Professional Documents
Culture Documents
Assignment 2 Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing
Assignment 2 Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P6 P7 M4 D3
Summative Feedback: Resubmission Feedback:
Class: GCD18399
Table of Contents
Acknowledgement ................................................................................................................................................. 6
LO4 Reflect on the application of research methodologies and concepts ............................................................ 7
P6 Reflect on the effectiveness of research methods applied for meeting objectives of the computing research
project. ................................................................................................................................................................... 7
6.1) Project proposal ......................................................................................................................................... 7
6.1.1) Project vision ....................................................................................................................................... 7
6.1.2) The requirement .................................................................................................................................. 7
6.1.3) The deliverables ................................................................................................................................... 7
6.1.4) Success criteria .................................................................................................................................... 8
6.1.5) Specify the deadline ............................................................................................................................. 8
6.1.6) Authorization ....................................................................................................................................... 8
6.2) Research process ........................................................................................................................................ 8
6.3) Reflect on the research process ................................................................................................................ 11
6.3.1) Roles of literature review .................................................................................................................. 11
6.3.2) Reflect on research method ............................................................................................................... 12
6.3.3) How I chose participations and the importance of it? ...................................................................... 13
6.3.4) The role of my tutor to create more effective research ..................................................................... 13
P7 Consider alternative research methodologies and lessons learnt in view of the outcomes. ......................... 14
7.1) Alternative research approach................................................................................................................. 14
7.2) Time management plan ............................................................................................................................ 14
7.3) Getting materials ...................................................................................................................................... 14
7.4) Research method ...................................................................................................................................... 15
References ............................................................................................................................................................ 16
Table of Figures
Figure 1.Gantt chart of the project planning ............................................................................................................ 8
Figure 2.Research processes.................................................................................................................................... 9
Figure 3.Work Breakdown Structure ..................................................................................................................... 10
Figure 4.Literature review process ........................................................................................................................ 12
Figure 5.Survey data.............................................................................................................................................. 13
Acknowledgement
Thanks to Ms. Phan Thanh Tra for providing support and the knowledge I needed to complete this research “How
Home Security and Safety IOT device will protect your home?”. As well as everyone else on the research team and
participants for the survey.
This report below will be general view of the achieved results from the research, which we can also learn the mistake
we made from this and propose a better solution for future research project.
LO4 Reflect on the application of research methodologies and concepts
P6 Reflect on the effectiveness of research methods applied for meeting objectives of the computing
research project.
6.1) Project proposal
6.1.1) Project vision
Our topic in this research project is home security, in IOT term it would be a “smart home”. Home security is a very
important feature of home automation and maybe the most crucial one. Home security made a drastic change in the
past few decades and continue to advance much more in the coming years. Previously home security systems meant
having an alarm that would go off when somebody would break in but a smart secure home can do much more than
that with IOT devices such as unlocking doors or adjusting temperatures via a mobile app or a sensor. With all the
benefits that IOT brings, we want to improve home security in our country Danang with high quality IOT product in
affordable price. By getting people to use these products, it will be the standard for every home. In many cases, it
does offer advantages that make our life easier but it sure has some bad sides we should consider and that is what this
research is looking for.
The reason why we are conducting this research and project is we want our home country Danang a safer place with
advanced technology built in their own home. From our research “How Home Security and Safety IOT device will
protect your home?”, most of the IOT products related to home security are very expensive, not easily affordable by
the people. That is why we decided to improved one of the products that is on the market and modify it to make it
cheaper and still working as intended. We believed that this IOT product will help people’s home safer while ensuring
an affordable price for people to buy it and also making more people interest in home’s security. That is what we want
to accomplish upon the completion of this project.
• Selecting the right participants for the survey: People who in contacts with modern technologies and have
basic knowledge about automated products
• Questions related to the subject
• Analyze the feedback from survey
• The report covered literature review, initial hypothesis, primary research, secondary research and analysis
of the research.
• The report is 44 pages long and it contain the data for the research.
Successful criteria
Successfully plan out the project schedule ✓
Studied the research methodologies ✓
Conducted primary and secondary research ✓
Conducted a survey for the project with 100 participants ✓
Analyzed the data gotten from the survey ✓
6.1.6) Authorization
As for authorization, this report will be sent to Ms. Phan Thanh Tra our tutor for approval.
As for the participants from the survey, their information will be confidential and all respondents who answered the
questions accepted that the contents of the survey have been used to research and develop related to the product. Their
feedback will help build the product as intended.
Population research: I can come up with a plan for conducting surveys for them by choosing the correct and
appropriate sample size and sampling method for the research project to get opinions on the subjects being
studied.
Secondary research: in the secondary research process, existing documentations and research papers were used as a
reference for the primary research. Since it makes use of existing data, unlike primary research where data is collected
first-hand from organizations or companies, or where a third party may collect data on their behalf. What were in the
documents are how home security has helped us and how far has advanced since it first started.
Primary research: After finishing up secondary research, primary research is a form of research design in which the
researcher is directly involved in the process of data collection. In other words, the researcher collects the appropriate
data samples directly instead of relying on the already existing data in the study context. As such, we learned the
disadvantages and advantages of home security bring to us, we successfully conducted a survey research from people
around that has knowledge about the topic and gain feedback and idea to build the product.
In addition, all of the above phases can be separated into comprehensive research processes that may be equivalent to
the research phase. The following figure means that the research project also included the description of the object
and problem, research design Population research for sample size and data collection from certain items, or process
consideration. Surveys and data analysis and then the conclusion and project termination were eventually completed.
As for the results, the site compiles all the answers and put in a pie chart for easier understanding:
Figure 5.One of the survey data presented
- People who in contacts with modern technologies and have basic knowledge about automated products. We
will get good feedbacks from these participants since they will know what the good and the bad are.
- People that owned or live in a house that want to improve their security.
- People that want to learn more about IOT technologies.
As for participants amount, we will take a sample from the Danang population which will be the range from 50 to
100 people.
Below are some steps that I can do to management time better in future project:
Here are some guidelines I can follow next time when I do secondary research:
• Ideas or concepts discussed during the brainstorming sessions for Secondary Research can hold the key to
future secondary research. So, make a note of each and every conversation held at different stages of the
creative process
• Cross-verify the credibility of any data gathered from the Internet
• Online data can be modified without a prior notice, so if you use websites as the source of your secondary
data, take screenshots for future reference
• Go through the appendix and references to check the credibility of reports and statistics
• Pay more importance to detailed references, as that data is deemed more credible
• There is no point in spending too much time on copying or summarizing secondary research data, as it gains
value only when this data is critically reviewed by the researcher, and actionable results are drawn
For interview we can ask experts that know thing ways around home security technologies and devices. The
interviewer (which is not necessarily the researcher) could adopt a formal or informal approach, either letting the
interviewee speak freely about a particular issue or asking specific pre-determined questions. This will have been
decided in advance and depend on the approach used by the researchers. A semi-structured approach would enable
the interviewee to speak relatively freely, at the same time allowing the researcher to ensure that certain issues were
covered.
As for experiment, we can send the prototype product to a specific group (e.g., members of the project or participants
from the survey) to test the product and give feedback on it after a week or two of using it.
Conclude
This research project “How Home Security and Safety IOT device will protect your home?” is the first research
project I have ever done. It has it flaws but with this I can learn my mistakes and do better next time. This research
has fulfilled it aims and goals so I’m still considering this is a success. Thanks to Ms. Phan Thanh Tra and every
member in the team for making this possible. With this I have gained some experiences and skills. Next time I do a
research project I will guaranteed that the result will be better.
References
[Online]
Available at: https://pubricahealthcare.medium.com/the-importance-of-literature-review-in-research-writing-
67f5af941650
[Accessed 19 Dec 2020].