SlideShare a Scribd company logo
Week 8: Quantitative Research Design
Previous Next
Instructions
For this assignment, you will build on your assignment last
week to further explore how you might examine your research
problem using a quantitative methodology. Respond to the
following questions:
· Please restate the research problem, purpose, and research
questions you developed previously and incorporate any faculty
feedback as appropriate. This week, be sure to also include
hypotheses for each of your research questions.
· How might surveys be used to answer your research questions?
What are the advantages and disadvantages of using surveys to
collect data?
· How might you use an experiment or quasi-experiment to
answer your research questions? What are the advantages and
disadvantages of using (quasi)experiments to collect your data?
· It is also important to consider how you might analyze the
potential data you collect and factors that could affect those
analyses. Specifically, what are Type I and Type II errors? How
might these impact your study? What is statistical power? How
might this impact your study? What steps can you take ahead of
time to help avoid issues related to Type I & II errors as well as
power?
Be sure to use scholarly sources to support all assertions and
research decisions.
Length: 5 to 7 pages, not including title and reference pages
Grading Rubric
Criteria
Content (4 points)
Points
1
State research problem, purpose, research questions and
hypotheses
2
2
Discussed in detail the advantages and disadvantages of using
surveys to collect data
1
3
Explained how you could use experiments or quasi-experiments
to collect data for your study and the advantages and
disadvantages of these designs
1
Organization (1 point)
4
Organized and presented in a clear manner. Included a minimum
of five scholarly references, with appropriate APA formatting
applied to citations and paraphrasing.
1
Total
5
Your paper should demonstrate thoughtful consideration of the
ideas and concepts presented in the course by providing new
thoughts and insights relating directly to this topic. Your
response should reflect scholarly writing and current APA
standards. Be sure to adhere to Northcentral University’s
Academic Integrity Policy.
Upload your document and click the Submit to Dropbox button.
Running head: Numerical Data
Numerical Data
2
Assignment: Numerical Data
Shameka Jester
February 18, 2018
Northcentral University
Violations of individual rights have been a major issue in
today’s society. Numerous stakeholders are fighting for social
justice of persons, as well as protection of their individual
rights. A key and fundamental right that has increasingly been
violated is right to privacy, especially in the wake of the rapid
advancement in technology (Grumbling, 2016). Although
legislation has been established to address the issue, numerous
individuals continue to be victimized by violations of their
privacy rights, through disclosure of private information to
private companies and governmental agencies, including law
enforcement and medical practitioners (Sullivan, 2014). This
documentation provides details on a study that investigates the
impact of disclosure of private information to private companies
and governmental agencies as it relates to privacy threat.
Comment by Melody Rawlings: For APA formatting, fully
justified margins should not be used, but rather left
justification.
Research Problem
There is a rapidly increasing rate of violation of individual
privacy rights as a result of disclosure of personal information
to private and governmental agencies, especially in the wake of
the advancement in telecommunication technologies. This e
study aims to answer the question regarding the impact of
disclosure of private information to private and governmental
agencies on the privacy rights violation threats (Eisenhauer,
2015). The increased technological advancements and
integration of the society has led to increased information
sharing, which further worsens the situation. Information that
leaks to media platforms including news stations as well as
social media platforms, may spread dramatically. This in return
may lead to an increased threat of the violation of privacy.
Comment by Melody Rawlings: This needs a supporting
source.
The agencies and companies that access private
information about individuals may disclose to third parties,
including media, friends, and relatives, which increases threats
to violation of individual rights to privacy (Walker, 2016).
Individuals may be compelled to disclose private information
regarding their health status, lifestyles, and mental abilities,
among others, to such parties as employers, law enforcement
agencies, researchers, and medical practitioners. Such
information should be held in confidentiality in order to avoid
violation of privacy rights (Bernal 2015). Disclosure of this
information to third parties amounts to a considerable violation
of privacy rights of the individuals.
As noted in my feedback last week, you will need to write a
sentence or two for each study that:
i. briefly discusses the author(s)’ work, what they studied, and
ii. state their recommendation for further research about the
problem
Also, briefly tell what will happen if the problem is not
addressed.
Review the Problem Statement Template (required in the
dissertation phase) and Help With the Problem Statement
attached with the Welcome Letter in NCUOne.
Quantitative Methodology
The quantitative research methodology will enable the
researcher to collect quantitative data, whose analysis will
establish objective evidence to support the research findings.
The methodology provides for application of structured data
collection tools and instruments, which minimizes personal
biases of the researcher in data collection. The minimum
researcher biases in data collection, analysis, and interpretation
enhances objectivity, which in turn improves credibility,
reliability, and validity of the research results. The research
method will enhance the objectivity of research findings, which
will enable the researcher to advance the existing knowledge on
the research topic. Comment by Melody Rawlings: Avoid
anthropomorphisms. Anthropomorphism is defined as giving
human characteristics to inanimate objects. Incorrect: The
research study investigated: note studies should not have human
qualities Correct: The researchers investigated xxxx. Please
review the entire document for issues of anthropomorphism. See
APA p. 69. See APA page 69, section 3.09 to learn more.
Comment by Melody Rawlings: Minimizing researcher bias
is not the only step needed to increase reliability and validity.
What other steps can you take?
Triangulation of the data is one way to increase reliability and
validity. Other ways include randomly selecting participants,
ensuring the results are transferrable, and having another
qualified coder analyze the data. Also, having a large sample
size.
Purpose
The purpose of this quantitative study is to investigate the
impact of information sharing and disclosure activities by
private and governmental agencies on the violation of privacy
rights of individuals. Private companies and governmental
agencies access private information about individuals, which
may lead to threats on violation of privacy rights if not managed
effectively (Koltay, 2015). Although the issues has been
addressed through legislation including Civil Rights Act,
numerous individuals continue to face increased threats for
violation of privacy rights, as a result of the information that
private organizations and governmental agencies access and
share with third parties (Downes, 2014). A key instance
involves information that individuals disclose to law
enforcement agencies, including police officers, some of which
may be disclosed to media platforms and other parties.
The study will establish advanced knowledge on the relationship
between disclosure of private information by third parties and
the level of threat to violation of privacy rights of individuals.
The information will facilitate establishment of effective
policies and strategies to protect the privacy rights of
individuals. It will inform policy makers, law enforcement
agencies, and individuals on how to better improve their
privacy, especially in the wake of the advanced technological
advancements (Grant, 2017). Consequently, the study is crucial
in establishing the relationship between disclosure of
information by private and governmental agencies and threats
on violation of individual privacy rights, which will enforce
decisions on improvement of strategies to enhance protection of
privacy rights. As noted in my feedback last week, all of the
required components in the purpose statement are not here. The
Purpose Statement section should include a brief discussion of
the following: method of Study, variables, specific Population,
and setting .
Research Questions
The study will seek to answer three 3 questions, which will
enable the researcher to address the research problem. The
following research questions will be addressed in the study:
Comment by Melody Rawlings: Spell numbers less than
ten.
1. How does disclosure of private information to private and
governmental agencies affect the level of threat to violation of
individual privacy rights?
2. What is the relationship between leakages of private
information to media platforms and the level of threat to
violation of individual privacy rights?
3. What is the degree of disclosure of private information to
third parties by private companies and governmental agencies?
Research Design
The research study will apply a quantitative data, which will be
analyzed to answer the research questions. Quantitative research
will enable the researcher to establish objective evidence to
support the results of the study, which will in turn enhance
objectivity, reliability, generalizability, and validity of the
research results. The study will adopt a quantitative descriptive
research design, which will provide an opportunity to establish
empirical evidence on the relevance of disclosure of private
information by private companies and governmental agencies on
the level of privacy threat. The quantitative data that will be
collected will be guided by the research questions (Boräng,
2014). Data collection will involve structured interviews and
structured questionnaires. Comment by Melody Rawlings:
You cannot apply a quantitative data. You can utilize a
quantitative methodology to obtain data. Comment by Melody
Rawlings: Again, quantitative data only is not what increases
reliability, generalizability, and validity. Comment by Melody
Rawlings: This is redundant; it has already been stated in the
sentences above. Comment by Melody Rawlings: There is
another author listed for this source on the references page.
Both authors should have been listed in your in-text citation.
The data collection techniques and tools will enable the
researcher to collect relevant data, which will answer the
research questions. Structured interviews and structured
questionnaires enable a researcher to reduce personal biases in
the collection of data, which in turn enhances objectivity of
research results. A quantitative approach research enables thea
researcher to establish empirical evidence to support the
research results, which in turn enhances credibility, reliability,
and validity of research results. The study will apply strategic
random sampling, in order to ensure perfect representation of
the overall population. Comment by Melody Rawlings: This
is also redundant – it has already been stated. Comment by
Melody Rawlings: You need a supporting source to support your
reasoning.
The analysis of the data collected will aim at answering the
research questions. It will apply a spectrum of statistics,
including measures of descriptive and inferential statistics.
Descriptive statistics will include measures of central tendency
and measures of variance. Pearson’s correlation coefficient and
regression analysis will be used to determine correlation
between the predictor and dependent variables, including threat
level and disclosure of private information. Additionally, t test
will be used to determine the variance between the results
between varying groups, in order to determine their relevance
(Mrzel, 2017). ANOVA will also be used to determine the
significance of the variance between the groups, in order to
answer the study questions. Comment by Melody Rawlings:
This is redundant and a forgone conclusion. Comment by
Melody Rawlings: What are your variables? The dependent and
independent variables should have been stated in the purpose
section as well as here. Without knowing the variables, how can
you know what statistical tests to run?
Conclusion
The study will be crucial in explaining the impact of disclosure
of private information on the level of threat on violation of
privacy rights of individuals. The rapid advancements in
telecommunication technologies have led to a rise in violation
of privacy rights of individuals, owing to disclosure of personal
information by private companies and governmental
organizations. The study establishes empirical evidence on the
relationship between the level of privacy threat and disclosure
of private information to governmental agencies and private
information. The advancements of technologies in
communication have led to rapid integration of the society,
which has in turn led to a rise in privacy threat (Melanson,
2015). The society should wake up to the potential threat to
violation of one of the fundamental human rights, in order to
protect the rule of law.
References
Top of Form Comment by Melody Rawlings: I could not
locate an in-text citation for this source.
Bottom of Form
Top of Form
Bernal, P. (2015). Internet Privacy Rights: Rights to Protect
Autonomy. Cambridge: Cambridge University Press.
Boräng, F., & Rozbicka, P. (January 01, 2014). Identifying
frames: A comparison of research methods. Interest Groups &
Advocacy, 3, 2, 188-201.
Grant, L. E., & University of California, Santa Barbara.
(2017). Three essays on information and the private provision
of public goods. Santa Barbara, Calif.: University of California,
Santa Barbara.
Grumbling, E., National Academies of Sciences, Engineering,
and Medicine (U.S.)., & United States. (2016). Privacy research
and best practices: Summary of a workshop for the intelligence
community. Full source information is missing.
Hlebec, V., & Mrzel, M. (January 01, 2017). Explanatory mixed
methods research design and secondary quantitative data:
Methodological problems and solutions in participant selection
model. Slovenija V Času Negotovosti. Comment by Melody
Rawlings: I could not locate an in-text citation for this source.
Bottom of Form Comment by Melody Rawlings: This is not
in APA format. Follow APA section 6.17, p. 178 and use
secondary sources sparingly and only when out of print and
unavailable. In most cases, you should read the original source
and avoid secondary sources.
Top of Form
In Koltay, A. (2015). Comparative perspectives on the
fundamental freedom of expression.
Institute on Privacy Law, Eisenhauer, M. P., & Practising Law
Institute. (2015). 6th annual institute on privacy law: Data
protection - the convergence of privacy & security. New York,
NY: Practising Law Institute.
Bottom of Form Comment by Melody Rawlings: I could not
locate an in-text citation for this source.
Top of Form
Bottom of Form
Top of Form
Sherrin, C., & Downes, P. (2014). The criminal lawyers' guide
to disclosure and production. Aurora, Ont: Canada Law Book.
Bottom of Form
Top of Form
Bottom of Form
Top of Form
Melanson, P. H. (2015). Secrecy wars: National security,
privacy, and the public's right to know. Washington, D.C:
Brassey's.
Bottom of Form
Top of Form
Walker, D. M., United States., & United States. (2016). Privacy:
Preventing and responding to improper disclosures of personal
information : testimony Committee on Government Reform,
House of Representatives. Washington, D.C.: U.S. Government
Accountability Office.
Bottom of Form
Top of Form
Sullivan, J. M., & American Bar Association. (2014). HIPAA: A
practical guide to the privacy and security of health data.
Chicago, Ill: American Bar Association, Health Law Section.
Bottom of Form
Top of Form
Bottom of Form
Top of Form
Top of Form
Bottom of Form
Top of Form
Bottom of Form
Top of Form
Bottom of Form
Week 8 Quantitative Research DesignPrevious Next Instructio.docx

More Related Content

DOCX
Class Research Project Final
PPT
Ch 7 Privacy
PPTX
5 tactics for practical privacy protection
PPTX
ODiP: Reproducibility, open data and GDPR
PDF
Big Data & Privacy -- Response to White House OSTP
PPTX
Research Ethics and Use of Restricted Access Data
PPTX
Matching Uses and Protections for Government Data Releases: Presentation at t...
DOCX
Right to Privacy AssignmentCertain freedoms, or civil libertie.docx
Class Research Project Final
Ch 7 Privacy
5 tactics for practical privacy protection
ODiP: Reproducibility, open data and GDPR
Big Data & Privacy -- Response to White House OSTP
Research Ethics and Use of Restricted Access Data
Matching Uses and Protections for Government Data Releases: Presentation at t...
Right to Privacy AssignmentCertain freedoms, or civil libertie.docx

Similar to Week 8 Quantitative Research DesignPrevious Next Instructio.docx (20)

DOCX
Discussion 1 Affinity Group Checkpoint #4This week, you will on
DOC
DREaM Event 2: Charles Oppenheim (Handout)
DOCX
Leg 500 assignment 2 the value of digital privacy in an information technolog...
PPTX
Sharing Confidential Data in ICPSR
DOCX
Week 6 GuidancePsychological ResearchThere are many ways to co
PDF
Research methodology ethical issues in research an assignment
PPTX
Ethics of research
PPT
Privacy introduction
PPTX
Participant Consent and Withdrawal when using publicly archived data
PPTX
Building Ethics into the Research with Vulnerable groups
DOCX
Outline D
DOCX
Leg 500 assignment 2 the value of digital privacy in an information technolog...
PPTX
Privacy in Research Data Managemnt - Use Cases
PPTX
Practical Research 1-Introduction Topics
DOCX
Running Head DATA BREACH .docx
PPTX
Building Ethics into the Research with Vulnerable Groups
PPTX
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
PPTX
Overcoming obstacles to sharing data about human subjects
DOCX
Running Head CIGO .docx
PDF
IT risk discusion qustion.pdf
Discussion 1 Affinity Group Checkpoint #4This week, you will on
DREaM Event 2: Charles Oppenheim (Handout)
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Sharing Confidential Data in ICPSR
Week 6 GuidancePsychological ResearchThere are many ways to co
Research methodology ethical issues in research an assignment
Ethics of research
Privacy introduction
Participant Consent and Withdrawal when using publicly archived data
Building Ethics into the Research with Vulnerable groups
Outline D
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Privacy in Research Data Managemnt - Use Cases
Practical Research 1-Introduction Topics
Running Head DATA BREACH .docx
Building Ethics into the Research with Vulnerable Groups
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Overcoming obstacles to sharing data about human subjects
Running Head CIGO .docx
IT risk discusion qustion.pdf
Ad

More from philipnelson29183 (20)

DOCX
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
DOCX
·Analyze HRM legal regulations and learn proper procedures for.docx
DOCX
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
DOCX
~GOODWRITER~You have now delivered the project to your customer..docx
DOCX
__ captures a mother and child at the table in __ Paula Modersohn .docx
DOCX
[removed]Which of the following would not be considered a subarea .docx
DOCX
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
DOCX
[removed]World’s Biggest Public Compan.docx
DOCX
[removed].docx
DOCX
[removed]1Government.docx
DOCX
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
DOCX
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
DOCX
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
DOCX
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
DOCX
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
DOCX
Youre gonna respond to Are too many people going to college by Ch.docx
DOCX
Your team was invited to present to a high school IT class to explai.docx
DOCX
Your Paper (8 pages) should include the following areas1. Cover P.docx
DOCX
Your organization is expanding globally and you will no longer have .docx
DOCX
Your outline should be a detailed overview of the Service Learning .docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·Analyze HRM legal regulations and learn proper procedures for.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
~GOODWRITER~You have now delivered the project to your customer..docx
__ captures a mother and child at the table in __ Paula Modersohn .docx
[removed]Which of the following would not be considered a subarea .docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
[removed]World’s Biggest Public Compan.docx
[removed].docx
[removed]1Government.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youre gonna respond to Are too many people going to college by Ch.docx
Your team was invited to present to a high school IT class to explai.docx
Your Paper (8 pages) should include the following areas1. Cover P.docx
Your organization is expanding globally and you will no longer have .docx
Your outline should be a detailed overview of the Service Learning .docx
Ad

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
master seminar digital applications in india
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Pharma ospi slides which help in ospi learning
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Microbial disease of the cardiovascular and lymphatic systems
O7-L3 Supply Chain Operations - ICLT Program
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
master seminar digital applications in india
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
VCE English Exam - Section C Student Revision Booklet
Pharma ospi slides which help in ospi learning
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial disease of the cardiovascular and lymphatic systems

Week 8 Quantitative Research DesignPrevious Next Instructio.docx

  • 1. Week 8: Quantitative Research Design Previous Next Instructions For this assignment, you will build on your assignment last week to further explore how you might examine your research problem using a quantitative methodology. Respond to the following questions: · Please restate the research problem, purpose, and research questions you developed previously and incorporate any faculty feedback as appropriate. This week, be sure to also include hypotheses for each of your research questions. · How might surveys be used to answer your research questions? What are the advantages and disadvantages of using surveys to collect data? · How might you use an experiment or quasi-experiment to answer your research questions? What are the advantages and disadvantages of using (quasi)experiments to collect your data? · It is also important to consider how you might analyze the potential data you collect and factors that could affect those analyses. Specifically, what are Type I and Type II errors? How might these impact your study? What is statistical power? How might this impact your study? What steps can you take ahead of time to help avoid issues related to Type I & II errors as well as power? Be sure to use scholarly sources to support all assertions and research decisions. Length: 5 to 7 pages, not including title and reference pages Grading Rubric Criteria Content (4 points) Points
  • 2. 1 State research problem, purpose, research questions and hypotheses 2 2 Discussed in detail the advantages and disadvantages of using surveys to collect data 1 3 Explained how you could use experiments or quasi-experiments to collect data for your study and the advantages and disadvantages of these designs 1 Organization (1 point) 4 Organized and presented in a clear manner. Included a minimum of five scholarly references, with appropriate APA formatting applied to citations and paraphrasing. 1 Total 5 Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA
  • 3. standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy. Upload your document and click the Submit to Dropbox button. Running head: Numerical Data Numerical Data 2 Assignment: Numerical Data Shameka Jester February 18, 2018 Northcentral University Violations of individual rights have been a major issue in today’s society. Numerous stakeholders are fighting for social justice of persons, as well as protection of their individual rights. A key and fundamental right that has increasingly been violated is right to privacy, especially in the wake of the rapid advancement in technology (Grumbling, 2016). Although
  • 4. legislation has been established to address the issue, numerous individuals continue to be victimized by violations of their privacy rights, through disclosure of private information to private companies and governmental agencies, including law enforcement and medical practitioners (Sullivan, 2014). This documentation provides details on a study that investigates the impact of disclosure of private information to private companies and governmental agencies as it relates to privacy threat. Comment by Melody Rawlings: For APA formatting, fully justified margins should not be used, but rather left justification. Research Problem There is a rapidly increasing rate of violation of individual privacy rights as a result of disclosure of personal information to private and governmental agencies, especially in the wake of the advancement in telecommunication technologies. This e study aims to answer the question regarding the impact of disclosure of private information to private and governmental agencies on the privacy rights violation threats (Eisenhauer, 2015). The increased technological advancements and integration of the society has led to increased information sharing, which further worsens the situation. Information that leaks to media platforms including news stations as well as social media platforms, may spread dramatically. This in return may lead to an increased threat of the violation of privacy. Comment by Melody Rawlings: This needs a supporting source. The agencies and companies that access private information about individuals may disclose to third parties, including media, friends, and relatives, which increases threats to violation of individual rights to privacy (Walker, 2016). Individuals may be compelled to disclose private information regarding their health status, lifestyles, and mental abilities, among others, to such parties as employers, law enforcement agencies, researchers, and medical practitioners. Such information should be held in confidentiality in order to avoid
  • 5. violation of privacy rights (Bernal 2015). Disclosure of this information to third parties amounts to a considerable violation of privacy rights of the individuals. As noted in my feedback last week, you will need to write a sentence or two for each study that: i. briefly discusses the author(s)’ work, what they studied, and ii. state their recommendation for further research about the problem Also, briefly tell what will happen if the problem is not addressed. Review the Problem Statement Template (required in the dissertation phase) and Help With the Problem Statement attached with the Welcome Letter in NCUOne. Quantitative Methodology The quantitative research methodology will enable the researcher to collect quantitative data, whose analysis will establish objective evidence to support the research findings. The methodology provides for application of structured data collection tools and instruments, which minimizes personal biases of the researcher in data collection. The minimum researcher biases in data collection, analysis, and interpretation enhances objectivity, which in turn improves credibility, reliability, and validity of the research results. The research method will enhance the objectivity of research findings, which will enable the researcher to advance the existing knowledge on the research topic. Comment by Melody Rawlings: Avoid anthropomorphisms. Anthropomorphism is defined as giving human characteristics to inanimate objects. Incorrect: The research study investigated: note studies should not have human qualities Correct: The researchers investigated xxxx. Please review the entire document for issues of anthropomorphism. See APA p. 69. See APA page 69, section 3.09 to learn more. Comment by Melody Rawlings: Minimizing researcher bias is not the only step needed to increase reliability and validity. What other steps can you take?
  • 6. Triangulation of the data is one way to increase reliability and validity. Other ways include randomly selecting participants, ensuring the results are transferrable, and having another qualified coder analyze the data. Also, having a large sample size. Purpose The purpose of this quantitative study is to investigate the impact of information sharing and disclosure activities by private and governmental agencies on the violation of privacy rights of individuals. Private companies and governmental agencies access private information about individuals, which may lead to threats on violation of privacy rights if not managed effectively (Koltay, 2015). Although the issues has been addressed through legislation including Civil Rights Act, numerous individuals continue to face increased threats for violation of privacy rights, as a result of the information that private organizations and governmental agencies access and share with third parties (Downes, 2014). A key instance involves information that individuals disclose to law enforcement agencies, including police officers, some of which may be disclosed to media platforms and other parties. The study will establish advanced knowledge on the relationship between disclosure of private information by third parties and the level of threat to violation of privacy rights of individuals. The information will facilitate establishment of effective policies and strategies to protect the privacy rights of individuals. It will inform policy makers, law enforcement agencies, and individuals on how to better improve their privacy, especially in the wake of the advanced technological advancements (Grant, 2017). Consequently, the study is crucial in establishing the relationship between disclosure of information by private and governmental agencies and threats on violation of individual privacy rights, which will enforce decisions on improvement of strategies to enhance protection of privacy rights. As noted in my feedback last week, all of the
  • 7. required components in the purpose statement are not here. The Purpose Statement section should include a brief discussion of the following: method of Study, variables, specific Population, and setting . Research Questions The study will seek to answer three 3 questions, which will enable the researcher to address the research problem. The following research questions will be addressed in the study: Comment by Melody Rawlings: Spell numbers less than ten. 1. How does disclosure of private information to private and governmental agencies affect the level of threat to violation of individual privacy rights? 2. What is the relationship between leakages of private information to media platforms and the level of threat to violation of individual privacy rights? 3. What is the degree of disclosure of private information to third parties by private companies and governmental agencies? Research Design The research study will apply a quantitative data, which will be analyzed to answer the research questions. Quantitative research will enable the researcher to establish objective evidence to support the results of the study, which will in turn enhance objectivity, reliability, generalizability, and validity of the research results. The study will adopt a quantitative descriptive research design, which will provide an opportunity to establish empirical evidence on the relevance of disclosure of private information by private companies and governmental agencies on the level of privacy threat. The quantitative data that will be collected will be guided by the research questions (Boräng, 2014). Data collection will involve structured interviews and structured questionnaires. Comment by Melody Rawlings: You cannot apply a quantitative data. You can utilize a quantitative methodology to obtain data. Comment by Melody Rawlings: Again, quantitative data only is not what increases reliability, generalizability, and validity. Comment by Melody
  • 8. Rawlings: This is redundant; it has already been stated in the sentences above. Comment by Melody Rawlings: There is another author listed for this source on the references page. Both authors should have been listed in your in-text citation. The data collection techniques and tools will enable the researcher to collect relevant data, which will answer the research questions. Structured interviews and structured questionnaires enable a researcher to reduce personal biases in the collection of data, which in turn enhances objectivity of research results. A quantitative approach research enables thea researcher to establish empirical evidence to support the research results, which in turn enhances credibility, reliability, and validity of research results. The study will apply strategic random sampling, in order to ensure perfect representation of the overall population. Comment by Melody Rawlings: This is also redundant – it has already been stated. Comment by Melody Rawlings: You need a supporting source to support your reasoning. The analysis of the data collected will aim at answering the research questions. It will apply a spectrum of statistics, including measures of descriptive and inferential statistics. Descriptive statistics will include measures of central tendency and measures of variance. Pearson’s correlation coefficient and regression analysis will be used to determine correlation between the predictor and dependent variables, including threat level and disclosure of private information. Additionally, t test will be used to determine the variance between the results between varying groups, in order to determine their relevance (Mrzel, 2017). ANOVA will also be used to determine the significance of the variance between the groups, in order to answer the study questions. Comment by Melody Rawlings: This is redundant and a forgone conclusion. Comment by Melody Rawlings: What are your variables? The dependent and independent variables should have been stated in the purpose section as well as here. Without knowing the variables, how can you know what statistical tests to run?
  • 9. Conclusion The study will be crucial in explaining the impact of disclosure of private information on the level of threat on violation of privacy rights of individuals. The rapid advancements in telecommunication technologies have led to a rise in violation of privacy rights of individuals, owing to disclosure of personal information by private companies and governmental organizations. The study establishes empirical evidence on the relationship between the level of privacy threat and disclosure of private information to governmental agencies and private information. The advancements of technologies in communication have led to rapid integration of the society, which has in turn led to a rise in privacy threat (Melanson, 2015). The society should wake up to the potential threat to violation of one of the fundamental human rights, in order to protect the rule of law. References Top of Form Comment by Melody Rawlings: I could not locate an in-text citation for this source. Bottom of Form Top of Form Bernal, P. (2015). Internet Privacy Rights: Rights to Protect Autonomy. Cambridge: Cambridge University Press. Boräng, F., & Rozbicka, P. (January 01, 2014). Identifying frames: A comparison of research methods. Interest Groups & Advocacy, 3, 2, 188-201. Grant, L. E., & University of California, Santa Barbara. (2017). Three essays on information and the private provision of public goods. Santa Barbara, Calif.: University of California, Santa Barbara.
  • 10. Grumbling, E., National Academies of Sciences, Engineering, and Medicine (U.S.)., & United States. (2016). Privacy research and best practices: Summary of a workshop for the intelligence community. Full source information is missing. Hlebec, V., & Mrzel, M. (January 01, 2017). Explanatory mixed methods research design and secondary quantitative data: Methodological problems and solutions in participant selection model. Slovenija V Času Negotovosti. Comment by Melody Rawlings: I could not locate an in-text citation for this source. Bottom of Form Comment by Melody Rawlings: This is not in APA format. Follow APA section 6.17, p. 178 and use secondary sources sparingly and only when out of print and unavailable. In most cases, you should read the original source and avoid secondary sources. Top of Form In Koltay, A. (2015). Comparative perspectives on the fundamental freedom of expression. Institute on Privacy Law, Eisenhauer, M. P., & Practising Law Institute. (2015). 6th annual institute on privacy law: Data protection - the convergence of privacy & security. New York, NY: Practising Law Institute. Bottom of Form Comment by Melody Rawlings: I could not locate an in-text citation for this source. Top of Form Bottom of Form Top of Form Sherrin, C., & Downes, P. (2014). The criminal lawyers' guide to disclosure and production. Aurora, Ont: Canada Law Book. Bottom of Form Top of Form Bottom of Form Top of Form Melanson, P. H. (2015). Secrecy wars: National security, privacy, and the public's right to know. Washington, D.C: Brassey's. Bottom of Form
  • 11. Top of Form Walker, D. M., United States., & United States. (2016). Privacy: Preventing and responding to improper disclosures of personal information : testimony Committee on Government Reform, House of Representatives. Washington, D.C.: U.S. Government Accountability Office. Bottom of Form Top of Form Sullivan, J. M., & American Bar Association. (2014). HIPAA: A practical guide to the privacy and security of health data. Chicago, Ill: American Bar Association, Health Law Section. Bottom of Form Top of Form Bottom of Form Top of Form Top of Form Bottom of Form Top of Form Bottom of Form Top of Form Bottom of Form