logo

Business Research Method University Name Student Name Authors Note

12 Pages2758 Words38 Views
   

Added on  2020-05-16

About This Document

Introduction Cyber security can be considered to be used for mainly information security, in which the latter takes into account the role of human in process of security whilst the former deems this as a supplementary element and also, centre person has a prospective target. The current study also initiates the notions of cyber security from the dimension of its framework, workforce as well as information associated to shielding personal information in the computer. Project Objective The primary objective of this study is to conduct an assessment of literature on diverse issues associated

Business Research Method University Name Student Name Authors Note

   Added on 2020-05-16

ShareRelated Documents
Running head:BUSINESS RESEARCH METHODBusiness Research MethodUniversity NameStudent NameAuthors’ Note
Business Research Method University Name Student Name Authors Note_1
2BUSINESS RESEARCH METHODTable of Contents1. Introduction............................................................................................................................22. Project Objective....................................................................................................................33. Scope of the project................................................................................................................34. Review of literature................................................................................................................35. Research Questions/Hypothesis.............................................................................................66. Research Design and Methodology.......................................................................................67. Research Limitations..............................................................................................................98. Time Schedule........................................................................................................................99. Conclusion............................................................................................................................1010. References..........................................................................................................................12
Business Research Method University Name Student Name Authors Note_2
3BUSINESS RESEARCH METHOD1. IntroductionCyber security can be considered to be used interchangeably for mainly information security,in which the latter takes into account the role of human in process of security whilst theformer deems this as a supplementary element and also, centre person has a prospectivetarget. Nevertheless, this kind of conversation on cyber security has significant implicationsince it stresses on the ethical aspects of the community on the whole. In a bid to deal withthis specific issue of cyber security, diverse frameworks as well as models are designed. Thecurrent study also initiates the notions of cyber security from the dimension of its framework,workforce as well as information associated to shielding personal information in thecomputer.2. Project Objective The primary objective of this study is to conduct an assessment of literature on diverse issuesassociated to cybersecurity encountered by contemporary companies owing to the reputationof the internet along with internet-based services. The researcher intends to analyse diversefirms and the cyber-attacks encountered by these firms to comprehend the influence ofcybercrimes (Massey 2017). Again, the secondary aim is to deliver a variety of suggestionsthat can be used by firms to address the threats of cybersecurity.3. Scope of the projectIn the current study, the researcher intends to analytically review the influence of the internetas well as other online services on the function of firms and comprehend the alterations intheir functions to evaluate their susceptibility towards threats of cyber crime. In addition tothis, the researcher also needs to assess diverse cyber threat, along with online risksencountered by corporations in current years (Monostori 2014). Different theories along with
Business Research Method University Name Student Name Authors Note_3
4BUSINESS RESEARCH METHODprofessional advice explained in the section on review of literature can help in understandingthe aims of the study. 4. Review of literatureCritical Issues associated to cyber securityCyber security mainly upon care that diverse individuals can get and conclusions that theyarrive at whilst they arrange, handle and use systems along with Internet. Efforts are put todiscover solutions for particularly cyber security analysis challenge and diverse structures arealso constructed. Nevertheless, the structure faces diverse intricacies even though it wasinitially working at the time of development (Wan et al. 2014). The limitations draw fromdifferent aspects, namely, emerging technologies along with facility restrictions. As rightly indicated by Ruchkin et al. (2016), progression of the internet in the past decadehas augmented overall utilization of the internet based services in various corporations.Several corporations utilize infrastructure founded on internet to deliver the services as thismakes it seamless for organizations to reach out to global audience. In place of large firms,internet use has essentially become substantially accepted among individuals, businessentrepreneurs along with small corporations. As suggested by Taylor et al. (2014),individuals make use of internet for the purpose of connecting as well as sharing with friendsand families. This also delivers business opportunities to various business entrepreneurstogether with small corporations to expand the business operations. In addition to this, bothbusiness concerns along with people upload various sensitive along with personal data onparticularly the internet that makes them the potential target for cyber attacks. Majority ofcyber crimes are undertaken by individuals who have admittance to the internet as well ascomputer as inadequacy of security dimensions can make it seamless for them to targetvarious innocent individuals. According to Elmaghraby and Losavio (2014), there are
Business Research Method University Name Student Name Authors Note_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges in Cyber Security For Business
|18
|4370
|325

HI6008 - Business Research - Challenges in Cyber Security in Business
|10
|2609
|313

Challenges of Business Cybersecurity: Strategies to Improve Cybersecurity in Business
|13
|2987
|58

Challenges and Strategies for Overcoming Cybersecurity Threats in Business
|14
|3661
|196

Cyber Security Project Scope 3 Research Project Scope 3 Literature Review
|13
|3612
|340

Challenges and Strategies for Cyber Security in Organizations
|14
|3716
|159