Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA)

 

An existing order for the writing was made before, and I need help conducting my thesis’s statistical section. I will share the research methodology later on
for more information. The survey has been done, and the dataset is ready for EFA.
Please see the short descriiption below.
Full Research Title: Developing a Validated Scale of Critical Factors Affecting Fast-Track Construction Management for Infrastructure Projects
The main objective of this research is to develop a validated scale to measure the critical factors causing delays in mega-infrastructure projects that employ
a fast-track construction management method to enhance project performance and satisfy client objectives.
Specifically, the study will address the following:
1. Determine the critical factors based on existing literature and studies.
2. Analyze the obtained list and get feedback from industry and academic construction management experts to develop a scale of critical factors.
3. Refine the scale using the Exploratory Factor Analysis (EFA) and reliability analysis.…
Show more

 

Sample Solution

This research aims to develop a validated scale of critical factors affecting fast-track construction management for infrastructure projects. The study will utilize a multi-method approach in order to achieve its objectives. Specifically, the research shall first begin by determining the critical factors that can potentially lead to delays in such projects based on existing literature and studies.
This list of factors will then be analyzed and further developed through feedback from industry experts and academic professors specializing in construction management. This exercise would involve interviewing these experts so as to gain insights into their views related to the identified potential risks, which could then be used to create an appropriate set of scaled items capturing each factor’s importance (Ashraf et al., 2011). This step is necessary because it enables researchers to get an understanding of how different stakeholders perceive risk levels associated with various elements involved with fast-track methodologies employed by mega-infrastructure projects. Furthermore, conducting interviews provides an opportunity for participants to suggest additional risk components that may have been overlooked or not fully addressed during previous steps (Agisilaou et al., 2014). Once all information is gathered, it should then be refined further into a valid and reliable scale suitable for use in survey questionnaires when assessing fast track project performance.(Hassan et al., 2020).

Cyberstalking comes under the typology of cyber-violence, which is an online behaviour that leads or constitutes to assault against the well-being of an individual, or a group (Herring, 2002). As, cyberstalking is involved using the internet to gather personal information about the victim, this is a violation of privacy creating a form of intimidation leading to in some cases explicit threats. This can affect the victims’ emotion, psychological and physical well-being. Ellison and Akdeniz (1998) had constructed the term cyberstalking as an online harassment, due to the crucial component of harassment being a repetitive behaviour. The main element of this case is ‘cyberstalking’ with the involvement of ‘harassment’. This brings in theory by Ellison & Akdeniz (1998), as the harassment of Rosica was repetitive until reported. In addition, other claims stated, “seven other women have told authorities that he also harassed them in a similar fashion to the victim in the criminal case”.

The first theory that is going to be discussed is, ‘Space Transition Theory (STT)’ (Jaishankar, 2008) which was created to demonstrate the causation of crimes in cyberspace. STT is an explanation about the nature of the behaviour of the individual who brings out their non-conforming and conforming behaviour in the physical and cyberspace. This theory argues that people tend to behave differently when moving from one space to another.

 

 

The second theory is ‘Liquid Modernity’ developed by Bauman. In liquid modernity, the web has a momentary value, the past and future become meaningless as coordinates of the psychological life of the individuals’ present (Bauman, 2009). The reason and reality tend to break down the subject having the illusion of being omnipotent, omnipresent and immortal (Carabellese et al., 2014). Therefore, on the web, the other cannot be met as a real person but in terms of an empty simulacrum, convenience and appearance (Baudrillard, 1981), lacking its own identity defined in its spatial and temporal coordinates (Cassinari, 2005).

Space Transition Theory concludes seven key postulates, (1) person, with repressed criminal behaviour (in the physical space) have a propensity to commit a crime in cyberspace which they would not commit in physical space, due to their status and position. Due to Rosica being an ex-cop restricted him committing a behaviour in physical space, as he had to maintain his status and position of being an ex-cop. (2) Identity flexibility, dissociative anonymity and the lack of deterrence factor in the cyberspace provides offenders with the choice to commit cybercrime. Rosica had the accessibility to create a fake online identity in which he did (Katy Jones), this was the identity flexibility factor. This meant that his real identity was hidden/

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.