Preparing for the IRB:The research is to identify the gap in existing environments of an healthcare organization.
Preparing for the IRB:The research is to identify the gap in existing environments of an healthcare organization.
- As applicable (check all that apply):
☐ Recruitment materials (i.e., advertisements, verbal scripts, cover letters, etc.)
☐ Consent Materials (i.e., introductory cover letter, consent script, etc.)
☐ Instrument(s) to be used for data collection** (i.e., surveys, questionnaires, interview questions, assessments, etc.)
☐ Letter(s) granting permission to use off-campus facility for research
- Interaction with Research Participants: Will the researcher be collecting data by directly interacting with the participants (electronic, paper, or in person)? ☒ Yes ☐ No
- Identifiable Private Information: Will identifiable private information be collected from existing records (i.e., medical records, assessment data)? ☐ Yes ☒ No
- Research Activities: Does the study involve and of the following? (Check all that apply)
- ☐ prisoners, fetuses, pregnant women (other than coincidental), or human in vitro fertilization?
- ☐ the review of medical or other records if the information is recorded in such a way that participants can be identified directly or through identifiers linked to the participants.
- ☐ surveys of interview techniques which include minors as participants
- ☐ the observation of minors if the researcher participates in the activities being observed
- ☐ techniques which expose participants to discomfort or embarrassment
- ☐ the deception of research participants
*Note: is the study involves any of the above, the study is not eligible for exemption
- ☒ Category 6: Collection of data from voice, video, digital, or image recordings made for research purposes.
- ☒ Category 7: Research on individual or group characteristics or behavior (including, but not limited to, research on perception, cognition, motivation, identity, language, communication, cultural beliefs or practices, and social behavior) or research employing survey, interview, oral history, focus group, program evaluation, human factors evaluation, or quality assurance methodologies.
- Will the study involve any procedures that fall outside the categories selected in Item 1 of this section?
- ☒ No ☐ Yes (apply for full review)
- Will the project involve prisoners? ☒ No ☐Possibly Incidentally ☐ Yes (full review required)
- Subpart C: Additional Protections Pertaining to Biomedical and Behavioral Research Involving Prisoners as Subjects requires full review except for research aimed at involving a broader subject population that only incidentally includes prisoners (i.e., a web-based survey that an inmate may be able to access from a prison computer without the researcher being aware of the prisoner status).
- Background (Provide information about the proposed research activities. What is the problem being investigated?)
The research is to identify the gap in existing environments of an healthcare organization. There is been a good quality times spent on the research and analyzing the process and the systems, which are being used in day to day activities in the current environment. It was identified that the systems cybersecurity and privacy is not studied as a mainstream research topic by the researchers for various reasons. There are many methods and approaches used to enhance the cybersecurity and the research does also discuss the perception and its effects on security qualitatively. The gap in research has been identified and analyzed with many research studies. It was also found that the concept of security is only designed based on the number of cyber-attacks and the loss of data. The user perception and usability factors are important because of the rapid increase in the number of applications. I have performed the research more in detail based on the current situation based on the pandemic it was never in thought that their will be a day, where whole world will be in trouble. Due to this situation all the organizations are letting the employees to work from home. They are many operational issues identified during the research and interviews with the relevant teams and business owners. It would be easy to understand if one go through my questionnaire, which I have prepared for the interviews with the resources. |
- Research Questions (At least 2).
1. what are the measures taken by an healthcare organization to secure data in WIDOWS, Linux, Unix and MAC OS?
2. Process of authentication when employee wants to retrieve some specific data? 3. cyber security measures when the employee performs any download activity? 4. password strategies? 5. loss of data and its restoration process? |
- Study Population. (Describe the characteristics of the study population, including the anticipated
number of subjects, age range, gender, ethnicity, and health status. Specify any inclusion and exclusion criteria.)
I have picked between 8 to 12 members population from various levels, teams and departments. |
- Subject Recruitment. (Describe the process of identifying and recruiting subjects for the research activities. Attach a copy of any recruitment material, such as flyers, advertisements, cover letters, etc.)
I haven’t printed any kind of a flyer or advertisers are used to perform the research. Since I am also working in the same organization as a business analyst and I have a very close relationship with my colleagues and business owners. I have called them directly on their respective cellphones to seek their permission and willingness to provide me the insight so that I can accomplish my goal of completing my research successfully. |
- Informed Consent. (Describe how consent will be obtained and documented. Please attach a copy of consent form)
Consent will be obtained verbally through telephone and few by messages and few by IM chat. |
I will be interviewing the population either in Skype for business or zoom if it has to be a focus group where multiple people are involved for the iteration process. If it has to happen one on one then I would use the telephonic mode to contact and get the information that could be FaceTime. |
- Research Procedures. (Describe the procedures that will be used.)
- Data Collection and DATA ANALYSIS. (Specify the data collection process that will be used and the data that will be collected from subjects. CITE surveys. Attach all instruments to be used, such as survey instruments, interview guide, assessment tools, and data collection form for existing data. How will you analyze your data?)
The data is collected through using various forms such as telephonic interviews, Skype interviews, zoom interviews etc. that has been scheduled based upon the resources availability to specific users, developers and business owners using secured channels and the data collected is not misused or shared with anyone apart from the researcher. The collected data is analyzed using a qualitative study and approach. There are various statistical methods used to analyze the interview data that use a such as focused groups, deep dive sessions, one on one etc. The analysis involves the classification of the interview questions into different categories and then requires the study of individual questions. Graphs are plotted and dots were connected to understand the meaning of the analysis and how the answers could be used to draw the conclusions. Statistical data analysis software like power BI and spreadsheets and will be used for the further analysis where the numbers are involved in the process to help the quantitative method.
|
Since this exercise is completely based upon the interviews through secured tools and technologies, I do not see any potential risk involved and to be more compliant all appropriate measures and decisions were taken during the process. |
- Potential Risks. (Describe any potential risks that the study poses to subjects, whether seen or
unforeseen, including physical, social, psychological, legal, or other risks.)
- Research Materials, Records, and Privacy Issues. (Identify the sources of material that will be obtained from subjects, what information will be recorded, concerns relating to privacy of subjects, and explain why this information is needed to conduct the research activities.)
Their is no personal data recorded during the process of interviews. The interviews are purely based upon the cybersecurity in regards to the existing tools and technologies so, ensured that no personal information or identification was captured from any of the resources who helped and assisted me in accomplishing the project work. |
- (Specify the procedures that will be used to safeguard and protect information gathered to maintain privacy and confidentiality. Explain the process that will be used to destroy the information upon conclusion of the study. If the information will be maintained, provide an explanation. Also discuss what safeguards will be used by the researcher if data will be shared with other entities (e.g., aggregate data, de‐identification, etc.)).
Their was no hand to hand material was shared. It was completely an electronic device based interviews where only phones and laptops were used and all the users or the interviewers were requested to wear their respective headphones. Since all are working from home so it was easy to convince everyone and the information captured was on a notepad and later that was transformed into a write up to enhance the document. The results or the out come was demonstrated very well in the chapter 1&3 write up’s. |
11.Data: Where and how will research records be stored and then destroyed? (Note: all research-related records must be maintained for three years after the study is completed and these records are subject to audit.
The collected data and the information will be stored in highly secured iCloud or any of the licensed cloud application, which provides an easy access to data as and in needed. The protocols will be taken to make sure that data and the information is not exploited. I will also make sure that data is protected from all the corners and it’s available as and in needed for my research purpose. Post research practice and following the defined three years time frame of storing the data and destroying the data permanently without exploiting to any of the unknown sources.
- Application Components:
A completed application package must include the following:
☒ Expedited Form (this application)
☒ Topic Approval letter (If enrolled in 736 Summer 2019 forward)
☒ CITI Training Completion Reports for all investigators, key personnel, and faculty advisors
☐ If applicable: recruitment materials (i.e., advertisements, flyers, telephone scripts, verbal recruitment scripts, cover letters, etc.)
☐ If applicable: consent form, consent script, or introductory cover letter (If working with minors, must have assent letter)
☒ If applicable: Instrument(s) to be used for data collection (i.e., questionnaire, interview questions, or assessment scales)
☐ If applicable: grant/contract proposal narrative (required if study is funded)
☐ If applicable: letter(s) granting permission to use off-campus facility for research
Leave a Reply
Want to join the discussion?Feel free to contribute!