Business Research Reflection Report on Cybersecurity Analysis

Verified

Added on  2020/05/11

|5
|1439
|37
Report
AI Summary
This business research reflection report delves into the significance of cybersecurity for organizations, emphasizing its role in enhancing financial performance. The report highlights the importance of cybersecurity strategies, including antivirus software, firewalls, and employee training to combat cybercrime. It explores various aspects of cybersecurity, such as cyber ethics, cyber threats, and the impact of cyberattacks on cloud computing. The reflection also covers project objectives, significant factors in cybersecurity (hardware, security controls, and costs), and challenges faced during implementation. Furthermore, it addresses research methodologies, including qualitative and quantitative approaches, research limitations, and time management in research. The report provides insights into research design, philosophy, and the creation of research questions and hypotheses. The reflection also covers the scope of the project, the time structure of the research, and the importance of cybersecurity principles.
Document Page
Running head: BUSINESS RESEARCH
Business Research
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BUSINESS RESEARCH 2
Reflection report
I gained my awareness about the cybersecurity that will be essential for the organization due
to enhancing the financial performance in long-term. The cybersecurity is a way of ensuring
the information and information structure named networking, database, and systems. There
are different security strategies such as the installation of antivirus in the system, firewalls,
and innovative solution to defend individual data and their system (Komninos, et. al., 2014).
It can support to improve the productivity of an organization as well as an individual. In
addition to this, I also learned that cybercrime enhanced on daily basis, therefore, it is
obligatory for the organization to train the employees to successfully deal with issues of
cybercrime in long-run. At the same time, I also understood that individual who used
personal computer needs to gain their knowledge about the cybersecurity, Cyber Ethics, and
cyber-crimes. It will be effective to manage the cybercrime problem in an effective manner
(Carr, 2016). Along with this, I learned that the assessment of cybersecurity can be
significant to provide the many opportunities to the people for boost the view regarding
multidisciplinary methodology.
In addition to this, it can also be said that company has used many strategies and tools to
protect their system from cyber-attack due to securing their confidential information. It can
also a direct impact on the performance of the organization. Therefore, it can also be said that
the cybersecurity can be connotation, an asset of the group, process, and framework implied
to protect the business and internet authorized structures from uncertainty (Karim, and Phoha,
2014). Along with this, I created my knowledge about the project objectives that can be
beneficial to perform an activity in an appropriate manner. At the same time, I also learned
about some significant factors that can be crucial to in the cybersecurity named hardware,
interrelationships of security controls, and cost contemplations. These can affect the
performance of the organization in long-run. In addition to this, I created my awareness about
Document Page
BUSINESS RESEARCH 3
challenges that are generally faced by an organization in order to implement the
cybersecurity.
I also learned about the strategies that can be used to deal with cybersecurity issues in a
systematic manner. I also gained my understanding about the cyber threat in depth. In
addition to this, it can also be said that the cyber situation could be determined as a logo,
circumstance, and occurring with the possibility that could damage the whole infrastructure
of the corporation along with damage the resources which depend on this foundation (Vande
and Verhelst, 2014). In addition to this, I also increased my knowledge about the significance
of Cyber Security. Further, I created my understanding regarding the cybersecurity principles.
I also gained my knowledge towards the cyber threat on cloud computing. In Addition to this,
there are different factors that show the challenges of cyber security such as securing the
environment, Firewall, and Intrusion Detection System. Further, it can be said that such
factors can decline the financial performance of an organization (Jahankhani, et. al., 2015). I
gained my knowledge about the scope of the project. I also created my undemanding about
research question that includes two types of question such as primary and secondary research
question. I learned that the primary research question is based on numeric data while the
secondary research question relies on non- numeric data. I understood about the creation of
research hypothesis to obtain the favorable outcome in future.
I also understood about the research design that will be crucial to identify the techniques to
complete the research objectives in a systematic way. I learned about two kinds of research
methods such as qualitative and quantitative research method. In addition to this, I created my
depth understanding about the qualitative research that will be beneficial in future to perform
any research effectively. Along with this, it can be said that there are different kinds of
methods that are involved in the observation, document review system, formulation of the
theory, and arrangement of in-depth interviews. At the same time, it can be evaluated that
Document Page
BUSINESS RESEARCH 4
qualitative research supported to obtain fresh information towards research issues. It will be
also effective to obtain the accurate outcome in the specified time and cost (Dua, and Du,
2016). I also created my knowledge about research approaches and research philosophy that
supports to perform the research activity in an effective way. Beside this, I have observed that
quantitative research can also be significant to collect the theoretical information about the
research issues in an appropriate manner. In addition to this, it can also be said that the
quantitative research can support to develop the conceptual framework regarding the research
issues. It includes three factors such as statistical testing, the arrangement of honeypots, and
sampling (Lohrke, et. al., 2016).
Along with this, I developed my understanding regarding the research limitation that will
influence the result of research in long-term. The research limitation includes some
significant factors such as a focus on the research scope, converse with the IT specialist,
technical data, and resources, time, and cost. These factors can influence the performance of
research (McKenna, et. al., 2016). I also gained my awareness about time structure of the
research that will be beneficial to manage the time in a systematic way. In this, I learned that
how much time can be appropriate to accomplish the different research activity. In addition to
this, it can be said that depth understanding about research can be supportive for me to
improve my research skills. It also enhanced my professional skills as well as personal life in
an appropriate manner. Moreover, the time management skills can enable me to accomplish
the research task at the specified time and cost.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BUSINESS RESEARCH 5
References
Carr, M. (2016) ‘Public-private partnerships in national cybersecurity strategies’,
International Affairs, 92(1), pp. 43-62.
Dua, S., and Du, X. (2016) Data mining and machine learning in cybersecurity. USA: CRC
Press.
Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A. G., and Hosseinian-Far, A.
(Eds.). (2015) Global Security, Safety, and Sustainability: Tomorrow's Challenges of Cyber
Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015.
Proceedings (Vol. 534). Berlin: Springer.
Karim, M. E., and Phoha, V. V. (2014) Cyber-physical systems security. In Applied Cyber-
Physical Systems (pp. 75-83). New York: Springer.
Komninos, N., Philippou, E., and Pitsillides, A. (2014) ‘Survey in smart grid and smart home
security: Issues, challenges, and countermeasures’, IEEE Communications Surveys and
Tutorials, 16(4), pp. 1933-1954.
Lohrke, F. T., Frownfelter-Lohrke, C., and Ketchen, D. J. (2016) ‘The role of information
technology systems in the performance of mergers and acquisitions’, Business
Horizons, 59(1), pp. 7-12.
McKenna, S., Staheli, D., Fulcher, C., and Meyer, M. (2016, June) ‘Bubblenet: A
cybersecurity dashboard for visualizing patterns’, In Computer Graphics Forum. 35 (3), pp.
281-290.
Vande Putte, D., and Verhelst, M. (2014) ‘Cybercrime: Can a standard risk analysis help in
the challenges facing business continuity managers?’, Journal of business continuity and
emergency planning, 7(2), pp. 126-137.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]