BBS301 Applying Mixed Methods Research To Business

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

BBS301 Applying Mixed Methods Research To Business

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

BBS301 Applying Mixed Methods Research To Business

0 Download2 Pages / 304 Words

Course Code: BBS301
University: Murdoch University is not sponsored or endorsed by this college or university

Country: Australia


This survey will have a “convenience” sample approach. Students should ask friends, work colleagues and family members to complete the survey. To get a spread of demographics, it is best not to use too many business students as respondents. The required minimum sample size is 40 completed surveys. It is therefore a semi-quantitative study – conclusions should reflect this.

An SPSS frequency table for each question in the survey;
A copy of the questionnaire;
Printout of the raw data file that has been downloaded from the on-line survey; and
A presentation to the class of 10 minutes duration (internals only) with slides.


Cyber security and data protection refer to the protection of online information.
Due to ever increasing Internet traffic, the trespassing threats to access the personal and financial data have a massive increase (Colombo, and Ferrari, 2015).The importance of identifying the privacy of online data and restricting the access to limited applications has to be understood. 
 Survey for response collection on the research topic was done in Survey Monkey
Demographical exploration revealed 58.1% male and 40.3% female respondents.
Age distribution was highly skewed towards age group of 10-25 and 25-40 with a total of 80.6%
Total eight questions regarding
data security  and privacy were
framed in order of difficulty
Major Identified Areas
Trust on Social Media (43.6%)
Satisfaction with online security (36.1%)
Government as a stakeholder in data security (50.0%)
Allow mobile applications to collect personal information (29.0%)
Practices of online security (59.7%)
Awareness about sensitivity of data theft (80.6%)
Realising the importance of financial data theft (58.1%)
Steps as Solution
Installation of a security shield to protect encrypted dataRegular alteration of security data, e.g. passwordsFrequent cross check mobile application permissionsAwareness about security certificates   of websites, particularly for financial   transactions
Data exploration was based on 64 responses, hence the analysis was semi quantitative in nature (Chen, Mao, and Liu,  2014).
The data was found to be normal with Shapiro-Wilk test
Discriminant analysis revealed female as a significant function (Heeringa, West, and Berglund, 2017.)
Factor analysis identified three factors as primary contributors 
Chen, M., Mao, S. and Liu, Y., 2014. Big data: A survey. Mobile networks and applications, 19(2), pp.171-209.
Colombo, P. and Ferrari, E., 2015. Privacy aware access control for Big Data: a research roadmap. Big Data Research, 2(4), pp.145-154.
Heeringa S.G., West, B.T. and Berglund, P.A., 2017. Applied survey data analysis. Chapman and Hall/CRC.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 2 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Applying Mixed Methods Research To Business. Retrieved from

“Applying Mixed Methods Research To Business.” My Assignment Help, 2021,

My Assignment Help (2021) Applying Mixed Methods Research To Business [Online]. Available from:[Accessed 19 December 2021].

My Assignment Help. ‘Applying Mixed Methods Research To Business’ (My Assignment Help, 2021) accessed 19 December 2021.

My Assignment Help. Applying Mixed Methods Research To Business [Internet]. My Assignment Help. 2021 [cited 19 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



At, we understand that when students get stuck with tough assignments, they look for affordable services. To assist students with complex assignments, we have built a team of skilled cheap essay writers. has become one stop solution for all students who often look for answers related to their search similar to do my essay at the cheap rate or who can write my essay at affordable prices. Students prefer hiring us as we have the best provisions to render services related to do my essay online at a reasonable rate.

Latest Business Law Samples

div#loaddata .card img {max-width: 100%;

BU1112 Business Law
Download :
0 | Pages :

Course Code: BU1112
University: James Cook University is not sponsored or endorsed by this college or university

Country: Australia

Part A
Whether Stella is considered as an employee of PRX?
The main difference between employee and independent contractor is stated below:
Employee entered into contract of service, but contractor entered into contract for services.
Employer exercise control over the employee but no control was exercised by employer on contractor. It is considered as traditional test which was developed in Zuijs v Wirth Bros(Zuijs…
Australia South Lake Management health finance management  University of New South Wales 

BSBWHS605 Develop Implement And Maintain WHS Management Systems
Download :
0 | Pages :

Course Code: BSBWHS605
University: Swinburne University Of Technology is not sponsored or endorsed by this college or university

Country: Australia

Work Health and Safety Management System (WHSMS) is a collection of plans, tools, activities and processes. List 3 of these plans, tools, activities or processes and explain what they are,
The means, nitty gritty beneath, can be utilized whether the arranging procedure is straightforward or complex. They are:
Evaluating the current word related to wellbeing and security status including the ‘administration framework’ Lussier, R. N…
Australia Brisbane Management Work Health and Safety Management System (WHSMS University of Brisbane MBA 

BUSN331 Business Law
Download :
0 | Pages :

Course Code: BUSN331
University: Centennial College is not sponsored or endorsed by this college or university

Country: Canada

In Alberta, the Residential Tenancies Act applies to all the people in this jurisdiction, who rent their space out (Alberta Queen’s Printer, 2016). Through this act, the rights and responsibilities of the landlords and tenants are brought forward (Landlord and Tenant, 2015).
Question 1
Before a tenant can move in the rented accommodation, the tenant and the landlord have to reach an agreement, with regards to the…
Australia Edmonton Humanities Management University of New South Wales Masters in Business Administration 

LA1040 Contract Law
Download :
0 | Pages :

Course Code: LA1040
University: University Of London is not sponsored or endorsed by this college or university

Country: United Kingdom

A contract is an agreement between the parties which is enforceable legally in the courts. There are several provisions of law which governs how the terms related to the contract would operate. A contract consists of a set of provisions which are known as contractual terms. The weightage of such terms are not equal as one term may have a more significant consequence as compared to the other in relation to their brea…
United Kingdom London Economics Management University of London 

TLAW202 Corporations Law
Download :
0 | Pages :

Course Code: TLAW202
University: Top Education Institute is not sponsored or endorsed by this college or university

Country: Australia

If any person wants to carry out his business in the form of a company, then, it is necessary that the registration or incorporation requirements of such country must be met. In Australia, the Corporation Act 2001 and the guidelines laid down by ASIC provides with the steps that must be accomplish in order to establish a corporate entity.  (Malbon & Bishop, 2006).
A company is of great significance as it is treated as a …


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog