Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote

Research Problem and Reorganized Collected Literature

Discuss about the Research Methodology for Reorganized Collected Literature.

This section details the methodology of this paper. My study will focus on a wireless home security system. Initially, a literature review was done. As a continuation of the first project, this sections elucidates on research problem and methodology and addresses some notable gaps in the existing literatures. This section is comprised by four parts which have some sub-sections. The first part details the research problem and sub-problems that have been developed from reviewing literature. The second section details the suitable methodology for the issues identified. The third sections details review, analysis and summarizes relevant insights that have been drawn from existing literature and problems. Finally, the last section details the objective of the employed methodology, explanations, benefits and limitations of the adopted methodology and the framework for the study. The goal of this task is to decide on a suitable research methodology for developing the research thesis at hand.   

In the last 5-6 decades, the concept of home automation has gained significant attention. The expectations of people concerning home security and automation have changed to a considerable extent because of the technological advancements and services (Mihalache, 2017). Different security systems at different times worked to offer safe, expedient and efficient ways for home occupants to monitor their homes. Notwithstanding the revolution in the anticipations of the user, technological advancements, or time changes, the duty of a home security automation systems has continued being the unchanged (Zhao and Ye, 2008). The role of a modern home security systems entails pinpointing an invader attempting to get entrance to the home, notifying the owner about the invasion attempt or invasion, stopping the invader from accessing the house, and collecting or gathering proof about the invasion for perpetrators to be arrested and tried in a court of law for the committed crime (Valda and Leite, 2017). But is this transpiring in present state where the crime rates are ever intensifying? Home intrusion criminalities are on rise because continuous observing of home is challenging. Home automation and security systems face four key tests, i.e., inflexibility, a high cost of ownership, poor manageability, and struggles attaining security. The primary motivation behind this review is to make persons cognizant of different types of home automation systems and study their need for security (Mihalache, 2017). Besides, this paper addresses the use of user-interfaces in protection and conclude by deliberating where the investigators should emphasize their work in the area of home automation security to design and to implement a low-priced and open source home automation system that can control and automate most of the house appliance through an easy controllable web interface to run.

Types of Methodology

Table 1: 1.1.1 Reorganized Collected Literature

Research Problem


Collected Literature

Security Alarms issues

· Security facet of the current home automation system

· Shortcomings of existing home automation systems

· Reasons for increased burglaries

·  Efficient methods to allow home dwellers to access and monitor all aspects of their home

· The role of user interfaces in security

· (Cyril Jose and Malekian, 2015)

· (Aggarwal, Gaur and Verma, 2014)

· Yao, Yang and Xia, 2008)

· (Alkar, Roach and Baysal, 2010)


· Awareness of advanced Home automation systems

· The need for security

· The convenience of using various security apps

· Issues, challenges and countermeasures for existing home automation systems

· (Aggarwal, Gaur and Verma, 2014)

· Yao, Yang and Xia, 2008)

· (Prasanna and Ramadass, 2014)

Qualitative methodology mainly focuses on trends in opinions and thoughts with the aim of understanding various aspects of social life. This method involves analysis of unquantifiable information principally in the form of words rather than numbers (Neuman, 2013, p.56). Fundamentally, qualitative research serves multiple functions such as seeking answers to questions, gathering evidence, answering the questions methodically using a predefined set of measures, and producing results that have not been determined in advance. Some of the qualitative methods include observation, case studies, content analysis, ethnographic research, and focus groups among others. The main strength of this method is its ability to offer elaborate textual descriptions of individuals’ experiences regarding a particular issue. In light of Taylor, Bogdan, and DeVault (2015), qualitative methods are efficient and effective in ascertaining intangible elements, including socioeconomic status, norms, gender roles, ethnicity,  and religion, which role in research might not be readily apparent (79).

On its part, quantitative methodology concentrates on the statistical, numerical, or mathematical analysis of information gathered through surveys, polls, and questionnaires. More specifically, quantitative methods focus on objective measurements through the manipulation of available data using computational procedures. Examples of quantitative methods include surveys, structured interviews, and questionnaires. Importantly, quantitative methods utilize four research designs, namely descriptive, experimental, correlational, and quasi-experimental. These techniques are primarily used when the researcher wants to assess the relationship between variables. According to Wiek and Lang (2016), a researcher enjoys a considerable degree of academic responsibility and freedom when using the quantitative methodology, and thus, resulting in satisfactory and credible research (34). In addition, this methodology relies on various levels of measurements in determining the types of statistics to use. The four major scales used are ordinal, nominal, ratio, and interval. Quantitative methods also utilize statistical tools such as SPSS, especially where regression remains indispensable in the data analysis.

The primary difference between qualitative and quantitative approaches is their flexibility. Essentially, quantitative methodologies are fairly inflexible. For instance, with quantitative techniques such as questionnaires and surveys, researchers often ask similar questions and in the same order to all participants. In this way, the response sets from which respondents may choose are fixed or close-ended. However, this inflexibility helps in making meaningful comparisons of replies across respondents and study sites. To realize this objective, there is a dire need for researchers to understand the most significant questions to ask, the approach of asking them, and possible choice of feedback. Conversely, qualitative approaches are usually more flexible because they allow bigger spontaneity and adaptation of the dealings between respondents and the investigator (McCusker and Gunaydin, 2015, p. 539). Indeed, qualitative techniques mostly ask open-ended questions, which are not necessarily phrased in the exactly similar manner among the participants. Importantly, open-ended questions allow respondents to respond freely using their words, and answers tend to be more multifaceted than just “NO” or “YES.” Additionally, with qualitative techniques, the relationship between study participants and researcher is typically less formal compared to quantitative research. 

Qualitative and Quantitative Methodologies

I am going to use a combination of the Survey Methodology. The survey method is part of quantitative methodology, which focuses on questioning people on various topics, and then, unfolding their responses. In light of Neuman (2013), using survey method, a researcher can collect data to reflect on individuals’ attitudes, test concepts, and determine level of consumer satisfaction among other purposes (23). Therefore, this methodology remains indispensable in my research on wireless home security system because, it will allow me to have wide range of the information regarding the topic. Indeed, this methodology is appropriate for my study because I can be able to integrate both qualitative and quantitative elements in the analysis. According to Choy (2014), both quantitative and qualitative research may significantly rely on surveys for the data collection and analysis although it depends on the factors under consideration and intended results (101). In this regard, survey methodology will enable me to explicitly gain more information on wireless home security systems ranging from perceptions of the population to practicability of the systems. My methodology will not be restricted to closed questions but will also include open-ended questions to allow respondents to give their insights freely

Literature 1: The need for Home security: A Qualitative Review of How the Concept of Security has changed in the Modern Home

The changing perception of security in modern homes affects the technological advancements. Sophisticated home automation systems using cameras, proximity sensors, microphones, contact sensors, alarms, etc. has been transformed from a simple lock and key-based security system (Kim, Lee and Choi, 2010). Nowadays, users can control and access their homes distantly at any time and from place globally by linking modern homes to the Internet that is very popular. Reduction in cost, power consumption, and size of new electronics systems because of a rise in processing power of newly-designed processors and the significant permits persons to control and know every facet of their home. By using audio feeds and live video from several aspects of their home individuals can keep an own eye home, also can be conscious of several environmental elements outside and inside their home, like humidity, temperature, light intensity, etc. In a Wireless Sensor-Actor Network, sensors collect data about the physical world or the setting around them (Megat Mohamed Noor, 2013). Actors do the suitable activities on the environment as required by the user or other parties. Designers, Engineers, researchers can introduce efficient techniques to permit home dwellers to control and access all aspects of own homes, including the environment owing to the acceptance of the Internet and Wireless Sensor Actor Networks. 

Type of Chosen Methodology

At the time of acquisition, individuals usually look for no-hassle, no-stress, and forthright home security systems together with easy and quick installation, great value for money, smash and crash protection, no broadband or landline options, if they are in countryside areas with enhancing equipment warranty and full-proof technology (Prasanna and Ramadass, 2014). The works of a contemporary home security systems include recognizing an interloper trying to access a building, warning the owner, stopping the interloper and gathering evidence about the intrusion (Ghosh et al., 2015). Bearing in mind the above discussion, this study would like to recommend home security system as initially, the anticipated system will detect the biometric of the user for generating the first-hand database. At the point of access, this input biometric database will be further opened by the system for validation purpose. Afterward, the current biometric input image and database image will be matched to permit the user. If the present input image is the correct copy of the database, then the system will respond to the handler and offer access (Ghosh et al., 2015). Or for easy or hassle-free access the user will respond by implementing an application from her/his smartphone. Then the input from the application will be taken by the system for comparison with the database. At this time, the system will give verification to the user, if and only if the biometric image and input from the application are matched. If not, the system will send a communication to the homeowner so that he can take suitable action against the unapproved person, who is trying to gain access to his or her home. Note that, to add a new user at any time, the owner reserves all rights.

Literature 1: will help to understand the changing perception of security in modern homes has an effect on the technological advancements.

Literature 2: Gives information about a type of simple home security system that can adopted to monitor and control

Table 2:1.1.1 Summary of the Reviewed Methodologies


Research Problem


Your Sub-problem



 The need for Home security


Increased burglaries

 Securing homes , the elderly, babies and their caretakers


 Security Alarms issues


 Shortcomings of existing home automation systems

 Recommendation of efficient methods to allow home inhabitants to access and control each and every aspect of their home

I believe that survey method will be suitable for this study because it also allow use of questionnaire method of data collection as well as capturing qualitative data. Importantly, since my topic involves an investigative study, a survey methodology will enable me to get inputs from individuals from diverse backgrounds. This section comprises three sub-topics, including justification of chosen methodology, the limitations versus the benefits of selected methodology, and procedures or framework of my methodology.  

As indicated in the previous section, I will use survey methodology since it allows capturing of both qualitative and quantitative aspects of my topic. The primary goal of my study is to create awareness regarding the safety measures a person can take in day-to-day life. The secondary objective is to accentuate the need for advanced home security system, which will make people’s home more safe or crime resistant. I will do a survey, which includes the use of a substantial number of questionnaires as well as face-to-face interviews. Indeed, I selected survey methodology because it can incorporate these other methods. The intention behind administering questionnaires will be to provide the residents an opportunity to express their views on their homes’ safety freely. As the respondents complete this survey, they will assess it against their personal lifestyles and in line with the security upgrading, they prefer.


  • Cost-effective although cost relies on survey mode
  • Relatively easy to administer
  • It gives extensive flexibility in data analysis
  • Capable of gathering data from a considerable number of respondents
  • Standardized surveys are relatively accurate owing to lack of numerous types of errors


  • Participants may feel uncomfortable providing answers to questions that are presented in an unfavorable manner
  • Data errors owing to non-response may exist
  • Some survey questions may lead to unclear data
  • Surveys characterized by closed-ended questions lower the validity rate of responses

The wireless home security system will be based on three primary databases, including individual, regional, and global security databases. Principally, there will be an alarm, which will produce a loud sound or noise when the sensors placed at the main entrance and along the territorial wall sense any physical threat. The individual security system will coordinate with regional as well as global security system to create an alert on the potential threat. However, the home-based security systems will be connected to regional systems where the residents can get prompt help in case of precarious threat.    

References List

Aggarwal, L., Gaur, V. and Verma, P. (2014). Design and Implementation of GSM Based Automated Home Security System. IAES International Journal of Robotics and Automation (IJRA), [online] 3(3). Available at: [Accessed 31 May 2018].

Alkar, A., Roach, J. and Baysal, D. (2010). IP based home automation system. IEEE Transactions on Consumer Electronics, 56(4), pp.2201-2207.

Choy, L.T., 2014. The strengths and weaknesses of research methodology: Comparison and complimentary between qualitative and quantitative approaches. IOSR Journal of Humanities and Social Science, 19(4), pp. 99-104.

Cyril Jose, A. and Malekian, R. (2015). Smart Home Automation Security: A Literature Review. The Smart Computing Review. [online] Available at: [Accessed 31 May 2018].

Ghosh, S., Konar, S., Ghosh, S., Ghosh, T. and Gope, S. (2015). Dual Tone Multiple Frequency Based Home Automation System. International Journal of Engineering Research, [online] 4(10), pp.542-544. Available at: [Accessed 31 May 2018].

Kim, D., Lee, S. and Choi, B. (2010). A real-time stereo depth extraction hardware for intelligent home assistant robot. IEEE Transactions on Consumer Electronics, [online] 56(3), pp.1782-1788. Available at: [Accessed 31 May 2018].

Kim, D., Lee, S. and Choi, B. (2010). A real-time stereo depth extraction hardware for intelligent home assistant robot. IEEE Transactions on Consumer Electronics, [online] 56(3), pp.1782-1788. Available at: [Accessed 31 May 2018].

McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed methods and choice based on the research. Perfusion, 30(7), pp. 537-542.

Megat Mohamed Noor, M. (2013). Community based home security system using wireless mesh network. International Journal of Academic Research, [online] 5(5), pp.73-79. Available at: [Accessed 31 May 2018].

Mihalache, A. (2017). Wireless Home Automation System using IoT. Informatica Economica, [online] 21(2/2017), pp.17-32. Available at: [Accessed 31 May 2018].

Neuman, W.L., 2013. Social research methods: Qualitative and quantitative approaches. Pearson education.

Prasanna, G. and Ramadass, N. (2014). Low Cost Home Automation Using Offline Speech Recognition. International Journal of Signal Processing Systems, [online] 2(2). Available at: [Accessed 31 May 2018].

Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.

Valda, L. And Leite, J. (2017). Home Automation with Web Control Based On Java Applets. Itegam- Journal of Engineering and Technology for Industrial Applications (Itegam-Jetia), [online] 3(9). Available at: [Accessed 31 Nov. 2018].

Wiek, A. and Lang, D.J., 2016. Transformational sustainability research methodology. In Sustainability Science (pp. 31-41). Springer, Dordrecht.

Yao, F., Yang, S. and Xia, B. (2008). A Zigbee Based Home Automation: System Design and Implementation. Measurement and Control, 41(10), pp.310-314.

Zhao, Y. and Ye, Z. (2008). A low cost GSM/GPRS based wireless home security system. IEEE Transactions on Consumer Electronics, [online] 54(2), pp.567-572. Available at: [Accessed 31 May 2018].

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Research Methodology For Reorganized Collected Literature Essay.. Retrieved from

"Research Methodology For Reorganized Collected Literature Essay.." My Assignment Help, 2019,

My Assignment Help (2019) Research Methodology For Reorganized Collected Literature Essay. [Online]. Available from:
[Accessed 23 June 2024].

My Assignment Help. 'Research Methodology For Reorganized Collected Literature Essay.' (My Assignment Help, 2019) <> accessed 23 June 2024.

My Assignment Help. Research Methodology For Reorganized Collected Literature Essay. [Internet]. My Assignment Help. 2019 [cited 23 June 2024]. Available from:

Get instant help from 5000+ experts for

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
sales chat
sales chat