The study is an example of an applied business research it is a systematic and in-depth analysis of organizational security problems so as to use develop and objective approach in creating solutions. It is systematic in the sense that is conducted by a sponsored agency that extensively gathers knowledge from a wide variety of companies that use tele-networks. The authors aim is to provide functional managerial solution to the problem of data security in the tele-network industry. The researchers used a study sample of 10,000 workers belonging to the Tele network Exchange that is membership organization that evaluated employee attitudes (Godlove, 2012). As a business research, it offers specific solutions such as the used of strict policy guidelines so that to increase compliance to the privacy guidelines. As an applied research, the study recommendations improves the production of products and provision of organizational service because companies use the findings to effectively manage tele-networks.
Business Problem and Research Purpose
The author identifies the business problem as the increasing liability caused by the lack of information security compliance by tele-network connected workers due to their attitudes. The research purpose was therefore to explore the underlying factors that motivate the worker to follow security guidelines and protect organizational information. In a tele network environment that has a complex monitoring system, evaluating the impact of data protection by businesses is important in increasing the feasibility of adopting the tele-networking technology (Godlove, 2012). The research problem therefore comprehensively addresses the business problem because it guides the research in evaluating the attitudes of the workers to the privacy guidelines. The individual motivations ultimately contribute to the overall behavior that may be conforming or deviant when it comes to organizational policies on non-compliance.
Delegate your assignment to our experts and they will do the rest.
Research Method and Study Design
The researchers used a cross-sectional study design that also incorporated the use of qualitative methodology to conduct Teleworker’s Security Survey that involved 10000 individuals that work in the telemarketing industry. Factors such as attitudes and motivations are qualitative variables that can only be weighed using open ended questionnaire surveys that can capture the behavioral tendency of the worker (Godlove, 2012). Through the use of personal attitude, sense of control, and social pressure scales as the main variables during analysis, the author was able to capture the significant motivations towards employee compliance.
The study method was accurate in capturing the extent of implementing security measures as the main motivation behind conformation. Organizational implementation of additional security measures promotes adoption of this alternative method of tele-networking which is a cost efficient marketing function. The study design also produced transferable results fit the research purpose where the author increases knowledge to contribute industrial growth.
Theoretical Framework
The author used the theory of planned behavior to assess the attitudes towards workers towards compliance with guidelines that protect business and consumers information. This framework was relevant because it comprehensively evaluated nature, social contexts, and control as predictors of planned behavior (Godlove, 2012). In this research the approach accurately predicted the probability of future actions of these workers which is beneficial to organizations. The author captured the teleworkers recognition of repercussions that were detailed in case of security breaches and were therefore willing to protect the integrity of this data. By using this information, organizations can tighten theory security measures by modifying their policies to enhance compliance to confidentiality. The level of security seriousness is what predicts a higher level of positive reaction behavior from the workforce.
Conclusion
This applied business research contributes to the knowledge of improving business management and identifying organizational loopholes. The research also suggests applicable solutions by evaluating the feasibility of these results in a real tele-network environment. It helps the management to discharge functions and it’s a form of research and development (R&D) strategy that evaluates variable differences that explain the functionality of departmental knowledge
References
Godlove, T. (2012). Examination of the factors that influence teleworkers' willingness to comply with information security guidelines. Information Security Journal: A Global Perspective, 21(4), 216-229.