ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Importance of Cyber Security in Retail Industry

Verified

Added on  2023/01/05

|21
|7572
|72
AI Summary
This article discusses the importance of cyber security in the retail industry, focusing on the impact of cyber security incidents and the challenges faced by Primark. It also provides strategies to minimize the probability of future cyber attacks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Importance of Cyber Security
In Retail Industry

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Topic: “Importance of Cyber Security in Business”........................................................................2
CHAPTER 1: INTRODUCTION....................................................................................................2
1.1 Overview of research........................................................................................................2
1.2 Background of the research..............................................................................................2
1.3 Research aim....................................................................................................................3
Research Objectives...............................................................................................................3
1.4 Contribution of your research...........................................................................................3
1.5 Structure of the report.......................................................................................................3
Chapter 2..........................................................................................................................................5
Literature Review.............................................................................................................................5
2.1 To determine the impact of cyber security incidents to retail industry............................5
2.2 To ascertain challenges encountered by Primark as a result of cyber security attack......6
2.3 To formulate strategies for minimising the probability of occurrence of future cyber
attacks on Primark..................................................................................................................7
Chapter 3........................................................................................................................................12
Research Methodology..................................................................................................................12
3.1 Methodology Utilised..............................................................................................................12
3.2 Summary..................................................................................................................................16
Chapter 4........................................................................................................................................17
Design and Implementation...........................................................................................................17
4.1 Methodology............................................................................................................................17
4.2 Summary..................................................................................................................................18
References......................................................................................................................................19
1
Document Page
Topic: “Importance of Cyber Security in Retail Industry”
CHAPTER 1: INTRODUCTION
1.1 Overview of research
Cyber security is defined as body of practices, technologies and processes for protecting
devices, programs, networks and data from any kind of damage, attack or unauthorised access. It
implies practice to defend servers, electronic systems, mobile devices, etc. from malicious
attacks. As per the statistics, it has been identified various cyber attacks have been carried out in
2020 across United Kingdom which have created adverse impact on overall operations of firm
(Al-Sartawi and Razzaque, 2020). This means that cyber security is crucial for firm and different
trends in terms of attacks that are being carried out needs to be analysed. It will enable to
formulate strategies that will further lead to prevent cyber attacks.
For understanding the significance of cyber security, Primark is considered which is Irish
fast fashion retailer with their headquarters in Ireland. It was founded by Arthur Ryan on 13th
June 1969 and renders their services in different countries. Their key products comprises of
cosmetics, clothing and housewares. Recently the cyber security attack has been carried out on
Primark where email was sent for winning £500 for filling up survey. Here, scam utilised logos
and images of Primark for convincing users legitimacy of email (Primark issues warning over
scam offering £500 vouchers | #onlinescams | #scams | #internetscams, 2020).
1.2 Background of the research
Cyber security is defined as protecting internet-connected systems like software,
hardware and information from cyber-threats. The practice is utilised via enterprises and
individuals for protection of unauthorised access for data centres along with computerised
systems. The rationale behind execution of cybersecurity is to render enhanced security posture
for networks, servers, mobile devices, data and computers from attackers who have one or other
malicious intent. Cyber attacks are formulated to render enhanced access, deletion or extortion of
sensitive information and make cyber security vital (Blum, 2020). The study is conducted to
identify impact and a different strategy to ensure that organisation along with individuals whose
information is stored is protected. Across UK, it has been found that near around 36.6 million
records have been breached which is a large number (List of data breaches and cyber attacks in
August 2020 – 36.6 million records breached, 2020). This makes it more important that
2
Document Page
individuals along with firms like Primark takes essential steps through which the overall
pessimistic impact cannot be eradicated.
1.3 Research aim
“To analyse the significance of cyber security in business.” A case study on Primark.
Research Objectives
To determine the impact of cyber security incidents to retail industry.
To ascertain challenges encountered by Primark as a result of cyber security attack.
To formulate strategies for minimising the probability of occurrence of future cyber
attacks on Primark.
1.4 Contribution of your research
In this study the impacts will be analysed which are created due to cyber attacks within
the retail industry. The emphasis will be made on the challenges that are being faced by Primark
after the attack has occurred and what all the reasons behind its occurrence. Furthermore, certain
strategies will be developed for eradication of the future probabilities. It becomes difficult to
identify that attack will occur but by continuously remaining updated with the technologies and
methodologies used firm can ensure up to certain extent that there systems are secured.
1.5 Structure of the report
This is critical section of research that assists readers to classify information associated
with chapters that will be covered within the study is defined as route map. The different
chapters will be used for having a conclusion and their overview is illustrated beneath:
Chapter 1: Introduction: This chapter will furnish basics about the topic that will be
covered in the dissertation. It comprises of the basis along with adequate information associated
with the topic that is considered. The reader will be able to have data related with background,
aims, objectives and contributions that are being made within the topic.
Chapter 2: Literature Review: This denotes second chapter that is dependent on study
carried out via authors. In this section of dissertation, various books, research papers, journals
articles, magazines and online mediums will be used for accessing adequate information. This
aids reader to identify the work that has been done by others as well as their point of view. Here,
emphasis will be laid on cyber security aspects and the different ways which have been carried
3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
out along with their mitigation. Through this, the literature gap which prevails can be identified
in an adequate manner.
Chapter 3: Research Methodology: This chapter will provide details related with
methods that are used for carrying out research. It comprises of secondary and primary method to
gather data. Furthermore, philosophies, qualitative or quantitative and many other aspects
associated with research will be illustrated. This all will be illustrated in the context of cyber
security. It is a crucial method through which researcher can have support for working with
peculiar topic.
Chapter 4: Design and implementation: This involves interpretation of data associated
with the topic. The frequency table will be developed that will aid researcher to identify agreed
along with unagreed respondents with reference to cyber security concepts. Furthermore,
various graphs and tables will be used for carrying out analysis of data that is being attained.
Through this, adequate outcome can be attained by taking into consideration different
perspectives and conditions which might take place due to safety concerns.
Chapter 5: Discussion: The fifth activity will render assistance to investigator for
identification of primary as well as secondary information. Here, literature review will be used to
examine secondary information that is related with the topic. Furthermore, questionnaire will be
used for having primary data with reference to significance of cyber security along with benefits
that can be attained through its usage.
Chapter 6: Conclusion and Recommendation: This denotes last chapter which is
accountable for furnishing support to readers with respect to what is done and results that will be
acknowledged by conducting research. This chapter illustrates research findings along with
analysis up to certain extent. Along with this, some recommendations will be furnished for
organisation that will aid them to protect from any kind of cyber attacks in future.
4
Document Page
Chapter 2
Literature Review
The summary that has been published within specific area is referred to as literature
review. This is accountable for development of landscape for readers that will render absolute
understanding in context of improvements that have been carried out. The landscape renders
learner with relevant knowledge that is gathered from previous work conducted by authors
within peculiar field. Rationale behind opting for literature review is to assimilate wide range of
information so that insight can be attained and accordingly work can be conducted (Byrne,
2020). Different sources are being used for accumulation of information like articles, internet,
books, magazines, etc. This will lead them to deliver peculiar data and have optimistic results of
research. Basically, literature review is a systematic process which is being applied by
investigator for accomplishment of in-depth data related with current topic. In addition to this,
the gap that prevails in previous studies is conducted and through their identification, the further
work investigator needs to carry out will be identified. Within this section of dissertation, each
objective that is developed will be analysed in organised manner.
2.1 To determine the impact of cyber security incidents to retail industry
According to Hepfer and Powell (2020), cyber security implies process or state to protect
as well as recover programs, networks and devices from certain kind of cyber attacks. They
evolve danger to consumers, organisation and employees and are being designed for assessing or
destroying sensitive information as well as it might be for extortion of money. This further leads
to create a pessimistic impact on businesses along with this personal lives of individuals will also
be hampered like identity theft. The crime that is related with attaining financial or personal
information about other individuals to utilise their identity for carrying out frauds like having
unauthorised purchases or transaction is referred to as identity theft (Hepfer and Powell, 2020) .
The end result that will be attained via this is that there will be a definite damage on finances,
reputation and credits.
The strong cyber security system comprises of different layers in order to protect spread
of attacks. But this entirely does not depend on cyber defense technologies. It also depends on
the critical and analytical abilities that are being possessed by individuals. With evolution of
technology organisations are moving forward to digitalisation within their processes which acts
5
Document Page
as a reason behind occurrence of the attacks. This can be understood by taking an instance like
employees might not be technically sound which means that without appropriate knowledge they
might click on the links which they should not. It may lead to unidentified attacks and even after
doing so there is high probability that firm might not be able to know that are attacked. The
rationales behind going for technological shift is that the processes which employees have to
carry out manually will be conducted are automated and overall performance will be amplified.
But this makes them prone to wide range of attacks that involves, phishing, identity theft, virus,
malwares, Trojan horse and many others which creates the pessimistic impact on firm in context
of their performance, confidential information and their overall brand image.
The various attacks have been carried out in 2020, as due to the pandemic situation across
the country most of the firms have shifted for work from home which means that maximum of
the activities were carried out via online medium. This makes organisation more vulnerable to
attacks.
2.2 To ascertain challenges encountered by Primark as a result of cyber security attack.
According to Lloyd (2020), the assault that is being launched via cybercriminals through
usage of one or more systems against a network is defined as cyber attack. It is liable for
maliciously disabling computers, use breached systems like a launch point for carrying out
attacks or steal data. Cybercriminals opt for different methods for conducting cyber attacks that
involves phishing, denial of service, malware, ransomware and many more. Wide range of
attacks are carried out in order to attain details about individuals.
An instance can be taken into consideration with reference to cyber security attack that is
carried out on Primark. In this case, Primark has issued warning related with scam where
vouchers of worth £500 are being offered. The phishing attack utilised official branding for
promotion of fake surveys that leads to harvest sensitive data like payment that comprises of
account number of victim's bank (Lloyd, 2020). Email that is being sent promises that individual
have chance to win gift cards that are worth £500. When victim clicks on continue for free then
the fake website will be opened where sensitive data like PIN card, security code and account
details will be asked. In case, if addressee does not give respond then the message is sent that
comprises of final message and other details like your email has exclusively selected. The scam
is carried out via Facebook pages for legitimacy of scheme with usage of fake user that links
fake survey to page. The firm have responded that email campaign was not carried out by them
6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
as well as voucher offer. It has been made clear that the voucher is not genuine and this will not
be accepted in stores. But before this various users have fallen into the trap set by the intruder for
having access to their personal and financial information.
2.3 To formulate strategies for minimising the probability of occurrence of future cyber attacks
on Primark.
As per Vozikis and et. al, (2020), it is identified that various firms are prone to cyber
attacks due to the reason that weak or poor measures are being taken up by them. Organisation
like Primark goes through various challenges within market and for dealing with them it is
necessary to handle plans as well as implement them for attaining security. For formulation of
strategies it becomes essential for Primark to acknowledge different factors which creates
pessimistic impact on the ways in which services are being delivered by them. For this analysis
is being conducted by usage of different frameworks, they are specified below:
SWOT Analysis:
The framework that is used for evaluation of competitive positioning of the organisation
as well as formulates strategic planning is defined as SWOT analysis. This will aid Primark to
conduct analysis of their strengths along with weakness. Furthermore, through this firm can
explore opportunities along with threats. With respect to Primark, SWOT analysis is specified
below:
Strengths:
Primark have rapidly grown in years and this has made them to expand their operations
in UK as well as other countries. In 2019 Primark had 350 stores present in 11 countries
across America and Europe.
50,000 people are employed by the firm from all over the world which enables them to
serve their customers in an affirmative manner. This also allow them to have wide range
for apparels that comprises of childrenwear, menswear, womenswear, lingerie,
accessories, homewear and hosiery.
The profits of firm have increased with constant currency and this has also amplified
their reach (Abraham, Chatterjee and Sims, 2019). Primark have enhanced their presence
across 7 countries by furnishing sustainable goods.
7
Document Page
Firm is dependent on mouth of word promotions instead carrying out any kind of
advertising campaigns. This implies that they make more investments on their other
activities instead of having any kind of marketing approach.
Primark have strong presence in Europe and thus they are known by Penneys in Ireland.
They have opted for cost leadership strategy for offering their customers with affordable
prices.
Weaknesses: Because of restricted economic growth across EU, Primark is held back in context of
overall profit that they can attain.
By outsourcing manufacturing of apparels, there can be inconsistencies within quality that is
offered by firm to their potential customers (Anwar and et. al., 2017). Primark do not offer their services via online platform. In 2013, they have tested
electronic commerce through ASOS but partnership did not go well. Furthermore, the
shipping and cost was high which makes online trading not apt for the firm.
Opportunities: Primark can continue to emphasise in Europe by expanding their operations across cities
such as Berlin, Vienna, Madrid, Lisbon, etc. They can also have stores in Middle East
like in South Africa, India, China and many more. By carrying out extensive research, Primark can also analyse the markets of North-east
America for carrying out further expansion. They can conduct their operations like selling of products via online medium.
Threats: Primark have all their stores across Europe which implies their sales depend on EU
economy and it is on low growth trajectory. The organisation does not have presence within emerging markets and supply chain is
also vulnerable to certain natural disasters as well as other incidents (Culot and et. al.,
2019).
In context of technology, firm is not having adequate measures for protecting themselves
from any kind of cyber attacks. This makes them more prone to different online attacks.
8
Document Page
Pestle Analysis:
The tool that is used for identification of macro forces that are being experienced by
organisation while delivering their services within the marketplace is referred to as pestle
analysis. Primark admires the significance of analysis in creation of strategies and in this context
their Pestle analysis is specified beneath:
Political factors: The operations conducted by firm are subject to policies and regulations
formulated by government and this involves tariffs, political stability, employment laws,
etc. Brexit have deteriorated the pound which have created impact on retail sector of UK.
Furthermore, high VAT makes it difficult for Primark to keep low prices for their
customers (DeCoste, 2017).
Economic factors: The economic influence of Brexit on retailers is due to rise in
inflation which results within fall of pound that leads to cause hike within import prices
due to which Primark have to increase cost of their products. In addition to this, covid-19
has adversely hit the economic growth of the company as sales did not took place.
Social factors: The social trends which prevails across UK is growing obesity and this
has been found that obese female shoppers prefer not to go to certain retailers as they lack
plus size range. This leads Primark to have opportunities within the marketplace.
Furthermore, people prefer to have access to services easily and for this they opt for
online shopping through which they can avoid spending unnecessary time in activities
that can be done easily.
Technological factors: The shopping habits as well as expectations of people are
changing rapidly which is driven by e-commerce. This implies that seamless online
experience is becoming necessity for each retailer (Ettredge, Guo and Li, 2018). With the
increasing impact of Covid-19 people have opted for social distancing and this means
that people hardly visit any store and need to have shopping via online mediums. This
makes it important for Primark to have their strong presence but will evolution of
technology and lack of relevant knowledge this leads to open up channels for certain
cyber attacks which will further have pessimistic impact on the organisation.
Legal factors: This illustrates alterations within regulations, laws and policies to which
organisation are legally bounded. Across UK, the regulations comprises of anti-
9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
discrimination laws which are accountable for governing labour relations within
workplace. Furthermore, Primark need to ensure that while opting for technology while
rendering their services, they need to adhere to data privacy policies so that information
of their assets is kept confidential and third person do not have access to this.
Environmental factors: Primark supports different community projects, local charitable
firms and they have also opted for paper bags instead of plastic bags for minimising their
influence on the environment. They are working with partners with respect to making
improvements to combat critical sustainability challenges (Jeyaraj and Zadeh, 2020).
Like they review the chemical that utilise for colouring materials from which clothes are
made via zero discharge of hazardous chemicals. Primark is also member of SAC
(sustainable apparel coalition) for enhancing sustainability of supply chain.
The above section illustrates different aspects that are acknowledged by Primark while
delivering their services in different marketplace. This makes it essential that adequate measures
are being taken up by them to sustain within the market. Further, with covid-19 firms have
completely digitalised their processes but these leaves room for ample of cyber attacks (Jideani,
2018). For dealing with them Primark needs to make sure that they have strong systems for
dealing with such kind of situations. The certain strategies that can be adopted by Primark for
dealing with cyber attacks in future are illustrated beneath: Identification of threats: Threats such as unauthorised access to system needs to be
handled immediately before any kind of information is lost. Firms have information
related with employees, customers, suppliers, their financial information, strategies, etc.
stored within the system. In case, if it is leaked then this might ruin companies. Intruder
tends to determine ways that will lead them to invade privacy as well as steal data which
is important (Vozikis and et. al, 2020). Thus, it is important that relevant access to
provided to individuals. Beware about cybercrimes: It is important for organisation to think like an attacker in
order to understand what they can do. This will enable Primark to make sure that firm
possess relevant plans and strategies to deal with certain attacks. Firm have to maintain
records of all the details which seems attractive to criminals and which is not.
10
Document Page
Furthermore, proper risk assessment must also be conducted on regular basis for ensuring
effectual solution. Keep eye on employees: Human resources are crucial assets of organisation as they
possess deep insight into business and also have information related with operations that
have to be conducted. Primark needs to inspire their employees as well as discourage
from spreading any kind of vital information. In addition to this, backup of all the
messages that are interchanged among employees needs to be kept and must be assessed
to acknowledge if any kind of information related with attacks is carried out or nor. This
may be in encrypted form and there is possibility that it is not recognised (Yang, 2020).
Furthermore, the links they click on or information they share on any platform must be
taken into consideration.
Utilisation of two-factor authentication: This is efficacious way for preventing cyber
attacks by making sure that multi-factor authentication is enabled by firm for application
that makes use of internet. Assigning login passwords to employees of Primark will not
serve the purpose and in case if passwords are compromised by phishing or any other
attack then it will become easy for cyber criminals to have access to systems. Through
multi-factor authentication, employees have to give various details rather than single
information. This will lead Primark to have higher standards of authentication.
11
Document Page
Chapter 3
Research Methodology
Research methodology is regarded as essential part while carrying out study. The techniques and
procedures that are used by researcher for exploring relevant processing as well as data related
with probe area is referred to as research methodology. The rationale behind conducting research
methodology is to acknowledge approach, choices, data collection tools, philosophy and many
other aspects. Through this, different approaches can be determined, analysed and selected that
will aid researcher to carry out research in appropriate manner (Joshi and Akhilesh, 2020). Along
with this, it assists investigator to critically evaluate the topic in detailed way within short span
of time. In present study the topic that is taken into consideration is, To analyse the significance
of cyber security in business.” A case study on Primark, here research onion will be used for
identification, selection, processing along with carrying out analysis of information that is
collected by researcher related with peculiar topic. It is the accountability of researcher to ensure
that they take into account appropriate approach, type of data collection tool, choice and other
aspects. If they fail to do so then researcher will have to face ample of difficulties that might lead
them to attain less favourable outcomes. This chapter will be furnishing details regarding
research methodology that are used in carrying out dissertation. This section will enable reader to
acknowledge reliability and validity in study in significant manner. The methods that have been
used within this study are specified beneath:
3.1 Methodology Utilised
Research design: This is considered like actual design of dissertation that involves
dependents, problems, questions and many other aspects which creates a significant influence on
overall research. In addition to this, it also comprises of various aspects such as reviews,
experiments, description, etc. With reference to this research, researcher has opted for
exploratory research design that will aid within analysing information in accurate manner
(Kumar and Prasad, 2020). Through this researcher can develop understanding related with how
they can proceed while studying the topic and which methodology will be apt for collection of
data related with the topic. Through this, researcher will be able to have well grounded
illustration of situation that is present along with basic concerns.
12

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Types of study: This is divided into different aspects that involves quantitative along with
qualitative methodology. With reference to quantitative research, the investigator conducts
systematic investigation by accumulation of quantifiable information as well as conduct
statistical, computational or mathematical techniques. In this case surveys, questionnaires, etc.
will be utilised to have outcome in numerical form. The qualitative research is liable for
illustrating aspects that are non-quantifiable and non-numerical means it will provide overview
of information which can be used for carrying out analysis (Luansing, 2017). With reference to
this dissertation both quantitative and qualitative study will be utilised. The quantitative will
provide statistical information associated with the topic and qualitative will render in-depth
aspects as well as generalisable information will be provided.
Sources of data collection: This denotes method through which researcher will be able to
attain data related with cyber security. With respect to this, there are two methods, primary and
secondary research. In this study, researcher has opted for both the methods in order to have
access to adequate and precise information. In primary method, questionnaire will be used by
investigator in order to have fresh information depending upon the conditions that prevails
within working environment of Primark. On the other hand, in secondary research the existing
data is analysed to have outcome. In this book, research articles, journals and internet sources are
used for having access to information associated with the topic. This will further aid them to
develop strategies and accordingly identify the methods for prevention from different cyber
attacks.
Research approach: This is considered as a plan or strategy which is conducted by
assistance of diverse research methods for collection of data. The research approach of two types
that comprises of inductive and deductive. In case of inductive, there is minimum literature that
is based on observation, different patterns and formulation of theory accordingly (Mathur, 2019).
Deductive research approach, utilises the theories, hypothesis is formulated with reference to
that, data is collected and analysis is carried out accordingly. With reference to this dissertation,
deductive research will be used in order to have relevant data related with topic and attain
relevant outcomes.
Research philosophy: This denotes individual’s beliefs which will assist within
conduction evaluation of data which is collected in specific patterns. This will further aid within
attaining relevant goals or outcome in context of importance of cyber security. There exist two
13
Document Page
types of philosophies, they are positivism and interpretivism. Positivism is aligned with methods
related with natural sciences in which deductive logical reasoning is utilised. In this case, data
which is verifiable as well as is gathered in value-free way will be used that further enables
within generation of outcomes. With respect to interpretivism, emphasis is laid on distinct
situations and interpretation is formulated accordingly. Here in-depth assessment is required for
driving a conclusion. In this study, researcher have utilised interpretivism for evaluating data in
an adequate manner.
Research Strategy: This enables researcher to develop meticulous strategies that are
associated with going through processes that will lead to ensure that investigation is conducted in
significant manner (Nagurney and Shukla, 2017). This involves grounded theory, action
research, case studied, archival research and many more aspects that researcher needs to take into
consideration while carrying out study. For gathering of information related with significance of
cyber security, it becomes important to identify threats that are being faced and accordingly
strategies are required for dealing with those attacks. For this market survey will be utilised in
order to have specific and precise information. Furthermore, it will enable to accumulate reliable
data in effective manner from different respondents.
Time horizon: This implies time frame required for completion of the research. This is of
two types, they are cross-sectional as well as longitudinal time frame. Cross-sectional research
refers to gathering of information at peculiar instance of time and thus it is also known as short
term study. The longitudinal research refers to accumulation of information repeatedly over long
time period through which data can be compared. This implies iterative method for carrying out
analysis of gathered information. With respect to this study, cross-sectional time horizon will be
used for make sure that outcome is attained within peculiar duration of time. For ensuring this
Gantt chart will be used by researcher as through this rigorous information can be acquired that
involves start as well as end of the study.
Method of data analysis: This enables researcher to have analysis related with
quantitative data in terms of importance of cyber security in retail industry along with challenges
that are being faced by firms while dealing with certain technological attacks (Newhouse and
Weeks, 2016). Data analysis is conducted in accordance to quantitative as well as qualitative
methods. Quantitative methods like trend analysis, MaxxDiff can be used for ensuring that
results attained are adequate. In case of qualitative framework distinct techniques such as
14
Document Page
grounded theory, framework analysis and many more will be used. In context of this dissertation,
content analysis will be utilised where emphasis is made on measuring information by making
use of questionnaire.
Research Ethics: This implies issues or challenges which are faced by investigator when
research is carried out in context of any peculiar topic. In this case, researcher is accountable for
taking into consideration different ethical liabilities while collection of data through legal
sources, ensure that any kind of discrimination do not occur and there are many other which are
regarded while doing research (Nivarthi and Akhilesh, 2020). In case, if they are not regarded
then pessimistic influence will be made on the research. Thus, ethics must be taken into account
so that any kind of vulnerabilities that will hamper work will be eradicated.
Research Limitation: The major factor which restrains research is time as various
activities have to be carried out along with this ample of sample size have to be evaluated while
carrying out primary research. This means that it has to be ensured that Gantt chart is used in an
effective manner to attain results within specified duration of time. Furthermore, the other factor
is formulation of aims and objectives along with this it becomes difficult to analyse methods that
will yield affirmative results. These are crucial aspects that researcher have to carefully address
while conducting study.
Precise unders Research reliability and validity: It is significant section that is related
with research methodology and aids researcher to recognise validity and reliability of research
that has to be carried out. For ensuring reliability, implementation test techniques such as
questionnaire will be used to have a point of opinion of respondents and accordingly interpret the
information that has been derived. This will assist investigator to acknowledge view of
participant or respondents in context of significance of cyber security. In this case questionnaire
is used that will act like a imperative method and is relevant for rendering adequate information
associated with cyber security (Perols and Murthy, 2018). This acts like a critical aspect to
validate information as well as address certain cyber attacks and accordingly illustrate the
strategies of cyber security while rendering services within the retail industry. Therefore,
questionnaire is precise test instrument that will help researcher within having reliable as well as
valid information associated with the study.
15

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3.2 Summary
The chapter provides in-depth knowledge related with distinct methodologies that are
being used by researcher for carrying out research. It has been analysed from above that
questionnaire yields reliable, valid and precise information. In this case respondents that will eb
taken into consideration will be individuals who make use of technology for having services as
they might have fallen into trap set by intruders or are prone to some kind of attacks while
making use of their devices. This will aid within formulating strategies through which such kind
of attacks can be prevented. In addition to this, researcher can have details associated with cyber
attacks, challenges associated with dealing with them and strategies that can be taken for
mitigating them.
16
Document Page
Chapter 4
Design and Implementation
In this chapter insight will be provided into methods which are executed when
dissertation is being carried out. The specific techniques or procedures that will aid researcher to
have reliability along with validity in adequate manner will be furnished. In this case, distinct
instruments, techniques and procedures will be specified through which aims and objectives ca
be attained in precise manner (Poster, 2018). Apart from this, sampling methods will be
furnished and questionnaire will be illustrated that is utilised for accumulation of information
with reference to cyber security in retail industry. This might enable management of Primark to
acknowledge different aspects which might lead them to amplify their operations.
4.1 Methodology
Research instruments, procedures or techniques: This is significant section that is
present in research methodology and will aid researcher to identify validity and reliability of
research through usage of specific methods while conducting research in context of importance
of cyber security within the retail industry. The reliability of research depends on the way in
which test techniques are executed by researcher and understanding which technique will furnish
researcher with view point of participants or respondents in context of area of study. With
respect to this study, questionnaire is used for having relevant data with respect to cyber security
while analysing different attacks that have been carried out within the retail industry.
Questionnaire is considered like a technique that is being used by researcher for furnishing
support via reliable information related with area of research. The questionnaire is regarded as
critical aspect within validating as this is liable for furnishing compelling information related
with different aspects associated with cyber security and ways in which firms are impacted via
cyber attacks (Salim and Madnick, 2016). Thus, questionnaire acts like a significant test
instrument that is liable for supporting researcher within accumulation of reliable as well as
validation in context of specific study.
Sampling techniques:
Sample in context of the study signifies introduction of objects, items or individuals that
are used by the investigator from within the whole population that enables execution of
measurement (Shah, Muhammad and Ameen, 2020). Usually, there are 2 techniques that are
17
Document Page
used for the purpose of sampling named as non probability sampling and probability sampling.
In relation to the latter, subject matter linked to bigger population constitutes analogous
deviations which have been consented upon such as a representative sample. Regarding non
probability sampling, this does not rely on subjective anticipation of the investigator. In context
of the current dissertation, non probability sampling is being used by the researcher to enable
suitability. There are several bases in accordance with which convenience sampling is dealt with.
Convenience sampling is meritorious as it assists in furnishing the researcher with sufficient
sample from within the range of whole population. Now, 30 respondents are taken for this
research project that will be selected on a random basis. However, only those respondents will be
selected who are software developers as they will provide due assistance to the researcher in
collecting appropriate and relevant information concerning the subject matter of cyber security
and related consequences and measures to allow the same (Shrobe, Shrier and Pentland, 2018).
These respondents will allow the researcher to gather information related to the working of
different software along with the challenges that are linked to working on them. Usually, the
researcher makes use of quantitative data which uses statistical data for the purpose of making
test hypothesis. There are several kinds of random sampling such as multistage, cluster, simple,
stratified random and so on. However, all of these are not relevant for conducting the current
study. Thus, non probability will be used for this study.
4.2 Summary
This chapter is liable for rendering details related with methodologies that are used for
completing the research. This provides in-depth insight within different techniques or tools like
questionnaire for having access to precise information. In addition to this, random sampling will
be utilised for accumulation of data but for this it needs to be made ensured that they
(respondents) make use of technology or any e-commerce sites for having services. This will
enable researcher to have specific information.
18

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Books & Journals
Abraham, C., Chatterjee, D. and Sims, R.R., 2019. Muddling through cybersecurity: Insights
from the US healthcare industry. Business horizons, 62(4), pp.539-548.
Al-Sartawi, A.M.M. and Razzaque, A., 2020. Cyber Security, IT Governance, and Performance:
A Review of the Current Literature. In Implementing Computational Intelligence
Techniques for Security Systems Design (pp. 275-288). IGI Global.
Anwar, M. and et. al., 2017. Gender difference and employees' cybersecurity
behaviors. Computers in Human Behavior, 69, pp.437-443.
Blum, D., 2020. Rational Cybersecurity for Business: The Security Leaders' Guide to Business
Alignment.
Byrne, R., 2020. The Importance of Cybersecurity Awareness Training on Small Corporations to
Reduce the Risk of a Social Engineering Attack (Doctoral dissertation, Utica College).
Culot, G. and et. al., 2019. Addressing Industry 4.0 cybersecurity challenges. IEEE Engineering
Management Review, 47(3), pp.79-86.
DeCoste, J., 2017. The impact of cyber-attacks on publicly traded companies (Doctoral
dissertation, Concordia University).
Ettredge, M., Guo, F. and Li, Y., 2018. Trade secrets and cyber security breaches. Journal of
Accounting and Public Policy, 37(6), pp.564-585.
Hepfer, M. and Powell, T.C., 2020. Make Cybersecurity a Strategic Asset. MIT Sloan
Management Review, 62(1), pp.40-45.
Jeyaraj, A. and Zadeh, A., 2020. Institutional Isomorphism in Organizational Cybersecurity: A
Text Analytics Approach. Journal of Organizational Computing and Electronic
Commerce, pp.1-20.
Jideani, P.C., 2018. Towards a cybersecurity framework for South African e-retail
organisations (Doctoral dissertation, Cape Peninsula University of Technology).
Joshi, K. and Akhilesh, K.B., 2020. Role of Cyber Security in Retail. In Smart Technologies (pp.
233-247). Springer, Singapore.
Kumar, B. and Prasad, S.B., 2020. Cyber Security Techniques for Internet of Things (IoT).
In Quantum Cryptography and the Future of Cyber Security (pp. 257-282). IGI Global.
Lloyd, G., 2020. The business benefits of cyber security for SMEs. Computer Fraud &
Security, 2020(2), pp.14-17.
Luansing, K.P., 2017. Threat to Retail Business Information Security: Cybersecurity in the Retail
Industry (Doctoral dissertation, Utica College).
Mathur, M., 2019. Where is the security blanket? Developing social media marketing capability
as a shield from perceived cybersecurity risk. Journal of Promotion Management, 25(2),
pp.200-224.
Nagurney, A. and Shukla, S., 2017. Multifirm models of cybersecurity investment competition
vs. cooperation and network vulnerability. European Journal of Operational
Research, 260(2), pp.588-600.
Newhouse, W. and Weeks, S., 2016. [Project Description] Securing Non-Credit Card, Sensitive
Consumer Data: Consumer Data Security for the Retail Sector (Draft) (pp. 12-12).
National Institute of Standards and Technology.
Nivarthi, C.P. and Akhilesh, K.B., 2020. Cybercare—Role of Cyber Security in Healthcare
Industry. In Smart Technologies (pp. 291-304). Springer, Singapore.
19
Document Page
Perols, R.R. and Murthy, U.S., 2018. The impact of cybersecurity risk management examinations
and cybersecurity incidents on investor perceptions. Available at SSRN 3112872.
Poster, W.R., 2018. Cybersecurity needs women.
Salim, H. and Madnick, S., 2016. Cyber safety: A systems theory approach to managing cyber
security risks–Applied to TJX cyber attack. Work. Pap. CISL 2016, 9.
Shah, M.H., Muhammad, R. and Ameen, N., 2020, April. Cybersecurity Readiness of E-tail
Organisations: A Technical Perspective. In Conference on e-Business, e-Services and e-
Society (pp. 153-160). Springer, Cham.
Shrobe, H., Shrier, D.L. and Pentland, A. eds., 2018. New Solutions for Cybersecurity. MIT
Press.
Vozikis, D. and et. al, 2020, August. On the importance of cyber-security training for multi-
vector energy distribution system operators. In Proceedings of the 15th International
Conference on Availability, Reliability and Security (pp. 1-6).
Yang, S.C., 2020. A meta-model of cybersecurity curriculums: Assessing cybersecurity
curricular frameworks for business schools. Journal of Education for Business, pp.1-12.
Online
Primark issues warning over scam offering £500 vouchers | #onlinescams | #scams |
#internetscams. 2020. [Online. Available through: <
https://nationalcybersecuritynews.today/primark-issues-warning-over-scam-offering-500-
vouchers-onlinescams-scams-internetscams-2/>.
List of data breaches and cyber attacks in August 2020 – 36.6 million records breached. 2020.
[Online]. Available through: < https://www.itgovernance.co.uk/blog/list-of-data-
breaches-and-cyber-attacks-in-august-2020-36-6-million-records-breached>.
20
1 out of 21
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]