Reflective Journal: Cyber Security Challenges in Pakistan SMEs
VerifiedAdded on  2023/06/10
|7
|1462
|324
AI Summary
This reflective journal explores the challenges of cyber security on business performance, focusing on medium and large enterprises in Pakistan. The reflection covers the effectiveness and usefulness of the learning experience, explaining how the learning process will be applied in the future. It objectively describes the learning process, evaluates the insights gained, and explains the steps taken during the research, including addressing research issues, objectives, and literature review. The journal also discusses the application of knowledge regarding sampling and the limitations of the investigation, such as time, cost, and resources. Ultimately, it concludes that cyber security is essential for securing data in business and enhancing performance, highlighting the development of research, technical, and business management skills.

Running head: BUSINESS RESEARCH
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BUSINESS RESEARCH 2
Table of Contents
Introduction and Reflective Journal Scope......................................................................................3
Critically and depth of learning reflections reflective analysis.......................................................3
Evaluate the effectiveness and your usefulness of the learning experience.................................3
Explain how this learning process will be useful to you..............................................................3
Describe objectively what happened in the learning process......................................................4
Evaluate what you learn...............................................................................................................4
Explain your learning process......................................................................................................5
Explain Plan how this learning you will apply............................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................7
Table of Contents
Introduction and Reflective Journal Scope......................................................................................3
Critically and depth of learning reflections reflective analysis.......................................................3
Evaluate the effectiveness and your usefulness of the learning experience.................................3
Explain how this learning process will be useful to you..............................................................3
Describe objectively what happened in the learning process......................................................4
Evaluate what you learn...............................................................................................................4
Explain your learning process......................................................................................................5
Explain Plan how this learning you will apply............................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................7

BUSINESS RESEARCH 3
Introduction and Reflective Journal Scope
This report analyzes the Challenges of Cyber Security on Business performances, a case study of
medium and large enterprises in Pakistan. It also demonstrates the gaps in the literature review
that is beneficial to conduct the further research (Abomhara, 2015). This reflective journal has a
wider scope because it would aid to increase the awareness regarding the research justification
and methodology to conduct the research in a systematic way.
Critically and depth of learning reflections reflective analysis
Evaluate the effectiveness and your usefulness of the learning experience
I have increased my knowledge regarding the challenges of Cyber Security on Business
performances. In such way, I have observed that the cyber attackers hit the confidentiality with
the integrity of facts and figures and pose a serious dispute for business. They can leak the data
to the competitors as it can create risk for the business (Abomhara, 2015). Through the
assignment, it is also evaluated that the medium and large company in the nation plays a
significant role in its progress (Choo, 2011). This learning experience would be beneficial to
create the employment and decline the poverty. It would be advantageous for me to improve the
basic living to people. From the literature review, I have pointed that the cybersecurity issue may
decline the performance of the business and generate the fear of loss of information. This
learning experience would be beneficial to overcome the cyber threats from the business.
Explain how this learning process will be useful to you
This business research program was useful for me to understand the strategies of cybersecurity in
the business. In such way, I have pointed that the government should run the program of training
for the medium and large scale business. Through the assignment 2, it is pointed that corporation
should play securely with the information without getting in the fear of losing the privacy and
Introduction and Reflective Journal Scope
This report analyzes the Challenges of Cyber Security on Business performances, a case study of
medium and large enterprises in Pakistan. It also demonstrates the gaps in the literature review
that is beneficial to conduct the further research (Abomhara, 2015). This reflective journal has a
wider scope because it would aid to increase the awareness regarding the research justification
and methodology to conduct the research in a systematic way.
Critically and depth of learning reflections reflective analysis
Evaluate the effectiveness and your usefulness of the learning experience
I have increased my knowledge regarding the challenges of Cyber Security on Business
performances. In such way, I have observed that the cyber attackers hit the confidentiality with
the integrity of facts and figures and pose a serious dispute for business. They can leak the data
to the competitors as it can create risk for the business (Abomhara, 2015). Through the
assignment, it is also evaluated that the medium and large company in the nation plays a
significant role in its progress (Choo, 2011). This learning experience would be beneficial to
create the employment and decline the poverty. It would be advantageous for me to improve the
basic living to people. From the literature review, I have pointed that the cybersecurity issue may
decline the performance of the business and generate the fear of loss of information. This
learning experience would be beneficial to overcome the cyber threats from the business.
Explain how this learning process will be useful to you
This business research program was useful for me to understand the strategies of cybersecurity in
the business. In such way, I have pointed that the government should run the program of training
for the medium and large scale business. Through the assignment 2, it is pointed that corporation
should play securely with the information without getting in the fear of losing the privacy and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BUSINESS RESEARCH 4
confidential information (Cooper, Schindler, and Sun, 2006). This learning process will be useful
for me to secure the data in the business. I have also developed my understanding regarding
literature gap. In this way, I have observed that this literature does not describe regarding the
steps which could be taken by a collaboration of business and government to combat the serious
threat.
Describe objectively what happened in the learning process
I read several secondary sources for gaining my awareness regarding the methodology of
research. From the assignment 2, I have built my understanding regarding primary and secondary
questions. In such way, it is evaluated that primary data would be practiced for collecting the
information via survey through questionnaire while secondary question will be responded via
reviewing the different literature (Elmaghraby, and Losavio, 2014). I have also developed my
understanding regarding mixed research design for attaining the research objective. In this way,
it is evaluated that mixed research design includes the characteristics of both qualitative and
quantitative research design (James, 2016). It is also assessed that qualitative research design is
practiced for gaining the conceptual understanding regarding the Challenges of Cyber Security
on Business performances, a case study of medium and large enterprises in Pakistan. In contrast
to this, quantitative research design is practiced for obtaining the numerical information
regarding the research issues (Hall, 2016). As a result, I would apply my new knowledge in
terms of using these research designs in the investigation.
Evaluate what you learn
The business research was effective for me in the process of research. In such way, I have found
that cybersecurity is beneficial for improving the performance of the business. I have also
evaluated that survey through questionnaire will be conducted on employees who are working in
confidential information (Cooper, Schindler, and Sun, 2006). This learning process will be useful
for me to secure the data in the business. I have also developed my understanding regarding
literature gap. In this way, I have observed that this literature does not describe regarding the
steps which could be taken by a collaboration of business and government to combat the serious
threat.
Describe objectively what happened in the learning process
I read several secondary sources for gaining my awareness regarding the methodology of
research. From the assignment 2, I have built my understanding regarding primary and secondary
questions. In such way, it is evaluated that primary data would be practiced for collecting the
information via survey through questionnaire while secondary question will be responded via
reviewing the different literature (Elmaghraby, and Losavio, 2014). I have also developed my
understanding regarding mixed research design for attaining the research objective. In this way,
it is evaluated that mixed research design includes the characteristics of both qualitative and
quantitative research design (James, 2016). It is also assessed that qualitative research design is
practiced for gaining the conceptual understanding regarding the Challenges of Cyber Security
on Business performances, a case study of medium and large enterprises in Pakistan. In contrast
to this, quantitative research design is practiced for obtaining the numerical information
regarding the research issues (Hall, 2016). As a result, I would apply my new knowledge in
terms of using these research designs in the investigation.
Evaluate what you learn
The business research was effective for me in the process of research. In such way, I have found
that cybersecurity is beneficial for improving the performance of the business. I have also
evaluated that survey through questionnaire will be conducted on employees who are working in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BUSINESS RESEARCH 5
the small and large enterprise in Pakistan. This business research was also beneficial to conduct
the further research.
Explain your learning process
Under the assignment 1, I did different activities like addressing research issue, project objective
and assessing the literature review in order to identify the challenges of cybersecurity in business
performance (Wilson, 2016). Through the assignment 2, I did certain practices like identifying
research methodology, research question, summarising the literature review, developing time
plan, evaluating limitation of research (Kaplan, Sharma, and Weinberg, 2011). I did another
activity like addressing the research instruments and discussing the reliability and validity. The
key cause of performing certain practices during the investigation was to attain the project
objectives in a methodological way.
Explain Plan how this learning you will apply
Through the assignment 2, I have generated my knowledge of process regarding sampling. It
would be advantageous to select the participants from the high amount of population (Mackey,
and Gass, 2015). Consequently, I would apply this information in the future for assessing the
research issue in detail. I have boosted my experience regarding limitation of investigation as it
would be necessary to complete the project in upcoming time. In such way, it is observed that
time, cost and resources creates complexity to gather the information (Lohrke, Frownfelter-
Lohrke, and Ketchen Jr, 2016). I have also generated my knowledge that time plan is beneficial
to completing each activity in predetermined time duration. I will apply this understanding in the
future in terms of completing the research on time.
Conclusion
the small and large enterprise in Pakistan. This business research was also beneficial to conduct
the further research.
Explain your learning process
Under the assignment 1, I did different activities like addressing research issue, project objective
and assessing the literature review in order to identify the challenges of cybersecurity in business
performance (Wilson, 2016). Through the assignment 2, I did certain practices like identifying
research methodology, research question, summarising the literature review, developing time
plan, evaluating limitation of research (Kaplan, Sharma, and Weinberg, 2011). I did another
activity like addressing the research instruments and discussing the reliability and validity. The
key cause of performing certain practices during the investigation was to attain the project
objectives in a methodological way.
Explain Plan how this learning you will apply
Through the assignment 2, I have generated my knowledge of process regarding sampling. It
would be advantageous to select the participants from the high amount of population (Mackey,
and Gass, 2015). Consequently, I would apply this information in the future for assessing the
research issue in detail. I have boosted my experience regarding limitation of investigation as it
would be necessary to complete the project in upcoming time. In such way, it is observed that
time, cost and resources creates complexity to gather the information (Lohrke, Frownfelter-
Lohrke, and Ketchen Jr, 2016). I have also generated my knowledge that time plan is beneficial
to completing each activity in predetermined time duration. I will apply this understanding in the
future in terms of completing the research on time.
Conclusion

BUSINESS RESEARCH 6
Through the above interpretation, it could be summarised that cybersecurity is essential to secure
the data in business and enhance the performance of the business. This research has developed
my research skills, technical skills with business management skills. It can be also summarised
that both qualitative, as well as quantitative research design, will be applied with the intention of
completing the investigation. This research would not only enhance my personal career but also
improve my professional career.
Through the above interpretation, it could be summarised that cybersecurity is essential to secure
the data in business and enhance the performance of the business. This research has developed
my research skills, technical skills with business management skills. It can be also summarised
that both qualitative, as well as quantitative research design, will be applied with the intention of
completing the investigation. This research would not only enhance my personal career but also
improve my professional career.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BUSINESS RESEARCH 7
References
Abomhara, M. (2015). Cybersecurity and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research
directions. Computers & Security, 30(8), pp.719-731.
Cooper, D.R., Schindler, P.S. & Sun, J. (2006). Business research methods (Vol. 9). New York:
McGraw-Hill Irwin.
Elmaghraby, A.S., &Losavio, M.M. (2014). Cybersecurity challenges in Smart Cities: Safety,
security, and privacy. Journal of Advanced Research, vol. 5, no. 4, pp. 491-497.
Hall, P. (2016). Smaller banks face cybersecurity challenges. Westchester County Business
Journal, vol. 52, no. 46, pp. 15.
James, C. (2016). Cybersecurity: Threats Challenges Opportunities. ACS.
Kaplan, J., Sharma, S. & Weinberg, A. (2011). Meeting the cybersecurity challenge. McKinsey
& Company.
Lohrke, F.T., Frownfelter-Lohrke, C. &Ketchen Jr, D.J. (2016). The role of information
technology systems in the performance of mergers and acquisitions. Business
Horizons, 59(1), pp.7-12.
Mackey, A. &Gass, S. M. (2015). Second language research: Methodology and design.
Routledge.
Wilson, V. (2016). Research Methods: Mixed Methods Research. Evidence Based Library and
Information Practice, 11, 56-59.
References
Abomhara, M. (2015). Cybersecurity and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research
directions. Computers & Security, 30(8), pp.719-731.
Cooper, D.R., Schindler, P.S. & Sun, J. (2006). Business research methods (Vol. 9). New York:
McGraw-Hill Irwin.
Elmaghraby, A.S., &Losavio, M.M. (2014). Cybersecurity challenges in Smart Cities: Safety,
security, and privacy. Journal of Advanced Research, vol. 5, no. 4, pp. 491-497.
Hall, P. (2016). Smaller banks face cybersecurity challenges. Westchester County Business
Journal, vol. 52, no. 46, pp. 15.
James, C. (2016). Cybersecurity: Threats Challenges Opportunities. ACS.
Kaplan, J., Sharma, S. & Weinberg, A. (2011). Meeting the cybersecurity challenge. McKinsey
& Company.
Lohrke, F.T., Frownfelter-Lohrke, C. &Ketchen Jr, D.J. (2016). The role of information
technology systems in the performance of mergers and acquisitions. Business
Horizons, 59(1), pp.7-12.
Mackey, A. &Gass, S. M. (2015). Second language research: Methodology and design.
Routledge.
Wilson, V. (2016). Research Methods: Mixed Methods Research. Evidence Based Library and
Information Practice, 11, 56-59.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.