Strategic IT Management (Business Module) Research Proposal at Yahoo!

Verified

Added on  2019/10/18

|5
|855
|270
Report
AI Summary
This report presents a research proposal focused on IT intervention at Yahoo, addressing the critical issues of cybersecurity management. The proposal outlines the problems stemming from data breaches and IP attacks, emphasizing the importance of IT strategy and security incident management in mitigating these risks. The research is divided into two parts, with Part A including a poster and graphical representations of the IT strategy implementation for cybersecurity. The methodology incorporates both quantitative and qualitative analysis, utilizing literature reviews, case studies, and statistical analysis to gather and interpret data. The conclusion will be based on scientific analysis, with a focus on proposing solutions and recommendations for future research. The paper references relevant literature and provides a comprehensive overview of the research process, including data collection and analysis methods, to support the scientific conclusions and ensure a convincing and well-supported final outcome.
Document Page
Running head: Strategic IT Management (Business module) 1
Research Proposal for IT Intervention at Yahoo!
Student Name
Institution
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Strategic IT Management (Business module)2
Introduction
Problems with Cybersecurity Management are one of the major problems for every
organization. For the research article, the major IT intervention in an organization is chosen as
per the topic. Already there were lots of problem in the organization regarding data breaches and
IP attacks. In this research thus the IT Strategy is being discussed and analyzed. Also, the
Security Incident Management is discussed in this respect and it is found that this concept is used
to solve the problem of cybersecurity in an organization. Cybersecurity is essential for any
organization, which has a huge information database which is not allowed to bear the loss. With
regards to programmers, there are lots of organizations which are defenceless against attacks.
When experts know about the significance of cybersecurity, only then it is being seen to able to
secure the company from cyber-attacks.
This is the reason this topic needs a research and it is also beneficial for the organization.
Background/Review of the Literature
On April 2018, the organization agreed to pay a punishment of $ 35 million for
neglecting to report 2014 information infringement in which programmers stole individual
information from a huge number of client accounts. In the least month only, a judge had decided
that casualties of information infringement had the privilege to disagree with Yahoo for inability
and negligence to disclose the security vulnerabilities of the framework [1].
Yahoo isn't the only one; a large number of organizations have faced the disaster of
Public Relation in a previous couple of years around security break. On one hand, the pattern is
acknowledged; Cyber attacks are becoming more typical than any time in a recent couple of
years since attackers have turned out to be more proficient on curved frameworks.
Document Page
Strategic IT Management (Business module)3
The whole research is divided into two Parts: Part A and Part B. Part A consists of a
poster, which reflects the implementation of IT strategy for cybersecurity It also consists of
graphs and much more.
Literature Review
There are lots of studies that have been done on this behalf of the research. There are lots
of famous literature in this topic like Issues in Cybersecurity by Fischer, Cybersecurity threat in
SME and E-commerce by Sharma and many more. Reviewing literatures are very important for
giving the evidence of the issue [2].
Methodology
Both the quantitative and qualitative analysis methodology are performed in this regard.
In the qualitative analysis, Literature Reviews, Case Study, Newspapers and monthly are utilized
for this purpose. In quantitative analysis methodology, statistical study is done for this issue.
Without these, it is impossible to complete to research on this topic of IT Interventions.
Empirical Research is a research strategy and this includes the real-life phenomena along with
experiences [3] .
Data Collection
Data will be collected from the various research papers and interviews will be performed
from the other research articles. The relevant papers are systematically selected on this subject
and it is reviewed strictly as per this purposes. The data and synthesis will be drawn from the
reviewed papers and thus it will be contributed as per the analysis.
Conclusion
The conclusion of the research paper will be done on the basis of which the conclusion
has been drawn and learned as well. All the important part is highlighted for the paper as per the
Document Page
Strategic IT Management (Business module)4
scientific analysis which leads a scientific conclusion and it is convincing enough. In the next
stage of data collection the similar problems will be searched and it will be analyzed for better
justification according to the available data. The solution of each problem will be proposed for
the project and also for the second party project. Finally, the best solution is chosen for all the
problems according to the peer’s review comments.
The conclusion will be followed by the recommendation is performed so that the research
process will be done more easier way in next stage. In the end, references are properly cited with
IEEE format.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Strategic IT Management (Business module)5
Bibliography
[1] M. Liedtke, "Yahoo to pay $50M, other costs for massive security breach," phys.org, 2018.
[2] E. A. Fischer, "Cybersecurity Issues and Challenges: In Brief," , 2014. [Online]. Available:
https://fas.org/sgp/crs/misc/r43831.pdf. [Accessed 26 11 2018].
[3] S. . Garbarino and J. . Holland, "Quantitative and Qualitative Methods in Impact Evaluation
and Measuring Results," , 2009. [Online]. Available:
http://gsdrc.org/docs/open/eirs4.pdf. [Accessed 26 11 2018].
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]