LD7091 Research Methods for Professional Practice Assignment Sample 2023
Part A – Reflective CPD (continuous professional development) submitted individually
● Strengths
● I have strengths in developing adequate information from secondary sources. ● My strengths also are in identifying proper research techniques. |
● Weaknesses
● I have ineffective time management, which can create problems at the time of dissertation development. ● I also can face problems regarding my insufficient budget management.
|
● Opportunities
● As I have strengths in adequate secondary information gathering from articles and journals therefore I can have the opportunities for maintaining quality through secondary research. ● As I have strengths of identifying accurate research techniques thus I can have the opportunity of reaching the end of this research without facing any type of disruptions. |
● Threats
● Due to my ineffective time management capability, I can have threats of delays at the time of dissertation development. ● I also can face several disruptions due to lack of budget by mishandling of budget within this dissertation. |
Table 1: SWOT Analysis
(Source: Created by Author)
From the SWOT analysis table, I have found that I have strengths in developing adequate information from secondary sources. In the opinion of Ahmad and Karim (2019), adequate information accumulation is an essential factor for developing a research effectively and also generating proper outcomes of this research. Therefore, this is often helpful in engaging a major amount of people towards the research by involving a high amount of innovativeness and efficiency. In case of this research, issues of cyber security as per the increments of IT technologies utilisation, I can engage majority of security organisations towards this research. On the other hand, as I have opportunities in maintaining quality throughout this research thus it can help me in inducing significance and scopes of this context. As stated by Pandey and Pandey (2021), determination of proper research techniques often guides any research in developing proper conclusions and recommendations in research. Furthermore, I have potential strengths in determining research techniques therefore I can gain benefits by selecting effective research procedures which can maintain significant sustainability in this research. I can thus achieve aim and objectives of this research. For this research, I have decided to pick positivism research philosophy, deductive research approach, explanatory research design, secondary qualitative data collection and thematic data analysis for gaining success in developing this dissertation. These can assist me in determining issues of IT professionals which they face at the time of providing cyber security and consequences of cyber security issues. Furthermore, as influenced by Adams and Lawrence (2018), I have opportunities of developing smooth research conduction without having any disruptions which can help me in developing most appropriate recommendations and thus engaging a maximum number of IT professionals. Therefore I can enhance the benefits of this research. In compliance with this, I can gain a huge amount of advantages by utilising my strengths at the time of dissertation development.
Besides that, I have weaknesses in ineffective time management. As a result I may not be able to maintain a research timeline or Gantt chart during dissertation development. As regards by Aeon and Aguinis (2017), ineffective time management is a crucial limitation of researchers which can create barriers in engaging large groups of audiences. Other than this, I also can face several disruptions at the time of this research establishment due to this ineffective time management. Threats of delay can decrease quality of research conduction for completing this research in scheduled time. Furthermore, insufficient time management also can reduce efficiency and productivity of context and thereby research techniques cannot operate significantly within research. On the basis of this, I can have the chance of not being able to meet research aim and objectives in a significant way. In compliance with this, this weakness needs to be improved by me before developing this dissertation. As a result, I can develop a personal development plan regarding this for ensuring proper improvement.
Other than this, ineffective budget management also can create constraints within research. Therefore, I have determined that my improper budget management can develop barriers in acquiring most significant information gathering by including appropriate articles and journals. As developed by Hashim and Piatti (2018), insufficient budget management can develop abruptions in smooth working and in reducing quality of work due to decrements of quality among required resources. Thus I require developing this to avoid limitations of this research. In addition, I further can face severe problems in maintaining ethical consideration during dissertation developments due to this budget management. Therefore, from personal ability and disability, I have found that I require developing effective strategies and action plans for maintaining proper personal development. As described by Kivimäki and Meriluoto (2018), Personal development plan often takes an essential part in developing personal skills for increasing self-efficacy. It also can help in ensuring the progress of developments. Thus I have developed my personal development plan for improving my time management and budget management skills before developing this dissertation. In accordance with this, I have found that I can prevent the limitations of research by improving these skills.
Objectives | Activities | Resources | Time Bound |
To maintain time management | ● I can attend training regarding this.
● I also need to take professional guidance and help for improving this. ● I further require an internship in an institution for handling time perfectly. |
● I can take help from several online articles and journals for determining strategies of maintaining time management. | I can take two months to develop it. |
To maintain budget management | ● I can attend seminars or webinars for acquiring this knowledge practically.
● I also can take help from my University or other key people for gaining sponsorship for this research. ● I further need to prevent my wastage of expenses and mishandling to save it. |
● I can utilise computer and internet for spreading the promotion of this research for enhancing sponsorship.
● I also can use books, journals and articles for understanding approaches for saving expenses. |
I can take three months of time to develop this skill. |
Table 2: Personal Development Plan
(Source: Created by Author)
Part B – Research Log – Up to 10 separate entries submitted individually
I have developed a log of this research which has ten factors of actions. As discussed by Hamlett and Lacy (2017), research logs often help researchers in ensuring the required action conduction. Thus it can assist me in developing proper benefits in this research by developing sufficient actions at the time of dissertation development. At first, I have conducted the actions of topic selection for this research and also developments of covering regions of this context. I have taken one week to conduct these actions. During the period of topic selection, I have found that cyber security related issues are inducing day by day among IT professionals and it has major dangerous consequences within different organisations. Thus for providing effective and beneficial recommendations to IT professionals by analysing cyber security related issues in a critical way, I have selected this topic for my research. After that, by determining covering regions of this research, I have learnt that it is very important at the time of research conduction as cyber security issues develop several perspectives and multiple classifications. Thus identification of covering limit has helped me in scrutinising a selected region in a detailed manner. Other than this, developments of research aim, objectives and questions have been derived by me after that within one and half week. As observed by GURL (2017), determination of aim, objectives and questions is essential in confirming proper outcomes of this research. By developing aim, objectives and questions for this research, I have learnt that analysis of cyber security related challenges on induced implementation of IT technologies for eradicating these is aim of this research.
On the other hand, for achieving this, objectives and questions have been constructed. Different kinds of cyber security related issues, impact of it, existing strategies of IT professionals for resolving these and future recommended measurements for improving these strategies are major focusing areas of objectives and questions of this research. By developing these actions I can gain major benefits in ensuring deliverables of this research at the time of dissertation preparation. Furthermore, evaluation of existing literature further has been done in this research for developing sufficient critical knowledge and determining gaps of previous research over the recent one within three weeks. Therefore, by conducting this, I have been able to learn that there are several loopholes like lack of sufficient information and deficiency in theory applications in earlier research which can be mitigated in this context. In the fourth stage, I have developed identification of effective techniques for this research. It has taken a period of two weeks to establish properly.
By developing this, I have found that I need to implement secondary qualitative data collection for establishing detailed information within this study. As opined by Carpenter (2018), secondary qualitative data collection can assist a researcher in developing innovativeness and quality within research. I have been able to come to know that positivism research philosophy, deductive research approach and explanatory research design can help me for developing secondary qualitative data collection in an effective way. Besides that, development of significant operations of research methodology for developing significant research results. At the time of developing this entry, I have learnt that research methodology has a crucial factor in achieving aim and objectives of this research as it helps in identifying most appropriate solutions to the research questions. Furthermore, accumulation of secondary data collection has been planned for four weeks in this research. From this factor, I have understood that secondary data collection can assist me in developing proper quality in this context. On the other hand, this also can support me in understanding scholarly and peer-reviewed opinions regarding recent topic. As determined by Johhson and Sylvia (2018), secondary qualitative data collection provides detailed, analytical and critical data. In relation to this, I can be benefitted by developing significant conclusive statements and in determining beneficial recommended strategies in this study.
Apart from that, interpretation of this information would be completed in dissertation within three weeks. Interpretation of collected information guides researchers in differentiating collected information as per the basis of demands. Analysis of information by developing different themes also will be made after that and also I have decided that it can take time of two weeks. As asserted by Bishop and Kuula-Luumi (2017), analysis of secondary information by using thematic analysis process is always helpful for determining different perspectives of research topic by comparing information of different themes. Developments of linking with objectives have been developed henceforth for ensuring meeting of research objectives in an adequate manner. From this, I have learnt that linking with objectives can aid me in understanding my knowledge gained after meeting a specific objective. Thus it can help me in developing a better insight related to this research topic. Based on this, I can develop proper people engagement towards this research with this. Above all, conclusion and recommendation development would be completed in three weeks. I have learnt that I can be able to develop proper results and success for this research by determining this. As suggested by Johnston (2017), developments of conclusive statements and recommendations can assist researchers in attracting concerned people towards this context by providing benefits to them. Therefore this can help me in developing significant achievements of aim of this research. As a result, this also can help me in enhancing efficiency and productivity of recent research. In accordance with this, I can reach the end of this study without having any types of conflicts and confusions. Finally, determination of future scope by understanding limitations of this research will be developed in this research by taking time of two weeks. These can provide advantages to me in determining gaps of this research and failure of this context. This further can assist me in determining proper strategies for mitigating these gaps in future. Thus research limitations and future scope can assist me in developing critical analysis of recent research. Taking these into account, entire logs of research can guide me in developing accurate progress of this research. Thus it can help me in achieving major success from this research.
PART C- Research proposal
3.1Introduction
Brief summary of activities that will be undertaken in this project
In today’s world of digitization, several cyber security issues are creating a disaster for multinational companies. Such risks aim to revive confidential documents from the company’s IT system. IT is an estimated fact that most of the business companies are using IT technology to record their daily transactions. The proposed research aims to analyze the cyber security issues that have to be faced by such private and government institutes while using computing tools and technologies. Therefore, activities will be undertaken in this proposal to evaluate several secondary resources so as to amend preventive measures. Its tools constitute a majority of computing and IT, including laptops, computers, networking cables and many more machines that can store and process information in an efficient manner. Activities also include analysis of recent research articles that can provide a clear idea about the cyber security issues faced by multinational companies and the way they deployed to mitigate such issues.
Worthiness of this project and relevancy to students and to computing
This project is relevant to today’s era of globalization. Business sectors aim to expand globally and in such a scenario, they need to communicate with people from all over the world, using internet technologies (Puthal et al. 2017). As a result, various data and confidential documents are managed and transferred through computers and networking systems on a regular basis. However, lack of preventive measures can lead to cyber security issues and all such financial documents can be manipulated by hackers. Therefore, this topic is relevant to computing as it helps in recommending strategies that can be deployed to mitigate issues of information technology. Moreover, relevance to students can be proven as this proposal helps in providing information about the types of cyber risks and their impact on IT departments.
Aim of this project
The aim of this project is to analyze the cyber security issues that are faced by increasing use of IT technologies and to outline ways that can imitate such issues of IT tools.
Research Scope
The scope of this proposal shall outline the types of cyber risks that are faced by business companies that use IT technologies on a regular basis. Similarly, ways shall be outlined that are deployed by multinational companies while mitigating such ways and several other preventive measures shall also be recommended in this proposed research (Samimi, 2020). The scope of this proposal is wide enough to help readers from several sectors as IT tools are used in several aspects in today’s world of digitization. Authorities from healthcare, business, government bodies and education shall be benefited from the project.
Research objectives
- To identify the cyber security issues faced by IT departments
- To evaluate the challenges faced by various companies due to cyber risks
- To analyze the strategies that are deployed by IT departments to mitigate the cyber risks
- To recommend preventive measures to mitigate such cyber issues from creating a disaster
SMART objectives
Specific: To provide 100% security to IT tools through preventive measures and by informing readers about the cyber security technologies.
Measurable: To inform IT users about the authentication system so that no unauthorized users can use a private network and to measure its quality by analyzing the risks of cyber issues after implementation of this authentication system.
Achievable: To train employees of the IT department to predict cyber risks and deploy preventive measures to prevent a disaster.
Relevant: To install a firewall to restrict unauthorized access to frequently used port
Time-bound: To be completed within three months from the starting date.
Research Questions
- What are the cyber security issues faced by IT departments?
- What are the major challenges that are faced by various companies due to cyber risks?
- What are the strategies deployed by IT departments to mitigate the cyber risks?
- How can preventive measures be used to mitigate such cyber issues from creating a disaster?
3.2. Literature Review
Conceptual framework
· Hacking
· Phishing · Ransomware
|
Types of cyber risks that can impose a challenge on IT departments
|
Analysis of Cyber security issues on the increasing use of IT technologies and outline ways of mitigating those cyber risks
|
Challenges faced by IT departments due to cyber risks
|
Preventive measures that can be used to mitigate the cyber risks
|
Figure 1: Conceptual Framework
(Source: Created by Author)
Types of cyber risks that can impose a challenge on IT departments
There are various types of cyber risks that can impose a threat to IT departments. Its tools and technologies are used in several dimensions and IT is necessary to analyze the dangers imposed by such cyber risks. Moreover, relevant information about the types of cyber risks assists users to deploy protective and preventive measures so as to mitigate the issues. As stated by Nurse (2018)., the main aim of such hacking activities is to gain unauthorized access to confidential documents and most of the hacking activities aim to create a technical disaster. There are types of cyber risks that are imposed upon multinational companies and IT departments of other sectors. These are hacking, ransomware and malware attacks.
Hacking
Hacking of websites relates to the fact that an unauthorized user tried to get access to the confidential information that is stored in the computers of an organization. As a result, hackers try to manipulate, tamper or delete the files from the system. This type of hackers are bribed by rival cookies and IT aims to create a disaster for the victim firm. As influenced by Perumal et al. (2021), hacking is also done to gather financial information from IT tools and technologies, such hacking can result in bankruptcy of victims and can lead the business companies into losses. The major activities of hackers are to breach the security system of computers and get access to all data and intonation that is tired in a computer. Such hacking activities can be disastrous as manipulation of documents can lead to loss of records.
Phishing
Phishing is a threat that is imposed by trustworthy individuals. For example, individuals may get messages to share their bank account numbers and card details. As commented by Ghazi-Tehrani and Pontell (2021), such messages are actually sent by hackers and executives of IT departments must be aware of such breaches and cyber attackers. The major issue with phishing is that IT is sent from a trustworthy contact. IT is hard to differentiate and easy victimization occurs.
Ransomware
Ransomware is a type of malware that aims to revive data from computers. This malware encrypts the data that is present in IT tools and unlock codes to analyze confidential information. Most of this ransomware are sent through emails (Humayun et al. 2021). This is also a common what if attack as multinational companies get thousands of mail every day and IT is tough to understand which mail contains such malware.
Challenges faced by IT departments due to cyber risks
A number of challenges have to be faced by IT departments when their system is facing cyber-attacks. The challenges include customer dissatisfaction as cyber hackers manipulate customer data and gain access to financial data of customers as well. One of the other challenges is to face the financial crisis. As commented by Okereafor and Adelaiye (2020), when cyber hackers target the financial documents of a firm, financial transactions can be illegally shut down by cyber hackers and the victimized company can face bankruptcy as well. Moreover, the company’s brand reputation is affected and the brand image faces adversities in the global platform. As a result, multinational companies face loss of customer loyalty as well. For example, Tesla has faced issues where cyber hackers attempted to hack the security of their car Model S. As a result of this hacking, cars can be stolen from any place by cloning its security codes (Winder, 2019). As inspired by La Torre et al. (2018), customer data and confidential data of project structure can be leaked through cyber hacking. As a consequence, rival companies may gain competitive advantage by getting access to future project proposals of business. Moreover, data leakage is another challenge faced by IT departments. Similarly, leakage of customer data can lead to loss of brand image and brand reputation on global platforms (Ghadge et al. 2019).
IT tools and technologies are used by multinational firms to store relevant data that can help the firm to function efficiently. Similar computing technologies are also used to keep records of customer demands. Cyber attacks can manipulate such data and Manipulation of data can lead to the revival of wrong information to the IT department. As a result, customers cannot be accessed efficiently and their demands cannot be fulfilled as well. Data can also be manipulated from websites which lead to access of wrong information by customers. Similarly, brand image can be lowered by manipulation and tampering with necessary data from databases that are stored in IT tools. Overall, IT can be stated that cyber security issues can not only lead to loss of brand image or reputation, but IT can levy a severe economic crisis on victimized companies.
Preventive measures that can be used to mitigate the cyber risks
A number of preventive measures can be adopted by companies to mitigate the cyber issues. Moreover, IT is recommended to use preventive measures so as to mitigate cyber disasters from occurring. As influenced by Jain and Gupta (2020), preventive measures are better than deployment of corrective measures after a cyber attack has taken place. Preventive measures include deployment of firewall and authentication of ports. Cyber hackers can lead to several challenges which can be predicted and mitigated by using certain preventive measures.
Firewall
Firewall is a network security device that can manage excessive traffic over berks. Newark trafficking makes IT easier for cyber-catchers to enter the website and manipulate confidential data. As commented by Jawahar et al. (2021), a firewall is a device that can be installed so that necessary traffic can be blocked. Moreover, firewalls can be used to mitigate access to the network. Firewall is a device that can monitor incoming as well as outgoing traffic. Moreover, IT blocks unnecessary traffic and such blockage is seen as sep security rules. It is an effective preventive measure that does not allow any malware or hacker to enter the networks to get access to confidential data present in IT tools.
Authentication of ports
Authentication of several network portals can be done so that no unauthorized users can enter through the networks. Similarly, authentication measures that no unauthorized users can get access to the confidential files without getting permission from any authorized users (Major et al. 2020). Authentication is also a positive measure that can be levied upon networks so that the mode of entry of hackers can be closed.
3.3. Research Methodology and Planning
Research method
Research philosophy
Research philosophy aims to detect the beliefs and theories of researchers. Based on such beliefs and theories, data collection methods can be chosen. Moreover, the philosophy of research is to have a brief idea of the data analysis method as well. There are three major types of research philosophy-positivism interpretivism and realism. As influenced by Kothari (2004), positivism research philosophy will be chosen in this research so that advantages can be gained in collecting information. Choosing this philosophy can help researchers to gather reliable and valid data from secondary resources. Positivism research philosophy helps in gathering reliable data. Similarly, this method supports the data analysis process where different date patterns can be analyzed and hidden data patterns can be evaluated. Therefore, using this philosophy, researchers will be able to provide adequate information about cyber risks and their preventive measures as well.
Research approach
Research approach helps in formation of a framework or research plan that can assist in conducting various activities in this research. Similarly, research approach aims in organizing the task of research so that every task can be completed within a fixed amount of time. There are two types of research approach-inductive and deductive. As inspired by Saunders et al. (2007), deductive research approach is chosen by researching this research. Deductive research approach helps in creating relationships between the themes that are created in data analysis. Similarly, this approach will assist research to generalize the findings and will enable the scope of this research to be enhanced.
Research design
Research design helps in proving a frame that can help researcher to complete various research activities, forever, such a firework can help in analyzing the techniques that are suitable for this research topic. There are four types of research design-explanatory, exploratory, confirmatory and descriptive. Explanatory research design will be chosen in this research. Explanatory research design has several advantages and the major advantage that is gained in this research is the ability to explain every theme separately. Advantages can also be gained as a clear idea about the challenges of cyber risks can be depicted through this research proposal and steps can be taken to fulfill the objectives of this research.
Data collection method
Qualitative data collection method will be used in this research. As influenced by Graue (2015), secondary qualitative data will be gathered from reliable journals and articles. Peer-reviewed journals and articles shall be used to review data and incorporate them into this research. All data shall be gathered from articles that are published after 2017 and data will be rechecked from more than one source to provide valid data in this research.
Data analysis
Thematic data analysis shall be done in this research. Themes shall be made as per research objectives. Data shall be gathered as per themes and segregation of issues and preventive measures in terms that will help researchers to explain every topic in detail (Mohajan, 2018). Moreover, thematic analysis helps in decoding data patterns and eliminating literature gaps of secondary sources.
Gantt chart
Tasks | Week 1 | Week 2-4 | Week 4-7 | Week 7-9 | Week 9- 11 | Week 11-12 | Week 13 |
Topic selection | |||||||
Aim and objective development | |||||||
Literature review | |||||||
Research plan development | |||||||
Methodology finalisation | |||||||
Secondary data collection | |||||||
Thematic analysis | |||||||
Conclusive interpretation of findings | |||||||
Thesis development and proof reading | |||||||
Submission |
Table 1: Research timeline
(Source: Developed by researcher)
Task lists
Task to do | Time required |
Gathering of reliable secondary resources such as peer-revered articles and journals | 15 days |
Analyzing and gathering relevant knowledge about qualitative data collection methods and skills to conduct thematic analysis | 15 days |
Preparing of budget to conduct research activities | 1 week |
Gathering of data related to cyber risks and their preventive measures | 1 month |
Documentation of data | 15 days |
Table 2: Task list
(Source: Developed by researcher)
Risk assessment and management
Risks include tampering if gathered data. Researchers will be storing all relevant data in computers and use strong passwords to protect them. Data shall be stored in more than one folder so that any type of unauthorized access cannot manipulate or delete the information. All confidential data shall be copied and stored in pen drives or cloud computing models shall be used (Aloraini and Hammoudeh, 2017). Similarly, steps will be taken so that confidential data from official websites of multinational companies are used oy after taking prior permission. Risks shall be faced if wrong data are gathered and documented in this research. However, researchers will amend steps to recheck any statistical data or subjective information from more than one secondary source.
3.4. Conclusions
Considerations of this proposed topic
Ethical Consideration
Ethical consideration of this research includes maintaining the confidentiality and privacy of collected data. Researcher shall ensure that manipulation of recorded data does not occur. Moreover, these data will be gathered from reliable sources. Moreover, research will not change statistical data to gain advantage. Only true data will be documented in this research. Similarly, steps will be taken to conduct fair research. Permissions will be taken if any confidential information needs to be revived from secondary resources from official websites of government or private companies (Ervural and Ervural, 2018). If any situation arises where researcher predicts that any data is manipulated and is unreliable, such data shall be eliminated from documenting in the research.
Ethical consideration of cyber risks includes breach of confidentiality and privacy of documents. Multinational companies tore confidential fields in their computers. However, cyber hackers and unethical rivals aim to access such data for personal benefit (Future of tech, 2021). This is one of the major ethical issues faced by companies, as a result of cyber risks. Similarly, ethical considerations also include misuse of financial data. Many hackers manipulated financial data to gain financial support. As a consequence victims face bankruptcy and lack of economic support. Ethical issues lead to mismanagement of brand reputation and lead to breach of private data. Such private data can inform the formation of customers of a company. As a consequence, financial issues can be faced by customers of a company, if the company website gets hacked.
Legal Consideration
Legal consideration of cyber security includes amination of government laws that aims to protect private data of users. Such laws aim to provide acts and regulations so that data can be protected from cyber hackers. As per data protection act(2018), any hacker who aims to gain access to confidential and authorized data shall be punished. Similarly, this act protects data of government and private pragmatics and aims to provide security to users of IT technologies. The privacy and electronic communication regulations of 2009, aim to protect the private data of users and it also protects the interactions that are amended on social networks.
Social Consideration
Social impact of cybercrime can be dangerous as manipulation of research data can put research into financial risks. Similarly, tampering with confidential data and releasing such false data on the internet can lead to loss of reputation. Social issues can lead to cyberbullying of victims as well. Such issues can be handled by deploying preventive measures which shall prevent cyber harassment from occurring. Preventive measures include deployment of firewall to manage necessary traffic in network.
Security Consideration
A clear analysis of cyber risks leads to a discussion about data theft and loss of important documents from IT tools. Security considerations in this context include use of firewalls and authentication of portals to protect confidential and private documents. Consideration also includes protection of data by encrypting them with strong codes.
Professional Consideration
Professional issues can arise if research tools are hacked to gather confidential data. Such data can be hacked for financial advantages. Such issues have to be mitigated by not providing authentication details to unauthorized individuals (Carlton et al. 2019). Authentication details must be provided only to members who are included in this research. Professional issues include breach of data and such issues have to be handled by terminating unethical individuals from this research.
Reference list
Adams, K.A. and Lawrence, E.K., (2018). Research methods, statistics, and applications. Sage Publications.
Aeon, B. and Aguinis, H., (2017). It’s about time: New perspectives and insights on time management. Academy of management perspectives, 31(4), pp.309-330.
Ahmad, F. and Karim, M., (2019). Impacts of knowledge sharing: a review and directions for future research. Journal of Workplace Learning.
Aloraini, A. and Hammoudeh, M., (2017). A survey on data confidentiality and privacy in cloud computing. In Proceedings of the international conference on future networks and distributed systems (pp. 1-7).
Bishop, L. and Kuula-Luumi, A., (2017). Revisiting qualitative data reuse: A decade on. Sage Open, 7(1), p.2158244016685136.
Carlton, M., Levy, Y. and Ramim, M., (2019). Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills. Information & Computer Security.
Carpenter, S., (2018). Ten steps in scale development and reporting: A guide for researchers. Communication Methods and Measures, 12(1), pp.25-44.
Ervural, B.C. and Ervural, B., (2018). Overview of cyber security in the industry 4.0 era. In Industry 4.0: managing the digital transformation (pp. 267-284). Springer, Cham.
Future of tech (2021). Ethical Issues in Cybersecurity. [online] Available at: https://www.futureoftech.org/cybersecurity/4-ethical-issues-in-cybersecurity/ [Accessed on 21.12.21]
Ghadge, A., Weiß, M., Caldwell, N.D. and Wilding, R., (2019). Managing cyber risk in supply chains: A review and research agenda. Supply Chain Management: An International Journal.
Ghazi-Tehrani, A.K. and Pontell, H.N., (2021). Phishing Evolves: Analyzing the Enduring Cybercrime. Victims & Offenders, 16(3), pp.316-342.
Graue, C., (2015). Qualitative data analysis. International Journal of Sales, Retailing & Marketing, 4(9), pp.5-14.
GURL, E., (2017). SWOT analysis: A theoretical review.
Hamlett, A. and Lacy, M., (2017). Using Databases (with Research Log) Lesson.
Hashim, A. and Piatti, M., (2018). Lessons from reforming financial management information systems: a review of the evidence. World Bank Policy Research Working Paper, (8312).
Humayun, M., Jhanjhi, N.Z., Alsayat, A. and Ponnusamy, V., (2021). Internet of things and ransomware: Evolution, mitigation and prevention. Egyptian Informatics Journal, 22(1), pp.105-117.
ICAEW (2021). Top five cyber risks. [online] Available at: https://www.icaew.com/-/media/corporate/files/technical/business-and-financial-management/smes/bas-for-pba/top-five-cyber-risks.ashx [Accessed on 21.12.21]
Jain, A. and Gupta, N., (2020). Cyber crime. National Journal of Cyber Security Law, 2(2).
Jawahar, A., Gupta, A., Ansari, A., Paikaray, R., Ravi, S. and Alagesan, M., (2021). Application Controlled Secure Dynamic Firewall for Automotive Digital Cockpit (No. 2021-01-0140). SAE Technical Paper.
Johhson, E. and Sylvia, M.L., (2018). Secondary data collection. Critical Analytics and Data Management for the DNP, p.61.
Johnston, M.P., (2017). Secondary data analysis: A method of which the time has come. Qualitative and quantitative methods in libraries, 3(3), pp.619-626.
Kivimäki, V. and Meriluoto, S., (2018). Holistic perspective to individual study plan: Personal Development Project Plan. In Transforming our world through design, diversity and education (pp. 514-526). IOS Press.
Kothari, C.R., (2004). Research methodology: Methods and techniques. New Age International.
La Torre, M., Dumay, J. and Rea, M.A., (2018). Breaching intellectual capital: critical reflections on Big Data security. Meditari Accountancy Research.
Major, W., Buchanan, W.J. and Ahmad, J., (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, pp.1-23.
Mohajan, H.K., (2018). Qualitative research methodology in social sciences and related subjects. Journal of Economic Development, Environment and People, 7(1), pp.23-48.
Nurse, J.R., (2018). Cybercrime and you: How criminals attack and the human factors that they seek to exploit. arXiv preprint arXiv:1811.06624.
Okereafor, K. and Adelaiye, O., (2020). Randomized cyber attack simulation model: a cybersecurity mitigation proposal for the covid-19 digital era. International Journal of Recent Engineering Research and Development (IJRERD), 5(07), pp.61-72.
Pandey, P. and Pandey, M.M., (2021). Research Methodology Tools and Techniques.
Perumal, S., Tabassum, M., Narayana Samy, G., Ponnan, S., Ramamoorthy, A.K. and Sasikala, K.J., (2021). Cybercrime Issues in Smart Cities Networks and Prevention Using Ethical Hacking. In Data-Driven Mining, Learning and Analytics for Secured Smart Cities (pp. 333-358). Springer, Cham.
Puthal, D., Mohanty, S.P., Nanda, P. and Choppali, U., (2017). Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consumer Electronics Magazine, 6(4), pp.24-27.
Samimi, A., (2020). Risk Management in Information Technology. Progress in Chemical and Biochemical Research, 3(2), pp.130-134.
Saunders, M., Lewis, P.H.I.L.I.P. and Thornhill, A.D.R.I.A.N., (2007). Research methods. Business Students 4th edition Pearson Education Limited, England.
Winder, D.A (2019). Tesla Has Facepalm Moment As Hackers Defeat ‘Fixed’ Model S Security.[online] Available at: https://www.forbes.com/sites/daveywinder/2019/08/30/tesla-has-facepalm-moment-as-hackers-defeat-fixed-model-s-security/ [Accessed on 21.12.21]
Know more about UniqueSubmission’s other writing services:
I found this website called that might fit what you’re looking for Sex 11
https://aev99.day/
I found this website called that might fit what you’re looking for Sex 11
https://aev99.day/