Business Research: Cybersecurity Benefits and Challenges Analysis

Verified

Added on  2020/05/16

|9
|1893
|37
Homework Assignment
AI Summary
This research study examines the challenges and risks associated with cybersecurity within organizations, focusing on its benefits for virtual networks. The study delves into various cybersecurity threats, including cyber-attacks, disaster security, network security, and information security. The research methodology involved a structured approach, including literature reviews, data collection through online journals, articles, reports, and interviews. The study explores the importance of cybersecurity strategies for data and information security, highlighting the use of antiviruses, firewalls, and third-party restrictions. It also discusses the benefits of the internet, such as business development, client communication, and the challenges posed by cyber threats. The research design employed descriptive methods, utilizing both primary and secondary data collection techniques, including surveys and interviews with IT experts. The findings highlight the practical experience gained in understanding cybersecurity roles, its impact on organizations, and the importance of staying updated with advanced technologies. Despite limitations such as budget constraints and time limitations, the study successfully analyzed cybersecurity aspects, providing valuable insights into its benefits and challenges.
Document Page
Running head: BUSINESS RESEARCH
Business Research
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
BUSINESS RESEARCH
Reflection of the Study
This research study has focused on the challenges and risks included in the cyber security
and its benefits on the virtual network of an organization. This study has highlighted various
risks and threats in the cybersecurity of an organization.
Answer to Question 1.
The strategy and process of the research is decided in this week that helps in maintaining
a proper path in order to complete the research. I am able to understand different risks and threats
including cyber-attacks, disaster security, network security and information security. In third
week, I researched about the literature review writing related to the research topic. I have
fulfilled the aim of the study to analyze the cyber security aspects in an organization. In this
research study, I have learned basic concept about cybersecurity in the IT field.
Answer to Question 2.
The use of the cybersecurity strategies has helped in maintaining the security of the data
and information of the companies in the market. In the first week of study, I have to understand
the research topic related to the cybersecurity and made a proper plan for proper proceeding in
the study. In order to collect information related to the research topic, I have read various online
journals, articles and reports related to the cybersecurity in the IT field.
In this context, I have learned various steps included in the research for successfully
conducting it. This research has helped in gaining experience related to the cybersecurity roles in
an organization. I have learned how cybersecurity of an organization works for providing
security from different cyber-attacks. I have gained positive experience in order to maintain
myself updated with advanced technology used in the market by the different organization. The
Document Page
3
BUSINESS RESEARCH
use of the internet in various departments o the company have been acknowledged. I have
learned the importance of the internet in an organization. I have also understood the challenges
faced by an organization due to the use of the internet. I have learned about the dark side of the
internet. Different cyber threats and illegal activities are done with the help of the internet.
Answer to Question 3.
The literature review chapter of the research has focused on the basic concept of
cybersecurity in an organization. I have learned about the NIST from this research study. I have
learnt about the governance roles and responsibility in order to take control over the
cybersecurity matter in the organization. I have understood the importance of government in
order to prepare strategies for controlling cyber-attacks on the organizations. Various types of
cyber-attacks have been described in the study including brute force attack, social engineering,
distributed denial of attack, phishing attack and malware attacks.
Answer to Question 4.
I have learned about the mitigation strategies imposed by the organization to remain safe
from cyber-attacks. Antiviruses and firewalls have helped in restricting harmful viruses and
malware from entering into the server and network of the organization. Restricting third-party
authentication might help in controlling the entrance of viruses and use of third-party restriction
to the security system of the company. I have read various journals and articles for gathering
knowledge and data related to the types of attacks over the internet. Various journals have talked
about different benefits and challenges of the internet and cybersecurity in the organization. I
have come to know about different benefits of the internet and cybersecurity including business
Document Page
4
BUSINESS RESEARCH
development overseas, connection with various clients, proper communication and
confidentiality. The use of the internet has helped in developing the business of the organization.
I have used a proper methodology for the conduction of the study on benefits and
challenges of the cybersecurity in the business organization. The two types of research
approaches have been discussed in the study including inductive and deductive approach. I have
learned that the inductive approach focuses on careful observation, analysis and data evaluation.
The deductive approach is quantitative and data collected is processed after proper reflection, it
is analyzed. I have learned about the types of research design including explanatory and
descriptive.
Answer to Question 5.
I have used the descriptive research design that has helped in focusing on the research
objectives and collecting data and information related to the research topic. This research design
has requirement for providing proper data and information in order to perform proper data
analysis. I have used both primary and secondary method of data collection. I have researched on
various online journals, articles, books and governmental databases for collecting data and
information related to the benefits and challenges of the internet and cybersecurity in an
organization. The use of the secondary method has helped in gaining proper data and information
related to the research.
The sixth week focuses in the interviewing in qualitative research. They have shared their
knowledge regarding the cybersecurity that has been beneficial for my knowledge and career.
However, I have prepared survey questionnaires that were structured and close-ended. I have
used the probability-sampling method.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
BUSINESS RESEARCH
However, I have some limitations in conducting this research study. My budget related to
the study was limited. Therefore, I was not able to use expensive technology for conducting the
research. Many online journals and articles were not accessed, as I have to buy them. The time
constraint was also limited by the budget.
This has been a major problem for filtering their answers for correct data. The language
was a problem in gathering data and information from the participants due to cultural diversity.
In eight week I have learned about nature and sampling in quantitative research. The IT experts
were not ready to answers all the questions that I have asked during the interview. Therefore, I
have faced some limitations in conducting the research. However, I have managed in conducting
the research successfully.
Answer to Question 6.
I have gained a positive experience by conducting this research on the cybersecurity. I
have gained various knowledge about the use of cybersecurity in an organization. This will help
me in developing my career. Being a student, I have gained knowledge about the corporate world
by interacting with various IT experts of the organizations. I have searched a lot over the internet
related to the benefits and challenges of the cybersecurity in the organization. In the seventh
week, qualitative analysis has been discussed.
I have come to know about different benefits of the internet and cybersecurity including
business development overseas, connection with various clients, proper communication and
confidentiality. The importance of the security of the data and information in the organization
has been gained. I have learned about the challenges in using the internet in a wrong way.
Document Page
6
BUSINESS RESEARCH
This might help me in using my own computer and installing antivirus and firewalls for
keeping my computer safe from cyber-attacks. I have read various journals and articles for
gathering knowledge and data related to the types of attacks over the internet. In eleventh week,
different analysis of the outcomes have been analyzed. I was able to meet different IT experts
during the interview and observing their views on cybersecurity. This has been a great
motivation for me in IT field and I would like to continue my career in the IT field.
Document Page
7
BUSINESS RESEARCH
Weekly Analysis
Week 1: In first week, I have learned about the nature and process of the research. These
strategies include use of firewall and antivirus. I understood that the cybersecurity is s an
important concept for different companies in the market. The future research might deals with
other theories and models related to the cybersecurity. The data analysis have cleared my opinion
related to importance of cybersecurity in the company.
.Week 2: The second week describes about the research design and planning process of
the research. The three types of research design are descriptive, explanatory and exploratory
(Mackey and Gass 2015). Descriptive design has been used in a research that helps in focusing in
objectives.
Week 3: The third week focuses in the literature review related to research topic. Various
concepts of cybersecurity has been discussed. The definitions of cybersecurity according to
NIST has been referred to the research.
Week 4: The fourth week refers to the ethical and legal considerations involved in the
research. The Data protection Act 1998 has been followed in the research in order to secure data
and information (Pannerselvam 2014).
Week 5: The fifth week deals with the nature of qualitative research and sampling
technique. Data has been collected from 10 managers and 40 employees.
Week 6: The sixth week has focused on interviewing and focus groups. The data
collected from the interview has been taken as observational data (Knobe and Nichols 2013). I
have managed to organize a face-to-face interview with IT experts of different organizations. I
have a great experience of meeting and talking with those IT experts.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
BUSINESS RESEARCH
Week 7: The seventh describes about the qualitative analysis of collected data.
Qualitative analysis deals with the secondary data analysis.
Week 8: The eight week focuses on the sampling in the quantitative research
methodology. Participants of the survey have not provided correct answers to the survey
questionnaires and filled it haphazardly (Pannerselvam 2014).
Week 9: The ninth week describes about the structured interviewing. I have also collected
primary data from 10 managers and 40 employees. I have organized survey with those
participants
Week 10: The tenth week focuses on the structured observation and analysis. Three IT
experts were interviewed in order to take their views and answers related to the cybersecurity in
their company.
Week 11: The eleventh week deals with secondary analysis and quantitative data
analysis. I have organized interviews in order to collect data from the IT expert of various
organizations.
Week 12: The twelfth week relates with the mixed research method. I have learned a
practical experience of cybersecurity and its various aspects by conducting this research. I have
used qualitative way research methodology. This approach has helped me focus on the objectives
of the research.
Document Page
9
BUSINESS RESEARCH
References
Knobe, J. and Nichols, S. eds., 2013. Experimental philosophy (Vol. 2). Oxford University Press
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Abingdon: Routledge.
Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]