logo

The Data Collection Process | Research Proposal

13 Pages2250 Words197 Views
   

Added on  2020-04-01

The Data Collection Process | Research Proposal

   Added on 2020-04-01

ShareRelated Documents
Running head: RESEARCH PROPOSALResearch proposalName of the Student:Name of the University:Author note:
The Data Collection Process | Research Proposal_1
1RESEARCH PROPOSALExecutive summeryThe purpose of this report is to critically evaluate and make a research foundation for furtherresearch. The focus of the previous assignments was to review the cyber crime environments insome sector where the impact of the crime is high. The project objectives of doing the researchare also discussed. The data collection process and research limitations while doing the researchis opined as suitable. Based on the research method and outlines activity the main tasks arescheduled in a chart below.
The Data Collection Process | Research Proposal_2
2RESEARCH PROPOSALTable of ContentsIntroduction......................................................................................................................................3Project objective..............................................................................................................................3Project scope....................................................................................................................................3Research questions...........................................................................................................................4Literature review..............................................................................................................................4Research methodology.....................................................................................................................6Qualitative research and Quantitative research...............................................................................6Research approach and research design..........................................................................................7Data collection process....................................................................................................................8Sampling method and sample size...................................................................................................8Research limitations.........................................................................................................................8Time schedule for the project..........................................................................................................9Conclusions......................................................................................................................................9References......................................................................................................................................11
The Data Collection Process | Research Proposal_3
3RESEARCH PROPOSALIntroductionThis text gives a proposal for doing research in the cyber security methods and outlines aresearch problem to do research on further (Sauter and Carafano 2012). The project objectiveand project scope is also given in the text. The research problem and questions are also given inthe following chapters. The research design and approach to conducting the research in the fieldis also outlined in the following discussions. The data collection process and research limitationswhile doing the research is opined as suitable. Based on the research method and outlines activitythe main tasks are scheduled in a chart below (Panneerselvam 2014).Project objectiveThe preliminary objectives of doing this project is To analyse the threats that comes from cyber threats in different function of operationsand how to avert themTo identify the most comprehensive critical information structure and providesuggestions to mitigate the risk that comes from cyber attacks. To be responsible for fusing instructions and information of different functions ofbusiness Project scope The project lies in the recognising and mitigating the risk arises from the cyber attacks indifferent organisations. This also takes into consideration about the actions that are taken astarget to destroy the cyber system of any business organisation. The cyber infrastructure mustnot be compromised for it will threaten all the system to collapse. The intrusions must be
The Data Collection Process | Research Proposal_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research proposal for cyber security research proposal
|17
|2876
|146

Cyber Security Assignment- Business Research Methodology
|15
|3900
|51

Challenges of Cyber Security | Report
|15
|3304
|174

The Impact of Cyber Crime: Research Paper
|19
|3188
|156

HI6008 Assignment 2 Requirement
|12
|2755
|166

Challenges in Cyber Security for Business - Thales Group
|10
|1849
|81