Analyze existing project risk management literature. Provide context for an analysis of information project risk management mechanisms for an organization.
3 Page Minimum
Please Organize in the following sections listed below under the bold outline in the 2nd paragraph
IN THE LINKS PROVIDED ARE SOME TOPICS THAT CAN BE USED IN MY FIELD OF STUDY WHICH IS DIT PLEASE SELECT SOMETHING FROM IT !!!
INCLUDE A MINIMUM OF 10 CURRENT SCHOLARLY OR PROFESSIONAL RESOURCES!!!!
- Analyze existing project risk management literature.
- Provide context for an analysis of information project risk management mechanisms for an organization.
- Identify a research problem in project risk management.
- Summarize the purpose and scope of the research project, methods used, and questions addressed.
- Identify key constructs and/or a theoretical foundation, as well as key relationships among the constructs.
- Describe the target population.
- Describe the participants' eligibility criteria.
- Explain ethical considerations such as participants' right to privacy, informed consent, and protection from harm.
- Identify gaps in knowledge in the literature (PhD) or gaps in practice (DIT).
- Cite any scholarly or professional resources used.
Organize your topic definition statement into the following sections!!
- Research Topic.
- Analysis of Existing Project Management Literature.
- Research Problem Background.
- Research Problem Statement.
- Purpose and Scope.
- Research Question.
- Methods (i.e., generic qualitative inquiry or quantitative regression).
- Theoretical Foundation.
- Target Population.
- Eligibility Criteria.
- Ethical Considerations.
- Gaps in the Literature (PhD) or Gaps in Practice (DIT).
Last Revised 6/30/2022
Acceptable Topics and Techniques
This document outlines the theoretical orientations, topics, techniques, and populations appropriate and feasible for doctoral learner capstone projects and dissertations within the Doctor of Information Technology program. Doctor of Information Technology The Doctor of Information Technology degree program is designed for experienced professionals seeking to advance in their careers as senior technology managers, consultants, researchers, or teachers. Throughout the program, you will integrate information technology and research with practice, and develop expertise in IT, cybersecurity, and managing IT projects. Selecting a Topic for Your Doctoral Project An acceptable doctoral capstone or dissertation topic is aligned with your program, avoids significant participant risks, represents a refinement or improvement over current best practice, and is feasible. Capella University is committed to helping doctoral learners identify potential challenges related to feasibility. An important consideration for topic selection is whether it is feasible to complete the proposed doctoral capstone or dissertation within the timeframe of your degree. These challenges can add a significant amount of time to a learner’s degree completion or result in doctoral capstones or dissertations that cannot be completed. The theories, topics, and techniques acceptable and feasible for doctoral projects in the program align closely to the profession, coursework, and faculty expertise. In completing your project, you will gain a deeper understanding and mastery of a particular theoretical orientation and topic at the doctoral level. While not an exhaustive listing, the following sections detail those theories, topics, and techniques that meet the criteria for being both acceptable and feasible for doctoral projects within the program. Please work with your faculty instructor and/or mentor to ensure that your topic is appropriate for the DIT program. Projects and dissertations that lie outside the scope of the guidance provided here will need to be vetted by the Program and Research Director for further determination of relevance, rigor, and feasibility. In some cases, the Dean of the School of Business, Technology, and Health Care Administration will need to approve the topic.
Last Revised 6/30/2022
Acceptable Project Techniques Project techniques Sources of data Type of analysis Sample size (participants) Generic qualitative inquiry
Interactive, real-time interviews, with each participant interview lasting 45-60 minutes.
Thematic analysis Approximately 10-12
Quantitative Surveys (validated, peer-reviewed instruments only; learners may not create their own surveys)
Regression analysis Requires a G*Power analysis to identify appropriate sample size
Note. Called project techniques in Professional Doctorate programs but called methods and designs in the research courses and PhD programs. In very rare cases, project techniques other than those listed above may be approved by the SoBTH Program Director and Research Director. For approval, the learner must show that (1) none of the techniques listed above will adequately address the project topic, (2) they thoroughly understand the technique that they want to use, (3) they have the knowledge, skill, and resources needed to successfully use the proposed technique with minimal support, and (4) they understand and accept the potential risks, effort, costs, and delay that may accompany the use of a non-standard technique. Learners must work with their mentor to prepare their case and schedule a Zoom meeting with the SoBTH Program Director and Research Director for approval of any project technique not listed here.
Resource List on Project Techniques* Research Designs Explained (Project Techniques)
Recommended Theoretical Orientations* • Boundary object theory • Complexity theory • Critical success factors theory • Diffusion of innovations theory • General systems theory • Information processing theory • International information • Media richness theory • Process virtualization theory
systems theory • Technology acceptance model • Technology dominance theory • Unified theory of acceptance and
use of technology • Work systems theory • Behavioral decision theory • Social cognitive theory • Disruptive technology theory • Equity theory • Contingency theory • Absorptive capacity theory • Cognitive load theory • Social learning theory
Recommended Acceptable Program Topic Areas* • Corporate social networking • Information technology • Internet of Things (IOT)
infrastructure for big data • Blockchain • Artificial intelligence • Cybersecurity • Agile methods in project • Project management office • Leadership skills in project
management, including scrum approach to portfolio management management • Access control • Business continuity and disaster • Cryptography
recovery planning
Last Revised 6/30/2022
• Employee monitoring • Enterprise information systems • Information security governance security and risk management • Operations security • Social networking/privacy • Security architecture and design • Cloud Computing • International education in • Using technology to enhance
information technology learning • Using technology to support • Business intelligence and • Customer engagement and social
teaching and teaching analytics media administration
*This is not an exhaustive list. It is meant to provide thoughts on appropriate topics to pursue. Refer to current, relevant, respected professional publications and peer-reviewed journals for identification and justification of proposed topics. Avoid Significant Participant Risks All research involving human subjects involves some degree of participant risks. Even doctoral capstone projects that do not involve human subjects research as defined by the federal regulations may present risks to the individuals involved. Doctoral projects involving significant participant risks will not be approved. Carefully review Assessing Participant Risk in Research to understand how to assess potential topics for risk and mitigate risk. When selecting a doctoral capstone or dissertation topic, learners should avoid topics involving significant participant risk, including those which might be considered highly "sensitive" or involve highly vulnerable populations. Certain topics are also prohibited at Capella. Library Guides Research assistance, subject guides, and useful resources compiled by Capella librarians can be found within the Capella Library.
• Library Guides
- Resource List on Project Techniques*
,
Last Revised 6/30/2022
Acceptable Topics and Designs This document outlines the theoretical orientations, topics, methods, and populations appropriate and feasible for doctoral learner dissertation projects within the PhD-Information Technology program. PhD-Information Technology This program is designed to help you gain an understanding of foundational theory and how it applies to information technology, as well as the skills and knowledge to research, teach, consult, and lead.
• General Information Technology – This degree program can prepare you to influence IT practice, apply ethical leadership strategies to integrate best practices and tools, and expand your communication, research, writing, and critical-thinking skills. Choose dissertation topics or an area of study in information security or network architecture and design or focus on IT within a specific industry.
• Information Assurance & Cybersecurity – This program provides opportunities for advanced skill development and doctoral research in areas such as information confidentiality, compliance, and risk management.
• Project Management – Discover how you can become a key strategic advisor or consultant with advanced skills in IT, management, and business development
Selecting a Topic for Your Doctoral Project An acceptable dissertation or doctoral capstone topic is aligned with your program and specialization, represents an original contribution to the current literature, avoids significant participant risks, and is feasible. Capella University is committed to helping doctoral learners identify potential challenges related to feasibility. An important consideration for topic selection is whether it is feasible to complete the proposed dissertation within the timeframe of your degree. These challenges can add a significant amount of time to a learner’s degree completion or result in dissertations or doctoral capstones that cannot be completed. The theories, topics, and methods acceptable and feasible for doctoral projects in the program align closely to the profession, coursework, and faculty expertise. In completing your project, you will gain a deeper understanding and mastery of a particular theoretical orientation and topic at the doctoral level. While not an exhaustive listing, the following sections detail those theories, topics, approaches, design and methods that meet the criteria for being both acceptable and feasible for doctoral projects within the program. Dissertations that lie outside the scope of the guidance provided here will need to be vetted by the Program and Research Director for further determination of relevance, rigor, and feasibility. In some cases, the Dean of the School of Business, Technology, and Health Care Administration will need to approve the topic.
Last Revised 6/30/2022
Acceptable Dissertation Methods Dissertation methods Sources of data Type of analysis Sample size (participants) Generic qualitative inquiry Interactive, real-time
interviews, with each participant interview lasting 45-60 minutes.
Thematic analysis Approximately 10-12
Quantitative Surveys (validated, peer- reviewed instruments only; learners may not create their own surveys)
Regression analysis Requires a G*Power analysis to identify appropriate sample size
Note. In very rare cases, project techniques other than those listed above may be approved by the SoBTH Program Director and Research Director. For approval, the learner must show that (1) none of the techniques listed above will adequately address the project topic, (2) they thoroughly understand the technique that they want to use, (3) they have the knowledge, skill, and resources needed to successfully use the proposed technique with minimal support, and (4) they understand and accept the potential risks, effort, costs, and delay that may accompany the use of a non-standard technique. Learners must work with their mentor to prepare their case and schedule a Zoom meeting with the SoBTH Program Director and Research Director for approval of any project technique not listed here.
Resource List on Project Designs* Research Designs Explained
Recommended Theoretical Orientations* • Boundary object theory • Complexity theory • Critical success factors theory • Diffusion of innovations theory • General systems theory • Information processing theory • International information systems theory
• Media richness theory • Process virtualization theory
• Technology acceptance model • Technology dominance theory • Unified theory of acceptance and use of technology
• Work systems theory • Behavioral decision theory • Social cognitive theory • Disruptive technology theory • Equity theory • Contingency theory • Absorptive capacity theory • Cognitive load theory • Social learning theory
Recommended Acceptable Program Topic Areas* • Corporate social networking • Information technology
infrastructure for big data • Internet of Things (IOT)
• Blockchain • Artificial intelligence • Cybersecurity • Agile methods in project • Project management office
approach to portfolio management • Leadership skills in project
management • Access control • Business continuity and disaster
recovery planning • Cryptography
• Employee monitoring • Enterprise information systems security
• Information security governance and risk management
Last Revised 6/30/2022
• Operations security • Social networking/privacy • Security architecture and design • Assessment and e-folios • International education in IT • Customer engagement and social
media • Using technology to support teaching administration
• Business intelligence and analytics
• Using technology to enhance learning
*These are not exhaustive lists; they are meant to provide thoughts on appropriate topics to pursue. Refer to the current, relevant, peer-reviewed literature for identification and justification of proposed topics and theoretical orientations. Avoid Significant Participant Risks All research involving human subjects involves some degree of participant risks. Even doctoral capstone projects that do not involve human subjects research as defined by the federal regulations may present risks to the individuals involved. Doctoral Projects involving significant participant risks will not be approved. Carefully review Assessing Participant Risk in Research to understand how to assess potential topics for risk and mitigate risk. When selecting a dissertation topic, learners should avoid topics involving significant participant risk, including those which might be considered highly "sensitive" or involve highly vulnerable populations. Certain topics are also prohibited at Capella. Library Guides Research assistance, subject guides, and useful resources compiled by Capella librarians can be found within the Capella Library.
• Library Guides
- Resource List on Project Designs*
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.