AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 3<br />
Research Methodology<br />
3.1 Introduction<br />
In chapter 2, a review <strong>of</strong> literatures on WLAN architecture, standards, security issues,<br />
and researches are presented. This chapter explains the research methodology selected<br />
for this dissertation. Research methodology is defined as the general approach to the<br />
research processes, beginning from the hypothetical groundwork <strong>of</strong> the research<br />
approach to the gathering and analysis <strong>of</strong> data (Collis & Hussey, 2003). Therefore the<br />
methodologies selected for this project are literature reviews and field trials. The<br />
research guidelines are as follows:<br />
• Review and report on current literatures on WLAN security, including field trips,<br />
observation, and security practices.<br />
• Conduct field trials (warwalking) in Auckland CBD.<br />
• Compare the research finding with a previous work by Lin et al. (2004) and then<br />
analyzed the differences.<br />
• Provide recommendations and implications on methods to secured WLANs in<br />
businesses around Auckland CBD.<br />
3.2 Purpose <strong>of</strong> Research<br />
The main purpose <strong>of</strong> this research is to answer the following research question:<br />
"What is the current status <strong>of</strong> WLAN security practices in Auckland City?”<br />
21