Saturday, June 8, 2019

Preparing to Conduct Business Research Essay Example | Topics and Well Written Essays - 750 words

Preparing to Conduct Business Research - Essay ExampleIdentity theft as Sennewald & Christman (2008) assert, occurs when an individual uses former(a) individuals information or personal details as his/her own in order to engage in fraudulent activities or other crimes. The growth of identity theft affects the retail world immensely.The issue of retail identity theft can be solved through an exploratory interrogation. The action of both qualitative and quantitative research designs would ascertain a highly credible, precise, and accurate research. The designs will explore the topic from different points of reference through the finish of different methods. The application of a single research design, whether the qualitative research design or the quantitative design would lead to inefficiency in the determination of the serious-mindedness of the issue, and the probable solution. On the one hand, using the quantitative research design will lead to a high degree accuracy in the qua ntification of retail identity theft. The research method will make it possible to collect measurable data, which through numerical comparisons, will be analysed and presented through easy to view methods. In addition, the application of the quantitative method will be of great importance in reporting the collected data since it applies standard statistical analyses, which ar comprehensible and understandable (McLeod, 2008).On the other hand, the incorporation of the qualitative method during the conduction of the research will enhance the effectiveness of the study through the proceeds of the accuracy of the results. The qualitative research design will focus on the identification of the motives, the driving forces, and the triggers of the behaviour. In addition, the design will enhance the credibility of the research through the incorporation of a participant observation techniques, interviews with victims of identity theft, and reformed identity thieves among other methods. Th rough these methods, the research will possibly

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.