Geofencing Engineering Design and Methodology

Similar documents
CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN

POLICY RESEARCH, ACTION RESEARCH, AND INTERPRETIVE RESEARCH IN INFORMATION SYSTEMS AREAS

Planning of the implementation of public policy: a case study of the Board of Studies, N.S.W.

sdi ontology and implications for research in the developing world

Course Unit Outline 2017/18

Programme Curriculum for Master Programme in Economic History

Realist Synthesis: Building the D&I Evidence Base

Chapter 4. Research Objectives and Hypothesis Formulation

Museums and marketing in an electronic age

A Three Cycle View of Design Science Research

Qualitative data collection, analysis and interpretation in research paradigms: The case of library and information science research

Research & Development (R&D) defined (3 phase process)

Methods for SE Research

Dissertation Proposal: The Impact of Tourism in the Internet. Abstract

Towards a Software Engineering Research Framework: Extending Design Science Research

9 October Opportunities to Promote Data Sharing UCL and the YODA Project. Emma White. Associate Director

Media and Communication (MMC)

Articulating the role of marketing and product innovation capability in export venture performance using ambidexterity and complementarity theory

EIE 528 Power System Operation & Control(2 Units)

The Impact of Education on the Use of ICT by Small and Medium Scale Entrepreneurs in Zaria and Kaduna.

From A Brief History of Urban Computing & Locative Media by Anne Galloway. PhD Dissertation. Sociology & Anthropology. Carleton University

Trends in TA: Contested futures and prospective knowledge assessment

Advanced Research Methodology Design Science. Sjaak Brinkkemper

Information Sociology

Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit

Transferring knowledge from operations to the design and optimization of work systems: bridging the offshore/onshore gap

Grade 8 Pacing and Planning Guide Science

A Cultural Study of a Science Classroom and Graphing Calculator-based Technology Dennis A. Casey Virginia Polytechnic Institute and State University

An Ontology for Modelling Security: The Tropos Approach

STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY

THE AXIOMATIC APPROACH IN THE UNIVERSAL DESIGN THEORY

Information Systems Security and the Structuring of Organisations Maria Karyda 1, Spyros Kokolakis 2 and Evangelos Kiountouzis 1

Consultation on the licensing of spectrum in the 800 MHz and 900 MHz bands

Use of critical meta-theories to inform teaching and learning

Software-Centric and Interaction-Oriented System-on-Chip Verification

; ECONOMIC AND SOCIAL COUNCIL

Issues and Challenges in Coupling Tropos with User-Centred Design

Social Science: Disciplined Study of the Social World

Propagation Modelling White Paper

INNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY

OXNARD COLLEGE ACADEMIC SENATE

Programme Specification

Preservation Costs Survey. Summary of Findings

Incentive Guidelines. Aid for Research and Development Projects (Tax Credit)

Deregulating Futures: The role of spectrum

The aims. An evaluation framework. Evaluation paradigm. User studies

JOHANN CATTY CETIM, 52 Avenue Félix Louat, Senlis Cedex, France. What is the effect of operating conditions on the result of the testing?

APPLICATION FOR APPROVAL OF A IENG EMPLOYER-MANAGED FURTHER LEARNING PROGRAMME

Communication and Culture Concentration 2013

Determinants of E-commerce Adoption. among Malaysian SMEs

Getting the evidence: Using research in policy making

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001

Leibniz Universität Hannover. Masterarbeit

2010 HSC Software Design and Development Marking Guidelines

Design Science Research Methods. Prof. Dr. Roel Wieringa University of Twente, The Netherlands

Methodology for Agent-Oriented Software

Higher National Unit specification: general information

USERS IMPRESSIONISM AND SOFTWARE QUALITY

Case studies on specific organizations will include, but are not limited to, the following elements:

On the Monty Hall Dilemma and Some Related Variations

The Societal Benefits of Spatial Data Infrastructures

Investigate the great variety of body plans and internal structures found in multi cellular organisms.

WG food contact materials

Sustainability Science: It All Depends..

Dr hab. Michał Polasik. Poznań 2016

Argumentative Interactions in Online Asynchronous Communication

Religion Studies Subject Outline Stage 1 and Stage 2

SKILLS FORESIGHT. Systematic involving a welldesigned approach based on a number of phases and using appropriate tools

Eating our own Cooking: Toward a More Rigorous Design Science of Research Methods

the pharmaceutical sector in achieving both its long-term growth objective and the expectation of society.

QUANTITATIVE RESEARCH METHODS FOR POLICY ANALYSIS AND DECISION MAKING

ASSESSMENT OF HOUSING QUALITY IN CONDOMINIUM DEVELOPMENTS IN SRI LANKA: A HOLISTIC APPROACH

AI Principles, Semester 2, Week 1, Lecture 2, Cognitive Science and AI Applications. The Computational and Representational Understanding of Mind

E-commerce Technology Acceptance (ECTA) Framework for SMEs in the Middle East countries with reference to Jordan

Design Science Research and the Grounded Theory Method: Characteristics, Differences, and Complementary Uses 1

Methods and Techniques Used for Statistical Investigation

Symposium 2001/36 20 July English

Investigating LIS Curriculum in both Structure and Content: the PILISSE Model

DESIGN EDUCATION; AT THE CROSS ROADS OF DIFFERENT DISCIPLINES

5th-discipline Digital IQ assessment

COUNTRY: Questionnaire. Contact person: Name: Position: Address:

PoS(ICHEP2016)343. Support for participating in outreach and the benefits of doing so. Speaker. Achintya Rao 1

Innovation Management Processes in SMEs: The New Zealand. Experience

Design Science Research and the Grounded Theory Method: Characteristics, Differences, and Complementary Uses

Comparing the Design Cognition of Concept Design Reviews of Industrial and Mechanical Engineering Designers

TECHNOLOGICAL INNOVATION SYSTEMS FOR DECARBONISATION OF STEEL PRODUCTION

Outline of the lecture

Brief Contents PART 1 FRAMEWORK 1

Guidelines for the Development of Historic Contexts in Wyoming

WELCOME TO LIFE SCIENCES

Virtual Ethnography. Submitted on 1 st of November To: By:

United Nations Statistics Division Programme in Support of the 2020 Round of Population and Housing Censuses

Daniel Lee Kleinman: Impure Cultures University Biology and the World of Commerce. The University of Wisconsin Press, pages.

Professor Harri Haapasalo Department of Industrial Engineering and Management. HOW TO GET A PH.D.: METHODS AND PRACTICAL HINTS Research Approaches

Sales Configurator Information Systems Design Theory

Grades 5 to 8 Manitoba Foundations for Scientific Literacy

SHTG primary submission process

Designing for recovery New challenges for large-scale, complex IT systems

EAB Engineering Accreditation Board

A Theoretical Framework for Supporting The Internationalization of SMEs

Transcription:

Geofencing Engineering Design and Methodology Anthony.C. Ijeh, David.S. Preston, Chris.O. Imafidon, Titus.B. Watmon, Annette.O. Uwaechie, Samuel Ojeme, Benjamin.R. Lucas, Member, IAENG Abstract-The aim of this paper is to evaluate the research methods used in Geofencing Engineering and its associated design and methodology. In so doing the paper will consider the research approaches used by other authors in this field before adopting an approach. Once this is done the author will justify why the selected approach has been adopted and should be used in preference to others. However before this is done it is necessary to restate the variables that are under consideration as the variables that are to be collected decide what kind of method is used and why. It is also necessary to restate the methods used in collecting our data which were by observation in a laboratory and by questionnaire. These two methods of collection are the justification of how we collected our data and why those research methods had to be used. According to social scientists research design is the science and art of planning procedures for conducting studies so as to get the most valid findings as such this paper is key to validating our research findings Index Terms Engineering Design, Theory, Methodology, Research Data, Constructs, Variables, Independent, Dependent I. INTRODUCTION Before we began constructing our research design for our experiment we had determined our research paradigm and chosen our topic. This was because our choice of paradigm would have serious implications on our choice of methodology and also the methods we would use in collecting our data. Our research paradigm also has serious implications on our chosen research problem and research questions, so it was important to get this right, as the whole research would collapse if adequate consideration wasn t given to our choice of paradigm. So in order that we got this right we decided to follow a formal procedure that had been used by so many other researchers so as not to stray off giving adequate Manuscript received (January 1, 2010). This work was supported in part by a grant from the Worshipful Company of Haberdashers UK and the free use of a Location Based Service Laboratory owned by AireTrak Ltd based At Huntingdon in the UK A.C. Ijeh was with RSM Tennon, LLP, UK. He is now with the University of East London, 4 6 University Way, London, E16 2RD, UK (Corresponding authors phone: +44(0)208-223-7778; e-mail: ijehanthony@yahoo.co.uk) D.S. Preston is with the University of East London, 4 6 University Way, London, E16 2RD, UK (e-mail: d.preston@uel.ac.uk) C.O. Imafidon is with the University of East London, 4 6 University Way, London, E16 2RD, UK (e-mail: c.o.imafidon@uel.ac.uk). T.B. Watmon is with the University of East London, 4 6 University Way, London, E16 2RD, UK (e-mail: bt.watmon@gmail.com) A.O. Uwaechie is with Zenith Bank PLC (e-mail: Annette.Uwaechie@zenithbank.com) S. Ojeme is with the O 2 PLC (email: sojeme@googlemail.com) B. R. Lucas is with the University College London (email: Benjamin_r_lucas@hotmail.com) consideration to our eventual choice of paradigm. Table I show an overview of the research design used in this thesis and the literature review undertaken as sown in Figure I and Figure II enables the research to highlight the gaps in knowledge which also act as justification for the research to be undertaken. Table II shows the research topic and research problem which are developed by the literature search. The two main dimensions of a design theory are a product and process where the product is a set of properties that exist within the product and the processes the method for constructing the product [1]. Table 3 shows this papers design structure and theory. Table III shows the four components of an Information Systems Design Theory (ISDT) about the design product according to [1] which are (1) meta-requirements, (2) meta-design, (3) kernel theories, and (4) testable design product hypotheses. Meta-requirements concern the class of goals to be addressed by the application/use of the design product. They are called meta-requirements rather than just requirements because they address a generalised class of goals rather than particular, situated goals (e.g. in some particular organisation at some point in time) II. DEFINING TERMS We had defined the key terms used in our research; this was done so that there would be consistency throughout the research. We noted that in a phenomenological research that it is slightly more difficult to define the terms because of the exploratory nature of the research. The advantage of defining terms in positivistic studies is that it enhances the precision and rigour of the research. In defining the terms the product is one aspect of the design theory and has meta-requirements which describe the goals to which the design theory applies. The Meta design describes the design principles used to meet the meta-requirements and then a set of testable product hypotheses are used to verify the design satisfies the requirements [2]. III. THE LIMITATIONS AND DELIMITATIONS As with all large or small research projects we constrained our research enquiries in a number of ways and excluded some potential areas of investigation which we will disclose for ethical reasons and so that future researchers are aware of our exact work. We used diagrams to highlight these limitations as in Figure 3 IV. METHODOLOGY USED Paradigms refer to the progress of scientific practice which are based on individual s philosophies and assumptions

about the world and their knowledge; which if related to the context of this thesis would mean how the author thinks the research done in this thesis should be conducted. Paradigms have continued to provide renowned researchers with a headache of how models problems should be solved using model solutions [3]. This has meant that paradigms continue to mean different things to different people; however one researcher [4] attempted to sanitise the situation by suggesting that the term paradigm should be classed into three different levels as seen in Table 4. From this we can see that the researchers are suggesting that one s basic beliefs about the world in which they live is reflected in the way that they design their research, how they collect their data, how they analyse their data and even the way in which they write their research papers. Table 5 highlights the dynamics of the three philosophical levels in relation to our research The research paradigm or philosophy for this paper can be defined as the process of the research which is the way in which I intend to collect and analyse my data. Based on the key areas of my research and its aim the relevant research approaches I will use are the: Qualitative: Which is subjective in nature and involves examining and reflecting on perceptions in order to gain an understanding of social and human activities. Quantitative: Which is objective in nature and concentrates on measuring phenomena; therefore it involves collecting and analysing numerical data and applying statistical tests. There is considerable blurring in the use of these philosophies which are classified as either positivist (Quantitative) and phenomenological (Qualitative). Therefore suggesting that the ontological debate of what is reality can be kept distinct of the epistemological question with regards how do we obtain knowledge of that reality? In effect we are being told that the act of investigating reality has no effect on that reality, this is what Positivists believe. These researchers also argued that it was impossible to separate the researcher from the research and that what existed was what the researchers thought existed [5]. The researchers paid considerable regard to the subjective state of themselves; this qualitative approach stressed the subjective nature of human activity by focusing on the meaning rather than the measurement of social phenomena. Table 6 shows how we collect our data. The researchers practicing phenomenology believe that social reality is dependent of the mind; therefore they argue that what is researched cannot be unaffected by the process of the research [6]. Fig 1 shows the literature search done to show the problem which in turn based on previous research done in the area defines the methodology used in this research paper. Figure 2 shows the design theory product and design process which show the formulation of the method used to state the problem in terms of research theories V. APPROPRIATENESS OF OUR RESEARCH ANALYSIS By looking at the appropriateness of the analysis done in our research, it is important to look at the following which form the foundation of an appropriate analysis a) why we collected the data b) what data we collected c) from where we collected the data d) when we collected the data e) how we collected the data f) how we intend analysing the data. These are shown in Table 7. By using the following questions the research will try to gather the knowledge needed as required by the philosophy of science to answer by development the purpose of the research. As the Information required in my research is quantitative & qualitative, I also need to define the way in which I intend to use the knowledge gathered from the questions. Hence I have defined how I intend to use the questions and what kind of data I am looking to get from the question. Table 8 highlights the type of questions used in our research VI. METHODS USED Research Approach: The research approach adopted by this thesis is that of quantitative and qualitative, both were adopted because of their unique characteristics. Quantitative was adopted because of its measuring concentration which involves collecting and analysing numerical data and applying statistical tests. The other adopted approach was qualitative research which has an understanding concentration of social and human activities. VII. STATISTICAL ANALYSIS OF THE DATA In order to obtain and analyse the correct sample data the research shall adopt the approach used for statistical studies which comprises of (Surveys, experiments, observational studies etc). This will enable a big enough effect to be of scientific significance [8]. In contrast to this other researchers have however suggested the use of a methodology of discrete-event simulation for manufacturing systems. This is so as to benefit from the analysis and interpretation of simulation results that come with using the model [9]. This model is also very useful for this research and whilst the author will not adopt the recommendations in all entireties the data collation procedures and processes shall be adopted in order to maximise the results. In comparison other researchers have said that the rules used have to be tested not by statistical means but by validating the prohibitions, authorisations and obligations which can be integrated into one by restricting predicates or by adding transitions and states [10]. However due to the significance of this studies results and the size of the data it would not be possible to validate the data using this method [11]. How do these approaches link into a wider discourse (in other words, how do they fit into histories of knowledge production or the philosophy of science)? One research methodology to be adopted is Quantitative. However, within the philosophical tradition of ontology and epistemology, the work adopts the method of objectivism, which affirms the notion that objective reality exists out there for research to go and discover it. Hence truth and meaning does exist in some external world, and are created by objective action within the positivist purview. Hence the theoretical approach for this research is the naturalist, approach which is akin to the positivist perspective, using the method of data collation and description of isolated scientific variables [12]. Another research methodology to be adopted is qualitative. However, within the philosophical tradition of ontology and epistemology, the work adopts the method of constructivism which rejects the notion that objective reality exists out there for research to go and discover it. Rather, truth and meaning does not exist in some external world, but are created by subjective action within the constructivist purview. Hence the theoretical approach for this research is the interpretivist approach which is akin to the phenomenologist perspective, using the method of critical analysis to evaluate and interpret the available works [13]

Fig 1: Literature Search Table I: Overview of our research design Identify research problem Determine purpose of research Develop theoretical framework Define research questions / hypothesis Define terms Identify limitations of study Decide methodology Determine expected outcome Table II: Research problem Research topic Research problem Security Strategy Model for Wi-Fi using Using Geofencing as a Security Strategy Model Geofencing

Fig 2: The design theory product and design process Design Product Kernel theories Meta-requirements Meta-design Testable design product hypothesis Design Process Kernel theories Design method Testable design process hypothesis Table III: Design Theory Features KT1: Universal Constructive Instructional Theory KT2: Geofencing as a Security Strategy Model MR1: Geofencing application framework that can be used to grant access to a Wi-Fi network using a pre-defined parameter as control (KT1) MR2: Awareness and Compliance with the Geofencing application framework should be evaluated routinely (KT2) MD1: Set up Geofencing application framework and use Security Strategy Model to control MR1 MR2 H1: Security Strategy Model maintains user compliance with Geofencing application framework KT1: Universal Constructive Instructional Theory KT2: Geofencing as a Security Strategy Model a) Instructions are defined b) Expected conditions are defined c) Actual conditions are defined d) Effectiveness of instruction is measured PH1: It is feasible for practitioners to set up training that meets MR1 MR2 and MD1 Table IV: Research Paradigms Philosophical level Social level Technical level Where it is used to reflect my basic beliefs about the world Where it was used to provide guidelines about how we should conduct our research Where it is used to specify the methods and techniques to be adopted in our research

Table V: My research data compared to that used in industry Telecommunication Systems Quality of Service Signal to interference ratio Packet error rate It error rate Grade of service Call blocking probability Availability of resources Unacceptable quality Coverage area Capacity Subscriber density that can be handled Other system parameters Delay (call setup, channel assignment, etc.) Reliability Database lookup time Message and time complexity Network management system Geolocation Systems Accuracy of service Percentage of calls located within an accuracy of meters Distribution of distance error at Geolocation receiver Location Availability Percentage of location requests not fulfilled Unacceptable uncertainty in location Coverage area Capacity Location requests / frequency that can be handled Other system parameters Delay in location computation Reliability Database look-up table Management and complexity Table VI: Data source and collection methods used in our research Source Documentation Interviews Questionnaires Direct Observation Participant observation Physical artefacts Data Collected Emails, letters, minutes of meetings, published studies Open ended questions, Using a questionnaire that was designed to ask questions relating to the variables Observed personnel using the technology The author was involved as a temporary member of staff at the laboratories test bed Print outs and screen shots of the results Method Pattern Matching Explanation building Complex Time Series Analysis Logic models Table VII: The method and the outcome of or analysis Outcome We predicted the results of our experiment and compared them with our actual ones We used explanations to analyse our data because our data was linked to theory Our analysis was complex because we had one significant finding that did not span over a long period of time We made a partial use of logic models because our experiment looked at the interplay between independent variables (causes) and dependent variables (events). We predicted the causes and then compared them with the actual events

Table VIII: Types of Research Questions to be used in my research What precisely is Geo fencing? What are security strategy models? What are the Quality of Software (QoS) issues associated with Geo fencing? What are the limitations in the current Geo Fencing model? What are the possible areas of further research in Geo Fencing? What are the ethical issues in Geo Fencing? What are the wireless protocols for Geo fencing? What are the Information Technology (IT) Governance standards for Geo fencing? What are the security threats to wireless networks? What are the proposed solutions to the wireless security threats using strategy model? Relational question (open ended) Probe question (open ended) Sensitive question (open ended) Relational question (open ended) Sensitive question (open ended) Strategic questions (open ended) Table IX: Research approach used in our research Research approach: Triangulation; is the combination of methodologies in the study of the same phenomenon [7] Strength: Overcomes potential bias and sterility of a single method approach. Leads to greater validity and reliability than a single methodological approach; [7] Triangulation has vital strengths and encourages productive research, enhances qualitative methods and allows complimentary use of quantitative methods. Purpose: Gives a much fuller picture by asking different person s to describe different aspects of a situation Theoretical framework: data triangulation, investigator triangulation, methodological triangulation, triangulation of theories Weaknesses: Exceedingly difficult to perform where you have a mixed method approach, particularly where qualitative data is generated and data collection and analysis is time consuming and expensive. Triangulation cannot be used to rectify a poor research design but must be integral to a good design VIII. CONCLUSION Research Approach will be by Methodological Triangulation which is a mixture of qualitative and quantitative methods of data collection. Our paper is a brief description of the design methodology used in our Geofencing experiment and why we choose the methods we did. The research is completely holistic in its approach and the security strategy model will be unique. To the best of the author s knowledge, no previous work has attempted to create a security strategy model using LBS within and outside a geographical test bed that is conditioned by wireless protected access protocols and Information Technology Governance standards. The primary contribution of the research will be the design of the security strategy model and the development of a supporting theoretical framework for the model REFERENCES [1] Walls, J., Widmeyer, G.R. and El Sawy, O.A. (1992). Building an Information System Design Theory for Vigilant EIS, Information Systems Research, Vol. 3, No. 1, pp. 36-59 [2] Walls, J., Widmeyer, G.R. and El Sawy, O.A. (1992). Building an Information System Design Theory for Vigilant EIS, Information Systems Research, Vol. 3, No. 1, pp. 36-59 [3] Kuhn, T. S. (1962) the Structure of Scientific Revolutions, Chicago: University of Chicago Press p. 8 [4] Morgan, G (1979) Response to Mintzberg Administrative Science Quarterly, 24(1), p. 137 139 [5] Smith, J. K (1983) Quantitative v. Qualitative Research: An attempt to classify the Issue, Educational Research, March p. 6 13 [6] Van Maanen, J. (1983) Qualitative Methodology, London Sage p. 9 [7] Easterby-Smith, M., Thorpe, R and Lowe, A (1991) Management Research : An Introduction, London Sage [8] Lenth, R. (2001) Some practical Guidelines for Effective Sample Size Determination Page 1-11 [9] Groumpos, P and Merkuryev, Y (2002) A methodology of discrete event simulation of manufacturing systems: an overview [10] Mallouli, W. Et al. (2007) a format for testing security rules IN ACM journal page 127-132 [11] Field, A. P. (2005). Discovering statistics using SPSS: and sex and drugs and rock n roll (2 nd edition). London: Sage [12] Group work done by the JAR group, Dr. Paul Kiff research class GSM007 semester B 2008 University of East London [13] Group work done by the JAR group, Dr. Paul Kiff research class GSM007 semester B 2008 University of East Londo