherent need for cyber security as organization continues to explore secure methods of
protecting their data. Under this chapter, the research philosophy, is explained, research design,
sampling methods, target population, research design as well as the data analysis techniques. The
application of various data collection methods will help this research in answering some research
How can the data protection measures employed by the banks be rolled out in healthcare?
Research method refers to the processes, strategies or techniques used in the collection
This research utilizes case studies research method in gathering of data for the research
question.
order collect data that will help in answering the research question.
This research employs descriptive correlational research design which entails describing
of a problem systematically and providing information about a given situation and hence
The research design employed will be crucial in answering the research question as it
seeks to create an explanation of how the Banking Data Protection Schemes and how
they can be applied to Healthcare Patient-Data Security. by use of this research design,
question such as how can banking data protection schemes can be rolled out to healthcare
Population
This refers to a total number of members of entities, individuals, objects and institutions that
exhibit common characteristics are of interest to a researcher. The study focuses on the banking
organizations in which, the application of Banking Data Protection Schemes will be studied. This
population is crucial owing to the nature of threats that these businesses face. Every bank in the
Sample
Since the number of banks is very high, the study will work with a sample of 21 banks which
will be selected randomly from the entire population of banks across the country. The banks to
be included in the sample are both small scale and large scale banks.
Under this sampling technique, the researcher will be focusing on the collection of the
Materials/Instrument
The data for this research will be collected from banks and this includes the archived data
by the banks
To collect this data, interviews with the CIOs of the banks that will form the sample size
will be undertaken.
Secondary data from the banks will also form an important part of the research,
The data collection will be done through direct interviews, questionnaires and case study
Once the data is collected, it will be processed through electronic data processing to
Owing to the sensitivity of the data handled, this study is limited by the nature of data
that banks are willing to provide on how they protect information with them.
Delimitation.
To do away with the limitation, this study seeks to create assurance that all information
Ethical assurance
All data provided will not be disclosed to third parties and therefore it is only for research
purposes.
Summary
In summary, the chapter gives detailed information on the approaches taken to address
the research question by gathering the necessary data that will help in making informed
judgment. This research utilizes case studies research method in gathering of data for the
research question. Through the targeted population, this research will gather data from the