Table of Contents TOPIC: Challenges in Cyber Security for businesses....................................................................2 1. Introduction..................................................................................................................................2 2. Personal Contribution in topic selection......................................................................................3 2.1 Collecting Data......................................................................................................................3 2.2 Learning experience...............................................................................................................3 3. Personal Contribution in Literature Review................................................................................4 4. Personal Contribution in Research Methodology........................................................................4 4.1 Quantitative and Qualitative research....................................................................................4 4.2 Web Resources.......................................................................................................................5 5. Reflection on Research Experience.............................................................................................5 6. Personal Statement.......................................................................................................................6 7. Conclusion...................................................................................................................................6 REFRENCES...................................................................................................................................6 TOPIC: Challenges in Cyber Security for businesses 1. Introduction Making a project during academic year, plays an important role in students’ life, in enhancing their level of knowledge. This thing helps in making their career more bright in a specific field. There are a number of reasons that students are mainly asked to conduct a project in group. It includes increasing sharing capabilities and collaborative skills; generating a board
array of potential or alternative solutions on research problems; gain insight of knowledge etc. This would help learners in preparing themselves to face future challenges as well. 2. Personal Contribution in topic selection 2.1 Collecting Data Under this process, I have gained opportunity to work on a project, in group.Making the project on cyber security, I have acquired knowledge on different benefits and challenges, that a company gained by increasing their online presence. Hereby, I have worked under a team of three members, where my role is to analyse different types of software that a company use to connect with people, who are spent most of their time on social media. For the purpose of enhancing the effectiveness of research as per reader-friendliness, the overall structure is outlined as – Introduction of research problem with aim and objectives, literature review for gathering secondary information, construction of conceptual model to meet research objective, different methodology for gathering information and data analysis, discussions and conclusions. One of my team member has given responsibility to frame appropriate aim and objectives, on chosen topic ‘Cyber Security’, where I have given support to make research on this topic by reading a number of articles on the same. To contribute my efforts, the main role that I have performed is to collect secondary data under Literature review, for analyzing how social media influences the buying behavior of customers. For gathering information, which is past based, I have used a number of secondary sources such as case analysis, books, journals, articles, company’s data etc. Along with this, as analyzing the secondary data and meeting research objectives, is necessary for project makers. So, hereby, under guidance of my supervisor, I have summarized the entire secondary data, to make effective conclusion and provide proper recommendation, to companies to overcome from the potential threats of cyber security. 2.2 Learning experience During this project, I have experienced that learning becomes effective, when supervisors and mentors help learners in conducting a project. So, I have also gained a huge support for constructing the research in appropriate manner. They have helped me in choosing the correct sources, for collecting useful and relevant information about given topic.
3. Personal Contribution in Literature Review As Literature Review is considered as the main part of project, upon whom entire result is based. Therefore, concerning on this point, I have focused more on collecting data from those sources, which provide appropriate information. But before, gathering secondary information and draw valid conclusion on same, I have identified the skills first that are needed for the same. Hereby, by proper discussion with my seniors, I have analyzed that to perform assigned duties (literature review, usage of genuine software, third party applications and more), both research skills and technical knowledge are needed. As I was weak in both of these areas, so, I have worked on improvement of the same. For this purpose, I have taken proper classes for near about 8 to 10 days, to improve and enhance my research and technical skills. Along with this, to gain support of other two members of my team, I have used the best strengthen part of mine i.e. leadership qualities. Through this skill, I have easily influenced my team-members who are much experienced then me, to give their cooperation in collecting secondary information. Under literature review, I have evaluated those articles that describe both pros and cons part of social media effects on purchasing behavior of security. For example- To evaluate what type of problems organizations of Australia are facing in today's competitive environment, due to cyber security,Ihaveselectedanarticlefrom https://www.telstra.com.au/business-enterprise/campaigns/cyber-security-report. This article has provided my statistical data about challenges of cyber security. Furthermore, to draw valid conclusion on same, I have made proper discussion with other two members of my team, who have contributed equal responsibilities in making a project successfully. Along with this, I have made proper discussion with some experts also to analyze in what manner, recommendations are needed to provide to meet research objectives. 4. Personal Contribution in Research Methodology 4.1 Quantitative and Qualitative research This study aims at understanding as well as obtaining the insights of consumer purchasing behavior under the context of social media (Arora, Arora and Taras, 2019). Hereby, research strategy is based on two main perspectives that combines both qualitative and quantitative research methods, to address the framed objectives (Bernard, 2017). From theoretical point of view, I have utilized the abundant research publicationsregarding with online consumer
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
behavior. This investigation on cyber security was set out to explore the effects of social media on consumer behavior (Nisar, Prabhakar and Strakova, 2019). It is considered as useful for existing theoretical literature, which is conducted in the field of social media.For this purpose, I have used qualitative research method that provides an insight knowledge about what type of challenges a company face, either by utilizing cyber security or not using the same.It states that if an organization does not use online platform, then it is not possible for them to reach towards targeted audience (De Mooij, 2019). While if they utilize online platform for promoting their business, then it may arise some potential threats for them as well, like malware, virus and more. While to conduct a study also supported by statistical data that drawn mainly from business information and survey report, I have used quantitative technique. For example - To identify the potential factors which influence purchasing behavior of people due to social media, I have empirically tested the conceptual model, in order to decide which hypotheses will support to solve research problems (Sun and Song, 2017). 4.2 Web Resources Tocollectdataoncybersecurity,Ihaveusedanumberofwebsiteslike https://www.telstra.com.au/business-enterprise/campaigns/cyber-security-report, https://stem.griffith.edu.au/cyber-security-launch/,https://tec.com.au/cyber-support-not-top- mind-australian-ceos/, etc. These web resources help me in gathering relevant and updated information about companies regarding with benefits and challenges, they are facing due to cyber security. Along with this, these websites also provide information related to strategies and software that Australian companies are used to prevent business from potential threats of cyber security (Hu and et. al., 2019). 5. Reflection on Research Experience By working in group project, I have analyzed that it provides a lot of opportunities to individuals in enhancing their research skills, sharing abilities and communication. For working in team, the most essential skill that an individual need to possess is collaboration, without this ability, it becomes impossible to maintain efficiency of result outcomes and complete research on time. Therefore, I have improved all such skills that are necessary for conducting a project in group. Meanwhile, I have faced some issues like collaboration with other two members, because they have different background level and it was my first project. So, I have taken guidance of my
seniorshowtoworkingroup,wherebytheyhavesuggestedmetodoworkonmy communication and leadership skills first. This would help me in collaborating with team- members and gaining their support in completing the project. 6. Personal Statement Through entire learning process, I have gained opportunity to develop my career and other aspects of higher education, in technological field. Underneath, I have also analyzed the importance of team-work and what kinds of qualities an individual need for working in group. For completing a project, it is essential for researchers to make proper collaboration with team- members that helps in increasing their learning experience as well.Therefore, I have worked on my communication skills to interact with other two members of my team. Along with this, before performing the assigned tasks, I have improved my research and technical skills first, because lack of knowledge about both concepts, may arise difficulties for me. Development of these skills have given me opportunity to complete future projects more efficiently.Thus, enhancing my research experience help me to gain the knowledge on business management, concept of cyber security system and social media as well as methods for conducting the research. Hence, all these processes have facilitated me for completing the project successfully. 7. Conclusion By performing the project on cyber security, it has been analyzed that today companies use social media as a tool, to reach potential customers and bring awareness among them about their businesses (Askari, 2018). This would give them opportunity to enhance customer base and make improvement in products and services, to meet their expectation and gain high retention. For this purpose, a number of social media platform are used, for integrating the online applications in marketing function and promoting business, in worldwide manner (Mikolic- Torreira and et. al., 2017).
REFRENCES Books and Journals Arora, A.S., Arora, A. and Taras, V., 2019. The moderating role of culture in social media-based spatialimagery,consumerxenocentrism,andword-of-mouthforglobalvirtual teams.International Journal of Cross Cultural Management, p.1470595819856379. Askari, M.M.U.R., 2018. Significance of Ever-evolving Cybersecurity Landscape: Challenges and Possible Pathways.National Journal of Cyber Security Law.1(1). pp.22-37. Baum, D.and et. al., 2019. The impact of social media campaigns on the success of new product introductions.Journal of Retailing and Consumer Services.50. pp.289-297. Bernard,H.R.,2017.Researchmethodsinanthropology:Qualitativeandquantitative approaches. Rowman & Littlefield. Brannen, J., 2017.Mixing methods: Qualitative and quantitative research. Routledge. De Mooij, M., 2019.Consumer behavior and culture: Consequences for global marketing and advertising. SAGE Publications Limited. Dragicevic, S., Celar, S. and Turic, M., 2017. Bayesian network model for task effort estimation in agile software development.Journal of systems and software.127.pp.109-119. Fink, A., 2019.Conducting research literature reviews: From the internet to paper. Sage publications. Genc-Nayebi, N. and Abran, A., 2017. A systematic literature review: Opinion mining studies from mobile app store user reviews.Journal of Systems and Software.125.pp.207-219. Hu, Y. and et. al., 2019. Generating business intelligence through social media analytics: measuringbrandpersonalitywithconsumer-,employee-,andfirm-generated content.Journal of Management Information Systems.36(3). pp.893-930. Mikolic-Torreira, I. and et. al., 2017.Exploring Cyber Security Policy Options in Australia. RAND. Nisar,T.M.,Prabhakar,G.andStrakova,L.,2019.Socialmediainformationbenefits, knowledge management and smart organizations.Journal of Business Research.94. pp.264-272. Sadiku, M. N. and et. al., 2017. A_ampersandsignnbsp; Primer On Cyber Security.International Journal of Advances in Scientific Research and Engineering,3. Sun, Y. and Song, H. eds., 2017.Secure and Trustworthy Transportation Cyber-Physical Systems. Springer Singapore. Zengin, Y., 2017. Investigating the use of the Khan Academy and mathematics software with a flippedclassroomapproachinmathematicsteaching.JournalofEducational Technology & Society.20(2). pp.89-100.