Business Research Reflective Report: Cybersecurity Challenges

Verified

Added on  2020/05/11

|6
|1727
|88
Report
AI Summary
This reflective report delves into the critical challenges of cybersecurity for businesses, acknowledging the rapid evolution of technology and the increasing sophistication of cyber threats. The report explores various factors contributing to cyber threats, including network attacks, viruses, and the impact on financial performance. It also highlights the benefits of robust cybersecurity measures for business operations. The report covers the project scope, objectives, and the challenges of cybersecurity, such as phishing, malware, and social engineering. It discusses factors like lack of leadership, awareness, and technological advancements. The report then outlines the research methodology, including qualitative and quantitative methods, ethical considerations, and research approaches. It also explains data collection methods, including primary and secondary sources, data analysis, sampling, and research limitations. The report emphasizes the importance of time management and the impact of research on personal and professional development.
Document Page
Running head: BUSINESS RESEARCH
Business research
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BUSINESS RESEARCH 2
Reflective report
I created my knowledge about the challenges in cybersecurity for business. The cybersecurity
becomes a major problem for the business in current years at the same time it can be
evaluated that such kinds of issues are emerged by rapid changes in the technical
development at the international level (Elmaghraby, and Losavio, 2014). In addition to this, I
have observed that cyber thread is also increased by rapidly enhancement in the practices of
computers, mobile, internet, and other devices. I have pointed that there are some significant
kinds of factors that create the cyber threats such as network attacks, attacks, and viruses.
Along with this, these factors can affect the financial performance of the firm in long-run.
Along with this, it is also evaluated the cybersecurity can be beneficial to positively operate
the business and obtain the favorable result in long-term (Yang, and Wen, 2017). Along with
this, I also learned about the project scope which can support to determine the possibility of
the research. I also gained my knowledge about the objectives of project systematically. I
created my depth knowledge about challenges of cyber security along with tools and
techniques to overcome the challenges in an appropriate manner.
Along with this, I learned about some factors that can be caused by the cyber challenge such
as phishing, malware, botnet, social engineering, keyloggers, and virus. Along with this, I
also gained my knowledge about some factors like lack of leadership in the working place,
teamwork issue, lack of awareness and education, and lack of regulation issues. Another
factor is rapidly enhancement in the utilization of technology, lack of control, and
enhancement in the numbers of internet users. Additionally, it can also be said I also gained
my knowledge about the impact of these factors on the performance of an organization.
Along with this, it can be said that the cybersecurity can secure the confidential data of an
organization in long-term (Scully, 2014). In addition to this, I created my knowledge about
Document Page
BUSINESS RESEARCH 3
the primary objectives of the project. I created my awareness about research question that
includes primary and secondary research question.
Moreover, I increased my consciousness about the research methodology in depth. The
research methodology can be supportive to provide an appropriate technique for completing
the research issues in an effective way. At the same time, it can also be said that there are two
kinds of research methods that are considered in the research design. These are qualitative
and quantitative research that will be also effective to collect the data systematically
(Cherdantseva, et. al., 2016). In addition, I also understood that qualitative research is used to
collect the theoretical data about the research issues. It will also support to obtain the reliable
outcome in less time and cost.
It can be said that quantitative research is used to present the numeric data in a systematic
manner. Further, the quantitative research is significant to obtain the reliable result (Gunes,
et. al., 2014). At the same time, I also learned that the mixed research can support to mitigate
the disadvantages of both methods named qualitative and quantitative method. In addition, I
also gained my understanding about the reliability and validity of the research. I understood
that ethical research could be effective to obtain the favorable outcome in the specified time.
In addition to this, it can be said that some significant factors such as applicability,
conformability, consistency, transferability, and credibility of the research can affect the
reliability and validity of the research (Kumar, et. al., 2014). In addition, I also gained my
knowledge about the research approaches that can be significant the research. Moreover, it
can be evaluated that there are two kinds of research approaches such as inductive and
deductive approaches. Both inductive and deductive approaches could be essential in the
research (Mendel, 2017). I learned that the inductive approach is used to build theory
regarding the research issue. Further, the inductive approach is used by the researcher at the
time of subjective research. Additionally, the deductive approach is used to prove and reject
Document Page
BUSINESS RESEARCH 4
the research hypothesis in an appropriate manner. Beside this, it can be evaluated that the
exploratory design method will be significant in the research wherein two kinds of methods
were included like primary and secondary data collection method (Cavelty, and Mauer,
2016).
In addition to this, it can be said I also gained my knowledge about the data collection
method that will be significant to collect the data in an appropriate manner. There are two
kinds of methods such as primary and secondary data collection method. The primary data
collection method relies on the new data that will be collected by using some significant
factors such as observation, questionnaire, and interview method (Jajodia, et. al., 2015).
Moreover, I have pointed that the primary data collection method can be supportive to obtain
a reliable result. In opposition to this, I also learned about the secondary data collection
method can also be significant to get information about the research dilemma. I learned that
there are different kinds of sources that support to collect the data in an effective manner like
a journal, academic journal, online and offline sources, books, magazines, and annual report
and company websites. Along with this, the depth understanding about research can be
effective for me to increase my knowledge as well as support to improve my personal and
professional life.
Along with this, I also created my consciousness about the evaluation of collected data in an
appropriate manner. At the same time, secondary data analysis can include case study, and
literature review to evaluate the collected data and obtain the reliable result. In opposition to
this, the primary data analysis involve statistical tool to measure the collected data in an
effective manner (Patrick, and Fields, 2017). I also created my understanding about the
sampling method and sample size. I created my death understanding about convenient
sampling method that will be significant in the research. In addition to this, it can be said that
the research limitation can also be significant to complete the research in an effective manner.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BUSINESS RESEARCH 5
The research limitation can be a barrier to accomplish the research issue in an appropriate
manner (Jajodia, et. al., 2015). Moreover, I also increased my knowledge about some
significant factors that can influence the research like lack of utilization of personal data in
the research, lack of appropriate resources, limited time, and lack of cost. In addition to this,
it can also be said that knowledge about research can support to improve my professional life
in long-term. In addition to this, it can also be said that I learned about time schedule that
supports to complete any act in the specified time. Along with this, it can also be evaluated
that the time management skills can support to improve my personal life in long-run.
Document Page
BUSINESS RESEARCH 6
References
Cavelty, M. D., and Mauer, V. (2016) Power and security in the information age:
Investigating the role of the state in cyberspace. UK: Routledge.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., and Stoddart, K.
(2016) ‘A review of cybersecurity risk assessment methods for SCADA systems’, computers
and security, 56, pp. 1-27.
Elmaghraby, A. S., and Losavio, M. M. (2014) ‘Cybersecurity challenges in Smart Cities:
Safety, security, and privacy’, Journal of advanced research, 5(4), pp. 491-497.
Gunes, V., Peter, S., Givargis, T., and Vahid, F. (2014) ‘A survey of concepts, applications,
and challenges in cyber-physical systems’, TIIS, 8(12), pp. 4242-4268.
Jajodia, S., Shakarian, P., Subrahmanian, V. S., Swarup, V., and Wang, C. (Eds.).
(2015). Cyber Warfare: Building the Scientific Foundation (Vol. 56). Berlin: Springer.
Kumar, V. A., Pandey, K. K., and Punia, D. K. (2014) ‘Cybersecurity threats in the power
sector: Need for a domain-specific regulatory framework in India’, Energy Policy, 65, pp.
126-133.
Mendel, J. (2017) ‘Smart Grid Cyber Security Challenges: Overview and Classification’, e-
mentor, 1 (68), pp. 55-66.
Patrick, H., and Fields, Z. (2017) ‘A Need for Cyber Security Creativity’, Collective
Creativity for Responsible and Sustainable Business Practice, pp. 42-61.
Scully, T. (2014) ‘The cybersecurity threat stops in the boardroom’, Journal of business
continuity and emergency planning, 7(2), pp. 138-148.
Yang, S. C., and Wen, B. (2017) ‘Toward a cybersecurity curriculum model for
undergraduate business schools: A survey of AACSB-accredited institutions in the United
States’, Journal of Education for Business, 92(1), pp. 1-8.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]