Reflection Report: Effectiveness and Usefulness of Learning Experience
VerifiedAdded on 2020/05/11
|7
|1567
|558
Report
AI Summary
This reflection report evaluates the effectiveness and usefulness of a learning experience focused on the impact of cybersecurity on Delta Insurance in Bangladesh. The report highlights the development of knowledge and skills, particularly in understanding the vulnerabilities of Bangladesh's cyberspace and the increasing frequency of cyberattacks in the financial sector. The student reflects on how this learning will be implemented to address cybersecurity challenges within the company, emphasizing the importance of strategic planning and the use of research methodologies to assess risks and make informed decisions. The report also discusses the practical application of learned skills, such as data analysis using MS-Excel and SPSS, and the ability to conduct surveys through questionnaires. The student emphasizes the importance of strict measures for using BYOD and the need to address research limitations, such as the challenges in gathering data from IT firms. The report concludes with the student's plan to apply these learnings to encourage stakeholders to invest in cybersecurity measures, thereby enhancing their professional career.

Running head: REFLECTION REPORT
Reflection report
Reflection report
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFLECTION REPORT 2
Reflection report
Evaluate the effectiveness and your usefulness of the learning experience
This research proposal was effective for me to develop my knowledge and skills. It is also useful
for generate understanding about the Impact of Cyber Security on Delta Insurance of
Bangladesh. From the introduction chapter, I have learned that Bangladesh is becoming a
vulnerable nation in terms of cyberspace. Since, cyber-attacks may create possibilities of loss of
asset with high extent (Williams, 2015). Along with this, it can be evaluated that a large number
of cyber attacks has been arisen in the financial corporation in Bangladesh such as Bangladesh
bank faced a heist in 2013 that causes big financial loss (Vasigh, et. al, 2014). This learning
experience was beneficial for me to make strategy within delta insurance. Since, this company
expected to invest high amount on measures of cybersecurity in the upcoming years.
Explain how this learning process will be useful to you
I will implement these learning experiences within the company to deal with cybersecurity. It
can be explained that business tends to avoid periodically and any kind of uncertainty assessment
to execute the security policy due to different causes. These are inadequate time, shortage of
fund, and incapability to provide the high extent of awareness regarding information security as
well as training and education (Warf, 2016).
Describe objectively what happened in the learning process
This business research was useful for me to develop research and technical skills. Through this
research, I have learned that both primary and secondary question is made by a researcher to
respond the answer through research. I have also developed my understanding regarding
potential hypothesis which is created to assess the two different variables i.e. dependent and
Reflection report
Evaluate the effectiveness and your usefulness of the learning experience
This research proposal was effective for me to develop my knowledge and skills. It is also useful
for generate understanding about the Impact of Cyber Security on Delta Insurance of
Bangladesh. From the introduction chapter, I have learned that Bangladesh is becoming a
vulnerable nation in terms of cyberspace. Since, cyber-attacks may create possibilities of loss of
asset with high extent (Williams, 2015). Along with this, it can be evaluated that a large number
of cyber attacks has been arisen in the financial corporation in Bangladesh such as Bangladesh
bank faced a heist in 2013 that causes big financial loss (Vasigh, et. al, 2014). This learning
experience was beneficial for me to make strategy within delta insurance. Since, this company
expected to invest high amount on measures of cybersecurity in the upcoming years.
Explain how this learning process will be useful to you
I will implement these learning experiences within the company to deal with cybersecurity. It
can be explained that business tends to avoid periodically and any kind of uncertainty assessment
to execute the security policy due to different causes. These are inadequate time, shortage of
fund, and incapability to provide the high extent of awareness regarding information security as
well as training and education (Warf, 2016).
Describe objectively what happened in the learning process
This business research was useful for me to develop research and technical skills. Through this
research, I have learned that both primary and secondary question is made by a researcher to
respond the answer through research. I have also developed my understanding regarding
potential hypothesis which is created to assess the two different variables i.e. dependent and

REFLECTION REPORT 3
independent variable. As a result, I am competent to become a good technical manager as I have
high knowledge regarding cybersecurity.
Evaluate what you learn
I have considered different activities to complete the research objectives such as I have used
research design and methodology to complete the research in a methodological way. This
learning experience would be valuable for me to make further research in future. Through this
research, it is analyzed that a large amount of information will be quantitative as it will aid to
determine the impact of cybercrimes on business in Bangladesh (Crandall, et. al., 2013). I have
also pointed that data which are collected through the research will help to identify the level of
risk related to cyber attacks and its impact on the business process. Consequently, I can use this
data gathering process to make further research associated with cybersecurity issue. For this
research, it is analyzed that main primary data will be gathered through a questionnaire in which
researcher will mainly emphasize on Delta insurance company (Entrekin, and Scott-Ladd, 2013).
As, now, I am competent to use survey through a questionnaire.
I have also developed my understanding regarding questionnaire. In this way, it can be evaluated
that a large number of the questionnaire will be provided to IT department of a corporation. It is
also analyzed that Ms-excel and SPSS will be used to analyze the data (Faruk and Rahaman,
2015). This learning was also valuable for me to develop my technical skills as I am able to use
different software for conducting the research. This skill is effective for me to assess the
reliability and validity of research outcome.
From the finding regarding the security of delta system, I have assessed that there was an
enhancement in business cybersecurity and the attacks were becoming fewer due to strict
security measure for defending the system. This experience was beneficial for me to suggest the
independent variable. As a result, I am competent to become a good technical manager as I have
high knowledge regarding cybersecurity.
Evaluate what you learn
I have considered different activities to complete the research objectives such as I have used
research design and methodology to complete the research in a methodological way. This
learning experience would be valuable for me to make further research in future. Through this
research, it is analyzed that a large amount of information will be quantitative as it will aid to
determine the impact of cybercrimes on business in Bangladesh (Crandall, et. al., 2013). I have
also pointed that data which are collected through the research will help to identify the level of
risk related to cyber attacks and its impact on the business process. Consequently, I can use this
data gathering process to make further research associated with cybersecurity issue. For this
research, it is analyzed that main primary data will be gathered through a questionnaire in which
researcher will mainly emphasize on Delta insurance company (Entrekin, and Scott-Ladd, 2013).
As, now, I am competent to use survey through a questionnaire.
I have also developed my understanding regarding questionnaire. In this way, it can be evaluated
that a large number of the questionnaire will be provided to IT department of a corporation. It is
also analyzed that Ms-excel and SPSS will be used to analyze the data (Faruk and Rahaman,
2015). This learning was also valuable for me to develop my technical skills as I am able to use
different software for conducting the research. This skill is effective for me to assess the
reliability and validity of research outcome.
From the finding regarding the security of delta system, I have assessed that there was an
enhancement in business cybersecurity and the attacks were becoming fewer due to strict
security measure for defending the system. This experience was beneficial for me to suggest the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFLECTION REPORT 4
delta insurance company to invest in cybersecurity. As a result, I can grow my personal as well
as professional life in future.
Explain your learning process
From the finding of data, I have pointed that use of BYOD has a major risk to secure the data of
corporation because there is inadequate control over information which is accessed through such
devises. Along with this, I have gained my knowledge through respondent responses. In this
way, it can be evaluated that management of delta insurance was working hard to take full
control of the circumstances which have covered a large part of the financial institution in
Bangladesh (Lindsay, 2015). This learning is significant for me to make further research on delta
insurance company as I can enhance my professional career.
In addition, I have developed my knowledge regarding commitment of firm to security measures.
In this way, it is analyzed that information risk management approach is used to assess issues
which may affect the safety of its customer’s information (Dunn Cavelty, 2013). As a result, I
am competent to implement the information risk administration strategy at the workplace which
could foster my professional life.
From the discussion chapter, I have gained my experience that a large number of a financial
institution facing cyber attacks however delta insurance has to move in faster for developing
better security action to secure its system. As a result, I will use this experience to encourage the
stakeholders for investing a large amount in cyber security of Delta Company.
Through the survey, I have observed that large numbers of workforces are happy and confident
regarding the measures of the company. This learning experience was effective for me to decline
and avoid cyber-attacks. It is also analyzed that when a team member has a favorable attitude
regarding efforts which are made by a corporation to decline cyber-attack then it may improve
delta insurance company to invest in cybersecurity. As a result, I can grow my personal as well
as professional life in future.
Explain your learning process
From the finding of data, I have pointed that use of BYOD has a major risk to secure the data of
corporation because there is inadequate control over information which is accessed through such
devises. Along with this, I have gained my knowledge through respondent responses. In this
way, it can be evaluated that management of delta insurance was working hard to take full
control of the circumstances which have covered a large part of the financial institution in
Bangladesh (Lindsay, 2015). This learning is significant for me to make further research on delta
insurance company as I can enhance my professional career.
In addition, I have developed my knowledge regarding commitment of firm to security measures.
In this way, it is analyzed that information risk management approach is used to assess issues
which may affect the safety of its customer’s information (Dunn Cavelty, 2013). As a result, I
am competent to implement the information risk administration strategy at the workplace which
could foster my professional life.
From the discussion chapter, I have gained my experience that a large number of a financial
institution facing cyber attacks however delta insurance has to move in faster for developing
better security action to secure its system. As a result, I will use this experience to encourage the
stakeholders for investing a large amount in cyber security of Delta Company.
Through the survey, I have observed that large numbers of workforces are happy and confident
regarding the measures of the company. This learning experience was effective for me to decline
and avoid cyber-attacks. It is also analyzed that when a team member has a favorable attitude
regarding efforts which are made by a corporation to decline cyber-attack then it may improve
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFLECTION REPORT 5
the firm’s goodwill and customers will be willing to invest in the corporation (Gordon, et. al.,
2015). As a result, this learning experience can be effective to become a good technical manager
in the future.
Explain Plan how this learning you will applied
Through this research, I have learned that company should make a strict measure for using the
BYOD as they pose a key challenge to the security of the system. Consequently, I am able to
make a strict action for exercising BYOD. Besides this, I have developed an understanding
regarding research limitations. In this way, it is observed that fewer IT firms can be able to give
an interview (Wang, and Lu, 2013). Another limitation that was pointed me is that there are only
a few participants who able to understand the straightforward question. This learning experience
was beneficial for me to focus on the research limitation during research as it can enhance the
quality of research outcome.
the firm’s goodwill and customers will be willing to invest in the corporation (Gordon, et. al.,
2015). As a result, this learning experience can be effective to become a good technical manager
in the future.
Explain Plan how this learning you will applied
Through this research, I have learned that company should make a strict measure for using the
BYOD as they pose a key challenge to the security of the system. Consequently, I am able to
make a strict action for exercising BYOD. Besides this, I have developed an understanding
regarding research limitations. In this way, it is observed that fewer IT firms can be able to give
an interview (Wang, and Lu, 2013). Another limitation that was pointed me is that there are only
a few participants who able to understand the straightforward question. This learning experience
was beneficial for me to focus on the research limitation during research as it can enhance the
quality of research outcome.

REFLECTION REPORT 6
References
Crandall, W. R., Parnell, J. A., and Spillan, J. E. (2013) Crisis management: Leading in the new
strategic landscape. USA: Sage Publications.
Dunn Cavelty, M. (2013) From cyber-bombs to political fallout: Threat representations with an
impact in the cyber-security discourse. International Studies Review, 15(1), pp. 105-122.
Entrekin, L., and Scott-Ladd, B. D. (2013) Human resource management and change: a
practicing manager's guide. UK: Routledge.
Faruk, O., and Rahaman, A. (2015) ‘Measuring Efficiency of Conventional Life Insurance
Companies in Bangladesh and Takaful Life Insurance Companies in Malaysia: A Non-
Parametric Approach’, Management Studies and Economic Systems, 2(2), pp. 129-144.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Zhou, L. (2015) ‘The impact of information
sharing on cybersecurity underinvestment: a real options perspective’, Journal of Accounting and
Public Policy, 34(5), pp. 509-519.
Lindsay, J. R. (2015) ‘The impact of China on cybersecurity: fiction and friction’, International
Security, 39(3), pp. 7-47.
Vasigh, B., Fleming, K., and Humphreys, B. (2014) Foundations of airline finance:
Methodology and practice. UK: Routledge.
Wang, W., and Lu, Z. (2013) ‘Cybersecurity in the Smart Grid: Survey and
challenges’, Computer Networks, 57(5), pp. 1344-1371.
Warf, B. (2016) E-Government in Asia: Origins, Politics, Impacts, Geographies. USA: Chandos
Publishing.
References
Crandall, W. R., Parnell, J. A., and Spillan, J. E. (2013) Crisis management: Leading in the new
strategic landscape. USA: Sage Publications.
Dunn Cavelty, M. (2013) From cyber-bombs to political fallout: Threat representations with an
impact in the cyber-security discourse. International Studies Review, 15(1), pp. 105-122.
Entrekin, L., and Scott-Ladd, B. D. (2013) Human resource management and change: a
practicing manager's guide. UK: Routledge.
Faruk, O., and Rahaman, A. (2015) ‘Measuring Efficiency of Conventional Life Insurance
Companies in Bangladesh and Takaful Life Insurance Companies in Malaysia: A Non-
Parametric Approach’, Management Studies and Economic Systems, 2(2), pp. 129-144.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Zhou, L. (2015) ‘The impact of information
sharing on cybersecurity underinvestment: a real options perspective’, Journal of Accounting and
Public Policy, 34(5), pp. 509-519.
Lindsay, J. R. (2015) ‘The impact of China on cybersecurity: fiction and friction’, International
Security, 39(3), pp. 7-47.
Vasigh, B., Fleming, K., and Humphreys, B. (2014) Foundations of airline finance:
Methodology and practice. UK: Routledge.
Wang, W., and Lu, Z. (2013) ‘Cybersecurity in the Smart Grid: Survey and
challenges’, Computer Networks, 57(5), pp. 1344-1371.
Warf, B. (2016) E-Government in Asia: Origins, Politics, Impacts, Geographies. USA: Chandos
Publishing.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFLECTION REPORT 7
Williams, B. M. (2015) An Administrative Compendium on Trends for Identifying Adequate
Blood Donation by African Americans: A Collection of Literary Research Procedure Papers.
UK: Xlibris Corporation.
Williams, B. M. (2015) An Administrative Compendium on Trends for Identifying Adequate
Blood Donation by African Americans: A Collection of Literary Research Procedure Papers.
UK: Xlibris Corporation.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





