How Network Security Influences E-commerce Activities
VerifiedAdded on 2023/01/11
|12
|3325
|88
AI Summary
This research investigates the influence of network security on e-commerce activities, with a focus on Amazon. It explores the role and importance of network security in the success of an e-commerce company, evaluates the influences of network security on e-commerce activities, and determines strategies and tools for better safety measures. The research aims to understand how network security impacts e-commerce activities and provides insights for Amazon and other e-commerce organizations.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
HOW THE NETWORK
SECURITY CAN
INFLUENCES THE E-
COMMERCE
ACTIVITIES
SECURITY CAN
INFLUENCES THE E-
COMMERCE
ACTIVITIES
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Research Topic: How the network security can influences the e-commerce activities. A
investigation conducted on Amazon................................................................................................1
Introduction......................................................................................................................................1
Background of project............................................................................................................1
Rationale for selection of research topic................................................................................2
Research aim and objectives..................................................................................................2
Research questions.................................................................................................................2
Literature Review.............................................................................................................................3
To identify the role and importance of network security in success and viable performance of
an e-commerce company........................................................................................................3
To evaluate about the influences lead by network security on the activities of an e-commerce
organisation............................................................................................................................4
To determine the various strategies and network security tools that could be implement by
Amazon to ensure better safety measures for its online activities and operations to yield better
customer experience and satisfaction.....................................................................................5
Research Methodology....................................................................................................................6
Activities and timescale...................................................................................................................7
REFERENCES..............................................................................................................................10
Research Topic: How the network security can influences the e-commerce activities. A
investigation conducted on Amazon................................................................................................1
Introduction......................................................................................................................................1
Background of project............................................................................................................1
Rationale for selection of research topic................................................................................2
Research aim and objectives..................................................................................................2
Research questions.................................................................................................................2
Literature Review.............................................................................................................................3
To identify the role and importance of network security in success and viable performance of
an e-commerce company........................................................................................................3
To evaluate about the influences lead by network security on the activities of an e-commerce
organisation............................................................................................................................4
To determine the various strategies and network security tools that could be implement by
Amazon to ensure better safety measures for its online activities and operations to yield better
customer experience and satisfaction.....................................................................................5
Research Methodology....................................................................................................................6
Activities and timescale...................................................................................................................7
REFERENCES..............................................................................................................................10
Research Topic: How the network security can influences the e-commerce
activities. A investigation conducted on Amazon.
Introduction
Background of project
As the development of internet is still on the fast track as more and more companies
enterprises and specialist small and medium-sized businesses are realizing the opportunity that
electronic commerce or e-commerce can brought them (Muddu, Tryfonas and Bulusu, 2018). E-
Commerce is one common trend which is speedily flourishing in all the different organisational
sectors and industries several opportunities and Strengths to all business segments and
organizations. Therefore separate business industries and companies are trying to catch up with
the first phase in the similar area of development of e-commerce. On the other hand There are
several organisations who are leading in position of in commerce are now implementing strategic
tools for avoiding reducing and managing the potential risks which E-Commerce brings to them
and to their businesses. Increasing use of internet and which digitalization has changed the lives
of many people businesses and other ordinary people to be connected with each other around the
globe and enabling them to access to the respective networks at a single and in a very efficient
way. This also provides an easy way of transferring information one place to another over the
computer networks but this also gives rise to several security issues and risks (Lin and et. al.,
2018). Therefore the network security has a very huge and essential influence over The E-
Commerce activities and different business transactions taking place on it. The investigation for
the respective research is going to be conducted over Amazon which is a American multinational
conglomerate technology based company. Amazon was founded in in 1994 by Jeff Bezos and it
is a public company. The company main product are Amazon echo, Amazon fire, Amazon fire
TV, Amazon fire OS, and Amazon Kindle. The other main services which are provided by
Amazon are amazon.com, Amazon Alexa, Amazon app store, Amazon prime video, Amazon
music and Amazon Web services. Company deals in e-commerce industry, cloud computing,
artificial intelligence, consumer electronics, digital distribution and grocery stores. Most of the
industries in which Amazon deals are network operated and therefore network security plays a
very important and essential role in e-commerce activities in which Amazon engages.
1
activities. A investigation conducted on Amazon.
Introduction
Background of project
As the development of internet is still on the fast track as more and more companies
enterprises and specialist small and medium-sized businesses are realizing the opportunity that
electronic commerce or e-commerce can brought them (Muddu, Tryfonas and Bulusu, 2018). E-
Commerce is one common trend which is speedily flourishing in all the different organisational
sectors and industries several opportunities and Strengths to all business segments and
organizations. Therefore separate business industries and companies are trying to catch up with
the first phase in the similar area of development of e-commerce. On the other hand There are
several organisations who are leading in position of in commerce are now implementing strategic
tools for avoiding reducing and managing the potential risks which E-Commerce brings to them
and to their businesses. Increasing use of internet and which digitalization has changed the lives
of many people businesses and other ordinary people to be connected with each other around the
globe and enabling them to access to the respective networks at a single and in a very efficient
way. This also provides an easy way of transferring information one place to another over the
computer networks but this also gives rise to several security issues and risks (Lin and et. al.,
2018). Therefore the network security has a very huge and essential influence over The E-
Commerce activities and different business transactions taking place on it. The investigation for
the respective research is going to be conducted over Amazon which is a American multinational
conglomerate technology based company. Amazon was founded in in 1994 by Jeff Bezos and it
is a public company. The company main product are Amazon echo, Amazon fire, Amazon fire
TV, Amazon fire OS, and Amazon Kindle. The other main services which are provided by
Amazon are amazon.com, Amazon Alexa, Amazon app store, Amazon prime video, Amazon
music and Amazon Web services. Company deals in e-commerce industry, cloud computing,
artificial intelligence, consumer electronics, digital distribution and grocery stores. Most of the
industries in which Amazon deals are network operated and therefore network security plays a
very important and essential role in e-commerce activities in which Amazon engages.
1
Rationale for selection of research topic
The selection of current research topic i.e. evaluating about how the network security can
influences the e-commerce activities is rationale as in today’s modern world huge scope and
opportunities is there for an online business but the security measures are always a biggest
concern for both customers and orgnisation. Thus, evaluating about the influence of network
security on the activities of an e-commerce orgnisation is vital for professional development of
researcher. Furthers, the current research topic also yield information about various strategies
and network security tools that could be implement by a company to ensure better safety
measures thus it is rationale and justifiable from view point of orgnisation. Apart from this, it
also meet the personal implication of investigator as it lead to enhanced academic performance
and better managerial skills along with better source of information for other scholar.
Research aim and objectives
Aim of project
The main aim behind conducting current research work on Amazon is, “To evaluate
about how the network security can influences the e-commerce activities along with
indentifying its importance for success of an e-commerce orgnisation.
Research objectives
The main objectives of investigator behind conducting this research work on an e-
commerce orgnisation i.e. Amazon has been listed as below:
To indentify the role and importance of network security in success and viable
performance of an e-commerce company (Maher and Boccon-Gibod, 2018).
To evaluate about the influences lead by network security on the activities of an e-
commerce orgnisation.
To determine the various strategies and network security tools that could be implement
by Amazon to ensure better safety measures for its online activities and operations to
yield better customer experience and satisfaction.
Research questions
The main questions and issues that would be addressed through current investigation
conducted on Amazon are stated as follows:
What role and importance is lead by network security on success and viable performance
of an e-commerce company?
2
The selection of current research topic i.e. evaluating about how the network security can
influences the e-commerce activities is rationale as in today’s modern world huge scope and
opportunities is there for an online business but the security measures are always a biggest
concern for both customers and orgnisation. Thus, evaluating about the influence of network
security on the activities of an e-commerce orgnisation is vital for professional development of
researcher. Furthers, the current research topic also yield information about various strategies
and network security tools that could be implement by a company to ensure better safety
measures thus it is rationale and justifiable from view point of orgnisation. Apart from this, it
also meet the personal implication of investigator as it lead to enhanced academic performance
and better managerial skills along with better source of information for other scholar.
Research aim and objectives
Aim of project
The main aim behind conducting current research work on Amazon is, “To evaluate
about how the network security can influences the e-commerce activities along with
indentifying its importance for success of an e-commerce orgnisation.
Research objectives
The main objectives of investigator behind conducting this research work on an e-
commerce orgnisation i.e. Amazon has been listed as below:
To indentify the role and importance of network security in success and viable
performance of an e-commerce company (Maher and Boccon-Gibod, 2018).
To evaluate about the influences lead by network security on the activities of an e-
commerce orgnisation.
To determine the various strategies and network security tools that could be implement
by Amazon to ensure better safety measures for its online activities and operations to
yield better customer experience and satisfaction.
Research questions
The main questions and issues that would be addressed through current investigation
conducted on Amazon are stated as follows:
What role and importance is lead by network security on success and viable performance
of an e-commerce company?
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
What are the possible influences lead by network security on the activities of an e-
commerce orgnisation?
What are the various strategies and network security tools that could be implement by
Amazon to ensure better safety measures for its online activities and operations to yield
better customer experience and satisfaction?
Literature Review
To identify the role and importance of network security in success and viable performance of an
e-commerce company.
According to LaBounty, 2020, Computer security breaches are ordinary, and a few happen the
world over consistently. Some are viewed as minor, with little loss of information or money
related assets, however a significant number of them are viewed as major, or even disastrous.
Hackers are persistently searching for new vulnerabilities to abuse. At the point when systems
are not made sure about, data about associations and people, and even our legislature are in
danger of being uncovered or utilized against us. Data security experts create and actualize safety
efforts to ensure an association's PC systems. As the quantity of digital assaults expands, their
insight and ability are in developing interest. Network security is the way toward taking deterrent
measures to shield the basic systems administration framework from unapproved get to, abuse,
breakdown, alteration, annihilation or ill-advised revelation. Actualizing these measures permits
PCs, clients and projects to play out their allowed basic capacities inside a safe situation. Making
sure about a system requires an unpredictable blend of equipment gadgets, for example,
switches, firewalls and hostile to malware programming applications. Government organizations
and organizations utilize profoundly talented data security experts to actualize security plans and
continually screen the viability of these plans. Network security is significant for home systems
just as in the business world. Most homes with fast web associations have at least one remote
switches, which could be misused if not appropriately made sure about. A strong system security
framework decreases the danger of information misfortune, robbery and damage.
PC Magazine offers basic steps to ensure a network system is secure:
1. Change your switch administrator username and secret word
2. Change the system name
3
commerce orgnisation?
What are the various strategies and network security tools that could be implement by
Amazon to ensure better safety measures for its online activities and operations to yield
better customer experience and satisfaction?
Literature Review
To identify the role and importance of network security in success and viable performance of an
e-commerce company.
According to LaBounty, 2020, Computer security breaches are ordinary, and a few happen the
world over consistently. Some are viewed as minor, with little loss of information or money
related assets, however a significant number of them are viewed as major, or even disastrous.
Hackers are persistently searching for new vulnerabilities to abuse. At the point when systems
are not made sure about, data about associations and people, and even our legislature are in
danger of being uncovered or utilized against us. Data security experts create and actualize safety
efforts to ensure an association's PC systems. As the quantity of digital assaults expands, their
insight and ability are in developing interest. Network security is the way toward taking deterrent
measures to shield the basic systems administration framework from unapproved get to, abuse,
breakdown, alteration, annihilation or ill-advised revelation. Actualizing these measures permits
PCs, clients and projects to play out their allowed basic capacities inside a safe situation. Making
sure about a system requires an unpredictable blend of equipment gadgets, for example,
switches, firewalls and hostile to malware programming applications. Government organizations
and organizations utilize profoundly talented data security experts to actualize security plans and
continually screen the viability of these plans. Network security is significant for home systems
just as in the business world. Most homes with fast web associations have at least one remote
switches, which could be misused if not appropriately made sure about. A strong system security
framework decreases the danger of information misfortune, robbery and damage.
PC Magazine offers basic steps to ensure a network system is secure:
1. Change your switch administrator username and secret word
2. Change the system name
3
3. Initiate encryption
4. Get serious about firewalls
5. Mood killer visitor systems
6. Update switch firmware
To evaluate about the influences lead by network security on the activities of an e-commerce
organisation.
According to O’Raghallaigh E, 2018,in any e-commerce company or business the components of
information uprightness, client and customer confirmation and non-revocation are basic to the
achievement of any online business. Information trustworthiness is the confirmation that
information transmitted is steady and right, that is, it has not been altered or modified at all
during transmission. Validation is a methods by which the two gatherings in an online exchange
can be sure that they are who they state they are and non-revocation is the possibility that no
gathering can debate that a real occasion online occurred. Verification of information honesty is
normally the least demanding of these components to effectively achieve. An information hash
or checksum, for example, MD5 or CRC, is normally adequate to set up that the probability of
information being imperceptibly changed is incredibly low. Despite these safety efforts, it is as
yet conceivable to bargain information in travel through strategies, for example, phishing or
man-in-the-center assaults. These defects have prompted the requirement for the advancement of
solid confirmation and security estimations, for example, computerized marks and open key
frameworks (PKI). One of the key improvements in web based business security and one which
has prompted the across the board development of internet business is the presentation of
advanced marks as a methods for check of information respectability and verification. In 1995,
Utah turned into the main purview on the planet to sanction an electronic mark law. An
electronic mark might be characterized as "any letters, characters, or images showed by
electronic or comparable methods and executed or received by a gathering with the plan to
validate a composition". All together for an advanced mark to achieve a similar legitimate status
as an ink-on-paper signature, uneven key cryptology more likely than not been utilized in its
creation. Such a framework utilizes twofold keys; one key is utilized to encode the message by
the sender, and an alternate, yet numerically related, key is utilized by the beneficiary to decode
the message. This is an awesome framework for electronic exchanges, since two outsider
gatherings, maybe living far separated, can affirm each other's character and subsequently
4
4. Get serious about firewalls
5. Mood killer visitor systems
6. Update switch firmware
To evaluate about the influences lead by network security on the activities of an e-commerce
organisation.
According to O’Raghallaigh E, 2018,in any e-commerce company or business the components of
information uprightness, client and customer confirmation and non-revocation are basic to the
achievement of any online business. Information trustworthiness is the confirmation that
information transmitted is steady and right, that is, it has not been altered or modified at all
during transmission. Validation is a methods by which the two gatherings in an online exchange
can be sure that they are who they state they are and non-revocation is the possibility that no
gathering can debate that a real occasion online occurred. Verification of information honesty is
normally the least demanding of these components to effectively achieve. An information hash
or checksum, for example, MD5 or CRC, is normally adequate to set up that the probability of
information being imperceptibly changed is incredibly low. Despite these safety efforts, it is as
yet conceivable to bargain information in travel through strategies, for example, phishing or
man-in-the-center assaults. These defects have prompted the requirement for the advancement of
solid confirmation and security estimations, for example, computerized marks and open key
frameworks (PKI). One of the key improvements in web based business security and one which
has prompted the across the board development of internet business is the presentation of
advanced marks as a methods for check of information respectability and verification. In 1995,
Utah turned into the main purview on the planet to sanction an electronic mark law. An
electronic mark might be characterized as "any letters, characters, or images showed by
electronic or comparable methods and executed or received by a gathering with the plan to
validate a composition". All together for an advanced mark to achieve a similar legitimate status
as an ink-on-paper signature, uneven key cryptology more likely than not been utilized in its
creation. Such a framework utilizes twofold keys; one key is utilized to encode the message by
the sender, and an alternate, yet numerically related, key is utilized by the beneficiary to decode
the message. This is an awesome framework for electronic exchanges, since two outsider
gatherings, maybe living far separated, can affirm each other's character and subsequently
4
diminish the probability of extortion in the exchange. Non-renouncement strategies keep the
sender of a message from in this manner denying that they sent the message. Computerized
Signatures utilizing open key cryptography and hash capacities are the by and large
acknowledged methods for giving non-disavowal of interchanges.
To determine the various strategies and network security tools that could be implement by
Amazon to ensure better safety measures for its online activities and operations to yield
better customer experience and satisfaction.
In view of Daniel D, 2019, Amazon can make use of several different network security or cyber
security measures which are beneficial for the company and for its e-commerce activities. There
are different cyber security tools and techniques which are most commonly used by
organisations. Amazon can also use such tools for ensuring their safety for its online activities
and business. The first tool is Access control if threat actors cannot get into your system, the
measure of harm they'll have the option to do will be very restricted. Access control permits
Amazon to build their system assurance by constraining client access and assets to just the pieces
of the system that straightforwardly apply to singular clients' obligations. The second tool is
Anti-Malware Software, Malware, as infections, Trojans, worms, key loggers, spyware, and so
on are intended to spread through PC frameworks and taint systems. Anti-malware instruments
are a sort of system security programming intended to distinguish hazardous projects and keep
them from spreading. Anti-malware and antivirus programming may likewise have the option to
help resolve malware contaminations, limiting the harm to the system. The third tool which is
useful for Amazon is Firewall, it work a lot of like entryways that can be utilized to make sure
about the fringes between your system and the web. Firewalls are utilized to oversee organize
traffic, permitting approved traffic through while blocking access to non-approved traffic.
Another cyber security which is used by organisation in e-commerce business and also can be
used by Amazon Web security, counting devices, hardware, strategies and the sky is the limit
from there, web security is a sweeping term to depict the system safety efforts organizations take
to guarantee safe web use when associated with an inner system. This forestalls online dangers
from utilizing programs as passages to get into the system. These are few Anti-malware and
secure tools and techniques which are beneficial for Amazon for securing and ensuring security
for its e-business activities and yield better and most efficient customer experience.
5
sender of a message from in this manner denying that they sent the message. Computerized
Signatures utilizing open key cryptography and hash capacities are the by and large
acknowledged methods for giving non-disavowal of interchanges.
To determine the various strategies and network security tools that could be implement by
Amazon to ensure better safety measures for its online activities and operations to yield
better customer experience and satisfaction.
In view of Daniel D, 2019, Amazon can make use of several different network security or cyber
security measures which are beneficial for the company and for its e-commerce activities. There
are different cyber security tools and techniques which are most commonly used by
organisations. Amazon can also use such tools for ensuring their safety for its online activities
and business. The first tool is Access control if threat actors cannot get into your system, the
measure of harm they'll have the option to do will be very restricted. Access control permits
Amazon to build their system assurance by constraining client access and assets to just the pieces
of the system that straightforwardly apply to singular clients' obligations. The second tool is
Anti-Malware Software, Malware, as infections, Trojans, worms, key loggers, spyware, and so
on are intended to spread through PC frameworks and taint systems. Anti-malware instruments
are a sort of system security programming intended to distinguish hazardous projects and keep
them from spreading. Anti-malware and antivirus programming may likewise have the option to
help resolve malware contaminations, limiting the harm to the system. The third tool which is
useful for Amazon is Firewall, it work a lot of like entryways that can be utilized to make sure
about the fringes between your system and the web. Firewalls are utilized to oversee organize
traffic, permitting approved traffic through while blocking access to non-approved traffic.
Another cyber security which is used by organisation in e-commerce business and also can be
used by Amazon Web security, counting devices, hardware, strategies and the sky is the limit
from there, web security is a sweeping term to depict the system safety efforts organizations take
to guarantee safe web use when associated with an inner system. This forestalls online dangers
from utilizing programs as passages to get into the system. These are few Anti-malware and
secure tools and techniques which are beneficial for Amazon for securing and ensuring security
for its e-business activities and yield better and most efficient customer experience.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Research Methodology
Investigators have to use different methods for their thesis and dissertations in order to conduct
effective and efficient research and rings in the best results and outcomes according to the topic
and to the respective area of the research. Research methodology is a tool which helps
investigator and explains what the researcher did and how did it assisting the readers and the
evaluators to you understand and gain knowledge about the reliability and validity of the
research conducted and the outcomes receipt (Terrill and et. al., 2018). There are two types of
researches which can be conducted by the investigator that is quantitative methods and
qualitative methods. The quantitative methods are used and best for measuring ranking and
categorizing different patterns and marking generalizations. On the other hand qualitative
methods are used for describing contextualizing and interpreting the specific concepts and
gaining an in-depth insight over the research topic. For this research the investigator used the
research onion model which games to explain the different stages which a researcher goes
through while conducting a thorough research in order to gain a appropriate outcome.
Research philosophy refers to set of principles data concerning the worldwide areas by
which researcher their research information and conduct their investigation. The research
philosophy MS physicians which are used academic li for studies are often divided into
positivism and interpretivism (Cuppens, Cuppens-Boulahia and Garcia-Alfaro, 2019).
For this research the investigator made use of positivism research philosophy. This states
that it is observed that the knowledge and data collected by the investigator is
independent of the subject. This is more of a scientific approach and results in testing all
different phenomena available to the researchers.
Research approach is the second layer of the research onion which states that once the
investigator chooses their appropriate methodology it is important for them to adopt or
pick a appropriate research approach for conducting and collection of there investigation
data. The research approaches are also of two types inductive and deductive. For this
research the investigator made use of deductive research approach which states and start
with a specific hypothesis which are developed on the basis of the literature review and
the information already existing in the world and are being observed by other researchers.
Basically researcher made use of the secondary data available in the market for
conducting their investigation and bringing the best outcomes.
6
Investigators have to use different methods for their thesis and dissertations in order to conduct
effective and efficient research and rings in the best results and outcomes according to the topic
and to the respective area of the research. Research methodology is a tool which helps
investigator and explains what the researcher did and how did it assisting the readers and the
evaluators to you understand and gain knowledge about the reliability and validity of the
research conducted and the outcomes receipt (Terrill and et. al., 2018). There are two types of
researches which can be conducted by the investigator that is quantitative methods and
qualitative methods. The quantitative methods are used and best for measuring ranking and
categorizing different patterns and marking generalizations. On the other hand qualitative
methods are used for describing contextualizing and interpreting the specific concepts and
gaining an in-depth insight over the research topic. For this research the investigator used the
research onion model which games to explain the different stages which a researcher goes
through while conducting a thorough research in order to gain a appropriate outcome.
Research philosophy refers to set of principles data concerning the worldwide areas by
which researcher their research information and conduct their investigation. The research
philosophy MS physicians which are used academic li for studies are often divided into
positivism and interpretivism (Cuppens, Cuppens-Boulahia and Garcia-Alfaro, 2019).
For this research the investigator made use of positivism research philosophy. This states
that it is observed that the knowledge and data collected by the investigator is
independent of the subject. This is more of a scientific approach and results in testing all
different phenomena available to the researchers.
Research approach is the second layer of the research onion which states that once the
investigator chooses their appropriate methodology it is important for them to adopt or
pick a appropriate research approach for conducting and collection of there investigation
data. The research approaches are also of two types inductive and deductive. For this
research the investigator made use of deductive research approach which states and start
with a specific hypothesis which are developed on the basis of the literature review and
the information already existing in the world and are being observed by other researchers.
Basically researcher made use of the secondary data available in the market for
conducting their investigation and bringing the best outcomes.
6
Research strategy is the third layer which is expected and highlights the ways and
strategy used by the researcher or investigator for conducting their study according to the
projects topic and the aims and objectives developed by them in the very beginning.
Research strategies includes experimental research, surveys, action research, interviews,
case study research and a systematic literature review. here for this research the
investigator made use of systematic literature review research strategy for conducting
their investigation and gaining appropriate data and knowledge about the research topic
and for the project aims and objectives. Research strategies are chosen by the
investigator on the basis of the data they need for ducting research along with the main
purposes of the study (Stute and Paly, 2018).
Data Collection method, are broadly divided into two categories that is primary and
secondary. A data or information is a very important and essential for a researcher
developing a evidence for their outcomes supporting the results provided by the
investigators. The data collection methods are used by researchers according to their
needs and requirements. The primary data is actually the information which is not
available in the market or in the whole world and that is extracted by the investigator
themselves. On the other hand the secondary data is that information which is already
existing in the market and which are collected and sorted by the researcher according to
their needs and requirements of their research topics. In this research the investigator
made use of secondary data as their research strategy which are adopted is of systematic
literature review. The the secondary data source for the data collection method is a
potential and very important tool for the investigators and they have to sort the data
according to their requirements for providing the best results and outcomes to the public
or thee reader.
Activities and timescale
Various activities and complex task are associated with conduction of an investigation thus,
use of Gantt chart is made by investigator for current research project. Gantt is a project
management tool that brings more clarity and transparency in a research work through properly
and systematically arranging and presenting all research activities in form a bar chart (Lu, Qu
and Liu, 2018). Use of Gantt chart is made for current investigation as it reduce the chances of
7
strategy used by the researcher or investigator for conducting their study according to the
projects topic and the aims and objectives developed by them in the very beginning.
Research strategies includes experimental research, surveys, action research, interviews,
case study research and a systematic literature review. here for this research the
investigator made use of systematic literature review research strategy for conducting
their investigation and gaining appropriate data and knowledge about the research topic
and for the project aims and objectives. Research strategies are chosen by the
investigator on the basis of the data they need for ducting research along with the main
purposes of the study (Stute and Paly, 2018).
Data Collection method, are broadly divided into two categories that is primary and
secondary. A data or information is a very important and essential for a researcher
developing a evidence for their outcomes supporting the results provided by the
investigators. The data collection methods are used by researchers according to their
needs and requirements. The primary data is actually the information which is not
available in the market or in the whole world and that is extracted by the investigator
themselves. On the other hand the secondary data is that information which is already
existing in the market and which are collected and sorted by the researcher according to
their needs and requirements of their research topics. In this research the investigator
made use of secondary data as their research strategy which are adopted is of systematic
literature review. The the secondary data source for the data collection method is a
potential and very important tool for the investigators and they have to sort the data
according to their requirements for providing the best results and outcomes to the public
or thee reader.
Activities and timescale
Various activities and complex task are associated with conduction of an investigation thus,
use of Gantt chart is made by investigator for current research project. Gantt is a project
management tool that brings more clarity and transparency in a research work through properly
and systematically arranging and presenting all research activities in form a bar chart (Lu, Qu
and Liu, 2018). Use of Gantt chart is made for current investigation as it reduce the chances of
7
overlapping of work and also lead to systematic presentation of all research activities along with
their set and expected timescale and duration to ensures timely completion of research work.
8
their set and expected timescale and duration to ensures timely completion of research work.
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
9
REFERENCES
Books and journal
Cuppens, F., Cuppens-Boulahia, N. and Garcia-Alfaro, J., 2019. Misconfiguration management
of network security components. arXiv preprint arXiv:1912.07283.
Lin, H. and et. al., 2018. A survey on network security-related data collection technologies. IEEE
Access. 6. pp.18345-18365.
Lu, Z., Qu, G. and Liu, Z., 2018. A survey on recent advances in vehicular network security,
trust, and privacy. IEEE Transactions on Intelligent Transportation Systems. 20(2).
pp.760-776.
Maher, D. P. and Boccon-Gibod, G., Intertrust Technologies Corp, 2018. Network security
systems and methods. U.S. Patent 9,973,535.
Muddu, S., Tryfonas, C. and Bulusu, R. P., Splunk Inc, 2018. Network security system with real-
time and batch paths. U.S. Patent 9,900,332.
Stute, M. R. and Paly, S. S., Masergy Communications Inc, 2018. Systems and methods of
network security and threat management. U.S. Patent 10,091,229.
Terrill, J. O. and et. al., 2018. Computer network security system. U.S. Patent 10,122,760.
Online:
14 Network Security Tools and Techniques to Know. 2019. [Online] Available Through:<
https://blog.gigamon.com/2019/06/13/what-is-network-security-14-tools-and-
techniques-to-know//>
Security Issues In E-Commerce. 2018. [Online] Available Through:<
https://digitalstrategy.ie/security-issues-in-e-commerce/>
What is Network Security and Why is it Important. 2020. [Online] Available Through:<
https://www.herzing.edu/blog/what-network-security-and-why-it-important/>
10
Books and journal
Cuppens, F., Cuppens-Boulahia, N. and Garcia-Alfaro, J., 2019. Misconfiguration management
of network security components. arXiv preprint arXiv:1912.07283.
Lin, H. and et. al., 2018. A survey on network security-related data collection technologies. IEEE
Access. 6. pp.18345-18365.
Lu, Z., Qu, G. and Liu, Z., 2018. A survey on recent advances in vehicular network security,
trust, and privacy. IEEE Transactions on Intelligent Transportation Systems. 20(2).
pp.760-776.
Maher, D. P. and Boccon-Gibod, G., Intertrust Technologies Corp, 2018. Network security
systems and methods. U.S. Patent 9,973,535.
Muddu, S., Tryfonas, C. and Bulusu, R. P., Splunk Inc, 2018. Network security system with real-
time and batch paths. U.S. Patent 9,900,332.
Stute, M. R. and Paly, S. S., Masergy Communications Inc, 2018. Systems and methods of
network security and threat management. U.S. Patent 10,091,229.
Terrill, J. O. and et. al., 2018. Computer network security system. U.S. Patent 10,122,760.
Online:
14 Network Security Tools and Techniques to Know. 2019. [Online] Available Through:<
https://blog.gigamon.com/2019/06/13/what-is-network-security-14-tools-and-
techniques-to-know//>
Security Issues In E-Commerce. 2018. [Online] Available Through:<
https://digitalstrategy.ie/security-issues-in-e-commerce/>
What is Network Security and Why is it Important. 2020. [Online] Available Through:<
https://www.herzing.edu/blog/what-network-security-and-why-it-important/>
10
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.