Networking, System Support, and Virtualization Research Proposal

Total Length: 2181 words ( 7 double-spaced pages)

Total Sources: 10

Page 1 of 7



Ethical Concerns of the Research

This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The research would also focus on promotion of objectivity and minimization of subjectivity. This is crucial to the development of effective and efficient hypothesis to offer valid testing to the theories and concepts of network security. It is also critical to uphold honesty in the execution and presentation of research findings and analysis. This research would focus on presenting data in accordance with the response of the population sample with the aim of promoting objectivity and openness in evaluation of the findings. The research would also follow the credible steps and procedures in relation to development of quality research design and processes. This is through adhering to the processes and design of qualitative research thus addressing of ethical aspect of research. The research would understand and adhere to legal requirements of the execution of a research.

Critical Approaches vital for the improvement of the Research

In order to improve the quality and validity of the research, it would be ideal to define the research questions precisely in order to offer critical direction to the development of the study. This involves elimination of ambiguity that would arise during the adoption and implementation of the research question. It is also vital to apply quality and effective research instruments to enhance the process of collecting data in relation to the research question. It is also essential to eliminate limitations that would hinder the achievement of valid and reliable information such as a reduction of biasness. It is also significant to adopt sufficient number of research agents or population sample in order to enhance the validity and reliability of the data. The research process would follow critical procedures for the development of the study.
This is an indication of building the research on an effective literature review on relevant resources that would provide accurate information on the research question. It is also vital to maintain objectivity and openness in the execution and presentation of the research findings. This would provide the opportunity for other researchers to enhance or confirm the theories and concepts of the research. Adhering to the ethical guidelines would ensure that research is powerful and valid towards addressing the needs of the research question.

References

Sharma, P, & Bhadana, P 2010, 'An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures', International Journal on Computer Science & Engineering, 1, 5, pp. 1830-1835, Academic Search Complete.

Manangi, S, Chaurasia, P, & Singh, M 2010, 'Analysis of Security Features in 5 Layer Internet Model', International Journal on Computer Science & Engineering, 1, 3, pp. 777-781, Academic Search Complete.

Bhaya, W, & Alasadi, S 2011, 'Security against Spoofing Attack in Mobile Ad Hoc Networks', European Journal of Scientific Research, 64, 4, pp. 634-643, Academic Search Complete.

Singh, S, & Verma, H 2011, 'Security for Wireless Sensor Network', International Journal on Computer Science & Engineering, 3, 6, pp. 2393-2399, Academic Search Complete.

Ambhore, P, Meshram, B, & Wankhade, K 2010, 'Protection of Public Network Communication by using Internet Protocol Security', International Journal on Computer Science & Engineering, 1, 3, pp. 493-499, Academic Search Complete.

Pandey, S 2011, 'Modern Network Security: Issues and Challenges', International Journal of Engineering Science & Technology, 3, 5, pp. 4351-357, Academic Search Complete.

Papaj, J, Dobos, L, & izmar, a 2012, 'Opportunistic Networks and Security', Journal of Electrical & Electronics Engineering, 5, 1, pp. 163-166, Academic Search Complete.

Alshboul, a 2010, 'Information Systems Security Measures and Countermeasures: Protecting Organizational Assets from Malicious Attacks', Communications of the IBIMA, pp. 1-9, Academic Search Complete.

Ristov, S, Gusev, M, & Kostoska,….....

Need Help Writing Your Essay?