Based on guidance given in the 4 information sessions at the end of Trimester 3, advice from your Principal Supervisor as required, your own indepen
ASSESSMENT TASK
Based on guidance given in the 4 information sessions at the end of Trimester 3, advice from your Principal Supervisor as required, your own independent research and all the information and criteria presented in Canvas, prepare a report of your Applied Project for assessment.
Key requirements:
Minimum 15,000 words, maximum 17,000 words
Correct, clear and comprehensible English
Accurately referenced using the APA 7th referencing system
Suggested structure as follows:
Executive Summary (can also be called "Abstract")
Chapter 1: Introduction
Chapter 2: Literature Review
Chapter 3:Methodology
Chapter 4: Findings/Results and Discussion
Chapter 5: Conclusions; Recommendations (if relevant) or Future Directions
References
Appendices
View Rubric
RESEARCH METHODS
Paper code: MBI2308- 8542
Assignment: Research Proposal
Name: Vanrajsinh Bhadola
Student I.D:101645
EXAMINING USERS PERCEPTION ON THE EFFECTIVENESS OF
FOG CANNON SECURITY ALARM APPLICATIONS IN NEW ZEALAND
Table of Contents
TOC o "1-3" h z u 1.Introduction: PAGEREF _Toc150930884 h 32.Background: PAGEREF _Toc150930885 h 32.1Problem Statement PAGEREF _Toc150930886 h 32.2Research objectives PAGEREF _Toc150930887 h 42.3Research questions PAGEREF _Toc150930888 h 42.4Significance of this study PAGEREF _Toc150930889 h 53.Literature Review and Hypotheses Formulation: PAGEREF _Toc150930890 h 53.1Research Model - Technology Acceptance Model (TAM) PAGEREF _Toc150930891 h 53.2Literature review and Hypothesis development PAGEREF _Toc150930892 h 54.Research Methodology: PAGEREF _Toc150930893 h 64.1Research philosophy PAGEREF _Toc150930894 h 74.2Approach to theory development PAGEREF _Toc150930895 h 74.3Methodological choice PAGEREF _Toc150930896 h 84.4Research strategy PAGEREF _Toc150930897 h 84.5Time horizon PAGEREF _Toc150930898 h 95.Data Collection: PAGEREF _Toc150930899 h 95.1Type of data PAGEREF _Toc150930900 h 95.2Population PAGEREF _Toc150930901 h 105.3Sampling frame PAGEREF _Toc150930902 h 105.4Sampling technique PAGEREF _Toc150930903 h 105.5Sample size PAGEREF _Toc150930904 h 105.6Management of low response rates PAGEREF _Toc150930905 h 115.7Data analysis PAGEREF _Toc150930906 h 115.8Ethical considerations PAGEREF _Toc150930907 h 125.9Timescale PAGEREF _Toc150930908 h 125.10Resources PAGEREF _Toc150930909 h 126.References: PAGEREF _Toc150930910 h 137.Appendix-1: PAGEREF _Toc150930911 h 15
Introduction:Concerns about property and personal security are most important at a time of growing digitalization and the widespread use of smart gadgets. A commonplace feature of our everyday lives is the usage of security alarm applications, as more and more people and businesses rely on digital solutions to protect their assets. These applications have the potential to be extremely important in safeguarding both private and public areas since they are made to improve security protocols and offer prompt notifications in the case of unauthorized entry or security breaches. The degree to which these applications for security alarm successfully satisfy consumers' requirements and expectations is still up for debate.
The purpose of this research is to examine and analyze users experiences with security alarm solution applications in New Zealand, mainly focused on how they are using it in conjunction with fog cannons. Independent and dependent variables in this research are users experience and fog cannon security alarm application respectively.
Background:Security issues play a major role in our daily lives. People and organizations are always looking for better security solutions, whether they are safeguarding industrial sites, commercial buildings, or private properties. The employment of fog cannons, a very successful and non-lethal security device, is one of the most recent developments in this field, especially in New Zealand. When activated, these gadgets release dense fog that obstructs vision and confuses burglars, so obstructing unwanted entry and robberies (Morgan, 2022). However, prompt activation is crucial to the effectiveness of fog cannons, which is where security alarm solution applications come into picture.
With the help of security alarm applications, customer can remotely operate their security systems and get real-time notifications when they install fog cannons and other security equipment. Security technology now includes mobile applications that allow users to control (arm & disarm) and monitor their security systems. The key investigation of this study is if the security alarm applications successfully achieve their specified goals, guaranteeing both user perception and the general security of the user's surroundings. In New Zealand, the market for fog cannons is growing, and security systems are integrating these apps more and more, therefore it's critical to understand these apps' efficiency and user experience.
Problem Statement
One issue is that there isnt enough thorough study on how these security alarm solution applications affect users' experiences, especially when it comes to fog cannons. To find out if these apps are fulfilling users' demands and expectations, it is crucial to comprehend their viewpoints and experiences. In order to optimize these apps and offer improved security, developers, security experts, and lawmakers must also pinpoint areas that require improvement.
A thorough research of user experiences and perception with security alarm apps utilizing fog cannons is desperately needed. Hence, in order to close the gap between technical innovation and user perception and eventually provide more efficient and user-centric security solutions in a constantly changing security landscape, this study aims to find out interfaces, preferences, and problems of users in New Zealand.
Research objectives
In the context of fog cannons, the research objectives seek to thoroughly examine users' experiences and interactions with security alarm apps, provide understandings that can lead to improvements in user knowledge and technology.
The research objectives are:
To assess the user perception with apps when combined with fog cannons.
To assess users experience about the use of apps in terms of timely notifications, user control, and fog cannon integration.
To investigate how users engage with applications for activities like arming, disarming, and monitoring on the installed fog cannons.
To determine the difficulties, problems, and worries users have when utilizing these apps and to highlight the areas that need to be improved.
Research questionsIn order to get important understanding into user requirements and areas for development, the following research questions will support in investigating users' viewpoints, experiences, and perception with security alarm solution apps in the context of fog cannons.
What are the specific features and functionalities of fog cannon apps that users find most valuable and effective?
How do users interact with fog cannon apps, including tasks like arming, disarming, and monitoring security systems, and what are their experiences during these interactions?
How satisfied are users with the performance of security alarm solution applications when integrated with fog cannons?
What challenges do users face when using fog cannon apps, and how do these challenges impact their overall experience?
Do users trust and have confidence in the ability of fog cannon apps to protect their premises?
This study will offer a concise summary of the present state of concerns and will be conducted over a 16-week period. The drawback is that, while it may not offer a comprehensive understanding of the subject, this shorter study might though produce valuable information for preliminary explanations.
Significance of this studyThis study will fill a vital gap in the field of security technologies, which makes it extremely important. More efficient and user-friendly security solutions may result from this research's understanding and users experience. By enhancing the general safety and effectiveness of security measures, the findings will have wide-ranging implications for users, app developers, policymakers, and the general public. The value of this study essentially positioned on its ability to improve the efficiency and usability of fog cannon apps.
Literature Review and Hypotheses Formulation:The purpose of the literature review is to place the research study within a more comprehensive theoretical framework. Better comprehension of the relationship between this study and other past research on the same topic is the goal. The literature review guides the investigation into specific ideas and aids in the formulation of the research questions. These ideas also suggest a specific method for gathering information, formulating a plan, and performing research.
Research Model - Technology Acceptance Model (TAM)The Diffusion of Innovation (DOI), the Unified Theory of Acceptance and Use of Technology (UTAUT), the Model of Adoption of Technology in Households (MATH), and the Technology Acceptance Model (TAM) are a few well-known and frequently used information technology (IT) models used to understand the adoption and utilization of new technological innovations. The Technology Acceptance Model (TAM) is an information system theory that outlines steps that information searchers or learners should take to accept, apply, and use new technology in order to develop information literacy abilities. The model highlighted perceived utility and perceived ease of use as two important factors influencing system use behavior (Davis, 1989). The TAM will be used as a research model in this research study to analyze and clarify how the considered variables are applied to users of the fog cannon app.
Literature review and Hypothesis developmentThe literature consistently supports the assumption that ease of use is a crucial factor influencing users' experiences with mobile applications (Hajiheydari, & Ashkani, 2018). The correlation between ease of use, positive emotions, user satisfaction, self-efficacy, and perceived usefulness strengthens the argument that fog cannon apps designed for ease of use are more likely to be adopted by users. The literature suggests that when users find mobile apps less confusing and easy to use, they are more inclined to use them frequently (Malik et al., 2017; Lwoga & Lwoga, 2017). Therefore, based on the reviewed literature, it can be confidently conclude that there is a positive correlation between ease of use and user adoption intention for apps which will support the below hypothesis:
H1: Users' opinion about the ease of use of fog cannon apps and its impact on their level of perception with the technology.
Considering the literature, it is grounded in the understanding that users' satisfaction and intention to use are influenced by their perception of the usefulness of the system (Tam et al., 2020). However, it's acknowledged that the relationship between perceived usefulness and user satisfaction might vary based on different contexts, as indicated by some studies with opposing results (Rafique et al., 2020; Isaac et al., 2018). So the next hypothesis can be made which emphasizes the importance of perceived usefulness and user confirmation in shaping users' opinions on the effectiveness of apps, especially concerning system performance and reliability, which is as follows:
H2: Users' opinion on the effectiveness of fog cannon apps due to system performance and reliability including the promptness and accuracy of alerts and messages.
Effective IT training enhances users' conceptual and procedural knowledge, leading to positive attitudes and acceptance of the technology (Xia & Lee, 2000). Intrinsic factors such as computer self-efficacy and extrinsic factors like technical support play pivotal roles in influencing users' acceptance of technology (Snchez & Hueros, 2010). Moreover, training sessions provide users with realistic and stable perceptions, emphasizing the importance of hands-on experience in shaping positive user attitudes (Lee & Xia, 2011). Therefore, it suggests that the quality of user education and training is a critical determinant of users' general perception with apps, impacting their attitudes and acceptance. Hence our next hypothesis shall be as follows:
H3: Users' general perception with fog cannon apps can be affected by the quality of user education and trainings that are offered.
Research Methodology:Research methodology refers to a systematic strategy that facilitates the planning, execution, collection, analysis, and distribution of research findings. The value of research methodology is found in its capacity to study execution, reliability and accurate outcomes (Saunders et al., 2019).
The research design tool proposed by Saunders et al. (2016) is a very useful tool which helps to organize the research and develop research design following the layers of the research onion step by step. It starts with broad ideas and moves on to more focused ones. Philosophical presumptions, plans, decisions, timelines, data gathering methods, and analytic procedures are among the levels. By moving up through these levels, the study can be improved and done in a more methodical manner. The Research Onion, which stands for the several decision-making layers that will help to use a technique, aids in the creation and organization of research plans (Saunders et al., 2019).
Research philosophy
Research philosophy is the collection of ideas, precepts, and way of thinking that guides in planning and work style, affects choice of topics, and profoundly shapes perspective in general (Saunders et al., 2019). A number of different philosophies can be used to approach research, including:
Positivism: Focus on using tangible, verifiable facts (Saunders et al., 2019).
Interpretivism: Aims to grasp many viewpoints and understandings by arguing that social issues are complex and situational (Saunders et al., 2019).
Pragmatism: Focus on using the best possible methods and approaches to find solutions to research questions, as well as flexible thinking (Saunders et al., 2019).
Realism: Recognize the presence of an objective reality and the important role that perception and interpretation play in shaping how people see and interpret the world (Saunders et al., 2019).
Idealism: Emphasises on the study of ideas and abstract notions and places value on one-on-one interactions rather than depending solely on tangible proof (Saunders et al., 2019).
Postmodernism: Highlights the importance of language and power relations, questioning established beliefs and elevating underappreciated viewpoints (Saunders et al., 2019).
Using a positivism approach, the primary goal of this study is to collect accurate and quantitative data by acquiring knowledge about the connection between users' experiences and fog cannon applications. By analyzing and precisely quantifying observable aspects, the research aims to produce understandings that are applicable to all situations.
Approach to theory development
A dependable, methodical way to understand and describe topics is one way to go about generating theories. Abductive, inductive, and deductive reasoning are three different approaches that may be used to build theories in philosophy and science; while each approach has its own advantages.
Deductive approach: It starts with a basic hypothesis or notion and looks for particular evidence to support it. It is frequently applied in formal logic and mathematics when making assumptions or observations about these broad concepts (Saunders et al., 2019).
Inductive approach: It starts with particular examples and moves on to more general conclusions. It is frequently applied in scientific research, when evidences are gathered to examine in order to create theories that are grounded on observable patterns or principles (Saunders et al., 2019).
Abductive approach: It is about making assumptions to explain observations, and it frequently calls for original thought to come up with the best explanation. Unlike induction and deduction, it is a more flexible method that doesn't require a rigid sequence (Saunders et al., 2019).
In this study, deductive reasoning will support in creating organized questionnaires and allow for the quantitative evaluation of users' preference, observed usefulness, and other aspects of fog cannon applications. TAM theory based on the gathered facts can be verified or improved upon through the use of deductive reasoning.
Moreover, open-ended survey questions will be used in the research process to collect qualitative data, which can then be analyzed using inductive reasoning. It is possible to identify recurring themes, patterns, and insights from users' experiences by using the inductive approach. These results help in the creation of theoretical frameworks that describe the complexity of how users engage with applications for security alarm when fog cannons are installed.
Methodological choice
The methods used in quantitative and qualitative research vary because they rely on different sources of data. While qualitative research makes use of images, words, sound recordings, or films, quantitative research analyses data using numbers and statistics (Saunders et al., 2019).
Quantitative research: Experiments and surveys frequently carried out with the aid of questionnaires, interviews, or structured observations, are a part of quantitative research. It can also include realist and practical approaches, although it frequently advances positivism, particularly when organized data collecting techniques are used (Saunders et al., 2019).
Qualitative research: By examining people's ideas and points of view, qualitative research employs an empirical method to comprehend the social and personal implications of a subject (Saunders et al., 2019).
Mixed method: A versatile strategy that uses both words and statistics, mixed methods research allows for thorough data collection and comprehension (Saunders et al., 2019).
This research will aim for quantitative method for investigating users' experiences with security alarm solution applications in combination with fog cannons. With this method, numerical data from a sizable user sample is methodically gathered in order to look for patterns and relationships. By using a quantitative method, this research try to find the sensitive information about the viewpoints of users, helping to shape evidence-based suggestions for enhancing the effectiveness and user-friendly fog cannon applications.
Research strategy
A research strategy is an organized method that ties beliefs to the gathering and evaluation of evidence in order to accomplish a certain objective. Experiments, questionnaires, case studies, ethnography, action research, grounded theory, archival and documentary research, and narrative enquiry are a few examples of research strategy. Selecting the best course of action necessitates thorough consideration
and coordination (Saunders et al., 2019).
In this research, survey using open and closed ended questions will help to get measurable understandings of users' perceptions through the systematic gathering of quantitative data. The analysis of numerical data enables the identification of trends and patterns, making it especially useful for evaluating aspects such as perceived efficiency, ease of use, and user perception.
Time horizon
To select between cross-sectional and longitudinal studies, the time dimension is an essential component of study design. Keeping the question narrow and utilizing the information as a foundation for guidance and to make sensible decisions. A number of considerations influence the decision, including the study questions, time limit, and the desire to look at how the issue has changed over time.
Cross-sectional research: Surveys are often used in cross-sectional research. However, they can also employ qualitative or mixed methodologies research techniques (Saunders et al., 2019).
Longitudinal research: Studying the emergence and development of phenomena across time with a focus on particular areas of interest is made possible by longitudinal research. It makes it possible to incorporate long-term components into study, even with constrained time, and it offers untapped data for reevaluation (Saunders et al., 2019).
Since the objective of the research is to effectively capture the present state of users' experiences with security alarm applications utilized for fog cannons, a cross-sectional time horizon is most suited for the research study. Due to the changing nature of technology and user preferences, this method enables a comprehensive and varied knowledge of user views.
Data Collection:Type of dataPrimary and secondary data are the two different categories of data. Primary data gathered via questionnaires will be used in this study. Simple questions with predefined answer options also called close-ended questions and open-ended questions allow the respondents to give an answer that has no predefined answers in the questionnaire (Saunders et al., 2019). Close-ended questions along with open-ended questions will make up the questionnaires to use in the surveys for this research.
In this research, the questionnaires will be used for all respondents. The questions in these questionnaires will be based on the theoretical framework and objectives of the study. The questionnaires will be electronically distributed to respondents. This research instrument is suitable for this research because it will allow getting an in-depth and objective understanding of the users experience and preferences while using fog cannon applications.
Population
The target population for this research comprises New Zealanders with the fog cannon installed in their personal and commercial properties and controlling it through the fog cannon applications.
Sampling frame
A "sample frame" is a set of items or compilation that is used to choose a smaller sample for surveys or research. Because it affects the quality and reliability of the results, the sample frame is essential for drawing statistical conclusions about the entire population and it needs to be precise, current, and appropriate (Saunders et al., 2019).
For this research, the sample frame will consist of users who are using fog cannons application in Auckland and Hamilton region.
Sampling techniqueThere are two main methods of sampling: non-probability sampling, which is a less equal way of selection, and probability sampling, which guarantees a representative and fair selection. Research projects may need a variety of sample selection techniques, and the decisions made in this regard may be impacted to interact with organizations as well as practical concerns (Saunders et al., 2019).
Probability sampling: A complete list of probable candidates is necessary for the approach of probability sampling, which is used to choose subjects or objects for research (Saunders et al., 2019).
Non-Probability sampling: When assembling a thorough inventory is not practical, non-probability sampling is utilized. The group size, level of precision required, and estimate confidence all influence how many samples are needed. The study question and the resources at hand determine the size of the non-probability sample (Saunders et al., 2019).
This research will make use of Non-probability convenience sampling since the participants are chosen according to their availability and desire to participate as per sampling frame.
Sample sizeResearch study findings' validity and clinical applicability are greatly impacted by the sample size, one of the key components of research design. To ensure that research resources are used effectively and morally, it is important to precisely determine the sample size needed to get a result that is both clinically and statistically significant (Saunders et al., 2019; Burmeister & Aitken, 2012).
The recommended sample size for this research study is at least 385, as determined by statistical approach (online calculator) in order to assure reliable conclusions and minimize mistakes.
Snap: Sample Size Calculation
(https://www.calculator.net/sample-size-calculator.html?type=1&cl=95&ci=5&pp=50&ps=&x=Calculate)
Management of low response ratesIt is possible to overcome low survey response rates by figuring out what causes them, and by using are some strategies like several communication channels (Customized messages, reminders, and extra time), providing incentives, and simplifying surveys it is possible to motivate participation and to manage the low response rate issue (Saunders et al., 2019). For data validity and reliability to be maintained, low response rates must be effectively managed (Sivo et al., 2006). This will improve decision-making and produce more accurate research results.
Reminders can be sent out together with other communication channels like phone calls and emails to increase participation rates.
Data analysisIn order to comprehend important findings, confirm hypotheses, and make defensible conclusions, data analysis is an essential component of research. When analyzing primary or secondary data, it's critical to use the right tools and methods (Saunders et al., 2019).
Understanding and interpreting non-numerical data using techniques like content analysis, theme analysis, and grounded theory are all part of qualitative research data analysis (Saunders et al., 2019).
The first step in quantitative data analysis is data exploration using tables and graphs, which is followed by statistical analysis utilizing a variety of tools (Saunders et al., 2019).
The data for this study will be gathered via questionnaires and then the questionnaire responses will be analyzed using Likert scales, such as strongly agree to strongly disagree for the closed-ended questions and the data gathered from the open-ended questions will be examined using descriptive analysis with the help of softwares like SPSS or Jamovi.
Ethical considerationsConsent from participants, privacy and confidentiality and avoiding discomfort shall all be respected in order to guarantee ethical research. Research methodologies should consider the importance of transparency and respect to ethical principles (Saunders et al., 2019; Govil, 2013). The study can provide important insights without endangering the rights and safety of participants or the organizations involved by giving these ethical issues first priority.
To summarize, ethical research in the context of examining users perception on the effectiveness of fog cannon security alarm applications in New Zealand involves ethical norms, protecting privacy, preserving confidentiality, and respecting informed permission. Research will be done attentively and the proposal will be submitted for ethical review to an ethics committee at ICL for further approvals and permissions.
TimescaleA timeline is essential for efficiently organizing research projects and monitoring advancements. By breaking down work into smaller stages and considering in anticipated completion dates, a detailed timetable facilitates effective project management for research. Since development sometimes takes longer than expected, it is essential to regularly evaluate and record it. Since 1917, a Gantt chart has been used to improve research organization by showing tasks, the timeframes that correspond to them, and the relationships between activities (Saunders et al., 2019).
In this research, a detailed Gantt chart, as presented in Appendix-1, has been produced and will be strictly adhered to in order to prevent slippage in the specified activities and to prevent additional delays in the final report submission.
ResourcesCareful resource planning is necessary to guarantee the feasibility and success of research initiatives which involves travel, lodging, and data gathering equipment. Protecting participant data is essential and frequently necessitates written authorization which needs addition appropriate software and hardware (Saunders et al., 2019).
In order to construct and distribute electronic surveys for this study, online survey tools or software will be used. This will allow for the efficient gathering of data through well-organized questions.
References:Burmeister, E., & Aitken, L. M. (2012). Sample size: How many is enough?.Australian Critical Care,25(4), 271-274. https://doi.org/10.1016/j.aucc.2012.07.002
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology.MIS quarterly, 319-340. https://doi.org/10.2307/249008
Govil, P. (2013). Ethical considerations in educational research.International journal of advancement in education and social sciences,1(2), 17-22.
Hajiheydari, N., & Ashkani, M. (2018). Mobile application user behavior in the developing countries: A survey in Iran.Information Systems,77, 22-33. https://doi.org/10.1016/j.is.2018.05.004
Isaac, O., Abdullah, Z., Ramayah, T., Mutahar, A. M., & Alrajawy, I. (2018). Integrating user satisfaction and performance impact with technology acceptance model (TAM) to examine the internet usage within organizations in Yemen.Asian Journal of Information Technology,17(1), 60-78. https://dx.doi.org/10.36478/ajit.2018.60.78
Lee, G., & Xia, W. (2011). A longitudinal experimental study on the interaction effects of persuasion quality, user training, and first-hand use on user perceptions of new information technology.Information & Management,48(7), 288-295. https://doi.org/10.1016/j.im.2011.09.003
Lwoga, E. T., & Lwoga, N. B. (2017). User acceptance of mobile payment: The effects of usercentric security, system characteristics and gender.The Electronic Journal of Information Systems in Developing Countries,81(1), 1-24. https://doi.org/10.1002/j.1681-4835.2017.tb00595.x
Malik, A., Suresh, S., & Sharma, S. (2017). Factors influencing consumers attitude towards adoption and continuous use of mobile applications: a conceptual model.Procedia computer science,122, 106-113. https://doi.org/10.1016/j.procs.2017.11.348
Morgan, E. (2022). What are fog cannons, how do they work and where do people get them from?. Stuff Limited. https://www.stuff.co.nz/national/300751580/what-are-fog-cannons-how-do-they-work-and-where-do-people-get-them-from
Rafique, H., Almagrabi, A. O., Shamim, A., Anwar, F., & Bashir, A. K. (2020). Investigating the acceptance of mobile library applications with an extended technology acceptance model (TAM).Computers & Education,145, 103732. https://doi.org/10.1016/j.compedu.2019.103732
Snchez, R. A., & Hueros, A. D. (2010). Motivational factors that influence the acceptance of Moodle using TAM.Computers in human behavior,26(6), 1632-1640. https://doi.org/10.1016/j.chb.2010.06.011
Saunders, M., Lewis, P., & Thornhill, A. (2019). Research methods for business students eight edition.QualitativeMarket Research: An International Journal.
Sivo, S. A., Saunders, C., Chang, Q., & Jiang, J. J. (2006). How low should you go? Low response rates and the validity of inference in IS questionnaire research.Journal of the association for information systems,7(1), 17. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1267&context=jais
Tam, C., Santos, D., & Oliveira, T. (2020). Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model.Information Systems Frontiers,22, 243-257. https://doi.org/10.1007/s10796-018-9864-5
Xia, W., & Lee, G. (2000). The influence of persuasion, training, and experience on user perceptions and acceptance of IT innovation. ICIS 2000 Proceedings. 3. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1127&context=icis2000
Appendix-1: