Research question: ?how do AI innovations can help transform health care systems with the introduction of AI diagnosis and
Research question: how do AI innovations can help transform health care systems with the introduction of AI diagnosis and AI medicines, potential smart devices and, intelligent delivery methods. How to protect cyber threats to important personal health care information using AI.
Develop a research methodology for the above question using the guidance given below
Develop a 3 page (more is fine) methodology section that includes the following:
- Introduction
- Research Paradigm (qualitative) Notes: Use the attached Qualitative instrument to develop a research paradigm
- Research- or project- Design
- Sampling Procedures and
- Data Collection Sources
- Data Organization Plan (Qualitative)
See Rubric for how the methodology is graded
2
Topic Question
How can machine learning improve cyber security in healthcare?
Justification paragraph
The choice of qualitative instrument is an interview protocol with a set of
questions that will be asked to a Chief Information Technology Officer in a healthcare
environment. The interview is the best option for addressing the qualitative version of the topic
question because it allows the interviewee to offer sufficient details about machine learning to
improve cyber security. An interview will be the best option since the open-ended questions
will help gather as much information as needed since it does not limit the interviewee's
response. An interview will capture the interviewee's attributes, emotions, and even verbal and
non-verbal cues during the interview. The selected instrument will collect more accurate and
sufficient details needed for the research.
3
Qualitative instrument
Interview protocol
Chief Information Technology Officer.
Introduction
You have been selected to be part of the research since you are considered a person with so
much insight into the topic due to your role and responsibilities. The research project focuses
on improving cyber security in healthcare. This research does not focus on evaluating your
techniques or experience but rather on evaluating the role of IT in enhancing cyber security. To
help with my note-taking, I would like to audiotape my conversation with you and inform you
that the audio and the information gathered from you will be used entirely for research
purposes. Please sign the release form. Only the researchers for this particular will access the
audiotapes, after which the audiotapes will be destroyed. This interview is committed to
protecting the well-being of the interviewee. As such, we guarantee that the confidentiality and
privacy of the interviewee are protected. The interview does not intend to inflict any harm to
the interviewee or any affiliated organization. This interview will take no more than an hour.
Introduction
Tell me more about yourself
What are your personal goals?
What are your career goals?
What drives you?
What did you always want to become from when you were young?
What are your career aspirations now, have they changed?
4
What motivated you to choose this career and continue pursuing it?
Researcher Notes:
Then, we will move our concentration to the jobs and obligations that you play in an
association. I will keep on recording your reactions to assist me with note taking later and
ensure that the message and reactions are not misshaped.
Roles and responsibilities
How long have you been working in the healthcare organization?
What are your main roles and responsibilities while working in the firm?
Do you feel that the organization has empowered you enough?
Does working in healthcare advance your role as an IT personnel?
Researcher Notes:
Now that I have learned more about you and understand your role in the organization, it is time
to move into the research topic, which talks about improving cyber security using machine
learning. We are moving towards a lengthier section, and this is because it is the focus of the
interview.
Cyber security and machine learning
What is your understanding of cyber security when it comes to healthcare?
Why is cyber security an important issue in healthcare?
What are some of the causes of cyber security issues?
Describe the different types of cyber security issues?
5
What is machine learning in healthcare and what are the prospects of the concept in the
industry?
What are the roles of digitalization and technology in healthcare?
Has technology done more harm or good towards the healthcare industry?
Do you think IT is a significant role in healthcare which should be given to priority?
As an IT personnel, what are one’s responsibilities towards making sure that there is
information security?
What is your understanding of machine learning?
Do you think machine learning has been effectively integrated into the healthcare industry?
How can machine learning improve the ability of the organization to eliminate cyber-attacks
and cyber-crime?
Tell me about a cyber attack experience in your organization or another organization which you
are familiar with in the healthcare industry.
Do you know of any organizations which have used machine learning to help in enhancing
cyber security?
Researcher notes: Now that we are almost done with the interview, I am going to gather any
other relevant information you have that would be helpful towards the research.
Conclusion
Have you ever been a victim of a cyber-crime as an individual?
Considering that you have IT experience, how did you handle the attack?
What are other effective ways of handling cybercrime apart from using machine learning?
6
Researcher notes:
Date:
Time:
Place:
Environment Setting:
Individual Code:
,
Chapter III: Methodology
As observed in recent years, large organizations are facing multiple data breaches from hackers who are trying to steal sensitive information. With the increase in technology, attackers with malicious intent are finding advanced methods to breach into the organization or even simple by exploiting known risks that could have been avoided by the organization by updating their systems on a regular basis (Alawneh, 2008). The most recent breach that we all were aware off was the Equifax data breach where it was reported that millions of its customers personal identifiable information (PII) were stolen, information such as social security number , an individual’s name, financial record, driver’s license number, etcetera.. The purpose of this paper is to how organizations can protect themselves from data breaches. What are the ways in which their data can be exposed and does employee awareness will help organizations protect themselves from being attacked from various sources?
Design of the study:
The data collected in this paper was a mixed approach. The collected data was both qualitative and quantitative in nature. The researcher developed a questionnaire containing both open-ended and close-ended questions and all of this was administered through LimeSurvey. And most of the participants response was recorded when they were trying to explain their understanding of a breach and how data leaks can be classified into intentional threats and inadvertent threats as these recording were transliterated for further analysis using otter A.I. And each session from the participant lasted from 45 – 90 minutes depending on the tasks being performed.
Data collection and participants:
All the participants involved in the sessions have worked or currently working in financial organizations. Participants read and signed a consent form explaining the purpose of the research and were given the option to skip a question if they feel uncomfortable in answering a question. Participants were recruited through ads from social media and from known contacts whose education and work experience are related to the study that was being conducted. There were around 50 participants in total, 30 males and 20 females, they ranged in age from 24 – 57. When asked about data breaches and do they know who their organizations protect itself from data breaches as part of employee awareness, 40 said yes and 10 said no. And when asked about taking or participating in any data security training conducted by the organizations, 35 said yes and 15 said no. And when asked about recording their answers on a device 45 said yes and 5 said no, For the 5, we noted down their answers on a paper with their consent.
Data analysis and Sampling procedures:
The participants responses were addressed in two sections which are quantitative and qualitative. When analyzing the qualitative data from the questionnaire we conducted a thematic analysis in order to better analyze the participants response to the open-ended questions (Namey, 2012). The researcher was mostly focused on finding a pattern, a trend or an similar ideas that will help in outlining the analysis. The researcher developed some code to identify similar themes and patterns. Then started to build an initial summary or view of these codes to identify the patterns in which the participants talked about how insider threats and data breaches and their choice of words and simultaneously looking for the alternative where they had different views/insights on a data breach. The top-level codes were associated with our research questions as they were primarily focused on (1) How many years have you been working in financial sector? (2) What are some the standard security measures that are in place? (3) How does your organization handle data breaches? (4) What are the consequences of a data breach? (5) How do you as an employee protect yourself from being a victim of a data breach? Several subcategories were created based on the response from the participants but note that the above are all high-level categories which are all clustered. Analysis were also conducted on the questionnaire or the survey whereby aggregating the score from positive minus to the negative ones. Each response to the question were scored 1 – 5 where 1 is always 5 is never and 3 is sometimes.
References:
Julisch K, Dacier M (2002). Mining intrusion detection alarms for actionable knowledge. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Alawneh M, Abbadi IM (2008). Preventing information leakage between collaborating organisations. In: Proceedings of the 10th International Conference on Electronic Commerce , ICEC.
Identity theft resource center (2019). Retrieved from https://www.idtheftcenter.org/ data-breaches/. Accessed: 2019-04-1.
Namey E. Guest G., MacQueen K. M (2012). Introduction to Applied Thematic Analysis. Applied Thematic Analysis. SAGE Publications.
,
Rubric for Methodology
Novice |
Competent |
Proficient |
Distinguished |
|
3-4 Page Requirement 15.00% |
70.00% Less than 3 pages |
80.00% 3 pages |
90.00% 3-4 pages |
100.00% 4+ pages |
Introduction 15.00% |
70.00% This section attempts to include both a restatement of the research focus and the Purpose Statement for the study from Chapter 1 to reintroduce reader to the need for the study and a description of contents of the chapter. |
80.00% This section somewhat includes both a restatement of the research focus and the Purpose Statement for the study from Chapter 1 to reintroduce reader to the need for the study and a description of contents of the chapter. |
90.00% This section includes both a restatement of the research focus and the Purpose Statement for the study from Chapter 1 to reintroduce reader to the need for the study and a description of contents of the chapter. |
100.00% This section strongly includes both a restatement of the research focus and the Purpose Statement for the study from Chapter 1 to reintroduce reader to the need for the study and a description of contents of the chapter. |
Research Paradigm & Design 30.00% |
70.00% This section describes in detail the specific design for the study and describes why it is the best design to collect the data to answer the research needed for the study. It explains exactly how the selected design was used to facilitate collection of data for each and every variable (for a quantitative study) or how the selected design was used to facilitate collection of data to describe the nature of the phenomena in detail (for a qualitative study). |
80.00% This section somewhat describes in detail the specific design for the study and describes why it is the best design to collect the data to answer the research needed for the study. It explains exactly how the selected design was used to facilitate collection of data for each and every variable (for a quantitative study) or how the selected design was used to facilitate collection of data to describe the nature of the phenomena in detail (for a qualitative study). |
90.00% This section describes in detail the specific design for the study and describes why it is the best design to collect the data to answer the research needed for the study. It explains exactly how the selected design was used to facilitate collection of data for each and every variable (for a quantitative study) or how the selected design was used to facilitate collection of data to describe the nature of the phenomena in detail (for a qualitative study). |
100.00% This section strongly describes in detail the specific design for the study and describes why it is the best design to collect the data to answer the research needed for the study. It explains exactly how the selected design was used to facilitate collection of data for each and every variable (for a quantitative study) or how the selected design was used to facilitate collection of data to describe the nature of the phenomena in detail (for a qualitative study). |
Sampling/Data Collection 15.00% |
70.00% This section attempts to detail the entirety of the process used to collect the data. It describes each step of the data collection process in such a way that another researcher could replicate the study. |
80.00% This section somewhat details the entirety of the process used to collect the data. It describes each step of the data collection process in such a way that another researcher could replicate the study. |
90.00% This section details the entirety of the process used to collect the data. It describes each step of the data collection process in such a way that another researcher could replicate the study. |
100.00% This section strongly details the entirety of the process used to collect the data. It describes each step of the data collection process in such a way that another researcher could replicate the study. |
Statistical Test Summary 15.00% |
70.00% This section attempts to describe how the data were collected for each variable or group (quantitative study) or for each research question (qualitative study). It describes the type of data analyzed, identifying the descriptive, thematic, inferential, and/or non-statistical analyses. This section demonstrates that the research analysis is aligned to the specific research design. |
80.00% This section somewhat describes how the data were collected for each variable or group (quantitative study) or for each research question (qualitative study). It describes the type of data analyzed, identifying the descriptive, thematic, inferential, and/or non-statistical analyses. This section demonstrates that the research analysis is aligned to the specific research design. |
90.00% This section describes how the data were collected for each variable or group (quantitative study) or for each research question (qualitative study). It describes the type of data analyzed, identifying the descriptive, thematic, inferential, and/or non-statistical analyses. This section demonstrates that the research analysis is aligned to the specific research design. |
100.00% This section strongly describes how the data were collected for each variable or group (quantitative study) or for each research question (qualitative study). It describes the type of data analyzed, identifying the descriptive, thematic, inferential, and/or non-statistical analyses. This section demonstrates that the research analysis is aligned to the specific research design. |
Grammar, Writing, Syntax 10% |
70.00% Needs significant improvement in skills associated formatting, grammar, spelling, syntax, and use of numbers. |
80.00% Needs minor improvement in skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
90.00% Demonstrates acceptable skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
100.00% Demonstrates a professional level of skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.