logo

HI6008 - Business Research - Cyber Security

13 Pages2803 Words140 Views
   

Holmes Institute Sydney

   

HI6008 Business Research (HI6008)

   

Added on  2020-03-04

About This Document

In this document, we will discuss the challenges and issues that have recently been discovered in cyber security for companies. It has been noticed that businesses are now completely dependent upon technology, implying that, as a result of technological advancements, the marketer's role in guiding a firm in a dynamic environment has gotten much easier. We covered the impact of cyber-security challenges on business and the strategies which can be developed for the prevention of cyber-attacks.

HI6008 - Business Research - Cyber Security

   

Holmes Institute Sydney

   

HI6008 Business Research (HI6008)

   Added on 2020-03-04

ShareRelated Documents
Running head: RESEARCH PROPOSALBusiness Research Method Research ProposalName of the Student Name of the University Author Note
HI6008 - Business Research - Cyber Security_1
1RESEARCH PROPOSALTable of Content 1.1 Introduction................................................................................................................................31.2 Background to research.............................................................................................................41.3 Project Scope.............................................................................................................................41.4 Project Objectives and aim........................................................................................................51.5 Research Question and Hypotheses...........................................................................................51.6 Literature Review......................................................................................................................61.7 Research Methodology..............................................................................................................71.8 Research Limitation.................................................................................................................101.9 Research Timeline...................................................................................................................101.10 Conclusion.............................................................................................................................11References and Bibliography.........................................................................................................12
HI6008 - Business Research - Cyber Security_2
2RESEARCH PROPOSALTopic - Challenges in Cyber Security for Business1.1 Introduction The proposed research is based on the challenges and issues observed in cyber securityfor the business in the recent time. It has been observed that businesses are now fullydepended on the technology, which means that due to the technological advancement, theways of leading the business in a dynamic environment has become quite easy for themarketers. However, even though, the technology plays a big role in today’s modernbusiness, due to the loophole in the technologies, the businesses often face external threats –such as stealing valuable information, anonymous access to bank accounts or organization’sofficial sites and other cyber attacks. According to Aloul et al., (2012) ICT devices as well aselements are largely interdependent and disrupt of one could affect many others. TheInformation Technology experts and the policy makers have expressed their concernregarding the protection of businesses from the cyber attacks. Here, the acts of protecting theICT system as well as their contents are considered as cyber security. In this report, a detail about the proposed research has been discussed elaborately. Thereport presents the idea how the research is going to be conducted. The report provides theproject scope, which includes the determining and documenting a list of particular projectgoals, features, tasks, deadline and other significant factors. Likewise, the report alsoincludes the key objectives of the proposed research. Considering the background to theresearch, the research questions and objectives have been provided in this report.Furthermore, the research report also includes a set of research techniques that will beapplied to the proposed study.
HI6008 - Business Research - Cyber Security_3
3RESEARCH PROPOSAL1.2 Background to research Several studies have been conducted to learn the impact of the issues related to cyber-security on businesses. The current scenario indicates that the marketers rush to implementall policies related to cyber security to protect their business from the external threats. It isobserved that the federal role in cyber security includes both securing federal system as wellas assisting in preserving the non-federal systems. A study conducted by Busch and Givens(2012) mentioned that protecting the valuable intellectual property as well as the businessinformation in the digital form against the theft as well as misuse remains as the criticalmanagement issue. Dunn Cavelty (2013) indicated in their study that organization must haveto fend off the regular cyber-attacks and the threats of cyber criminal. Dumitras and Neamtiu,(2011) mentioned that sophisticated organizations have recently endured the public breachesto their technological environment and many incidents went unreported but the marketers arenot eager to advertise or describe the vulnerabilities. On the other side, the study conductedby Liu et al. (2012), mentioned that most large organizations have gradually reinforced theircyber security capabilities over the past few years. Nonetheless, due to this argumentativeoutcome, the present study observes the importance of conducting an investigation on cybersecurity challenge and its impact on the businesses. 1.3 Project Scope Understanding the importance of examining the impact of cyber-security on business, theproposed research has been framed with a primary analysis. This will help to conduct theanalysis with the practical evidences. The proposed study abandons the secondary analysisbecause the research might not provide an authentic outcome that is related to the real-worldcontext. In order to conduct a primary analysis, an organization- Australian National Bank
HI6008 - Business Research - Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Business Research Method
|14
|3517
|493

Cyber Security Challenges in Organizational Context: A Case Study of ABC Technology Company
|12
|3788
|45

Emerging Security Threats
|12
|3912
|46

Challenges of Cyber Security on Business Performances
|18
|3599
|35

Importance of Cyber Security in Retail Industry
|21
|7572
|72

Challenges of Cyber Security on Business Performances in Pakistan
|13
|2783
|192