Reflective Journal: Research on Cyber Security Challenges in Business
VerifiedAdded on  2021/01/02
|7
|1504
|57
Journal and Reflective Writing
AI Summary
This reflective journal analyzes the learning experience gained from a research project on cyber security challenges in business. The journal details the effectiveness and usefulness of the learning process, including the application of research skills, strategies, and tactics. It discusses the situations encountered during the research, such as initial lack of knowledge and challenges in accessing resources, and how these were overcome. The journal also evaluates the learning achieved, emphasizing the importance of skills like planning, organization, and communication. The process of learning, including the division of tasks and data analysis, is outlined, along with how the learning will be applied in the future, particularly in a career in the IT industry. The conclusion highlights the value of business research in gaining knowledge and experience, including the use of different research techniques and their relevance to future career development.

REFLECTIVE JOURNAL
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
1. Effectiveness and usefulness of learning experience........................................................1
2. Usefulness of learning process...........................................................................................2
3. Situations occurred in learning process.............................................................................2
4. Evaluation of learning........................................................................................................2
5. Process of learning.............................................................................................................3
6. Application of learning in the future..................................................................................3
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
1. Effectiveness and usefulness of learning experience........................................................1
2. Usefulness of learning process...........................................................................................2
3. Situations occurred in learning process.............................................................................2
4. Evaluation of learning........................................................................................................2
5. Process of learning.............................................................................................................3
6. Application of learning in the future..................................................................................3
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4

INTRODUCTION
Self Reflection is an important part of research which is used to demonstrate learning and
experience achieved after completion of specific work. In this report, I will determine my
learning and experience achieved after completion of research project on the analysis of
challenges in cyber security for business (Hwang and et.al, 2012). I will also provide my
experience about using different kinds of research skills, strategies and tactics for completion of
research effectively. Analysis of data and information . Reason behind carrying out this research
and outcomes are appropriately discussed along with its usefulness in the future. Process used to
achieve learning has been clearly determined to provide clear understanding about steps needs to
be followed for carrying out business research appropriately
MAIN BODY
1. Effectiveness and usefulness of learning experience
Learning experience is important part of academic career which helps in analysis of
various skills and attributes required to become professional in specific field of study. According
to my personal experience, learning is a requirement for completion of every tasks or specific
project effectively and efficiently (Clark and Mayer, 2016). There are various kinds of
experience which I have achieved through completion of learning process. In this research, tasks
was to carry out analysis of challenges in cyber security for business and there were total 5
members in our group.
The topic selected for project was challenges of cyber security for a business, after
discussing it with team members as well as getting an approval from tutor. There were various
activities which were identified and needs to accomplish for successful completion of project.
At initial stage, I have no information about the subject and no experience of conducting
business research. Basic knowledge about cyber security and its requirement in business was
provided by tutor in classroom. Guidance of supervisors has provided support in selection of
topic and carrying out research. Some of our group members were from information technology
background and provided me a basic understanding about various kinds of issues that have been
created by the cyber security software for business. As per my opinion, understanding of
different kinds of software is important for completion of business research. My personal
requirementwas to gain support for career development in the field of information technology.
1
Self Reflection is an important part of research which is used to demonstrate learning and
experience achieved after completion of specific work. In this report, I will determine my
learning and experience achieved after completion of research project on the analysis of
challenges in cyber security for business (Hwang and et.al, 2012). I will also provide my
experience about using different kinds of research skills, strategies and tactics for completion of
research effectively. Analysis of data and information . Reason behind carrying out this research
and outcomes are appropriately discussed along with its usefulness in the future. Process used to
achieve learning has been clearly determined to provide clear understanding about steps needs to
be followed for carrying out business research appropriately
MAIN BODY
1. Effectiveness and usefulness of learning experience
Learning experience is important part of academic career which helps in analysis of
various skills and attributes required to become professional in specific field of study. According
to my personal experience, learning is a requirement for completion of every tasks or specific
project effectively and efficiently (Clark and Mayer, 2016). There are various kinds of
experience which I have achieved through completion of learning process. In this research, tasks
was to carry out analysis of challenges in cyber security for business and there were total 5
members in our group.
The topic selected for project was challenges of cyber security for a business, after
discussing it with team members as well as getting an approval from tutor. There were various
activities which were identified and needs to accomplish for successful completion of project.
At initial stage, I have no information about the subject and no experience of conducting
business research. Basic knowledge about cyber security and its requirement in business was
provided by tutor in classroom. Guidance of supervisors has provided support in selection of
topic and carrying out research. Some of our group members were from information technology
background and provided me a basic understanding about various kinds of issues that have been
created by the cyber security software for business. As per my opinion, understanding of
different kinds of software is important for completion of business research. My personal
requirementwas to gain support for career development in the field of information technology.
1

2. Usefulness of learning process
For completion of business research, I have applied as particular structured framework
which was useful for carrying out study. In business research, various tasks have been
distributed in different chapters and distributed between team members according to knowledge,
skills and competencies. It is useful in completion of course because it provides conceptual
knowledge about different information technology Software. This learning process has provided
major support in completion of course of business research and carrying out task effectively in
order to attain goals and objectives (.Suskie, 2018).
In accordance with program, learning experience major support in Carrying out future
programmes and events on utilization of different cyber security systems. (Cohen, 2014).
Learning experience achieved by carrying out this research will provide competencies towards
development of career in IT industry.
In general life, this learning experience is useful for understanding different issues of using
technologies and applications in personal life and also determine ways to resolve these issues.
Along with this, this business research on cyber security has also influenced my personal life
because I also use various software and technologies for communication which can creates these
kinds of issues. In this process, I have considered Key literatures to get information about
various challenges faced by organisation. faced by organisation for implementation of these
systems such as licensing, technical issues and maintenance.
3. Situations occurred in learning process
While carrying business research, I had no complete knowledge about cyber security
systems and their role in business operations. In-group task, all members properly divided the
tasks according to competencies. I have carried out secondary analysis by using various
literatures. These literatures have provided understanding about opinions of different authors
towards cyber security and its challenges in business. I have also considered that undertaking
research in crucial because it required wide experience, skills and capabilities in individuals.
In this process, I faced some issues in getting relevant research articles on internet due to
high security and I was not able to read information clearly. Limited resources for carrying out
research have also created problems in completion research practices (Piskurich, 2015). Further,
team members have also provided proper support in undertaking completion of task
2
For completion of business research, I have applied as particular structured framework
which was useful for carrying out study. In business research, various tasks have been
distributed in different chapters and distributed between team members according to knowledge,
skills and competencies. It is useful in completion of course because it provides conceptual
knowledge about different information technology Software. This learning process has provided
major support in completion of course of business research and carrying out task effectively in
order to attain goals and objectives (.Suskie, 2018).
In accordance with program, learning experience major support in Carrying out future
programmes and events on utilization of different cyber security systems. (Cohen, 2014).
Learning experience achieved by carrying out this research will provide competencies towards
development of career in IT industry.
In general life, this learning experience is useful for understanding different issues of using
technologies and applications in personal life and also determine ways to resolve these issues.
Along with this, this business research on cyber security has also influenced my personal life
because I also use various software and technologies for communication which can creates these
kinds of issues. In this process, I have considered Key literatures to get information about
various challenges faced by organisation. faced by organisation for implementation of these
systems such as licensing, technical issues and maintenance.
3. Situations occurred in learning process
While carrying business research, I had no complete knowledge about cyber security
systems and their role in business operations. In-group task, all members properly divided the
tasks according to competencies. I have carried out secondary analysis by using various
literatures. These literatures have provided understanding about opinions of different authors
towards cyber security and its challenges in business. I have also considered that undertaking
research in crucial because it required wide experience, skills and capabilities in individuals.
In this process, I faced some issues in getting relevant research articles on internet due to
high security and I was not able to read information clearly. Limited resources for carrying out
research have also created problems in completion research practices (Piskurich, 2015). Further,
team members have also provided proper support in undertaking completion of task
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

appropriately. With proper support and discussion with team members, I have been able to
accomplish my task appropriately without any discrepancies.
4. Evaluation of learning
While carrying out research, I have analysed concept of cyber security and role in
different types of business enterprise regulating their business operations in different industries.
These security systems are widely used by organisations to protect their data and information
about their clients on their personal database. I have also understood that it is important to have
specific skills such as planning, organising, communication, technological and analytical skills
for completion of group task effectively. Most obvious thing that I have discovered was the
benefits of working as part of group.
5. Process of learning
In this business research, the task was properly divided in different chapters according to
timeline. First task was to carry out analysis of background of topic in order to develop a basic
understanding about research. Aims and objectives for research also developed in second step to
provide a clear direction to research. Different research methodologies can be selected to
identify and answer the research problems. Data related to topic was also gathered through
primary and secondary methods. Primary method was utilized to gather new and fresh
information from respondents in order to make research more reliable (Brookhart, 2017). I have
achieve learning about different security systems which are used organisations to secure data and
information.
With percentage data analysis, I have clearly determined outcomes of research with the
help of different graphs to provide clear understanding to users. Reason behind accomplishment
of these activities was to gain experience of carrying out study and experiencing challenges
which are faced by different scholars in carrying out research.
6. Application of learning in the future
Outcomes of research provided a clear understanding about views of different enterprise
towards challenges they faced in application of cyber security systems (Borich, 2016). In the
future, I will apply own learning experience in this kind of research and also provide suggestions
about different methods which they can use to face challenges. This proper understanding will
provide support in development of career as a manager in IT industry.
3
accomplish my task appropriately without any discrepancies.
4. Evaluation of learning
While carrying out research, I have analysed concept of cyber security and role in
different types of business enterprise regulating their business operations in different industries.
These security systems are widely used by organisations to protect their data and information
about their clients on their personal database. I have also understood that it is important to have
specific skills such as planning, organising, communication, technological and analytical skills
for completion of group task effectively. Most obvious thing that I have discovered was the
benefits of working as part of group.
5. Process of learning
In this business research, the task was properly divided in different chapters according to
timeline. First task was to carry out analysis of background of topic in order to develop a basic
understanding about research. Aims and objectives for research also developed in second step to
provide a clear direction to research. Different research methodologies can be selected to
identify and answer the research problems. Data related to topic was also gathered through
primary and secondary methods. Primary method was utilized to gather new and fresh
information from respondents in order to make research more reliable (Brookhart, 2017). I have
achieve learning about different security systems which are used organisations to secure data and
information.
With percentage data analysis, I have clearly determined outcomes of research with the
help of different graphs to provide clear understanding to users. Reason behind accomplishment
of these activities was to gain experience of carrying out study and experiencing challenges
which are faced by different scholars in carrying out research.
6. Application of learning in the future
Outcomes of research provided a clear understanding about views of different enterprise
towards challenges they faced in application of cyber security systems (Borich, 2016). In the
future, I will apply own learning experience in this kind of research and also provide suggestions
about different methods which they can use to face challenges. This proper understanding will
provide support in development of career as a manager in IT industry.
3

CONCLUSION
From this report, it is concluded that carrying out business research is a crucial task but it
helps in gaining a wide learning experience in accordance with a specific industry or topic.
Experience of using different research techniques are determined along with the usefulness of
learning experience towards development of future in field IT industry.
4
From this report, it is concluded that carrying out business research is a crucial task but it
helps in gaining a wide learning experience in accordance with a specific industry or topic.
Experience of using different research techniques are determined along with the usefulness of
learning experience towards development of future in field IT industry.
4

REFERENCES
Books and Journals
Borich, G. D., 2016. Observation skills for effective teaching: research-based practice.
Routledge.
Brookhart, S. M., 2017. How to give effective feedback to your students. ASCD.
Clark, R. C. and Mayer, R. E., 2016. E-learning and the science of instruction: Proven
guidelines for consumers and designers of multimedia learning. John Wiley & Sons.
Cohen, A. D., 2014. Strategies in learning and using a second language. Routledge.
Hwang, G. J. And et.al, 2012. Development of a personalized educational computer game based
on students’ learning styles. Educational Technology Research and Development. 60(4).
pp.623-638.
Piskurich, G. M., 2015. Rapid instructional design: Learning ID fast and right. John Wiley &
Sons.
Suskie, L., 2018. Assessing student learning: A common sense guide. John Wiley & Sons.
5
Books and Journals
Borich, G. D., 2016. Observation skills for effective teaching: research-based practice.
Routledge.
Brookhart, S. M., 2017. How to give effective feedback to your students. ASCD.
Clark, R. C. and Mayer, R. E., 2016. E-learning and the science of instruction: Proven
guidelines for consumers and designers of multimedia learning. John Wiley & Sons.
Cohen, A. D., 2014. Strategies in learning and using a second language. Routledge.
Hwang, G. J. And et.al, 2012. Development of a personalized educational computer game based
on students’ learning styles. Educational Technology Research and Development. 60(4).
pp.623-638.
Piskurich, G. M., 2015. Rapid instructional design: Learning ID fast and right. John Wiley &
Sons.
Suskie, L., 2018. Assessing student learning: A common sense guide. John Wiley & Sons.
5
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.