Research Assignment Harvard Case Solution & Analysis

Research Assignment Case Solution

Part 1: Research Strategy Analysis and Sampling Assignment

Introduction

To gain deeper insights into the research strategy and sampling strategy of a particular study, I have selected "Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialization, Influence, And Cognition" by Princely Ifinedo. This study, published in 2013, delves into the complex topic of ISSP compliance and explores the impacts of socialization, cognition, influence and on compliance behaviour. By analyzing this research, we may obtain significant knowledge on the research strategy and design, and identify potential areas for enhancing the research strategies.

Purpose of the Study

The study aims to investigate how socialization, influence, and cognition affect ISSP compliance. The goal of the study is to help organizations enhance their overall security posture by offering empirical information on how these factors affect compliance with security regulations. The goal is not only obvious but also important because it deals with a key issue in the area of information security management.

Target Population

The study targets business managers and IS professionals responsible for overseeing a company's operations and developing and maintaining its information systems. Understanding their perspectives is crucial for developing effective strategies and solutions. However, the research fails to mention the specific industries or organizations that were studied, which may impact the applicability of the results.

The Rationale for Using a Quantitative Research Strategy versus a Qualitative Research Strategy

The combination of the concept of planned behaviour and social bond in the discourse of IS security has produced valuable insights into the literature on IS security management. The researcher’s considerations are social factors like socialization, influence, and cognition significantly affect workers' compliance with their organization's ISSP. Employees form social bonds and look to others as role models for appropriate beliefs and behaviours.

Control over workplace issues and competence increases compliance. Therefore, further studies should explore ways to enhance personal norms regarding IS security in the workplace. The study has limitations, including the possibility of socially desirable responses and a relatively small sample size.

Research Design

The research utilized a quantitative methodology, which involved distributing a survey questionnaire to diverse employees from different organizations. The data were analyzed using statistical techniques like correlation analysis, regression analysis, and structural equation modelling (SEM). However, it should be highlighted that this study might not be able to demonstrate causality or reflect changes that happen over time.

Analytical Approach

The study uses structural equation modelling (SEM), which is the best method for analysing complex interactions between variables, along with partial least squares (PLS) as the analytical method. PLS is also a good choice for exploratory research. However, the study does not elaborate on the rationale behind selecting PLS instead of other SEM methods.

Data Analysis Procedures Used and Rationale

Various techniques were utilized during the data analysis procedures to ensure accurate and consistent results. These techniques included utilizing SmartPLS 2.0 for data analysis, which investigated the relationships between the variables in question. In order to confirm the stability and consistency of the measures utilised in the study, reliability tests were also carried out. These data analysis techniques aimed to ensure the accuracy, trustworthiness, and generalizability of the findings to a larger population.

Data Collection Method

To gather data for the research model, two methods were employed in a field survey. The first approach involved sending questionnaires to Non-IS managers in Canada through the directory. The second approach involved contacting IS professionals and collecting their responses through a virtual form of the similar questionnaire.  Conversely, the study fails to address the pilot testing process or any pre-testing for validity and clarity.

Sampling Design, And Validity and Reliability

The study employs convenience sampling, potentially introducing bias and limiting generalizability due to practical constraints. The study's statistical power might be affected by the small sample size of only 124 participants. Although the report includes construct reliability, AVE, and inter-construct correlations to demonstrate validity and reliability, it falls short of thoroughly discussing convergent and discriminant validity. While Cronbach's alpha and complex reliability validate internal dependability, the lack of a separate evaluation of predictive validity is a significant drawback.

Findings

The findings of the study showed that socialization, influence, and cognition have significant effects on compliance with security policies. The study reports a mixed set of findings, with some hypotheses supported and others not. The detailed presentation of results, including path coefficients, t-values, f2, and R2, enhances the transparency of findings..............

partial case solution. Please place the order on the website to order your own originally done case solution."}" data-sheets-userformat="{"2":513,"3":{"1":0},"12":0}">This is just a sample partial case solution. Please place the order on the website to order your own originally done case solution.

Share This

SALE SALE

Save Up To

30%

IN ONLINE CASE STUDY

FOR FREE CASES AND PROJECTS INCLUDING EXCITING DEALS PLEASE REGISTER YOURSELF !!

Register now and save up to 30%.