Principal Investigator:
Prem chander Boinapally
Study:
Adult and Continuing Education and Teaching
APPLICATION FOR APPROVAL OF RESEARCH
Institutional Review Board
Principal Investigator
Principal Investigator:
a. Full name:
Prem chander Boinapally
b. University department, program, and position:
Education/Student
c. Email address:
Prem.boinapally@student.judsonu.edu
d. Phone number:
510-556-7011
Co-Principal Investigator (if applicable):
a. Full name:
b. University department, program, and position:
c. Email address:
d. Phone number:
Person completing this application (if not PI):
Full name:
Email address:
Phone number:
If the PI is a student, the supervising professor or academic advisor:
Full name:
Dr. Olabisi Adenekan
Email address:
olabisi.adenekan@judsonu.edu
Phone number:
Has this study been approved by a committee?
Yes
X
No
Submission Category (please check one):
Exempt – no human subjects involved
X
Expedite – minimal risk to human subjects
Full Review – moderate to high risk to human subjects
Publication Audience:
Internal – research intended for teaching purposes only within courses at Judson University.
X
Public – research may be published outside of Judson University.
Research Study Identification and Overview
Title of study:
Cyber Security
Full description of the research, its objectives, methods, and what subjects will be asked to do.
Our dependency on the internet has become immense. It is wrong to assume one’s safety in the sense that only big organizations are more susceptible to hackers. A normal consumer connected to the internet if not vigilant enough is at the risk of getting trapped easily. Cyber infiltrators have developed many ways of hacking into systems. In this day and era, cyber security helps maintain order, and keep the internet safe for users. The current digital era has influenced change in the ways we buy things, bills get paid, watch movies, how people pay mortgages and rent houses just to mention but a few. Incidents of security breaches are widely reported as well as fraud, malicious cyber-attacks, fraud, hacking, and cyber-bullying making it necessary for the need of cyber security.
This research will use the qualitative research method. Data will be collected and analyzed. Non-numerical data will be used to help gather deeper insights into the problem to help generate new ideas. The intention is to investigate cyber security and find out possible measures put in place to be secure against threats, investigate the measures organization put in place and adopt for safety, and to find out what measures individuals and organizations should take to protect themselves. Deceptive practices will be avoided when designing the research at any time. The participants will remain anonymous and confidentiality will be upheld more concerning their identity and information they shared. Experts, and affected members that members who have suffered a cyber-attack were the targeted audience for survey. Measures have been adopted to avoid any kind of bias by making sure that the surveyors understand stereotyping more so as the foundation of bias and avoid it. Leaders are made responsible for transparent conducting of surveys where realistic expectations are set outlining clear criteria for the evaluation process of qualification and performance. Bias training to the surveyors was conducted and a means of making complaints from the targeted audience was set through way of email. Experts and cyber-attack victims being surveyed won’t be interviewed together. The victims will be interviewed together with other victims as these will be done in order to try and bring a safe space with commonality amongst the victims which will in turn enhance the information collection. I will travel to all four geographical locations to meet participants at their local geographical locations in order to attain efficiency as it would be hard for the participants to attend a synchronized meeting out of their local geographical locations. Data collected upon finalizing of the survey will be burnt.
Focus group participants: Focus group meetings will be held in two distinct manners one through the phone and the other through face-to-face surveys. The focus will provide helpful insights in the research as there is multiple interaction, not only between the interviewee and participants, but among the participants themselves. Two rounds of face to face and physical focus group meetings were conducted with different groups. These focus groups consisted of 5-7 people including minors and their guardians. Victims and experts will not be in the same focus groups. Experts will interviewed separately with the data collected from the concluded focus group meetings. Data from network administrators is also reported. During the first focus group meeting participants were on the different way hackers get access to their networks and the different types of malwares. For the second focus group we gave data analysis of the first group and tried to reach a consensus of the most important deviations of the security rules. The focus that was conducted over the phone consisted of 5-7 members and lasted about one and a half hours. Minors were not part of these online focus group meetings as well as their guardians. The focus groups were audio taped and the audio tapes transcribed in anonymized text files. Adults with minors will be asked whether;
Online safety should be formalized within the education system?
Who should have the main responsibility for cyber safety?
What the main concern as a parent in relation to the children being online?
What challenges parents face in protecting their children?
What education should be given to parents?
What unique challenges are posed by cyber-bullying for parents, and what can be done for parents to monitor the children’s online activity?
Analysis: The analysis of qualitative data is an iterative process. The coding of data comes first to determine major categories fit into different categories. Interpreting of qualitative data is highly subjective and procedures have to be developed to establish inter reliability. Two coders were used to code the data. They agreed to different categories and reached a consensus of how the data fitted into the main categories. After consensus, their solutions, and the data on which they were based, they were presented to another researcher. Based on the feedback of the other researcher changes were made of how the data fitted into the main categories. The same process continued and only after the three researchers came to a consensus about the right interpretation of the qualitative data, the solutions were accepted.
Participation requirement: Subjects are asked to provide honest information for the survey. Participants will answer questions and provide insight on different questions asked. Minors involved will be required to ask for consent from their guardians where guardians will have to sign a formal consent form indicating that they agreed to the survey. The guardians will have to stay with the minors throughout the survey. All participants will converse in English.
Group Component: groups will have 6-7 members brought together by a common characteristic.
Meeting Preparation: Participants will be notified through emails of relevant information pertaining meetings especially. The participants will meet in meeting rooms, churches, classrooms more so after class activities have come to attend mostly in the evenings, where meetings will be held in backrooms in order to maintain confidentiality.
Working logistics: each focus group members will determine accordingly to responses from the survey logistics. After meeting for one and a half hours, for two meetings, each group will be discontinued.
Focus Group Meetings: A sign sheet will be provided for each meeting day to allow for the documentation of participants present. Only the initials and numbers assigned with every initial of the members names will be on the sign sheet. Name tags with initials and numbers will be given for easy identification. Relevant information will be communicated while making sure that the participants agree with the confidentiality agreement. The researcher will be the moderator and will take notes during the meeting. Different meetings will have different agendas.
Dates for conducting study:
This study will take place between February and July 2022.
General logistics; survey distribution, identifying participants will take place between February and March 2022.
Focus group meeting will be done between April and May 2022.
Transcription and coding will be done between April and July 2022.
Site(s) of study:
The data to be collected will be collected from the following geographical areas:
Washington D.C area location.
Colorado Springs area location.
Albuquerque area location.
New York area location
Description of the population/subjects participating in the research study, recruitment of the subjects, and the criteria for inclusion as a participant of the study.
The participants for this study will be of all ages and categorized as either an expert or a victim.
The involvement selection process will be based on availability and willingness of the participants.
A follow up survey will be conducted to people available and willing to participate in the research.
Participant for this research study will be drawn from the mentioned geographical place above. Washington D.C will get higher popularity than the rest. Participants will be of mixed ages and gender. Participants who are victims take precedence as they provide insights of value to the research topic. For easier communication, participants will be able to converse in English. Participants will be of 5-7 participants who will be categorized by the geographical region they are in.
Identification of special subjects/ populations, if any, such as children and minors, pregnant women, cognitively-impaired persons, prisoners, traumatized and comatose patients, terminally ill persons, elderly, minorities.
The research will be open to all ages and races with exception to children who need a guardian’s consent. The consent will be in writing signed executed by the guardians.
Full description of provisions to care for subjects where there is risk of physical or emotional research-related harm.
When interviewing the victims, I’ll make sure they are in a safe space physically and psychologically to talk about how cyber security breach affected them.
Description of confidentiality provisions and measures to protect the identity and privacy of subjects.
Any information given by participants is confidential and he or she won’t be exposed. Both during and after research anonymity is paramount and will be guaranteed. Hard copies and electronic ways will be used to store data. The audios will be transcribed by the researcher and the hard copies locked away in the cabinet. Only the research team will have access.
Description of obtaining consent from subjects and, if the subjects are minors, obtaining consent from the child’s legal guardian.
Any participating minor ought to have consent from their parents or legal guardian.
Risk Assessment scores (taken from the Risk Assessment form).
No Risk: 2 Minimum Risk: 4 Moderate Risk: 6 High Risk: 1
As principal investigator, I assure that the information provided is correct, that I will seek Judson University IRB approval for any substantive modifications in the research study, and that I will report to the IRB Chair promptly any incidents or anticipated problems that may occur during the course of the study that may affect subjects adversely or change the risks and benefits described.
Signature of principal investigator __________________________
Date of signature _____________________________
If the PI is a student:
Signature of supervising professor:
Date of signature: February 7, 2022
Email the following documents to irbchair@judsonu.edu
This application saved as 1 Lastname IRB application
Study proposal (if applicable) saved as 2 Lastname Proposal
Completion certificate of ethics training saved as 3 Lastname Certificate
Risk Assessment form saved as 4 Lastname Risk Assessment
Instruments used in the study saved as 5 Lastname Instrument Name (repeat for additional instruments)
Consent forms sent as WORD DOCUMENTS and saved as 6 Lastname Parent Consent, 6 Lastname Student Consent, 6 Lastname School Consent, as necessary
This study has been approved by Judson University’s Institutional Review Board.
Signature of IRB Chair ___________________________________
Date of signature ______________________________
1
5
The post Principal Investigator: Prem chander Boinapally Study: Adult and Continuing Education and Teaching appeared first on PapersSpot.