Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Topic is “Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning”. Research Questions: How can we control the access to sensitive healthcare information and systems? How to provide

Topic is “Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning”.

Research Questions:

How can we control the access to sensitive healthcare information and systems?

How to provide data security for affected healthcare data breaches?

How to enhance the cybersecurity in healthcare to overcome the cyber attacks ?

13.1 Theoretical Framework

Overview: Rather than writing a full-length literature review for your topic, you will practice developing your theoretical framework for your mock dissertation topic in this assignment and then develop your literature review funnel for upcoming assignment 15.1.                              

• The purpose of the theoretical framework is to tie the dissertation together. As the researcher, you should approach the proposed research from a theory or set of theories that provide the backdrop for the work (researchers do not create theory; they use established theory in which to embed their work).

• This section should describe how this study will relate to existing theories and discuss how the methodology being used in the study links to those theories

• The theoretical framework justifies the methods you plan to use for conducting the study and presents how this research will contribute to the body of knowledge and/or practice. Further, it describes the context within which to locate the intended project and suggests why doing such a study is worthwhile.

Directions:

1. Review the rubric and examples to make sure you understand the expectations of this assignment.

a.  Sample Theoretical Framework.pdf Sample Theoretical Framework.pdf - Alternative Formats

b.  Rubric for Theoretical Framework.docx Rubric for Theoretical Framework.docx - Alternative Formats

2. Develop a 1 page (more is fine) theoretical framework for your mock dissertation topic.  Consider (but do NOT directly answer) the following questions when you write your theoretical framework:

a. Is the theoretical foundation strong?

b. Are the theoretical sources apparent?

c. Are they appropriate for the topic?

d. Do they need further explanation?

3. Submit your theoretical framework to the submission box.

Sample to write

Sample problem statement and research questions

Your problem statement, research questions and literature review will serve as the basis for preparing your theoretical framework.

Company X is struggling with the problem that many online customers do not return to make subsequent purchases. Management wants to increase customer loyalty and believes that improved customer satisfaction will play a major role in achieving this goal.

To investigate this problem, you have identified the following problem statement, objective, and research questions:

Problem: Many online customers do not return to make subsequent purchases.

Objective: To increase customer loyalty and thereby generate more revenue.

Research question: ‘How can the satisfaction of company X’s online customers be improved in order to increase customer loyalty?’

Sub-Questions:

1.

‘What is the relationship between customer loyalty and customer satisfaction?’

2.

‘How satisfied and loyal are company X’s online customers currently?’

3.

‘What factors affect the satisfaction and loyalty of company X’s online customers?’

As the concepts of “loyalty” and “customer satisfaction” play a major role in the investigation and will later be measured, they are essential concepts to define within the theoretical framework.

Sample theoretical framework

Below is a (simplified) example of how you can describe and compare definitions and theories. In this example, we focus on the concept of ‘customer satisfaction.’

2.1 Customer satisfaction

Thomassen (2003, p. 69) defines customer satisfaction as “the perception of the customer as a result of consciously or unconsciously comparing their experiences with their expectations.”

Kotler & Keller (2008, p. 80) build on this definition, stating that customer satisfaction is determined by “the degree to which someone is happy or disappointed with the observed performance of a product in relation to his or her expectations.” Performance that is below expectations leads to a dissatisfied customer, while performance that satisfies expectations produces satisfied customers. Expectations being exceeded leads to a “very satisfied or even pleasantly surprised customer” (Kotler & Keller, 2003, p. 80).

The definition of Zeithaml and Bitner (2003, p. 86) is slightly different from that of Thomassen: “Satisfaction is the consumer fulfillment response. It is a judgement that a product or service feature, or the product of service itself, provides a pleasurable level of consumption-related fulfillment.” Zeithaml and Bitner’s emphasis is thus on obtaining a certain satisfaction in relation to purchasing.

Thomassen’s definition is the most relevant to the aims of this study, given the emphasis it places on unconscious perception. Although Zeithaml and Bitner, like Thomassen, say that customer satisfaction is a reaction to the experience gained, there is no distinction between conscious and unconscious comparisons in their definition. Company X claims in its mission statement that it wants to sell not only a product, but also a feeling; as a result, unconscious comparison will play an important role in the satisfaction of its customers. Thomassen’s definition is therefore more relevant to the current study.

Thomassen’s Customer Satisfaction Model

According to Thomassen, both the so-called value proposition and other influences have an impact on final customer satisfaction. In his satisfaction model (Fig. 1), Thomassen shows that word-of-mouth, personal needs, past experiences, and marketing and public relations determine customers’ needs and expectations. These factors are compared to their experiences, and this comparison between expectations and experiences determines a customer’s satisfaction level. Thomassen’s model is important for this study: it allows us to determine both the extent to which company X’s customers are satisfied and where improvements can be made.

Show more
  • @
  • 1165 orders completed
ANSWER

Tutor has posted answer for $10.00. See answer's preview

$10.00

********* Cyber ******** ** ***************** NameInstitutional ***************** ****************** NameDate ** ***************** *** we ******* ****** ** sensitive ********** *********** *** ************** to ********* **** in ********** *********** systems *** be ********* ** ensuring **** is always ********* *** users *** ************* *** permissions before **** **** ****** ** the sensitive data ** the ********** ********** With **** ********** *** ************** ** **** ** hard *** ********* ** ****** ********* **** ******* ****** ******** ** sensitive ********** **** *** ** ********** ** implementing **** usage ******** *** ******** data ** permanently restricted ** ******** ********** facility ***** This is essential ** ****** ******* the ********* ** ********* ******** *********** in *** healthcare ********** **** ** denied *** access; **** **** **** *** **** access ** ********* **** (Papa et ** 2020)Access to sensitive *********** ** ********** information systems *** ** prevented ** ********* ********** ***** about ****** ** ********* **** ** *** ********** ******** ********* *** ***** ***** access to ********* **** will ** ********* ** ** **** **** ******* data thus ensuring *** data **** are ****** in the *********** to provide ******** *** ******** ****** **** breaches?After a ************ *********** security *********** *** ******* ******** ** ********** *** patients *** alerting **** ***** the ******** After ******** **** they can request **** to ****** their *********** **** ** ***** *** passwords ** ****** *** ********* ** *** *** *** files ****** against ************* cyber security ** ********** ** ******** ***** ************ security can be ******** ** ******** **** *** ******** ** *** ********** ********** are ****** ********* *** spam ******* *** *********** ******** is ****** ****** to ***** ********* requests ****** **** ******** ******* to *** ******* It **** ** **** *** ************** to ****** *** ******* via *** ******* ** ********** the ******* (Ghafur ** ** ********** ******** *** ** enhanced ** ********** ***** cyber security policies ***** **** ******* ************ ** awareness ******* ** ***** ******** ******** ******** *** involve introducing ***** ***** security measures such as ensuring ******** ****** are ****** active in case ** * *************************** A ***** * Pisano P ***** *** ******* M ****** ******** *** ********* monitoring using ***** ********** devices: An ********* ************************** Forecasting *** ****** ********* ************ * Grass * ******** N * ***** ***** * ****** The ********** ** cybersecurity ** ****** ***** the ** ******** ****** ******* as * **** ******** ****** ******* ********** ***********

or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question