Reflective Journal Challenges for Cyber Security in Business

Added on - 12 Mar 2020

  • 6


  • 1324


  • 256


  • 0


Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 6 pages
Challenges for CyberSecurity in BusinessReflective Journal
Reflective JournalReflective JournalThe research process was completed in duration of 12 weeks. The first week was the initiationweek that included the selection of the research topic as Challenges for Cyber Security inBusiness and a feasibility studied was also carried out. The research was feasible and the resultswere documented.The second week of the research process included the planning of research scope and researchquestions. The research methodologies as qualitative and quantitative methods of research werefound to be apt for the chosen topic. A research plan was completed in the second week (Polyu,2002).A literature review was carried out in the third week. There were case studies of three differentcompanies that were studied and analyzed to understand the cyber-attacks and issues that wereprevailing. There were also other research journals and articles that were studied and referenced.In Week 4 and 5, a research proposal was prepared which included the gaps that were identified,research methodologies along with the limitations and timeline.Week 6 included the sampling process that was required for research execution. There weresmall and large sample sizes that were identified for the research execution (Watkins, 2007).The next two week, that is, week 7 and week 8 included that identification of the data sourcessuch as organizational documents, online articles, libraries and likewise to gain more and moreinformation on the challenges that were associated with cyber-security in business.Data analysis was carried out in Week 9 and 10. The data that was collected was analyzed tounderstand the patterns and the trends that were associated. The results were then compiled anddocumented (Niu, 2014).The last two weeks were kept reserved for the review and presentation part. The research workthat was done was reviewed by the guides, mentors and specialists and the feedback wasincorporated. The final research paper was then presented as the last step in the research work.2
Reflective JournalLearning ExperienceThe learning experience during the research process provided an in-depth knowledge on theresearch topic as Challenges for Cyber-security in Business. There are occurrences and securityevents that are talked about but are not paid much attention unless the issues as personallyanalyzed and understood.The learning experience allowed the ability to acquire the skills on the research methodologiesand processes along with the details of the challenges and issues associated with cyber-security(Dcu, 2017).The learning experience has an immense value as it has allowed the enhancement of the researchand technical skills and abilities and has also provided the capabilities to deal with the risks thatmay come up during a project timeline.Usefulness of the Learning ProcessThe learning experience will serve positively in the course and program as it will provide thenecessary professional growth and development.It will be useful in the future career and personal life as well. It is because of the reason that theresearch topic that is selected has a lot many employment opportunities in the current times.There are varied roles and profiles that the employers have generated in the area of cyber-security. The research work will allow the opportunity to apply in such roles and will also aid inthe measures that must be adapted to avoid and prevent the security risks (Uts, 2017).Activities that Occurred in the Learning ProcessThe research process that was carried out was done in a series of activities and phases. Therewere initiation, planning, execution, analysis and presentation phases that were involved thatincluded a set of activities and sub-activities.There were challenges and issues that were observed in the field of cyber-security in variousindustries and the impacts that they have on the business and the end-user were understood.There are many cyber-attacks that take place because of the negligence of the end-user that werealso noted and analyzed (Iwaoka, 2007).3
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document