09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3<br />

Research Methodology<br />

3.1 Introduction<br />

In chapter 2, a review <strong>of</strong> literatures on WLAN architecture, standards, security issues,<br />

and researches are presented. This chapter explains the research methodology selected<br />

for this dissertation. Research methodology is defined as the general approach to the<br />

research processes, beginning from the hypothetical groundwork <strong>of</strong> the research<br />

approach to the gathering and analysis <strong>of</strong> data (Collis & Hussey, 2003). Therefore the<br />

methodologies selected for this project are literature reviews and field trials. The<br />

research guidelines are as follows:<br />

• Review and report on current literatures on WLAN security, including field trips,<br />

observation, and security practices.<br />

• Conduct field trials (warwalking) in Auckland CBD.<br />

• Compare the research finding with a previous work by Lin et al. (2004) and then<br />

analyzed the differences.<br />

• Provide recommendations and implications on methods to secured WLANs in<br />

businesses around Auckland CBD.<br />

3.2 Purpose <strong>of</strong> Research<br />

The main purpose <strong>of</strong> this research is to answer the following research question:<br />

"What is the current status <strong>of</strong> WLAN security practices in Auckland City?”<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!