2 HI6008 Research Proposal Assignment Sample
Here’s the best sample of 2 HI6008 Research Proposal Assignment, written by the expert.
Cyber Security On Business
Introduction
This research paper is based on the cyber security for the business expansion process of several industries. Although, nowadays, most of the organizations are applying the cyber security framework to secure the confidential data to implement more advanced marketing strategies. This research proposal will evaluate different aspects of the cyber security framework to enclose suitable marketing strategy to the business enterprises. In addition, this research paper will analyse a wide range of the secondary data regarding the cyber security structure to determine the contribution of advanced technology. In contrast, the research methodology and research design both will be analysed in this research proposal for a conclusive result. Besides that, the research will also give a suitable recommendation regarding the cyber security framework to increase the performance of a business firm. Moreover, the researcher will apply different research methods to analyse the research methodology and data collection process (Leemans and Solecki, 2013).
Project Objective
In order to develop a successful research proposal, the research objectives are playing an essential part and the researcher will find a suitable conclusion with the help of the research objectives. Moreover, the research objectives are discussed below:
- To examine the contribution of cyber security in business process
- To analyse the scope of cyber security problems in business
- To determine the role of cloud computing in cyber security structure
Project Scope
The scope of the project is clear and it defines the contribution of the cyber security in business. In addition, another scope of the project is to define the implications of the cyber security for analysing the intentions of cyber criminals. The researcher will analyse different aspects of the cyber security to determine the applications of the digital information system. Moreover, aim of this research paper is to justify the contribution of cloud computing and cyber security to ensure the information of both customers and workers of an organization.
Literature Review
The essential objective of this investigation is to perceive the impacts of the cyber security upon the business firms. This literature review segment goes will analyse the possibility of the cyber security such as the capacities worried inside the cyber security to vanquish the internet issues faced by methods for the venture business of their on-line entries and inside the cloud hoarding. According to Dickson (2012), his literature review includes several components of cyber protection provided through the cyber security systems. Along these lines, the ideal procedures that management can implement with the IT guide of the cyber protection within the workplace. Besides that, this research proposal will define the expression as “Cyber security issue” after analysing lot of factors and selective guidelines. On the other hand, there are four essential measurements of the cyber security will be explained through in this literature review. The researcher is playing the main role to analyse challenges and issues of cyber security to offer right protection plan inside the measurements of a business firm. Aside from that, the cloud drives show as best storage option for the general data procedure to information encryption regarding the online systems. This mechanical capacity has been built up inside the online method to reduce the data lose in cyber security for securing both personals information and corporate data. With the support of different business firms rereading online structures of Cyber security, the management of an association can consider type of specialized cyber edges, methods and the practices that permits to shield for online systems, electronic systems drives. In order to keep the spared information inside the cloud stockpiling, registering access is required for information security for the cyber protection and the physical securities. According to Wills (2017), the cyber security offers safeguard in the state of corporate approach like programming security, customer information protection, organize protection, information recovery and displaying the general operational protection.
Issues and challenges of cyber security
In the field of cyber security, the authority needs to improve the manageability of servers inside the system. There are regardless a couple of issues that have been revealed as a serious threat to cyber security like as ransom ware, DDoS assaults, hacktivisms et cetera. Each abd every circumstances includes challenges, which are gone up against by online methods for the business firms regarding the cyber security systems. Moreover, some threats of cyber security are discussed below:
Ransomeware: it maintains a spotlight or digital barrier to restrict the entrance of the clients inside the cloud stockpiling drives. In other words, ramsomeware sporadically debases the genuine data or information inside the cloud stockpiling to spoil access. According to Bloch (2014), ransomeware is fundamentally a PC malware or virus that causes the cyber delinquents to give basic information and digital evidence. In this way, the exercises of the cybercrimes had been lifted and the dangers of losing cash from colossal partnerships widely across the globe. The cyber offenders does not always arrange techniques to defeat malwares from the association’s database, if they had been embedded to apply that for more noteworthy criminals exercises and for money related fraud case. On the other hand, there are various types of organizations might manage extreme requesting circumstances from DDoS attacks as a major threat of cyber security. As per Fairfield-Sonn (2012), the cloud storage is basically based web general execution and administration firms that are the prime drawbacks of the DDoS issues. In regards, DDoS has been prominent for the online exercises that might exist constantly abused by the damage of terabytes. DDoS is decelerating down the level of the aggregate web activities of the movement due to the recurrence that effect continually raised from quite a while prior. Although, the degree and the measurements of those sorts of breaches may furthermore wander the associations barriers independent of the measurements of the cloud storing and the database(Cahill, 2012).
Hacktivism: this digital technique of the cyber-criminal’s action isn’t generally instantly associated with the benefit picking up or money burglary capacities. In this manner, the associations ought to know about games of hackers inside the web-based social networking sites. In the indistinguishable time, the management needs to always screen the general procedure of customers’ connections inside the official websites and different social media networking stages(Koulafetis, 2016).
Internet of Things (IOT): it is the most inspected and the greatest specified mechanical for digital development in this contemporary century. Aside from that, the business venture gatherings and the customers are being lined up with the IOT system. It likewise makes the regular strategy for the equipment network done the product oriented activities. Besides that, most of the customers want to offer the private insights like name, mail ID and Google address. There might be immediate report with the cell phones that is used by the cybercriminals to hack the general machine of the IOT. The management of a firm needs to furnish the cyber security programmers for a secured entrance with the selective information. That is one of the generous cyber security dangers for the savvy contraptions who are included with the urgent essential information. According to Watson and Jones (2013), those insights has been revealed shamelessly to the cyber culprits due to loss of wellbeing measurement from the clients. Reliable with the McAfee, a couple of stock related with the web of things capacities can give a secured entrance by the non-open information to the cyber culprits that can be considered as a prime danger for the customers also.
Dronejacking: it is a non-unordinary practice for many organization to make a certain utilization of the automatons forhaving great capacity to overview and recognize activities of people. In this way, the fundamental components of the business venture with regards to the document posted by methods for McAfee includesan automaton jacking occurrences. This hacking process goes excessively quickened by methods for the cyber offenders with a reason to recover the basic information for further utilization to satisfy the criminal enthusiasm of the business firm. Occasionally it has been unmistakable that, the cyber lawbreaker’s makes an utilization of confidential data to uncover the social exercises of the business firms to find out various infer of ruining the notoriety of the business.
Implications of cyber security in business associations
The entire digital information exchange regarding cyber security is now decoratedby the primary zones from where the gainful imagination associations can get vital points of interest from the cyber securities. Aside from that, the web stages and the cloud computingboth have given an immense credibility to the business organizations to keep their data actualities and individual records of the workers in a contact frame. Various applications of the cyber security have been supported by the utilization of various researchers in the field of online networking stages. However, this technique enhances the customer’s connections for advancing the propelled stock to give benefits through cyber security for also advancing product security inside in the commercial industry.
The greater part of these are the not bizarre preferences from the web stages and from the cyber establishing that has been given to an innovative mastery by following methods for the organizations. According to Miller (2013),the indistinguishable time to save the general cloud stockpiling with no dangers of information exchange process. Although some essential advantage of the cloud information includes a core section to the whole information system from anyplace inside the globe. On the other hand, the market growth methodology of the particular business firms need to get smooth operational process for delegation. In addition, the management requires to hold an extra equipment gadget for getting urgent information while moving with a project. Thus, the associations can take reasonable strategies so it will improve the innovative dependability with the guide of taking appropriate techniques and mechanical securities to achieve desired goals and objectives.
Research questions/ Hypothesis
In order to complete the research study, the researcher will provide answer the following question:
- What is main cyber security challenge in the business and how can companies overcome this?
- What is need of cyber security in the business in the current business environment?
- What are main challenges companies faces in the context of cyber security?
- What are ways that can be adapted to overcome the issues or challenges of cyber security?
Research Design and Methodology
Research method
To accomplish the research study as to identify the challenges of the cyber security in the business, quantitative research methodology will be used. The qualitative research is based on the secondary data and the researcher needs to review a wide range of secondary resources such as books, journals and the internet. The researcher needs to visit business leaders and managers to gather the secondary information to develop a successful qualitative research proposal. Qualitative research study, design of the study determines how the researcher will collect data. In this, it is found that the researcher will use secondary sources such books, journal, internet and news paper that will develop theoretical understanding of the research study (Kendrick, 2015). In this, it will also be helpful to develop the literature review as well as research understanding. In the research methodology, qualitative research method allows the researcher to develop the theoretical understanding on the research issues and problem. Beside of this, quantitative research study is overlooked because it leads to required quantitative research that is not required in this research. To accomplish this research study with the qualitative research study, the researcher will follow bellow step:
Data collection method
The data collection method allows the researcher to collect the required data and information for the research study. In this, it is found that researcher will use both kinds of the data collection method such primary and secondary. Under the primary data collection method, researcher will use books, literature, journal, and internet. It is the significant step of the research study in which the researcher collects the data according the research design. In this, research data will analyse the past literature collect the required information. However, it is possible that researcher can get gap in the required information and available information (Christensen, 2013). For this, the primary research study will can be used conducted. So that to minimise the gap between the available information and required information. Moreover, in this context the researcher will conduct the interview from the IT manager of the different companies.
Sampling
Sampling methods are divided into two segments such as probability and non-probability sampling method. With the support of non-probability sampling method, the researcher can randomly select the respondents for the interview purpose. However, the researcher needs to follow some guidelines in the case of probability sampling method to select proper respondents. For this, researcher will select 10 IT managers of different companies. In the reference of this, a questionnaire will be prepared that will asked during the interview (Vogt, 2011).
Data analysis method
In the research methodology, there are various data analysis methods that are used by the researcher to analyse the data. It is a way of improving the quality of the collected data. In this, content analysis/ thematic data analysis, descriptive analysis, and can be used. In the reference of this, the researcher will content analysis/ thematic data analysis will be used. In this, the collected data will be analysed in the qualitative manner and supported by the findings of the secondary research study (Muijs, 2014).
Expected findings
The above determined research methodology will be helpful for the researcher to get the expected research in the context of the research questions and research objectives. In this, it is expected that researcher will get the information on the role of the cyber security in the business. As completing the research study, the researcher will also be able to develop the knowledge and understanding on the challenges faced by the companies. At the same time, it is also expected that findings of the research study will also determine how companies can improve its security network (Vogt, 2011).
Research limitation
The researcher might face some issues regarding the research paper such as financial issue and time management of the respondents. Along with that, the researcher requires sufficient amount of funds to analyse the collected information. Similarly, funds arrangement can be considered as a research limitation in this case. Most of the respondents suddenly leave the interview due to lack of time(Muijs, 2014). In that kind of situation, the researcher needs to request to the respondents but the researcher cannot force anybody to complete the interview. In other words, lack of time can also be considered as research limitation. Lack of secondary information is another research limitation that can reduce the quality of the research proposal.
Time schedule
Activity | May | June | July | August 2018 | |||||||
Date | 25 | 26 | 2 | 13 | 20 | 26 | 3 | 15 | 6 | 12 | 23 |
Week No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Meetings
|
|||||||||||
Develop questionnaire | |||||||||||
Take interview
|
|||||||||||
Data collect | |||||||||||
Data Analyze | |||||||||||
Write Conclusion | |||||||||||
Project Submission |
|
||||||||||
Conclusion
This research proposal has analysed the contribution of the cyber security system for ensuring the confidential information. Although, the researcher has reviewed different secondary resources to justify the contribution of the cyber security in business process by analysing different research methods and techniques. Moreover, this research proposal had established the dignity and contribution of cloud computing and cyber security to manage online marketing of an organization.
References
Bloch, F. (2014). Evaluating manpower training programs. Greenwich, Conn.: JAI Press.
Cahill, D. (2012). Lifestyle Market Segmentation. Hoboken: Routledge, Taylor and Francis.
Christensen, L. (2013). Experimental methodology. Boston: Pearson/Allyn and Bacon.
Dickson, E. (2012). Urban risk assessments. Washington, D.C.: World Bank.
Fairfield-Sonn, J. (2012). Corporate culture and the quality organization. Westport, Conn.: Quorum Books.
Kendrick, T. (2015). The project management tool kit. New York: AMACOM/American Management Association.
Koulafetis, P. (2016). Modern credit risk management. UK: SEGA.
Leemans, R. and Solecki, W. (2013). Redefining environmental sustainability. Current Opinion in Environmental Sustainability, 5(3-4), pp.272-277.
Miller, K. (2013). IEEE Cloud Computing. IEEE Transactions on Cloud Computing, 1(2), pp.230-230.
Muijs, D. (2014). Doing quantitative research in education with SPSS. London: SAGE.
Vogt, W. (2011). Data collection. Los Angeles: SAGE.
Watson, D. and Jones, A. (2013). Digital forensics processing and procedures. Amsterdam: Syngress.
Wills, H. (2017). Issue Information. Employment Relations Today, 44(2), pp.1-4.
________________________________________________________________________________
Know more about UniqueSubmission’s other writing services: