Chat with us, powered by LiveChat details to be uploaded Impact of technology in business Research Proposal: Final Assignment Ins - STUDENT SOLUTION USA

details to be uploaded

Impact of technology in business

Research Proposal: Final Assignment Instructions

The purpose of the Research Proposal: Final Assignment is to ensure you appreciate the challenge of setting up an effective research plan, consider the context, research questions, sources, timeline, integrated implications, analysis, and writing required. Building a proposal will demand you work through all the research stages explored throughout the course including: clarifying the research question; designing the research; reviewing relevant scholarly literature, data collection, preparation and examination; analyzing the data; and reporting on the research.

Using the Research Proposal: Topic Assignment that has been approved, build a comprehensive research proposal on that topic.

The Research Proposal: Final Assignment should use the following outline/structure and follow the suggested quantity of content for each element:

· Title – clear, concise and well-defined to explain your research question.

· Executive Summary – short summary of 100-250 words that includes the research question, hypothesis of your research, the research methodology and findings.

· Introduction (>200 words) – provide a background or context related to your research problem. It should include the purpose, background, significance, issues, variables and hypothesis.

· Problem statement (< 100 words) – clearly state the specific problem down to something that is researchable. Present it in a thesis statement and a hypothesis.

· Literature Review (1000-1300 words) – conduct extensive background research and support your research question with ample proof from scholarly, peer reviewed sources. credible sources and research. There is additional help on literature reviews below in the section titled Additional Help.

· Importance/Benefits of the Study (>250 words) – describe the explicit benefits

· Research Design (>400 words) – explains the phases of the research, sampling design, participants, data collection design, instruments, procedures, ethical requirements, etc.

· Nature and Form of Results (>250 words) – explain the anticipated form for the results to include the types and format of data to be presented for the expected audience.

· Budget (>150 words) – summary of costs and expenses necessary to conduct the research.

· Schedule (>150 words) – summarize the major phases, timelines, milestones and primary deliverables.

· Ethical considerations (>200 words) – must carefully consider data collection processes and participant rights.

· Implications and considerations (>200 words) – identify at least 2 implications and 2 limitations of the proposed study.

· References

Ensure the following requirements are met:

· Follow the outline, content structure and length provided in the assignment instructions

· At least 3,000 words (excluding the title page and references pages)

· Reference at least 10 scholarly (peer reviewed) research articles. For assistance on how to identify scholarly sources, refer to the Liberty University Research Portal tutorials (see Resources section).

· Use proper grammar, current APA format and submit in MS Word format.

The Research Proposal: Final Assignment does not require an abstract or Biblical integration.

Do not reuse work from any previous courses you have taken.

Paraphrasing vs. Plagiarism

Some students do not fully understand the difference between plagiarism and paraphrasing. Paraphrasing is when you take a source or someone else’s idea and say it in your own words. When you paraphrase, you must still give the author’s name, date, title of the source, the scholarly journal it came from, and the exact website address or book.

Due to the nature of a research proposal, you should have less than 100 words of quotation. When you directly quote a source, it must have quotation marks around the quote, or (if 40 words or more) it must be set in block quotation format. Using APA style citations provide detailed information of where you acquired the quote.

For the purpose of this academic paper, adhere to the following rules when quoting or using a source:

· Do not directly quote more than 30 words from any 1 source.

· If the source is 2,000 words or less, do not directly quote more than 25 words from the source.

· When quoting or paraphrasing, do not use the same source more than 3 times within the whole document.

· Quotes must follow APA style and contain the section (if provided) and paragraph or page numbers of the quote.

· In all instances, use current APA guidelines for citations and references.

The literature review portion of the Research Proposal: Final Assignment must not be a series of quotations and you must explain the quotation relevance/application to your proposal. Because of this, paraphrasing is preferred to quotation since it demands an understanding of the material. You may email your instructor with any questions regarding the Research Proposal: Final Assignment.

Additional Help

Schindler’s (2019) chapter 17 provides a good orientation to all the elements of research and Schindler’s (2019) appendix a provides a solid orientation to the research proposal.

You should examine a couple published literature reviews so you can familiarize yourself with what a literature review is and how it is set up. Below are 2 published literature reviews from the Jerry Falwell Library databases that will help you understand the literature review portion of the research proposal assignment (see Resources section for links).

Morgeson, F. P., DeRue, D. S., & Karam, E. P. (2010). Leadership in teams: A functional approach to understanding leadership structures and processes. Journal of Management, 36(1), 5–39. Doi:10.1177/0149206309347376

Stewart, G. L., Courtright, S. H., & Manz, C. C. (2011). Self-leadership: A multilevel review. Journal of Management, 37(1), 185–222. Doi:10.1177/0149206310383911

For assistance on how to identify scholarly sources, refer to the Liberty University Research Portal tutorials (see Resources section) on Defining Databases and Journals.

View the Research Proposal: Final Resources section under the Research Proposal: Final page.

Page 1 of 2

Running head: IMPACT OF TECHNOLOGY IN BUSINESS

2

IMPACT OF TECHNOLOGY IN BUSINESS 2

Impact of technology in business

Student’s name:

Professor:

Date:

The business-related topic of Interest is the roles played by technology in businesses operations. It is also good to look at the impact of the technology on the business, both merits, and demerits.

Problem statement: Most businesses are in a dilemma since they are not sure if they should embrace the technologies to enhance the business operation to improve the business continuity or shun the while process since, at times, it could cause a big threat. Some of the threats to the business caused by the technology are being hacked or even information being stolen. There are many continuity drivers in business that have been availed by the technology, and the need to ensure tare is business continuity despite the challenges. Technology has also made it easy for businesses to research and also store crucial sets of data that can be used for the future by understanding the market and other crucial trends.

The research questions: Do the benefits of the technology win over the disadvantages? Another research question is about the roles and the importance played by the technologies in the business and the way they operate? The other crucial question is if it is possible to lower the cost of embracing technology for the business to adapt and if the threats can be countered. It is also good to understand if there are limitations associated with the business continuity and the impact caused by it. The threats brought about by the technologies, could they be countered, or is it necessary to have them ignored?

Ethical issues in information technology business and E-business. (n.d.). The Ethics of Information Technology and Business, 156-202. 
https://doi.org/10.1002/9780470774144.ch5

The article has managed to exploit the opportunities availed by eCommerce and the importance of e-commerce in the modern business world. The article has captured most of the aspects of ethics in information technology and business. Some of the ethics that have been touched by yeh article include the CIA triad, which is applied in IT, information governance, and eCommerce, which is part of the IT in business. The article has acknowledged that the modern trends in business revolve around IT and eCommerce. The article can be believed since it has been frequently reviewed, and it is up to good writing standards. I would recommend the article to be used by the incoming students as it has effectively managed to capture the impact of technology under the eCommerce and technology.

Draheim, D. (2010). Research opportunities in business process technology. Business Process Technology, 45-74. 
https://doi.org/10.1007/978-3-642-01588-5_3

The article has conclusively researched the issues opportunities’ availed by the technology to the business. Via the process technology, the article has accurately mentioned and described the opportunities that have been availed. The article has also managed to touch on the importance of technology in businesses and the positive impact they have brought by availing more opportunities that can be exploited to increase profitability and ensure there is business continuity. According to the article, and it also matches with my opinion is that most of the opportunities have been brought about by the aspect of technological improvement, which is fundamental. The article has been peer-reviewed and can be used by future students to advance their learning.

Edwards, C. (2014). Ending identity theft and cybercrime. Biometric Technology Today2014(2), 9-11. 
https://doi.org/10.1016/s0969-4765(14)70033-5

To ensure that the business continues despite the challenges brought about by the technologies, it is important that the businesses invest in the security of their properties, both physically and in IT. According to the article, the business can easily invest in biometric technologies to have their business benefit from high levels of security. The article has mentioned unique physical features and characteristics as the main proponents of biometric recognition. I agree with the article that each individual has a unique body feature, and once applied, the security of the information and access to the premises can be controlled. These are the major way in which business continuity can be assured via technological improvement.

Bajgoric, N. (2009). Business continuity and business continuity drivers. Continuous Computing Technologies for Enhancing Business Continuity, 40-59. 
https://doi.org/10.4018/978-1-60566-160-5.ch003

The article has managed to capture the importance of the business continuity drivers in the role they play in business continuity. The article has also mentioned more in computing technologies, intending to explain the importance as part of the continuity drivers. As per the article, it is good to ensure tata the business continues despite the challenges caused by various aspects of operations. Continuity of business is always propelled by the drivers, which has been captured and described by the article conclusively. I would recommend the article to be sued by future students who wish to study business due to its importance and the quality of the research done.

Holmes, D. E. (2017). 6. Big data, big business. Big Data: A Very Short Introduction, 75-89. 
https://doi.org/10.1093/actrade/9780198779575.003.0006

Holmes is a renowned author in matters big data and big business. He has acknowledged that big data is part of the technical aspects of modern businesses and the modern market. The article is conclusive by claiming that the data is essential in the business as it helps them in establishing the current trends and also being capable of predicting and prophesying about the future. Since the author is known and respected in technology, the article cannot be doubted. The author spends a lot of time researching these issues, and the findings are clear. I would recommend that the article be used by students who wish to understand more about the impact of big data in business as part of the technology.

Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. (n.d.). 
https://doi.org/10.3403/30168355u

Based on the article, the importance of security information technology has not been omitted or be ignored. According to the article, it is essential if the business can invest in the elements and security properties. The IT security=ity must be secure at all times so avoid facing possible threats brought about by the available vulnerabilities, and managing them can be costly. The article has acknowledged the need to adhere to rigid security guidelines to avoid being hacked or negatively affected by the threats. Some of the named security techniques involved by the article include biometric recognition and also data encryptions.

Vieira, A., & Ribeiro, B. (2018). The business impact of DL technology. Introduction to Deep Learning Business Applications for Developers, 237-254.

Deep learning as part of the existing and modern technology that has a great impact on most businesses has been captured in the article by Vieira and his colleague. They managed to write the article as a group to be conclusive and capture all the aspects of deep learning. From the article, it is true to say that the impact of deep learning as technology has helped improve the business and the way they operate. Deep learning has a lot of applications in businesses, and the developers have been greatly equipped by it. The article should be used by the developers of deep learning and the student aspiring to be in the field of business without wanting to be left behind technologically.

Nayyar, A., Rameshwar, R., & Solanki, A. (2020). Internet of things (IoT) and the digital business environment: A standpoint inclusive cyberspace, cybercrimes, and cybersecurity. The Evolution of Business in the Cyber Age, 111-152. 
https://doi.org/10.1201/9780429276484-6

The impact and the importance of the technology have been captured in the article. The article has mange to establish and discuss the importance of the IoT in the digital business environment. The article has conclusively acknowledged that there has been a significant improvement at this cyber age, and there has been a significant evolution and development.IT is now technically Impossible to conduct businesses manually and, at the same time, expect to serve many clients without moving to the digital world. It is true to say that the IOT has managed to take the businesses to the next developmental and growth stage and hence should be embraced for assured business continuity and profitability.

Hoon, H. T., & Phelps, E. S. (2006). Effects of technological improvement in the ICT-producing sector on business activity. SSRN Electronic Journal
https://doi.org/10.2139/ssrn.906101

The authors of the article have been well known in the field of business and ICT. They have conclusively touched on the impact of ICT in the business sector. It is good to deduce the findings from the article that ICT revolved around electronics, and today it is fundamentally essential in the modern business world. The article has been severally reviewed and improved from the original one. There are no elements of plagiarism, and the work is commendable to be used in the future by incoming students. The article has claimed that ICT has played a very crucial role in shaping the way business is being done today in the computer era.

Halder, D. (2021). undefined. Cyber Victimology, 47-56. 
https://doi.org/10.4324/9781315155685-4

The article by Halder has touched on the impact cyber crimes have brought to the business world. Via the article, indeed, cybercrime is currently being taken as a form of business though illegal since they ask for ransoms whenever a site or an organization has been attacked. In modern business, organizations have employed ethical hackers who are good at checking the vulnerability of the systems and recommend the best way to make the system stronger and less vulnerable. Cybercrimes have continuously caused businesses to think about the future by investing more in security and other essentials for data and information keeping to avoid landing in the wrong hands. There are also challenges when it comes to the regulations in IT, and hence cybercrimes should be severely be punished to avoid risking most businesses.

References

Bajgoric, N. (2009). Business continuity and business continuity drivers. Continuous Computing Technologies for Enhancing Business Continuity, 40-59. 
https://doi.org/10.4018/978-1-60566-160-5.ch003

Draheim, D. (2010). Research opportunities in business process technology. Business Process Technology, 45-74. 
https://doi.org/10.1007/978-3-642-01588-5_3

Edwards, C. (2014). Ending identity theft and cybercrime. Biometric Technology Today2014(2), 9-11. 
https://doi.org/10.1016/s0969-4765(14)70033-5

Ethical issues in information technology business and E-business. (n.d.). The Ethics of Information Technology and Business, 156-202. 
https://doi.org/10.1002/9780470774144.ch5

Halder, D. (2021). undefined. Cyber Victimology, 47-56. 
https://doi.org/10.4324/9781315155685-4

Holmes, D. E. (2017). 6. Big data, big business. Big Data: A Very Short Introduction, 75-89. 
https://doi.org/10.1093/actrade/9780198779575.003.0006

Hoon, H. T., & Phelps, E. S. (2006). Effects of technological improvement in the ICT-producing sector on business activity. SSRN Electronic Journal
https://doi.org/10.2139/ssrn.906101

Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. (n.d.). 
https://doi.org/10.3403/30168355u

Nayyar, A., Rameshwar, R., & Solanki, A. (2020). Internet of things (IoT) and the digital business environment: A standpoint inclusive cyberspace, cybercrimes, and cybersecurity. The Evolution of Business in the Cyber Age, 111-152. 
https://doi.org/10.1201/9780429276484-6

Vieira, A., & Ribeiro, B. (2018). The business impact of DL technology. Introduction to Deep Learning Business Applications for Developers, 237-254. 
https://doi.org/10.1007/978-1-4842-3453-2_10

error: Content is protected !!