Ask a question from expert

Ask now

CJ 4472 - Reflective Journal Challenges for Cyber Security in Business

6 Pages1324 Words781 Views
   

Troy University

   

Cyber Security (CJ 4472)

   

Added on  2020-03-13

About This Document

The research process was completed in 12 weeks. The first week was the initiation week which included the selection of the research topic as Challenges for Cyber Security in Business and a feasibility study was also carried out. The research was feasible and the results were documented.

CJ 4472 - Reflective Journal Challenges for Cyber Security in Business

   

Troy University

   

Cyber Security (CJ 4472)

   Added on 2020-03-13

BookmarkShareRelated Documents
Challenges for CyberSecurity in BusinessReflective Journal
CJ 4472 - Reflective Journal Challenges for Cyber Security in Business_1
Reflective JournalReflective JournalThe research process was completed in duration of 12 weeks. The first week was the initiationweek that included the selection of the research topic as Challenges for Cyber Security inBusiness and a feasibility studied was also carried out. The research was feasible and the resultswere documented. The second week of the research process included the planning of research scope and researchquestions. The research methodologies as qualitative and quantitative methods of research werefound to be apt for the chosen topic. A research plan was completed in the second week (Polyu,2002). A literature review was carried out in the third week. There were case studies of three differentcompanies that were studied and analyzed to understand the cyber-attacks and issues that wereprevailing. There were also other research journals and articles that were studied and referenced. In Week 4 and 5, a research proposal was prepared which included the gaps that were identified,research methodologies along with the limitations and timeline. Week 6 included the sampling process that was required for research execution. There weresmall and large sample sizes that were identified for the research execution (Watkins, 2007).The next two week, that is, week 7 and week 8 included that identification of the data sourcessuch as organizational documents, online articles, libraries and likewise to gain more and moreinformation on the challenges that were associated with cyber-security in business. Data analysis was carried out in Week 9 and 10. The data that was collected was analyzed tounderstand the patterns and the trends that were associated. The results were then compiled anddocumented (Niu, 2014). The last two weeks were kept reserved for the review and presentation part. The research workthat was done was reviewed by the guides, mentors and specialists and the feedback wasincorporated. The final research paper was then presented as the last step in the research work. 2
CJ 4472 - Reflective Journal Challenges for Cyber Security in Business_2
Reflective JournalLearning ExperienceThe learning experience during the research process provided an in-depth knowledge on theresearch topic as Challenges for Cyber-security in Business. There are occurrences and securityevents that are talked about but are not paid much attention unless the issues as personallyanalyzed and understood.The learning experience allowed the ability to acquire the skills on the research methodologiesand processes along with the details of the challenges and issues associated with cyber-security(Dcu, 2017). The learning experience has an immense value as it has allowed the enhancement of the researchand technical skills and abilities and has also provided the capabilities to deal with the risks thatmay come up during a project timeline. Usefulness of the Learning ProcessThe learning experience will serve positively in the course and program as it will provide thenecessary professional growth and development. It will be useful in the future career and personal life as well. It is because of the reason that theresearch topic that is selected has a lot many employment opportunities in the current times.There are varied roles and profiles that the employers have generated in the area of cyber-security. The research work will allow the opportunity to apply in such roles and will also aid inthe measures that must be adapted to avoid and prevent the security risks (Uts, 2017). Activities that Occurred in the Learning ProcessThe research process that was carried out was done in a series of activities and phases. Therewere initiation, planning, execution, analysis and presentation phases that were involved thatincluded a set of activities and sub-activities. There were challenges and issues that were observed in the field of cyber-security in variousindustries and the impacts that they have on the business and the end-user were understood.There are many cyber-attacks that take place because of the negligence of the end-user that werealso noted and analyzed (Iwaoka, 2007). 3
CJ 4472 - Reflective Journal Challenges for Cyber Security in Business_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Research Assignment | Cyber Security and Virtual Networks
|9
|1893
|37

Challenges in Cyber Security for Business - Thales Group
|10
|1849
|81

Challenges in Cyber Security for Business - Report
|7
|1925
|49

Challenges in Cyber Security for Businesses
|7
|2257
|98

Challenges in Cyber Security for businesses
|9
|2553
|50

(solved) Challenges in Cyber Security for Business Assignment
|10
|1963
|128