This series of blog posts provides updates on the progress of a project. Week 1 includes the selection of the project title and research rationale. Week 2 focuses on planning the research methodology. Week 3 covers data collection methods and interviews. Week 4 continues data collection for IT and non-IT firms.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Project Blogs Project Blogs Week 1 The first week of the project included the conceptualization phase of the project. In this week, the first task that was done was the selection and confirmation of the project title. Biometrics Security was selected as the title of the project. Research rationale was done in this week as the next task.Cybercrimes have become a frequent occurrence in the business organizations. Also, the individual users are impacted with such crimes resulting in adverse impacts. The digital information is captured by the cyber criminals resulting in the violation of information privacy and security. The organizations also suffer badly due to these incidents as there negative implications, such as legal obligations, loss of customer trust, and poor market reputation that arises. There was a research proposal that was developed in this week comprising of the research details and methods. The approval from the supervisor was then obtained on the research proposal. Week 2 It was necessary to plan the research work adequately so that the research aims and objectives could be achieved. The week started with the planning of the project and the research methodology was finalized in this week.The research method used to find out about the applications of Biometrics Security in the IT and non-IT fields for treating cybercrimes will be done using qualitative research methods. The exploration of the research subject will be done under this method to provide the answers to the research questions. Grounded theory and case study will be used to carry out the research. The theory will be used to determine the essence of the biometrics security measures in the IT and non-IT companies. The data collection methods as interviews, observations, etc. were also finalized in this week and the estimations & calculations were carried out. The resources were allotted their duties and roles through the RACI matrix. Week 3 The research execution kick started in this week of the project. It was necessary that the data sets were gathered to analyse the information and come up with the research outcomes.The primary data collection methods there were used for the research work were interviews and observations. The research for the use and application of biometrics security was done for the ITfirmsinthisweek.Theinterviewswereconductedwiththeemployeesofthe organizations of various small, medium, and large-scale IT firms. The technical experts and 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Project Blogs Biometric specialists were also interviewed to determine the possible use of the measure. The cyber specialists were interviewed to determine the forms of these attacks and the threat agents that are used. The observation of the existing systems and tools was done to understand the attack patterns and mechanisms (Zhu, 2015).All of these data sets were then compiled so that the analysis could be done properly. Week 4 In this week, the data collection process for the IT firms continued for the initial days of the week. The data collection process for the non-IT firms then began. The collection of the data sets was done for the non-IT firms under several domains, such as healthcare, finance, marketing, and several others.Interviews and observations were the primary measures that were used. The interviews were conducted with the employees of the organizations of various small,medium,andlarge-scalenon-ITfirms.Themarketingassociatesandtechnical employees were also interviewed to determine the possible use of the measure. The cyber specialists were interviewed to determine the forms of these attacks and the threat agents that are used (Parodi, 2013). The observation of the existing systems and tools was done to understand the attack patterns and mechanisms.The compilation of all of these data sets was then done to analyse the data sets. 2
Project Blogs References Parodi, F. (2013). The Concept of Cybercrime and Online Threats Analysis.International JournalOfInformationSecurityAndCybercrime,2(1),59-66.doi: 10.19107/ijisc.2013.01.07 Zhu, H. (2015). One-time identity-password authenticated key agreement scheme based on biometrics.SecurityAndCommunicationNetworks,8(13),2350-2360.doi: 10.1002/sec.1182 3