TABLE OF CONTENTS INTRODUCTION...........................................................................................................................3 RESEARCH METHODOLOGY.....................................................................................................3 Summary of the key findings......................................................................................................7 CONCLUSION................................................................................................................................8 REFERENCES..............................................................................................................................10
INTRODUCTION Research methodology can be defined as procedure or tools that ae used by scholar to gather in-depth information about subject matter and analysing data in significant manner(Antwi and Hamza, 2015). Present study is based on data digitalization made cybersecurity challenges impossible to address for businesses. Report will describe various tools and techniques that are helpful in answering research questions. RESEARCH QUESTION Has data digitalization made cybersecurity challenges impossible to address for businesses? RESEARCH METHODOLOGY Research techniques are helpful in critical evaluating subject matter and reaching to end results where scholar becomes able to answer research questions effectively. Selection of correct method of research helps scholar in completing investigation on time and with quality outcome. There are various methods of research such as philosophies, approaches, designs, sampling, data analyses, data collection etc. It is essential to have understand nature of each tool and then apply it to the research that can support in getting desired results(Ndlovu-Gatsheni, 2017). Qualitative and quantitative debate Qualitative is the study where researcher conduct the investigation in subjective manner and try to focus more on subjective information only. Scholar have to conduct investigation by considering nature of research topic, qualitative and quantitative two major types of researches.. Individual takes assistance of theories and models in order to build understanding about topic. One of the major reason of conducting research in qualitative manner is to gain insight understanding about subject, by this way investigator can uncover trends and can answer the problems in significant manner(Antwi and Hamza, 2015). Qualitative researches are descriptive and scholar uses graphs to present the data. It is non-numerical kind of study where each element is described with proper reasoning. This method describes situation well and explain each factor with proper justification. On other hand quantitative researches is another kind of researches where scholar takes assistance of statistical tools such as calculi mean, mode, SPSS etc. in order to reach to end results.Qualitative researches are being conducted in structured manner which enhance reliability of results. It is numericaland also many mathematical calculations are performed by investigator to reach to end results,. Scholar evaluate each evidence and try to get
reliable and authentic results. Furthermore, quantitative researches uses tables to present data so that results can be interpreted in effective manner. Furthermore, it is conclusive in nature(Antwi and Hamza, 2015). In the current research on data digitalization made cybersecurity challenges impossible to address for businesses scholar has taken assistance of qualitative research type. Use of theoretical information has helped scholar in answering research questions easily. This has helped in understanding topic easily and finding out the why cybersecurity challenges are impossible to address by organizations. Another reason of selecting qualitative research is that it is suitable in the investigation where small size is small. Because outcome or results are not quantifiable. By using this method scholar has become able to describe things and analyses data in significant manner(Smith and et.al., 2017). Secondary data Secondary data are such information which are already gathered by any other person and researcher use these information to develop understanding about subject matter. This is the work of other authors which are being used in current studies. By referring these data scholars try to answer research questions of current investigations(Meredith and et.al., 2018). One of the major benefit of using secondary information is that it is economically beneficial and also saves time of scholar. But researcher fails to involve current information. Books journals, government sites. Articles are example of secondary data collection sources. Researcher cannot conduct new survey as individual has to use already available information which sometimes restrict the finding. But use of secondary source help in knowing about topic in broader aspects. In the current research on data digitalization made cybersecurity challenges impossible to address for businesses investigator has taken assistance of books, journals and government sites. All these sourceshavesupportedindevelopingunderstandingaboutcybersecurityissuesandwhy business fail to address this problem effectively. Use of such tools have supported scholar in answering research questions and drawing valid conclusion (Quinlan and et.al., 2019). Primary data- The data in the report will be collected by the help of primary data. Data collection can be defining as the procedure which can be used for assembling and measuring information that can help the people in answering proper question and evaluating the outcomes. Primary data can be collected from the people directly. It is the raw data which can be collected by the user. The various type of method which can be used in collecting primary data is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
observation, survey, experimentation and observation is called primary data. Questionnaire can also be used as the method of collecting primary data(Smith and et.al., 2017). There are various type of primary sources which includes observation method. This method can be used for collecting data related to behavioural sciences. In this method researcher can make or take help from scientific tools for collecting information where it provides formulated researcher. Advantages of observation data collection method include direct access to research phenomena, high levels of flexibility in terms of application and generating a permanent record of phenomena to be referred to later. Data can also be collected by the help of interview method. The interview can take place on telephone and also researchers can do interview by face to face communication method(Meredith and et.al., 2018). Questionnaire method is alsoone way of collecting data which is raw. In this questionnaire can be send to the respondent on mail and they can reply back to those mail sent. Respondent are expected to understand the questionnaire properly and then answer it.Number of questions which the respondent needs to answer is also given in the questionnaire. There is also another method of data collection which is schedule method. This method is similar to the questionnaire method of data collection. This type of method can be used when the researcher is doing extensive enquiry. Therefore this method is really expensive. Other type of data collection method is known as secondary data collection method. It means the data is collected with the help of books, journals, magazines, etc. In order to make the research successful, the method which is used for the report is primary sources that is questionnaire. It is a primary source or method of collection. The main reason to use this method of data collection is to gather, factual and reliable information. This method can be used by researcher to gain accurate and authentic information. Sample size- Sample size can be defining as the way of selecting the number of respondents or participants which needs to be included in a statistical sample. The number of replicates which can be taken in the report is 10 (McConville, 2017). Sampling approach- There are two types of approaches which is included in sampling. The one is probability method and other is non probability method. Probability method can be used for choosing any member which is random from the population by making up the few selection criteria. Non probability sampling approach can be comparatively done by researcher on lower cost.
In this report researcher is making use of simple random sampling method that can help them to conduct research. Use of random sampling is appropriate technique as scholar become able to minimise biasness in answers which will help in getting most reliable answers. It is simple and time saving technique which give most desirable results to scholar. This type of method is a part of probability sampling method. It can be considered as one of the best and adequate sampling method. This method can help researcher in saving their time and is a cost efficient method (McConville, 2017). In this report, random sampling technique is being selected so that there has been equal chance of selection. It is a very fair method of selection. It provides equal chance to every respondent. This type of method can be used easily as this requires less knowledge. It is also one of the easiest and simplest form of data collection. This method of sampling is also most relevant and fair one. Questionnaire design factors : Incontextofpresentinvestigationontopicchallengesincybersecurityforbusiness, questionnaire technique has been utilised by researcher for collecting the facts related to subject. Both open and close ended questionnaire has been included in questionnaire form. Such technique has been applied by researcher in order to gather detail information about the topic. In addition to this, other reason for including the open ended questions isto provide participants flexibility in expanding their response. Close ended questions has been included as investigator perceives that it the technique which will assist them in getting the relevant answers of the questionBoth aims and objectives of investigation has been considered by researcher while designing the questions for collecting the information about the topic (McConville, 2017).. Data collection methods :data collection is considered to be as one of the crucial activity in investigation. Without the information the investigation process can not be proceed further. It is very much crucial for researcher to develop understanding that the reliability as well as validity of the research findings is completelybased in the techniques which has been applied for collecting the data about the subject. The data related to the subject can be accumulated mainly from two sources these areprimary and secondary.In relation to the investigation on topic identification of the challenges in cyber security for business,investigator hasgathered facts about the issue fromboth both primary as well as secondary sourcesThe researcher has used both primary as well as secondary sources in order to gather huge amount of information about
the subject . The primary data has been collected using the questionnaire technique. Rationale for selecting the questionnaire technique is that it is less cost and time consuming method of data collection . In addition to by by applying thequestionnaire technique,the participants can be provided with an ease in answering the questions. Questionnaire form has been circulated to participants through E-mail. The secondary data hasbeen gathered usingbooks, journals, magazines, online articles etc(Quinlan and et.al., 2019). Data analysis and interpretation :Data analysis can be referred to as refinement of information.Therefining ofdataisverymuch crucialinorderto extractmeaningful information.It is the throughanalysing the data researcher has been able to reach the conclusion. Selection of the technique for analysing the informationis completed based on the type of investigation being performed. Thedata analysis procedure which assist investigator in making suitable decisions.In relation to thequantitative research, statisticalor mathematical techniques can be applied for analysis the data.Annova or chi square test can be applied for testing the outcomes. But as present study is qualitative in nature, therefore, investigator has utilised the qualitative analysis technique for analysing the facts about the topic.In addition to this, the thematic analysis is the technique which has been applied by researcher in present study for interpreting the facts about the challenges in cyber security for business. The different themes are designed by investigator on the basis of the response provided by the participants. Thematic analysis technique has been applied by researcher because it is the technique which provides them in analysing the pattern of responses provided by respondent and helps them in reaching to conclusion.In addition to this, tables and chart has been design in order to present the findings in an appropriate manner. The other reason for preparing the theme is that it helps researcher in making the research report presentable as well as understandable by user (Flick, 2018.).. Summary of the key findings From the above, it has been summarized that Internet is become a basic requirement of the most people for their professional purpose. But it is realized that the digitalization also become a serious security risk because now the information is converted to the digital format that increase cybercrime. The research main aim is to determine that most of the business faces threat related to cybersecurity and as per the view of (Greving, Sassenberg and Fetterman, 2015) the increase use of smartphone and computer also increase the danger of cybersecurity and that is why , the offline system is consider the most secure data storage solutions. Offline data storage
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
means that only use single copy of data but in that case when it is attacked by virus then the entire data is lost which is a biggest concern. Thus researcher also find out that using internet and electronic device are beneficial for storing business purpose data. But on the other side, the Internet of things is one of the most common threat related to cybersecurity and it is so because more than 90% of the people and the professionals are completely depend upon the internet and many businessman are also secured their company's data in laptop. But actually it is not safe because once it is controlled by the hackers then all the information are shared with them. Further, from the researcher it is also found that most of the people are totally depend on the cloud storage in order to back up their information in their own devices, but some of them consider it as a threat because data may be used by other (Lin and et.al., 2018). Thus, it is summarize that cloud storage also consider a threat fro thepeople because when an individual install any application which contain any sensitive data then it may be accessed by the server online which may be further blocked and accessed by a government. That is why, it is consider a threat. In addition to this, from the literature section it is found that in market there are many books which shows how the software application codes are altered by removing the licence restriction and in that time, the spyware codes are also added that can easily access information easily.That is why, it is necessary to understood the protective measure in order to protect the data as well as information from getting misused or exposed. CONCLUSION From the above, it has been concluded that cybersecurity become a major concern for most of the people and people also faces threat related to continuous use of Internet for securing the data. As it is cleared that researcher uses secondary data collection methods such as books and articles, Journals which shows Internet provide a wide range of information but users has to determine the effective way in whichthey may be exposed to the threat. Moreover, it is also concluded that in order to make the research more effective and find out the answer related to question, researcher uses simple random sampling method in which 25 managers of IT industry are chosen so that they get their review related to the topic. Additionally, it has been concluded that as there is increase number of internet users and as a result it directly promote the cybersecurity threats as well. That is why, in order to overcome
such problem, it is quite necessary to provide knowledge related to cybersecurity to all the individuals that helps them to overcome such problem and determine the way how to use the things by reducing the threats of Internet.
REFERENCES Books and Journals Antwi, S. K. and Hamza, K., 2015. Qualitative and quantitative research paradigms in business research:Aphilosophicalreflection.EuropeanJournalofBusinessand Management.7(3). pp.217-225. Barquero, B. and Bosch, M., 2015. Didactic engineering as a research methodology: From fundamental situations to study and research paths. InTask design in mathematics education(pp. 249-272). Springer, Cham. Bright, O. J. M. and et.al., 2017. Research Priorities for Studies Linking Intake of Low-Calorie Sweeteners and Potentially Related Health Outcomes: Research Methodology and Study Design.Current developments in nutrition.1(7). p.e000547. Flick, U., 2018.An introduction to qualitative research. Sage Publications Limited. Researches. Medical Ethics Journal,11(42), pp.7-10. Greving, H., Sassenberg, K. and Fetterman, A., 2015. Counter-regulating on the internet: Threat elicits preferential processing of positive information.Journal of Experimental Psychology: Applied.21(3). p.287. Lin, Z. and et.al., 2018. Pricing Cyber Security Insurance: A Copula Model Using an Objective, Verifiable, Loss Measure.Verifiable, Loss Measure (July 17, 2018). McConville, M. ed., 2017.Research methods for law. Edinburgh University Press. Meredith, S. J. and et.al., 2018. A review of behavioural measures and research methodology in sportandexercisepsychology.Internationalreviewofsportandexercise psychology.11(1). pp.25-46. Ndlovu-Gatsheni, S., 2017. Decolonising research methodology must include undoing its dirty history.Journal of Public Administration.52(Special Issue 1). pp.186-188. Quinlan, C. and et.al., 2019.Business research methods. South Western Cengage. Sessler, D. I. and Imrey, P. B., 2015. Clinical research methodology 1: study designs and methodologic sources of error.Anesthesia & Analgesia.121(4). pp.1034-1042. Smith, J. A. and et.al., 2017. Proposing an Initiative Research Methodology for LGBTQ+ Youth: Photo-Elicitation and Thematic Analysis.Journal of LGBT Issues in Counseling.11(4). pp.271-284.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APPENDIX Example of some research questions which has been included in the questionnaire form are : 1.What are the types of cyber security threats ? 1.What are the challenges faced by your company in relation to cyber security ? 2.What are the business risk associated with cyber security ? 3.What is the technique that can be adopted by organisation in order to avoid such type of business risk related to cyber security ? 4.Is your organisation is takingefforts for dealing with such type of cyber security threats ? 5.Does your organisation has implement policies for preventing cyber crime at workplace ? 6.Upto what extend you are agree with the statement that company have to face huge financial losses due to cyber crime due by its employees ? 7.Does cyber security has great significance in business? 8.What are the emerging trends related to cybersecurity ? 9.what are the main areas of risk for your organization ? Infrastructure Application Other 1