Introduction to Research
(RFID SEcurity and privacy issues)
Submitted to: –
Table of Contents TOC o “1-4” h z u Table of Contents PAGEREF _Toc525939925 h iiIntroduction PAGEREF _Toc525939926 h 11.1 Research Problem and Reorganized Collected Literature PAGEREF _Toc525939927 h 11.1.1 Reorganized collection of Literature PAGEREF _Toc525939928 h 2Qualitative and Quantitative Methodologies PAGEREF _Toc525939929 h 21.1.2 Selected Methodology PAGEREF _Toc525939930 h 31.2 Review of the Existing Methodologies PAGEREF _Toc525939931 h 31.2.1 Selection of Sub-Problem PAGEREF _Toc525939932 h 31.2.2 Summary of the Reviewed Methodologies PAGEREF _Toc525939933 h 31.3 Proposed Methodology PAGEREF _Toc525939934 h 41.3.1 Identification and Justification PAGEREF _Toc525939935 h 41.3.2 Benefits and Limitations PAGEREF _Toc525939936 h 41.3.3 Framework and Explanation PAGEREF _Toc525939937 h 5Conclusion PAGEREF _Toc525939938 h 6Bibliography PAGEREF _Toc525939939 h 6
The major motive of this research is to provide insight into the methodology selection process for a research study. In this assessment task, the methodology selection process and criteria will be discussed comprehensively by using the security issues concerning RFID system services. It will be used as a case study to make the methodology selection practical and realistic rather than discussion only.
Research Problem and Reorganized Collected Literature
1.1 Research problem statement
Use of technology has been increasing rapidly for the last couple of centuries. With the advancement of technology, human beings are becoming technology dependent rapidly. People are using it in their daily lives in the form of electronic gizmos, tools, apps, data sharing and more for convenience purpose. People fully trust technology’s benefits but sometimes remain unaware of associated risks. The RFID System cannot be considered as safe and isolated, as these can be a soft target for the hackers especially in the absence of a security shield. Similarly, RFID can also result in the wastage of time which obviously has an opportunity cost. Precisely, Security issues are the main problems of this study. Security has privacy issues and retrieves ability issues as subproblem statements.
Reorganized collection of LiteratureResearch Problem Sub-problem Collected Literature
Security Privacy Issues Weis, S.A., Sarma, S.E., Rivest, R.L. and Engels, D.W., 2004. Security and privacy aspects of low-cost radio frequency identification systems. In Security in pervasive computing (pp. 201-212). Springer, Berlin, Heidelberg.
Phillips, T., Karygiannis, T., and Kuhn, R., 2005. Security standards for the RFID market. IEEE Security ; Privacy, 3(6), pp.85-89.
Ohkubo, M., Suzuki, K. and Kinoshita, S., 2005. RFID privacy issues and technical challenges. Communications of the ACM, 48(9), pp.66-71.
Retrieval system Issues Chen, S.C. and Thomas, V., 2001. Optimization of inductive RFID technology. In Electronics and the Environment, 2001. Proceedings of the 2001 IEEE International Symposium on(pp. 82-87). IEEE.
Table 1 Select the problem and collect literature/papers
Qualitative and Quantitative MethodologiesQualitative research involves the viewpoints of scholars, researchers, and technologist about the main issues of address. Similarly, it also involves the qualitative variables in its analysis which are cannot be quoted in the numerical forms. The qualitative method helps the researcher to develop results and conclusions by reviewing the previous work of researchers and scholars on that particular issue. In a quantitative research, an accessible data that is quantifiable or any survey, which is related to the research, can be examined. It also includes the empirical results developments and interpretation rather than assumptions or statements.
Selected MethodologyQuantitative methodology is selected for this study as the security and privacy concerns are distributed among a large number of individuals around the world. It is rational to understand that affected people can provide better information regarding the issues they faced rather than hypothetical discussions. Similarly, it will also provide a clear insight into the effectiveness of the current security shields. Furthermore, it will also provide a set of possible recommendations, which may be expressed by the respondents. Structured questionnaires will be used to interview the respondents.
Review of the Existing MethodologiesIn this section, the methodologies, employed by previous researchers, will be identified, highlighted, reviewed, and analyzed.
Selection of Sub-ProblemPrivacy and security issues are selected as the sub-problem for this research study. The research study will focus solely on the privacy issues, which can be encountered during the file sharing over a cloud server.
Summary of the Reviewed MethodologiesLiterature # Research Problem Methodology Your Sub-problem Relevance
Security and privacy aspects of RFID Qualitative Security problems Relevant
Security standards of RFID system Qualitative Security problems Relevant
Security and privacy issues Qualitative Security problems Relevant
Table 2 Selected literature, methodology and sub-problems/papers
Proposed MethodologyThere are three options available for proposing a methodology. First, some methodology can be selected as such from previous literature. Second, Slight modifications can be done in an existing methodology to make it feasible. Lastly, one can give his own ways to make it understood. One can select only one of them whichever is the most suitable to the topic and can get a solution.
Identification and JustificationAs discussed earlier, the quantitative method is selected and will be used in this research study. It is rational to understand that affected people can provide better information regarding the issues they faced rather than hypothetical discussions. Similarly, it will also provide a clear insight into the effectiveness of the current security shields. Furthermore, the method is selected because it will not only provide scholarly viewpoints but also will include the real affected individuals in the study. It will also provide the exact and clear self-explanatory results. It does not mean that the qualitative research methods are not feasible rather it means that the quantitative method is better to be incorporated as compared to qualitative.
Benefits and LimitationsBenefits:
Quantitative research is based entirely on numerical evaluations and facts. It is used to enumerate the behaviors, settings, thoughts, perceptions and other defined variable. It is easy to interpret. Similarly, its results are mostly applicable to all of the regions due to their statistical nature. It also helps to strongly accept or reject any hypothesis, which is statistical in nature. The disadvantage of quantitative research is that one does not get the specific details that can be obtained qualitatively.
Occasionally, the appropriate auxiliary statistics are not convenient for the analysis because the facts are difficult or frightening. This method is not always advantageous to include it in a wave configuration. The facts are not enough to clarify the complicated problems.
Framework and ExplanationThe flow diagram is used to translate the investigation steps, which make a framework. At first, the essential thing to do is the selection of the topic, which is followed by the identification of the problems. After that, the problem is analyzed with different methods so that a better solution can be found.
create a result of research topics Choose a topic Accumulate topics related literature Literature Review
sampling, data collection, and processing
Results, discussions, and conclusion
Flow diagram 1.4.3
According to the flow diagram, 1.4.3 steps are described. The literature review process guides methodology selection as it not only provides an insight into the problem identification but also into the best possible methodology selection process for a research process. For a quantitative stud, population and sample selection will be done after the preparation of questionnaires. Data collected will be sorted and processed to get the optimal results. Result presentation and discussion will be done after data processing. Discussion and data interpretation will be concluded as a conclusion, which will be followed, by the suggestions or recommendations.
ConclusionIn this study, the method selection process and its standards are analyzed in detail using security issues related to file sharing in cloud storage services. This study has chosen a quantitative approach because the problems of security and privacy in RFID system are distributed among a large number of people all over the world. It is reasonable to understand that affected people can provide better information about the problems they are facing rather than hypothetical discussions. It also provided an understanding of the effectiveness of the current security systems. Furthermore, the method was chosen because it not only provides an academic perspective but also includes the actually impacted people as respondents in the study. It will also provide clear and precise results that are self-explanatory. This does not mean that qualitative research methods are not feasible, but that quantitative method is better than other is in the current scenario.