COMMERCE 7039 Business Research Methods : Technological Advancement Ch
5. Research Questions/Hypothesis - Primary Question (only one question) - Secondary Questions (1, 2 ....) Research questions should be linked to Literature Problems, Gaps, and Hypothesis
(Students should propose the Process of the Qualitative Research (Main Steps), Approaches to reliability and Validity, Sampling, Sample Size, Data Collection Method, Variables Specifications)
• Quantitative research
(Students should propose the process of the Quantitative Research Design Process (Main Steps), Research Instrument, Quantitative Data Analysis Process, Sampling and Simple Size, Interviewing and Questionary Design, Reliability and Validity of Data)
Answer:
Introducation and Background
The report is developed aiming to gather relevant set of data in relation with data security. Data security is one of the most important aspects attached with the organization because there are various set of hackers available in the market who can hack the data and affect the progress of the company (Horowitz and Lucero, 2016). Technological advancement is changing many of the things due to which requirements of the company are also changing. All the aspects of the company are going online and each and every detail is being saved on the online tracking systems because companies find it convenient to manage the things by tracking as well as tracing them with the help of online services (Kim and Chung, 2013). The research proposal prepared by the researcher will provide an outline of actual research which will be initiated by the researcher in near future. Research proposal prepared by the researcher will help in identifying all the important aspects which are required to be taken into consideration while developing the actual research. Assurance will be provided to the researcher with the help of which work could be managed in a more effective way and help could be provided to the targeted users available in the market (Kuwana, 2012).
Objectives of the Research
Every research is based on several objectives as without objectives a research does not have any scope. In the same manner the research conduc
ted by the researcher also have certain set of objectives which are required to be fulfilled (Lehto, 2013). The research will be based on these objectives and with the help of the data collected these objectives will be fulfilled by the researcher.
- The research is developed so as to identify and evaluate the reasons behind cyber security breaches which affect the organizations.
- To identify and evaluate various acts developed by the legal authorities so as to manage the data security and help in maintaining records in a secure way.
- To identify and evaluate the measures which could be used by the organizations to reduce cyber crimes (Parajuli, 2008).
Scope of the Research
The scope of the research is to identify the cyber crimes which could incur at the workplace and could affect the data of the organization. The research report developed by the research will help in analyzing the academic knowledge gained by the researcher in his academic career. It will help in evaluating that what knowledge researcher has gained in his academic career (Partas and Pavlenko, 2014).
Literature Review
Literature review is the section developed by the researcher in which previous researches and studies are being reviewed and justification on the basis of the reviews is being provided. This section of the researcher will provide a direction with the help of which decisions will be made by the organizations available in the market (Raggad, 2010). Various literatures performed by the experts and researchers in the previous period will be reviewed on the basis of which justification will be provided by the researcher. In previous report researcher has evaluated some theoretical information related with cyber security which will be reviewed in this section on the basis of the reviewed information justification will be provided and a trail will be made that all the gaps and loops could be tracked and removed by the researcher in this section of the research proposal (Samuels and Rohsenow, 2015).
It could be evaluated that cyber security has become one of the most important aspects in present scenario because with the change in time technology is changing and the market is becoming digital (Tsoumas and Gritzalis, 2012). In this digital market companies are going online and prefer to track all set of company’s information online. In today’s age digitalization is taking place which is helping the organizations in shifting towards the digital space due to which it is becoming that the organizations should take the cyber security into consideration (Voeller, 2014).
Organizations are going online and are moving on the path of digitalization and to manage the things they are trying to apply all the security aspects at the workplace (Vogt, 2010). Digitalization is not helping the organizations in keeping the track records of the information but it is also giving rise to the hackers. With the change in technology numbers of hackers are also increasing in the cyber world. They are gaining skills to hack the devices and tracking the information of the companies. Hackers available in the market are becoming the matter of concern for the organizations as they are indulging in the activities which are increasing cyber crime and are having a direct impact on the work of the companies as they hack the systems and misuse the data gathered by them (Alsayed, Maguire-Wright and Flickinger, 2016).
As technological advancement is increasing day by day so the cyber crimes are also increasing due to which it has become important for the organizations to maintain the cyber security. Working towards to adopt the technology with the help of which cyber crimes could get reduced has become the responsibility of the organizations (Britz, 2009). The report which is developed by the researcher includes the information related with the institute for Security Technology Studies at Dartmouth University which avails the training of how the organizations could work towards to reduce the risk of cyber attacks on the online data of the company (Cleary and Felici, 2015).
The institute helps in resolving the issues and is focusing upon developing the data security software and tracing the IP Address of the systems from which cyber attacks are being done by the hackers. These Universities helps in developing the a data security framework for the organizations which keeps the track records of the works as well as financial data with the help of the which organizations could manage the work in a proper way. Research also involves data related with the industries which are at the high risk of the cyber attack (Horowitz and Lucero, 2016). These industries are software industry remains at the 45% of the risk, Hotel and Hospitality remains at the 8% risk, Video Games industry remains at the 7% risk, E-Commerce remains at the 7% risk, Environment remains at the 6% risk, Web Hosting remains at 12%, Internet Services remains at the 10% risk, Restaurant remains at 2%, Rural remains at the 2% risk and other industries remains at 1% risk.
Information related with various surveys conducted in past years is being shared by the researcher in the report which helps making the concrete data for the target users. Research includes all the aspects of discussion with the effect of which effective decisions could be taken by the organization and proper setup of cyber security could be made (Kim and Chung, 2013).
Justification of Research
The report developed by the researcher involves all set of information related with cyber security which could help in developing the content for the actual research. All facts and figures are being availed in the report which is enhancing the concreteness of the content developed by the researcher. Information from various secondary resources are being gathered by the researcher with the effect of which companies could get relevant set of support as well as help in managing the online security system (Kuwana, 2012). In the report data related with various methods could be adopted by the organizations so as to keep the data secure are being availed. These methods will help in keeping the system secure and safe from all the vulnerabilities which could infect the systems of the company and could lead to cause huge loss to the same. Hence, it could be said that the research which will be conducted on the basis of the available report will ensure to provide sufficient amount of information and will help the organizations in adopting the appropriate methods with the help of which their systems will remain safe and secure (Lehto, 2013).
Research Questions / Hypothesis
Research questions are being developed by the researchers which are required to be answered. With the help of the research developed solution to these questions will be provided by the researcher. Solution to the research will ensure to help the researcher in obtaining the objectives targeted by the researcher due to which effective data will be shared in the market (Parajuli, 2008).
Primary Question
What are the reasons due to which cyber attacks takes place in the organizations and how the information is being hacked by the hackers?
Secondary Question
What are the acts and legal aspects attached which are attached with the data security at the workplace and how these could be applied at the workplace?
What are the measures and methods which could be adopted by the organizations to stop cyber crimes and attacks at the workplace?
Research Design And Methodology
Qualitative Research
The data which is being formulated with the help of secondary sources and from the previous studies and is being presented in the theoretical form is known as qualitative research. Qualitative research will ensure to provide a proper support to the target users in gaining proper data related with cyber security and the activities of cyber crime. Opinions and decisions related with the past researches are being provided in the qualitative research which helps in analyzing all set of loops and gaps (Partas and Pavlenko, 2014). Qualitative research also helps in removing all set of loops and gaps and provides the support system to the targeted users available in the market.
Certain secondary sources which were used by the researcher to gather the data for the research on cyber security are books available on the same topic, journals and articles availed in the newspaper and magazines and mass information is being gathered by the researcher with the help of the sources available in internet (Raggad, 2010).
Quantitative Research
For an effective research it is important that quantitative data should be provided by the researcher. Numerical data and facts related with the research topic will be availed with the help of quantitative research. Raw data will be produced by the researcher so as to gather the data related with the research content (Samuels and Rohsenow, 2015).
Primary source of data collection will be used and these sources are interview method, questionnaire development and taking responses from the sample selected by the researcher.
Sampling Technique
Random sampling technique will be used by the researcher so as to produce and develop quantitative research. Sample size of 50 people is being selected by the researcher so as to collect primary data related with the research (Tsoumas and Gritzalis, 2012).
Research Limitations
Time and money are the main limitations of the research. Researcher does not have proper time and money so as to formulate appropriate research and collect the information. Unavailability of proper resources and time will have a huge impact on the research content which will affect the authenticity of the research (Voeller, 2014). It could be possible that the sample size selected by the researcher will not provide effective set of information related with the research topic due to which reliability and validity of the report get affected.
Time Schedule
Research Activities |
Initiation Time |
Completion Time |
Planning Research Proposal |
May 11, 2017 |
Jun 5, 2017 |
Developing Research Objectives |
May 11, 2017 |
May 12, 2017 |
Developing Project Scope |
May 12, 2017 |
May 16, 2017 |
Reviewing the Literature |
May 16, 2017 |
May 25, 2017 |
Developing Research Question |
May 26, 2017 |
May 29, 2017 |
Developing Research Methodology |
May 29, 2017 |
Jun 5, 2017 |
(Vogt, 2010)
Gantt Chart
Conclusion:
With the help of the research formulated by the researcher it could be concluded that researcher should develop such type of plans and procedures before working on the main aspects of the research. This proposal of the research will help the researcher in developing effective content and will ensure to avail proper guidance to manage the research in an effective way.
References:
Alsayed, I., Maguire-Wright, K. and Flickinger, K. (2016). Utilizing Secondary Data Sources In Combination With Primary Clinical Data To Optimize Data Collection In Prospective Study Designs. Value in Health, 19(3), 108.
Britz, M. (2009). Computer forensics and cyber crime. Upper Saddle River NJ: Pearson.
Cleary, F. and Felici, M. (2015). Cyber Security and Privacy. Cham: Springer International Publishing.
Horowitz, B. and Lucero, D. (2016). SYSTEM-AWARE CYBER SECURITY: A SYSTEMS ENGINEERING APPROACH FOR ENHANCING CYBER SECURITY. INSIGHT, 19(2), 39-42.
Kim, K. and Chung, K. (2013). IT Convergence and Security 2012. Dordrecht: Springer.
Kuwana, T. (2012). Repetition advantage and disadvantage in perceptual identification tasks. Japanese Psychological Research, 55(3), 216-228.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), 1-18.
Parajuli, B. (2008). Questionnaire: A Tool of Primary Data Collection. Himalayan Journal of Sociology and Anthropology, 1, 51.
Partas, V. and Pavlenko, A. (2014). Data support of design of details production techniques. Collection of Scientific Publications NUS, 0(3). 122-133
Raggad, B. (2010). Information security management. Boca Raton, Fla.: CRC Press.
Samuels, D. and Rohsenow, T. (2015). Cyber security. New York: Arcler Press.
Tsoumas, B. and Gritzalis, D. (2012). Inside Cyber Warfare: Mapping the Cyber Underworld. Computers & Security, 31(6), 801.
Voeller, J. (2014). Cyber Security. Wiley.
Vogt, W. (2010). Data collection. Los Angeles: SAGE.
Buy COMMERCE 7039 Business Research Methods : Technological Advancement Ch Answers Online
Talk to our expert to get the help with COMMERCE 7039 Business Research Methods : Technological Advancement Ch Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.