H6a: Top-level executives in organizations implement a variety strategies or frameworks to combat information security threats and other problems.
H There are no challenges in information security governance at the corporate level.
Completing your quantitative dissertation
Advantages and disadvantages of adopting cloud computing from an enterprise perspective. The dependent variables in this study will be the corporate challenges encountered in the implementation of information security governance and risk management strategies, while strategic alignmentof enterprise information security governance, risk management, resource management, performance measurement,and value delivery, will be the independent variables. The study also expects to find that many of the organizations participating in this study have an awareness of the standardization requirements mentioned by ISACA De Haes et al. Nonetheless, if you would like to see a dedicated section to mixed methods dissertations sooner than later, please leave feedback. From an executive leadership perspective, this study will compile information from organizations in different industries, with the inclusion of information from top-level leaders De Haes et al. A classic stylized fact was the discovery of the many maladies i. The quick turnaround and impeccable work of Dissertation-Editor has made all the difference! Well-known theories include social capital theory Social Sciences , motivation theory Psychology , agency theory Business Studies , evolutionary theory Biology , quantum theory Physics , adaptation theory Sports Science , and so forth. For example, a researcher may have proposed a new theory in a journal article, but not yet tested it in the field by collecting and analysing data to see if the theory makes sense. Respondents should be well informed about the details and purpose of the survey including how the information will be used and stored.
Decision Support System, 50 4 RQ3: What strategies or frameworks do top-level executives in organizations take to tackle information security challenges? The researcher will make use of the multiple regression analysis statistical model to test the hypotheses and assess the correlation between the variables presented.
Quantitative dissertation meaning
Foundations of Management. Asian Social Science, 11 22 , The top-level executives are the ones to complete it. The theory has been used in previous information security governance research as explicated by Mishra For future research recommendations, De Haes et al. MIS Quarterly, 39 2 , A7. Social action theory for understanding information security non-compliance in hospitals. They try to use probability sampling techniques, with the goal of making generalisations from the sample being studied to a wider population, although often end up applying non-probability sampling techniques. Information security management needs more holistic approach: A literature review. Ping-Ju Wu, S.
Flores, R, W. Angela N. Mishra, S.
Measurement of quality reliability and validity of instruments used for data collection are crucial to ensuring the legitimacy of the study. Janina A.
Mixed methods dissertation
Debreceny, R. Von Solms, B. Van Niekerk, J. The measure of information security governance in this study will follow the recommendations mentioned by De Haes et al. Decision Support System, 50 4 , In this study variables will be identified and defined. I'm thankful for your services. A review on risk mitigation of IT governance. From the findings of previous research, some of the challenges include; difficulties in the understanding of the complexities of technical information security frameworks, issues in assigning governance responsibilities, as well as problems in compliance with the legal and standardization practices in the respective industries Fenz et al.
based on 16 review