Challenges in Cyber Security for Businesses
VerifiedAdded on  2021/02/20
|7
|2257
|98
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Business Research
Project
Project
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
TOPIC: Challenges in Cyber Security for businesses ....................................................................2
1. Introduction..................................................................................................................................2
2. Personal Contribution in topic selection......................................................................................3
2.1 Collecting Data......................................................................................................................3
2.2 Learning experience...............................................................................................................3
3. Personal Contribution in Literature Review................................................................................4
4. Personal Contribution in Research Methodology........................................................................4
4.1 Quantitative and Qualitative research....................................................................................4
4.2 Web Resources.......................................................................................................................5
5. Reflection on Research Experience.............................................................................................5
6. Personal Statement.......................................................................................................................6
7. Conclusion...................................................................................................................................6
REFRENCES...................................................................................................................................6
TOPIC: Challenges in Cyber Security for businesses
1. Introduction
Making a project during academic year, plays an important role in students’ life, in
enhancing their level of knowledge. This thing helps in making their career more bright in a
specific field. There are a number of reasons that students are mainly asked to conduct a project
in group. It includes increasing sharing capabilities and collaborative skills; generating a board
TOPIC: Challenges in Cyber Security for businesses ....................................................................2
1. Introduction..................................................................................................................................2
2. Personal Contribution in topic selection......................................................................................3
2.1 Collecting Data......................................................................................................................3
2.2 Learning experience...............................................................................................................3
3. Personal Contribution in Literature Review................................................................................4
4. Personal Contribution in Research Methodology........................................................................4
4.1 Quantitative and Qualitative research....................................................................................4
4.2 Web Resources.......................................................................................................................5
5. Reflection on Research Experience.............................................................................................5
6. Personal Statement.......................................................................................................................6
7. Conclusion...................................................................................................................................6
REFRENCES...................................................................................................................................6
TOPIC: Challenges in Cyber Security for businesses
1. Introduction
Making a project during academic year, plays an important role in students’ life, in
enhancing their level of knowledge. This thing helps in making their career more bright in a
specific field. There are a number of reasons that students are mainly asked to conduct a project
in group. It includes increasing sharing capabilities and collaborative skills; generating a board
array of potential or alternative solutions on research problems; gain insight of knowledge etc.
This would help learners in preparing themselves to face future challenges as well.
2. Personal Contribution in topic selection
2.1 Collecting Data
Under this process, I have gained opportunity to work on a project, in group. Making the
project on cyber security, I have acquired knowledge on different benefits and challenges, that a
company gained by increasing their online presence. Hereby, I have worked under a team of
three members, where my role is to analyse different types of software that a company use to
connect with people, who are spent most of their time on social media. For the purpose of
enhancing the effectiveness of research as per reader-friendliness, the overall structure is
outlined as – Introduction of research problem with aim and objectives, literature review for
gathering secondary information, construction of conceptual model to meet research objective,
different methodology for gathering information and data analysis, discussions and conclusions.
One of my team member has given responsibility to frame appropriate aim and objectives, on
chosen topic ‘Cyber Security’, where I have given support to make research on this topic by
reading a number of articles on the same.
To contribute my efforts, the main role that I have performed is to collect secondary data
under Literature review, for analyzing how social media influences the buying behavior of
customers. For gathering information, which is past based, I have used a number of secondary
sources such as case analysis, books, journals, articles, company’s data etc. Along with this, as
analyzing the secondary data and meeting research objectives, is necessary for project makers.
So, hereby, under guidance of my supervisor, I have summarized the entire secondary data, to
make effective conclusion and provide proper recommendation, to companies to overcome from
the potential threats of cyber security.
2.2 Learning experience
During this project, I have experienced that learning becomes effective, when supervisors
and mentors help learners in conducting a project. So, I have also gained a huge support for
constructing the research in appropriate manner. They have helped me in choosing the correct
sources, for collecting useful and relevant information about given topic.
This would help learners in preparing themselves to face future challenges as well.
2. Personal Contribution in topic selection
2.1 Collecting Data
Under this process, I have gained opportunity to work on a project, in group. Making the
project on cyber security, I have acquired knowledge on different benefits and challenges, that a
company gained by increasing their online presence. Hereby, I have worked under a team of
three members, where my role is to analyse different types of software that a company use to
connect with people, who are spent most of their time on social media. For the purpose of
enhancing the effectiveness of research as per reader-friendliness, the overall structure is
outlined as – Introduction of research problem with aim and objectives, literature review for
gathering secondary information, construction of conceptual model to meet research objective,
different methodology for gathering information and data analysis, discussions and conclusions.
One of my team member has given responsibility to frame appropriate aim and objectives, on
chosen topic ‘Cyber Security’, where I have given support to make research on this topic by
reading a number of articles on the same.
To contribute my efforts, the main role that I have performed is to collect secondary data
under Literature review, for analyzing how social media influences the buying behavior of
customers. For gathering information, which is past based, I have used a number of secondary
sources such as case analysis, books, journals, articles, company’s data etc. Along with this, as
analyzing the secondary data and meeting research objectives, is necessary for project makers.
So, hereby, under guidance of my supervisor, I have summarized the entire secondary data, to
make effective conclusion and provide proper recommendation, to companies to overcome from
the potential threats of cyber security.
2.2 Learning experience
During this project, I have experienced that learning becomes effective, when supervisors
and mentors help learners in conducting a project. So, I have also gained a huge support for
constructing the research in appropriate manner. They have helped me in choosing the correct
sources, for collecting useful and relevant information about given topic.
3. Personal Contribution in Literature Review
As Literature Review is considered as the main part of project, upon whom entire result is
based. Therefore, concerning on this point, I have focused more on collecting data from those
sources, which provide appropriate information. But before, gathering secondary information
and draw valid conclusion on same, I have identified the skills first that are needed for the same.
Hereby, by proper discussion with my seniors, I have analyzed that to perform assigned duties
(literature review, usage of genuine software, third party applications and more), both research
skills and technical knowledge are needed. As I was weak in both of these areas, so, I have
worked on improvement of the same. For this purpose, I have taken proper classes for near about
8 to 10 days, to improve and enhance my research and technical skills. Along with this, to gain
support of other two members of my team, I have used the best strengthen part of mine i.e.
leadership qualities. Through this skill, I have easily influenced my team-members who are
much experienced then me, to give their cooperation in collecting secondary information. Under
literature review, I have evaluated those articles that describe both pros and cons part of social
media effects on purchasing behavior of security. For example- To evaluate what type of
problems organizations of Australia are facing in today's competitive environment, due to cyber
security, I have selected an article from
https://www.telstra.com.au/business-enterprise/campaigns/cyber-security-report. This article has
provided my statistical data about challenges of cyber security. Furthermore, to draw valid
conclusion on same, I have made proper discussion with other two members of my team, who
have contributed equal responsibilities in making a project successfully. Along with this, I have
made proper discussion with some experts also to analyze in what manner, recommendations are
needed to provide to meet research objectives.
4. Personal Contribution in Research Methodology
4.1 Quantitative and Qualitative research
This study aims at understanding as well as obtaining the insights of consumer purchasing
behavior under the context of social media (Arora, Arora and Taras, 2019). Hereby, research
strategy is based on two main perspectives that combines both qualitative and quantitative
research methods, to address the framed objectives (Bernard, 2017). From theoretical point of
view, I have utilized the abundant research publications regarding with online consumer
As Literature Review is considered as the main part of project, upon whom entire result is
based. Therefore, concerning on this point, I have focused more on collecting data from those
sources, which provide appropriate information. But before, gathering secondary information
and draw valid conclusion on same, I have identified the skills first that are needed for the same.
Hereby, by proper discussion with my seniors, I have analyzed that to perform assigned duties
(literature review, usage of genuine software, third party applications and more), both research
skills and technical knowledge are needed. As I was weak in both of these areas, so, I have
worked on improvement of the same. For this purpose, I have taken proper classes for near about
8 to 10 days, to improve and enhance my research and technical skills. Along with this, to gain
support of other two members of my team, I have used the best strengthen part of mine i.e.
leadership qualities. Through this skill, I have easily influenced my team-members who are
much experienced then me, to give their cooperation in collecting secondary information. Under
literature review, I have evaluated those articles that describe both pros and cons part of social
media effects on purchasing behavior of security. For example- To evaluate what type of
problems organizations of Australia are facing in today's competitive environment, due to cyber
security, I have selected an article from
https://www.telstra.com.au/business-enterprise/campaigns/cyber-security-report. This article has
provided my statistical data about challenges of cyber security. Furthermore, to draw valid
conclusion on same, I have made proper discussion with other two members of my team, who
have contributed equal responsibilities in making a project successfully. Along with this, I have
made proper discussion with some experts also to analyze in what manner, recommendations are
needed to provide to meet research objectives.
4. Personal Contribution in Research Methodology
4.1 Quantitative and Qualitative research
This study aims at understanding as well as obtaining the insights of consumer purchasing
behavior under the context of social media (Arora, Arora and Taras, 2019). Hereby, research
strategy is based on two main perspectives that combines both qualitative and quantitative
research methods, to address the framed objectives (Bernard, 2017). From theoretical point of
view, I have utilized the abundant research publications regarding with online consumer
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
behavior. This investigation on cyber security was set out to explore the effects of social media
on consumer behavior (Nisar, Prabhakar and Strakova, 2019). It is considered as useful for
existing theoretical literature, which is conducted in the field of social media. For this purpose, I
have used qualitative research method that provides an insight knowledge about what type of
challenges a company face, either by utilizing cyber security or not using the same. It states that
if an organization does not use online platform, then it is not possible for them to reach towards
targeted audience (De Mooij, 2019). While if they utilize online platform for promoting their
business, then it may arise some potential threats for them as well, like malware, virus and more.
While to conduct a study also supported by statistical data that drawn mainly from
business information and survey report, I have used quantitative technique. For example - To
identify the potential factors which influence purchasing behavior of people due to social media,
I have empirically tested the conceptual model, in order to decide which hypotheses will support
to solve research problems (Sun and Song, 2017).
4.2 Web Resources
To collect data on cyber security, I have used a number of websites like
https://www.telstra.com.au/business-enterprise/campaigns/cyber-security-report,
https://stem.griffith.edu.au/cyber-security-launch/, https://tec.com.au/cyber-support-not-top-
mind-australian-ceos/, etc. These web resources help me in gathering relevant and updated
information about companies regarding with benefits and challenges, they are facing due to
cyber security. Along with this, these websites also provide information related to strategies and
software that Australian companies are used to prevent business from potential threats of cyber
security (Hu and et. al., 2019).
5. Reflection on Research Experience
By working in group project, I have analyzed that it provides a lot of opportunities to
individuals in enhancing their research skills, sharing abilities and communication. For working
in team, the most essential skill that an individual need to possess is collaboration, without this
ability, it becomes impossible to maintain efficiency of result outcomes and complete research
on time. Therefore, I have improved all such skills that are necessary for conducting a project in
group. Meanwhile, I have faced some issues like collaboration with other two members, because
they have different background level and it was my first project. So, I have taken guidance of my
on consumer behavior (Nisar, Prabhakar and Strakova, 2019). It is considered as useful for
existing theoretical literature, which is conducted in the field of social media. For this purpose, I
have used qualitative research method that provides an insight knowledge about what type of
challenges a company face, either by utilizing cyber security or not using the same. It states that
if an organization does not use online platform, then it is not possible for them to reach towards
targeted audience (De Mooij, 2019). While if they utilize online platform for promoting their
business, then it may arise some potential threats for them as well, like malware, virus and more.
While to conduct a study also supported by statistical data that drawn mainly from
business information and survey report, I have used quantitative technique. For example - To
identify the potential factors which influence purchasing behavior of people due to social media,
I have empirically tested the conceptual model, in order to decide which hypotheses will support
to solve research problems (Sun and Song, 2017).
4.2 Web Resources
To collect data on cyber security, I have used a number of websites like
https://www.telstra.com.au/business-enterprise/campaigns/cyber-security-report,
https://stem.griffith.edu.au/cyber-security-launch/, https://tec.com.au/cyber-support-not-top-
mind-australian-ceos/, etc. These web resources help me in gathering relevant and updated
information about companies regarding with benefits and challenges, they are facing due to
cyber security. Along with this, these websites also provide information related to strategies and
software that Australian companies are used to prevent business from potential threats of cyber
security (Hu and et. al., 2019).
5. Reflection on Research Experience
By working in group project, I have analyzed that it provides a lot of opportunities to
individuals in enhancing their research skills, sharing abilities and communication. For working
in team, the most essential skill that an individual need to possess is collaboration, without this
ability, it becomes impossible to maintain efficiency of result outcomes and complete research
on time. Therefore, I have improved all such skills that are necessary for conducting a project in
group. Meanwhile, I have faced some issues like collaboration with other two members, because
they have different background level and it was my first project. So, I have taken guidance of my
seniors how to work in group, whereby they have suggested me to do work on my
communication and leadership skills first. This would help me in collaborating with team-
members and gaining their support in completing the project.
6. Personal Statement
Through entire learning process, I have gained opportunity to develop my career and other
aspects of higher education, in technological field. Underneath, I have also analyzed the
importance of team-work and what kinds of qualities an individual need for working in group.
For completing a project, it is essential for researchers to make proper collaboration with team-
members that helps in increasing their learning experience as well. Therefore, I have worked on
my communication skills to interact with other two members of my team. Along with this, before
performing the assigned tasks, I have improved my research and technical skills first, because
lack of knowledge about both concepts, may arise difficulties for me. Development of these
skills have given me opportunity to complete future projects more efficiently. Thus, enhancing
my research experience help me to gain the knowledge on business management, concept of
cyber security system and social media as well as methods for conducting the research. Hence,
all these processes have facilitated me for completing the project successfully.
7. Conclusion
By performing the project on cyber security, it has been analyzed that today companies
use social media as a tool, to reach potential customers and bring awareness among them about
their businesses (Askari, 2018). This would give them opportunity to enhance customer base and
make improvement in products and services, to meet their expectation and gain high retention.
For this purpose, a number of social media platform are used, for integrating the online
applications in marketing function and promoting business, in worldwide manner (Mikolic-
Torreira and et. al., 2017).
communication and leadership skills first. This would help me in collaborating with team-
members and gaining their support in completing the project.
6. Personal Statement
Through entire learning process, I have gained opportunity to develop my career and other
aspects of higher education, in technological field. Underneath, I have also analyzed the
importance of team-work and what kinds of qualities an individual need for working in group.
For completing a project, it is essential for researchers to make proper collaboration with team-
members that helps in increasing their learning experience as well. Therefore, I have worked on
my communication skills to interact with other two members of my team. Along with this, before
performing the assigned tasks, I have improved my research and technical skills first, because
lack of knowledge about both concepts, may arise difficulties for me. Development of these
skills have given me opportunity to complete future projects more efficiently. Thus, enhancing
my research experience help me to gain the knowledge on business management, concept of
cyber security system and social media as well as methods for conducting the research. Hence,
all these processes have facilitated me for completing the project successfully.
7. Conclusion
By performing the project on cyber security, it has been analyzed that today companies
use social media as a tool, to reach potential customers and bring awareness among them about
their businesses (Askari, 2018). This would give them opportunity to enhance customer base and
make improvement in products and services, to meet their expectation and gain high retention.
For this purpose, a number of social media platform are used, for integrating the online
applications in marketing function and promoting business, in worldwide manner (Mikolic-
Torreira and et. al., 2017).
REFRENCES
Books and Journals
Arora, A.S., Arora, A. and Taras, V., 2019. The moderating role of culture in social media-based
spatial imagery, consumer xenocentrism, and word-of-mouth for global virtual
teams. International Journal of Cross Cultural Management, p.1470595819856379.
Askari, M.M.U.R., 2018. Significance of Ever-evolving Cybersecurity Landscape: Challenges
and Possible Pathways. National Journal of Cyber Security Law. 1(1). pp.22-37.
Baum, D. and et. al., 2019. The impact of social media campaigns on the success of new product
introductions. Journal of Retailing and Consumer Services. 50. pp.289-297.
Bernard, H. R., 2017. Research methods in anthropology: Qualitative and quantitative
approaches. Rowman & Littlefield.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
De Mooij, M., 2019. Consumer behavior and culture: Consequences for global marketing and
advertising. SAGE Publications Limited.
Dragicevic, S., Celar, S. and Turic, M., 2017. Bayesian network model for task effort estimation
in agile software development. Journal of systems and software. 127. pp.109-119.
Fink, A., 2019. Conducting research literature reviews: From the internet to paper. Sage
publications.
Genc-Nayebi, N. and Abran, A., 2017. A systematic literature review: Opinion mining studies
from mobile app store user reviews. Journal of Systems and Software. 125. pp.207-219.
Hu, Y. and et. al., 2019. Generating business intelligence through social media analytics:
measuring brand personality with consumer-, employee-, and firm-generated
content. Journal of Management Information Systems. 36(3). pp.893-930.
Mikolic-Torreira, I. and et. al., 2017. Exploring Cyber Security Policy Options in Australia.
RAND.
Nisar, T. M., Prabhakar, G. and Strakova, L., 2019. Social media information benefits,
knowledge management and smart organizations. Journal of Business Research. 94.
pp.264-272.
Sadiku, M. N. and et. al., 2017. A_ampersandsignnbsp; Primer On Cyber Security. International
Journal of Advances in Scientific Research and Engineering, 3.
Sun, Y. and Song, H. eds., 2017. Secure and Trustworthy Transportation Cyber-Physical
Systems. Springer Singapore.
Zengin, Y., 2017. Investigating the use of the Khan Academy and mathematics software with a
flipped classroom approach in mathematics teaching. Journal of Educational
Technology & Society. 20(2). pp.89-100.
Books and Journals
Arora, A.S., Arora, A. and Taras, V., 2019. The moderating role of culture in social media-based
spatial imagery, consumer xenocentrism, and word-of-mouth for global virtual
teams. International Journal of Cross Cultural Management, p.1470595819856379.
Askari, M.M.U.R., 2018. Significance of Ever-evolving Cybersecurity Landscape: Challenges
and Possible Pathways. National Journal of Cyber Security Law. 1(1). pp.22-37.
Baum, D. and et. al., 2019. The impact of social media campaigns on the success of new product
introductions. Journal of Retailing and Consumer Services. 50. pp.289-297.
Bernard, H. R., 2017. Research methods in anthropology: Qualitative and quantitative
approaches. Rowman & Littlefield.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
De Mooij, M., 2019. Consumer behavior and culture: Consequences for global marketing and
advertising. SAGE Publications Limited.
Dragicevic, S., Celar, S. and Turic, M., 2017. Bayesian network model for task effort estimation
in agile software development. Journal of systems and software. 127. pp.109-119.
Fink, A., 2019. Conducting research literature reviews: From the internet to paper. Sage
publications.
Genc-Nayebi, N. and Abran, A., 2017. A systematic literature review: Opinion mining studies
from mobile app store user reviews. Journal of Systems and Software. 125. pp.207-219.
Hu, Y. and et. al., 2019. Generating business intelligence through social media analytics:
measuring brand personality with consumer-, employee-, and firm-generated
content. Journal of Management Information Systems. 36(3). pp.893-930.
Mikolic-Torreira, I. and et. al., 2017. Exploring Cyber Security Policy Options in Australia.
RAND.
Nisar, T. M., Prabhakar, G. and Strakova, L., 2019. Social media information benefits,
knowledge management and smart organizations. Journal of Business Research. 94.
pp.264-272.
Sadiku, M. N. and et. al., 2017. A_ampersandsignnbsp; Primer On Cyber Security. International
Journal of Advances in Scientific Research and Engineering, 3.
Sun, Y. and Song, H. eds., 2017. Secure and Trustworthy Transportation Cyber-Physical
Systems. Springer Singapore.
Zengin, Y., 2017. Investigating the use of the Khan Academy and mathematics software with a
flipped classroom approach in mathematics teaching. Journal of Educational
Technology & Society. 20(2). pp.89-100.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.