logo

Project Blogs

   

Added on  2023-04-10

3 Pages671 Words410 Views
Project Blogs
Project Blogs
Week 1
The first week of the project included the conceptualization phase of the project. In this week,
the first task that was done was the selection and confirmation of the project title. Biometrics
Security was selected as the title of the project. Research rationale was done in this week as
the next task. Cybercrimes have become a frequent occurrence in the business organizations.
Also, the individual users are impacted with such crimes resulting in adverse impacts. The
digital information is captured by the cyber criminals resulting in the violation of information
privacy and security. The organizations also suffer badly due to these incidents as there
negative implications, such as legal obligations, loss of customer trust, and poor market
reputation that arises. There was a research proposal that was developed in this week
comprising of the research details and methods. The approval from the supervisor was then
obtained on the research proposal.
Week 2
It was necessary to plan the research work adequately so that the research aims and objectives
could be achieved. The week started with the planning of the project and the research
methodology was finalized in this week. The research method used to find out about the
applications of Biometrics Security in the IT and non-IT fields for treating cybercrimes will
be done using qualitative research methods. The exploration of the research subject will be
done under this method to provide the answers to the research questions. Grounded theory
and case study will be used to carry out the research. The theory will be used to determine the
essence of the biometrics security measures in the IT and non-IT companies. The data
collection methods as interviews, observations, etc. were also finalized in this week and the
estimations & calculations were carried out. The resources were allotted their duties and roles
through the RACI matrix.
Week 3
The research execution kick started in this week of the project. It was necessary that the data
sets were gathered to analyse the information and come up with the research outcomes. The
primary data collection methods there were used for the research work were interviews and
observations. The research for the use and application of biometrics security was done for the
IT firms in this week. The interviews were conducted with the employees of the
organizations of various small, medium, and large-scale IT firms. The technical experts and
1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometrics Security Project Plan
|11
|2031
|450

CJ 4472 - Reflective Journal Challenges for Cyber Security in Business
|6
|1324
|781

Overview of the Journey in Designing an IT Tool
|4
|852
|421

Significance of Cybercrime Legislation in Maintaining Law and Order: A Study on the UK
|6
|1137
|449

Comparison of Data Protection Laws in UAE and UK
|16
|4042
|70

Relationship between E-Banking and Cybercrime in UK Banking Industry
|62
|18788
|486