Uploaded by krishanth723

A-069727-1669096702294-141804-computing research Proposal 1

advertisement
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
BTEC HND in Computing
Mr. Lilanka
Assessor
Internal Verifier
Unit 13: Computing Research Project
Unit(s)
Final Research Project Proposal - Remote working
Assignment title
Jeyakumar Krishanth
Student’s name
List which assessment criteria
the Assessor has awarded.
Pass
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Has the work been assessed
accurately?
Y/N
Y/N
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria?
• Identifying opportunities for improved
performance?
Y/N
Y/N
Y/N
• Agreeing actions?
Y/N
Does the assessment decision need
amending?
Y/N
Assessor signature
e
Date
Internal Verifier signature
date e
Programme Leader signature (if required)
Jeyakumar Krishanth
date e
Unit 13: Computing Research Project proposal
|1
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|2
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Jeyakumar Krishanth
Unit Title
Unit 13: Computing Research Project
1
Assessor
2022/11/22
Submission Date
Date Received 1st
submission
Re-submission Date
Date Received 2nd
submission
Assignment Number
Assessor Feedback:
LO1 Examine appropriate research methodologies and approaches as part of the research
process
Pass, Merit & Distinction
Descripts
Grade:
P1
P2
M1
D1
Date:
Assessor Signature:
Resubmission Feedback:
Grade:
Assessor Signature:
Internal Verifier’s Comments:
Date:
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|3
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Feedback: Student to Assessor
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|4
Assessor signature
Date
Student signature
Date
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|5
Pearson
Higher Nationals in
Computing
Unit 13: Computing Research Project
Proposal
Name: Jeyakumar Krishanth
Module Name: computing research project
Program Name: Higher National Diploma In
computing
Topic: Final Research Project Proposal - Remote
working
Registration number: Col/A-00061867
Word count: 10425
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|6
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|7
General Guidelines
1.
A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2.
Attach this brief as the first section of your assignment.
3.
All the assignments should be prepared using a word processing software.
4.
All the assignments should be printed on A4 sized papers. Use single side printing.
5.
Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both intext citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|8
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
|9
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson , UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Krishanth723@gmail.com
22/11/2022
Student’s Signature:
(Provide E-mail ID)
Date:
(Provide Submission Date)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 10
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
Unit Number and Title
Academic Year
Unit Tutor
Jeyakumar Krishanth
Unit 13 – Computing Research Project
2021/22
Mr.lilanka
Assignment Title
Issue Date
Submission Date
22/11/2022
IV Name & Date
Submission format
Research Project Proposal
•
•
The submission is in the form of an individual written report.
This should be written in a concise, formal business style using single spacing and font
size 12.
•
You are required to make use of headings, paragraphs and subsections as appropriate,
and all work must be supported with research
•
•
Reference using the Harvard referencing system.
Please provide a referencing list using the Harvard referencing system.
The recommended word limit is minimum 2000 words.
Unit Learning Outcomes:
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 11
LO1. Examine appropriate research methodologies and approaches as part of the research
process.
Assignment Brief and Guidance:
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 12
Remote Working
“The option to work remotely was already being embraced by some businesses in the
prepandemic era. These businesses were making some progress to adapt their working
practices to accommodate remote working by allowing those in certain job roles to take the
opportunity to work from home, albeit a day or two a week. However, on the whole there had
been a reluctance to have staff working remotely and this has largely centred around
productivity concerns, security implications and technology issues.
The global pandemic however necessitated and accelerated the move to remote working. The
vast majority of businesses have now shifted some or all of their operations online, and almost
all of their staff are working from home. The enabling force behind this necessary shift has been
the different technologies and platforms that facilitate workers to achieve business goals
remotely.
This sudden shift to remote working took place within weeks and months and has not been
without issues. Several surveys conducted during this period cited business leaders complaining
about how technology problems have impacted their business and employees while working
remotely.
The biggest issues remote workers face are being frequently disconnected from corporate
networks, slow file downloads, poor quality of video meetings and long response times when
loading apps. As a result, building secure, effective and integrated technology capability, to
continue this flexibility in the workforce, has now become a priority for all organizations.“
(Pearson, 2020)
Choosing a research objective/question.
Students are required to choose a research topic and come up with their own research
questions based on the suggested research scope. It is extremely important to complete a
strong research project with clear, well focused and defined objectives. A central skill in
selecting a research objective is the ability to select a suitable and focused research objective.
The research topic could be based on the following areas.
•
Digital transformation strategies
•
Monitoring and productivity tools, their uses and implications
security concerns when working remotely.
Jeyakumar Krishanth
Key
Unit 13: Computing Research Project proposal
| 13
The Learner requires to produce a research proposal that clearly defines a research question
or hypothesis, supported by a literature review (Use the project proposal and ethical
consideration form template formats)
Project Proposal should cover following areas.
1. Definition of research problem or question. (This can be stated as a research question,
objectives or hypothesis)
2. Provide a literature review giving the background and conceptualization of the proposed
area of study. (This would provide existing knowledge and benchmarks by which the data
can be judged)
3. Critically evaluate research process /different research methodologies by demonstrating
an understanding of the pitfalls, ethical issues, and limitations. choose a suitable research
methodology and Justify the selection.
Draw points (1–3, above) together into a research proposal by getting agreement with your
tutor.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 14
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 15
Grading Rubric
Grading Criteria
Achieved
Feedback
P1 Produce a research proposal that clearly defines a
research question or hypothesis, supported by a literature
review
P2 Examine appropriate research methods and conduct
primary and secondary research.
M1 Evaluate different research approaches and
methodology and make justifications for the choice of
methods selected based on philosophical/ theoretical
frameworks.
D1 Critically evaluate research methodologies and processes
in application to a computing research project to justify
chosen research methods and analysis.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 16
Research Proposal Form
Student Name
Jeyakumar Krishanth
Student number
Col/A-00061867
Centre Name
ESoft metro campus
Unit
Computing research project
Tutor
Mr. lilanka
Date
2022/11/22
Proposed title
Digital Transformation strategies for MAG CITY to remote work
Section One: Title, objective, responsibilities
Title or working title of research project (in the form of a question, objective or hypothesis): Research
project objectives (e.g. what is the question you want to answer? What do you want to learn how
to do? What do you want to find out?): Introduction, Objective, Sub Objective(s), Research
Questions and/or Hypothesis
Section Two: Reasons for choosing this research project
Reasons for choosing the project (e.g. links to other subjects you are studying, personal interest,
future plans, knowledge/skills you want to improve, why the topic is important): Motivation,
Research gap
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 17
Section Three: Literature sources searched
Use of key literature sources to support your objective, Sub Objective, research question and/or
hypothesis: Can include the Conceptual Framework
Section Four: Activities and timescales
Activities to be carried out during the research project (e.g. research, development, analysis of ideas,
writing, data collection, numerical analysis, tutor meetings, production of final outcome, evaluation,
writing the report) and How long this will take:
Milestone
Propose completion data
Comments and agreement from tutor
Comments (optional):
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 18
Section Five: Research approach and methodologies
Type of research approach and methodologies you are likely to use, and reasons for your choice:
What your areas of research will cover: Research Onion; Sample Strategy/Method; Sample Size
Reference List
I confirm that the project is not work which has been or will be submitted for another qualification
and is appropriate.
Agreed Yes ☐
No ☐ Name
Date
Comments and agreement from project proposal checker (if applicable)
Comments (optional):
I confirm that the project is appropriate.
Agreed Yes ☐
No ☐ Name
Date
Research Ethics Approval Form
All students conducting research activity that involves human participants or the use of data
collected from human participants are required to gain ethical approval before commencing their
research. Please answer all relevant questions and note that your form may be returned if
incomplete.
Section 1: Basic Details
Project title:
Digital Transformation strategies for MAG CITY to remote work
Student name:
Jeyakumar Krishanth
Student ID number:
col/a-00061867
Program:
HND-COM BATCH 105
School:
ESOFT METRO CAMPUS
Intended research start date:
Intended research end date:
Section 2: Project Summary
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 19
Please select all research methods that you plan to use as part of your project
• Interviews:
☐
• Questionnaires:
☐
• Observations: ☐
• Use of Personal Records: ☐
• Data Analysis: ☐
• Action Research:
☐
Focus Groups: ☐
• Other (please specify): ☐ ................................................................
Section 3: Participants
Please answer the following questions, giving full details where necessary. Will
your research involve human participants?
Who are the participants? Tick all that apply:
Age 12-16 ☐
Young People aged 17–18 ☐ Adults ☐
will participants be recruited (identified and approached)?
How
Describe the processes you will use to inform participants about what you are doing:
Studies involving questionnaires:
Will participants be given the option of omitting questions they do not wish to answer?
Yes ☐
No ☐
If “NO” please explain why below and ensure that you cover any ethical issues arising from this.
Studies involving observation:
Confirm whether participants will be asked for their informed consent to be observed.
Yes ☐
No ☐
Will you debrief participants at the end of their participation (i.e. give them a brief explanation of
the study)?
Yes ☐
No ☐
Will participants be given information about the findings of your study? (This could be a brief
summary of your findings in general)
Yes ☐
No ☐
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 20
Section 4: Data Storage and Security
Confirm that all personal data will be stored and processed in compliance with the Data Protection
Act (1998)
Yes ☐
No ☐
Who will have access to the data and personal information?
During the research:
Where will the data be stored?
Will mobile devices such as USB storage and laptops be used?
Yes ☐
No ☐
If “YES”, please provide further details:
After the research:
Where will the data be stored?
How long will the data and records be kept for and in what format?
Will data be kept for use by other researchers?
Yes ☐
No ☐
If “YES”, please provide further details:
Section 5: Ethical Issues
Are there any particular features of your proposed work which may raise ethical concerns? If so,
please outline how you will deal with these:
Section 6: Declaration
I have read, understood and will abide by the institution’s Research and Ethics Policy:
Yes ☐
No ☐
I have discussed the ethical issues relating to my research with my Unit Tutor:
Yes ☐
No ☐
I confirm that to the best of my knowledge:
The above information is correct and that this is a full description of the ethics issues that may arise
in the course of my research.
Name:
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 21
Date:
Please submit your completed form to: ESOFT Learning Management System (ELMS)
Digital Transformation strategies for MAG CITY to
remote work
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 22
Contents
Higher Nationals - Summative Assignment Feedback Form.......................................................... 3
Assignment Feedback ................................................................................................................. 4
Computing ..................................................................................................................................... 6
Research Proposal Form ........................................................................................................... 17
Research Ethics Approval Form ........................................................................................... 19
Table of Figures ........................................................................................................................ 26
ACKNOWLEDGMENT ........................................................................................................... 28
Introduction to the company ..................................................................................................... 29
MAG CITY has its own Mission & vision ............................................................................... 29
Services of MAG CITY ............................................................................................................ 30
How did Mag CITY work during the Covid-19 ....................................................................... 30
Introduction Research area........................................................................................................ 31
Remote working ........................................................................................................................ 31
History of remote working ........................................................................................................ 31
How Remote working works in the world pandemic Covid-19 ............................................... 32
Advantages of remote working ................................................................................................. 32
Disadvantages of Remote Working .......................................................................................... 34
Introduction to digital transformation Strategy ......................................................................... 35
Problem statement ..................................................................................................................... 36
Research Significance ............................................................................................................... 37
Research objectives ................................................................................................................... 38
Research Questions ................................................................................................................... 39
Conceptual framework ............................................................................................................ 40
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 23
Hypothesis ................................................................................................................................. 40
Chapter 2 Literature review ...................................................................................................... 42
Literature review for Digital Transformation Strategies for Remote working ......................... 42
Literature review ON Virtual meetings and digital Transformation strategies For Remote
working ..................................................................................................................................... 44
Literature review On Document file /sharing and Digital Transformation Strategies For
Remate working ........................................................................................................................ 46
Literature review On Document Admin Logging and Digital Transformation Strategies For
Remate working ........................................................................................................................ 48
Literature review On Document Employee management and Digital Transformation Strategies
For Remate working ................................................................................................................. 50
Chapter 03 Methodology .......................................................................................................... 52
Research onion .......................................................................................................................... 52
Philosophy -Positivism ............................................................................................................. 53
Research Approach -Deductive ................................................................................................ 54
Research Strategy-Survey ......................................................................................................... 54
Research Method –Mono method: Quantitative ....................................................................... 55
Time Horizon ............................................................................................................................ 55
Techniques and procedures ....................................................................................................... 56
Data collection .......................................................................................................................... 56
Target population ...................................................................................................................... 56
Sample Size ............................................................................................................................... 56
Data collection method ............................................................................................................. 57
Data analysis ............................................................................................................................. 57
Role Of Researcher ................................................................................................................... 58
Time management ..................................................................................................................... 58
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 24
Planning .................................................................................................................................... 58
Data collection .......................................................................................................................... 58
Data management ...................................................................................................................... 58
Documenting ............................................................................................................................. 59
Gant chart .................................................................................................................................. 60
References ................................................................................................................................. 62
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 25
Table of Figures
Figure 1: Logo of mag city ........................................................................................................... 29
Figure 2: Conceptional framework ............................................................................................... 40
Figure 3 : Digital Transformation Method .................................................................................... 43
Figure 4 : Research Onion ............................................................................................................ 52
Figure 5 : The Morgan Table ........................................................................................................ 57
Figure 6: Process of Gant chart work ............................................................................................ 61
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 26
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 27
ACKNOWLEDGMENT
I must express appreciation to the ESOFT personnel who guided me through this difficulty by
providing me with the most appropriate recommendations. In higher national diploma class, I
can't say enough good things about the instructor who helped me learn about today's
technologies. I appreciate Mr. Lilanka, our instructor, for coming up with the idea and
facilitating the overall direction. I'd want to give extra credit to my instructor Mr. Lilanka, for
providing me with the feedback and guidance I needed to complete this project successfully.
Thanks to the tasks I've been given by the coordinator and teachers at the ESOFT Bambalapitiya
branch, I've improved my Research skills.
Your Faithful Student,
Jeyakumar Krishanth
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 28
Chapter -01 Introduction
1.1Introduction to the company
Mag City is Sri Lanka's largest automobile maintenance super Mart with a service capacity for
over 300 vehicles at any given time. We have many branches across the island. Our head office
is located on Darley Road in Colombo 10.
We are equipped with state-of-the-art, computerized auto maintenance equipment imported from
the US, UK, Japan, and Italy. Mag City has over 200 professionally qualified technicians in their
respective fields. At Mag City, we only use genuine spares for all our vehicles. Our dedicated
staff is always aiming to ensure every customer is satisfied by Mag City.
(Magcity, 2022)
Figure 1: Logo of mag city
MAG CITY has its own Mission & visions
Aiming "to be Sri Lanka's top grade and world-class auto repair garage and to be the finest
among the best" is the company's stated mission.
In its own words, the company's goal is "to provide expert vehicle repair, maintenance services,
and other auto repair related services."
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 29
Services of MAG CITY
Repainting and refinishing the vehicle's body: involves fixing any dents or dings and painting
the affected area so that it blends in with the rest of the car.
All Types of Body Fix: We repair European, Japanese, Korean, Chinese, and other automobiles.
Arabian motors' well-trained and experienced Engineers, Supervisors, and Technicians assure
optimum repairs following thorough diagnosis.
Besides paintless dent repair: car washing and interior cleaning may mend dents. Body filler
putty is one of two popular ways for repairing dents.
Mechanical repairs: After being in an auto accident, you may be concerned about getting your
vehicle back to its pre-crash condition in terms of its mechanical components. Scratches, scrapes,
and dents are visually unappealing, and they may hint at more serious problems, like a bent
frame, which might be disastrous.
How did Mag CITY work during the Covid-19
In 2021, Sri Lanka was hit hard by the Covid-19 virus. Because of this, the government has
chosen to limit travel throughout the nation. During the lockout, Mag city had no customers or
clients, therefore they had to temporarily shut down operations. Due to the fact that Mag city
garage/Motor Technicians are unable to fulfill their duties during the pandemic, the company's
key clients—school transportation services, business transportation services, and common
transporters—restrict transportation.
However, the management team at Mag City is functioning around the clock despite the
epidemic. The management staff has a lot of work to do in case of a worldwide pandemic. The
company's enterprise resource planning system is accessible to every one of the management
teams. An ERP system allows them to handle accounting tasks in addition to managing payroll
and benefits.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 30
1.2 Introduction Research area
Remote working
Remote work refers to a style of employment in which workers can perform their duties outside
traditional office space. The concept is predicated on the premise that one's physical location is
irrelevant to the success of one's efforts. One way to look at it is that remote workers don't have
to walk into an office daily or even to a designated workstation to get their work done.
Employees are allowed considerable leeway in organizing their schedules, allowing them to
balance professional and personal responsibilities. In addition, as a result of a shift in the cultural
paradigm of what constitutes an acceptable workplace, remote workers now have more freedom
in determining when and where they do their job. (remoteyear, 2022)
History of remote working
Telecommuting was coined by NASA engineer Jack Niles, who published his definition of the
concept in his 1973 paper, the Telecommunications-Transportation Tradeoff. In 1979, five
employees at IBM were allowed to try out working from home. By 1983, the figure had doubled
to 2000. (sorryonmute, 2022)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 31
How Remote working works in the world pandemic Covid-19
All workers and employees were ordered to stay inside during the worldwide pandemic
lockdown. This prompted businesses to implement remote working strategies (sometimes known
as work-from-home policies) during the duration of the lockdown. Employees and workers were
substantially assisted in their tasks by the global epidemic. Fifteen to sixteen percent of
respondents claimed remote workers were employed by their organization before the epidemic,
and thirty-four percent of respondents expected their staff to be remote permanently by late
Twenty twenty, (statista.com, 2022)long after the pandemic had ended. Employers may choose
from a larger pool of qualified candidates because of telecommuting (almost no geographical
restrictions). Workers get their total salaries and are eligible for all benefits. Workers and
businesses may save time and money by not having to commute. Giving workers more freedom
and responsibility and reducing interruptions at work can positively affect output.
Advantages of remote working
The reduced need to commute to and from work is one of the most visible advantages of
telecommuting. This is because working from home eliminates the need to go to and from work
each day, cutting down on wasted time each week, and the tools used can help reduce the need
for business travel overall. One potential benefit of cutting less on your trip is less stress. Some
workers may take advantage of this by getting extra shut-eye in the mornings, which can
improve their overall readiness for work. In addition, since you won't have to spend time
commuting, you'll be able to get more done around the office. Another major perk of working
from home is the freedom to choose your own hours. This applies to both when you start and
stop your workday and the tasks you complete during that time. As a result, you may find
yourself in a position where you can spend more time one day and less. Properly managing your
adaptability is essential to learn how to work from home efficiently. Workplace amenities, such
as telecommuting and choosing your own hours, may significantly affect how you feel each day.
However, you'll need order and consistency if you want the best outcomes.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 32
Boosted productivity may be one of the companies' most unanticipated advantages of remote
labor. While it may make sense that employees working without direct supervision would be less
productive, a study by Ctrip found the opposite to be true. There might be several factors at play
here, one of which is a decrease in coworkers' distractions. As a result, it's possible that working
from home may be looked at with mistrust and investigation in the future. Meanwhile, the
potential for losing telecommuting privileges may serve as an incentive.
Having workers do some of their duties from home might be cost-effective for businesses and
their workers. As an employee, you might save money on anything from the cost of petrol or
public transportation for your daily commute to the price of meals and workplace fundraising
collections organized by coworkers. Finally, one of the most apparent benefits of remote work is
that it eliminates some of the barriers to employment that would otherwise exist, the most glaring
of which being geographical distance. An employee who is expected to show up to work every
day must be conveniently near the workplace. As a result, workers need to be open to relocation
or settle for jobs in their immediate vicinity. Obviously, this means that businesses will have a
reduced talent pool too. (Home, 2022)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 33
Disadvantages of Remote Working
Due to a lack of solidarity and cooperation, therefore, it is evident that man cannot sustain
himself or run an organization effectively and efficiently without assistance. Some workers will
thrive in an environment where they can focus without interruptions from coworkers, but others
may struggle. It's not easy to put in long hours and work closely with remote team members
through a computer screen and email without ever meeting in person. Video conferencing and
other video calling applications like Zoom and Skype are available in the workplace. However, it
might not be as effective as getting everyone in the same room and throwing ideas at each other.
Constant interruptions and an unfriendly atmosphere at the office make it difficult for workers to
focus on their tasks and produce quality work. In a home environment, it can be challenging to
concentrate on a charge when there are so many potential interruptions. To be as comfortable as
one would be at an office is an unrealistic expectation for most homes.
Working solo may be challenging. Self-monitoring of work performance is a must for this role.
Managing one's own behavior is complex and calls for the use of discretion on the part of
workers. Employees may waste time and decrease productivity if their breaks and work are not
closely monitored. Compared to being in an office where one is constantly reminded to keep on
task and perform at a high level, working from home might make it challenging to maintain
these habits.
It's also possible that you're just not trying very hard. To keep continuing and complete one's
goals, one must be motivated to do so. It's simple to lose your drive if you're in the wrong
location at the wrong time. In addition, it endangers the desired business outcomes. A pep talk
from your supervisor or working with like-minded individuals in the company may be great
external sources of motivation. Remote work, on the other hand, typically takes place in a less
social environment. (Blog, 2022)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 34
Introduction to digital transformation Strategy
A company's strategic repositioning in the digital economy might be outlined in a document
called a Digital Transformation Strategy. As consumers shift their habits, so must the strategies
of successful businesses. They take advantage of new technologies by adapting their business
and operational models to state of the art.
Digital transformation is essential for businesses of all sizes. Almost every talk, conversation,
article, or research on how companies might thrive in today's increasingly digital market will
make that point abundantly evident. (ionology.com, n.d.) Businesses of all sizes need to undergo
digital transformation. The overwhelming majority of presentations, discussions, and
articles/studies devoted to how companies might thrive in today's increasingly digital
environment make that point very plain.
Many C-suite executives don't understand what it means to undergo a digital transformation. Is
this merely a clever synonym for "cloud "? What are the specific steps we need to take? Do we
need to invest in training new employees or hiring a consulting firm to help us set up a
foundation for digital transformation? Which parts of our business strategy need to be revised?
What are the benefits, if any? (Project, 2022)
CIO of Quikrete Jay Ferro (2022) suggests outlining the issue at hand, the opportunity available,
or the desired end result to kick off the digital transformation process. The "why" of your
company's digital transformation "may be, for example, to improve customer experience,
decrease friction, boost efficiency, or increase profitability," Ferro explains. Or, if it's a goaloriented remark, it may mean being the best company to do business with by using cutting-edge
digital tools that were out of reach only a few short years ago. The foundation of digital
transformation is made up of three pillars: people, processes, and technology.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 35
People: Since the experiences of both workers and customers are intertwined, a customer-centric
transformation must first focus on the latter.
Method: Companies focusing on their customers don't introduce new technology just to have it.
They do this because it aids in the dissemination of practices that are to the benefit of those they
serve. Here are some methods for keeping the big picture in mind when you change your
business and operations to provide your consumers with unprecedented value.
Technology: The quality of the tech stack dedicated to the customer experience should be an
enterprise-wide investment priority, as found in the study by Zendesk and ESG. Broken
technology is one of the most irritating problems one may face. That's why successful businesses
always get the top-tier software available.
1.3 Problem statement
The worldwide spread of Covid-19 has caused significant difficulties for businesses in Sri Lanka.
After widespread infection with the Covid-19 virus in 2021, the government made the difficult
decision to close the country for the duration of the pandemic. Public and private authorities
(including the business world and startups) were forced to close as a result. In protest of the
government's decision, Mag City temporarily closed its doors.
Lackluster attendance is another issue plaguing Mag city. After the lockdown was lifted, the
government opted to restrict movement between districts and limit access to the worst-affected
areas of the island. As a result, vital personnel could not report to work because they were either
stranded in inaccessible areas or lived too far away from the office (in another district). In
addition, some workers who contracted COVID-19 missed time from work due to their illness.
The company ran into financial trouble due to low income and low productivity caused by
employees' lack of attendance.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 36
Due to travel restrictions and geographical limits, higher officials and middle managers are doing
their duties from home. The problem is that they cannot access the necessary documents from
the workplace at home. Ledgers and invoices are only some of the paperwork that MAG CITY
keeps.
1.4 Research Significance
Humans have experienced many different time contexts, from the Stone Age through the Age of
Hunting and Art to our own Modern Technological Era. With constant technological
advancements, authorities today may benefit significantly from adopting digital transformation
techniques. As a result of the global epidemic caused by COVID-19, this study is crucial.
Currently, government agencies are behind the technological curve. Intelligent solutions to this
issue may be found in digital transformation plans.
For instance, a well-established business and its employees may be unable to access papers, plan
meetings, or handle employee salaries if the country is locked down. Ultimately, a company that
wants to do the right thing will employ digital transformation strategies to solve the problem.
They have to become paperless by scanning and uploading all their documents (Excel
spreadsheets, resumes, and Word documents), holding online meetings using a video
conferencing service, and writing software to manage their employees. With this new
knowledge, you can more easily implement digital transformation methods for telecommuting.
Remote work is a strong emphasis of this study; hence, the study's principal objective is to
implement digital transformation technologies that enable such work. Mag city’s digital
transformation initiatives for telework have not been the subject of any study. Meetings,
document management, and personnel management are just some of the problems investigated in
this study.
This research also shows how digital transformation techniques might help close the gaps
hindering efforts to combat global pandemics. Unfortunately, only a few studies worldwide have
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 37
answered the question, "how to apply digital transformation methods for remote working."
While digital transformation strategies for remote work are becoming increasingly important, no
studies have been undertaken in Sri Lanka. Consequently, the solution is adopted by other
businesses in the area.
1.5 Research objectives
RO1: To find out whether document sharing is a digital transformation strategy for remote
work at MAG CITY
RO2: To find out whether Virtual meeting is a digital transformation strategy for remote
work at MAG CITY
RO3: To find out whether Employee management is a digital transformation strategy for
remote work at MAG CITY
RO4: To find out whether Admin login is a digital transformation strategy for remote work
at MAG CITY
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 38
1.6 Research Questions
RQ1: Is document sharing a digital transformation strategy at MAG CITY to remote
work?
RQ2: Is virtual meeting a digital transformation strategy at MAG CITY to remote work?
RQ3: Is Employee management a digital transformation strategy at MAG CITY to remote
work?
RQ4: Is Admin Login a digital transformation strategy at MAG CITY to remote work.?
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 39
1.7 Conceptual framework
Depended Variable
Independent Variable
Virtual meeting
Admin login
Digital Transformation
strategies for MAG CITY
to remote work
Document Sharing
Employee Management
Figure 2: Conceptional framework
1.8 Hypothesis
Hypothesis for Virtual meeting and Digital Transformation Strategy for
MAG CITY remote working
•
HO: Virtual meeting is not a digital Transformation Strategy for MAG CITY remote
working
•
H1: Virtual meeting is a for Digital Transformation Strategy
MAG CITY remote working
Hypothesis for Admin login and Digital Transformation Strategy for
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 40
MAG CITY remote working
•
HO: Admin login is not a Digital Transformation Strategy for MAG CITY remote
working
•
H1: Admin login is a DIGITAL TRANSFORMATION STRATEGY for
MAG CITY remote working
Hypothesis for Document Management and Digital Transformation
Strategy for MAG CITY remote working
•
HO: Document management is not a DIGITAL TRANSFORMATION STRATEGY for
MAG CITY to remote working
•
H1: Document management is a DIGITAL TRANSFORMATION STRATEGY for
MAG CITY to remote working
Hypothesis for Employee management and DIGITAL
TRANSFORMATION STRATEGY for MAG CITY remote working
•
HO: Employee management is not a Digital Transformation STRATEGY for
MAG CITY to remote working
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 41
•
H1: Employee management is a digital transformation strategy for MAG CITY to
remote working
Chapter -2 Literature review
Literature review for Digital Transformation Strategies for Remote working
In addition, the fact that everyone relies on digital tools for communication helps to level the
playing field. "Our common experience of depending on digital technology to engage and work
with our teams offers the conditions that inspire empathy for our end users," explains The A.J.
Meyer (2022) an innovation fellow at West Monroe Partners. "Every digital contact point is vital
to our business and the lives of our patients, customers, and staff," the corporation adds. At the
same time, as attendees of COVID-19 gain a better understanding of how to properly manage
digitalization, a few dos and don'ts are beginning to emerge. (enterprisersproject.com, 2022)
Academic articles are wanted by Educational Technology & Society. As a result of the COVID19 epidemic, several universities have abandoned traditional classroom instruction in favor of
online courses. Due to rising competition in the digital sphere, universities are under more
pressure to deliver a novel learning experience. The study's overarching purpose is to explore
how the unexpected epidemic has altered the ongoing digital transformation (DT) process and
the learning value proposition of universities and colleges (HEIs). One case study of a recently
founded online university serves as the basis for this paper, focusing on how the institution has
adapted its learning value proposition, particularly its multimode learning offer. (Society, 2022)
According (AI, 2021) there are 3 ways corporate digital transformation can help create a remote
work culture
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 42
Figure 3 : Digital Transformation Method
Digital workplace: During the pandemic, many companies relied on digital workplace tools like
Zoom and Skype for business conversations. However, more than needed for a company that
plans to make remote labor a permanent part of its operations. It's time for your firm to
modernize its internal communication systems, embrace digitization, and set up a web-based
place of business. It is essential that workers feel like they are in a professional setting, even if
they are at home. The goal of the digital workplace is to improve productivity and efficiency in
the workplace. (AI, 2021)
Data Automation: When attempting to foster a remote work culture, you rapidly learn that
conventional wisdom goes out the window because of the lack of face-to-face communication
across departments. You can ensure your employees can quickly execute administrative and
cross-departmental tasks with the help of business automation software. Only one case in point
Human resource management (HRM) software, help desk software, analytics and reporting
software, project management software, and other back-end services must all be automated and
in place to guarantee quality output. Keeping and maintaining data automatically and digitally is
essential to preventing the loss of critical information when working remotely. (AI, 2021)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 43
Cybersecurity: One of the most significant concerns with working remotely is cyber security,
which includes protecting your company's data, sensitive documents, and communications.
Working from home increases your risk of becoming the target of a cyberattack. However, you
may avoid cybersecurity risks with suitable digital instruments and security solutions. First, you
should implement complex authentication systems to prevent unauthorized access and educate
your staff on security best practices and risks. (AI, 2021)
Literature review ON Virtual meetings and digital Transformation strategies For Remote
working
What we call a "virtual meeting" is a meeting that occurs between participants through the
internet instead of in a physical location. Popular virtual meeting solutions include Ring Central
Video, GoToMeeting, Google Hangouts, Microsoft Teams, Zoom, and Skype. (But the latter
two, and maybe a few more, might be best discussed with friends and family.) Virtual meetings
are increasingly employed to facilitate collaboration among employees in different locations and
time zones (or in different parts of the same building). What matters is that they may all
communicate with one another and see each other on the screen simultaneously by using virtual
conference software.
The benefits of virtual teams may be very context-dependent. Numerous groups assert that they
are more productive thanks to their remote workers. For instance, a Harvard Business Review
study discovered that the United States Patent and Trade Office saw a 4.4% increase in
productivity after allowing their employees to work remotely. This equates to an additional $1.3
billion annual value contributed to the US economy. Remote workers benefit from virtual teams
because it provides them more flexibility to focus on their needs outside work. Employees'
ability to strike a good work-life balance is highly valued, with 46% of them saying it's essential
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 44
their employer offers them flexibility in their schedule. Instead of wasting time traveling, which
benefits neither the company nor the employee, this time may be put to better use within the
company, allowing employees more time to concentrate on crucial tasks and finish them in a less
frantic, more relaxed setting. (monday.com, 2022)
To hold a virtual meeting, technology enables participants to connect and speak with one another
through video and audio over the internet. It's the act of communicating in real-time amongst
geographically distant people yet working together toward a shared goal or strategy. It may come
as a surprise, but virtual meetings are simpler to organize and manage than in-person meetings.
Many people find it sufficient to simply fire up their laptops and use a remote conference
programmer to include everyone else. You'll want a microphone and a camera that can be rotated
so that everyone can see and hear you. Investing in headphones or a headset is a great way to
avoid interrupting people while still hearing what they have to say. (wrike, 2022)
According to AI & SOCIETY volume 22, pages133–144 (2007) Meetings consume a significant
amount of time at work, and as a result, they have been the focus of multidisciplinary research.
Virtual Meeting Rooms (VMRs) are three-dimensional virtual reproductions of meeting rooms
that may be controlled in terms of voice, gaze, distance, gestures, and facial expressions. This
enables VMRs to be used to improve remote meeting participation, visualize multimedia data,
and conduct research into meeting social interaction. This paper explains how these three
applications can be implemented in a VMR. We explain the method of observation, annotation,
and simulation, as well as a model that defines the relationships between annotated elements of
verbal and nonverbal conversational activity. (AI & SOCIETY volume 22, 2007)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 45
The situation in Georgia's general education has altered after the first instance of coronavirus
COVID-19 infection was discovered in the spring semester of 2020, with 211 local cases and
more than 1,5 million infection cases globally by April 8, 2020. Georgia has joined a list of 188
nations throughout the world that have halted the educational process. The paper investigates the
country's and population's ability to continue their education at schools via online distance
learning. It examines the various platforms available and highlights those that have been used by
government support, such as the online portal, TV School, and Microsoft teams for public
schools, as well as alternatives such as Zoom, Slack, and Google Meet, and the EduPage
platform for online education and live communication. The authors created a case study in which
the Google Meet platform was used for online education at a private school with 950 pupils,
which shows the system's use statistics during the first week of the online education process. The
results show that the swift transition to online education was a success and that the learned
experience may be applied in the future. Other nations who haven't figured out how to make the
change might benefit from the experience and study. The 2020 pandemic's lesson will drive a
generation of new laws, rules, platforms, and solutions for future situations, when countries,
governments, and populations will be better prepared than they are now (Pedagogical Research,
2022)
Literature review On Document file /sharing and Digital Transformation Strategies For
Remate working
Document sharing refers to distributing or providing digital information or resources such as text
files, audio and video files, images, computer code, photos, and electronic books. It refers to
sharing information or assets in a network with broad permissions. With the advent of portable
media and network protocols like FTP, file sharing became a valuable component of computer
services (FTP). In the 1990s, several long-distance file-sharing technologies were introduced,
including File Transfer Protocol (FTP), hotline, and Internet relay chat (IRC). (techopedia.com,
2022)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 46
Data storage and computing resources managed by third-party service providers are what cloud
technologies provide, and they're becoming more and more widely acknowledged for their
ability to help businesses improve security, quality, and productivity. 1 There have been
concerns that cloud computing could disrupt established procedures for ensuring data security,
privacy, and the reliability of services, which has slowed its widespread adoption by
organizations. 2 and 3 The vital shared goal and informational demands in the context of the
COVID-19 epidemic have provided an enormous incentive to embrace and profit from rapid
scale-up of cloud-based solutions. Now that they have traction, implementers need to know the
costs and risks associated with rapidly rolling out these solutions. (thelancet.com, 2022)
It's conceivable that your company has established protocols for the secure transfer and storage
of files (and if not, you should). As a result of COVID-19, however, many employees are now
performing remote work, which has prompted a reevaluation of existing regulations and the
possibility of making any necessary adjustments. These are essential guidelines for secure file
sharing in a distant work setting. (keepersecurity, 2022)
Paperwork is still vital to running a business, but fewer and fewer companies are choosing to
print their documents instead of using electronic alternatives. Instead, team members in various
faraway locales may work closely utilizing online file documents, spreadsheets, PowerPoint
presentations, and other comparable technologies. Since comments and revisions are made
instantly, misunderstandings and other problems that might develop when papers are emailed
back and forth are avoided. Real-time cooperation is particularly beneficial when critical
documents must be prepared for time-sensitive activities. Just as in a physical office, it is
standard practice for team members to share, download, and upload files. As a result, cloud
storage is quickly replacing other methods as the default for sharing large files. Data may be
simply shared after it is saved online, and others may access, view, and alter files using
Windows, Mac, or mobile devices. (Microsoft, 2022)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 47
Literature review On Document Admin Logging and Digital Transformation Strategies
For Remate working
The on-premises method is problematic for several reasons, including the fact that it is
challenging to enable remote work, users are connected to Wi-Fi using insecure passwords like
WPA2, and administrators have to manage many individual passwords. As technology advanced,
cloud applications, multiple operating systems, and dispersed resources became increasingly
commonplace in the workplace, posing a challenge to the on-perm strategy. Various
technological shifts have occurred over the past several decades, including replacing desktop
computers with portable laptops, migrating locally installed applications to web-based
alternatives, and developing safer Wi-Fi protocols. Remote staffing and several outposts are
becoming the norm in today's workplaces. (Jumpcloud, 2022)
These days, businesses rely heavily on computers, from communicating with customers and
suppliers to managing finances and stock levels. Internet and networking technology have made
it easier for companies to conduct transactions, find and recruit new customers, and share
information inside the workplace. However, if not controlled appropriately, these technologies
might cause various problems. Assuming your firm is similar to others, you probably have a few
key employees who are well-versed in computers and can assist with any issues that may arise.
Provide these workers remote administrator access to business PCs so they may fix issues from
wherever, even their own homes or rooms. (petri, 2022)
In business networks, local administrator accounts often use the same password across all
computers, making it easier for hackers to take over the web. Microsoft's security baseline
templates exclude access to local configurations remotely because of the lack of a safe way to
manage local administrator accounts before the Local Administrator Password Solution (LAPS)
announcement in 2015. Microsoft's free LAPS software can change the local admin password for
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 48
each machine account every 30 days and store the new passwords safely within Active
Directory. (petri, 2022)
In the event of a pandemic, the 2021 International Conference on Electrical, Computer, and
Energy Technologies states that the security and dependability of remote workers are even more
critical for long-term survival. The most challenging part of working remotely is ensuring that
remote employees and systems are always connected. The difficulties of remote work are
exacerbated by unreliable and difficult-to-manage information technology platforms and by the
fact that some companies allow employees to utilize untrusted personal computers. To address
these problems, the authors of this paper proposed an offline authentication solution that is both
lightweight and secure for distant workers. The recommended method is applied to LPS
(Lightweight Portable Security) devices to solve these connection and trust problems, which
provide USB bootable images in a protected setting. USB dongles using LPS technology are
intended to increase users' reliance on the device. To provide secure user authentication, this
layout employs 2FA (2 Factor Authentication), which requires both possession (a mobile phone
and a USB dongle) and knowledge (a password) to pass (mobile PIN). As an added layer of
security, the proposed architecture incorporates geofencing between USB dongles and mobile
phones. (International Conference on Electrical, 2022)
An organization may improve efficiency and decrease costs by using a work management
application to coordinate and carry out tasks. In response, this thesis describes an online tool for
organizing projects. The purpose of this thesis was to create a user-friendly, responsive web
application that could be used by the whole corporation. We built a working prototype of a web
app with an admin panel for straightforward updates and management.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 49
Literature review On Document Employee management and Digital Transformation
Strategies For Remate working
Employee management is commonly used to describe encouraging and enabling workers to do
their best work every day in service of the organization's overarching mission. Many jobs and
tasks are involved in managing employees, but they can all be broken down into five broad
categories: selecting employees, keeping tabs on them, communicating with them, rewarding
them, and disciplining them. Finding and hiring the most qualified people to fill open positions is
essential for the smooth operation of teams and departments during the selection process.
Performance evaluation and assessment are vital components of monitoring, often known as
performance management. Interaction describes the routine conversations between supervisors
and subordinates and amongst coworkers to convey information about tasks, company norms,
employee opinions, and other issues. Employee management rewards include managers' verbal
and written acknowledgment of their workers' efforts and any monetary or material
compensation or other incentives that may be offered. Last but not least, the term "discipline"
describes the steps managers take to address subpar performance, correct mistakes, and enforce
company policies. These measures might include private conversations, formal dismissal or even
legal action. (bamboohr, 2022)
Although remote working is not new, never before have so many companies been obliged to let
their workers work from home at the same time as in 2020, when the COVID-19 issue erupted
internationally. This has significant ramifications for businesses, including how they may use
managerial control (MC) to "affect employees' behavior in desired ways" to achieve their
objectives (. While some sorts of MC, including casual lunch gatherings, face-to-face meetings,
and direct observations, were no longer available, the crisis encouraged using new technology to
work, coordinate, and communicate, giving managers additional control options. The
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 50
consequences of these abrupt shifts are mainly unknown. Furthermore, MC shifts in reaction to
disasters.
Uncertainty among workers is amplified, and the organization's performance and survival are
jeopardized when unanticipated events, such as external crises, occur. Companies in the modern
day need to be alert and adaptable to these changes. However, because of the present COVID-19
outbreak, businesses have had to deal with the unexpected and find creative solutions to
problems in several operations areas. In this piece, we'll examine some of these problems,
focusing on how COVID-19 will affect human resource management (HRM) as businesses help
their workers adapt to their new workplace. Further, we advocate for an integrated research
agenda to address the challenges mentioned and recommend several future study areas.
(Business, 2022)
Remote workforce management refers to the practice of leading and managing a remote
workforce effectively. In most cases, this means implementing certain methods of
communication, procedures, and technological infrastructure to facilitate productive work by a
distributed team. In-depth training for managers and staff on relevant remote work themes is
commonplace at companies that are serious about effectively managing remote workforces. By
coordinating the work of remote workers, it is possible to create teams that are more mobile and
less tied to a single location. That means you may recruit team members from anywhere in the
world and form international teams. Recruiting people who prefer remote work vs working in a
regular office can boost employee happiness and retention. Success in managing a remote
workforce is considerably more feasible now than in the past, owing to advancements in
technology. (Vmware, 2022)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 51
Chapter 03 Methodology
3.1 Research onion
Figure 4 : Research Onion
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 52
The phases that must be completed to birth a research endeavor are represented by the "onion" of
the research process. Two thousand-seven marks the year of its inception, thanks to the efforts of
Saunders et al. The multiple steps involved in conducting research can be represented more
comprehensively using an "onion model." The research onion's potential growth as a tool for
methodology development is discussed. For a more comprehensive illustration of the research
process, one of the creators, Saunders, suggests using the research onion from its outer to its
inner layers. Research onion is adaptable to various research methods and settings,
demonstrating flexibility. (Bryman, 2012)
3.2Philosophy -Positivism
Research philosophy is an approach to gathering, analyzing, and using data in a study. It explores
questions like "how" and "why" we know what we know and its beginnings and development.
As their literal meanings suggest, "what is known to be true" and "what is thought to be true"
both encompass a wide range of theoretical research approaches. (Gallidars, 2022) The study's
methodology is grounded in the research philosophy's underlying principles. (Flick, 2011)
A significant philosophical research methodology, Positivism, is predicated on the idea that any
phenomenon's existence can be shown by using appropriate scientific methods and proper
mathematical or logical proofs. For positivists, there are just three possible categories for
arguments. They have some truth, some untruth, and no real significance. Insufficient clarity
prevents investigation with positivist tools. (positivism, 2022) Because the assertion may be
classified as true or untrue, the research on 'Digital transformation for remote working' fits
within positivism. In this study, only one truth/belief will be assessed, either actual or untrue.
The research may be viewed, validated by tests, and rationally proven. As a result, the chosen
research's philosophy is positivism.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 53
3.3Research Approach -Deductive
Everything from overarching hypotheses to detailed plans for data collection, analysis, and
interpretation goes into a research strategy. What this means depends on the specifics of the issue
under investigation. (Chetty, 2020) Inductive and deductive methods are two types of research
approaches. The purpose of the inductive method is to construct a theory, while that of the
deductive method is to provide evidence for or against a given hypothesis. An inductively
produced approach is the starting point for the deductive method, which then moves on to
formulating a theory, collecting data, and analyzing this data. Finally, existing concepts are used
to construct a research hypothesis supported by the deductive process in my investigation.
Since Snieder and Larner (2009) allow for the creation of hypotheses and the statistical testing of
projected outcomes to a predefined degree of probability, the deductive method complements the
positivist approach.
3.4 Research Strategy-Survey
A research strategy is a well-thought-out, detailed plan of attack for doing and reporting on
research that will keep us on track and ensure that we produce reliable findings. (Dinnen, 2020)
According to Saunders et al. (2007), It lays out the researcher's plan of action for completing the
study. The research strategy incorporates various approaches, such as case studies, interviews,
surveys, and experiments. To do my research, I will be using a survey. I think a survey is
suitable for the job because I need to learn the general public's opinion. Quantitative research
initiatives and the deductive method both benefit from this approach. It also helps collect lots of
data that may be used to answer research questions. (Bryman & Bell, 2011)
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 54
3.5Research Method –Mono method: Quantitative
At this stage of the research procedure, we decide whether or not to combine quantitative and
qualitative methods. Quantitative methods, as the name indicates, emphasize numerical data.
(Flick, 2011) It is represented by numerical values and graphical representations. It is used to test
or confirm hypotheses and presumptions. Comparatively, qualitative research can convey its
findings through the use of language. It's used to make sense of concepts, mental processes, and
life events. Just that type of information is gathered in a study employing a single research
strategy, such as a quantitative or qualitative approach. There is some overlap between mixed
and multi-methods, combining quantitative and qualitative methods. (streefkerk, 2021)
Since statistics will be my only way of analysis, I will be doing a "mono method" study. Existing
theories will be put to the test, verified, and validated, and new, more generalizable facts will be
developed, all with the use of quantitative tools.
3.6 Time Horizon
The time horizon is the estimated length of time needed to finish the project. Saunders et al.
describe it as a boundary within which the project is to be carried out (2007). In the research
"onion," two types of time frames are delineated: cross-sectional and longitudinal. The data need
to be collected once, and the cross-sectional time span is known in advance. It is used when a
certain factor has to be examined or evaluated at a specific time. By contrast, a longitudinal time
horizon involves gathering information over an extended period of time. This technique is used
if an important variable in the study changes over time. (Goddard & Melville, 2004)
Cross-sectional time series analysis is appropriate for my study since I intend to look at a
snapshot in time for a specific population sample. In addition, a cross-sectional temporal
horizon, which may also be utilized in conjunction with quantitative methods, is ideal for my
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 55
work since the parameters impacting the deployment of AI in security threat identification do not
change over time.
3.7 Techniques and procedures
Data collection
For my research, I used a different type of primary data. I want to use surveys to get first-hand
information from participants and elicit honest feedback from human resources and staff that
will be timely and useful.
Target population
Human resource managers and accountants are the focus of my study. Twenty is the desired
population size.
Sample Size
The number of respondents chosen from the whole target population is referred to as the sample
size (Newman, 1998) The Morgan table is used to establish the sample size for my study since it
is an excellent way for estimating sample size from the target population. As seen in the above
Morgan table, my sample size would be 44 as my population size is 50.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 56
Figure 5 : The Morgan Table
Data collection method
A survey with an accompanying Likert scale will serve as my data collection tool. The Likert
scale is a technique for people to rate how much they agree or disagree with a set of statements.
Since it is easy to transmit the questionnaire to the sample size and the sample population will
have devices available to access Google forms, I want to build and disseminate the questionnaire
using Google forms.
Data analysis
I used the Microsoft Excel spreadsheet program to analyze the responses to the survey. MS Excel
would be perfect for assessing and processing the quantitative data I collect in my one-method
quantitative study. Mean, standard deviation, range, graphical analysis methods, correlation
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 57
analysis, and regression analysis are just some of the statistical techniques I plan to use, and
they're all compatible with Microsoft Excel.
Role Of Researcher
Time management
If researchers can learn to better manage their time, they can maintain their concentration and
make more remarkable strides in advancing their studies. This helps create and polish those skills
vital to the growth and maintenance of productive research. Good time management skills are
essential to developing and maintaining formative research.
Planning
The research's aims and limitations can be better determined if we lay out a strategy for doing the
research before diving in headfirst. And that's why we need to know the future, so we can plan
our actions and arrive where we need to be on time.
Data collection
Before the researcher can make any conclusions from the data that was obtained, they need to
conduct a survey of the desired sample.
Data management
In addition, the researcher is responsible for ensuring that the data they acquire are kept private
and secure. The information obtained must be treated with the utmost care if there is any chance
of preserving the investigation's validity. In addition, the researcher must maintain the
confidentiality of the information and replies gathered from the sample population.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 58
Documenting
One of the best ways to make future research more manageable and quicker is for the researcher
to keep detailed records of their previous efforts. Researchers who properly credit their sources
demonstrate their honesty about the origins of their findings and protect themselves from
accusations of plagiarism. For clarity, it is crucial to properly document all quotes, data, and
sources.
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 59
Gant chart
Task
Time Duration
Selecting the research area
Literature review
& Methodology
Preparing the questionnaire
Permission for the proposal
Extension of literature
Gathering information
Analyze the gathered
information
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 60
Conclusion and
recommendation
Approval finalizing
Figure 6: Process of Gant chart work
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 61
References
AI & SOCIETY volume 22, p., 2007. AI & SOCIETY volume 22, pages133–144. [Online]
Available at: https://link.springer.com/journal/146/volumes-and-issues/22-2
[Accessed 15 September 2022].
bamboohr, 2022. bamboohr.. [Online]
Available at: https://www.bamboohr.com/hr[Accessed 18 September 2022].
Blog, N. a. E. a. S. W. |. V. C. H., n.d. Disadvanatges of working from home. [Online]
Available at: https://blog.vantagecircle.com/disadvantages-of-working-from-home/
[Accessed 10 August 2022].
Bryman & Bell, 2011. [Online]
Available at:
https://www.scirp.org/(S(lz5mqp453edsnp55rrgjct55.))/reference/referencespapers.aspx?referenc
eid=2661544
[Accessed 18 September 2022].
Bryman, 2012. [Online]
[Accessed 18 september 2022].
Business, J., 2022. Journal of Business. [Online]
Available at: https://www.sciencedirect.com/science/article/pii/S0148296320303301
[Accessed 17 september 2022].
Chetty, P., 2020. Importance of research approch. [Online]
Available at: https://www.projectguru.in/selecting-research-approachbusinessstudies/#:~:text=The%20research%20approach%20is%20a,the%20research%20problem
%20being%20addressed
[Accessed 18 September 2022].
Dinnen, 2020. [Online]
[Accessed 18 September 2022].
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 62
enterprisersproject.com, n.d. enterprisersproject.com. [Online]
Available at: https://enterprisersproject.com/article/2021/2/digital-transformation-remotedosdonts.
[Accessed 10 August 2022].
Flick, 2011. [Online]
Available at: Introducing research methodology: A beginner’s guide to doing a research project.
London: Sage.
[Accessed 18 September 2022].
Gallidars, 2022. [Online]
[Accessed 18 September 2022].
Goddard & Melville, 2004. [Online]
Available at:
https://books.google.lk/books?hl=en&lr=&id=bJQJpsU2a10C&oi=fnd&pg=PA1&dq=Goddard+
%26+Melville,+2004&ots=Xut9OfEM3o&sig=I57vdfDPUw_drBrTIQCE4dtTKwk&redir_esc=
y#v=onepage&q=Goddard%20%26%20Melville%2C%202004&f=false
[Accessed 18 september 2022].
Home, 5. B. o. W. f., n.d. 5 Benefits of Working from Home, 2022. [Online]
Available at: https://www.viewsonic.com/library/business/5-benefitsof-working-from-home/
[Accessed 10 August 2022].
International Conference on Electrical, C. a. E. T. (. I., 2022. Staff, I., 2021. 2021 International
Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE.. [Online]
Available at: Staff, I., 2021. 2021 International Conference on Electrical, Computer and Energy
Technologies (ICECET). IEEE.
[Accessed 17 september 2022].
ionology.com, n.d. [Online]
[Accessed 10 August 2022].
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 63
Jumpcloud, 2022. Jumpcloud. [Online]
Available at: https://jumpcloud.com/resources/workingfrom-home-jumpcloud-admin-guide.
[Accessed 17 September 2022].
keepersecurity, 2022. keepersecurity. [Online]
Available at: https://www.keepersecurity.com/blog/2020/11/04/5-secure-file-sharingbestpractices-for-remote-workers/.
[Accessed 16 September 2022].
Magcity, 2022. [Online]
Available at: https://www.magcity.lk/
[Accessed 7 September 2022].
microsoft, 2022. [Online]
Available at: https://www.microsoft.com/en-us/microsoft365/business-insightsideas/resources/5-ways-for-remote-workers-tocollaborate.
[Accessed 16 september 2022].
monday.com, n.d. What are the advantages to having a virtual team?. [Online]
Available at: https://monday.com/blog/remotework/remote-work-virtual-teams/.
[Accessed 13 August 2022].
Newman, 1998. [Online]
Available at: https://ecommons.udayton.edu/eda_fac_pub/122/
[Accessed 18 September 2022].
Pedagogical Research, v. n. A. e., 2022. Pedagogical Research, v5 n4 Article em0060. [Online]
Available at: https://www.pedagogicalresearch.com/volume-5/issue-4
[Accessed 15 September 2022].
petri, 2022. [Online]
Available at: https://petri.com/use-a-localadministrator-account-for-remote-administration/.
[Accessed 17 September 2022].
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 64
positivism, 2022. [Online]
Available at: https://philosophyterms.com/positivism
[Accessed 18 September 2022].
Project, T. E., n.d. what is digital transformation?. [Online]
Available at: https://enterprisersproject.com/what-is-digital-transformation
[Accessed 10 August 2022].
remoteyear, n.d. what is remote work. [Online]
Available at: https://www.remoteyear.com/blog/what-is-remote-work.
[Accessed 10 August 2022].
Society, E. T. &., n.d. Educational Technology & Society. [Online]
Available at: https://eric.ed.gov/?id=EJ1263561.
[Accessed 12 August 2022].
sorryonmute, n.d. history-remote-work-. [Online]
Available at: https://www.sorryonmute.com/
[Accessed 10 August 2022].
statista.com, n.d. statista.com. [Online]
Available at: www.statista.com
[Accessed 10 August 2022].
streefkerk, 2021. [Online]
Available at: https://scirp.org/reference/referencespapers.aspx?referenceid=2951691
[Accessed 18 September 2022].
techopedia.com, 2022. techopedia.com/ file sharing. [Online]
Available at: https://www.techopedia.com/definition/16256/file-sharing.
[Accessed 15 September 2022].
thelancet.com, n.d. thelancet. [Online]
Available at: : https://www.thelancet.com/journals/landig/article/PIIS2589-
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 65
7500(20)302910/fulltext.
[Accessed 17 September 2022].
Vmware, 2022. Vmware. [Online]
Available at: https://www.vmware.com/topics/glossary/content/remote-workforce
[Accessed 18 September 2022].
wrike, n.d. How do virtual meetings work. [Online]
Available at: https://www.wrike.com/
[Accessed 15 Sepetember 2022].
Jeyakumar Krishanth
Unit 13: Computing Research Project proposal
| 66
Download