(This paper was prepared by Discussion Board Homework Help)
When developing the research questions, it is prudent to have already established the case to be analyzed. Despite the simplicity of the statement, determining the best-case study for a study is an enormous and difficult task for all manner of researchers. To properly select a case study, researchers should as themselves different questions: such as is the analysis based on a person, a program, or a process? Secondly, is the analysis based on different organizations, or is it based on a single organization and applicable to many different organizations? (Harrison et al., 2017) A discussion on these simple questions is imperative as it will help the team to narrow down the list of case studies.
After determining what the case study entails, the researcher(s) must be keen on establishing what their case study should not be about. It may seem like a trivial affair, but many studies are foiled by broad topics that cannot be sufficiently explored. When a study has too many objectives, it becomes diluted, and this affects its overall objectivity. It is an easy problem to solve, especially through the development of boundaries to prevent the explosion of the scope. Binding a case can be done in a variety of ways, such as; through time and space, definition and context, and time and activity (Quinlan et al., 2019). For instance, within this study, the case will be bound around the definition and context. Here, the study will review the social engineering attacks, the susceptibility of such attacks, and the different approaches to prevent such attacks within the context of a healthcare organization.
Designing the Case Study
There are five critical components in the designing of case study research: the study’s questions, propositions, unit(s) of analysis, logical relationships between the propositions, and the data findings interpretation criteria (Harrison et al., 2017). It is also crucial to have a theory and determine whether the purpose of the study is to develop or test the theory. Undertaking case study research can be done in two phases. The first can be open-ended, especially if there is a wealth of extant literature concerning the phenomenon under investigation. The next phase entails the refining of the review and the exploratory study to ensure that the identified issues are explored in-depth (Algozzine & Hancock, 2016). This ensures that the study becomes more and more focused and refined.
The development of the theory helps researcher(s) in the specification of the data collection methods and determining the different levels of generalization of the case study findings. There are two main levels of generalization: the statistical generalization and the analytical generalization (Tetnowski, 2015). Another essential thing to consider regarding the designing of case studies is ensuring that the research design is of the highest quality possible. There are four fundamental tests used to determine the quality of research: the validity of the construct, internal validity, external validity, and reliability of the findings (Quinlan et al., 2019).
Executing Case Study Research
After proper designing and planning, the next stage is conducting the case study research. There are three main steps to conduction case study research: evidence collection, analyzing the evidence, and reporting the case studies. There are six main sources for case study evidence: physical artifacts, interviews, participant-observations, archived records, documents, and direct observations (Hyett, Kenny, & Dickson-Swift, 2014). The more the information sources used, the stronger the case study. During the collection of data/evidence, it is essential for the development of a database to help in the proper maintenance of a chain of evidence.
Data collection and analysis are iterative processes that complement each other. During the analysis phase, the data is described and categorized. Under analysis, the data is examined against the objectives to determine how they fit or do not fit into the categories. The patterns are then explored to determine the relationships between different aspects of the study. There are five main techniques of analyzing case studies; matching patterns, building explanations, analyzing the time series, evaluating the logic models, and cross-case analysis (Harrison et al., 2017). The final aspect entails the presentation of the case study’s findings from the analysis stage.
The qualitative case study methodology is the best approach for this research as it allows the researcher(s) to explore the problem from different perspectives. The methodology is further strengthened by the data collection methods chosen and the use of a real-world case study
Technology has permeated almost all sectors of the economy from the manufacturing, transport, service, and now healthcare has come to be on the verge of adapting cutting-edge technology for more patient care. The healthcare industry is seen to account for an estimated 25% of the country’s expenditure from the insurance organizations, pharmaceutical companies, and healthcare providers among other organizations. It is essential to note that technology has tremendous benefits and applications within the healthcare industry (Wager, lee, & Glaser, 2017). The first thing to note is that technology was created with the singular focus of improving human life and interactions. However, trends in technology are accompanied with numerous security vulnerabilities that can be exploited. Furthermore, in a health information system or any other information system, the most important assets are the data and integrity of the internal processes.
There are different sources of security vulnerabilities and security vulnerabilities in an IT system (Metalidou et al., 2014). Additional studies indicate that malicious insiders and human error as seen as the top two causes of cyber security threats at 30% and 25% respectively (Pandey & Misra, 2016). Further studies show that the vast majority of employees have little to no awareness of their roles in the prevention of security threats. Best practices in the use of information systems is seen to only be practices by a few people. It is because of this that attackers have sought to pursue social engineering as a way of using unknowing system users to attack an information system (Alderwood & Skinner, 2019). Therefore, in response to this, it is increasingly important that system administrators pursue a policy where there are strict guidelines and measured put in place to ensure that all system users understand their role and the associated security risks (Ghafir et al., 2018).