Sample IT-Web Research Paper on Research Design

Research Design

Introduction

The purpose of this research is to ascertain drone safety measures and its threats to human life. This is because of the fact that the world has experienced increased use of the drone technology and vehicles in the recent past. This section deals with research questions, identification, and operation of variables, data collection, summary and limitation of research study.

Research questions

The research questions to be used for this research include:

  1. What are the countermeasures put into place to prevent drone accidents?
  2. How can manufacturers help in improving the integrity of the systems and components of the drones?
  3. Are the rules and regulation in place able to control this sector?

Hypothesis

Management of this industry is left solely on the hand of federal aviation administration (Wharton, Dyer & Huang, 2010). Data will be collected and analyzed through qualitative techniques. Variables in this case include cybercrimes, drone technology, drone laws and regulation and government intervention. The hypothesis study focuses on the countermeasures adopted in this industry. This helps determine the strategies to be taken by manufacturers in upgrading drone systems.

H1: measure adopted to deal with emergency situations is not adequate.

H0: Manufacturer’s faults increases accidents of drone vehicles which is at rise.

H2: laws governing drone industry are short of addressing emerging issues.

Secondary sources of information such as government websites will be applied in order to arrive at a definite solution.

Identification and Operationalization of Variables

            The major causes of accidents are cybercrimes, in appropriate laws, manufacturers default techniques and in valid countermeasures. The relationship between inadequate laws directly affects the safety measures. The relationship between cybercrime and security breaches is used to show the effect of criminal acts to human life. Using a comparative analysis of cybercrime and manufacturers default mechanisms shows the inefficient service delivery of the designated regulatory bodies. The answers to these questions are featured and addressed in totality in different section. The H1 and H2 variables are directly related to accidents while H2 variables derive at a comparative analysis because their associations to accidents are indirect.

Research Design

This research uses both qualitative and quantitative research design. Therefore, the use of online surveys and one on one interview will help come up with a formidable solution to be applied in this sector. Qualitative data to be looked for includes the number of accidents, safety measures and public safety policies developed by the governing body. On the other hand, quantitative data that is inform of statistic focuses on the cybercrime and security threats faced by the public through the use of drone technology (United States & United States, 2015).

Data Collection Methods

An interview will be conducted featuring ten members of the federal aviation administration (FAA) and ten randomly selected members of the public (Rothman, 2010). It also involves the use of government statistic in determining venerability and measures instituted in this section of the economy. Online survey with prominent security personnel’s and experts will enhance the authenticity of the study (Som, 2012). The selected personnel will be emailed the survey question where they will respond by answering the underlying questions.

Sampling Techniques

Random sampling will be applied for the study in selecting the participants. Participants will respond to a number of questions given by the interviewer. The security of personal information will be kept safely and handled in highest esteem (Rogers & Donnelly, 2011). Online survey with experts will aid generate expert’s opinion on the same topic. Twenty-five participants coming from different sections in the society will be involved in the study. They include ten FAA officers, ten community members and five security officers (Rogers & Hill, 2013).

Summary

Data gathered from various sources will be integrated together with information from secondary sources such as government websites and researchers observation to derive at a formal conclusion. Therefore, cybercrime and safety measures developed and adopted will be analyzed accordingly (Manku, Rajagopalan & Lindsay, 2010).

Limitation of the Study

There are a number of limitations attributed to the research design used for this particular study. The first limitation is that the number of cybercrime that affects drone technology is unknown(Koeniger, Koeniger, Tingek & Phiancharoen, 2012). The reason behind this is that government has a record of only those crimes committed and intervened successfully. Numerous crimes go unnoticed underneath the online platforms. This makes the figures provided or featured in government websites anonymous (Collard, 2013). In addition, crimes are different in the sense that cybercrime is a broad topic for analyzing online crimes. Moreover, lack of adequate information about drone technology amongst the members of the public makes it difficult to implement the laws. It infers that the management of drone vehicles is poorly done and lacks proper monitoring system (Ceva, 2014). Some of the accidents that take place in the world are not featured in government records.

References

Ceva, J. (2014). Hughes aircraft’s architectural design of the federal aviation administration wide-area augmentation system: An international system. Acta Astronautica, 22(1), 123-140. doi:10.1016/S0094-5765(98)00066-6

Collard, S. B. (2013). Technology forces: Drones and war machines. Vero Beach, FL: Rourke Educational Media.

Koeniger, G., Koeniger, N., Tingek, S., & Phiancharoen, M. (2012). Variance in spermatozoa number among Apis dorsata drones and among Apis mellifera drones. Apidologie, 11(3), 230-250. doi:10.1051/apido:2005009

Manku, G. S., Rajagopalan, S., & Lindsay, B. G. (2010). Random Sampling Techniques for Space Efficient Online Computation of Order Statistics of Large Datasets.Sigmod Record, 23(2), 231-241. doi:10.1145/304182.304204

Rogers, A., & Hill, J. (2013). Unmanned: Drone warfare and global security. London: Pluto Press.

Rogers, D. F., & Donnelly, L. E. (2011). Human airway inflammation: Sampling techniques and analytical protocols. Totowa, NJ: Humana.

Rothman, S. R. (2010). Federal Aviation Administration airspace redesign and congestion management. New York: Nova Science Publishers.

Som, R. K. (2012). A manual of sampling techniques. London: Heinemann Educational.

United States, & United States. (2015). Federal Aviation Administration airworthiness directives. Oklahoma City, OK: U.S. Dept. of Transportation, Federal Aviation Administration, Regulatory Support Division, Delegation and Airworthiness Programs Branch.

Wharton, K. E., Dyer, F. C., & Huang, Z. Y. (2010). The honeybee queen influences the regulation of colony drone production. Behavioral Ecology, 11(3), 110-128. doi:10.1093/beheco/arm086