TECH8000 IT Capstone Report 1 Sample
Your Task
This assessment is to be completed individually. In this assessment, you will write a report to design a plan for research that aims to identify the causes and potential solutions of a complex IT problem for a client.
Please note: You will be required to use the same organisation for all assessments in this subject.
Assessment Description
In this assessment, you will develop a comprehensive research proposal that focuses on identifying the causes and potential solutions of a complex IT problem faced by a client. The research proposal should demonstrate your ability to design and plan a research project, incorporating appropriate research methods, theoretical frameworks, and ethical considerations relevant to the field of IT. This assessment aims to achieve the following subject learning outcomes:
LO1 Design a plan for research that aims to identify the causes and potential solutions of a complex IT problem for a client.
Assessment Instructions
Students must conduct research externally and included references in order to produce a well referenced assessment. You should use at least ten (10) sources of information and reference these in accordance with the Kaplan Harvard Referencing Style. These may include websites, social media sites, industry reports, census data, journal articles, and newspaper articles. These references should be presented as in-text citations and a referencing list at the end of your assessment (not included in the word limit). Wikipedia and other ‘popular’ sites are not to be used.
1. You must submit your report in Word document or in PDF format.
2. The report should be well-structured and organised. It should include the following details:
a) Introduction and Problem Statement:
i) Clearly state the IT problem and provide a concise overview of its significance. Explain why it is crucial to identify the causes and potential solutions for this problem.
b) Research Objectives and Research Questions:
i) Define clear and measurable research objectives that align with the problem statement. Develop specific research questions that will guide your investigation and address the identified problem.
c) Literature Review:
i) Conduct a thorough review of existing literature related to the IT problem. Summarise key findings and theories relevant to understanding the causes and potential solutions. Critically analyse and synthesise the existing research to support the need for your proposed study.
d) Theoretical Framework:
i) Develop a theoretical framework that provides a conceptual basis for your research.
Identify relevant theories, models, or frameworks that can inform your investigation and help analyse the causes and potential solutions of the IT problem.
e) Research Methodology:
i) Describe the research methodology you will employ to collect and analyse data. Justify the chosen methodology and explain how it aligns with your research objectives. Discuss data collection methods, sampling techniques, and data analysis procedures you will utilise to explore the problem effectively.
f) Ethical Considerations:
i) Identify and address ethical considerations associated with your research. Discuss potential risks, privacy issues, informed consent, and any other ethical concerns that need to be taken into account during the research process. Outline the steps you will take to ensure ethical conduct throughout the study.
3. Please refer to the assessment marking guide to assist you in completing all the assessment
criteria.
Solution
1.0 Introduction
Global Tech Industry is a multinational technology solution provider headquartered in Silicon Valley, US. The company is dedicated to producing technological transitions for other industries, which makes it valuable and innovative. University Assignment Help, This research sheds light on the critical discussion about the possible complex challenges for the clients and its related strategic solutions, making it a multinational company in the operational markets.
1.1 Problem Statement
Considering the key products and services, the company is dedicated to providing transport, health and telecom tech support to the respective companies. Thus, various kinds of challenges are being raised during the operation for the clients, such as International regulatory differentiation, data silos and legacy systems (Poudel, 2022). As the company operates in multiple locations, different data management norms and regulations exist. Such a scenario is problematic, especially for telecom organisations to manage and adhere to their crucial data. Additionally, technological malfunctioning and maintenance remain a crucial concern for the clients, depicting the importance of service efficiency in Global tech industries.
2.0 Research Objectives and Research Questions
2.1 Research objectives
? To identify the mission and vision of the IT industries in the digital world.
? To recognise the complex IT challenges that are faced by the client.
? To determine the potential solutions to mitigate the issues and make the system convenient and accessible for the clients.
2.3 Research questions
? What are the prime missions and vision of the IT industry in the digital world?
? What are the key complex IT challenges that the clients are facing?
? What are the potential solutions to mitigate the issues?
3.0 Literature review
3.1 Mission and vision of the IT industry
Considering the latest market trends and technological advancement in the twenty-first century, the Information technology industry is dedicated to making things more convenient for customers. According to Saeidi et al. (2019, pp.69), including AI-driven software, blockchain technology and others has simplified regular life. For instance, a single touch on a mobile screen can connect any people an individual wants to talk with. Such a similar IT industry mission makes the world well-connected and efficient in serving better environments. On the other hand, Habib et al., (2021, pp.519) reflects that the IT industry is related to developing the future and advancing technological applications to achieve something beyond the thinking level.
3.2 Complex IT challenges
Considering the working mechanism and business approach of IT industries, several challenges are being faced by the clients and customers in terms of data security, reliability, reduced maintenance, complex systems, reduced training of the employees and many more. According to Shanmugarasa et al., (2023, pp.4), if a tech provider is serving its tech solutions to a telecom industry, the data security threat is high due to increased cybercrimes and fraud cases. Such a scenario is more often in the recent world that imposes forceful strategic adaptations for tech solution providers. Additionally, Poudel, (2022) states that legacy-related issues always remain persistent for the clients. As the IT industries are operating in multiple nations simultaneously, the issue regarding data management arises for the customers and clients.
Figure 1: Biggest challenges for the clients of the IT industry
Source: (Statista, 2022)
The above graphical presentation reflects the additional challenges the clients have faced regarding complex measuring CX, reduced real-time customer insights and many more. Thus, Doolani et al., (2020) opine that the customers of tech solution organisations are suffering from reduced training of the employees and knowledge of Information Technology that, create barriers to successful data management systems.
3.3 Potential solutions
According to Koifman, (2023), data security is the biggest challenge for the clients of tech solution providers. Organisations have integrated advanced blockchain technology into their servers and software to maintain data security, resulting in enhanced performance of the servers. Additionally, regular password changes and system monitoring also increase the efficiency of information technology, allowing customers to store an enormous range of datasets. Strong network resilience and multiple testing policies by the tech solution providers also enhance the technological system's capability and reliability, which protects the client's business from cybercrimes and hackers. On the other hand, Gil-Gomez et al., (2020) depict that potential solutions of the tech industry refer to advanced training and hiring procedures by organisations to cope with the digital pace. Such a strategic adaptation induces the work procedure's overall quality and efficiency, resulting in higher profitability. Additionally, this particular management decision provides personalised and customised services to its client, which mitigates the issues related to device maintenance and fixation of server problems. Koifman (2023) opined that innovation in the tech world is the prime aspect of mitigating the existing issues. For instance, adaptation of recent technological trends and adequate service development will mitigate the challenges for the clients of tech solution providers and allow them to perform more efficiently in their operational markets.
4.0 Theoretical framework
Technology acceptance model
Figure 2: Technology acceptance model
Source: (Khera, 2022)
The technological acceptance model is described by Davis in 1989, which reflects the two main factors of Information technology and technological advancements, such as perceived usefulness and perceived ease of use. According to Dhagarra, Goswami & Kumar, (2020), the clients and customers of tech solution providers are aligned with these two factors where the perceptions of the potential users are the key. The challenges recognised in the earlier stage include the ease of use by the clients. On the other hand, Rafique et al., (2020) opine that tech challenges are aligned with external attitudes such as cybercrime, reduced training and many more, which create disruptions in the data management process.
5.0 Research methodology
5.1 Research philosophy, design and approach
Interpretivism research philosophy will be applied to this study to reflect the real-time and social value of the context. Based on this research philosophy, the researcher will interpret the collected information to analyse appropriate issues and potential solutions of tech companies for its clients. Additionally, it will enhance the data validity, making this study more credible and reliable for the readers (Alharahsheh and Pius, 2020, pp.41).
Along with the research philosophy, exploratory research design will be utilised to organise all the information in adequate patterns for better readers' accessibility. Exploratory research design will help the researcher establish the research concept's foundation and present a cause-effect model consisting of arguments (Makri and Neely, 2021). The logical flow of the discussion will be created, effectively satisfying the research objectives.
Aiming to achieve the aim of this research work, the researcher will apply an inductive research approach to create a scientific logic within the study. Such an approach will increase the reliability and authenticity of the research work in terms of presenting the key aspects of Tech solution providers and clients' demands. Most importantly, the inductive research approach will underpin a theoretical application within the study, which is suitable to explore all the dimensions of the tech world's potential solutions and recent technological trends (Walter and Ophir, 2019, pp.249).
5.2 Data collection strategy and analysis
The researcher will utilise a qualitative data collection method to accomplish the data collection task. A Qualitative data collection method will provide a vast range of relevant information to analyse critically (Jain, 2023). Additionally, this specific data collection method excludes numeric expressions, making the study more convenient and accessible for the readers. The flexibility and feasibility of this data collection method will also be suitable to explain the challenges faced by the clients of tech solution providers along with potential solutions.
Secondary sources will be used to gather the required information, increasing the data's authenticity and reliability. Considering the secondary sources, the researcher will use open networking sites such as Google Scholar and Science Direct to include at least 15 articles, journals and many more. Secondary sources will be chosen based on the features of a convenient sampling strategy, as it will provide readily available information and quick responses to the researcher's queries (Nikolopoulou, 2023).
Thematic data analysis will be applied to get precise and subjective findings. The themes will be developed based on the research objectives to stay focused and answer all the research questions satisfactorily. Additionally, thematic data analysis can be performed without technological and theoretical expertise, which increases its accessibility to perform more efficiently in the real field (Lochmiller, 2021).
6.0 Ethical Considerations
Ethical aspects are the most crucial segment that determines the success of a research work in its academic field by excluding discrimination, plagiarism and data bias (Suri, 2020, pp.42). Aiming to succeed, the researcher has submitted the ethics approval to the module supervisor to get approval on the topic. Additionally, the researcher will store the gathered information in a password-encrypted drive with limited access and the drive will be deleted after the successful accomplishment of this research work. In addition, the secondary sources will be listed in the reference list and appropriately cited beside the new ideas from where they will be generated.
7.0 Conclusion
After completing this research, global tech industrious and its services follow the latest technological trends. Additionally, it has introduced fewer challenges for its clients in the form of legacy, data security and international regulations, which have been optimised with appropriate adaptation of policies and align with the principles of TAM depicting effective operational management worldwide.
Reference list
Alharahsheh, H.H. & Pius, A., (2020) ‘A review of key paradigms: Positivism VS interpretivism’, Global Academic Journal of Humanities and Social Sciences, vol. 2. No. 3, pp.39-43. DOI: 10.36348/gajhss.2020.v02i03.001
Dhagarra, D., Goswami, M. & Kumar, G., (2020) ‘Impact of trust and privacy concerns on technology acceptance in healthcare: an Indian perspective’, International journal of medical informatics, vol. 141, p.104164. DOI: https://doi.org/10.1016%2Fj.ijmedinf.2020.104164
Doolani, S., Wessels, C., Kanal, V., Sevastopoulos, C., Jaiswal, A., Nambiappan, H. & Makedon, F., (2020) ‘A review of extended reality (xr) technologies for manufacturing training’, Technologies, vol. 8, no. 4, p.77. DOI:10.3390/technologies8040077
Gil-Gomez, H., Guerola-Navarro, V., Oltra-Badenes, R. & Lozano-Quilis, J.A., (2020) ‘Customer relationship management: digital transformation and sustainable business model innovation’, Economic research-Ekonomska istraživanja, vol. 33, No. 1, pp.2733-2750. DOI: https://doi.org/10.1080/1331677X.2019.1676283
Habib, M.N., Jamal, W., Khalil, U. & Khan, Z., (2021) ‘Transforming universities in interactive digital platform: case of city university of science and information technology’, Education and Information Technologies, vol. 26, pp.517-541. DOI: https://doi.org/10.1007/s10639-020-10237-w
Jain, N. (2023) Sources of data collection, GeeksforGeeks. <https://www.geeksforgeeks.org/sources-of-data-collection/> (Accessed: 29 July 2023).
Khera, O. (2022) Illustration of the technology acceptance model (TAM). <https://www.researchgate.net/figure/Illustration-of-the-Technology-Acceptance-Model-TAM_ fig1_228631114> (Accessed: 23 November 2023).
Koifman, S. (2023) 9 common it problems for businesses (and how to solve them), DistantJob. <https://distantjob.com/blog/it-problems/> (Accessed: 23 November 2023).
Lochmiller, C.R., (2021). Conducting Thematic Analysis with Qualitative Data. Qualitative Report, vol. 26, no. 6. DOI: https://doi.org/10.46743/2160-3715/2021.5008
Makri, C. & Neely, A., (2021) ‘Grounded theory: A guide for exploratory studies in management research’, International Journal of Qualitative Methods, vol. 20, p.16094069211013654. DOI: https://doi.org/10.1177/16094069211013654
Nikolopoulou, K. (2023) What is convenience sampling?: Definition & examples, Scribbr. < https://www.scribbr.com/methodology/convenience-sampling/> (Accessed: 29
Poudel, K. (2022) 13 challenges faced by customers and clients in IT industry, The Dev Post. <https://thedevpost.com/blog/challenges-faced-by-customers-it-industry/> (Accessed: 23 November 2023).
Rafique, H., Almagrabi, A.O., Shamim, A., Anwar, F. & Bashir, A.K., (2020) ‘Investigating the acceptance of mobile library applications with an extended technology acceptance model (TAM)’, Computers & Education, vol. 145, p.103732. DOI: https://doi.org/10.1016/j.compedu.2019.103732
Saeidi, P., Saeidi, S.P., Sofian, S., Saeidi, S.P., Nilashi, M.& Mardani, A., (2019) ‘The impact of enterprise risk management on competitive advantage by moderating role of information technology’, Computer standards & interfaces, vol. 63, pp.67-82. DOI: https://doi.org/10.1016/j.csi.2018.11.009
Shanmugarasa, Y., Paik, H.Y., Kanhere, S.S. & Zhu, L., (2023) ‘A systematic review of federated learning from clients’ perspective: challenges and solutions’, Artificial Intelligence Review, pp.1-55. DOI: https://doi.org/10.1007/s10462-023-10563-8
Statista (2022) Customer experience: Biggest challenges U.S. 2018, Statista. <https://www.statista.com/statistics/916545/customer-experience-biggest-challenges-us/>(Accessed: 23 November 2023).
Suri, H. (2020) ‘Ethical considerations of conducting systematic reviews in educational research’, Systematic reviews in educational research: Methodology, perspectives and application, pp. 41-54. DOI: https://doi.org/10.1007/978-3-658-27602-7_3
Walter, D. & Ophir, Y., (2019). News frame analysis: An inductive mixed-method computational approach. Communication Methods and Measures, vol. 13, no. 4, pp.248-266. DOI: https://doi.org/10.1080/19312458.2019.1639145