Innovation for Impact: Cybersecurity Project Report Analysis
VerifiedAdded on 2022/10/13
|8
|1584
|213
Report
AI Summary
This report delves into a cybersecurity project, exploring the impact of innovation on addressing cybercrime. It identifies potential shareholders, analyzes the project's evidence, and outlines both opportunities and risks associated with cybersecurity. The report highlights the importance of data integrity and confidentiality, proposing investment strategies and justifications. It also emphasizes the role of modern technologies like IoT, AI, and cloud computing in enhancing cybersecurity measures. Furthermore, the report discusses the need for effective communication and organizational responses to cyber threats, providing insights into the responsibilities of investors and the overall financial stability of such projects. The analysis includes recommendations for improving the project's structure and ensuring proper data encryption methods to protect against cybercrime. The report is a comprehensive overview of the project's goals, strategies, and potential impact on modern society, aiming to educate users and professionals about cybersecurity.

Running Head: INNOVATION FOR IMPACT
INNOVATION FOR IMPACT
Name of the Student:
Name of the University:
Author Note:
INNOVATION FOR IMPACT
Name of the Student:
Name of the University:
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
INNOVATION FOR IMPACT
Table of Contents
Introduction:-...................................................................................................................................2
Evidence:-........................................................................................................................................2
Opportunities:-.................................................................................................................................3
Risks:-..............................................................................................................................................4
Response/ Feedback:-......................................................................................................................4
Justification of investment prospectus:-..........................................................................................5
References:-.....................................................................................................................................6
INNOVATION FOR IMPACT
Table of Contents
Introduction:-...................................................................................................................................2
Evidence:-........................................................................................................................................2
Opportunities:-.................................................................................................................................3
Risks:-..............................................................................................................................................4
Response/ Feedback:-......................................................................................................................4
Justification of investment prospectus:-..........................................................................................5
References:-.....................................................................................................................................6

2
INNOVATION FOR IMPACT
Introduction:-
Many technical issues are affecting human culture and activities. Cybercrime is one of
them. The technical official should recover these issues. The first part of this project is relating to
the identification and effectiveness of potential shareholders. This assignment is also to identify
the problems of cybersecurity, system structure and types of shareholders (Kesan and Hayes
2014). After the completion of part 1, the project maker finds some risks, opportunities, and
justification.
Evidence:-
In this project, the project maker is proposed to create a proper strategy for cybercrime
protection. The part 1 research proposal also describes some methods of cybersecurity
(Filatotchev and Dotsenko 2015). The project maker also introduces an advanced interruption
system in a commercial environment that can be very much helpful to shield the online
connections. In this project, there are two different parts which are mainly concentrating one is
data integrity, and other is data confidentiality. The type of speculation which is necessary for
this project is investment funds. The frequent expenditures associated with this inventive right
from the start of the project to the last phase. The first critiques of this project are the project
maker should implement some modern innovation like IoT, AI and cloud. In the first project, the
maker is working on the unique issues of cybercrime, but they cannot justify the proper
procedure of this system (Muller 2015). The deliverables of this project are clear, and it is
relating to the investors. But in this project, the project maker cannot verify the investor's value
and cannot focus their role in this task. The primary evidence of this project is the investor's
activity. This project can concentrate on the financial stability of an investor, but at the same
INNOVATION FOR IMPACT
Introduction:-
Many technical issues are affecting human culture and activities. Cybercrime is one of
them. The technical official should recover these issues. The first part of this project is relating to
the identification and effectiveness of potential shareholders. This assignment is also to identify
the problems of cybersecurity, system structure and types of shareholders (Kesan and Hayes
2014). After the completion of part 1, the project maker finds some risks, opportunities, and
justification.
Evidence:-
In this project, the project maker is proposed to create a proper strategy for cybercrime
protection. The part 1 research proposal also describes some methods of cybersecurity
(Filatotchev and Dotsenko 2015). The project maker also introduces an advanced interruption
system in a commercial environment that can be very much helpful to shield the online
connections. In this project, there are two different parts which are mainly concentrating one is
data integrity, and other is data confidentiality. The type of speculation which is necessary for
this project is investment funds. The frequent expenditures associated with this inventive right
from the start of the project to the last phase. The first critiques of this project are the project
maker should implement some modern innovation like IoT, AI and cloud. In the first project, the
maker is working on the unique issues of cybercrime, but they cannot justify the proper
procedure of this system (Muller 2015). The deliverables of this project are clear, and it is
relating to the investors. But in this project, the project maker cannot verify the investor's value
and cannot focus their role in this task. The primary evidence of this project is the investor's
activity. This project can concentrate on the financial stability of an investor, but at the same
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
INNOVATION FOR IMPACT
time, they cannot focus on the organizational value of this project. This project can establish new
values for the several organizations that are looking to protect their online governmental
possessions from cybercrime (Knowles et al. 2015). The project maker successfully presented
some particular evidence which is very much useful for this project. In this project, they quickly
identify the organizational response and communication procedure which is very much essential
to create a good impact. Substantial evidence is the responsibilities of the investors and the
relationship between investor and effective communication strategy. For demonstrating the
project, they also concentrate on the estimated cost and resources. Thus, this project is looking
forward to get savings from both the sponsors and the administration funders as each them are
more economic stable than the other stockholders as massive amount of investment is
compulsory in each of the stages of this project. This project can set innovative standards for the
several organizations that are looking to secure their online administrative assets from the cyber
criminals.
Opportunities:-
This project is very much crucial for modern society. For this project, the ordinary person
quickly knows about cybercrime. When they are very much familiar with these issues, then they
try to protect this very quickly. According to the project, the typical user and technical person are
fast observing in some cybersecurity processes (Shackelford 2016). This project can increase the
human responsibility for protecting the cybercrime. The familiar user is aware of some technical
aspects of cybersecurity. If they know some essential part of this cybercrime, then they are easily
protected their information from hackers. A professional person is also secure their system very
quickly because they try to boot up these security systems and check this very efficiently.
INNOVATION FOR IMPACT
time, they cannot focus on the organizational value of this project. This project can establish new
values for the several organizations that are looking to protect their online governmental
possessions from cybercrime (Knowles et al. 2015). The project maker successfully presented
some particular evidence which is very much useful for this project. In this project, they quickly
identify the organizational response and communication procedure which is very much essential
to create a good impact. Substantial evidence is the responsibilities of the investors and the
relationship between investor and effective communication strategy. For demonstrating the
project, they also concentrate on the estimated cost and resources. Thus, this project is looking
forward to get savings from both the sponsors and the administration funders as each them are
more economic stable than the other stockholders as massive amount of investment is
compulsory in each of the stages of this project. This project can set innovative standards for the
several organizations that are looking to secure their online administrative assets from the cyber
criminals.
Opportunities:-
This project is very much crucial for modern society. For this project, the ordinary person
quickly knows about cybercrime. When they are very much familiar with these issues, then they
try to protect this very quickly. According to the project, the typical user and technical person are
fast observing in some cybersecurity processes (Shackelford 2016). This project can increase the
human responsibility for protecting the cybercrime. The familiar user is aware of some technical
aspects of cybersecurity. If they know some essential part of this cybercrime, then they are easily
protected their information from hackers. A professional person is also secure their system very
quickly because they try to boot up these security systems and check this very efficiently.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
INNOVATION FOR IMPACT
In project terms an opportunity is something recognized within the project deliverables
that could unlock or otherwise simplify a positive or helpful effect. Such things are required and
recognized within the Commercial Case to equalizer and justify the cost. One major advantage of
cyber-security in the healthcare industry is that it helps avoid the leaking of patient evidence. The
healthcare industry avoids expense because specialists are much more effective in the service
they deliver (Order 2013). However, that wouldn’t be a respectable enough reason to stop cyber-
attacks alone. The cost of a litigation from leaked documents, for example, could spell the end
for a hospital person, so cyber-attack anticipation is vital for that motive also.
Risks:-
Information Technology is one of the significant general determination Technologies in
today’s age for some reasons. Today it is used in almost all the administrations, associations, and
people (Abomhara 2015). The progression of IT brings so many services to us; but also brings so
many difficulties and experiments too and out of which Cyber Crime is a kind of fault which
deals with the cyber world which includes information security, computer security and mobile
security too (Wells et al. 2014) . The growing number of crimes in the field of IT brings a big
desirability to Cyber Crime to everyone. Cyber Crime is a significant and respected illegal
activity nowadays. Initially email and internet are treated as the key tools of crime; however,
over the time the number of apparatus and tools are growing in this field. This project discusses
about Cyber Crime including environment, characteristics, and problems.
Traditionally, the security and technology tools that have been used to avoid cyber-
attacks have been more sensitive than active and have also created a huge number of wrong
positives, creating disorganizations and disrupting from actual threats. What’s more these
INNOVATION FOR IMPACT
In project terms an opportunity is something recognized within the project deliverables
that could unlock or otherwise simplify a positive or helpful effect. Such things are required and
recognized within the Commercial Case to equalizer and justify the cost. One major advantage of
cyber-security in the healthcare industry is that it helps avoid the leaking of patient evidence. The
healthcare industry avoids expense because specialists are much more effective in the service
they deliver (Order 2013). However, that wouldn’t be a respectable enough reason to stop cyber-
attacks alone. The cost of a litigation from leaked documents, for example, could spell the end
for a hospital person, so cyber-attack anticipation is vital for that motive also.
Risks:-
Information Technology is one of the significant general determination Technologies in
today’s age for some reasons. Today it is used in almost all the administrations, associations, and
people (Abomhara 2015). The progression of IT brings so many services to us; but also brings so
many difficulties and experiments too and out of which Cyber Crime is a kind of fault which
deals with the cyber world which includes information security, computer security and mobile
security too (Wells et al. 2014) . The growing number of crimes in the field of IT brings a big
desirability to Cyber Crime to everyone. Cyber Crime is a significant and respected illegal
activity nowadays. Initially email and internet are treated as the key tools of crime; however,
over the time the number of apparatus and tools are growing in this field. This project discusses
about Cyber Crime including environment, characteristics, and problems.
Traditionally, the security and technology tools that have been used to avoid cyber-
attacks have been more sensitive than active and have also created a huge number of wrong
positives, creating disorganizations and disrupting from actual threats. What’s more these

5
INNOVATION FOR IMPACT
traditional tools do not have the bandwidth compulsory to arrangement with the large capacities
of evidence.
Response/ Feedback:-
The investor should invest in this project. After the completion of this project, the user is
easy to know about cybercrime and cybersecurity. The first part they are focusing on the
different types of possible shareholders like government shareholders, non-government
shareholders and some leading organizations. After the completion of this project, they are
receiving some good benefits. First, all this organization can implement this modern technology
and growing their business. Some appropriate shareholders might include security services
network providers, Different agencies and law enforcement department.
Justification of investment prospectus:-
Some recommendations are very much essential to improve this project. The goal of the
project is to identify the strategy of information security and maintains this property. If this
project should complete the proper structure of IT, then the user very much knows about this.
Communication between every investor of this innovation project is very much compulsory to
eliminate any sort of inconsistencies for the investors of this project. The proper justification of
data encryption strategy should be prominent for this project. The data encryption methods are
very much essential to protect cybercrime.
INNOVATION FOR IMPACT
traditional tools do not have the bandwidth compulsory to arrangement with the large capacities
of evidence.
Response/ Feedback:-
The investor should invest in this project. After the completion of this project, the user is
easy to know about cybercrime and cybersecurity. The first part they are focusing on the
different types of possible shareholders like government shareholders, non-government
shareholders and some leading organizations. After the completion of this project, they are
receiving some good benefits. First, all this organization can implement this modern technology
and growing their business. Some appropriate shareholders might include security services
network providers, Different agencies and law enforcement department.
Justification of investment prospectus:-
Some recommendations are very much essential to improve this project. The goal of the
project is to identify the strategy of information security and maintains this property. If this
project should complete the proper structure of IT, then the user very much knows about this.
Communication between every investor of this innovation project is very much compulsory to
eliminate any sort of inconsistencies for the investors of this project. The proper justification of
data encryption strategy should be prominent for this project. The data encryption methods are
very much essential to protect cybercrime.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
INNOVATION FOR IMPACT
References:-
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Filatotchev, I. and Dotsenko, O., 2015. Shareholder activism in the UK: types of activists, forms
of activism, and their impact on a target’s performance. Journal of Management &
Governance, 19(1), pp.5-24.
Hawk, C. and Kaushiva, A., 2014. Cybersecurity and the smarter grid. The Electricity
Journal, 27(8), pp.84-95.
Kesan, J.P. and Hayes, C.M., 2014. Creating a circle of trust to further digital privacy and
cybersecurity goals. Mich. St. L. Rev., p.1475.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of
cybersecurity management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Muller, L.P., 2015. Cybersecurity capacity building in developing countries: challenges and
opportunities.
Order, E., 2013. Executive Order--Improving critical infrastructure cybersecurity.
Shackelford, S.J., 2016. Protecting intellectual property and privacy in the digital age: the use of
national cybersecurity strategies to mitigate cyber risk. Chap. L. Rev., 19, p.445.
INNOVATION FOR IMPACT
References:-
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Filatotchev, I. and Dotsenko, O., 2015. Shareholder activism in the UK: types of activists, forms
of activism, and their impact on a target’s performance. Journal of Management &
Governance, 19(1), pp.5-24.
Hawk, C. and Kaushiva, A., 2014. Cybersecurity and the smarter grid. The Electricity
Journal, 27(8), pp.84-95.
Kesan, J.P. and Hayes, C.M., 2014. Creating a circle of trust to further digital privacy and
cybersecurity goals. Mich. St. L. Rev., p.1475.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of
cybersecurity management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Muller, L.P., 2015. Cybersecurity capacity building in developing countries: challenges and
opportunities.
Order, E., 2013. Executive Order--Improving critical infrastructure cybersecurity.
Shackelford, S.J., 2016. Protecting intellectual property and privacy in the digital age: the use of
national cybersecurity strategies to mitigate cyber risk. Chap. L. Rev., 19, p.445.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
INNOVATION FOR IMPACT
Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014. Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.
INNOVATION FOR IMPACT
Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014. Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





