METHODOLOGY

This study has an exploratory nature due to the theoretical insipience of the area of investigation and to the need to look into the empirical phenomenon in the sense of constructing and systematizing concepts about the topic (Cooper, Schindler &Sun, 2006). Innovation and Research Company in Australia

 The methodological path was traced in two phases. In the first moment the variables in the researched literature were retrieved composing the dimensions of the theoretical-methodological model proposed to structure the questionnaire.  Digital Transformation Company in Australia

The method adopted was the bibliographical research. The instrument of measurement was validated and tested afterwards along experts from the electric sector having as a reference Brazilian energy utilities.

 The Delphi method was applied with experts (academic, researchers and professionals) and statistics tests (factor analysis, sphericity, t from Student, Levene, Mann-Whithney and analysis of variance) for the structuring and validation of the questionnaire. The option for the Delphi technique derives from the potential of the instrument in converging to a consensus (or almost) among the experts about the object of this research (Wright & Giovanazzo, 2000) Data Collection The identification and description of the dimensions composing cyber security governance and management became evident having a fundament the OECD (2004) orientations concerning.

A preliminary version of the questionnaire was elaborated and submitted to the analysis of four experts (professionals involved in projects of R&D applied to cyber security for Smart Grids, developed as a partnership working with energy utilities) selected for the sake of convenience for the validation of the dimensions and variables identified. A first version of the questionnaire was finished and structured as an online form in the Google Docs website for the first-round answers. At first, 35 experts were contacted and 24 of them willingly joined the research. The answers obtained in the first round allowed the experts to form a preliminary opinion about the cyber security governance and management practices in energy utilities, although the results produced by the Google Docs tool reflected a significant lack of consensus among the experts in most of the statements. The results from the first round served then as subsidies for elaboration of a new form applied in the second round of the research with the experts who participated in the first round.  

Comments

Popular posts from this blog

Samsung Galaxy Watch 4 Classic review

Can an Astrological Reading Help With My Love Life?