CHAPTER IV FINDINGS AND CONCURRENT DISCUSSIONS Hypothesis 1: People are resistant to the technological change in the security system of the organization. Hypothesis 2: information hacked and misused. Lack of proper security system results in organizationally important Hypothesis 3: A proper security system in any organization increases data security and in turn efficiency and productivity of the organization. Hypothesis 4: Proper identification system reduces absenteeism 134
Types of Data: The random variables are of two types and two types of data are generated out of them: a) numerical and b) categorical A chi square (X 2 ) statistic is used in order to study whether the categorical variables differ from one another or not. The categorical variable generates data in the categories and numerical variable generates data in numerical form. For example, if it is asked - "What is your specialization?" or Do you own a bike?" are categorical type as they give data such as "computers" or "yes.", whereas questions like "What marks did you get?" or "What is your age?" are numerical type. It is very clear that the numerical data is basically of two types: 1) continuous, 2) discrete. To understand the differences between the types of numerical variables. Data Type Question Type Possible Responses Categorical What is your marital status? Married or unmarried Numerical(Discrete) Number of bikes that you 2 or 3 own? Numerical(Continuous) What s your height? 5 11 135
- the Chi Square statistic compares the tallies or counts of categorical responses between two (or more) independent groups. - the Chi square tests are used only on actual numbers and not on percentages, proportions, or means. For example, A case of a medicine trial conducted on different animals. The hypothesis in this case was set that the animals consuming the drug shows increase in the heartbeat as compared to animals who did not consume the medicine. On conducting the study, researcher collected the following data: H0: The proportion of animals whose heartbeat increased is independent of medicine consumption.. H1: The proportion of animals whose heartbeat increased is associated with medicine treatment. Heartbeat Increased No Heartbeat Increase Total Treated 56 24 80 Not treated 50 35 85 Total 106 59 165 136
Applying the formula above we get: Chi square = 165[(56)(35) - (24)(50)] 2 / (80)(85)(59)(106) = 2.818 The degree of freedom is very important before proceeding ahead. When a comparison is made between one sample and another, the degrees of freedom= (number of columns minus one) x (number of rows minus one) Thus, degree of freedom = (2-1) x (2-1) = 1. Now, the chi square statistic (x 2 = 2.818), alpha level of significance (0.05), and degrees of freedom (df = 1). From the data collected the Chi square distribution table has 1 degree of freedom and the value of x 2 (2.818) lies between 2.706 and 3.841. Thus we can see that the corresponding probability is between the 0.10 and 0.05 probability levels which means the p-value is above 0.05. As the p-value> conventionally accepted significance level of 0.05 this proves that we accept the null hypothesis. Now if the new x 2 value is 4.125 and this value exceeds the table value of 3.841 (at 1 degree of freedom and an alpha level of 0.05). This means that p is less than the 0.05, so the alternative hypothesis is accepted. 137
Table 3. Chi Square distribution table. probability level (alpha) 138
4.1 Hypothesis 1: People are resistant to technological change in the security system of the organization. H 0 : Technological change in the security system and people s resistance are independent. H1 : Technological change in the security system and people s resistance are dependent. 22. Table showing readiness for change Table 4.1 : Table showing readiness for change S.No. Content Number of Respondents % of Respondents 1 Yes 178 71.2 2 No 72 28.8 250 100 The above table shows the view of the respondents for readiness for change. The total responses taken are 250 out of which 175 respondents are male and 75 respondents are female. 139
Consider the table below: Table 4.1.1 : Table showing opinion of males and females for Table 4.1 Opinion Row Total Yes No Male 125 50 175 Female 53 22 75 Column Total 178 72 250 Table 4.1.2 : Table for Chi Square calculation for Table 4.1.1 Groups OF EF OIJ-EIJ (OIJ-EIJ) 2 /EIJ Male Yes 125 124.6-0.4 0.00128 No 50 50.4 0.4 0.00317 Female Yes 53 53.4 0.4 0.00300 No 22 21.6-0.4 0.00741 140
X 2 = (OIJ-EIJ)2/EI X 2 = 0.01486 Degree of freedom = (Column-1) X (Row-1) = (2-1) X (2-1) = 1 Significant level = 5% Table value for X 2 for 1 degree of freedom at 5% significance level = 3.841 Conclusion: Calculated value of Chi Square [0.01486] is less than the table value [3.841]. So we accept the null hypothesis and conclude that technological change in the security system of the organization and people resistance towards change are independent. That is people are not resistance to the technological change in the security system of the organization. 141
4.2 Hypothesis 2: Lack of proper security system results in organizationally important information hacked and misused. H0: Security system and information hacking are independent H1: Security system and information hacking are dependent 18. Table showing views of the employees on use of a proper security system to save the data from getting hacked or misused if you feel data is not secured in a proper way. Table 4.2 : Table showing views of the employees on use of a proper security system to save the data from getting hacked or misused if you feel data is not secured in a proper way. S.No. Content Number of Respondents % of Respondents 1 Agree 90 60 2 Indifferent 23 15 3 Disagree 37 25 150 100 142
Table 4.2.1 : Table showing opinion of males and females for Table 4.2 Opinion Row Total Agree Indifferent Disagree Male 67 18 20 105 Female 23 5 17 45 Column Total 90 23 37 150 Table 4.2.2 : Table for Chi Square calculation for Table 4.2.1 Groups OF EF OIJ-EIJ (OIJ-EIJ) 2 /EIJ Male Agree 67 63 4 0.25397 Indifferent 18 16 2 0.25000 Disagree 20 26-6 1.38462 Female Agree 23 27-4 0.59259 Indifferent 5 7-2 0.57143 Disagree 17 11 6 3.27273 143
X 2 = (OIJ-EIJ) 2 / EI X 2 = 6.32534 Degree of freedom = (Column-1) X (Row-1) = (3-1) X (2-1) = 2 Significant level = 5% Table value for X 2 for 1 degree of freedom at 5% significance level = 5.991 Conclusion: Calculated value of Chi Square [6.32534] is greater than the table value [5.991]. So we reject the null hypothesis and conclude that security system and information hacking are dependent. I.e. if the security system is very strong information hacking is not possible. If there is a flaw in the security system the information can be easily hacked and it can be misused against the organization. 144
4.3 Hypothesis 3: A proper security system in any organization increases data security and in turn efficiency and productivity of the organization. H0: Proper identification system and data security are independent H1: Proper identification system and data security are dependent 19. Table showing employees views about the proper security system in the organization increases data security and in turn efficiency and productivity of the organizatoion. Table 4.3 : Table showing employees views about the proper security system in the organization increases data security and in turn efficiency and productivity of the organizatoion. S.No. Content Number of Respondents % of Respondents 1 Agree 178 71.2 2 Indifferent 30 12 3 Disagree 42 16.8 250 100 145
Table 4.3.1 : Table showing opinion of males and females for Table 4.3 Opinion Row Total Agree Indifferent Disagree Male 132 22 21 175 Female 46 8 21 75 Column Total 178 30 42 250 Table 4.3.2 : Table for Chi Square calculation for Table 4.3.2 Groups OF EF OIJ-EIJ (OIJ-EIJ) 2 /EIJ Male Agree 132 124.6-7.4 0.43940 Indifferent 22 21-1 0.04760 Disagree 21 29 8 2.22000 Female Agree 46 53.4 7.4 1.02540 Indifferent 8 9 1 0.11110 Disagree 21 12.6-8.4 5.60000 Total 9.44350 146
X 2 = (OIJ-EIJ) 2 / EI X 2 = 9.44350 Degree of freedom = (Column-1) X (Row-1) = (3-1) X (2-1) = 2 Significant level = 5% Table value for X 2 for 1 degree of freedom at 5% significance level = 5.991 Conclusion: Calculated value of Chi Square [9.44350] is greater than the table value [5.991]. So we reject the null hypothesis and conclude that proper security system and data security inturn efficiency and productivity are dependent. That is proper security system increase data security and in-turn productivity and efficiency of the organization and security system. 147
4.4 Hypothesis 4: Proper identification system reduces absenteeism H0: Proper identification system and absenteeism are independent H1: Proper identification system and absenteeism are dependent 9. Table showing views about the proper identification system reduces absenteeism Table 4.4 : Table showing views about the proper identification system reduces absenteeism S.No. Content Number of Respondents % of Respondents 1 Agree 183 86.8 2 Indifferent 17 6 3 Disagree 50 7.2 250 100 148
Table 4.4.1 : Table showing opinion of males and females for Table 4.4 Opinion Row Total Agree Indifferent Disagree Male 125 12 38 175 Female 58 5 12 75 Column Total 183 17 50 250 Table 4.4.2 : Table for Chi Square calculation for Table 4.4.1 Groups OF EF OIJ-EIJ (OIJ-EIJ) 2 /EIJ Male Agree 125 128.1-3.1 0.075 Indifferent 12 11.9 0.1 0.0008 Disagree 38 35 3 0.2571 Female Agree 58 54.9 3.1 0.175 Indifferent 5 5.1 0.1 0.0019 Disagree 12 15-3 0.6 149
X 2 = (OIJ-EIJ) 2 /EI X 2 = 1.1098 Degree of freedom = (Column-1) X (Row-1) = (3-1) X (2-1) = 2 Significant level = 5% Table value for X 2 for 1 degree of freedom at 5% significance level = 5.991 Conclusion: Calculated value of Chi Square [1.1092] is less than the table value [5.991]. So we accept the null hypothesis and conclude that proper identification system and absenteeism are independent. That is proper identification system does not bring any change in the absenteeism directly. 150